I got really modify my config, and now it looks like:
http://pastebin.com/0M7938Mm
but now I got loopback problems. kamailio just asking itself.
ngrep -d lo port 5060 talks me:
U 194.190.8.171:5060 -> 194.190.8.171:5060
SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP
194.190.8.171;branch=z9hG4bKc2bb.e627f45ee16a4b45ca99321b3bc8832c.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.328c8c23df8e916010525f7f786cbc49.0..Via:
SIP/2.0/UDP 194.190.8.171;rport=5060
;branch=z9hG4bKc2bb.b8ec8f173657be182ad714f59d37d4a8.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.7bec0e7c4a5962e90811bf082f0e6635.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6bbb824e92f328ce4053167b2e2c596a.0..V
ia: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6f732fece1d8956bf5b075118b3dcb2f.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b4ab8b8de819be6fff9203bfdf4e758c.0..Via:
SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2
bb.977524b1111849dd2cd8020d4c09090c.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.cb7d178bf3fdb6596399beaf5b43e66d.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0c69cbf.0..Via:
SIP/2.0/UDP 1
94.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via:
SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a
7f73adc7761c7ba31b.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via:
SIP/2.0/UDP 194.190.8.171;rpor
t=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via:
SIP/2.0/UDP 192.168.1.119:5060
;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988
c4757dae14dfb;rport=5060..From: <sip:1001@194.190.8.171>;tag=1274477258..To:
<sip:1001@194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID:
00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2
SUBSCRIBE..Server: kamailio (4.1.1 (x
86_64/linux))..Content-Length: 0....
#
U 194.190.8.171:5060 -> 194.190.8.171:5060
SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.328c8c23df8e916010525f7f786cbc49.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b8ec8f173657be182ad714f59d37d4a8.0..Via:
SIP/2.0/UDP 194.190.8.171
;rport=5060;branch=z9hG4bKc2bb.7bec0e7c4a5962e90811bf082f0e6635.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6bbb824e92f328ce4053167b2e2c596a.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6f732fece1d8956bf5b075118b
3dcb2f.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b4ab8b8de819be6fff9203bfdf4e758c.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.977524b1111849dd2cd8020d4c09090c.0..Via:
SIP/2.0/UDP 194.190.8.171;rport=5060;branc
h=z9hG4bKc2bb.cb7d178bf3fdb6596399beaf5b43e66d.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0c69cbf.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via:
SI
P/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via:
SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01d
cad6cb7e8257bcbe8ad7b66b7b095.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via:
SIP/2.0/UDP 194.190
.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via:
SIP/2.0/UDP
192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From:
<sip:1001@194.190.8.171>;tag=1274477258..To: <sip:1001
@194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID:
00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2
SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....
#
U 194.190.8.171:5060 -> 194.190.8.171:5060
SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b8ec8f173657be182ad714f59d37d4a8.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.7bec0e7c4a5962e90811bf082f0e6635.0..Via:
SIP/2.0/UDP 194.190.8.171
;rport=5060;branch=z9hG4bKc2bb.6bbb824e92f328ce4053167b2e2c596a.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6f732fece1d8956bf5b075118b3dcb2f.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b4ab8b8de819be6fff9203bfdf
4e758c.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.977524b1111849dd2cd8020d4c09090c.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.cb7d178bf3fdb6596399beaf5b43e66d.0..Via:
SIP/2.0/UDP 194.190.8.171;rport=5060;branc
h=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0c69cbf.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via:
SI
P/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via:
SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946
cc81be473148e1a6dc5a173b2cfb1.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via:
SIP/2.0/UDP 192.168
.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From:
<sip:1001@194.190.8.171>;tag=1274477258..To:
<sip:1001@194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID:
00C46D3A-558B-E311-988A-4757D
AE14DFB@192.168.1.119..CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1
(x86_64/linux))..Content-Length: 0....
#
U 194.190.8.171:5060 -> 194.190.8.171:5060
SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.7bec0e7c4a5962e90811bf082f0e6635.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6bbb824e92f328ce4053167b2e2c596a.0..Via:
SIP/2.0/UDP 194.190.8.171
;rport=5060;branch=z9hG4bKc2bb.6f732fece1d8956bf5b075118b3dcb2f.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b4ab8b8de819be6fff9203bfdf4e758c.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.977524b1111849dd2cd8020d4c
09090c.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.cb7d178bf3fdb6596399beaf5b43e66d.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0c69cbf.0..Via:
SIP/2.0/UDP 194.190.8.171;rport=5060;branc
h=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via:
SI
P/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via:
SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0ea
f0b545ac8239ad5e105fc2804cae8.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via:
SIP/2.0/UDP 192.168.1.119:5060
;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..Fro
m: <sip:1001@194.190.8.171>;tag=1274477258..To:
<sip:1001@194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID:
00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2
SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length
: 0....
#
U 194.190.8.171:5060 -> 194.190.8.171:5060
SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6bbb824e92f328ce4053167b2e2c596a.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6f732fece1d8956bf5b075118b3dcb2f.0..Via:
SIP/2.0/UDP 194.190.8.171
;rport=5060;branch=z9hG4bKc2bb.b4ab8b8de819be6fff9203bfdf4e758c.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.977524b1111849dd2cd8020d4c09090c.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.cb7d178bf3fdb6596399beaf5b
43e66d.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0c69cbf.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via:
SIP/2.0/UDP 194.190.8.171;rport=5060;branc
h=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via:
SI
P/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via:
SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d
28c8a5ba1eeda8f8b296f6d2232e8.0..Via: SIP/2.0/UDP
192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From:
<sip:1001@194.190.8.171>;tag=1274477258..To: <sip:1001@194.190.8.171
;tag=c5aea4efd01978ba4655
7f38f3d08cfc.2793..Call-ID:
00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2
SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....
#
U 194.190.8.171:5060 -> 194.190.8.171:5060
SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6f732fece1d8956bf5b075118b3dcb2f.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b4ab8b8de819be6fff9203bfdf4e758c.0..Via:
SIP/2.0/UDP 194.190.8.171
;rport=5060;branch=z9hG4bKc2bb.977524b1111849dd2cd8020d4c09090c.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.cb7d178bf3fdb6596399beaf5b43e66d.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0
c69cbf.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via:
SIP/2.0/UDP 194.190.8.171;rport=5060;branc
h=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via:
SI
P/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via:
SIP/2.0/UDP 192.168.1.119:5060;received=77.37.241.151;branc
h=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From: <
sip:1001@194.190.8.171>;tag=1274477258..To:
<sip:1001@194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID:
00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2 SUBSCRIBE
..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....
#
U 194.190.8.171:5060 -> 194.190.8.171:5060
SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b4ab8b8de819be6fff9203bfdf4e758c.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.977524b1111849dd2cd8020d4c09090c.0..Via:
SIP/2.0/UDP 194.190.8.171
;rport=5060;branch=z9hG4bKc2bb.cb7d178bf3fdb6596399beaf5b43e66d.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0c69cbf.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e
520e4e.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via:
SIP/2.0/UDP 194.190.8.171;rport=5060;branc
h=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via:
SI
P/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via:
SIP/2.0/UDP
192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From:
<sip:1001@194.190.8.171>;tag=12744772
58..To:
<sip:1001@194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID:
00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2
SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....
#
U 194.190.8.171:5060 -> 194.190.8.171:5060
SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.977524b1111849dd2cd8020d4c09090c.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.cb7d178bf3fdb6596399beaf5b43e66d.0..Via:
SIP/2.0/UDP 194.190.8.171
;rport=5060;branch=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0c69cbf.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf7
3e9e32.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via:
SIP/2.0/UDP 194.190.8.171;rport=5060;branc
h=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via:
SI
P/2.0/UDP
192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From:
<sip:1001@194.190.8.171>;tag=1274477258..To:
<sip:1001@194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID:
00C46D3A-558
B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2 SUBSCRIBE..Server:
kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....
#
U 194.190.8.171:5060 -> 194.190.8.171:5060
SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.cb7d178bf3fdb6596399beaf5b43e66d.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0c69cbf.0..Via:
SIP/2.0/UDP 194.190.8.171
;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c
7ba31b.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via:
SIP/2.0/UDP 194.190.8.171;rport=5060;branc
h=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via:
SIP/2.0/UDP 192.168.1.119:5060
;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14df
b;rport=5060..From: <sip:1001@194.190.8.171>;tag=1274477258..To: <
sip:1001@194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID:
00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2
SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux)
)..Content-Length: 0....
#
U 194.190.8.171:5060 -> 194.190.8.171:5060
SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0c69cbf.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via:
SIP/2.0/UDP 194.190.8.171
;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66
b7b095.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via:
SIP/2.0/UDP 194.190.8.171;rport=5060;branc
h=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via: SIP/2.0/UDP
192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From:
<sip:1001@194.190.8.171>;tag=1274477258..To: <sip:1001@194.190.8.171
;tag=c5a
ea4efd01978ba46557f38f3d08cfc.2793..Call-ID:
00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2
SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....
