Hi Daniel,
Thank you very much for your prompt response. The output mentioned is
generated by ngrep and can be seen by tcpdump as well.
It seems a "space" and the bogus part ends up after the port used in the
socket opened. For example "5060" becomes "5060
yadieyaboguspartdrdfg5r3245234". Obviously sending a packet towards an
IPv6 address using such a port doesn't work.
For the time being, we disabled the topoh.so module and rewrote code
using uac_replace_from() and substituded the code with $fn = "string",
$fd = "otherstring" equivalents.
Thanks again!
Cheers,
Kees