I got really modify my config, and now it looks like: http://pastebin.com/0M7938Mm
but now I got loopback problems. kamailio just asking itself. ngrep -d lo port 5060 talks me:
U 194.190.8.171:5060 -> 194.190.8.171:5060 SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP 194.190.8.171;branch=z9hG4bKc2bb.e627f45ee16a4b45ca99321b3bc8832c.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.328c8c23df8e916010525f7f786cbc49.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060 ;branch=z9hG4bKc2bb.b8ec8f173657be182ad714f59d37d4a8.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.7bec0e7c4a5962e90811bf082f0e6635.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6bbb824e92f328ce4053167b2e2c596a.0..V ia: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6f732fece1d8956bf5b075118b3dcb2f.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b4ab8b8de819be6fff9203bfdf4e758c.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2 bb.977524b1111849dd2cd8020d4c09090c.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.cb7d178bf3fdb6596399beaf5b43e66d.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0c69cbf.0..Via: SIP/2.0/UDP 1
94.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a 7f73adc7761c7ba31b.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via: SIP/2.0/UDP 194.190.8.171;rpor t=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via: SIP/2.0/UDP 192.168.1.119:5060 ;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988 c4757dae14dfb;rport=5060..From: sip:1001@194.190.8.171;tag=1274477258..To: sip:1001@194.190.8.171;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID: 00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1 (x 86_64/linux))..Content-Length: 0....
# U 194.190.8.171:5060 -> 194.190.8.171:5060 SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.328c8c23df8e916010525f7f786cbc49.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b8ec8f173657be182ad714f59d37d4a8.0..Via: SIP/2.0/UDP 194.190.8.171 ;rport=5060;branch=z9hG4bKc2bb.7bec0e7c4a5962e90811bf082f0e6635.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6bbb824e92f328ce4053167b2e2c596a.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6f732fece1d8956bf5b075118b 3dcb2f.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b4ab8b8de819be6fff9203bfdf4e758c.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.977524b1111849dd2cd8020d4c09090c.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branc h=z9hG4bKc2bb.cb7d178bf3fdb6596399beaf5b43e66d.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0c69cbf.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via: SI P/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01d cad6cb7e8257bcbe8ad7b66b7b095.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via: SIP/2.0/UDP 194.190
.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via: SIP/2.0/UDP 192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From: sip:1001@194.190.8.171;tag=1274477258..To: <sip:1001 @194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID: 00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....
# U 194.190.8.171:5060 -> 194.190.8.171:5060 SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b8ec8f173657be182ad714f59d37d4a8.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.7bec0e7c4a5962e90811bf082f0e6635.0..Via: SIP/2.0/UDP 194.190.8.171 ;rport=5060;branch=z9hG4bKc2bb.6bbb824e92f328ce4053167b2e2c596a.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6f732fece1d8956bf5b075118b3dcb2f.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b4ab8b8de819be6fff9203bfdf 4e758c.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.977524b1111849dd2cd8020d4c09090c.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.cb7d178bf3fdb6596399beaf5b43e66d.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branc h=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0c69cbf.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via: SI P/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946 cc81be473148e1a6dc5a173b2cfb1.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via: SIP/2.0/UDP 192.168
.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From: sip:1001@194.190.8.171;tag=1274477258..To: sip:1001@194.190.8.171;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID: 00C46D3A-558B-E311-988A-4757D AE14DFB@192.168.1.119..CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....
# U 194.190.8.171:5060 -> 194.190.8.171:5060 SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.7bec0e7c4a5962e90811bf082f0e6635.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6bbb824e92f328ce4053167b2e2c596a.0..Via: SIP/2.0/UDP 194.190.8.171 ;rport=5060;branch=z9hG4bKc2bb.6f732fece1d8956bf5b075118b3dcb2f.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b4ab8b8de819be6fff9203bfdf4e758c.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.977524b1111849dd2cd8020d4c 09090c.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.cb7d178bf3fdb6596399beaf5b43e66d.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0c69cbf.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branc h=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via: SI P/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0ea f0b545ac8239ad5e105fc2804cae8.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via: SIP/2.0/UDP 192.168.1.119:5060 ;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..Fro m: sip:1001@194.190.8.171;tag=1274477258..To: sip:1001@194.190.8.171;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID: 00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length : 0....