#
U 194.190.8.171:5060 -> 194.190.8.171:5060
SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via:
SIP/2.0/UDP 194.190.8.171
;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173
b2cfb1.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via:
SIP/2.0/UDP 192.168.1.119:5060;received=77
.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From:
<sip:1001@194.190.8.171>;tag=1274477258..To:
<sip:1001@194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID:
00C46D3A-558B-E311-988A-4757DAE14DFB(a)192.168.1.119..
CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1
(x86_64/linux))..Content-Length: 0....
#
U 194.190.8.171:5060 -> 194.190.8.171:5060
SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via:
SIP/2.0/UDP 194.190.8.171
;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc28
04cae8.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via:
SIP/2.0/UDP
192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From:
<sip:1001@194.190.8.
171>;tag=1274477258..To:
<sip:1001@194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID:
00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2
SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....
#
U 194.190.8.171:5060 -> 194.190.8.171:5060
SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via:
SIP/2.0/UDP 194.190.8.171
;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d
2232e8.0..Via: SIP/2.0/UDP
192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From:
<sip:1001@194.190.8.171>;tag=1274477258..To: <sip:1001@194.190.8.171
;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call
-ID: 00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2
SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....
#
U 194.190.8.171:5060 -> 194.190.8.171:5060
SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via:
SIP/2.0/UDP 194.190.8.171
;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via:
SIP/2.0/UDP 192.168.1.119:5060
;received=77.37.241.151;branch=z9hG4bK00c46d3a558be3
11988c4757dae14dfb;rport=5060..From:
<sip:1001@194.190.8.171>;tag=1274477258..To:
<sip:1001@194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID:
00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2
SUBSCRIBE..Server: kamailio (4.1
.1 (x86_64/linux))..Content-Length: 0....
#
U 194.190.8.171:5060 -> 194.190.8.171:5060
SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via:
SIP/2.0/UDP 194.190.8.171
;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via:
SIP/2.0/UDP
192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From:
<sip:1001@194.190.8.171>;tag=1274477258..To: <sip:1001@194.1
90.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID:
00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2
SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....
#
U 194.190.8.171:5060 -> 194.190.8.171:5060
SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via:
SIP/2.0/UDP 192.168.1.119
:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From:
<sip:1001@194.190.8.171>;tag=1274477258..To:
<sip:1001@194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID:
00C46D3A-558B-E311-988A-4757DAE14DF
B@192.168.1.119..CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1
(x86_64/linux))..Content-Length: 0....
#
U 194.190.8.171:5060 -> 194.190.8.171:5060
SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via:
SIP/2.0/UDP
192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From:
<si
p:1001@194.190.8.171>;tag=1274477258..To:
<sip:1001@194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID:
00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2
SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0...
.
and how looks dump
1. from sip device to kamailio
[root@kamaz sm1ly]# tcpdump -nn -i eth0 host 77.37.241.151 -v
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 65535
bytes
19:54:51.205942 IP (tos 0x0, ttl 57, id 0, offset 0, flags [DF], proto UDP
(17), length 421)
77.37.241.151.57288 > 194.190.8.171.5060: SIP, length: 393
REGISTER sip:194.190.8.171 SIP/2.0
Call-ID: 676c32ab221a665a9bc9875ffb74930a(a)192.168.1.103
CSeq: 5569 REGISTER
From: "1002" <sip:1002@194.190.8.171>;tag=2801080754
To: "1002" <sip:1002@194.190.8.171>
Via: SIP/2.0/UDP 192.168.1.103:57288
;branch=z9hG4bKe5bd1a6ceba7f0a0f4e7487cb17ca365353236;rport
Max-Forwards: 70
User-Agent: SIPAUA/0.1.001
Contact: *
Expires: 0
Content-Length: 0
19:54:51.210060 IP (tos 0x10, ttl 64, id 35861, offset 0, flags [none],
proto UDP (17), length 603)
194.190.8.171.5060 > 77.37.241.151.57288: SIP, length: 575
SIP/2.0 401 Unauthorized
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bKe5bd1a6ceba7f0a0f4e7487cb17ca365353236;rport=57288
From: "1002" <sip:1002@194.190.8.171>;tag=2801080754
To: "1002" <sip:1002@194.190.8.171>;tag=as518dbea9
Call-ID: 676c32ab221a665a9bc9875ffb74930a(a)192.168.1.103
CSeq: 5569 REGISTER
Server: Asterisk PBX 1.8.20.0
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
WWW-Authenticate: Digest algorithm=MD5, realm="asterisk",
nonce="31daf0f8"
Content-Length: 0
19:54:51.257552 IP (tos 0x0, ttl 57, id 0, offset 0, flags [DF], proto UDP
(17), length 586)
77.37.241.151.57288 > 194.190.8.171.5060: SIP, length: 558
REGISTER sip:194.190.8.171:5060 SIP/2.0
Call-ID: 676c32ab221a665a9bc9875ffb74930a(a)192.168.1.103
CSeq: 5570 REGISTER
From: "1002" <sip:1002@194.190.8.171>;tag=2801080754
To: "1002" <sip:1002@194.190.8.171>
Via: SIP/2.0/UDP 192.168.1.103:57288
;branch=z9hG4bK440337c23337c9913220fd825f4d9ded353236;rport
Max-Forwards: 70
User-Agent: SIPAUA/0.1.001
Contact: *
Expires: 0
Authorization: Digest
username="1002",realm="asterisk",nonce="31daf0f8",uri="sip:
194.190.8.171:5060
",response="2b0222b07da7af1c3b72c2eb36241f5f",algorithm=MD5
Content-Length: 0
19:54:51.261209 IP (tos 0x10, ttl 64, id 35862, offset 0, flags [none],
proto UDP (17), length 603)
194.190.8.171.5060 > 77.37.241.151.57288: SIP, length: 575
SIP/2.0 401 Unauthorized
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bK440337c23337c9913220fd825f4d9ded353236;rport=57288
From: "1002" <sip:1002@194.190.8.171>;tag=2801080754
To: "1002" <sip:1002@194.190.8.171>;tag=as0716dea5
Call-ID: 676c32ab221a665a9bc9875ffb74930a(a)192.168.1.103
CSeq: 5570 REGISTER
Server: Asterisk PBX 1.8.20.0
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
WWW-Authenticate: Digest algorithm=MD5, realm="asterisk",
nonce="2f70c759"
Content-Length: 0
19:54:51.290458 IP (tos 0x0, ttl 57, id 0, offset 0, flags [DF], proto UDP
(17), length 586)
77.37.241.151.57288 > 194.190.8.171.5060: SIP, length: 558
REGISTER sip:194.190.8.171:5060 SIP/2.0
Call-ID: 676c32ab221a665a9bc9875ffb74930a(a)192.168.1.103
CSeq: 5571 REGISTER
From: "1002" <sip:1002@194.190.8.171>;tag=2801080754
To: "1002" <sip:1002@194.190.8.171>
Via: SIP/2.0/UDP 192.168.1.103:57288
;branch=z9hG4bK30fe030eee49e2eb50c619074c0f057b353236;rport
Max-Forwards: 70
User-Agent: SIPAUA/0.1.001
Contact: *
Expires: 0
Authorization: Digest
username="1002",realm="asterisk",nonce="2f70c759",uri="sip:
194.190.8.171:5060
",response="9eb7d157cfd0d8e8575b59c94c5f82f6",algorithm=MD5
Content-Length: 0
19:54:51.295285 IP (tos 0x10, ttl 64, id 35863, offset 0, flags [none],
proto UDP (17), length 566)
194.190.8.171.5060 > 77.37.241.151.57288: SIP, length: 538
SIP/2.0 200 OK
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bK30fe030eee49e2eb50c619074c0f057b353236;rport=57288
From: "1002" <sip:1002@194.190.8.171>;tag=2801080754
To: "1002" <sip:1002@194.190.8.171>;tag=as0716dea5
Call-ID: 676c32ab221a665a9bc9875ffb74930a(a)192.168.1.103
CSeq: 5571 REGISTER
Server: Asterisk PBX 1.8.20.0
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
Expires: 0
Date: Mon, 03 Feb 2014 15:54:51 GMT
Content-Length: 0
19:54:51.314824 IP (tos 0x0, ttl 57, id 0, offset 0, flags [DF], proto UDP
(17), length 473)
77.37.241.151.57288 > 194.190.8.171.5060: SIP, length: 445
