2(4983) SIP Request: 2(4983) method: 2(4983) uri: 2(4983) version: 2(4983) parse_headers: flags=2 2(4983) Found param type 232, = ; state=6 2(4983) Found param type 235, = ; state=17 2(4983) end of header reached, state=5 2(4983) parse_headers: Via found, flags=2 2(4983) parse_headers: this is the first via 2(4983) After parse_msg... 2(4983) preparing to run routing scripts... U 172.19.172.176:6282 -> 172.19.172.101:5070 INVITE sip:85218852323@172.19.172.101:5070 SIP/2.0..Via: SIP/2.0/UDP 172.19.172.176:6282;bra nch=z9hG4bK-d87543-c56e432e507dae7b-1--d87543-;rport..Max-Forwards: 70..Contact: ..To: "85218852323"..From: "laobai"< sip:1234@172.19.172.101:5070>;tag=9304d52e..Call-ID: f811990b5d78f64fYmQxNjQ4NDA1OTU1ZDgwYj g0ZTNmYjEzNjY2NWU5MGY...CSeq: 1 INVITE..Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NO TIFY, MESSAGE, SUBSCRIBE, INFO..Content-Type: application/sdp..User-Agent: eyeBeam release 1003s stamp 31159..Content-Length: 373....v=0..o=- 8 2 IN IP4 172.19.172.176..s=CounterPath eyeBeam 1.5..c=IN IP4 172.19.172.176..t=0 0..m=audio 2832 RTP/AVP 100 0 98 18 3 101..a=alt :1 1 : TelAZjze X+a2ix9b 172.19.172.176 2832..a=fmtp:18 annexb=no..a=fmtp:101 0-15..a=rtpma p:100 SPEEX/16000..a=rtpmap:98 iLBC/8000..a=rtpmap:101 telephone-event/8000..a=sendrecv..a= x-rtp-session-id:FE93311FD48C4326A0A992AC4F360A1F.. 2(4983) parse_headers: flags=100 2(4983) DEBUG:maxfwd:is_maxfwd_present: value = 70 2(4983) Method: INVITE 2(4983) parse_headers: flags=10 2(4983) DEBUG:parse_to:end of header reached, state=10 2(4983) DBUG:parse_to: display={"85218852323"}, ruri={sip:85218852323@172.19.172.101:5070} 2(4983) DEBUG: get_hdr_field: [50]; uri=[sip:85218852323@172.19.172.101:5070] 2(4983) DEBUG: to body ["85218852323" ] 2(4983) DEBUG: add_param: tag=9304d52e 2(4983) DEBUG:parse_to:end of header reached, state=29 2(4983) DBUG:parse_to: display={"laobai"}, ruri={sip:1234@172.19.172.101:5070} 2(4983) parse_headers: flags=200 2(4983) get_hdr_field: cseq : <1> 2(4983) DEBUG: get_hdr_body : content_length=373 2(4983) found end of header 2(4983) find_first_route: No Route headers found 2(4983) loose_route: There is no Route HF 2(4983) grep_sock_info - checking if host==us: 14==9 && [172.19.172.101] == [127.0.0.1] 2(4983) grep_sock_info - checking if port 5070 matches port 5070 2(4983) grep_sock_info - checking if host==us: 14==14 && [172.19.172.101] == [172.19.172.101] 2(4983) grep_sock_info - checking if port 5070 matches port 5070 2(4983) lookup(): '85218852323' Not found in usrloc 2(4983) grep_sock_info - checking if host==us: 14==9 && [172.19.172.101] == [127.0.0.1] 2(4983) grep_sock_info - checking if port 5070 matches port 5070 2(4983) grep_sock_info - checking if host==us: 14==14 && [172.19.172.101] == [172.19.172.101] 2(4983) grep_sock_info - checking if port 5070 matches port 5070 2(4983) grep_sock_info - checking if host==us: 14==9 && [172.19.172.101] == [127.0.0.1] 2(4983) grep_sock_info - checking if port 5070 matches port 5070 2(4983) grep_sock_info - checking if host==us: 14==14 && [172.19.172.101] == [172.19.172.101] 2(4983) grep_sock_info - checking if port 5070 matches port 5070 2(4983) parse_headers: flags=ffffffffffffffff 2(4983) DEBUG:avpops:op_avp: use <30> and <2> 2(4983) DEBUG:avpops:op_avp: done 2(4983) tr_eval_string: i=1 j=28 2(4983) requested for cli: INVITE 2(4983) parse_headers: flags=ffffffffffffffff 2(4983) parse_headers: flags=78 2(4983) DEBUG: MD5 calculated: 357d49a4e404d268684a1a3a03039ffb 2(4983) DEBUG: print_var: SIP_HF_CONTENT_LENGTH=373 2(4983) DEBUG: print_var: SIP_HF_USER_AGENT=eyeBeam release 1003s stamp 31159 2(4983) DEBUG: print_var: SIP_HF_CONTENT_TYPE=application/sdp 2(4983) DEBUG: print_var: SIP_HF_ALLOW=INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO 2(4983) DEBUG: print_var: SIP_HF_CSEQ=1 INVITE 2(4983) DEBUG: print_var: SIP_HF_CALLID=f811990b5d78f64fYmQxNjQ4NDA1OTU1ZDgwYjg0ZTNmYjEzNjY2NWU5MGY. 2(4983) DEBUG: print_var: SIP_HF_FROM="laobai";tag=9304d52e 2(4983) DEBUG: print_var: SIP_HF_TO="85218852323" 2(4983) DEBUG: print_var: SIP_HF_CONTACT= 2(4983) DEBUG: print_var: SIP_HF_MAX_FORWARDS=69 2(4983) DEBUG: print_var: SIP_HF_VIA=SIP/2.0/UDP 172.19.172.176:6282;branch=z9hG4bK-d87543-c56e432e507dae7b-1--d87543-;rport 2(4983) exec:w_exec_avp: executing [/home/baishi/proj/teliwave/cli/twcli '172.19.172.176' 'f811990b5d78f64fYmQxNjQ4NDA1OTU1ZDgwYjg0ZTNmYjEzNjY2NWU5MGY.'] 2(4983) SIGCHLD received: we do not worry about grand-children 2(4983) 172.19.172.176 f811990b5d78f64fYmQxNjQ4NDA1OTU1ZDgwYjg0ZTNmYjEzNjY2NWU5MGY. 172.19.172.101 2(4983) newcli: 852133143235 2(4983) DEBUG:uac:replace_from: removing display ["laobai"] 2(4983) DEBUG:uac:replace_from: uri to replace [sip:1234@172.19.172.101:5070] 2(4983) DEBUG:uac:replace_from: replacement uri is [sip:852133143235@172.19.172.101:5070] 2(4983) parse_headers: flags=ffffffffffffffff 2(4983) parse_headers: flags=ffffffffffffffff 2(4983) parse_headers: flags=ffffffffffffffff 2(4983) INVITE 2(4983) route 1 reached 2(4983) DEBUG: t_newtran: T on entrance=0xffffffff 2(4983) parse_headers: flags=ffffffffffffffff 2(4983) parse_headers: flags=78 2(4983) t_lookup_request: start searching: hash=55860, isACK=0 2(4983) DEBUG: RFC3261 transaction matching failed 2(4983) DEBUG: t_lookup_request: no transaction found 2(4983) parse_headers: flags=ffffffffffffffff 2(4983) check_via_address(172.19.172.176, 172.19.172.176, 0) 2(4983) WARNING:vqm_resize: resize(0) called 2(4983) DEBUG:tm:_reply_light: reply sent out. buf=0x81832f8: SIP/2.0 1..., shmem=0xb5ed6938: SIP/2.0 1 2(4983) DEBUG:tm:_reply_light: finished 2(4983) DEBUG: mk_proxy: doing DNS lookup... 2(4983) check_via_address(172.19.172.176, 172.19.172.176, 0) 2(4983) DEBUG:tm:set_timer: relative timeout is 500000 2(4983) DEBUG: add_to_tail_of_timer[4]: 0xb5ed4d8c (501500000) 2(4983) DEBUG:tm:set_timer: relative timeout is 30 2(4983) DEBUG: add_to_tail_of_timer[0]: 0xb5ed4da8 (531) 2(4983) DEBUG:tm:t_relay_to: new transaction fwd'ed 2(4983) DEBUG:tm:UNREF_UNSAFE: after is 0 2(4983) DEBUG:destroy_avp_list: destroying list (nil) 2(4983) receive_msg: cleaning up # U 172.19.172.101:5070 -> 172.19.172.176:6282 SIP/2.0 100 Giving a try..Via: SIP/2.0/UDP 172.19.172.176:6282;branch=z9hG4bK-d87543-c56e43 2e507dae7b-1--d87543-;rport=6282..To: "85218852323"..Fro m: "laobai";tag=9304d52e..Call-ID: f811990b5d78f64fYmQxNjQ4ND A1OTU1ZDgwYjg0ZTNmYjEzNjY2NWU5MGY...CSeq: 1 INVITE..Server: OpenSER (1.2.3-notls (i386/linu x))..Content-Length: 0.... # U 172.19.172.101:5070 -> gatewayip:5060 INVITE sip:85218852323@gatewayip:5060 SIP/2.0..Record-Route: ..Via: SIP/2.0/UDP 172.19.172.101:5070;branch=z9hG4bK43ad.8172d79.0..Via: SIP/2.0/UDP 172.19.172.176:6282;branch=z9hG4bK-d87543-c56e432e507dae7b-1--d87543-;rport=62 82..Max-Forwards: 69..To: "85218852323"..From: "85213314 3235";tag=9304d52e..Call-ID: f811990b5d78f64fYmQxNjQ4 NDA1OTU1ZDgwYjg0ZTNmYjEzNjY2NWU5MGY...Contact: ..CSeq : 1 INVITE..Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, IN FO..Content-Type: application/sdp..User-Agent: eyeBeam release 1003s stamp 31159..Content-L ength: 373....v=0..o=- 8 2 IN IP4 172.19.172.176..s=CounterPath eyeBeam 1.5..c=IN IP4 172.1 9.172.176..t=0 0..m=audio 2832 RTP/AVP 100 0 98 18 3 101..a=alt:1 1 : TelAZjze X+a2ix9b 172 .19.172.176 2832..a=fmtp:18 annexb=no..a=fmtp:101 0-15..a=rtpmap:100 SPEEX/16000..a=rtpmap: 98 iLBC/8000..a=rtpmap:101 telephone-event/8000..a=sendrecv..a=x-rtp-session-id:FE93311FD48 C4326A0A992AC4F360A1F.. # U gatewayip:5060 -> 172.19.172.101:5070 2(4983) SIP/2.0 100 Trying..Via: SIP/2.0/UDP 172.19.172.101:5070;branch=z9hG4bK43ad.8172d79.0;recei ved=172.19.172.101..Via: SIP/2.0/UDP 172.19.172.176:6282;branch=z9hG4bK-d87543-c56e432e507d ae7b-1--d87543-;rport=6282..Record-Route: ..Fr SIP Reply (status): 2(4983) version: 2(4983) status: <100> 2(4983) reason: 2(4983) parse_headers: flags=2 2(4983) Found param type 232, = ; state=6 2(4983) Found param type 234, = <172.19.172.101>; state=16 2(4983) end of header reached, state=5 2(4983) parse_headers: Via found, flags=2 2(4983) parse_headers: this is the first via 2(4983) After parse_msg... 2(4983) DEBUG:forward_reply: found module tm, passing reply to it 2(4983) DEBUG: t_check: start=0xffffffff 2(4983) parse_headers: flags=22 2(4983) Found param type 232, = ; state=6 2(4983) Found param type 235, = <6282>; state=16 2(4983) end of header reached, state=5 2(4983) parse_headers: Via found, flags=22 2(4983) parse_headers: this is the second via 2(4983) DEBUG:parse_to:end of header reached, state=10 2(4983) DBUG:parse_to: display={"85218852323"}, ruri={sip:85218852323@172.19.172.101:5070} 2(4983) DEBUG: get_hdr_field: [50]; uri=[sip:85218852323@172.19.172.101:5070] 2(4983) DEBUG: to body ["85218852323" ] 2(4983) get_hdr_field: cseq : <1> 2(4983) parse_headers: flags=8 2(4983) DEBUG: t_reply_matching: hash 55860 label 159196952 branch 0 2(4983) DEBUG:tm:REF_UNSAFE: after is 1 2(4983) DEBUG: t_reply_matching: reply matched (T=0xb5ed4c40)! 