I got really modify my config, and now it looks like: http://pastebin.com/0M7938Mmbut now I got loopback problems. kamailio just asking itself.ngrep -d lo port 5060 talks me:SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP 194.190.8.171;branch=z9hG4bKc2bb.e627f45ee16a4b45ca99321b3bc8832c.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.328c8c23df8e916010525f7f786cbc49.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b8ec8f173657be182ad714f59d37d4a8.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.7bec0e7c4a5962e90811bf082f0e6635.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6bbb824e92f328ce4053167b2e2c596a.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6f732fece1d8956bf5b075118b3dcb2f.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b4ab8b8de819be6fff9203bfdf4e758c.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.977524b1111849dd2cd8020d4c09090c.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.cb7d178bf3fdb6596399beaf5b43e66d.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0c69cbf.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via: SIP/2.0/UDP 192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From: <sip:1001@194.190.8.171>;tag=1274477258..To: <sip:1001@194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID: 00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....#SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.328c8c23df8e916010525f7f786cbc49.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b8ec8f173657be182ad714f59d37d4a8.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.7bec0e7c4a5962e90811bf082f0e6635.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6bbb824e92f328ce4053167b2e2c596a.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6f732fece1d8956bf5b075118b3dcb2f.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b4ab8b8de819be6fff9203bfdf4e758c.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.977524b1111849dd2cd8020d4c09090c.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.cb7d178bf3fdb6596399beaf5b43e66d.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0c69cbf.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via: SIP/2.0/UDP 192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From: <sip:1001@194.190.8.171>;tag=1274477258..To: <sip:1001@194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID: 00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....#SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b8ec8f173657be182ad714f59d37d4a8.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.7bec0e7c4a5962e90811bf082f0e6635.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6bbb824e92f328ce4053167b2e2c596a.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6f732fece1d8956bf5b075118b3dcb2f.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b4ab8b8de819be6fff9203bfdf4e758c.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.977524b1111849dd2cd8020d4c09090c.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.cb7d178bf3fdb6596399beaf5b43e66d.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0c69cbf.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via: SIP/2.0/UDP 192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From: <sip:1001@194.190.8.171>;tag=1274477258..To: <sip:1001@194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID: 00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....#SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.7bec0e7c4a5962e90811bf082f0e6635.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6bbb824e92f328ce4053167b2e2c596a.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6f732fece1d8956bf5b075118b3dcb2f.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b4ab8b8de819be6fff9203bfdf4e758c.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.977524b1111849dd2cd8020d4c09090c.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.cb7d178bf3fdb6596399beaf5b43e66d.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0c69cbf.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via: SIP/2.0/UDP 192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From: <sip:1001@194.190.8.171>;tag=1274477258..To: <sip:1001@194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID: 00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....#SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6bbb824e92f328ce4053167b2e2c596a.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6f732fece1d8956bf5b075118b3dcb2f.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b4ab8b8de819be6fff9203bfdf4e758c.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.977524b1111849dd2cd8020d4c09090c.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.cb7d178bf3fdb6596399beaf5b43e66d.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0c69cbf.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via: SIP/2.0/UDP 192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From: <sip:1001@194.190.8.171>;tag=1274477258..To: <sip:1001@194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID: 00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....#SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6f732fece1d8956bf5b075118b3dcb2f.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b4ab8b8de819be6fff9203bfdf4e758c.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.977524b1111849dd2cd8020d4c09090c.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.cb7d178bf3fdb6596399beaf5b43e66d.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0c69cbf.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via: SIP/2.0/UDP 192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From: <sip:1001@194.190.8.171>;tag=1274477258..To: <sip:1001@194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID: 00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....#SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b4ab8b8de819be6fff9203bfdf4e758c.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.977524b1111849dd2cd8020d4c09090c.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.cb7d178bf3fdb6596399beaf5b43e66d.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0c69cbf.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via: SIP/2.0/UDP 192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From: <sip:1001@194.190.8.171>;tag=1274477258..To: <sip:1001@194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID: 00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....#SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.977524b1111849dd2cd8020d4c09090c.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.cb7d178bf3fdb6596399beaf5b43e66d.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0c69cbf.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via: SIP/2.0/UDP 192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From: <sip:1001@194.190.8.171>;tag=1274477258..To: <sip:1001@194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID: 00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....#SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.cb7d178bf3fdb6596399beaf5b43e66d.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0c69cbf.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via: SIP/2.0/UDP 192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From: <sip:1001@194.190.8.171>;tag=1274477258..To: <sip:1001@194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID: 00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....#SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0c69cbf.