REGISTER sip:194.190.8.171 SIP/2.0
Call-ID: fffb7a09e489ce1cad6783709652b6f9(a)192.168.1.103
CSeq: 2404 REGISTER
From: "1002" <sip:1002@194.190.8.171>;tag=134783744
To: "1002" <sip:1002@194.190.8.171>
Via: SIP/2.0/UDP 192.168.1.103:57288
;branch=z9hG4bKdeb946998664720c2c93538625cc649e353236;rport
Max-Forwards: 70
User-Agent: SIPAUA/0.1.001
Contact: "1002" <sip:1002@192.168.1.103:57288;transport=udp>
Expires: 3600
Content-Length: 0
19:54:51.319697 IP (tos 0x10, ttl 64, id 35864, offset 0, flags [none],
proto UDP (17), length 602)
194.190.8.171.5060 > 77.37.241.151.57288: SIP, length: 574
SIP/2.0 401 Unauthorized
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bKdeb946998664720c2c93538625cc649e353236;rport=57288
From: "1002" <sip:1002@194.190.8.171>;tag=134783744
To: "1002" <sip:1002@194.190.8.171>;tag=as0bba2324
Call-ID: fffb7a09e489ce1cad6783709652b6f9(a)192.168.1.103
CSeq: 2404 REGISTER
Server: Asterisk PBX 1.8.20.0
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
WWW-Authenticate: Digest algorithm=MD5, realm="asterisk",
nonce="023deb34"
Content-Length: 0
19:54:51.344080 IP (tos 0x0, ttl 57, id 0, offset 0, flags [DF], proto UDP
(17), length 638)
77.37.241.151.57288 > 194.190.8.171.5060: SIP, length: 610
REGISTER sip:194.190.8.171:5060 SIP/2.0
Call-ID: fffb7a09e489ce1cad6783709652b6f9(a)192.168.1.103
CSeq: 2405 REGISTER
From: "1002" <sip:1002@194.190.8.171>;tag=134783744
To: "1002" <sip:1002@194.190.8.171>
Via: SIP/2.0/UDP 192.168.1.103:57288
;branch=z9hG4bK60a6798f72024444a9870698b766a04c353236;rport
Max-Forwards: 70
User-Agent: SIPAUA/0.1.001
Contact: "1002" <sip:1002@192.168.1.103:57288;transport=udp>
Expires: 3600
Authorization: Digest
username="1002",realm="asterisk",nonce="023deb34",uri="sip:
194.190.8.171:5060
",response="7fa5be98c7c0c395ed41f9e7da095629",algorithm=MD5
Content-Length: 0
19:54:51.350423 IP (tos 0x10, ttl 64, id 35865, offset 0, flags [none],
proto UDP (17), length 602)
194.190.8.171.5060 > 77.37.241.151.57288: SIP, length: 574
SIP/2.0 401 Unauthorized
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bK60a6798f72024444a9870698b766a04c353236;rport=57288
From: "1002" <sip:1002@194.190.8.171>;tag=134783744
To: "1002" <sip:1002@194.190.8.171>;tag=as065abeba
Call-ID: fffb7a09e489ce1cad6783709652b6f9(a)192.168.1.103
CSeq: 2405 REGISTER
Server: Asterisk PBX 1.8.20.0
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
WWW-Authenticate: Digest algorithm=MD5, realm="asterisk",
nonce="26886c3d"
Content-Length: 0
19:54:51.370976 IP (tos 0x0, ttl 57, id 0, offset 0, flags [DF], proto UDP
(17), length 638)
77.37.241.151.57288 > 194.190.8.171.5060: SIP, length: 610
REGISTER sip:194.190.8.171:5060 SIP/2.0
Call-ID: fffb7a09e489ce1cad6783709652b6f9(a)192.168.1.103
CSeq: 2406 REGISTER
From: "1002" <sip:1002@194.190.8.171>;tag=134783744
To: "1002" <sip:1002@194.190.8.171>
Via: SIP/2.0/UDP 192.168.1.103:57288
;branch=z9hG4bKf4d831e0612e1074bf49397d92907c80353236;rport
Max-Forwards: 70
User-Agent: SIPAUA/0.1.001
Contact: "1002" <sip:1002@192.168.1.103:57288;transport=udp>
Expires: 3600
Authorization: Digest
username="1002",realm="asterisk",nonce="26886c3d",uri="sip:
194.190.8.171:5060
",response="cc17aae74d45f06e4712aa66b08e68df",algorithm=MD5
Content-Length: 0
19:54:51.380962 IP (tos 0x10, ttl 64, id 35866, offset 0, flags [none],
proto UDP (17), length 636)
194.190.8.171.5060 > 77.37.241.151.57288: SIP, length: 608
SIP/2.0 200 OK
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bKf4d831e0612e1074bf49397d92907c80353236;rport=57288
From: "1002" <sip:1002@194.190.8.171>;tag=134783744
To: "1002" <sip:1002@194.190.8.171>;tag=as065abeba
Call-ID: fffb7a09e489ce1cad6783709652b6f9(a)192.168.1.103
CSeq: 2406 REGISTER
Server: Asterisk PBX 1.8.20.0
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
Expires: 3600
Contact: <sip:1002@192.168.1.103:57288;transport=udp>;expires=3600
Date: Mon, 03 Feb 2014 15:54:51 GMT
Content-Length: 0
19:54:51.406160 IP (tos 0x0, ttl 57, id 0, offset 0, flags [DF], proto UDP
(17), length 395)
77.37.241.151.57288 > 194.190.8.171.5060: SIP, length: 367
OPTIONS sip:194.190.8.171 SIP/2.0
Call-ID: 28b382a24bc3e426f030593cec5f852a(a)192.168.1.103
CSeq: 1287 OPTIONS
From: "1002" <sip:1002@194.190.8.171>;tag=3866552602
To: "1002" <sip:1002@194.190.8.171>
Via: SIP/2.0/UDP 192.168.1.103:57288
;branch=z9hG4bK9bddae72a5ccaf0df80be00ba2882dfd353236;rport
Max-Forwards: 70
User-Agent: SIPAUA/0.1.001
Content-Length: 0
19:54:51.407799 IP (tos 0x10, ttl 64, id 35867, offset 0, flags [none],
proto UDP (17), length 458)
194.190.8.171.5060 > 77.37.241.151.57288: SIP, length: 430
SIP/2.0 484 Address Incomplete
Call-ID: 28b382a24bc3e426f030593cec5f852a(a)192.168.1.103
CSeq: 1287 OPTIONS
From: "1002" <sip:1002@194.190.8.171>;tag=3866552602
To: "1002" <sip:1002@194.190.8.171
;tag=c5aea4efd01978ba46557f38f3d08cfc.5162
Via: SIP/2.0/UDP 192.168.1.103:57288
;branch=z9hG4bK9bddae72a5ccaf0df80be00ba2882dfd353236;rport=57288;received=77.37.241.151
Server: kamailio (4.1.1 (x86_64/linux))
Content-Length: 0
2. from kamailio to asterisk.
[root@kamaz sm1ly]# tcpdump -nn -i eth1 host 50.0.0.10 -v and port 5060
tcpdump: listening on eth1, link-type EN10MB (Ethernet), capture size 65535
bytes
19:54:41.906391 IP (tos 0x0, ttl 64, id 5618, offset 0, flags [none], proto
UDP (17), length 597)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569
OPTIONS sip:1002@192.168.1.103:34713;transport=udp SIP/2.0
Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK75f42160;rport
Max-Forwards: 70
From: "asterisk" <sip:asterisk@50.0.0.10>;tag=as40fc69ea
To: <sip:1002@192.168.1.103:34713;transport=udp>
Contact: <sip:asterisk@50.0.0.10:5060>
Call-ID: 7bacfa62676409266240568c5c9d055b@50.0.0.10:5060
CSeq: 102 OPTIONS
User-Agent: Asterisk PBX 1.8.20.0
Date: Mon, 03 Feb 2014 15:54:41 GMT
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
Content-Length: 0
19:54:42.906385 IP (tos 0x0, ttl 64, id 5619, offset 0, flags [none], proto
UDP (17), length 597)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569
OPTIONS sip:1002@192.168.1.103:34713;transport=udp SIP/2.0
Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK75f42160;rport
Max-Forwards: 70
From: "asterisk" <sip:asterisk@50.0.0.10>;tag=as40fc69ea
To: <sip:1002@192.168.1.103:34713;transport=udp>
Contact: <sip:asterisk@50.0.0.10:5060>
Call-ID: 7bacfa62676409266240568c5c9d055b@50.0.0.10:5060
CSeq: 102 OPTIONS
User-Agent: Asterisk PBX 1.8.20.0
Date: Mon, 03 Feb 2014 15:54:41 GMT
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
Content-Length: 0
19:54:43.906565 IP (tos 0x0, ttl 64, id 5620, offset 0, flags [none], proto
UDP (17), length 597)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569
OPTIONS sip:1002@192.168.1.103:34713;transport=udp SIP/2.0
Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK75f42160;rport
Max-Forwards: 70
From: "asterisk" <sip:asterisk@50.0.0.10>;tag=as40fc69ea
To: <sip:1002@192.168.1.103:34713;transport=udp>
Contact: <sip:asterisk@50.0.0.10:5060>
Call-ID: 7bacfa62676409266240568c5c9d055b@50.0.0.10:5060
CSeq: 102 OPTIONS
User-Agent: Asterisk PBX 1.8.20.0
Date: Mon, 03 Feb 2014 15:54:41 GMT
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
Content-Length: 0
19:54:44.904726 IP (tos 0x10, ttl 64, id 34743, offset 0, flags [none],
proto UDP (17), length 413)
50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 385
SIP/2.0 408 Request Timeout
Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK75f42160;rport=5060
From: "asterisk" <sip:asterisk@50.0.0.10>;tag=as40fc69ea
To: <sip:1002@192.168.1.103:34713
;transport=udp>;tag=6f6209fafb0c4bc816e1e7aa854ee2dd-8578
Call-ID: 7bacfa62676409266240568c5c9d055b@50.0.0.10:5060
CSeq: 102 OPTIONS
Server: kamailio (4.1.1 (x86_64/linux))
Content-Length: 0
19:54:51.207422 IP (tos 0x10, ttl 64, id 34744, offset 0, flags [none],