# U 194.190.8.171:5060 -> 194.190.8.171:5060 SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6bbb824e92f328ce4053167b2e2c596a.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6f732fece1d8956bf5b075118b3dcb2f.0..Via: SIP/2.0/UDP 194.190.8.171 ;rport=5060;branch=z9hG4bKc2bb.b4ab8b8de819be6fff9203bfdf4e758c.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.977524b1111849dd2cd8020d4c09090c.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.cb7d178bf3fdb6596399beaf5b 43e66d.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0c69cbf.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branc h=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via: SI P/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d 28c8a5ba1eeda8f8b296f6d2232e8.0..Via: SIP/2.0/UDP 192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From: sip:1001@194.190.8.171;tag=1274477258..To: <sip:1001@194.190.8.171
;tag=c5aea4efd01978ba4655
7f38f3d08cfc.2793..Call-ID: 00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....
# U 194.190.8.171:5060 -> 194.190.8.171:5060 SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6f732fece1d8956bf5b075118b3dcb2f.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b4ab8b8de819be6fff9203bfdf4e758c.0..Via: SIP/2.0/UDP 194.190.8.171 ;rport=5060;branch=z9hG4bKc2bb.977524b1111849dd2cd8020d4c09090c.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.cb7d178bf3fdb6596399beaf5b43e66d.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0 c69cbf.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branc h=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via: SI P/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via: SIP/2.0/UDP 192.168.1.119:5060;received=77.37.241.151;branc h=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From: < sip:1001@194.190.8.171>;tag=1274477258..To: sip:1001@194.190.8.171;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID: 00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2 SUBSCRIBE ..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....
# U 194.190.8.171:5060 -> 194.190.8.171:5060 SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b4ab8b8de819be6fff9203bfdf4e758c.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.977524b1111849dd2cd8020d4c09090c.0..Via: SIP/2.0/UDP 194.190.8.171 ;rport=5060;branch=z9hG4bKc2bb.cb7d178bf3fdb6596399beaf5b43e66d.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0c69cbf.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e 520e4e.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branc h=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via: SI P/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via: SIP/2.0/UDP 192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From: sip:1001@194.190.8.171;tag=12744772 58..To: sip:1001@194.190.8.171;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID: 00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....
# U 194.190.8.171:5060 -> 194.190.8.171:5060 SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.977524b1111849dd2cd8020d4c09090c.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.cb7d178bf3fdb6596399beaf5b43e66d.0..Via: SIP/2.0/UDP 194.190.8.171 ;rport=5060;branch=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0c69cbf.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf7 3e9e32.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branc h=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via: SI P/2.0/UDP 192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From: sip:1001@194.190.8.171;tag=1274477258..To: sip:1001@194.190.8.171;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID: 00C46D3A-558 B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....
# U 194.190.8.171:5060 -> 194.190.8.171:5060 SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.cb7d178bf3fdb6596399beaf5b43e66d.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0c69cbf.0..Via: SIP/2.0/UDP 194.190.8.171 ;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c 7ba31b.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branc h=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via: SIP/2.0/UDP 192.168.1.119:5060 ;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14df b;rport=5060..From: sip:1001@194.190.8.171;tag=1274477258..To: < sip:1001@194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID: 00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux) )..Content-Length: 0....
# U 194.190.8.171:5060 -> 194.190.8.171:5060 SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0c69cbf.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via: SIP/2.0/UDP 194.190.8.171 ;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66 b7b095.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branc h=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via: SIP/2.0/UDP 192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From: sip:1001@194.190.8.171;tag=1274477258..To: <sip:1001@194.190.8.171
;tag=c5a
ea4efd01978ba46557f38f3d08cfc.2793..Call-ID: 00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....
# U 194.190.8.171:5060 -> 194.190.8.171:5060 SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via: SIP/2.0/UDP 194.190.8.171 ;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173 b2cfb1.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via: SIP/2.0/UDP 192.168.1.119:5060;received=77
.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From: sip:1001@194.190.8.171;tag=1274477258..To: sip:1001@194.190.8.171;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID: 00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119.. CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....
# U 194.190.8.171:5060 -> 194.190.8.171:5060 SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via: SIP/2.0/UDP 194.190.8.171 ;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc28 04cae8.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via: SIP/2.0/UDP 192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From: <sip:1001@194.190.8. 171>;tag=1274477258..To: sip:1001@194.190.8.171;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID: 00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....