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via: SIP/2.0/UDP 192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From: <sip:1001@194.190.8.171>;tag=1274477258..To: <sip:1001@194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID: 00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....#SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via: SIP/2.0/UDP 192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From: <sip:1001@194.190.8.171>;tag=1274477258..To: <sip:1001@194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID: 00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....#SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via: SIP/2.0/UDP 192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From: <sip:1001@194.190.8.171>;tag=1274477258..To: <sip:1001@194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID: 00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....#SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via: SIP/2.0/UDP 192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From: <sip:1001@194.190.8.171>;tag=1274477258..To: <sip:1001@194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID: 00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....#SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via: SIP/2.0/UDP 192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From: <sip:1001@194.190.8.171>;tag=1274477258..To: <sip:1001@194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID: 00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....#SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via: SIP/2.0/UDP 192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From: <sip:1001@194.190.8.171>;tag=1274477258..To: <sip:1001@194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID: 00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....#SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via: SIP/2.0/UDP 192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From: <sip:1001@194.190.8.171>;tag=1274477258..To: <sip:1001@194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID: 00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....#SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via: SIP/2.0/UDP 192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From: <sip:1001@194.190.8.171>;tag=1274477258..To: <sip:1001@194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID: 00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....and how looks dump1. from sip device to kamailio[root@kamaz sm1ly]# tcpdump -nn -i eth0 host 77.37.241.151 -vtcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes19:54:51.205942 IP (tos 0x0, ttl 57, id 0, offset 0, flags [DF], proto UDP (17), length 421)77.37.241.151.57288 > 194.190.8.171.5060: SIP, length: 393REGISTER sip:194.190.8.171 SIP/2.0CSeq: 5569 REGISTERFrom: "1002" <sip:1002@194.190.8.171>;tag=2801080754To: "1002" <sip:1002@194.190.8.171>Via: SIP/2.0/UDP 192.168.1.103:57288;branch=z9hG4bKe5bd1a6ceba7f0a0f4e7487cb17ca365353236;rportMax-Forwards: 70User-Agent: SIPAUA/0.1.001Contact: *Expires: 0Content-Length: 019:54:51.210060 IP (tos 0x10, ttl 64, id 35861, offset 0, flags [none], proto UDP (17), length 603)194.190.8.171.5060 > 77.37.241.151.57288: SIP, length: 575SIP/2.0 401 UnauthorizedVia: SIP/2.0/UDP 192.168.1.103:57288;received=77.37.241.151;branch=z9hG4bKe5bd1a6ceba7f0a0f4e7487cb17ca365353236;rport=57288From: "1002" <sip:1002@194.190.8.171>;tag=2801080754To: "1002" <sip:1002@194.190.8.171>;tag=as518dbea9CSeq: 5569 REGISTERServer: Asterisk PBX 1.8.20.0Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISHSupported: replaces, timerWWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="31daf0f8"Content-Length: 019:54:51.257552 IP (tos 0x0, ttl 57, id 0, offset 0, flags [DF], proto UDP (17), length 586)77.37.241.151.57288 > 194.190.8.171.5060: SIP, length: 558REGISTER sip:194.190.8.171:5060 SIP/2.0CSeq: 5570 REGISTERFrom: "1002" <sip:1002@194.190.8.171>;tag=2801080754To: "1002" <sip:1002@194.190.8.171>Via: SIP/2.0/UDP 192.168.1.103:57288;branch=z9hG4bK440337c23337c9913220fd825f4d9ded353236;rportMax-Forwards: 70User-Agent: SIPAUA/0.1.001Contact: *Expires: 0Authorization: Digest username="1002",realm="asterisk",nonce="31daf0f8",uri="sip:194.190.8.171:5060",response="2b0222b07da7af1c3b72c2eb36241f5f",algorithm=MD5Content-Length: 019:54:51.261209 IP (tos 0x10, ttl 64, id 35862, offset 0, flags [none], proto UDP (17), length 603)194.190.8.171.5060 > 77.37.241.151.57288: SIP, length: 575SIP/2.0 401 UnauthorizedVia: SIP/2.0/UDP 192.168.1.103:57288;received=77.37.241.151;branch=z9hG4bK440337c23337c9913220fd825f4d9ded353236;rport=57288From: "1002" <sip:1002@194.190.8.171>;tag=2801080754To: "1002" <sip:1002@194.190.8.171>;tag=as0716dea5CSeq: 5570 REGISTERServer: Asterisk PBX 1.8.20.0Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISHSupported: replaces, timerWWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="2f70c759"Content-Length: 019:54:51.290458 IP (tos 0x0, ttl 57, id 0, offset 0, flags [DF], proto UDP (17), length 586)77.37.241.151.57288 > 194.190.8.171.5060: SIP, length: 558REGISTER sip:194.190.8.171:5060 SIP/2.0CSeq: 5571 REGISTERFrom: "1002" <sip:1002@194.190.8.171>;tag=2801080754To: "1002" <sip:1002@194.190.8.171>Via: SIP/2.0/UDP 192.168.1.103:57288;branch=z9hG4bK30fe030eee49e2eb50c619074c0f057b353236;rportMax-Forwards: 70User-Agent: SIPAUA/0.1.001Contact: *Expires: 0Authorization: Digest username="1002",realm="asterisk",nonce="2f70c759",uri="sip:194.190.8.171:5060",response="9eb7d157cfd0d8e8575b59c94c5f82f6",algorithm=MD5Content-Length: 019:54:51.295285 IP (tos 0x10, ttl 64, id 35863, offset 0, flags [none], proto UDP (17), length 566)194.190.8.171.5060 > 77.37.241.151.57288: SIP, length: 538SIP/2.0 200 OKVia: SIP/2.0/UDP 192.168.1.103:57288;received=77.37.241.151;branch=z9hG4bK30fe030eee49e2eb50c619074c0f057b353236;rport=57288From: "1002" <sip:1002@194.190.8.171>;tag=2801080754To: "1002" <sip:1002@194.190.8.171>;tag=as0716dea5CSeq: 5571 REGISTERServer: Asterisk PBX 1.8.20.0Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISHSupported: replaces, timerExpires: 0Date: Mon, 03 Feb 2014 15:54:51 GMTContent-Length: 019:54:51.314824 IP (tos 0x0, ttl 57, id 0, offset 0, flags [DF], proto UDP (17), length 473)77.37.241.151.57288 > 194.190.8.171.5060: SIP, length: 445REGISTER sip:194.190.8.171 SIP/2.0CSeq: 2404 REGISTERFrom: "1002" <sip:1002@194.190.8.171>;tag=134783744To: "1002" <sip:1002@194.190.8.171>Via: SIP/2.0/UDP 192.168.1.103:57288;branch=z9hG4bKdeb946998664720c2c93538625cc649e353236;rportMax-Forwards: 70User-Agent: SIPAUA/0.1.001Contact: "1002" <sip:1002@192.168.1.103:57288;transport=udp>Expires: 3600Content-Length: 019:54:51.319697 IP (tos 0x10, ttl 64, id 35864, offset 0, flags [none], proto UDP (17), length 602)194.190.8.171.5060 > 77.37.241.151.57288: SIP, length: 574SIP/2.0 401 UnauthorizedVia: SIP/2.0/UDP 192.168.1.103:57288;received=77.37.241.151;branch=z9hG4bKdeb946998664720c2c93538625cc649e353236;rport=57288From: "1002" <sip:1002@194.190.8.171>;tag=134783744To: "1002" <sip:1002@194.190.8.171>;tag=as0bba2324CSeq: 2404 REGISTERServer: Asterisk PBX 1.8.20.0Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISHSupported: replaces, timerWWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="023deb34"Content-Length: 019:54:51.344080 IP (tos 0x0, ttl 57, id 0, offset 0, flags [DF], proto UDP (17), length 638)77.37.241.151.57288 > 194.190.8.171.5060: SIP, length: 610REGISTER sip:194.190.8.171:5060 SIP/2.0CSeq: 2405 REGISTERFrom: "1002" <sip:1002@194.190.8.171>;tag=134783744To: "1002" <sip:1002@194.190.8.171>Via: SIP/2.0/UDP 192.168.1.103:57288;branch=z9hG4bK60a6798f72024444a9870698b766a04c353236;rportMax-Forwards: 70User-Agent: SIPAUA/0.1.001Contact: "1002" <sip:1002@192.168.1.103:57288;transport=udp>Expires: 3600Authorization: Digest username="1002",realm="asterisk",nonce="023deb34",uri="sip:194.190.8.171:5060",response="7fa5be98c7c0c395ed41f9e7da095629",algorithm=MD5Content-Length: 019:54:51.350423 IP (tos 0x10, ttl 64, id 35865, offset 0, flags [none], proto UDP (17), length 602)194.190.8.171.5060 > 77.37.241.151.57288: SIP, length: 574SIP/2.0 401 UnauthorizedVia: SIP/2.0/UDP 192.168.1.103:57288;received=77.37.241.151;branch=z9hG4bK60a6798f72024444a9870698b766a04c353236;rport=57288From: "1002" <sip:1002@194.190.8.171>;tag=134783744To: "1002" <sip:1002@194.190.8.171>;tag=as065abebaCSeq: 2405 REGISTERServer: Asterisk PBX 1.8.20.0Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISHSupported: replaces, timerWWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="26886c3d"Content-Length: 019:54:51.370976 IP (tos 0x0, ttl 57, id 0, offset 0, flags [DF], proto UDP (17), length 638)77.37.241.151.57288 > 194.190.8.171.5060: SIP, length: 610REGISTER sip:194.190.8.171:5060 SIP/2.0CSeq: 2406 REGISTERFrom: "1002" <sip:1002@194.190.8.171>;tag=134783744To: "1002" <sip:1002@194.190.8.171>Via: SIP/2.0/UDP 192.168.1.103:57288;branch=z9hG4bKf4d831e0612e1074bf49397d92907c80353236;rportMax-Forwards: 70User-Agent: SIPAUA/0.1.001Contact: "1002" <sip:1002@192.168.1.103:57288;transport=udp>Expires: 3600Authorization: Digest username="1002",realm="asterisk",nonce="26886c3d",uri="sip:194.190.8.171:5060",response="cc17aae74d45f06e4712aa66b08e68df",algorithm=MD5Content-Length: 019:54:51.380962 IP (tos 0x10, ttl 64, id 35866, offset 0, flags [none], proto UDP (17), length 636)194.190.8.171.5060 > 77.37.241.151.57288: SIP, length: 608SIP/2.0 200 OKVia: SIP/2.0/UDP 192.168.1.103:57288;received=77.37.241.151;branch=z9hG4bKf4d831e0612e1074bf49397d92907c80353236;rport=57288From: "1002" <sip:1002@194.190.8.171>;tag=134783744To: "1002" <sip:1002@194.190.8.171>;tag=as065abebaCSeq: 2406 REGISTERServer: Asterisk PBX 1.8.20.0Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISHSupported: replaces, timerExpires: 3600Contact: <sip:1002@192.168.1.103:57288;transport=udp>;expires=3600Date: Mon, 03 Feb 2014 15:54:51 GMTContent-Length: 0
19:54:51.406160 IP (tos 0x0, ttl 57, id 0, offset 0, flags [DF], proto UDP (17), length 395)77.37.241.151.57288 > 194.190.8.171.5060: SIP, length: 367OPTIONS sip:194.190.8.171 SIP/2.0CSeq: 1287 OPTIONSFrom: "1002" <sip:1002@194.190.8.171>;tag=3866552602To: "1002" <sip:1002@194.190.8.171>Via: SIP/2.0/UDP 192.168.1.103:57288;branch=z9hG4bK9bddae72a5ccaf0df80be00ba2882dfd353236;rportMax-Forwards: 70User-Agent: SIPAUA/0.1.001Content-Length: 019:54:51.407799 IP (tos 0x10, ttl 64, id 35867, offset 0, flags [none], proto UDP (17), length 458)194.190.8.171.5060 > 77.37.241.151.57288: SIP, length: 430SIP/2.0 484 Address IncompleteCSeq: 1287 OPTIONSFrom: "1002" <sip:1002@194.190.8.171>;tag=3866552602To: "1002" <sip:1002@194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.5162Via: SIP/2.0/UDP 192.168.1.103:57288;branch=z9hG4bK9bddae72a5ccaf0df80be00ba2882dfd353236;rport=57288;received=77.37.241.151Server: kamailio (4.1.1 (x86_64/linux))Content-Length: 02. from kamailio to asterisk.[root@kamaz sm1ly]# tcpdump -nn -i eth1 host 50.0.0.10 -v and port 5060tcpdump: listening on eth1, link-type EN10MB (Ethernet), capture size 65535 bytes19:54:41.906391 IP (tos 0x0, ttl 64, id 5618, offset 0, flags [none], proto UDP (17), length 597)50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569OPTIONS sip:1002@192.168.1.103:34713;transport=udp SIP/2.0Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK75f42160;rportMax-Forwards: 70From: "asterisk" <sip:asterisk@50.0.0.10>;tag=as40fc69eaTo: <sip:1002@192.168.1.103:34713;transport=udp>Contact: <sip:asterisk@50.0.0.10:5060>CSeq: 102 OPTIONSUser-Agent: Asterisk PBX 1.8.20.0Date: Mon, 03 Feb 2014 15:54:41 GMTAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISHSupported: replaces, timerContent-Length: 019:54:42.906385 IP (tos 0x0, ttl 64, id 5619, offset 0, flags [none], proto UDP (17), length 597)50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569OPTIONS sip:1002@192.168.1.103:34713;transport=udp SIP/2.0Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK75f42160;rportMax-Forwards: 70From: "asterisk" <sip:asterisk@50.0.0.10>;tag=as40fc69eaTo: <sip:1002@192.168.1.103:34713;transport=udp>Contact: <sip:asterisk@50.0.0.10:5060>CSeq: 102 OPTIONSUser-Agent: Asterisk PBX 1.8.20.0Date: Mon, 03 Feb 2014 15:54:41 GMTAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISHSupported: replaces, timerContent-Length: 019:54:43.906565 IP (tos 0x0, ttl 64, id 5620, offset 0, flags [none], proto UDP (17), length 597)50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569OPTIONS sip:1002@192.168.1.103:34713;transport=udp SIP/2.0Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK75f42160;rportMax-Forwards: 70From: "asterisk" <sip:asterisk@50.0.0.10>;tag=as40fc69eaTo: <sip:1002@192.168.1.103:34713;transport=udp>Contact: <sip:asterisk@50.0.0.10:5060>CSeq: 102 OPTIONSUser-Agent: Asterisk PBX 1.8.20.0Date: Mon, 03 Feb 2014 15:54:41 GMTAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISHSupported: replaces, timerContent-Length: 019:54:44.904726 IP (tos 0x10, ttl 64, id 34743, offset 0, flags [none], proto UDP (17), length 413)50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 385SIP/2.0 408 Request TimeoutVia: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK75f42160;rport=5060From: "asterisk" <sip:asterisk@50.0.0.10>;tag=as40fc69eaTo: <sip:1002@192.168.1.103:34713;transport=udp>;tag=6f6209fafb0c4bc816e1e7aa854ee2dd-8578CSeq: 102 OPTIONSServer: kamailio (4.1.1 (x86_64/linux))Content-Length: 019:54:51.207422 IP (tos 0x10, ttl 64, id 34744, offset 0, flags [none], proto UDP (17), length 531)50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 503REGISTER sip:194.190.8.171 SIP/2.0CSeq: 5569 REGISTERFrom: "1002" <sip:1002@194.190.8.171>;tag=2801080754To: "1002" <sip:1002@194.190.8.171>Via: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bKd8a1.094de0504827adb22c7b874f77dfd698.0Via: SIP/2.0/UDP 192.168.1.103:57288;received=77.37.241.151;branch=z9hG4bKe5bd1a6ceba7f0a0f4e7487cb17ca365353236;rport=57288Max-Forwards: 16User-Agent: SIPAUA/0.1.001Contact: *Expires: 0Content-Length: 019:54:51.209052 IP (tos 0x0, ttl 64, id 5621, offset 0, flags [none], proto UDP (17), length 713)50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 685SIP/2.0 401 UnauthorizedVia: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bKd8a1.094de0504827adb22c7b874f77dfd698.0;received=50.0.0.1;rport=5060Via: SIP/2.0/UDP 192.168.1.103:57288;received=77.37.241.151;branch=z9hG4bKe5bd1a6ceba7f0a0f4e7487cb17ca365353236;rport=57288From: "1002" <sip:1002@194.190.8.171>;tag=2801080754To: "1002" <sip:1002@194.190.8.171>;tag=as518dbea9CSeq: 5569 REGISTERServer: Asterisk PBX 1.8.20.0Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISHSupported: replaces, timerWWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="31daf0f8"Content-Length: 019:54:51.258759 IP (tos 0x10, ttl 64, id 34745, offset 0, flags [none], proto UDP (17), length 696)50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 668REGISTER sip:194.190.8.171:5060 SIP/2.0CSeq: 5570 REGISTERFrom: "1002" <sip:1002@194.190.8.171>;tag=2801080754To: "1002" <sip:1002@194.190.8.171>Via: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK56b1.d46d0ab6448c5edd99f24aa7ba8a2881.0Via: SIP/2.0/UDP 192.168.1.103:57288;received=77.37.241.151;branch=z9hG4bK440337c23337c9913220fd825f4d9ded353236;rport=57288Max-Forwards: 16User-Agent: SIPAUA/0.1.001Contact: *Expires: 0Authorization: Digest username="1002",realm="asterisk",nonce="31daf0f8",uri="sip:194.190.8.171:5060",response="2b0222b07da7af1c3b72c2eb36241f5f",algorithm=MD5Content-Length: 019:54:51.259902 IP (tos 0x0, ttl 64, id 5622, offset 0, flags [none], proto UDP (17), length 713)50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 685SIP/2.0 401 UnauthorizedVia: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK56b1.d46d0ab6448c5edd99f24aa7ba8a2881.0;received=50.0.0.1;rport=5060Via: SIP/2.0/UDP 192.168.1.103:57288;received=77.37.241.151;branch=z9hG4bK440337c23337c9913220fd825f4d9ded353236;rport=57288From: "1002" <sip:1002@194.190.8.171>;tag=2801080754To: "1002" <sip:1002@194.190.8.171>;tag=as0716dea5CSeq: 5570 REGISTERServer: Asterisk PBX 1.8.20.0Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISHSupported: replaces, timerWWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="2f70c759"Content-Length: 019:54:51.292190 IP (tos 0x10, ttl 64, id 34746, offset 0, flags [none], proto UDP (17), length 696)50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 668REGISTER sip:194.190.8.171:5060 SIP/2.0CSeq: 5571 REGISTERFrom: "1002" <sip:1002@194.190.8.171>;tag=2801080754To: "1002" <sip:1002@194.190.8.171>Via: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK66b1.0173e2524e6deda0f27b83591a62730f.0Via: SIP/2.0/UDP 192.168.1.103:57288;received=77.37.241.151;branch=z9hG4bK30fe030eee49e2eb50c619074c0f057b353236;rport=57288Max-Forwards: 16User-Agent: SIPAUA/0.1.001Contact: *Expires: 0Authorization: Digest username="1002",realm="asterisk",nonce="2f70c759",uri="sip:194.190.8.171:5060",response="9eb7d157cfd0d8e8575b59c94c5f82f6",algorithm=MD5Content-Length: 019:54:51.293302 IP (tos 0x0, ttl 64, id 5623, offset 0, flags [none], proto UDP (17), length 676)50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 648SIP/2.0 200 OKVia: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK66b1.0173e2524e6deda0f27b83591a62730f.0;received=50.0.0.1;rport=5060Via: SIP/2.0/UDP 192.168.1.103:57288;received=77.37.241.151;branch=z9hG4bK30fe030eee49e2eb50c619074c0f057b353236;rport=57288From: "1002" <sip:1002@194.190.8.171>;tag=2801080754To: "1002" <sip:1002@194.190.8.171>;tag=as0716dea5CSeq: 5571 REGISTERServer: Asterisk PBX 1.8.20.0Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISHSupported: replaces, timerExpires: 0Date: Mon, 03 Feb 2014 15:54:51 GMTContent-Length: 019:54:51.317242 IP (tos 0x10, ttl 64, id 34747, offset 0, flags [none], proto UDP (17), length 583)50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 555REGISTER sip:194.190.8.171 SIP/2.0CSeq: 2404 REGISTERFrom: "1002" <sip:1002@194.190.8.171>;tag=134783744To: "1002" <sip:1002@194.190.8.171>Via: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK2624.44980ae0ad3ba5026d6f044c24770539.0Via: SIP/2.0/UDP 192.168.1.103:57288;received=77.37.241.151;branch=z9hG4bKdeb946998664720c2c93538625cc649e353236;rport=57288Max-Forwards: 16User-Agent: SIPAUA/0.1.001Contact: "1002" <sip:1002@192.168.1.103:57288;transport=udp>Expires: 3600Content-Length: 019:54:51.318123 IP (tos 0x0, ttl 64, id 5624, offset 0, flags [none], proto UDP (17), length 712)50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 684SIP/2.0 401 UnauthorizedVia: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK2624.44980ae0ad3ba5026d6f044c24770539.0;received=50.0.0.1;rport=5060Via: SIP/2.0/UDP 192.168.1.103:57288;received=77.37.241.151;branch=z9hG4bKdeb946998664720c2c93538625cc649e353236;rport=57288From: "1002" <sip:1002@194.190.8.171>;tag=134783744To: "1002" <sip:1002@194.190.8.171>;tag=as0bba2324CSeq: 2404 REGISTERServer: Asterisk PBX 1.8.20.0Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISHSupported: replaces, timerWWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="023deb34"Content-Length: 019:54:51.346522 IP (tos 0x10, ttl 64, id 34748, offset 0, flags [none], proto UDP (17), length 748)50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 720REGISTER sip:194.190.8.171:5060 SIP/2.0CSeq: 2405 REGISTERFrom: "1002" <sip:1002@194.190.8.171>;tag=134783744To: "1002" <sip:1002@194.190.8.171>Via: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK3624.173cef757dc8f7da8b864ee1ab1bfe50.0Via: SIP/2.0/UDP 192.168.1.103:57288;received=77.37.241.151;branch=z9hG4bK60a6798f72024444a9870698b766a04c353236;rport=57288Max-Forwards: 16User-Agent: SIPAUA/0.1.001Contact: "1002" <sip:1002@192.168.1.103:57288;transport=udp>Expires: 3600Authorization: Digest username="1002",realm="asterisk",nonce="023deb34",uri="sip:194.190.8.171:5060",response="7fa5be98c7c0c395ed41f9e7da095629",algorithm=MD5Content-Length: 019:54:51.348056 IP (tos 0x0, ttl 64, id 5625, offset 0, flags [none], proto UDP (17), length 712)50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 684SIP/2.0 401 UnauthorizedVia: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK3624.173cef757dc8f7da8b864ee1ab1bfe50.0;received=50.0.0.1;rport=5060Via: SIP/2.0/UDP 192.168.1.103:57288;received=77.37.241.151;branch=z9hG4bK60a6798f72024444a9870698b766a04c353236;rport=57288From: "1002" <sip:1002@194.190.8.171>;tag=134783744To: "1002" <sip:1002@194.190.8.171>;tag=as065abebaCSeq: 2405 REGISTERServer: Asterisk PBX 1.8.20.0Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISHSupported: replaces, timerWWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="26886c3d"Content-Length: 019:54:51.373298 IP (tos 0x10, ttl 64, id 34749, offset 0, flags [none], proto UDP (17), length 748)50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 720REGISTER sip:194.190.8.171:5060 SIP/2.0CSeq: 2406 REGISTERFrom: "1002" <sip:1002@194.190.8.171>;tag=134783744To: "1002" <sip:1002@194.190.8.171>Via: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK0624.82ac15efd62f203c1b009e3ab3c711bc.0Via: SIP/2.0/UDP 192.168.1.103:57288;received=77.37.241.151;branch=z9hG4bKf4d831e0612e1074bf49397d92907c80353236;rport=57288Max-Forwards: 16User-Agent: SIPAUA/0.1.001Contact: "1002" <sip:1002@192.168.1.103:57288;transport=udp>Expires: 3600Authorization: Digest username="1002",realm="asterisk",nonce="26886c3d",uri="sip:194.190.8.171:5060",response="cc17aae74d45f06e4712aa66b08e68df",algorithm=MD5Content-Length: 019:54:51.374893 IP (tos 0x0, ttl 64, id 5626, offset 0, flags [none], proto UDP (17), length 597)50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569OPTIONS sip:1002@192.168.1.103:57288;transport=udp SIP/2.0Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK129c83a7;rportMax-Forwards: 70From: "asterisk" <sip:asterisk@50.0.0.10>;tag=as40306b56To: <sip:1002@192.168.1.103:57288;transport=udp>Contact: <sip:asterisk@50.0.0.10:5060>CSeq: 102 OPTIONSUser-Agent: Asterisk PBX 1.8.20.0Date: Mon, 03 Feb 2014 15:54:51 GMTAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISHSupported: replaces, timerContent-Length: 019:54:51.374906 IP (tos 0x0, ttl 64, id 5627, offset 0, flags [none], proto UDP (17), length 746)50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 718SIP/2.0 200 OKVia: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK0624.82ac15efd62f203c1b009e3ab3c711bc.0;received=50.0.0.1;rport=5060Via: SIP/2.0/UDP 192.168.1.103:57288;received=77.37.241.151;branch=z9hG4bKf4d831e0612e1074bf49397d92907c80353236;rport=57288From: "1002" <sip:1002@194.190.8.171>;tag=134783744To: "1002" <sip:1002@194.190.8.171>;tag=as065abebaCSeq: 2406 REGISTERServer: Asterisk PBX 1.8.20.0Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISHSupported: replaces, timerExpires: 3600Contact: <sip:1002@192.168.1.103:57288;transport=udp>;expires=3600Date: Mon, 03 Feb 2014 15:54:51 GMTContent-Length: 0