proto UDP (17), length 531)
50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 503
REGISTER sip:194.190.8.171 SIP/2.0
Call-ID: 676c32ab221a665a9bc9875ffb74930a(a)192.168.1.103
CSeq: 5569 REGISTER
From: "1002" <sip:1002@194.190.8.171>;tag=2801080754
To: "1002" <sip:1002@194.190.8.171>
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bKd8a1.094de0504827adb22c7b874f77dfd698.0
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bKe5bd1a6ceba7f0a0f4e7487cb17ca365353236;rport=57288
Max-Forwards: 16
User-Agent: SIPAUA/0.1.001
Contact: *
Expires: 0
Content-Length: 0
19:54:51.209052 IP (tos 0x0, ttl 64, id 5621, offset 0, flags [none], proto
UDP (17), length 713)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 685
SIP/2.0 401 Unauthorized
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bKd8a1.094de0504827adb22c7b874f77dfd698.0;received=50.0.0.1;rport=5060
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bKe5bd1a6ceba7f0a0f4e7487cb17ca365353236;rport=57288
From: "1002" <sip:1002@194.190.8.171>;tag=2801080754
To: "1002" <sip:1002@194.190.8.171>;tag=as518dbea9
Call-ID: 676c32ab221a665a9bc9875ffb74930a(a)192.168.1.103
CSeq: 5569 REGISTER
Server: Asterisk PBX 1.8.20.0
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
WWW-Authenticate: Digest algorithm=MD5, realm="asterisk",
nonce="31daf0f8"
Content-Length: 0
19:54:51.258759 IP (tos 0x10, ttl 64, id 34745, offset 0, flags [none],
proto UDP (17), length 696)
50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 668
REGISTER sip:194.190.8.171:5060 SIP/2.0
Call-ID: 676c32ab221a665a9bc9875ffb74930a(a)192.168.1.103
CSeq: 5570 REGISTER
From: "1002" <sip:1002@194.190.8.171>;tag=2801080754
To: "1002" <sip:1002@194.190.8.171>
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK56b1.d46d0ab6448c5edd99f24aa7ba8a2881.0
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bK440337c23337c9913220fd825f4d9ded353236;rport=57288
Max-Forwards: 16
User-Agent: SIPAUA/0.1.001
Contact: *
Expires: 0
Authorization: Digest
username="1002",realm="asterisk",nonce="31daf0f8",uri="sip:
194.190.8.171:5060
",response="2b0222b07da7af1c3b72c2eb36241f5f",algorithm=MD5
Content-Length: 0
19:54:51.259902 IP (tos 0x0, ttl 64, id 5622, offset 0, flags [none], proto
UDP (17), length 713)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 685
SIP/2.0 401 Unauthorized
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK56b1.d46d0ab6448c5edd99f24aa7ba8a2881.0;received=50.0.0.1;rport=5060
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bK440337c23337c9913220fd825f4d9ded353236;rport=57288
From: "1002" <sip:1002@194.190.8.171>;tag=2801080754
To: "1002" <sip:1002@194.190.8.171>;tag=as0716dea5
Call-ID: 676c32ab221a665a9bc9875ffb74930a(a)192.168.1.103
CSeq: 5570 REGISTER
Server: Asterisk PBX 1.8.20.0
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
WWW-Authenticate: Digest algorithm=MD5, realm="asterisk",
nonce="2f70c759"
Content-Length: 0
19:54:51.292190 IP (tos 0x10, ttl 64, id 34746, offset 0, flags [none],
proto UDP (17), length 696)
50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 668
REGISTER sip:194.190.8.171:5060 SIP/2.0
Call-ID: 676c32ab221a665a9bc9875ffb74930a(a)192.168.1.103
CSeq: 5571 REGISTER
From: "1002" <sip:1002@194.190.8.171>;tag=2801080754
To: "1002" <sip:1002@194.190.8.171>
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK66b1.0173e2524e6deda0f27b83591a62730f.0
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bK30fe030eee49e2eb50c619074c0f057b353236;rport=57288
Max-Forwards: 16
User-Agent: SIPAUA/0.1.001
Contact: *
Expires: 0
Authorization: Digest
username="1002",realm="asterisk",nonce="2f70c759",uri="sip:
194.190.8.171:5060
",response="9eb7d157cfd0d8e8575b59c94c5f82f6",algorithm=MD5
Content-Length: 0
19:54:51.293302 IP (tos 0x0, ttl 64, id 5623, offset 0, flags [none], proto
UDP (17), length 676)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 648
SIP/2.0 200 OK
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK66b1.0173e2524e6deda0f27b83591a62730f.0;received=50.0.0.1;rport=5060
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bK30fe030eee49e2eb50c619074c0f057b353236;rport=57288
From: "1002" <sip:1002@194.190.8.171>;tag=2801080754
To: "1002" <sip:1002@194.190.8.171>;tag=as0716dea5
Call-ID: 676c32ab221a665a9bc9875ffb74930a(a)192.168.1.103
CSeq: 5571 REGISTER
Server: Asterisk PBX 1.8.20.0
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
Expires: 0
Date: Mon, 03 Feb 2014 15:54:51 GMT
Content-Length: 0
19:54:51.317242 IP (tos 0x10, ttl 64, id 34747, offset 0, flags [none],
proto UDP (17), length 583)
50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 555
REGISTER sip:194.190.8.171 SIP/2.0
Call-ID: fffb7a09e489ce1cad6783709652b6f9(a)192.168.1.103
CSeq: 2404 REGISTER
From: "1002" <sip:1002@194.190.8.171>;tag=134783744
To: "1002" <sip:1002@194.190.8.171>
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK2624.44980ae0ad3ba5026d6f044c24770539.0
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bKdeb946998664720c2c93538625cc649e353236;rport=57288
Max-Forwards: 16
User-Agent: SIPAUA/0.1.001
Contact: "1002" <sip:1002@192.168.1.103:57288;transport=udp>
Expires: 3600
Content-Length: 0
19:54:51.318123 IP (tos 0x0, ttl 64, id 5624, offset 0, flags [none], proto
UDP (17), length 712)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 684
SIP/2.0 401 Unauthorized
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK2624.44980ae0ad3ba5026d6f044c24770539.0;received=50.0.0.1;rport=5060
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bKdeb946998664720c2c93538625cc649e353236;rport=57288
From: "1002" <sip:1002@194.190.8.171>;tag=134783744
To: "1002" <sip:1002@194.190.8.171>;tag=as0bba2324
Call-ID: fffb7a09e489ce1cad6783709652b6f9(a)192.168.1.103
CSeq: 2404 REGISTER
Server: Asterisk PBX 1.8.20.0
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
WWW-Authenticate: Digest algorithm=MD5, realm="asterisk",
nonce="023deb34"
Content-Length: 0
19:54:51.346522 IP (tos 0x10, ttl 64, id 34748, offset 0, flags [none],
proto UDP (17), length 748)
50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 720
REGISTER sip:194.190.8.171:5060 SIP/2.0
Call-ID: fffb7a09e489ce1cad6783709652b6f9(a)192.168.1.103
CSeq: 2405 REGISTER
From: "1002" <sip:1002@194.190.8.171>;tag=134783744
To: "1002" <sip:1002@194.190.8.171>
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK3624.173cef757dc8f7da8b864ee1ab1bfe50.0
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bK60a6798f72024444a9870698b766a04c353236;rport=57288
Max-Forwards: 16
User-Agent: SIPAUA/0.1.001
Contact: "1002" <sip:1002@192.168.1.103:57288;transport=udp>
Expires: 3600
Authorization: Digest
username="1002",realm="asterisk",nonce="023deb34",uri="sip:
194.190.8.171:5060
",response="7fa5be98c7c0c395ed41f9e7da095629",algorithm=MD5
Content-Length: 0
19:54:51.348056 IP (tos 0x0, ttl 64, id 5625, offset 0, flags [none], proto
UDP (17), length 712)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 684
SIP/2.0 401 Unauthorized
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK3624.173cef757dc8f7da8b864ee1ab1bfe50.0;received=50.0.0.1;rport=5060
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bK60a6798f72024444a9870698b766a04c353236;rport=57288
From: "1002" <sip:1002@194.190.8.171>;tag=134783744
To: "1002" <sip:1002@194.190.8.171>;tag=as065abeba
Call-ID: fffb7a09e489ce1cad6783709652b6f9(a)192.168.1.103
CSeq: 2405 REGISTER
Server: Asterisk PBX 1.8.20.0
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
WWW-Authenticate: Digest algorithm=MD5, realm="asterisk",
nonce="26886c3d"
Content-Length: 0
19:54:51.373298 IP (tos 0x10, ttl 64, id 34749, offset 0, flags [none],
proto UDP (17), length 748)
50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 720
REGISTER sip:194.190.8.171:5060 SIP/2.0
Call-ID: fffb7a09e489ce1cad6783709652b6f9(a)192.168.1.103