2(4983) DEBUG: t_check: end=0xb5ed4c40 2(4983) DEBUG:tm:reply_received: org. status uas=100, uac[0]=0 local=0 is_invite=1) 2(4983) DEBUG:t_check_status: checked status is <100> om: "852133143235";tag=9304d52e..To: "85218852323"..Call-ID: f811990b5d78f64fYmQxNjQ4NDA1OTU1ZDgwYjg0ZTNmYjEz NjY2NWU5MGY...CSeq: 1 INVITE..User-Agent: Asterisk PBX..Allow: INVITE, ACK, CANCEL, OPTIONS , BYE, REFER, SUBSCRIBE, NOTIFY..Supported: replaces..Contact: ..Content-Length: 0.... 2(4983) DEBUG:tm:t_should_relay_response: T_code=100, new_code=100 2(4983) DEBUG:tm:relay_reply: branch=0, save=0, relay=-1 2(4983) DEBUG:tm:set_timer: relative timeout is 120 2(4983) DEBUG: add_to_tail_of_timer[1]: 0xb5ed4da8 (621) 2(4983) DEBUG:tm:UNREF_UNSAFE: after is 0 2(4983) DEBUG:destroy_avp_list: destroying list (nil) 2(4983) receive_msg: cleaning up # 2(4983) SIP Reply (status): 2(4983) version: 2(4983) status: <183> 2(4983) reason: 2(4983) parse_headers: flags=2 2(4983) Found param type 232, = ; state=6 2(4983) Found param type 234, = <172.19.172.101>; state=16 2(4983) end of header reached, state=5 2(4983) parse_headers: Via found, flags=2 2(4983) parse_headers: this is the first via 2(4983) After parse_msg... 2(4983) DEBUG:forward_reply: found module tm, passing reply to it 2(4983) DEBUG: t_check: start=0xffffffff 2(4983) parse_headers: flags=22 2(4983) Found param type 232, = ; state=6 2(4983) Found param type 235, = <6282>; state=16 2(4983) end of header reached, state=5 2(4983) parse_headers: Via found, flags=22 2(4983) parse_headers: this is the second via 2(4983) DEBUG: add_param: tag=as3bf3b62a 2(4983) DEBUG:parse_to:end of header reached, state=29 2(4983) DBUG:parse_to: display={"85218852323"}, ruri={sip:85218852323@172.19.172.101:5070} 2(4983) DEBUG: get_hdr_field: [65]; uri=[sip:85218852323@172.19.172.101:5070] 2(4983) DEBUG: to body ["85218852323"] 2(4983) get_hdr_field: cseq : <1> 2(4983) parse_headers: flags=8 2(4983) DEBUG: t_reply_matching: hash 55860 label 159196952 branch 0 2(4983) DEBUG:tm:REF_UNSAFE: after is 1 2(4983) DEBUG: t_reply_matching: reply matched (T=0xb5ed4c40)! 2(4983) DEBUG: t_check: end=0xb5ed4c40 2(4983) DEBUG:tm:reply_received: org. status uas=100, uac[0]=100 local=0 is_invite=1) 2(4983) DEBUG:t_check_status: checked status is <183> 2(4983) DEBUG:tm:t_should_relay_response: T_code=100, new_code=183 2(4983) DEBUG:tm:relay_reply: branch=0, save=0, relay=0 2(4983) old size: 1009, new size: 918 2(4983) build_res_from_sip_res: copied size: orig:121, new: 30, rest: 888 msg= SIP/2.0 183 Session Progress Via: SIP/2.0/UDP 172.19.172.176:6282;branch=z9hG4bK-d87543-c56e432e507dae7b-1--d87543-;rport=6282 Record-Route: From: "852133143235";tag=9304d52e To: "85218852323";tag=as3bf3b62a Call-ID: f811990b5d78f64fYmQxNjQ4NDA1OTU1ZDgwYjg0ZTNmYjEzNjY2NWU5MGY. CSeq: 1 INVITE User-Agent: Asterisk PBX Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY Supported: replaces Contact: Content-Type: application/sdp Content-Length: 289 v=0 o=root 10059 10059 IN IP4 gatewayip s=session c=IN IP4 gatewayip t=0 0 m=audio 10884 RTP/AVP 18 0 101 a=rtpmap:18 G729/8000 a=fmtp:18 annexb=no a=rtpmap:0 PCMU/8000 a=rtpmap:101 telephone-event/8000 a=fmtp:101 0-16 a=silenceSupp:off - - - - a=ptime:20 a=sendrecv 2(4983) DEBUG:tm:relay_reply: sent buf=0x8183760: SIP/2.0 1..., shmem=0xb5ed6b68: SIP/2.0 1 2(4983) DEBUG:tm:set_timer: relative timeout is 120 2(4983) DEBUG: add_to_tail_of_timer[1]: 0xb5ed4da8 (621) 2(4983) DEBUG:tm:UNREF_UNSAFE: after is 0 2(4983) DEBUG:destroy_avp_list: destroying list (nil) 2(4983) receive_msg: cleaning up U gatewayip:5060 -> 172.19.172.101:5070 SIP/2.0 183 Session Progress..Via: SIP/2.0/UDP 172.19.172.101:5070;branch=z9hG4bK43ad.8172d 79.0;received=172.19.172.101..Via: SIP/2.0/UDP 172.19.172.176:6282;branch=z9hG4bK-d87543-c5 6e432e507dae7b-1--d87543-;rport=6282..Record-Route: ..From: "852133143235";tag=9304d52e..To: "65816 85963";tag=as3bf3b62a..Call-ID: f811990b5d78f64fYmQxNjQ 4NDA1OTU1ZDgwYjg0ZTNmYjEzNjY2NWU5MGY...CSeq: 1 INVITE..User-Agent: Asterisk PBX..Allow: INV ITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY..Supported: replaces..Contact: ..Content-Type: application/sdp..Content-Length: 289....v=0..o=r oot 10059 10059 IN IP4 gatewayip..s=session..c=IN IP4 gatewayip..t=0 0..m=audio 108 84 RTP/AVP 18 0 101..a=rtpmap:18 G729/8000..a=fmtp:18 annexb=no..a=rtpmap:0 PCMU/8000..a=rt pmap:101 telephone-event/8000..a=fmtp:101 0-16..a=silenceSupp:off - - - -..a=ptime:20..a=se ndrecv.. # U 172.19.172.101:5070 -> 172.19.172.176:6282 SIP/2.0 183 Session Progress..Via: SIP/2.0/UDP 172.19.172.176:6282;branch=z9hG4bK-d87543-c5 6e432e507dae7b-1--d87543-;rport=6282..Record-Route: ..From: "852133143235";tag=9304d52e..To: "65816 85963";tag=as3bf3b62a..Call-ID: f811990b5d78f64fYmQxNjQ 4NDA1OTU1ZDgwYjg0ZTNmYjEzNjY2NWU5MGY...CSeq: 1 INVITE..User-Agent: Asterisk PBX..Allow: INV ITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY..Supported: replaces..Contact: ..Content-Type: application/sdp..Content-Length: 289....v=0..o=r oot 10059 10059 IN IP4 gatewayip..s=session..c=IN IP4 gatewayip..t=0 0..m=audio 108 84 RTP/AVP 18 0 101..a=rtpmap:18 G729/8000..a=fmtp:18 annexb=no..a=rtpmap:0 PCMU/8000..a=rt pmap:101 telephone-event/8000..a=fmtp:101 0-16..a=silenceSupp:off - - - -..a=ptime:20..a=se ndrecv.. 3(4984) DEBUG: timer routine:4,tl=0xb5ed4d8c next=(nil), timeout=501500000 2(4983) SIP Reply (status): # U gatewayip:5060 -> 172.19.172.101:5070 2(4983) SIP/2.0 180 Ringing..Via: SIP/2.0/UDP 172.19.172.101:5070;branch=z9hG4bK43ad.8172d79.0;rece version: 2(4983) status: <180> ived=172.19.172.101..Via: SIP/2.0/UDP 172.19.172.176:6282;branch=z9hG4bK-d87543-c56e432e507 dae7b-1--d87543-;rport=6282..Record-Route: ..F rom: "852133143235";tag=9304d52e..To: "85218852323";tag=as3bf3b62a..Call-ID: f811990b5d78f64fYmQxNjQ4NDA1OTU1 ZDgwYjg0ZTNmYjEzNjY2NWU5MGY...CSeq: 1 INVITE..User-Agent: Asterisk PBX..Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY..Supported: replaces..Contact: ..Content-Length: 0.... 2(4983) reason: 2(4983) parse_headers: flags=2 2(4983) Found param type 232, = ; state=6 2(4983) Found param type 234, = <172.19.172.101>; state=16 2(4983) end of header reached, state=5 2(4983) parse_headers: Via found, flags=2 2(4983) parse_headers: this is the first via 2(4983) After parse_msg... 2(4983) DEBUG:forward_reply: found module tm, passing reply to it 2(4983) DEBUG: t_check: start=0xffffffff 2(4983) parse_headers: flags=22 2(4983) Found param type 232, = ; state=6 2(4983) Found param type 235, = <6282>; state=16 2(4983) end of header reached, state=5 2(4983) parse_headers: Via found, flags=22 2(4983) parse_headers: this is the second via 2(4983) DEBUG: add_param: tag=as3bf3b62a 2(4983) DEBUG:parse_to:end of header reached, state=29 2(4983) DBUG:parse_to: display={"85218852323"}, ruri={sip:85218852323@172.19.172.101:5070} 2(4983) DEBUG: get_hdr_field: [65]; uri=[sip:85218852323@172.19.172.101:5070] 2(4983) DEBUG: to body ["85218852323"] 2(4983) get_hdr_field: cseq : <1> 2(4983) parse_headers: flags=8 2(4983) DEBUG: t_reply_matching: hash 55860 label 159196952 branch 0 2(4983) DEBUG:tm:REF_UNSAFE: after is 1 2(4983) DEBUG: t_reply_matching: reply matched (T=0xb5ed4c40)! 2(4983) DEBUG: t_check: end=0xb5ed4c40 2(4983) DEBUG:tm:reply_received: org. status uas=183, uac[0]=183 local=0 is_invite=1) 2(4983) DEBUG:t_check_status: checked status is <180> 2(4983) DEBUG:tm:t_should_relay_response: T_code=183, new_code=180 2(4983) DEBUG:tm:relay_reply: branch=0, save=0, relay=0 2(4983) old size: 678, new size: 587 2(4983) build_res_from_sip_res: copied size: orig:112, new: 21, rest: 566 msg= SIP/2.0 180 Ringing Via: SIP/2.0/UDP 172.19.172.176:6282;branch=z9hG4bK-d87543-c56e432e507dae7b-1--d87543-;rport=6282 Record-Route: From: "852133143235";tag=9304d52e To: "85218852323";tag=as3bf3b62a Call-ID: f811990b5d78f64fYmQxNjQ4NDA1OTU1ZDgwYjg0ZTNmYjEzNjY2NWU5MGY. CSeq: 1 INVITE User-Agent: Asterisk PBX Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY Supported: replaces Contact: Content-Length: 0 2(4983) DEBUG:tm:relay_reply: sent buf=0x81834e8: SIP/2.0 1..., shmem=0xb5ed6b68: SIP/2.0 1 2(4983) DEBUG:tm:set_timer: relative timeout is 120 2(4983) DEBUG: add_to_tail_of_timer[1]: 0xb5ed4da8 (624) 2(4983) DEBUG:tm:UNREF_UNSAFE: after is 0 2(4983) DEBUG:destroy_avp_list: destroying list (nil) 2(4983) receive_msg: cleaning up # U 172.19.172.101:5070 -> 172.19.172.176:6282 SIP/2.0 180 Ringing..Via: SIP/2.0/UDP 172.19.172.176:6282;branch=z9hG4bK-d87543-c56e432e507 dae7b-1--d87543-;rport=6282..Record-Route: ..F rom: "852133143235";tag=9304d52e..To: "85218852323";tag=as3bf3b62a..Call-ID: f811990b5d78f64fYmQxNjQ4NDA1OTU1 ZDgwYjg0ZTNmYjEzNjY2NWU5MGY...CSeq: 1 INVITE..User-Agent: Asterisk PBX..Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY..Supported: replaces..Contact: ..Content-Length: 0.... # U 172.19.172.176:6282 -> 172.19.172.101:5070 2(4983) SIP Request: 2(4983) method: 2(4983) uri: 2(4983) version: 2(4983) parse_headers: flags=2 2(4983) Found param type 232, = ; state=6 2(4983) Found param type 235, = ; state=17 2(4983) end of header reached, state=5 2(4983) parse_headers: Via found, flags=2 2(4983) parse_headers: this is the first via 2(4983) After parse_msg... 2(4983) preparing to run routing scripts... 2(4983) parse_headers: flags=100 2(4983) DEBUG:parse_to:end of header reached, state=10 2(4983) DBUG:parse_to: display={"85218852323"}, ruri={sip:85218852323@172.19.172.101:5070} 2(4983) DEBUG: get_hdr_field: [50]; uri=[sip:85218852323@172.19.172.101:5070] 2(4983) DEBUG: to body ["85218852323" ] 2(4983) get_hdr_field: cseq : <1> 2(4983) DEBUG: get_hdr_body : content_length=0 2(4983) found end of header 2(4983) DEBUG: is_maxfwd_present: max_forwards header not found! 2(4983) Method: CANCEL 2(4983) DEBUG: add_param: tag=9304d52e 2(4983) DEBUG:parse_to:end of header reached, state=29 2(4983) DBUG:parse_to: display={"laobai"}, ruri={sip:1234@172.19.172.101:5070} 2(4983) parse_headers: flags=200 2(4983) find_first_route: No Route headers found 2(4983) loose_route: There is no Route HF 2(4983) grep_sock_info - checking if host==us: 14==9 && [172.19.172.101] == [127.0.0.1] 2(4983) grep_sock_info - checking if port 5070 matches port 5070 2(4983) grep_sock_info - checking if host==us: 14==14 && [172.19.172.101] == [172.19.172.101] 2(4983) grep_sock_info - checking if port 5070 matches port 5070 2(4983) lookup(): '85218852323' Not found in usrloc 2(4983) grep_sock_info - checking if host==us: 14==9 && [172.19.172.101] == [127.0.0.1] 2(4983) grep_sock_info - checking if port 5070 matches port 5070 2(4983) grep_sock_info - checking if host==us: 14==14 && [172.19.172.101] == [172.19.172.101] 2(4983) grep_sock_info - checking if port 5070 matches port 5070 2(4983) grep_sock_info - checking if host==us: 14==9 && [172.19.172.101] == [127.0.0.1] 2(4983) grep_sock_info - checking if port 5070 matches port 5070 2(4983) grep_sock_info - checking if host==us: 14==14 && [172.19.172.101] == [172.19.172.101] 2(4983) grep_sock_info - checking if port 5070 matches port 5070 2(4983) NON-LOOSEROUTE CANCLE OR BYE 2(4983) parse_headers: flags=ffffffffffffffff 2(4983) parse_headers: flags=78 2(4983) DEBUG: MD5 calculated: 357d49a4e404d268684a1a3a03039ffb 2(4983) DEBUG: print_var: SIP_HF_CONTENT_LENGTH=0 2(4983) DEBUG: print_var: SIP_HF_USER_AGENT=eyeBeam release 1003s stamp 31159 2(4983) DEBUG: print_var: SIP_HF_CSEQ=1 CANCEL 2(4983) DEBUG: print_var: SIP_HF_CALLID=f811990b5d78f64fYmQxNjQ4NDA1OTU1ZDgwYjg0ZTNmYjEzNjY2NWU5MGY. 2(4983) DEBUG: print_var: SIP_HF_FROM="laobai";tag=9304d52e 2(4983) DEBUG: print_var: SIP_HF_TO="85218852323" 2(4983) DEBUG: print_var: SIP_HF_VIA=SIP/2.0/UDP 172.19.172.176:6282;branch=z9hG4bK-d87543-c56e432e507dae7b-1--d87543-;rport 2(4983) exec:w_exec_avp: executing [/home/baishi/proj/teliwave/cli/unlock 'f811990b5d78f64fYmQxNjQ4NDA1OTU1ZDgwYjg0ZTNmYjEzNjY2NWU5MGY.'] CANCEL sip:85218852323@172.19.172.101:5070 SIP/2.0..Via: SIP/2.0/UDP 172.19.172.176:6282;bra nch=z9hG4bK-d87543-c56e432e507dae7b-1--d87543-;rport..To: "85218852323"..From: "laobai";tag=9304d52e..Call-ID: f81199 0b5d78f64fYmQxNjQ4NDA1OTU1ZDgwYjg0ZTNmYjEzNjY2NWU5MGY...CSeq: 1 CANCEL..User-Agent: eyeBeam release 1003s stamp 31159..Content-Length: 0.... 