19:54:52.375165 IP (tos 0x0, ttl 64, id 5628, offset 0, flags [none], proto UDP (17), length 597)50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569OPTIONS sip:1002@192.168.1.103:57288;transport=udp SIP/2.0Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK129c83a7;rportMax-Forwards: 70From: "asterisk" <sip:asterisk@50.0.0.10>;tag=as40306b56To: <sip:1002@192.168.1.103:57288;transport=udp>Contact: <sip:asterisk@50.0.0.10:5060>CSeq: 102 OPTIONSUser-Agent: Asterisk PBX 1.8.20.0Date: Mon, 03 Feb 2014 15:54:51 GMTAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISHSupported: replaces, timerContent-Length: 019:54:53.375333 IP (tos 0x0, ttl 64, id 5629, offset 0, flags [none], proto UDP (17), length 597)50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569OPTIONS sip:1002@192.168.1.103:57288;transport=udp SIP/2.0Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK129c83a7;rportMax-Forwards: 70From: "asterisk" <sip:asterisk@50.0.0.10>;tag=as40306b56To: <sip:1002@192.168.1.103:57288;transport=udp>Contact: <sip:asterisk@50.0.0.10:5060>CSeq: 102 OPTIONSUser-Agent: Asterisk PBX 1.8.20.0Date: Mon, 03 Feb 2014 15:54:51 GMTAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISHSupported: replaces, timerContent-Length: 019:54:54.342025 IP (tos 0x10, ttl 64, id 34750, offset 0, flags [none], proto UDP (17), length 413)50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 385SIP/2.0 408 Request TimeoutVia: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK129c83a7;rport=5060From: "asterisk" <sip:asterisk@50.0.0.10>;tag=as40306b56To: <sip:1002@192.168.1.103:57288;transport=udp>;tag=6f6209fafb0c4bc816e1e7aa854ee2dd-1f6eCSeq: 102 OPTIONSServer: kamailio (4.1.1 (x86_64/linux))Content-Length: 03. on asterisk to kamailio[root@astkamaz sm1ly]# tcpdump -nn -i eth0 -v host 50.0.0.1 and port 5060tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes19:54:41.906401 IP (tos 0x0, ttl 64, id 5618, offset 0, flags [none], proto UDP (17), length 597)50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569OPTIONS sip:1002@192.168.1.103:34713;transport=udp SIP/2.0Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK75f42160;rportMax-Forwards: 70From: "asterisk" <sip:asterisk@50.0.0.10>;tag=as40fc69eaTo: <sip:1002@192.168.1.103:34713;transport=udp>Contact: <sip:asterisk@50.0.0.10:5060>CSeq: 102 OPTIONSUser-Agent: Asterisk PBX 1.8.20.0Date: Mon, 03 Feb 2014 15:54:41 GMTAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISHSupported: replaces, timerContent-Length: 019:54:42.906581 IP (tos 0x0, ttl 64, id 5619, offset 0, flags [none], proto UDP (17), length 597)50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569OPTIONS sip:1002@192.168.1.103:34713;transport=udp SIP/2.0Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK75f42160;rportMax-Forwards: 70From: "asterisk" <sip:asterisk@50.0.0.10>;tag=as40fc69eaTo: <sip:1002@192.168.1.103:34713;transport=udp>Contact: <sip:asterisk@50.0.0.10:5060>CSeq: 102 OPTIONSUser-Agent: Asterisk PBX 1.8.20.0Date: Mon, 03 Feb 2014 15:54:41 GMTAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISHSupported: replaces, timerContent-Length: 019:54:43.906740 IP (tos 0x0, ttl 64, id 5620, offset 0, flags [none], proto UDP (17), length 597)50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569OPTIONS sip:1002@192.168.1.103:34713;transport=udp SIP/2.0Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK75f42160;rportMax-Forwards: 70From: "asterisk" <sip:asterisk@50.0.0.10>;tag=as40fc69eaTo: <sip:1002@192.168.1.103:34713;transport=udp>Contact: <sip:asterisk@50.0.0.10:5060>CSeq: 102 OPTIONSUser-Agent: Asterisk PBX 1.8.20.0Date: Mon, 03 Feb 2014 15:54:41 GMTAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISHSupported: replaces, timerContent-Length: 019:54:44.905366 IP (tos 0x10, ttl 64, id 34743, offset 0, flags [none], proto UDP (17), length 413)50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 385SIP/2.0 408 Request TimeoutVia: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK75f42160;rport=5060From: "asterisk" <sip:asterisk@50.0.0.10>;tag=as40fc69eaTo: <sip:1002@192.168.1.103:34713;transport=udp>;tag=6f6209fafb0c4bc816e1e7aa854ee2dd-8578CSeq: 102 OPTIONSServer: kamailio (4.1.1 (x86_64/linux))Content-Length: 019:54:51.208464 IP (tos 0x10, ttl 64, id 34744, offset 0, flags [none], proto UDP (17), length 531)50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 503REGISTER sip:194.190.8.171 SIP/2.0CSeq: 5569 REGISTERFrom: "1002" <sip:1002@194.190.8.171>;tag=2801080754To: "1002" <sip:1002@194.190.8.171>Via: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bKd8a1.094de0504827adb22c7b874f77dfd698.0Via: SIP/2.0/UDP 192.168.1.103:57288;received=77.37.241.151;branch=z9hG4bKe5bd1a6ceba7f0a0f4e7487cb17ca365353236;rport=57288Max-Forwards: 16User-Agent: SIPAUA/0.1.001Contact: *Expires: 0Content-Length: 019:54:51.209176 IP (tos 0x0, ttl 64, id 5621, offset 0, flags [none], proto UDP (17), length 713)50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 685SIP/2.0 401 UnauthorizedVia: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bKd8a1.094de0504827adb22c7b874f77dfd698.0;received=50.0.0.1;rport=5060Via: SIP/2.0/UDP 192.168.1.103:57288;received=77.37.241.151;branch=z9hG4bKe5bd1a6ceba7f0a0f4e7487cb17ca365353236;rport=57288From: "1002" <sip:1002@194.190.8.171>;tag=2801080754To: "1002" <sip:1002@194.190.8.171>;tag=as518dbea9CSeq: 5569 REGISTERServer: Asterisk PBX 1.8.20.0Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISHSupported: replaces, timerWWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="31daf0f8"Content-Length: 019:54:51.259436 IP (tos 0x10, ttl 64, id 34745, offset 0, flags [none], proto UDP (17), length 696)50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 668REGISTER sip:194.190.8.171:5060 SIP/2.0CSeq: 5570 REGISTERFrom: "1002" <sip:1002@194.190.8.171>;tag=2801080754To: "1002" <sip:1002@194.190.8.171>Via: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK56b1.d46d0ab6448c5edd99f24aa7ba8a2881.0Via: SIP/2.0/UDP 192.168.1.103:57288;received=77.37.241.151;branch=z9hG4bK440337c23337c9913220fd825f4d9ded353236;rport=57288Max-Forwards: 16User-Agent: SIPAUA/0.1.001Contact: *Expires: 0Authorization: Digest username="1002",realm="asterisk",nonce="31daf0f8",uri="sip:194.190.8.171:5060",response="2b0222b07da7af1c3b72c2eb36241f5f",algorithm=MD5Content-Length: 019:54:51.260101 IP (tos 0x0, ttl 64, id 5622, offset 0, flags [none], proto UDP (17), length 713)50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 685SIP/2.0 401 UnauthorizedVia: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK56b1.d46d0ab6448c5edd99f24aa7ba8a2881.0;received=50.0.0.1;rport=5060Via: SIP/2.0/UDP 192.168.1.103:57288;received=77.37.241.151;branch=z9hG4bK440337c23337c9913220fd825f4d9ded353236;rport=57288From: "1002" <sip:1002@194.190.8.171>;tag=2801080754To: "1002" <sip:1002@194.190.8.171>;tag=as0716dea5CSeq: 5570 REGISTERServer: Asterisk PBX 1.8.20.0Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISHSupported: replaces, timerWWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="2f70c759"Content-Length: 019:54:51.292708 IP (tos 0x10, ttl 64, id 34746, offset 0, flags [none], proto UDP (17), length 