CSeq: 2406 REGISTER
From: "1002" <sip:1002@194.190.8.171>;tag=134783744
To: "1002" <sip:1002@194.190.8.171>
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK0624.82ac15efd62f203c1b009e3ab3c711bc.0
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bKf4d831e0612e1074bf49397d92907c80353236;rport=57288
Max-Forwards: 16
User-Agent: SIPAUA/0.1.001
Contact: "1002" <sip:1002@192.168.1.103:57288;transport=udp>
Expires: 3600
Authorization: Digest
username="1002",realm="asterisk",nonce="26886c3d",uri="sip:
194.190.8.171:5060
",response="cc17aae74d45f06e4712aa66b08e68df",algorithm=MD5
Content-Length: 0
19:54:51.374893 IP (tos 0x0, ttl 64, id 5626, offset 0, flags [none], proto
UDP (17), length 597)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569
OPTIONS sip:1002@192.168.1.103:57288;transport=udp SIP/2.0
Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK129c83a7;rport
Max-Forwards: 70
From: "asterisk" <sip:asterisk@50.0.0.10>;tag=as40306b56
To: <sip:1002@192.168.1.103:57288;transport=udp>
Contact: <sip:asterisk@50.0.0.10:5060>
Call-ID: 0e6d3cec7afd68275843c14303988ff3@50.0.0.10:5060
CSeq: 102 OPTIONS
User-Agent: Asterisk PBX 1.8.20.0
Date: Mon, 03 Feb 2014 15:54:51 GMT
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
Content-Length: 0
19:54:51.374906 IP (tos 0x0, ttl 64, id 5627, offset 0, flags [none], proto
UDP (17), length 746)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 718
SIP/2.0 200 OK
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK0624.82ac15efd62f203c1b009e3ab3c711bc.0;received=50.0.0.1;rport=5060
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bKf4d831e0612e1074bf49397d92907c80353236;rport=57288
From: "1002" <sip:1002@194.190.8.171>;tag=134783744
To: "1002" <sip:1002@194.190.8.171>;tag=as065abeba
Call-ID: fffb7a09e489ce1cad6783709652b6f9(a)192.168.1.103
CSeq: 2406 REGISTER
Server: Asterisk PBX 1.8.20.0
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
Expires: 3600
Contact: <sip:1002@192.168.1.103:57288;transport=udp>;expires=3600
Date: Mon, 03 Feb 2014 15:54:51 GMT
Content-Length: 0
19:54:52.375165 IP (tos 0x0, ttl 64, id 5628, offset 0, flags [none], proto
UDP (17), length 597)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569
OPTIONS sip:1002@192.168.1.103:57288;transport=udp SIP/2.0
Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK129c83a7;rport
Max-Forwards: 70
From: "asterisk" <sip:asterisk@50.0.0.10>;tag=as40306b56
To: <sip:1002@192.168.1.103:57288;transport=udp>
Contact: <sip:asterisk@50.0.0.10:5060>
Call-ID: 0e6d3cec7afd68275843c14303988ff3@50.0.0.10:5060
CSeq: 102 OPTIONS
User-Agent: Asterisk PBX 1.8.20.0
Date: Mon, 03 Feb 2014 15:54:51 GMT
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
Content-Length: 0
19:54:53.375333 IP (tos 0x0, ttl 64, id 5629, offset 0, flags [none], proto
UDP (17), length 597)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569
OPTIONS sip:1002@192.168.1.103:57288;transport=udp SIP/2.0
Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK129c83a7;rport
Max-Forwards: 70
From: "asterisk" <sip:asterisk@50.0.0.10>;tag=as40306b56
To: <sip:1002@192.168.1.103:57288;transport=udp>
Contact: <sip:asterisk@50.0.0.10:5060>
Call-ID: 0e6d3cec7afd68275843c14303988ff3@50.0.0.10:5060
CSeq: 102 OPTIONS
User-Agent: Asterisk PBX 1.8.20.0
Date: Mon, 03 Feb 2014 15:54:51 GMT
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
Content-Length: 0
19:54:54.342025 IP (tos 0x10, ttl 64, id 34750, offset 0, flags [none],
proto UDP (17), length 413)
50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 385
SIP/2.0 408 Request Timeout
Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK129c83a7;rport=5060
From: "asterisk" <sip:asterisk@50.0.0.10>;tag=as40306b56
To: <sip:1002@192.168.1.103:57288
;transport=udp>;tag=6f6209fafb0c4bc816e1e7aa854ee2dd-1f6e
Call-ID: 0e6d3cec7afd68275843c14303988ff3@50.0.0.10:5060
CSeq: 102 OPTIONS
Server: kamailio (4.1.1 (x86_64/linux))
Content-Length: 0
3. on asterisk to kamailio
[root@astkamaz sm1ly]# tcpdump -nn -i eth0 -v host 50.0.0.1 and port 5060
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 65535
bytes
19:54:41.906401 IP (tos 0x0, ttl 64, id 5618, offset 0, flags [none], proto
UDP (17), length 597)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569
OPTIONS sip:1002@192.168.1.103:34713;transport=udp SIP/2.0
Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK75f42160;rport
Max-Forwards: 70
From: "asterisk" <sip:asterisk@50.0.0.10>;tag=as40fc69ea
To: <sip:1002@192.168.1.103:34713;transport=udp>
Contact: <sip:asterisk@50.0.0.10:5060>
Call-ID: 7bacfa62676409266240568c5c9d055b@50.0.0.10:5060
CSeq: 102 OPTIONS
User-Agent: Asterisk PBX 1.8.20.0
Date: Mon, 03 Feb 2014 15:54:41 GMT
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
Content-Length: 0
19:54:42.906581 IP (tos 0x0, ttl 64, id 5619, offset 0, flags [none], proto
UDP (17), length 597)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569
OPTIONS sip:1002@192.168.1.103:34713;transport=udp SIP/2.0
Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK75f42160;rport
Max-Forwards: 70
From: "asterisk" <sip:asterisk@50.0.0.10>;tag=as40fc69ea
To: <sip:1002@192.168.1.103:34713;transport=udp>
Contact: <sip:asterisk@50.0.0.10:5060>
Call-ID: 7bacfa62676409266240568c5c9d055b@50.0.0.10:5060
CSeq: 102 OPTIONS
User-Agent: Asterisk PBX 1.8.20.0
Date: Mon, 03 Feb 2014 15:54:41 GMT
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
Content-Length: 0
19:54:43.906740 IP (tos 0x0, ttl 64, id 5620, offset 0, flags [none], proto
UDP (17), length 597)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569
OPTIONS sip:1002@192.168.1.103:34713;transport=udp SIP/2.0
Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK75f42160;rport
Max-Forwards: 70
From: "asterisk" <sip:asterisk@50.0.0.10>;tag=as40fc69ea
To: <sip:1002@192.168.1.103:34713;transport=udp>
Contact: <sip:asterisk@50.0.0.10:5060>
Call-ID: 7bacfa62676409266240568c5c9d055b@50.0.0.10:5060
CSeq: 102 OPTIONS
User-Agent: Asterisk PBX 1.8.20.0
Date: Mon, 03 Feb 2014 15:54:41 GMT
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
Content-Length: 0
19:54:44.905366 IP (tos 0x10, ttl 64, id 34743, offset 0, flags [none],
proto UDP (17), length 413)
50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 385
SIP/2.0 408 Request Timeout
Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK75f42160;rport=5060
From: "asterisk" <sip:asterisk@50.0.0.10>;tag=as40fc69ea
To: <sip:1002@192.168.1.103:34713
;transport=udp>;tag=6f6209fafb0c4bc816e1e7aa854ee2dd-8578
Call-ID: 7bacfa62676409266240568c5c9d055b@50.0.0.10:5060
CSeq: 102 OPTIONS
Server: kamailio (4.1.1 (x86_64/linux))
Content-Length: 0
19:54:51.208464 IP (tos 0x10, ttl 64, id 34744, offset 0, flags [none],
proto UDP (17), length 531)
50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 503
REGISTER sip:194.190.8.171 SIP/2.0
Call-ID: 676c32ab221a665a9bc9875ffb74930a(a)192.168.1.103
CSeq: 5569 REGISTER
From: "1002" <sip:1002@194.190.8.171>;tag=2801080754
To: "1002" <sip:1002@194.190.8.171>
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bKd8a1.094de0504827adb22c7b874f77dfd698.0
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bKe5bd1a6ceba7f0a0f4e7487cb17ca365353236;rport=57288
Max-Forwards: 16
User-Agent: SIPAUA/0.1.001
Contact: *
Expires: 0
Content-Length: 0
19:54:51.209176 IP (tos 0x0, ttl 64, id 5621, offset 0, flags [none], proto
UDP (17), length 713)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 685
SIP/2.0 401 Unauthorized
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bKd8a1.094de0504827adb22c7b874f77dfd698.0;received=50.0.0.1;rport=5060
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bKe5bd1a6ceba7f0a0f4e7487cb17ca365353236;rport=57288
From: "1002" <sip:1002@194.190.8.171>;tag=2801080754
To: "1002" <sip:1002@194.190.8.171>;tag=as518dbea9