2(4983) SIGCHLD received: we do not worry about grand-children 2(4983) DEBUG:uac:replace_from: removing display ["laobai"] 2(4983) DEBUG:uac:replace_from: uri to replace [sip:1234@172.19.172.101:5070] 2(4983) DEBUG:uac:replace_from: replacement uri is [sip:852133143235@172.19.172.176] 2(4983) CLI: 852133143235 2(4983) CANCEL 2(4983) route 1 reached 2(4983) DEBUG: t_newtran: T on entrance=0xffffffff 2(4983) parse_headers: flags=ffffffffffffffff 2(4983) parse_headers: flags=78 2(4983) t_lookup_request: start searching: hash=55860, isACK=0 2(4983) DEBUG: RFC3261 transaction matching failed 2(4983) DEBUG: t_lookup_request: no transaction found 2(4983) DEBUG: t_lookupOriginalT: searching on hash entry 55860 2(4983) DEBUG: RFC3261 transaction matched, tid=-d87543-c56e432e507dae7b-1--d87543- 2(4983) DEBUG: t_lookupOriginalT: canceled transaction found (0xb5ed4c40)! 2(4983) DEBUG:tm:REF_UNSAFE: after is 1 2(4983) DEBUG: t_lookupOriginalT completed 2(4983) check_via_address(172.19.172.176, 172.19.172.176, 0) 2(4983) DEBUG:tm:set_timer: relative timeout is 500000 2(4983) DEBUG: add_to_tail_of_timer[4]: 0xb5ed262c (506200000) 2(4983) DEBUG:tm:set_timer: relative timeout is 30 2(4983) DEBUG: add_to_tail_of_timer[0]: 0xb5ed2648 (535) 2(4983) DEBUG: e2e_cancel: e2e cancel proceeding 2(4983) parse_headers: flags=ffffffffffffffff 2(4983) check_via_address(172.19.172.176, 172.19.172.176, 0) 2(4983) WARNING:vqm_resize: resize(0) called 2(4983) DEBUG:tm:_reply_light: reply sent out. buf=0x81832f8: SIP/2.0 2..., shmem=0xb5ed73b8: SIP/2.0 2 2(4983) DEBUG:tm:_reply_light: finished 2(4983) DEBUG:tm:t_relay_to: new transaction fwd'ed 2(4983) DEBUG:tm:UNREF_UNSAFE: after is 0 2(4983) DEBUG:tm:UNREF_UNSAFE: after is 0 2(4983) DEBUG:destroy_avp_list: destroying list (nil) 2(4983) receive_msg: cleaning up # U 172.19.172.101:5070 -> gatewayip:5060 CANCEL sip:85218852323@gatewayip:5060 SIP/2.0..Max-Forwards: 10..Record-Route: ..Via: SIP/2.0/UDP 172.19.172.101:5070;branch=z9hG4bK43 ad.8172d79.0..Via: SIP/2.0/UDP 172.19.172.176:6282;branch=z9hG4bK-d87543-c56e432e507dae7b-1 --d87543-;rport=6282..To: "85218852323"..From: "laohei"< sip:852133143235@172.19.172.176>;tag=9304d52e..Call-ID: f811990b5d78f64fYmQxNjQ4NDA1OTU1ZDg wYjg0ZTNmYjEzNjY2NWU5MGY...CSeq: 1 CANCEL..User-Agent: eyeBeam release 1003s stamp 31159..C ontent-Length: 0.... # U 172.19.172.101:5070 -> 172.19.172.176:6282 SIP/2.0 200 canceling..Via: SIP/2.0/UDP 172.19.172.176:6282;branch=z9hG4bK-d87543-c56e432e5 07dae7b-1--d87543-;rport=6282..To: "85218852323";tag=06c 52d26462d9835792f0cb3537991da-ab8f..From: "laobai";tag=9304d5 2e..Call-ID: f811990b5d78f64fYmQxNjQ4NDA1OTU1ZDgwYjg0ZTNmYjEzNjY2NWU5MGY...CSeq: 1 CANCEL.. Server: OpenSER (1.2.3-notls (i386/linux))..Content-Length: 0.... # U gatewayip:5060 -> 172.19.172.101:5070 SIP/2.0 487 Request Terminated..Via: SIP/2.0/UDP 172.19.172.101:5070;branch=z9hG4bK43ad.817 2d79.0;received=172.19.172.101..Via: SIP/2.0/UDP 172.19.172.176:6282;branch=z9hG4bK-d87543- c56e432e507dae7b-1--d87543-;rport=6282..From: "852133143235";tag=9304d52e..To: "85218852323";tag=as3bf3b62a.. Call-ID: f811990b5d78f64fYmQxNjQ4NDA1OTU1ZDgwYjg0ZTNmYjEzNjY2NWU5MGY...CSeq: 1 INVITE..User -Agent: Asterisk PBX..Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY..S upported: replaces..Content-Length: 0.... 2(4983) SIP Reply (status): 2(4983) version: 2(4983) status: <487> 2(4983) reason: 2(4983) parse_headers: flags=2 2(4983) Found param type 232, = ; state=6 2(4983) Found param type 234, = <172.19.172.101>; state=16 2(4983) end of header reached, state=5 2(4983) parse_headers: Via found, flags=2 2(4983) parse_headers: this is the first via 2(4983) After parse_msg... 2(4983) DEBUG:forward_reply: found module tm, passing reply to it 2(4983) DEBUG: t_check: start=0xffffffff 2(4983) parse_headers: flags=22 2(4983) Found param type 232, = ; state=6 2(4983) Found param type 235, = <6282>; state=16 2(4983) end of header reached, state=5 2(4983) parse_headers: Via found, flags=22 2(4983) parse_headers: this is the second via 2(4983) DEBUG: add_param: tag=as3bf3b62a 2(4983) DEBUG:parse_to:end of header reached, state=29 2(4983) DBUG:parse_to: display={"85218852323"}, ruri={sip:85218852323@172.19.172.101:5070} 2(4983) DEBUG: get_hdr_field: [65]; uri=[sip:85218852323@172.19.172.101:5070] 2(4983) DEBUG: to body ["85218852323"] 2(4983) get_hdr_field: cseq : <1> 2(4983) parse_headers: flags=8 2(4983) DEBUG: t_reply_matching: hash 55860 label 159196952 branch 0 2(4983) DEBUG:tm:REF_UNSAFE: after is 1 2(4983) DEBUG: t_reply_matching: reply matched (T=0xb5ed4c40)! 