696)50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 668REGISTER sip:194.190.8.171:5060 SIP/2.0CSeq: 5571 REGISTERFrom: "1002" <sip:1002@194.190.8.171>;tag=2801080754To: "1002" <sip:1002@194.190.8.171>Via: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK66b1.0173e2524e6deda0f27b83591a62730f.0Via: SIP/2.0/UDP 192.168.1.103:57288;received=77.37.241.151;branch=z9hG4bK30fe030eee49e2eb50c619074c0f057b353236;rport=57288Max-Forwards: 16User-Agent: SIPAUA/0.1.001Contact: *Expires: 0Authorization: Digest username="1002",realm="asterisk",nonce="2f70c759",uri="sip:194.190.8.171:5060",response="9eb7d157cfd0d8e8575b59c94c5f82f6",algorithm=MD5Content-Length: 019:54:51.293541 IP (tos 0x0, ttl 64, id 5623, offset 0, flags [none], proto UDP (17), length 676)50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 648SIP/2.0 200 OKVia: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK66b1.0173e2524e6deda0f27b83591a62730f.0;received=50.0.0.1;rport=5060Via: SIP/2.0/UDP 192.168.1.103:57288;received=77.37.241.151;branch=z9hG4bK30fe030eee49e2eb50c619074c0f057b353236;rport=57288From: "1002" <sip:1002@194.190.8.171>;tag=2801080754To: "1002" <sip:1002@194.190.8.171>;tag=as0716dea5CSeq: 5571 REGISTERServer: Asterisk PBX 1.8.20.0Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISHSupported: replaces, timerExpires: 0Date: Mon, 03 Feb 2014 15:54:51 GMTContent-Length: 019:54:51.317704 IP (tos 0x10, ttl 64, id 34747, offset 0, flags [none], proto UDP (17), length 583)50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 555REGISTER sip:194.190.8.171 SIP/2.0CSeq: 2404 REGISTERFrom: "1002" <sip:1002@194.190.8.171>;tag=134783744To: "1002" <sip:1002@194.190.8.171>Via: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK2624.44980ae0ad3ba5026d6f044c24770539.0Via: SIP/2.0/UDP 192.168.1.103:57288;received=77.37.241.151;branch=z9hG4bKdeb946998664720c2c93538625cc649e353236;rport=57288Max-Forwards: 16User-Agent: SIPAUA/0.1.001Contact: "1002" <sip:1002@192.168.1.103:57288;transport=udp>Expires: 3600Content-Length: 019:54:51.318355 IP (tos 0x0, ttl 64, id 5624, offset 0, flags [none], proto UDP (17), length 712)50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 684SIP/2.0 401 UnauthorizedVia: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK2624.44980ae0ad3ba5026d6f044c24770539.0;received=50.0.0.1;rport=5060Via: SIP/2.0/UDP 192.168.1.103:57288;received=77.37.241.151;branch=z9hG4bKdeb946998664720c2c93538625cc649e353236;rport=57288From: "1002" <sip:1002@194.190.8.171>;tag=134783744To: "1002" <sip:1002@194.190.8.171>;tag=as0bba2324CSeq: 2404 REGISTERServer: Asterisk PBX 1.8.20.0Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISHSupported: replaces, timerWWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="023deb34"Content-Length: 019:54:51.347429 IP (tos 0x10, ttl 64, id 34748, offset 0, flags [none], proto UDP (17), length 748)50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 720REGISTER sip:194.190.8.171:5060 SIP/2.0CSeq: 2405 REGISTERFrom: "1002" <sip:1002@194.190.8.171>;tag=134783744To: "1002" <sip:1002@194.190.8.171>Via: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK3624.173cef757dc8f7da8b864ee1ab1bfe50.0Via: SIP/2.0/UDP 192.168.1.103:57288;received=77.37.241.151;branch=z9hG4bK60a6798f72024444a9870698b766a04c353236;rport=57288Max-Forwards: 16User-Agent: SIPAUA/0.1.001Contact: "1002" <sip:1002@192.168.1.103:57288;transport=udp>Expires: 3600Authorization: Digest username="1002",realm="asterisk",nonce="023deb34",uri="sip:194.190.8.171:5060",response="7fa5be98c7c0c395ed41f9e7da095629",algorithm=MD5Content-Length: 019:54:51.348212 IP (tos 0x0, ttl 64, id 5625, offset 0, flags [none], proto UDP (17), length 712)50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 684SIP/2.0 401 UnauthorizedVia: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK3624.173cef757dc8f7da8b864ee1ab1bfe50.0;received=50.0.0.1;rport=5060Via: SIP/2.0/UDP 192.168.1.103:57288;received=77.37.241.151;branch=z9hG4bK60a6798f72024444a9870698b766a04c353236;rport=57288From: "1002" <sip:1002@194.190.8.171>;tag=134783744To: "1002" <sip:1002@194.190.8.171>;tag=as065abebaCSeq: 2405 REGISTERServer: Asterisk PBX 1.8.20.0Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISHSupported: replaces, timerWWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="26886c3d"Content-Length: 019:54:51.373777 IP (tos 0x10, ttl 64, id 34749, offset 0, flags [none], proto UDP (17), length 748)50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 720REGISTER sip:194.190.8.171:5060 SIP/2.0CSeq: 2406 REGISTERFrom: "1002" <sip:1002@194.190.8.171>;tag=134783744To: "1002" <sip:1002@194.190.8.171>Via: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK0624.82ac15efd62f203c1b009e3ab3c711bc.0Via: SIP/2.0/UDP 192.168.1.103:57288;received=77.37.241.151;branch=z9hG4bKf4d831e0612e1074bf49397d92907c80353236;rport=57288Max-Forwards: 16User-Agent: SIPAUA/0.1.001Contact: "1002" <sip:1002@192.168.1.103:57288;transport=udp>Expires: 3600Authorization: Digest username="1002",realm="asterisk",nonce="26886c3d",uri="sip:194.190.8.171:5060",response="cc17aae74d45f06e4712aa66b08e68df",algorithm=MD5Content-Length: 019:54:51.374731 IP (tos 0x0, ttl 64, id 5626, offset 0, flags [none], proto UDP (17), length 597)50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569OPTIONS sip:1002@192.168.1.103:57288;transport=udp SIP/2.0Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK129c83a7;rportMax-Forwards: 70From: "asterisk" <sip:asterisk@50.0.0.10>;tag=as40306b56To: <sip:1002@192.168.1.103:57288;transport=udp>Contact: <sip:asterisk@50.0.0.10:5060>CSeq: 102 OPTIONSUser-Agent: Asterisk PBX 1.8.20.0Date: Mon, 03 Feb 2014 15:54:51 GMTAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISHSupported: replaces, timerContent-Length: 019:54:51.374804 IP (tos 0x0, ttl 64, id 5627, offset 0, flags [none], proto UDP (17), length 746)50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 718SIP/2.0 200 OKVia: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK0624.82ac15efd62f203c1b009e3ab3c711bc.0;received=50.0.0.1;rport=5060Via: SIP/2.0/UDP 192.168.1.103:57288;received=77.37.241.151;branch=z9hG4bKf4d831e0612e1074bf49397d92907c80353236;rport=57288From: "1002" <sip:1002@194.190.8.171>;tag=134783744To: "1002" <sip:1002@194.190.8.171>;tag=as065abebaCSeq: 2406 REGISTERServer: Asterisk PBX 1.8.20.0Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISHSupported: replaces, timerExpires: 3600Contact: <sip:1002@192.168.1.103:57288;transport=udp>;expires=3600Date: Mon, 03 Feb 2014 15:54:51 GMTContent-Length: 0
