Sep 17 10:54:45 siege ./ser[20518]: SIP Request: Sep 17 10:54:45 siege ./ser[20518]: method: Sep 17 10:54:45 siege ./ser[20518]: uri: Sep 17 10:54:45 siege ./ser[20518]: version: Sep 17 10:54:45 siege ./ser[20518]: parse_headers: flags=1 Sep 17 10:54:45 siege ./ser[20518]: end of header reached, state=9 Sep 17 10:54:45 siege ./ser[20518]: DEBUG: get_hdr_field: [32]; uri=[sip:70000037@213.226.186.195] Sep 17 10:54:45 siege ./ser[20518]: DEBUG: to body [^M ] Sep 17 10:54:45 siege ./ser[20518]: get_hdr_field: cseq : <1> Sep 17 10:54:45 siege ./ser[20518]: Found param type 232, = ; state=16 Sep 17 10:54:45 siege ./ser[20518]: end of header reached, state=5 Sep 17 10:54:45 siege ./ser[20518]: parse_headers: Via found, flags=1 Sep 17 10:54:45 siege ./ser[20518]: parse_headers: this is the first via Sep 17 10:54:45 siege ./ser[20518]: After parse_msg... Sep 17 10:54:45 siege ./ser[20518]: preparing to run routing scripts... Sep 17 10:54:45 siege ./ser[20518]: DEBUG: add_param: tag=0-13c4-414a9843-402bb98-1973 Sep 17 10:54:45 siege ./ser[20518]: end of header reached, state=29 Sep 17 10:54:45 siege ./ser[20518]: parse_headers: flags=256 Sep 17 10:54:45 siege ./ser[20518]: DEBUG: get_hdr_body : content_length=227 Sep 17 10:54:45 siege ./ser[20518]: found end of header Sep 17 10:54:45 siege ./ser[20518]: find_first_route(): No Route headers found Sep 17 10:54:45 siege ./ser[20518]: loose_route(): There is no Route HF Sep 17 10:54:45 siege ./ser[20518]: parse_headers: flags=4096 Sep 17 10:54:45 siege ./ser[20518]: pre_auth(): Credentials with given realm not found Sep 17 10:54:45 siege ./ser[20518]: build_auth_hf(): 'WWW-Authenticate: Digest realm="213.226.186.195", nonce="414a99719d77734549ab6e83f2227bdb0db8218d"^M ' Sep 17 10:54:45 siege ./ser[20518]: parse_headers: flags=-1 Sep 17 10:54:45 siege ./ser[20518]: check_via_address(82.135.142.16, 82.135.142.16, 0) Sep 17 10:54:45 siege ./ser[20518]: DEBUG: get_out_socket: socket determined: 0 Sep 17 10:54:45 siege ./ser[20518]: DEBUG:destroy_avp_list: destroing list (nil) Sep 17 10:54:45 siege ./ser[20518]: receive_msg: cleaning up Sep 17 10:54:45 siege ./ser[20507]: SIP Request: Sep 17 10:54:45 siege ./ser[20507]: method: Sep 17 10:54:45 siege ./ser[20507]: uri: Sep 17 10:54:45 siege ./ser[20507]: version: Sep 17 10:54:45 siege ./ser[20507]: parse_headers: flags=1 Sep 17 10:54:45 siege ./ser[20507]: DEBUG: add_param: tag=58451be0870a0a50b35bf0ab28a442d9.7dfd Sep 17 10:54:45 siege ./ser[20507]: end of header reached, state=29 Sep 17 10:54:45 siege ./ser[20507]: DEBUG: get_hdr_field: [74]; uri=[sip:70000037@213.226.186.195] Sep 17 10:54:45 siege ./ser[20507]: DEBUG: to body [] Sep 17 10:54:45 siege ./ser[20507]: get_hdr_field: cseq : <1> Sep 17 10:54:45 siege ./ser[20507]: Found param type 232, = ; state=16 Sep 17 10:54:45 siege ./ser[20507]: end of header reached, state=5 Sep 17 10:54:45 siege ./ser[20507]: parse_headers: Via found, flags=1 Sep 17 10:54:45 siege ./ser[20507]: parse_headers: this is the first via Sep 17 10:54:45 siege ./ser[20507]: After parse_msg... Sep 17 10:54:45 siege ./ser[20507]: preparing to run routing scripts... Sep 17 10:54:45 siege ./ser[20507]: parse_headers: flags=4 Sep 17 10:54:45 siege ./ser[20507]: DEBUG: sl_filter_ACK : local ACK found -> dropping it! Sep 17 10:54:45 siege ./ser[20507]: DEBUG:destroy_avp_list: destroing list (nil) Sep 17 10:54:45 siege ./ser[20507]: receive_msg: cleaning up Sep 17 10:54:45 siege ./ser[20512]: SIP Request: Sep 17 10:54:45 siege ./ser[20512]: method: Sep 17 10:54:45 siege ./ser[20512]: uri: Sep 17 10:54:45 siege ./ser[20512]: version: Sep 17 10:54:45 siege ./ser[20512]: parse_headers: flags=1 Sep 17 10:54:45 siege ./ser[20512]: end of header reached, state=9 Sep 17 10:54:45 siege ./ser[20512]: DEBUG: get_hdr_field: [32]; uri=[sip:70000037@213.226.186.195] Sep 17 10:54:45 siege ./ser[20512]: DEBUG: to body [^M ] Sep 17 10:54:45 siege ./ser[20512]: get_hdr_field: cseq : <2> Sep 17 10:54:45 siege ./ser[20512]: Found param type 232, = ; state=16 Sep 17 10:54:45 siege ./ser[20512]: end of header reached, state=5 Sep 17 10:54:45 siege ./ser[20512]: parse_headers: Via found, flags=1 Sep 17 10:54:45 siege ./ser[20512]: parse_headers: this is the first via Sep 17 10:54:45 siege ./ser[20512]: After parse_msg... Sep 17 10:54:45 siege ./ser[20512]: preparing to run routing scripts... Sep 17 10:54:45 siege ./ser[20512]: DEBUG: add_param: tag=0-13c4-414a9843-402bb98-1973 Sep 17 10:54:45 siege ./ser[20512]: end of header reached, state=29 Sep 17 10:54:45 siege ./ser[20512]: parse_headers: flags=256 Sep 17 10:54:45 siege ./ser[20512]: DEBUG: get_hdr_body : content_length=227 Sep 17 10:54:45 siege ./ser[20512]: found end of header Sep 17 10:54:45 siege ./ser[20512]: find_first_route(): No Route headers found Sep 17 10:54:45 siege ./ser[20512]: loose_route(): There is no Route HF Sep 17 10:54:45 siege ./ser[20512]: check_nonce(): comparing [414a99719d77734549ab6e83f2227bdb0db8218d] and [414a99719d77734549ab6e83f2227bdb0db8218d] Sep 17 10:54:45 siege ./ser[20512]: query="select password from subscriber where username='70000031' AND domain='213.226.186.195' AND acc_ip='82.135.142.16'" Sep 17 10:54:45 siege ./ser[20512]: HA1 string calculated: ef55dba3f323e9dd829e746d56c34938 Sep 17 10:54:45 siege ./ser[20512]: check_response(): Our result = 'df8104e1577572762333556115d2b8e3' Sep 17 10:54:45 siege ./ser[20512]: check_response(): Authorization is OK Sep 17 10:54:45 siege ./ser[20512]: save_rpid(): rpid value is '' Sep 17 10:54:45 siege ./ser[20512]: DEBUG: t_addifnew: msg id=5816 , global msg id=5815 , T on entrance=0xffffffff Sep 17 10:54:45 siege ./ser[20512]: parse_headers: flags=-1 Sep 17 10:54:45 siege ./ser[20512]: parse_headers: flags=60 Sep 17 10:54:45 siege ./ser[20512]: t_lookup_request: start searching: hash=32382, isACK=0 Sep 17 10:54:45 siege ./ser[20512]: DEBUG: RFC3261 transaction matching failed Sep 17 10:54:45 siege ./ser[20512]: DEBUG: t_lookup_request: no transaction found Sep 17 10:54:45 siege ./ser[20512]: DEBUG: get_out_socket: socket determined: 0 Sep 17 10:54:45 siege ./ser[20512]: SER: new INVITE Sep 17 10:54:45 siege ./ser[20512]: parse_headers: flags=-1 Sep 17 10:54:45 siege ./ser[20512]: check_via_address(82.135.142.16, 82.135.142.16, 0) Sep 17 10:54:45 siege ./ser[20512]: WARNING:vqm_resize: resize(0) called Sep 17 10:54:45 siege ./ser[20512]: DEBUG: reply sent out. buf=0x80e1200: SIP/2.0 1..., shmem=0x402e4d80: SIP/2.0 1 Sep 17 10:54:45 siege ./ser[20512]: DEBUG: t_reply: finished Sep 17 10:54:45 siege ./ser[20512]: DEBUG: mk_proxy: doing DNS lookup... Sep 17 10:54:45 siege ./ser[20512]: DEBUG: get_out_socket: socket determined: 0 Sep 17 10:54:45 siege ./ser[20512]: check_via_address(82.135.142.16, 82.135.142.16, 0) Sep 17 10:54:45 siege ./ser[20512]: DEBUG: add_to_tail_of_timer[4]: 0x402f8c28 Sep 17 10:54:45 siege ./ser[20512]: DEBUG: add_to_tail_of_timer[0]: 0x402f8c3c Sep 17 10:54:45 siege ./ser[20512]: SER: new transaction fwd'ed Sep 17 10:54:45 siege ./ser[20512]: DEBUG:destroy_avp_list: destroing list (nil) Sep 17 10:54:45 siege ./ser[20512]: receive_msg: cleaning up Sep 17 10:54:46 siege ./ser[20525]: DEBUG: timer routine:4,tl=0x402f8c28 next=(nil) Sep 17 10:54:46 siege ./ser[20525]: DEBUG: retransmission_handler : request resending (t=0x402f8b00, INVITE si ... ) Sep 17 10:54:46 siege ./ser[20525]: DEBUG: add_to_tail_of_timer[5]: 0x402f8c28 Sep 17 10:54:46 siege ./ser[20525]: DEBUG: retransmission_handler : done Sep 17 10:54:46 siege ./ser[20513]: SIP Request: Sep 17 10:54:46 siege ./ser[20513]: method: Sep 17 10:54:46 siege ./ser[20513]: uri: Sep 17 10:54:46 siege ./ser[20513]: version: Sep 17 10:54:46 siege ./ser[20513]: parse_headers: flags=1 Sep 17 10:54:46 siege ./ser[20513]: end of header reached, state=9 Sep 17 10:54:46 siege ./ser[20513]: DEBUG: get_hdr_field: [32]; uri=[sip:70000037@213.226.186.195] Sep 17 10:54:46 siege ./ser[20513]: DEBUG: to body [^M ] Sep 17 10:54:46 siege ./ser[20513]: get_hdr_field: cseq : <2> Sep 17 10:54:46 siege ./ser[20513]: Found param type 232, = ; state=16 Sep 17 10:54:46 siege ./ser[20513]: end of header reached, state=5 Sep 17 10:54:46 siege ./ser[20513]: parse_headers: Via found, flags=1 Sep 17 10:54:46 siege ./ser[20513]: parse_headers: this is the first via Sep 17 10:54:46 siege ./ser[20513]: After parse_msg... Sep 17 10:54:46 siege ./ser[20513]: preparing to run routing scripts... Sep 17 10:54:46 siege ./ser[20513]: DEBUG: add_param: tag=0-13c4-414a9843-402bb98-1973 Sep 17 10:54:46 siege ./ser[20513]: end of header reached, state=29 Sep 17 10:54:46 siege ./ser[20513]: parse_headers: flags=256 Sep 17 10:54:46 siege ./ser[20513]: DEBUG: get_hdr_body : content_length=0 Sep 17 10:54:46 siege ./ser[20513]: found end of header Sep 17 10:54:46 siege ./ser[20513]: find_first_route(): No Route headers found Sep 17 10:54:46 siege ./ser[20513]: loose_route(): There is no Route HF Sep 17 10:54:46 siege ./ser[20513]: DEBUG: t_addifnew: msg id=5747 , global msg id=5746 , T on entrance=(nil) Sep 17 10:54:46 siege ./ser[20513]: parse_headers: flags=-1 Sep 17 10:54:46 siege ./ser[20513]: parse_headers: flags=60 