2(4983) DEBUG: t_check: end=0xb5ed4c40 2(4983) DEBUG:tm:reply_received: org. status uas=180, uac[0]=180 local=0 is_invite=1) 2(4983) parse_headers: flags=8 2(4983) DEBUG:tm:build_local: using FROM=;tag=9304d52e >, TO=;tag=as3bf3b62a >, CSEQ_N= 2(4983) DEBUG:t_check_status: checked status is <487> 2(4983) 487 received 2(4983) DEBUG:tm:t_should_relay_response: T_code=180, new_code=487 2(4983) DEBUG:tm:t_pick_branch: picked branch 0, code 487 # U 172.19.172.101:5070 -> gatewayip:5060 ACK sip:85218852323@gatewayip:5060 SIP/2.0..Via: SIP/2.0/UDP 172.19.172.101:5070;branch= z9hG4bK43ad.8172d79.0..From: "laobai";tag=9304d52e..Call-ID: f811990b5d78f64fYmQxNjQ4NDA1OTU1ZDgwYjg0ZTNmYjEzNjY2NWU5MGY...To: "85218852323";tag=as3bf3b62a..CSeq: 1 ACK..User-Agent: OpenSER (1.2.3-notls (i386 /linux))..Content-Length: 0.... 2(4983) DEBUG:tm:t_should_relay_response: dns-failover test: branch=0, last_recv=487, flags=2 2(4983) DEBUG:t_check_status: checked status is <487> 2(4983) DEBUG:tm:relay_reply: branch=0, save=0, relay=0 2(4983) old size: 587, new size: 496 2(4983) build_res_from_sip_res: copied size: orig:123, new: 32, rest: 464 msg= SIP/2.0 487 Request Terminated Via: SIP/2.0/UDP 172.19.172.176:6282;branch=z9hG4bK-d87543-c56e432e507dae7b-1--d87543-;rport=6282 From: "852133143235";tag=9304d52e To: "85218852323";tag=as3bf3b62a Call-ID: f811990b5d78f64fYmQxNjQ4NDA1OTU1ZDgwYjg0ZTNmYjEzNjY2NWU5MGY. CSeq: 1 INVITE User-Agent: Asterisk PBX Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY Supported: replaces Content-Length: 0 2(4983) DEBUG:tm:set_timer: relative timeout is 500000 2(4983) DEBUG: add_to_tail_of_timer[4]: 0xb5ed4d08 (506200000) 2(4983) DEBUG:tm:set_timer: relative timeout is 30 2(4983) DEBUG: add_to_tail_of_timer[0]: 0xb5ed4d24 (535) 2(4983) DEBUG:tm:relay_reply: sent buf=0x81834e8: SIP/2.0 4..., shmem=0xb5ed6938: SIP/2.0 4 2(4983) DEBUG: cleanup_uac_timers: RETR/FR timers reset 2(4983) DEBUG:tm:UNREF_UNSAFE: after is 0 2(4983) DEBUG:destroy_avp_list: destroying list (nil) 2(4983) receive_msg: cleaning up # U 172.19.172.101:5070 -> 172.19.172.176:6282 SIP/2.0 487 Request Terminated..Via: SIP/2.0/UDP 172.19.172.176:6282;branch=z9hG4bK-d87543- c56e432e507dae7b-1--d87543-;rport=6282..From: "852133143235";tag=9304d52e..To: "85218852323";tag=as3bf3b62a.. Call-ID: f811990b5d78f64fYmQxNjQ4NDA1OTU1ZDgwYjg0ZTNmYjEzNjY2NWU5MGY...CSeq: 1 INVITE..User -Agent: Asterisk PBX..Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY..S upported: replaces..Content-Length: 0.... # U 172.19.172.176:6282 -> 172.19.172.101:5070 ACK sip:85218852323@172.19.172.101:5070 SIP/2.0..Via: SIP/2.0/UDP 172.19.172.176:6282;branch =z9hG4bK-d87543-c56e432e507dae7b-1--d87543-;rport..To: "85218852323";tag=as3bf3b62a..From: "laobai";tag=9304d52e..Cal l-ID: f811990b5d78f64fYmQxNjQ4NDA1OTU1ZDgwYjg0ZTNmYjEzNjY2NWU5MGY...CSeq: 1 ACK..Content-Le ngth: 0.... 2(4983) SIP Request: 2(4983) method: 2(4983) uri: 2(4983) version: 2(4983) parse_headers: flags=2 2(4983) Found param type 232, = ; state=6 2(4983) Found param type 235, = ; state=17 2(4983) end of header reached, state=5 2(4983) parse_headers: Via found, flags=2 2(4983) parse_headers: this is the first via 2(4983) After parse_msg... 2(4983) preparing to run routing scripts... 2(4983) DEBUG : sl_filter_ACK: to late to be a local ACK! 2(4983) parse_headers: flags=100 2(4983) DEBUG: add_param: tag=as3bf3b62a 2(4983) DEBUG:parse_to:end of header reached, state=29 2(4983) DBUG:parse_to: display={"85218852323"}, ruri={sip:85218852323@172.19.172.101:5070} 2(4983) DEBUG: get_hdr_field: [65]; uri=[sip:85218852323@172.19.172.101:5070] 2(4983) DEBUG: to body ["85218852323"] 2(4983) get_hdr_field: cseq : <1> 2(4983) DEBUG: get_hdr_body : content_length=0 2(4983) found end of header 2(4983) DEBUG: is_maxfwd_present: max_forwards header not found! 