As you can see in the snippet a left from the debug, the re-INVITE is managed by the nathelper module. Please provide network trace to be able to see the result of the processing (received and sent messages). Use:
ngrep -qt -d any port 5060
on your sip server.
Cheers, Daniel
On 08/10/06 14:57, Pavel D. Kuzin wrote:
this is a debug view with debug=5
[...]
0(14154) SIP Request: 0(14154) method: <INVITE> 0(14154) uri: sip:400@192.168.39.50:5060;nat=yes 0(14154) version: <SIP/2.0> 0(14154) parse_headers: flags=2 0(14154) DEBUG: add_param: tag=0-13c4-44db1c5c-b38bc-7e15 0(14154) DEBUG:parse_to:end of header reached, state=29 0(14154) DBUG:parse_to: display={}, ruri={sip:anonymous@anonymous.com} 0(14154) DEBUG: get_hdr_field: <To> [62]; uri=[sip:anonymous@anonymous.com] 0(14154) DEBUG: to body [sip:anonymous@anonymous.com] 0(14154) get_hdr_field: cseq <CSeq>: <1> <INVITE> 0(14154) Found param type 232, <branch> = <z9hG4bK-44db1c63-b5374-2864>; state=16 0(14154) end of header reached, state=5 0(14154) parse_headers: Via found, flags=2 0(14154) parse_headers: this is the first via 0(14154) After parse_msg... 0(14154) preparing to run routing scripts... 0(14154) parse_headers: flags=100 0(14154) DEBUG:maxfwd:is_maxfwd_present: value = 70 0(14154) check_via_address(192.168.39.50, 192.168.39.50, 0) 0(14154) parse_headers: flags=80 0(14154) parse_headers: flags=80 0(14154) DEBUG: add_param: tag=0-13c4-44db1c5c-b390c-6691 0(14154) DEBUG:parse_to:end of header reached, state=29 0(14154) DBUG:parse_to: display={}, ruri={sip:500@192.168.39.54} 0(14154) parse_headers: flags=200 0(14154) is_preloaded: No 0(14154) grep_sock_info - checking if host==us: 13==13 && [192.168.39.50] == [192.168.39.54] 0(14154) grep_sock_info - checking if port 5060 matches port 5060 0(14154) grep_sock_info - checking if host==us: 13==13 && [192.168.39.50] == [192.168.39.54] 0(14154) grep_sock_info - checking if port 5060 matches port 5060 0(14154) check_self: host != me 0(14154) grep_sock_info - checking if host==us: 13==13 && [192.168.39.54] == [192.168.39.54] 0(14154) grep_sock_info - checking if port 5060 matches port 5060 0(14154) after_loose: Topmost route URI: 'sip:192.168.39.54;lr;ftag=0-13c4-44db1c5c-b38bc-7e15' is me 0(14154) parse_headers: flags=200 0(14154) DEBUG: get_hdr_body : content_length=318 0(14154) found end of header 0(14154) find_next_route: No next Route HF found 0(14154) after_loose: No next URI found 0(14154) parse_headers: flags=ffffffffffffffff 0(14154) parse_headers: flags=40 0(14154) parse_headers: flags=ffffffffffffffff 0(14154) DEBUG:check_content_type: type <application/sdp> found valid 0(14154) parse_headers: flags=40 0(14154) force_rtp_proxy2: proxy reply: 35030 192.168.39.54
0(14154) subst_run: running. r=0 0(14154) subst_run: matched (0, 34): [sip:400@192.168.39.50:5060;nat=yes] 0(14154) textops: subst_uri_f: match - old uri= [sip:400@192.168.39.50:5060;nat=yes], new uri= [sip:400@192.168.39.50:5060] 0(14154) parse_headers: flags=ffffffffffffffff 0(14154) DEBUG:check_content_type: type <application/sdp> found valid 0(14154) parse_headers: flags=40 0(14154) force_rtp_proxy2: proxy reply: 35030 192.168.39.54
0(14154) DEBUG: t_newtran: msg id=6 , global msg id=5 , T on entrance=0xffffffffffffffff 0(14154) parse_headers: flags=ffffffffffffffff 0(14154) parse_headers: flags=78 0(14154) t_lookup_request: start searching: hash=34382, isACK=0 0(14154) DEBUG: RFC3261 transaction matching failed 0(14154) DEBUG: t_lookup_request: no transaction found 0(14154) DEBUG:tm:t_relay: new INVITE 0(14154) parse_headers: flags=ffffffffffffffff 0(14154) check_via_address(192.168.39.50, 192.168.39.50, 0) 0(14154) WARNING:vqm_resize: resize(0) called 0(14154) DEBUG:tm:_reply_light: reply sent out. buf=0x6166b8: SIP/2.0 1..., shmem=0x2ba62f3c3f30: SIP/2.0 1 0(14154) DEBUG:tm:_reply_light: finished 0(14154) DEBUG: mk_proxy: doing DNS lookup... 0(14154) parse_headers: flags=2000 0(14154) parse_headers: flags=ffffffffffffffff 0(14154) clen_builder: content-length: 372 (372) 0(14154) check_via_address(192.168.39.50, 192.168.39.50, 0) 0(14154) DEBUG: add_to_tail_of_timer[4]: 0x2ba62f3c16a8 0(14154) DEBUG: add_to_tail_of_timer[0]: 0x2ba62f3c16c8 0(14154) SER: new transaction fwd'ed 0(14154) DEBUG:tm:UNREF_UNSAFE: after is 0 0(14154) DEBUG:destroy_avp_list: destroying list (nil) 0(14154) receive_msg: cleaning up