Sep 17 10:54:46 siege ./ser[20513]: t_lookup_request: start searching: hash=32382, isACK=0 Sep 17 10:54:46 siege ./ser[20513]: DEBUG: RFC3261 transaction matching failed Sep 17 10:54:46 siege ./ser[20513]: DEBUG: t_lookup_request: no transaction found Sep 17 10:54:46 siege ./ser[20513]: DEBUG: get_out_socket: socket determined: 0 Sep 17 10:54:46 siege ./ser[20513]: DEBUG: t_lookupOriginalT: searching on hash entry 32382 Sep 17 10:54:46 siege ./ser[20513]: DEBUG: RFC3261 transaction matched, tid=-414a9843-402bc24-1a2e Sep 17 10:54:46 siege ./ser[20513]: DEBUG: t_lookupOriginalT: canceled transaction found (0x402f8b00)! Sep 17 10:54:46 siege ./ser[20513]: DEBUG: t_lookupOriginalT completed Sep 17 10:54:46 siege ./ser[20513]: DEBUG: e2e_cancel: e2e cancel -- no more pending branches Sep 17 10:54:46 siege ./ser[20513]: parse_headers: flags=-1 Sep 17 10:54:46 siege ./ser[20513]: check_via_address(82.135.142.16, 82.135.142.16, 0) Sep 17 10:54:46 siege ./ser[20513]: WARNING:vqm_resize: resize(0) called Sep 17 10:54:46 siege ./ser[20513]: DEBUG: cleanup_uacs: RETR/FR timers reset Sep 17 10:54:46 siege ./ser[20513]: DEBUG: add_to_tail_of_timer[2]: 0x402dff60 Sep 17 10:54:46 siege ./ser[20513]: DEBUG: reply sent out. buf=0x80e1040: SIP/2.0 2..., shmem=0x402d3bc0: SIP/2.0 2 Sep 17 10:54:46 siege ./ser[20513]: DEBUG: t_reply: finished Sep 17 10:54:46 siege ./ser[20513]: DEBUG: e2e_cancel: sending 487 Sep 17 10:54:46 siege ./ser[20513]: parse_headers: flags=-1 Sep 17 10:54:46 siege ./ser[20513]: check_via_address(82.135.142.16, 82.135.142.16, 0) Sep 17 10:54:46 siege ./ser[20513]: DEBUG: cleanup_uacs: RETR/FR timers reset Sep 17 10:54:46 siege ./ser[20513]: DEBUG: add_to_tail_of_timer[4]: 0x402f8bb4 Sep 17 10:54:46 siege ./ser[20513]: DEBUG: add_to_tail_of_timer[0]: 0x402f8bc8 Sep 17 10:54:46 siege ./ser[20513]: DEBUG: reply sent out. buf=0x80e1040: SIP/2.0 4..., shmem=0x402e2938: SIP/2.0 4 Sep 17 10:54:46 siege ./ser[20513]: DEBUG: t_reply: finished Sep 17 10:54:46 siege ./ser[20513]: SER: new transaction fwd'ed Sep 17 10:54:46 siege ./ser[20513]: DEBUG:destroy_avp_list: destroing list (nil) Sep 17 10:54:46 siege ./ser[20513]: receive_msg: cleaning up Sep 17 10:54:46 siege ./ser[20507]: SIP Request: Sep 17 10:54:46 siege ./ser[20507]: method: Sep 17 10:54:46 siege ./ser[20507]: uri: Sep 17 10:54:46 siege ./ser[20507]: version: Sep 17 10:54:46 siege ./ser[20507]: parse_headers: flags=1 Sep 17 10:54:46 siege ./ser[20507]: DEBUG: add_param: tag=855fc458e92794ef4dd58c58d38d34d1-1dcd Sep 17 10:54:46 siege ./ser[20507]: end of header reached, state=29 Sep 17 10:54:46 siege ./ser[20507]: DEBUG: get_hdr_field: [74]; uri=[sip:70000037@213.226.186.195] Sep 17 10:54:46 siege ./ser[20507]: DEBUG: to body [] Sep 17 10:54:46 siege ./ser[20507]: get_hdr_field: cseq : <2> Sep 17 10:54:46 siege ./ser[20507]: Found param type 232, = ; state=16 Sep 17 10:54:46 siege ./ser[20507]: end of header reached, state=5 Sep 17 10:54:46 siege ./ser[20507]: parse_headers: Via found, flags=1 Sep 17 10:54:46 siege ./ser[20507]: parse_headers: this is the first via Sep 17 10:54:46 siege ./ser[20507]: After parse_msg... Sep 17 10:54:46 siege ./ser[20507]: preparing to run routing scripts... Sep 17 10:54:46 siege ./ser[20507]: parse_headers: flags=4 Sep 17 10:54:46 siege ./ser[20507]: DEBUG: add_param: tag=0-13c4-414a9843-402bb98-1973 Sep 17 10:54:46 siege ./ser[20507]: end of header reached, state=29 Sep 17 10:54:46 siege ./ser[20507]: parse_headers: flags=256 Sep 17 10:54:46 siege ./ser[20507]: DEBUG: get_hdr_body : content_length=0 Sep 17 10:54:46 siege ./ser[20507]: found end of header Sep 17 10:54:46 siege ./ser[20507]: find_first_route(): No Route headers found Sep 17 10:54:46 siege ./ser[20507]: loose_route(): There is no Route HF Sep 17 10:54:46 siege ./ser[20507]: DEBUG: t_addifnew: msg id=5729 , global msg id=5727 , T on entrance=0xffffffff Sep 17 10:54:46 siege ./ser[20507]: parse_headers: flags=-1 Sep 17 10:54:46 siege ./ser[20507]: parse_headers: flags=60 Sep 17 10:54:46 siege ./ser[20507]: t_lookup_request: start searching: hash=32382, isACK=1 Sep 17 10:54:46 siege ./ser[20507]: DEBUG: RFC3261 transaction matched, tid=-414a9843-402bc24-1a2e Sep 17 10:54:46 siege ./ser[20507]: DEBUG: t_lookup_request: transaction found (T=0x402f8b00) Sep 17 10:54:46 siege ./ser[20507]: DEBUG: cleanup_uacs: RETR/FR timers reset Sep 17 10:54:46 siege ./ser[20507]: DEBUG: add_to_tail_of_timer[2]: 0x402f8b48 Sep 17 10:54:46 siege ./ser[20507]: DEBUG:destroy_avp_list: destroing list (nil) Sep 17 10:54:46 siege ./ser[20507]: receive_msg: cleaning up Sep 17 10:54:47 siege ./ser[20525]: DEBUG: timer routine:0,tl=0x402f8c3c next=0x402f8bc8 Sep 17 10:54:47 siege ./ser[20525]: DEBUG: timer routine:0,tl=0x402f8bc8 next=(nil) Sep 17 10:54:47 siege ./ser[20525]: DEBUG: timer routine:4,tl=0x402f8bb4 next=(nil) Sep 17 10:54:47 siege ./ser[20525]: DEBUG: timer routine:5,tl=0x402f8c28 next=(nil) Sep 17 10:54:47 siege ./ser[20519]: SIP Request: Sep 17 10:54:47 siege ./ser[20519]: method: Sep 17 10:54:47 siege ./ser[20519]: uri: Sep 17 10:54:47 siege ./ser[20519]: version: Sep 17 10:54:47 siege ./ser[20519]: parse_headers: flags=1 Sep 17 10:54:47 siege ./ser[20519]: end of header reached, state=2 Sep 17 10:54:47 siege ./ser[20519]: parse_headers: Via found, flags=1 Sep 17 10:54:47 siege ./ser[20519]: parse_headers: this is the first via Sep 17 10:54:47 siege ./ser[20519]: After parse_msg... Sep 17 10:54:47 siege ./ser[20519]: preparing to run routing scripts... Sep 17 10:54:47 siege ./ser[20519]: parse_headers: flags=8 Sep 17 10:54:47 siege ./ser[20519]: end of header reached, state=9 Sep 17 10:54:47 siege ./ser[20519]: DEBUG: get_hdr_field: [30]; uri=[sip:70000037@82.135.142.22] Sep 17 10:54:47 siege ./ser[20519]: DEBUG: to body [^M ] Sep 17 10:54:47 siege ./ser[20519]: DEBUG: add_param: tag=b960e3f Sep 17 10:54:47 siege ./ser[20519]: end of header reached, state=29 Sep 17 10:54:47 siege ./ser[20519]: parse_headers: flags=256 Sep 17 10:54:47 siege ./ser[20519]: get_hdr_field: cseq : <1> Sep 17 10:54:47 siege ./ser[20519]: DEBUG: get_hdr_body : content_length=180 Sep 17 10:54:47 siege ./ser[20519]: found end of header Sep 17 10:54:47 siege ./ser[20519]: find_first_route(): No Route headers found Sep 17 10:54:47 siege ./ser[20519]: loose_route(): There is no Route HF Sep 17 10:54:47 siege ./ser[20519]: DEBUG: t_addifnew: msg id=5712 , global msg id=5711 , T on entrance=0xffffffff Sep 17 10:54:47 siege ./ser[20519]: parse_headers: flags=-1 Sep 17 10:54:47 siege ./ser[20519]: parse_headers: flags=60 Sep 17 10:54:47 siege ./ser[20519]: t_lookup_request: start searching: hash=12319, isACK=0 Sep 17 10:54:47 siege ./ser[20519]: DEBUG: proceeding to pre-RFC3261 transaction matching Sep 17 10:54:47 siege ./ser[20519]: DEBUG: t_lookup_request: no transaction found Sep 17 10:54:47 siege ./ser[20519]: DEBUG: get_out_socket: socket determined: 0 Sep 17 10:54:47 siege ./ser[20519]: SER: new INVITE Sep 17 10:54:47 siege ./ser[20519]: parse_headers: flags=-1 Sep 17 10:54:47 siege ./ser[20519]: check_via_address(213.226.186.195, 213.226.186.195, 0) Sep 17 10:54:47 siege ./ser[20519]: WARNING:vqm_resize: resize(0) called Sep 17 10:54:47 siege ./ser[20519]: DEBUG: reply sent out. buf=0x80de4a8: SIP/2.0 1..., shmem=0x402dd670: SIP/2.0 1 Sep 17 10:54:47 siege ./ser[20519]: DEBUG: t_reply: finished Sep 17 10:54:47 siege ./ser[20519]: DEBUG: mk_proxy: doing DNS lookup... Sep 17 10:54:47 siege ./ser[20519]: DEBUG: get_out_socket: socket determined: 0 Sep 17 10:54:47 siege ./ser[20519]: check_via_address(213.226.186.195, 213.226.186.195, 0) Sep 17 10:54:47 siege ./ser[20519]: DEBUG: add_to_tail_of_timer[4]: 0x402f6610 Sep 17 10:54:47 siege ./ser[20519]: DEBUG: add_to_tail_of_timer[0]: 0x402f6624 Sep 17 10:54:47 siege ./ser[20519]: SER: new transaction fwd'ed Sep 17 10:54:47 siege ./ser[20519]: DEBUG:destroy_avp_list: destroing list (nil) Sep 17 10:54:47 siege ./ser[20519]: receive_msg: cleaning up Sep 17 10:54:47 siege ./ser[20511]: SIP Reply (status): Sep 17 10:54:47 siege ./ser[20511]: version: Sep 17 10:54:47 siege ./ser[20511]: status: <100> Sep 17 10:54:47 siege ./ser[20511]: reason: Sep 17 10:54:47 siege ./ser[20511]: parse_headers: flags=1 Sep 17 10:54:47 siege ./ser[20511]: Found param type 232, = ; state=16 Sep 17 10:54:47 siege ./ser[20511]: end of header reached, state=5 Sep 17 10:54:47 siege ./ser[20511]: parse_headers: Via found, flags=1 Sep 17 10:54:47 siege ./ser[20511]: parse_headers: this is the first via Sep 17 10:54:47 siege ./ser[20511]: After parse_msg... Sep 17 10:54:47 siege ./ser[20511]: forward_reply: found module tm, passing reply to it Sep 17 10:54:47 siege ./ser[20511]: DEBUG: t_check: msg id=5909 global id=5908 T start=0xffffffff Sep 17 10:54:47 siege ./ser[20511]: parse_headers: flags=17 Sep 17 10:54:47 siege ./ser[20511]: end of header reached, state=2 Sep 17 10:54:47 siege ./ser[20511]: parse_headers: Via found, flags=17 Sep 17 10:54:47 siege ./ser[20511]: parse_headers: this is the second via Sep 17 10:54:47 siege ./ser[20511]: end of header reached, state=9 Sep 17 10:54:47 siege ./ser[20511]: DEBUG: get_hdr_field: [30]; uri=[sip:70000037@82.135.142.22] Sep 17 10:54:47 siege ./ser[20511]: DEBUG: to body [^M ] Sep 17 10:54:47 siege ./ser[20511]: get_hdr_field: cseq : <1> Sep 17 10:54:47 siege ./ser[20511]: parse_headers: flags=4 Sep 17 10:54:47 siege ./ser[20511]: DEBUG: t_reply_matching: hash 12319 label 1628570360 branch 0 Sep 17 10:54:47 siege ./ser[20511]: DEBUG: t_reply_matching: reply matched (T=0x402f64e8)! Sep 17 10:54:47 siege ./ser[20511]: DEBUG: t_check: msg id=5909 global id=5909 T end=0x402f64e8 Sep 17 10:54:47 siege ./ser[20511]: DEBUG: t_on_reply: org. status uas=100, uac[0]=0 local=0 is_invite=1) Sep 17 10:54:47 siege ./ser[20511]: ->>>>>>>>> T_code=100, new_code=100 Sep 17 10:54:47 siege ./ser[20511]: DEBUG: relay_reply: branch=0, save=0, relay=-1 Sep 17 10:54:47 siege ./ser[20511]: DEBUG: add_to_tail_of_timer[1]: 0x402f6624 Sep 17 10:54:47 siege ./ser[20511]: DEBUG:destroy_avp_list: destroing list (nil) Sep 17 10:54:47 siege ./ser[20511]: receive_msg: cleaning up Sep 17 10:54:47 siege ./ser[20517]: SIP Reply (status): Sep 17 10:54:47 siege ./ser[20517]: version: Sep 17 10:54:47 siege ./ser[20517]: status: <180> Sep 17 10:54:47 siege ./ser[20517]: reason: Sep 17 10:54:47 siege ./ser[20517]: parse_headers: flags=1 Sep 17 10:54:47 siege ./ser[20517]: Found param type 232, = ; state=16 Sep 17 10:54:47 siege ./ser[20517]: end of header reached, state=5 Sep 17 10:54:47 siege ./ser[20517]: parse_headers: Via found, flags=1 Sep 17 10:54:47 siege ./ser[20517]: parse_headers: this is the first via Sep 17 10:54:47 siege ./ser[20517]: After parse_msg... Sep 17 10:54:47 siege ./ser[20517]: forward_reply: found module tm, passing reply to it Sep 17 10:54:47 siege ./ser[20517]: DEBUG: t_check: msg id=5678 global id=5677 T start=(nil) Sep 17 10:54:47 siege ./ser[20517]: parse_headers: flags=17 Sep 17 10:54:47 siege ./ser[20517]: end of header reached, state=2 Sep 17 10:54:47 siege ./ser[20517]: parse_headers: Via found, flags=17 Sep 17 10:54:47 siege ./ser[20517]: parse_headers: this is the second via Sep 17 10:54:47 siege ./ser[20517]: DEBUG: add_param: tag=f292f2202d771805 Sep 17 10:54:47 siege ./ser[20517]: end of header reached, state=29 Sep 17 10:54:47 siege ./ser[20517]: DEBUG: get_hdr_field: [51]; uri=[sip:70000037@82.135.142.22] Sep 17 10:54:47 siege ./ser[20517]: DEBUG: to body [] Sep 17 10:54:47 siege ./ser[20517]: get_hdr_field: cseq : <1> Sep 17 10:54:47 siege ./ser[20517]: parse_headers: flags=4 Sep 17 10:54:47 siege ./ser[20517]: DEBUG: t_reply_matching: hash 12319 label 1628570360 branch 0 Sep 17 10:54:47 siege ./ser[20517]: DEBUG: t_reply_matching: reply matched (T=0x402f64e8)! Sep 17 10:54:47 siege ./ser[20517]: DEBUG: t_check: msg id=5678 global id=5678 T end=0x402f64e8 Sep 17 10:54:47 siege ./ser[20517]: DEBUG: t_on_reply: org. status uas=100, uac[0]=100 local=0 is_invite=1) Sep 17 10:54:47 siege ./ser[20517]: ->>>>>>>>> T_code=100, new_code=180 Sep 17 10:54:47 siege ./ser[20517]: DEBUG: relay_reply: branch=0, save=0, relay=0 Sep 17 10:54:47 siege ./ser[20517]: old size: 