2(4983) Method: ACK 2(4983) DEBUG: add_param: tag=9304d52e 2(4983) DEBUG:parse_to:end of header reached, state=29 2(4983) DBUG:parse_to: display={"laobai"}, ruri={sip:1234@172.19.172.101:5070} 2(4983) parse_headers: flags=200 2(4983) find_first_route: No Route headers found 2(4983) loose_route: There is no Route HF 2(4983) grep_sock_info - checking if host==us: 14==9 && [172.19.172.101] == [127.0.0.1] 2(4983) grep_sock_info - checking if port 5070 matches port 5070 2(4983) grep_sock_info - checking if host==us: 14==14 && [172.19.172.101] == [172.19.172.101] 2(4983) grep_sock_info - checking if port 5070 matches port 5070 2(4983) lookup(): '85218852323' Not found in usrloc 2(4983) grep_sock_info - checking if host==us: 14==9 && [172.19.172.101] == [127.0.0.1] 2(4983) grep_sock_info - checking if port 5070 matches port 5070 2(4983) grep_sock_info - checking if host==us: 14==14 && [172.19.172.101] == [172.19.172.101] 2(4983) grep_sock_info - checking if port 5070 matches port 5070 2(4983) grep_sock_info - checking if host==us: 14==9 && [172.19.172.101] == [127.0.0.1] 2(4983) grep_sock_info - checking if port 5070 matches port 5070 2(4983) grep_sock_info - checking if host==us: 14==14 && [172.19.172.101] == [172.19.172.101] 2(4983) grep_sock_info - checking if port 5070 matches port 5070 2(4983) parse_headers: flags=78 2(4983) t_lookup_request: start searching: hash=55860, isACK=1 2(4983) DEBUG: RFC3261 transaction matched, tid=-d87543-c56e432e507dae7b-1--d87543- 2(4983) DEBUG:tm:REF_UNSAFE: after is 1 2(4983) DEBUG: t_lookup_request: transaction found (T=0xb5ed4c40) 2(4983) ACK 2(4983) route 1 reached 2(4983) DEBUG: cleanup_uac_timers: RETR/FR timers reset 2(4983) DEBUG: add_to_tail_of_timer[2]: 0xb5ed4c88 (510) 2(4983) DEBUG:tm:UNREF_UNSAFE: after is 0 2(4983) DEBUG:destroy_avp_list: destroying list (nil) 2(4983) receive_msg: cleaning up # U gatewayip:5060 -> 172.19.172.101:5070 SIP/2.0 200 OK..Via: SIP/2.0/UDP 172.19.172.101:5070;branch=z9hG4bK43ad.8172d79.0;received= 2(4983) SIP Reply (status): 2(4983) version: 2(4983) status: <200> 2(4983) reason: 2(4983) parse_headers: flags=2 2(4983) Found param type 232, = ; state=6 2(4983) Found param type 234, = <172.19.172.101>; state=16 2(4983) end of header reached, state=5 2(4983) parse_headers: Via found, flags=2 2(4983) parse_headers: this is the first via 2(4983) After parse_msg... 2(4983) DEBUG:forward_reply: found module tm, passing reply to it 2(4983) DEBUG: t_check: start=0xffffffff 2(4983) parse_headers: flags=22 2(4983) Found param type 232, = ; state=6 2(4983) Found param type 235, = <6282>; state=16 2(4983) end of header reached, state=5 2(4983) parse_headers: Via found, flags=22 2(4983) parse_headers: this is the second via 2(4983) DEBUG: add_param: tag=as3bf3b62a 2(4983) DEBUG:parse_to:end of header reached, state=29 2(4983) DBUG:parse_to: display={"85218852323"}, ruri={sip:85218852323@172.19.172.101:5070} 2(4983) DEBUG: get_hdr_field: [65]; uri=[sip:85218852323@172.19.172.101:5070] 2(4983) DEBUG: to body ["85218852323"] 2(4983) get_hdr_field: cseq : <1> 2(4983) DEBUG: t_reply_matching: hash 55860 label 159196952 branch 0 2(4983) DEBUG:tm:REF_UNSAFE: after is 1 2(4983) DEBUG: t_reply_matching: reply matched (T=0xb5ed24e0)! 2(4983) DEBUG: t_check: end=0xb5ed24e0 2(4983) DEBUG:tm:reply_received: org. status uas=200, uac[0]=0 local=0 is_invite=0) 2(4983) DEBUG:t_check_status: checked status is <200> 2(4983) DEBUG:tm:t_should_relay_response: T_code=200, new_code=200 2(4983) DEBUG:tm:relay_reply: branch=0, save=0, relay=-1 2(4983) DEBUG: add_to_tail_of_timer[2]: 0xb5ed2528 (510) 2(4983) DEBUG: cleanup_uac_timers: RETR/FR timers reset 2(4983) DEBUG:tm:UNREF_UNSAFE: after is 0 2(4983) DEBUG:destroy_avp_list: destroying list (nil) 2(4983) receive_msg: cleaning up 172.19.172.101..Via: SIP/2.0/UDP 172.19.172.176:6282;branch=z9hG4bK-d87543-c56e432e507dae7b -1--d87543-;rport=6282..Record-Route: ..From: "laohei";tag=9304d52e..To: "85218852323";tag=as3bf3b62a..Call-ID: f811990b5d78f64fYmQxNjQ4NDA1OTU1ZDgwYjg0ZTNmYjEz NjY2NWU5MGY...CSeq: 1 CANCEL..User-Agent: Asterisk PBX..Allow: INVITE, ACK, CANCEL, OPTIONS , BYE, REFER, SUBSCRIBE, NOTIFY..Supported: replaces..Contact: ..Content-Length: 0.... 3(4984) DEBUG: timer routine:4,tl=0xb5ed262c next=0xb5ed4d08, timeout=506200000 3(4984) DEBUG: timer routine:4,tl=0xb5ed4d08 next=(nil), timeout=506200000 3(4984) DEBUG: timer routine:2,tl=0xb5ed4c88 next=0xb5ed2528, timeout=510 3(4984) DEBUG: wait_handler : removing 0xb5ed4c40 from table 3(4984) DEBUG: delete transaction 0xb5ed4c40 3(4984) DEBUG: wait_handler : done 3(4984) DEBUG: timer routine:2,tl=0xb5ed2528 next=(nil), timeout=510 3(4984) DEBUG: wait_handler : removing 0xb5ed24e0 from table 3(4984) DEBUG: delete transaction 0xb5ed24e0 3(4984) DEBUG: wait_handler : done