Call-ID: 676c32ab221a665a9bc9875ffb74930a(a)192.168.1.103
CSeq: 5569 REGISTER
Server: Asterisk PBX 1.8.20.0
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
WWW-Authenticate: Digest algorithm=MD5, realm="asterisk",
nonce="31daf0f8"
Content-Length: 0
19:54:51.259436 IP (tos 0x10, ttl 64, id 34745, offset 0, flags [none],
proto UDP (17), length 696)
50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 668
REGISTER sip:194.190.8.171:5060 SIP/2.0
Call-ID: 676c32ab221a665a9bc9875ffb74930a(a)192.168.1.103
CSeq: 5570 REGISTER
From: "1002" <sip:1002@194.190.8.171>;tag=2801080754
To: "1002" <sip:1002@194.190.8.171>
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK56b1.d46d0ab6448c5edd99f24aa7ba8a2881.0
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bK440337c23337c9913220fd825f4d9ded353236;rport=57288
Max-Forwards: 16
User-Agent: SIPAUA/0.1.001
Contact: *
Expires: 0
Authorization: Digest
username="1002",realm="asterisk",nonce="31daf0f8",uri="sip:
194.190.8.171:5060
",response="2b0222b07da7af1c3b72c2eb36241f5f",algorithm=MD5
Content-Length: 0
19:54:51.260101 IP (tos 0x0, ttl 64, id 5622, offset 0, flags [none], proto
UDP (17), length 713)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 685
SIP/2.0 401 Unauthorized
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK56b1.d46d0ab6448c5edd99f24aa7ba8a2881.0;received=50.0.0.1;rport=5060
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bK440337c23337c9913220fd825f4d9ded353236;rport=57288
From: "1002" <sip:1002@194.190.8.171>;tag=2801080754
To: "1002" <sip:1002@194.190.8.171>;tag=as0716dea5
Call-ID: 676c32ab221a665a9bc9875ffb74930a(a)192.168.1.103
CSeq: 5570 REGISTER
Server: Asterisk PBX 1.8.20.0
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
WWW-Authenticate: Digest algorithm=MD5, realm="asterisk",
nonce="2f70c759"
Content-Length: 0
19:54:51.292708 IP (tos 0x10, ttl 64, id 34746, offset 0, flags [none],
proto UDP (17), length 696)
50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 668
REGISTER sip:194.190.8.171:5060 SIP/2.0
Call-ID: 676c32ab221a665a9bc9875ffb74930a(a)192.168.1.103
CSeq: 5571 REGISTER
From: "1002" <sip:1002@194.190.8.171>;tag=2801080754
To: "1002" <sip:1002@194.190.8.171>
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK66b1.0173e2524e6deda0f27b83591a62730f.0
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bK30fe030eee49e2eb50c619074c0f057b353236;rport=57288
Max-Forwards: 16
User-Agent: SIPAUA/0.1.001
Contact: *
Expires: 0
Authorization: Digest
username="1002",realm="asterisk",nonce="2f70c759",uri="sip:
194.190.8.171:5060
",response="9eb7d157cfd0d8e8575b59c94c5f82f6",algorithm=MD5
Content-Length: 0
19:54:51.293541 IP (tos 0x0, ttl 64, id 5623, offset 0, flags [none], proto
UDP (17), length 676)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 648
SIP/2.0 200 OK
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK66b1.0173e2524e6deda0f27b83591a62730f.0;received=50.0.0.1;rport=5060
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bK30fe030eee49e2eb50c619074c0f057b353236;rport=57288
From: "1002" <sip:1002@194.190.8.171>;tag=2801080754
To: "1002" <sip:1002@194.190.8.171>;tag=as0716dea5
Call-ID: 676c32ab221a665a9bc9875ffb74930a(a)192.168.1.103
CSeq: 5571 REGISTER
Server: Asterisk PBX 1.8.20.0
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
Expires: 0
Date: Mon, 03 Feb 2014 15:54:51 GMT
Content-Length: 0
19:54:51.317704 IP (tos 0x10, ttl 64, id 34747, offset 0, flags [none],
proto UDP (17), length 583)
50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 555
REGISTER sip:194.190.8.171 SIP/2.0
Call-ID: fffb7a09e489ce1cad6783709652b6f9(a)192.168.1.103
CSeq: 2404 REGISTER
From: "1002" <sip:1002@194.190.8.171>;tag=134783744
To: "1002" <sip:1002@194.190.8.171>
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK2624.44980ae0ad3ba5026d6f044c24770539.0
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bKdeb946998664720c2c93538625cc649e353236;rport=57288
Max-Forwards: 16
User-Agent: SIPAUA/0.1.001
Contact: "1002" <sip:1002@192.168.1.103:57288;transport=udp>
Expires: 3600
Content-Length: 0
19:54:51.318355 IP (tos 0x0, ttl 64, id 5624, offset 0, flags [none], proto
UDP (17), length 712)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 684
SIP/2.0 401 Unauthorized
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK2624.44980ae0ad3ba5026d6f044c24770539.0;received=50.0.0.1;rport=5060
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bKdeb946998664720c2c93538625cc649e353236;rport=57288
From: "1002" <sip:1002@194.190.8.171>;tag=134783744
To: "1002" <sip:1002@194.190.8.171>;tag=as0bba2324
Call-ID: fffb7a09e489ce1cad6783709652b6f9(a)192.168.1.103
CSeq: 2404 REGISTER
Server: Asterisk PBX 1.8.20.0
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
WWW-Authenticate: Digest algorithm=MD5, realm="asterisk",
nonce="023deb34"
Content-Length: 0
19:54:51.347429 IP (tos 0x10, ttl 64, id 34748, offset 0, flags [none],
proto UDP (17), length 748)
50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 720
REGISTER sip:194.190.8.171:5060 SIP/2.0
Call-ID: fffb7a09e489ce1cad6783709652b6f9(a)192.168.1.103
CSeq: 2405 REGISTER
From: "1002" <sip:1002@194.190.8.171>;tag=134783744
To: "1002" <sip:1002@194.190.8.171>
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK3624.173cef757dc8f7da8b864ee1ab1bfe50.0
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bK60a6798f72024444a9870698b766a04c353236;rport=57288
Max-Forwards: 16
User-Agent: SIPAUA/0.1.001
Contact: "1002" <sip:1002@192.168.1.103:57288;transport=udp>
Expires: 3600
Authorization: Digest
username="1002",realm="asterisk",nonce="023deb34",uri="sip:
194.190.8.171:5060
",response="7fa5be98c7c0c395ed41f9e7da095629",algorithm=MD5
Content-Length: 0
19:54:51.348212 IP (tos 0x0, ttl 64, id 5625, offset 0, flags [none], proto
UDP (17), length 712)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 684
SIP/2.0 401 Unauthorized
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK3624.173cef757dc8f7da8b864ee1ab1bfe50.0;received=50.0.0.1;rport=5060
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bK60a6798f72024444a9870698b766a04c353236;rport=57288
From: "1002" <sip:1002@194.190.8.171>;tag=134783744
To: "1002" <sip:1002@194.190.8.171>;tag=as065abeba
Call-ID: fffb7a09e489ce1cad6783709652b6f9(a)192.168.1.103
CSeq: 2405 REGISTER
Server: Asterisk PBX 1.8.20.0
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
WWW-Authenticate: Digest algorithm=MD5, realm="asterisk",
nonce="26886c3d"
Content-Length: 0
19:54:51.373777 IP (tos 0x10, ttl 64, id 34749, offset 0, flags [none],
proto UDP (17), length 748)
50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 720
REGISTER sip:194.190.8.171:5060 SIP/2.0
Call-ID: fffb7a09e489ce1cad6783709652b6f9(a)192.168.1.103
CSeq: 2406 REGISTER
From: "1002" <sip:1002@194.190.8.171>;tag=134783744
To: "1002" <sip:1002@194.190.8.171>
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK0624.82ac15efd62f203c1b009e3ab3c711bc.0
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bKf4d831e0612e1074bf49397d92907c80353236;rport=57288
Max-Forwards: 16
User-Agent: SIPAUA/0.1.001
Contact: "1002" <sip:1002@192.168.1.103:57288;transport=udp>
Expires: 3600
Authorization: Digest
username="1002",realm="asterisk",nonce="26886c3d",uri="sip:
194.190.8.171:5060
",response="cc17aae74d45f06e4712aa66b08e68df",algorithm=MD5
Content-Length: 0
19:54:51.374731 IP (tos 0x0, ttl 64, id 5626, offset 0, flags [none], proto
UDP (17), length 597)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569
OPTIONS sip:1002@192.168.1.103:57288;transport=udp SIP/2.0
Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK129c83a7;rport
Max-Forwards: 70
From: "asterisk" <sip:asterisk@50.0.0.10>;tag=as40306b56
To: <sip:1002@192.168.1.103:57288;transport=udp>
Contact: <sip:asterisk@50.0.0.10:5060>