# U 194.190.8.171:5060 -> 194.190.8.171:5060 SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via: SIP/2.0/UDP 194.190.8.171 ;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d 2232e8.0..Via: SIP/2.0/UDP 192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From: sip:1001@194.190.8.171;tag=1274477258..To: <sip:1001@194.190.8.171
;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call
-ID: 00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....
# U 194.190.8.171:5060 -> 194.190.8.171:5060 SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via: SIP/2.0/UDP 194.190.8.171 ;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via: SIP/2.0/UDP 192.168.1.119:5060 ;received=77.37.241.151;branch=z9hG4bK00c46d3a558be3 11988c4757dae14dfb;rport=5060..From: sip:1001@194.190.8.171;tag=1274477258..To: sip:1001@194.190.8.171;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID: 00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2 SUBSCRIBE..Server: kamailio (4.1 .1 (x86_64/linux))..Content-Length: 0....
# U 194.190.8.171:5060 -> 194.190.8.171:5060 SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via: SIP/2.0/UDP 194.190.8.171 ;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via: SIP/2.0/UDP 192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From: sip:1001@194.190.8.171;tag=1274477258..To: <sip:1001@194.1 90.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID: 00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....
# U 194.190.8.171:5060 -> 194.190.8.171:5060 SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via: SIP/2.0/UDP 192.168.1.119
:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From: sip:1001@194.190.8.171;tag=1274477258..To: sip:1001@194.190.8.171;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID: 00C46D3A-558B-E311-988A-4757DAE14DF B@192.168.1.119..CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....
# U 194.190.8.171:5060 -> 194.190.8.171:5060 SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via: SIP/2.0/UDP 192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From: <si p:1001@194.190.8.171>;tag=1274477258..To: sip:1001@194.190.8.171;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID: 00C46D3A-558B-E311-988A-4757DAE14DFB@192.168.1.119..CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0... .
and how looks dump
1. from sip device to kamailio [root@kamaz sm1ly]# tcpdump -nn -i eth0 host 77.37.241.151 -v tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes 19:54:51.205942 IP (tos 0x0, ttl 57, id 0, offset 0, flags [DF], proto UDP (17), length 421) 77.37.241.151.57288 > 194.190.8.171.5060: SIP, length: 393 REGISTER sip:194.190.8.171 SIP/2.0 Call-ID: 676c32ab221a665a9bc9875ffb74930a@192.168.1.103 CSeq: 5569 REGISTER From: "1002" sip:1002@194.190.8.171;tag=2801080754 To: "1002" sip:1002@194.190.8.171 Via: SIP/2.0/UDP 192.168.1.103:57288 ;branch=z9hG4bKe5bd1a6ceba7f0a0f4e7487cb17ca365353236;rport Max-Forwards: 70 User-Agent: SIPAUA/0.1.001 Contact: * Expires: 0 Content-Length: 0
19:54:51.210060 IP (tos 0x10, ttl 64, id 35861, offset 0, flags [none], proto UDP (17), length 603) 194.190.8.171.5060 > 77.37.241.151.57288: SIP, length: 575 SIP/2.0 401 Unauthorized Via: SIP/2.0/UDP 192.168.1.103:57288 ;received=77.37.241.151;branch=z9hG4bKe5bd1a6ceba7f0a0f4e7487cb17ca365353236;rport=57288 From: "1002" sip:1002@194.190.8.171;tag=2801080754 To: "1002" sip:1002@194.190.8.171;tag=as518dbea9 Call-ID: 676c32ab221a665a9bc9875ffb74930a@192.168.1.103 CSeq: 5569 REGISTER Server: Asterisk PBX 1.8.20.0 Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH Supported: replaces, timer WWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="31daf0f8" Content-Length: 0