19:54:52.375348 IP (tos 0x0, ttl 64, id 5628, offset 0, flags [none], proto UDP (17), length 597)50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569OPTIONS sip:1002@192.168.1.103:57288;transport=udp SIP/2.0Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK129c83a7;rportMax-Forwards: 70From: "asterisk" <sip:asterisk@50.0.0.10>;tag=as40306b56To: <sip:1002@192.168.1.103:57288;transport=udp>Contact: <sip:asterisk@50.0.0.10:5060>CSeq: 102 OPTIONSUser-Agent: Asterisk PBX 1.8.20.0Date: Mon, 03 Feb 2014 15:54:51 GMTAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISHSupported: replaces, timerContent-Length: 019:54:53.375562 IP (tos 0x0, ttl 64, id 5629, offset 0, flags [none], proto UDP (17), length 597)50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569OPTIONS sip:1002@192.168.1.103:57288;transport=udp SIP/2.0Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK129c83a7;rportMax-Forwards: 70From: "asterisk" <sip:asterisk@50.0.0.10>;tag=as40306b56To: <sip:1002@192.168.1.103:57288;transport=udp>Contact: <sip:asterisk@50.0.0.10:5060>CSeq: 102 OPTIONSUser-Agent: Asterisk PBX 1.8.20.0Date: Mon, 03 Feb 2014 15:54:51 GMTAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISHSupported: replaces, timerContent-Length: 019:54:54.342525 IP (tos 0x10, ttl 64, id 34750, offset 0, flags [none], proto UDP (17), length 413)50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 385SIP/2.0 408 Request TimeoutVia: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK129c83a7;rport=5060From: "asterisk" <sip:asterisk@50.0.0.10>;tag=as40306b56To: <sip:1002@192.168.1.103:57288;transport=udp>;tag=6f6209fafb0c4bc816e1e7aa854ee2dd-1f6eCSeq: 102 OPTIONSServer: kamailio (4.1.1 (x86_64/linux))Content-Length: 0####### Defined Values ######### # - flags # FLT_ - per transaction (message) flags # FLB_ - per branch flags #!define FLT_ACC 1 #!define FLT_ACCMISSED 2 #!define FLT_ACCFAILED 3 #!define FLT_NATS 5 #!define FLB_NATB 6 #!define FLB_NATSIPPING 7 ####### Global Parameters ######### # Enable debugging only when kamailio is mading boo-boo ### LOG Levels: 3=DBG, 2=INFO, 1=NOTICE, 0=WARN, -1=ERR debug=3 log_stderror=no memdbg=5 memlog=5 log_facility=LOG_LOCAL0 fork=yes children=8 /* uncomment the next line to disable TCP (default on) */ disable_tcp=yes /* uncomment the next line to disable the auto discovery of local aliases based on reverse DNS on IPs (default on) */ auto_aliases=no /* add local domain aliases */ #alias="kamaz.ikatele.com" /* uncomment and configure the following line if you want Kamailio to bind on a specific interface/port/proto (default bind on all available) */ #listen=udp:50.0.0.1:5060 advertise 194.190.8.171:5060 #listen=udp:194.190.8.171:5060 advertise 50.0.0.1:5060 listen=udp:194.190.8.171 listen=udp:50.0.0.1 dns=no rev_dns=no check_via=yes /* port to listen to * - can be specified more than once if needed to listen on many ports */ port=5060 mhomed=1 ####### Modules Section ######## # set paths to location of modules (to sources or installation folders) mpath="/usr/lib64/kamailio/modules/" loadmodule "mi_fifo.so" loadmodule "kex.so" loadmodule "tm.so" loadmodule "tmx.so" loadmodule "sl.so" loadmodule "rr.so" loadmodule "pv.so" loadmodule "maxfwd.so" loadmodule "usrloc.so" loadmodule "registrar.so" loadmodule "textops.so" loadmodule "siputils.so" loadmodule "xlog.so" loadmodule "sanity.so" loadmodule "ctl.so" loadmodule "cfg_rpc.so" loadmodule "mi_rpc.so" loadmodule "acc.so" loadmodule "nathelper.so" loadmodule "rtpproxy.so" #loadmodule "topoh.so" #modparam("topoh", "mask_key", "balalayka") #modparam("topoh", "mask_ip", "50.0.0.1") # ----------------- setting module-specific parameters --------------- # ----- mi_fifo params ----- modparam("mi_fifo", "fifo_name", "/tmp/kamailio_fifo") # ----- tm params ----- # auto-discard branches from previous serial forking leg modparam("tm", "failure_reply_mode", 3) # default retransmission timeout: 30sec modparam("tm", "fr_timer", 3000) # default invite retransmission timeout after 1xx: 120sec modparam("tm", "fr_inv_timer", 12000) # ----- rr params ----- # add value to ;lr param to cope with most of the UAs modparam("rr", "enable_full_lr", 1) # do not append from tag to the RR (no need for this script) modparam("rr", "append_fromtag", 1) # ----- rtpproxy params ----- modparam("rtpproxy", "rtpproxy_sock", "udp:127.0.0.1:7722") # ----- nathelper params ----- modparam("nathelper", "natping_interval", 30) modparam("nathelper", "ping_nated_only", 1) modparam("nathelper", "sipping_bflag", FLB_NATSIPPING) modparam("nathelper", "sipping_from", "sip:pinger@194.190.8.171") # params needed for NAT traversal in other modules modparam("nathelper", "received_avp", "$avp(RECEIVED)") modparam("usrloc", "nat_bflag", FLB_NATB) ####### Routing Logic ######## # Main SIP request routing logic # - processing of any incoming SIP request starts with this route # - note: this is the same as route { ... } route { # per request initial checks route(REQINIT); # NAT detection xlog("L_NOTICE","$rm from $fu (IP:$si:$sp) Main Route before ---NAT---\n"); route(NATDETECT); xlog("L_NOTICE","$rm from $fu (IP:$si:$sp) in Route[NATDETECT] fix_nat-register\n"); # CANCEL processing if (is_method("CANCEL")) { if (t_check_trans()) { route(RELAY); } exit; } # handle requests within SIP dialogs route(WITHINDLG); ### only initial requests (no To tag) t_check_trans(); # record routing for dialog forming requests (in case they are routed) # - remove preloaded route headers remove_hf("Route"); if (is_method("INVITE|SUBSCRIBE")) record_route(); # account only INVITEs if (is_method("INVITE")) { setflag(FLT_ACC); # do accounting } # dispatch requests to foreign domains route(SIPOUT); # handle registrations route(REGISTRAR); if ($rU==$null) { # request with no Username in RURI sl_send_reply("484","Address Incomplete"); exit; } route(RELAY); } # Per SIP request initial checks route[REQINIT] { if (!mf_process_maxfwd_header("20")) { xlog("L_NOTICE","$rm from $fu (IP:$si:$sp) in MAX FDW HEADERS ALARMO\n"); sl_send_reply("483","Too Many Hops"); exit; } if(!sanity_check("1511", "7")) { xlog("Malformed SIP message from $si:$sp\n"); exit; } } # Caller NAT detection route route[NATDETECT] { force_rport(); if (nat_uac_test("19")) { if (is_method("REGISTER")) { fix_nated_register(); } else { if(is_first_hop()) set_contact_alias(); } setflag(FLT_NATS); } return; } # Handle requests within SIP dialogs route[WITHINDLG] { if (has_totag()) { # sequential request withing a dialog should # take the path determined by record-routing if (loose_route()) { route(DLGURI); if (is_method("BYE")) { setflag(FLT_ACC); # do accounting ... setflag(FLT_ACCFAILED); # ... even if the transaction fails } else if ( is_method("ACK") ) { # ACK is forwarded statelessy route(NATMANAGE); } else if ( is_method("NOTIFY") ) { # Add Record-Route for in-dialog NOTIFY as per RFC 6665. record_route(); } route(RELAY); } else { if ( is_method("ACK") ) { if ( t_check_trans() ) { # no loose-route, but stateful ACK; # must be an ACK after a 487 # or e.g. 404 from upstream server route(RELAY); exit; } else { xlog("L_NOTICE","ACK without matching transaction ... ignore and discard\n"); # ACK without matching transaction ... ignore and discard exit; } } sl_send_reply("404","Not here"); } exit; } } # Routing to foreign domains route[SIPOUT] { if (!uri==myself) { append_hf("P-hint: outbound\r\n"); route(RELAY); } } # Handle SIP registrations route[REGISTRAR] { if (is_method("REGISTER")) { # if(isflagset(FLT_NATS)) # { # setbflag(FLB_NATB); # # uncomment next line to do SIP NAT pinging # xlog("L_NOTICE","--------------------- SIP NAT PINGING --------------------------------------\n"); # setbflag(FLB_NATSIPPING); # } # if (!save("location")) # sl_reply_error(); # xlog("L_NOTICE","--------------------- SL REPLY ERROR --------------------------------------\n"); if( t_check_trans() ) { xlog("L_NOTICE","Transaction already exist, forwarding\n"); } else { xlog("L_NOTICE","New transaction upcoming, creating\n"); # forward("50.0.0.10"); # save("sip:50.0.0.10","0x02"); t_relay_to_udp("50.0.0.10", "5060"); exit; } exit; } } route[RELAY] { # enable additional event routes for forwarded requests # - serial forking, RTP relaying handling, a.s.o. xlog("L_NOTICE","Default routing block raised!