Call-ID: 0e6d3cec7afd68275843c14303988ff3@50.0.0.10:5060
CSeq: 102 OPTIONS
User-Agent: Asterisk PBX 1.8.20.0
Date: Mon, 03 Feb 2014 15:54:51 GMT
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
Content-Length: 0
19:54:51.374804 IP (tos 0x0, ttl 64, id 5627, offset 0, flags [none], proto
UDP (17), length 746)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 718
SIP/2.0 200 OK
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK0624.82ac15efd62f203c1b009e3ab3c711bc.0;received=50.0.0.1;rport=5060
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bKf4d831e0612e1074bf49397d92907c80353236;rport=57288
From: "1002" <sip:1002@194.190.8.171>;tag=134783744
To: "1002" <sip:1002@194.190.8.171>;tag=as065abeba
Call-ID: fffb7a09e489ce1cad6783709652b6f9(a)192.168.1.103
CSeq: 2406 REGISTER
Server: Asterisk PBX 1.8.20.0
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
Expires: 3600
Contact: <sip:1002@192.168.1.103:57288;transport=udp>;expires=3600
Date: Mon, 03 Feb 2014 15:54:51 GMT
Content-Length: 0
19:54:52.375348 IP (tos 0x0, ttl 64, id 5628, offset 0, flags [none], proto
UDP (17), length 597)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569
OPTIONS sip:1002@192.168.1.103:57288;transport=udp SIP/2.0
Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK129c83a7;rport
Max-Forwards: 70
From: "asterisk" <sip:asterisk@50.0.0.10>;tag=as40306b56
To: <sip:1002@192.168.1.103:57288;transport=udp>
Contact: <sip:asterisk@50.0.0.10:5060>
Call-ID: 0e6d3cec7afd68275843c14303988ff3@50.0.0.10:5060
CSeq: 102 OPTIONS
User-Agent: Asterisk PBX 1.8.20.0
Date: Mon, 03 Feb 2014 15:54:51 GMT
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
Content-Length: 0
19:54:53.375562 IP (tos 0x0, ttl 64, id 5629, offset 0, flags [none], proto
UDP (17), length 597)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569
OPTIONS sip:1002@192.168.1.103:57288;transport=udp SIP/2.0
Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK129c83a7;rport
Max-Forwards: 70
From: "asterisk" <sip:asterisk@50.0.0.10>;tag=as40306b56
To: <sip:1002@192.168.1.103:57288;transport=udp>
Contact: <sip:asterisk@50.0.0.10:5060>
Call-ID: 0e6d3cec7afd68275843c14303988ff3@50.0.0.10:5060
CSeq: 102 OPTIONS
User-Agent: Asterisk PBX 1.8.20.0
Date: Mon, 03 Feb 2014 15:54:51 GMT
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
Content-Length: 0
19:54:54.342525 IP (tos 0x10, ttl 64, id 34750, offset 0, flags [none],
proto UDP (17), length 413)
50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 385
SIP/2.0 408 Request Timeout
Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK129c83a7;rport=5060
From: "asterisk" <sip:asterisk@50.0.0.10>;tag=as40306b56
To: <sip:1002@192.168.1.103:57288
;transport=udp>;tag=6f6209fafb0c4bc816e1e7aa854ee2dd-1f6e
Call-ID: 0e6d3cec7afd68275843c14303988ff3@50.0.0.10:5060
CSeq: 102 OPTIONS
Server: kamailio (4.1.1 (x86_64/linux))
Content-Length: 0
####### Defined Values #########
# - flags
# FLT_ - per transaction (message) flags
# FLB_ - per branch flags
#!define FLT_ACC 1
#!define FLT_ACCMISSED 2
#!define FLT_ACCFAILED 3
#!define FLT_NATS 5
#!define FLB_NATB 6
#!define FLB_NATSIPPING 7
####### Global Parameters #########
# Enable debugging only when kamailio is mading boo-boo
### LOG Levels: 3=DBG, 2=INFO, 1=NOTICE, 0=WARN, -1=ERR
debug=3
log_stderror=no
memdbg=5
memlog=5
log_facility=LOG_LOCAL0
fork=yes
children=8
/* uncomment the next line to disable TCP (default on) */
disable_tcp=yes
/* uncomment the next line to disable the auto discovery of local aliases
based on reverse DNS on IPs (default on) */
auto_aliases=no
/* add local domain aliases */
#alias="kamaz.ikatele.com"
/* uncomment and configure the following line if you want Kamailio to
bind on a specific interface/port/proto (default bind on all available) */
#listen=udp:50.0.0.1:5060 advertise 194.190.8.171:5060
#listen=udp:194.190.8.171:5060 advertise 50.0.0.1:5060
listen=udp:194.190.8.171
listen=udp:50.0.0.1
dns=no
rev_dns=no
check_via=yes
/* port to listen to
* - can be specified more than once if needed to listen on many ports */
port=5060
mhomed=1
####### Modules Section ########
# set paths to location of modules (to sources or installation folders)
mpath="/usr/lib64/kamailio/modules/"
loadmodule "mi_fifo.so"
loadmodule "kex.so"
loadmodule "tm.so"
loadmodule "tmx.so"
loadmodule "sl.so"
loadmodule "rr.so"
loadmodule "pv.so"
loadmodule "maxfwd.so"
loadmodule "usrloc.so"
loadmodule "registrar.so"
loadmodule "textops.so"
loadmodule "siputils.so"
loadmodule "xlog.so"
loadmodule "sanity.so"
loadmodule "ctl.so"
loadmodule "cfg_rpc.so"
loadmodule "mi_rpc.so"
loadmodule "acc.so"
loadmodule "nathelper.so"
loadmodule "rtpproxy.so"
#loadmodule "topoh.so"
#modparam("topoh", "mask_key", "balalayka")
#modparam("topoh", "mask_ip", "50.0.0.1")
# ----------------- setting module-specific parameters ---------------
# ----- mi_fifo params -----
modparam("mi_fifo", "fifo_name", "/tmp/kamailio_fifo")
# ----- tm params -----
# auto-discard branches from previous serial forking leg
modparam("tm", "failure_reply_mode", 3)
# default retransmission timeout: 30sec
modparam("tm", "fr_timer", 3000)
# default invite retransmission timeout after 1xx: 120sec
modparam("tm", "fr_inv_timer", 12000)
# ----- rr params -----
# add value to ;lr param to cope with most of the UAs
modparam("rr", "enable_full_lr", 1)
# do not append from tag to the RR (no need for this script)
modparam("rr", "append_fromtag", 1)
# ----- rtpproxy params -----
modparam("rtpproxy", "rtpproxy_sock", "udp:127.0.0.1:7722")
# ----- nathelper params -----
modparam("nathelper", "natping_interval", 30)
modparam("nathelper", "ping_nated_only", 1)
modparam("nathelper", "sipping_bflag", FLB_NATSIPPING)
modparam("nathelper", "sipping_from",
"sip:pinger@194.190.8.171")
# params needed for NAT traversal in other modules
modparam("nathelper", "received_avp", "$avp(RECEIVED)")
modparam("usrloc", "nat_bflag", FLB_NATB)
####### Routing Logic ########
# Main SIP request routing logic
# - processing of any incoming SIP request starts with this route
# - note: this is the same as route { ... }
route {
# per request initial checks
route(REQINIT);
# NAT detection
xlog("L_NOTICE","$rm from $fu (IP:$si:$sp) Main Route before
---NAT---\n");
route(NATDETECT);
xlog("L_NOTICE","$rm from $fu (IP:$si:$sp) in Route[NATDETECT]
fix_nat-register\n");
# CANCEL processing
if (is_method("CANCEL"))
{
if (t_check_trans()) {
route(RELAY);
}
exit;
}
# handle requests within SIP dialogs
route(WITHINDLG);
### only initial requests (no To tag)
t_check_trans();
# record routing for dialog forming requests (in case they are routed)
# - remove preloaded route headers
remove_hf("Route");
if (is_method("INVITE|SUBSCRIBE"))
record_route();
# account only INVITEs
if (is_method("INVITE"))
{
setflag(FLT_ACC); # do accounting
}
# dispatch requests to foreign domains
route(SIPOUT);
# handle registrations
route(REGISTRAR);
if ($rU==$null)
{
# request with no Username in RURI
sl_send_reply("484","Address Incomplete");
exit;
}
route(RELAY);
}
# Per SIP request initial checks
route[REQINIT] {
if (!mf_process_maxfwd_header("20")) {
xlog("L_NOTICE","$rm from $fu (IP:$si:$sp) in MAX FDW HEADERS
ALARMO\n");
sl_send_reply("483","Too Many Hops");
exit;
}
if(!sanity_check("1511", "7"))
{
xlog("Malformed SIP message from $si:$sp\n");
exit;
}
}
# Caller NAT detection route
route[NATDETECT] {
force_rport();
if (nat_uac_test("19")) {
if (is_method("REGISTER")) {
fix_nated_register();
} else {
if(is_first_hop())
set_contact_alias();
}
setflag(FLT_NATS);
}
return;
}
# Handle requests within SIP dialogs
route[WITHINDLG] {
if (has_totag()) {
# sequential request withing a dialog should
# take the path determined by record-routing
if (loose_route()) {
route(DLGURI);
if (is_method("BYE")) {
setflag(FLT_ACC); # do accounting ...