19:54:51.257552 IP (tos 0x0, ttl 57, id 0, offset 0, flags [DF], proto UDP (17), length 586) 77.37.241.151.57288 > 194.190.8.171.5060: SIP, length: 558 REGISTER sip:194.190.8.171:5060 SIP/2.0 Call-ID: 676c32ab221a665a9bc9875ffb74930a@192.168.1.103 CSeq: 5570 REGISTER From: "1002" sip:1002@194.190.8.171;tag=2801080754 To: "1002" sip:1002@194.190.8.171 Via: SIP/2.0/UDP 192.168.1.103:57288 ;branch=z9hG4bK440337c23337c9913220fd825f4d9ded353236;rport Max-Forwards: 70 User-Agent: SIPAUA/0.1.001 Contact: * Expires: 0 Authorization: Digest username="1002",realm="asterisk",nonce="31daf0f8",uri="sip: 194.190.8.171:5060 ",response="2b0222b07da7af1c3b72c2eb36241f5f",algorithm=MD5 Content-Length: 0
19:54:51.261209 IP (tos 0x10, ttl 64, id 35862, offset 0, flags [none], proto UDP (17), length 603) 194.190.8.171.5060 > 77.37.241.151.57288: SIP, length: 575 SIP/2.0 401 Unauthorized Via: SIP/2.0/UDP 192.168.1.103:57288 ;received=77.37.241.151;branch=z9hG4bK440337c23337c9913220fd825f4d9ded353236;rport=57288 From: "1002" sip:1002@194.190.8.171;tag=2801080754 To: "1002" sip:1002@194.190.8.171;tag=as0716dea5 Call-ID: 676c32ab221a665a9bc9875ffb74930a@192.168.1.103 CSeq: 5570 REGISTER Server: Asterisk PBX 1.8.20.0 Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH Supported: replaces, timer WWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="2f70c759" Content-Length: 0
19:54:51.290458 IP (tos 0x0, ttl 57, id 0, offset 0, flags [DF], proto UDP (17), length 586) 77.37.241.151.57288 > 194.190.8.171.5060: SIP, length: 558 REGISTER sip:194.190.8.171:5060 SIP/2.0 Call-ID: 676c32ab221a665a9bc9875ffb74930a@192.168.1.103 CSeq: 5571 REGISTER From: "1002" sip:1002@194.190.8.171;tag=2801080754 To: "1002" sip:1002@194.190.8.171 Via: SIP/2.0/UDP 192.168.1.103:57288 ;branch=z9hG4bK30fe030eee49e2eb50c619074c0f057b353236;rport Max-Forwards: 70 User-Agent: SIPAUA/0.1.001 Contact: * Expires: 0 Authorization: Digest username="1002",realm="asterisk",nonce="2f70c759",uri="sip: 194.190.8.171:5060 ",response="9eb7d157cfd0d8e8575b59c94c5f82f6",algorithm=MD5 Content-Length: 0
19:54:51.295285 IP (tos 0x10, ttl 64, id 35863, offset 0, flags [none], proto UDP (17), length 566) 194.190.8.171.5060 > 77.37.241.151.57288: SIP, length: 538 SIP/2.0 200 OK Via: SIP/2.0/UDP 192.168.1.103:57288 ;received=77.37.241.151;branch=z9hG4bK30fe030eee49e2eb50c619074c0f057b353236;rport=57288 From: "1002" sip:1002@194.190.8.171;tag=2801080754 To: "1002" sip:1002@194.190.8.171;tag=as0716dea5 Call-ID: 676c32ab221a665a9bc9875ffb74930a@192.168.1.103 CSeq: 5571 REGISTER Server: Asterisk PBX 1.8.20.0 Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH Supported: replaces, timer Expires: 0 Date: Mon, 03 Feb 2014 15:54:51 GMT Content-Length: 0
19:54:51.314824 IP (tos 0x0, ttl 57, id 0, offset 0, flags [DF], proto UDP (17), length 473) 77.37.241.151.57288 > 194.190.8.171.5060: SIP, length: 445 REGISTER sip:194.190.8.171 SIP/2.0 Call-ID: fffb7a09e489ce1cad6783709652b6f9@192.168.1.103 CSeq: 2404 REGISTER From: "1002" sip:1002@194.190.8.171;tag=134783744 To: "1002" sip:1002@194.190.8.171 Via: SIP/2.0/UDP 192.168.1.103:57288 ;branch=z9hG4bKdeb946998664720c2c93538625cc649e353236;rport Max-Forwards: 70 User-Agent: SIPAUA/0.1.001 Contact: "1002" sip:1002@192.168.1.103:57288;transport=udp Expires: 3600 Content-Length: 0