\n"); if (is_method("INVITE|BYE|SUBSCRIBE|UPDATE")) { if(!t_is_set("branch_route")) t_on_branch("MANAGE_BRANCH"); } if (is_method("INVITE|SUBSCRIBE|UPDATE")) { if(!t_is_set("onreply_route")) t_on_reply("MANAGE_REPLY"); } if (is_method("INVITE")) { if(!t_is_set("failure_route")) t_on_failure("MANAGE_FAILURE"); } if (!t_relay()) { sl_reply_error(); } exit; } # RTPProxy control route[NATMANAGE] { if (is_request()) { if(has_totag()) { if(check_route_param("nat=yes")) { xlog("L_NOTICE","------------------------------------ SETBFLAG ----------------------------\n"); setbflag(FLB_NATB); } } } if (!(isflagset(FLT_NATS) || isbflagset(FLB_NATB))) return; rtpproxy_manage(); if (is_request()) { if (!has_totag()) { if(t_is_branch_route()) { xlog("L_NOTICE","------------------------------------ ADD RR PARAM NAT YES ----------------------------\n"); add_rr_param(";nat=yes"); } } } if (is_reply()) { if(isbflagset(FLB_NATB)) { if(is_first_hop()) xlog("L_NOTICE","------------------------------------ IS FIRST HOP SRT CONACT ALIAS ----------------------------\n"); set_contact_alias(); } xlog("L_NOTICE","$rm from $fu (IP:$si:$sp) in route[NATMANAGE] RTPproxy with EI Flags\n"); } return; } # URI update for dialog requests route[DLGURI] { if(!isdsturiset()) { handle_ruri_alias(); xlog("L_NOTICE","$rm from $fu (IP:$si:$sp) in route[DLGURI] RTPproxy with EI Flags\n"); } return; } # manage outgoing branches branch_route[MANAGE_BRANCH] { xlog("L_NOTICE","$rm from $fu (IP:$si:$sp) in MANAGE_BRANCH\n"); xdbg("new branch [$T_branch_idx] to $ru\n"); route(NATMANAGE); } # manage incoming replies onreply_route[MANAGE_REPLY] { xlog("L_NOTICE","$rm from $fu (IP:$si:$sp) in MANAGE_REPLY\n"); xdbg("incoming reply\n"); if(status=~"[12][0-9][0-9]") route(NATMANAGE); } # manage failure routing cases failure_route[MANAGE_FAILURE] { xlog("L_NOTICE","$rm from $fu (IP:$si:$sp) in MANAGE_FAILURE\n"); route(NATMANAGE); if (t_is_canceled()) { exit; } } route[DEBUG] { if (method==("PUBLISH|SUBSCRIBE|REGISTER|OPTIONS")) { return; } xlog("[$mi] Received SIP Message (method: $rm) ($ml bytes) to $Ri:$Rp from $si:$sp:\n$mb\n"); }
----------------------------------------------------------------------
Message: 1
Date: Mon, 3 Feb 2014 15:14:19 +0400
From: "*sm1Ly" <st.uzver@gmail.com>
To: dipak.biswas@mezocliq.com, sr-users@lists.sip-router.org
Subject: Re: [SR-Users] Kamailio not mdifying Contact in multi-homed
setup
Message-ID:
<CABCivXiED_CDQiJtgQ-p_XQ1h8p3rbkE3fnxnS2iuUH+kdHZvA@mail.gmail.com>
Content-Type: text/plain; charset="iso-8859-1"
hello, I got the same issue. my sip device getting ok from kamailio, but
asterisk reply 401.
but.
this is my config: http://pastebin.com/jGCak01E
and I changed regfwd route to
$du = "sip:50.0.0.10:5060;transport=udp";
forward();
and now I see this in logs:
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[parser/msg_parser.c:633]: parse_msg(): SIP Reply (status):
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[parser/msg_parser.c:635]: parse_msg(): version: <SIP/2.0>
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[parser/msg_parser.c:637]: parse_msg(): status: <200>
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[parser/msg_parser.c:639]: parse_msg(): reason: <OK>
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[parser/parse_via.c:1284]: parse_via_param(): Found param type 232,
<branch> = <0>; state=16
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[parser/parse_via.c:2672]: parse_via(): end of header reached, state=5
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[parser/msg_parser.c:513]: parse_headers(): parse_headers: Via found,
flags=2
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[parser/msg_parser.c:515]: parse_headers(): parse_headers: this is the
first via
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[receive.c:152]: receive_msg(): After parse_msg...
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: tm
[t_lookup.c:1071]: t_check_msg(): DEBUG: t_check_msg: msg id=25 global
id=24 T start=(nil)
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[parser/parse_addr_spec.c:176]: parse_to_param(): DEBUG: add_param:
tag=006cfccc318be31188fc19977b3a5651
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[parser/parse_addr_spec.c:885]: parse_addr_spec(): end of header reached,
state=29
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[parser/msg_parser.c:190]: get_hdr_field(): DEBUG: get_hdr_field: <To>
[63]; uri=[sip:77.37.241.151:5060]
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[parser/msg_parser.c:192]: get_hdr_field(): DEBUG: to body [<sip:
77.37.241.151:5060>]
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[parser/msg_parser.c:170]: get_hdr_field(): get_hdr_field: cseq <CSeq>: <1>
<OPTIONS>
*Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: tm
[t_lookup.c:1045]: t_reply_matching(): DEBUG: t_reply_matching: failure to
match a transaction*
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: tm
[t_lookup.c:1140]: t_check_msg(): DEBUG: t_check_msg: msg id=25 global
id=25 T end=(nil)
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[parser/msg_parser.c:204]: get_hdr_field(): DEBUG: get_hdr_body :
content_length=0
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[parser/msg_parser.c:106]: get_hdr_field(): found end of header
*Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[forward.c:784]: do_forward_reply(): reply cannot be forwarded - no 2nd via*
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[usr_avp.c:644]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
list (nil)
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[usr_avp.c:644]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
list (nil)
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[usr_avp.c:644]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
list (nil)
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[usr_avp.c:644]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
list (nil)
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[usr_avp.c:644]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
list (nil)
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[usr_avp.c:644]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
list (nil)
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[xavp.c:448]: xavp_destroy_list(): destroying xavp list (nil)
Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
[receive.c:296]: receive_msg(): receive_msg: cleaning up
any ideas?
and show me ur conf please.
--
Hi All,
I'm running into an issue, I'm not sure whether any of you seen this
yourselves and resolved it. Please share some pointers. My network is:
clients <--> Public IP(Kamailio/RTPProxy)10.1.128.11 <--> 10.1.128.34
(Freeswitch)
The 200 OK response from Freeswitch (on the way back from called party to
caller) to Kamailio is shown below. Notice the Contact header URI host part
contains Freeswitch Private IP (10.1.128.34). Kamailio suppose to change
that to Public IP before forwarding the 200 OK (copied below) to Caller in
public domain. But, it's not. As a result, ACK from Caller is not reaching
back to Kamailio.
How did you or anybody out there using Kamailio resolve this problem? If
needed, I can copy/paste my kamailio.cfg.
--
yours respectfully, Alexander Vasin.
8 926 1437200
icq: 9906064
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.sip-router.org/pipermail/sr-users/attachments/20140203/e075d4f0/attachment-0001.html>
------------------------------
--yours respectfully, Alexander Vasin.
8 926 1437200
icq: 9906064
_______________________________________________
SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
sr-users@lists.sip-router.org
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users