402, new size: 338 Sep 17 10:54:47 siege ./ser[20517]: build_res_from_sip_res: copied size: orig:85, new: 21, rest: 317 msg= SIP/2.0 180 ringing^M Via: SIP/2.0/UDP 213.226.186.195^M Record-Route: ^M From: ;tag=b960e3f^M To: ;tag=f292f2202d771805^M Call-ID: 3647-4a64@213.226.186.195^M CSeq: 1 INVITE^M User-Agent: Grandstream BT100 1.0.5.10^M Content-Length: 0^M ^M Sep 17 10:54:47 siege ./ser[20517]: DEBUG: reply relayed. buf=0x80dcc68: SIP/2.0 1..., shmem=0x402d9b30: SIP/2.0 1 Sep 17 10:54:47 siege ./ser[20517]: DEBUG: add_to_tail_of_timer[1]: 0x402f6624 Sep 17 10:54:47 siege ./ser[20517]: DEBUG:destroy_avp_list: destroing list (nil) Sep 17 10:54:47 siege ./ser[20517]: receive_msg: cleaning up Sep 17 10:54:47 siege ./ser[20513]: SIP Reply (status): Sep 17 10:54:47 siege ./ser[20513]: version: Sep 17 10:54:47 siege ./ser[20513]: status: <180> Sep 17 10:54:47 siege ./ser[20513]: reason: Sep 17 10:54:47 siege ./ser[20513]: parse_headers: flags=1 Sep 17 10:54:47 siege ./ser[20513]: Found param type 232, = ; state=16 Sep 17 10:54:47 siege ./ser[20513]: end of header reached, state=5 Sep 17 10:54:47 siege ./ser[20513]: parse_headers: Via found, flags=1 Sep 17 10:54:47 siege ./ser[20513]: parse_headers: this is the first via Sep 17 10:54:47 siege ./ser[20513]: After parse_msg... Sep 17 10:54:47 siege ./ser[20513]: forward_reply: found module tm, passing reply to it Sep 17 10:54:47 siege ./ser[20513]: DEBUG: t_check: msg id=5748 global id=5747 T start=0xffffffff Sep 17 10:54:47 siege ./ser[20513]: parse_headers: flags=17 Sep 17 10:54:47 siege ./ser[20513]: Found param type 232, = ; state=16 Sep 17 10:54:47 siege ./ser[20513]: end of header reached, state=5 Sep 17 10:54:47 siege ./ser[20513]: parse_headers: Via found, flags=17 Sep 17 10:54:47 siege ./ser[20513]: parse_headers: this is the second via Sep 17 10:54:47 siege ./ser[20513]: end of header reached, state=9 Sep 17 10:54:47 siege ./ser[20513]: DEBUG: get_hdr_field: [32]; uri=[sip:70000037@213.226.186.195] Sep 17 10:54:47 siege ./ser[20513]: DEBUG: to body [^M ] Sep 17 10:54:47 siege ./ser[20513]: get_hdr_field: cseq : <2> Sep 17 10:54:47 siege ./ser[20513]: parse_headers: flags=4 Sep 17 10:54:47 siege ./ser[20513]: DEBUG: t_reply_matching: hash 32382 label 366400597 branch 0 Sep 17 10:54:47 siege ./ser[20513]: DEBUG: t_reply_matching: reply matched (T=0x402f8b00)! Sep 17 10:54:47 siege ./ser[20513]: DEBUG: t_check: msg id=5748 global id=5748 T end=0x402f8b00 Sep 17 10:54:47 siege ./ser[20513]: DEBUG: t_on_reply: org. status uas=487, uac[0]=0 local=0 is_invite=1) Sep 17 10:54:47 siege ./ser[20513]: ->>>>>>>>> T_code=487, new_code=180 Sep 17 10:54:47 siege ./ser[20513]: DEBUG: relay_reply: branch=0, save=0, relay=-1 Sep 17 10:54:47 siege ./ser[20513]: WARNING: set_timer called on a "detached" timer -- ignoring: 0x402f8c3c Sep 17 10:54:47 siege ./ser[20513]: DEBUG:destroy_avp_list: destroing list (nil) Sep 17 10:54:47 siege ./ser[20513]: receive_msg: cleaning up Sep 17 10:54:48 siege ./ser[20525]: DEBUG: timer routine:4,tl=0x402f6610 next=(nil)