setflag(FLT_ACCFAILED); # ... even if the transaction fails
}
else if ( is_method("ACK") ) {
# ACK is forwarded statelessy
route(NATMANAGE);
}
else if ( is_method("NOTIFY") ) {
# Add Record-Route for in-dialog NOTIFY as per RFC 6665.
record_route();
}
route(RELAY);
} else {
if ( is_method("ACK") ) {
if ( t_check_trans() ) {
# no loose-route, but stateful ACK;
# must be an ACK after a 487
# or e.g. 404 from upstream server
route(RELAY);
exit;
} else {
xlog("L_NOTICE","ACK without matching transaction ... ignore and
discard\n");
# ACK without matching transaction ... ignore and discard
exit;
}
}
sl_send_reply("404","Not here");
}
exit;
}
}
# Routing to foreign domains
route[SIPOUT] {
if (!uri==myself)
{
append_hf("P-hint: outbound\r\n");
route(RELAY);
}
}
# Handle SIP registrations
route[REGISTRAR] {
if (is_method("REGISTER"))
{
# if(isflagset(FLT_NATS))
# {
# setbflag(FLB_NATB);
# # uncomment next line to do SIP NAT pinging
# xlog("L_NOTICE","--------------------- SIP NAT PINGING
--------------------------------------\n");
# setbflag(FLB_NATSIPPING);
# }
# if (!save("location"))
# sl_reply_error();
# xlog("L_NOTICE","--------------------- SL REPLY ERROR
--------------------------------------\n");
if( t_check_trans() )
{
xlog("L_NOTICE","Transaction already exist, forwarding\n");
}
else
{
xlog("L_NOTICE","New transaction upcoming, creating\n");
# forward("50.0.0.10");
# save("sip:50.0.0.10","0x02");
t_relay_to_udp("50.0.0.10", "5060");
exit;
}
exit;
}
}
route[RELAY] {
# enable additional event routes for forwarded requests
# - serial forking, RTP relaying handling, a.s.o.
xlog("L_NOTICE","Default routing block raised!\n");
if (is_method("INVITE|BYE|SUBSCRIBE|UPDATE")) {
if(!t_is_set("branch_route")) t_on_branch("MANAGE_BRANCH");
}
if (is_method("INVITE|SUBSCRIBE|UPDATE")) {
if(!t_is_set("onreply_route")) t_on_reply("MANAGE_REPLY");
}
if (is_method("INVITE")) {
if(!t_is_set("failure_route")) t_on_failure("MANAGE_FAILURE");
}
if (!t_relay()) {
sl_reply_error();
}
exit;
}
# RTPProxy control
route[NATMANAGE] {
if (is_request()) {
if(has_totag()) {
if(check_route_param("nat=yes")) {
xlog("L_NOTICE","------------------------------------ SETBFLAG
----------------------------\n");
setbflag(FLB_NATB);
}
}
}
if (!(isflagset(FLT_NATS) || isbflagset(FLB_NATB)))
return;
rtpproxy_manage();
if (is_request()) {
if (!has_totag()) {
if(t_is_branch_route()) {
xlog("L_NOTICE","------------------------------------ ADD RR PARAM
NAT YES ----------------------------\n");
add_rr_param(";nat=yes");
}
}
}
if (is_reply()) {
if(isbflagset(FLB_NATB)) {
if(is_first_hop())
xlog("L_NOTICE","------------------------------------ IS FIRST HOP
SRT CONACT ALIAS ----------------------------\n");
set_contact_alias();
}
xlog("L_NOTICE","$rm from $fu (IP:$si:$sp) in route[NATMANAGE]
RTPproxy with EI Flags\n");
}
return;
}
# URI update for dialog requests
route[DLGURI] {
if(!isdsturiset()) {
handle_ruri_alias();
xlog("L_NOTICE","$rm from $fu (IP:$si:$sp) in route[DLGURI] RTPproxy
with EI Flags\n");
}
return;
}
# manage outgoing branches
branch_route[MANAGE_BRANCH] {
xlog("L_NOTICE","$rm from $fu (IP:$si:$sp) in MANAGE_BRANCH\n");
xdbg("new branch [$T_branch_idx] to $ru\n");
route(NATMANAGE);
}
# manage incoming replies
onreply_route[MANAGE_REPLY] {
xlog("L_NOTICE","$rm from $fu (IP:$si:$sp) in MANAGE_REPLY\n");
xdbg("incoming reply\n");
if(status=~"[12][0-9][0-9]")
route(NATMANAGE);
}
# manage failure routing cases
failure_route[MANAGE_FAILURE] {
xlog("L_NOTICE","$rm from $fu (IP:$si:$sp) in MANAGE_FAILURE\n");
route(NATMANAGE);
if (t_is_canceled()) {
exit;
}
}
route[DEBUG] {
if (method==("PUBLISH|SUBSCRIBE|REGISTER|OPTIONS")) {
return;
}
xlog("[$mi] Received SIP Message (method: $rm) ($ml bytes) to
$Ri:$Rp from $si:$sp:\n$mb\n");
}
----------------------------------------------------------------------
Message: 1
Date: Mon, 3 Feb 2014 15:14:19 +0400
From: "*sm1Ly" <st.uzver(a)gmail.com>
To: dipak.biswas(a)mezocliq.com, sr-users(a)lists.sip-router.org
Subject: Re: [SR-Users] Kamailio not mdifying Contact in multi-homed
setup
Message-ID:
<
CABCivXiED_CDQiJtgQ-p_XQ1h8p3rbkE3fnxnS2iuUH+kdHZvA(a)mail.gmail.com>
Content-Type: text/plain; charset="iso-8859-1"
hello, I got the same issue. my sip device getting ok from kamailio, but
asterisk reply 401.
but.
this is my config:
http://pastebin.com/jGCak01E
and I changed regfwd route to
$du = "sip:50.0.0.10:5060;transport=udp";
forward();
and now I see this in logs:
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[parser/msg_parser.c:633]: parse_msg(): SIP Reply (status):
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[parser/msg_parser.c:635]: parse_msg(): version: <SIP/2.0>
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[parser/msg_parser.c:637]: parse_msg(): status: <200>
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[parser/msg_parser.c:639]: parse_msg(): reason: <OK>
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[parser/parse_via.c:1284]: parse_via_param(): Found param type 232,
<branch> = <0>; state=16
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[parser/parse_via.c:2672]: parse_via(): end of header reached, state=5
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[parser/msg_parser.c:513]: parse_headers(): parse_headers: Via found,
flags=2
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[parser/msg_parser.c:515]: parse_headers(): parse_headers: this is the
first via
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[receive.c:152]: receive_msg(): After parse_msg...
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: tm
[t_lookup.c:1071]: t_check_msg(): DEBUG: t_check_msg: msg id=25 global
id=24 T start=(nil)
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[parser/parse_addr_spec.c:176]: parse_to_param(): DEBUG: add_param:
tag=006cfccc318be31188fc19977b3a5651
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[parser/parse_addr_spec.c:885]: parse_addr_spec(): end of header reached,
state=29
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[parser/msg_parser.c:190]: get_hdr_field(): DEBUG: get_hdr_field: <To>
[63]; uri=[sip:77.37.241.151:5060]
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[parser/msg_parser.c:192]: get_hdr_field(): DEBUG: to body [<sip:
77.37.241.151:5060>]
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[parser/msg_parser.c:170]: get_hdr_field(): get_hdr_field: cseq <CSeq>: <1>
<OPTIONS>
*Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: tm
[t_lookup.c:1045]: t_reply_matching(): DEBUG: t_reply_matching: failure to
match a transaction*
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: tm
[t_lookup.c:1140]: t_check_msg(): DEBUG: t_check_msg: msg id=25 global
id=25 T end=(nil)
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[parser/msg_parser.c:204]: get_hdr_field(): DEBUG: get_hdr_body :
content_length=0
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[parser/msg_parser.c:106]: get_hdr_field(): found end of header
*Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[forward.c:784]: do_forward_reply(): reply cannot be forwarded - no 2nd
via*
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[usr_avp.c:644]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
list (nil)
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[usr_avp.c:644]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
list (nil)
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[usr_avp.c:644]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
list (nil)
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[usr_avp.c:644]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
list (nil)
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[usr_avp.c:644]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
list (nil)
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[usr_avp.c:644]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
list (nil)
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[xavp.c:448]: xavp_destroy_list(): destroying xavp list (nil)
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[receive.c:296]: receive_msg(): receive_msg: cleaning up
any ideas?
and show me ur conf please.
--
Hi All,
I'm running into an issue, I'm not sure whether any of you seen this
yourselves and resolved it. Please share some pointers. My network is:
clients <--> Public IP(Kamailio/RTPProxy)10.1.128.11 <--> 10.1.128.34
(Freeswitch)
The 200 OK response from Freeswitch (on the way back from called party to
caller) to Kamailio is shown below. Notice the Contact header URI host part
contains Freeswitch Private IP (10.1.128.34). Kamailio suppose to change
that to Public IP before forwarding the 200 OK (copied below) to Caller in
public domain. But, it's not. As a result, ACK from Caller is not reaching
back to Kamailio.
How did you or anybody out there using Kamailio resolve this problem? If
needed, I can copy/paste my kamailio.cfg.
--
yours respectfully, Alexander Vasin.
8 926 1437200
icq: 9906064