19:54:51.319697 IP (tos 0x10, ttl 64, id 35864, offset 0, flags [none], proto UDP (17), length 602) 194.190.8.171.5060 > 77.37.241.151.57288: SIP, length: 574 SIP/2.0 401 Unauthorized Via: SIP/2.0/UDP 192.168.1.103:57288 ;received=77.37.241.151;branch=z9hG4bKdeb946998664720c2c93538625cc649e353236;rport=57288 From: "1002" sip:1002@194.190.8.171;tag=134783744 To: "1002" sip:1002@194.190.8.171;tag=as0bba2324 Call-ID: fffb7a09e489ce1cad6783709652b6f9@192.168.1.103 CSeq: 2404 REGISTER Server: Asterisk PBX 1.8.20.0 Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH Supported: replaces, timer WWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="023deb34" Content-Length: 0
19:54:51.344080 IP (tos 0x0, ttl 57, id 0, offset 0, flags [DF], proto UDP (17), length 638) 77.37.241.151.57288 > 194.190.8.171.5060: SIP, length: 610 REGISTER sip:194.190.8.171:5060 SIP/2.0 Call-ID: fffb7a09e489ce1cad6783709652b6f9@192.168.1.103 CSeq: 2405 REGISTER From: "1002" sip:1002@194.190.8.171;tag=134783744 To: "1002" sip:1002@194.190.8.171 Via: SIP/2.0/UDP 192.168.1.103:57288 ;branch=z9hG4bK60a6798f72024444a9870698b766a04c353236;rport Max-Forwards: 70 User-Agent: SIPAUA/0.1.001 Contact: "1002" sip:1002@192.168.1.103:57288;transport=udp Expires: 3600 Authorization: Digest username="1002",realm="asterisk",nonce="023deb34",uri="sip: 194.190.8.171:5060 ",response="7fa5be98c7c0c395ed41f9e7da095629",algorithm=MD5 Content-Length: 0
19:54:51.350423 IP (tos 0x10, ttl 64, id 35865, offset 0, flags [none], proto UDP (17), length 602) 194.190.8.171.5060 > 77.37.241.151.57288: SIP, length: 574 SIP/2.0 401 Unauthorized Via: SIP/2.0/UDP 192.168.1.103:57288 ;received=77.37.241.151;branch=z9hG4bK60a6798f72024444a9870698b766a04c353236;rport=57288 From: "1002" sip:1002@194.190.8.171;tag=134783744 To: "1002" sip:1002@194.190.8.171;tag=as065abeba Call-ID: fffb7a09e489ce1cad6783709652b6f9@192.168.1.103 CSeq: 2405 REGISTER Server: Asterisk PBX 1.8.20.0 Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH Supported: replaces, timer WWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="26886c3d" Content-Length: 0
19:54:51.370976 IP (tos 0x0, ttl 57, id 0, offset 0, flags [DF], proto UDP (17), length 638) 77.37.241.151.57288 > 194.190.8.171.5060: SIP, length: 610 REGISTER sip:194.190.8.171:5060 SIP/2.0 Call-ID: fffb7a09e489ce1cad6783709652b6f9@192.168.1.103 CSeq: 2406 REGISTER From: "1002" sip:1002@194.190.8.171;tag=134783744 To: "1002" sip:1002@194.190.8.171 Via: SIP/2.0/UDP 192.168.1.103:57288 ;branch=z9hG4bKf4d831e0612e1074bf49397d92907c80353236;rport Max-Forwards: 70 User-Agent: SIPAUA/0.1.001 Contact: "1002" sip:1002@192.168.1.103:57288;transport=udp Expires: 3600 Authorization: Digest username="1002",realm="asterisk",nonce="26886c3d",uri="sip: 194.190.8.171:5060 ",response="cc17aae74d45f06e4712aa66b08e68df",algorithm=MD5 Content-Length: 0
19:54:51.380962 IP (tos 0x10, ttl 64, id 35866, offset 0, flags [none], proto UDP (17), length 636) 194.190.8.171.5060 > 77.37.241.151.57288: SIP, length: 608 SIP/2.0 200 OK Via: SIP/2.0/UDP 192.168.1.103:57288 ;received=77.37.241.151;branch=z9hG4bKf4d831e0612e1074bf49397d92907c80353236;rport=57288 From: "1002" sip:1002@194.190.8.171;tag=134783744 To: "1002" sip:1002@194.190.8.171;tag=as065abeba Call-ID: fffb7a09e489ce1cad6783709652b6f9@192.168.1.103 CSeq: 2406 REGISTER Server: Asterisk PBX 1.8.20.0 Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH Supported: replaces, timer Expires: 3600 Contact: sip:1002@192.168.1.103:57288;transport=udp;expires=3600 Date: Mon, 03 Feb 2014 15:54:51 GMT Content-Length: 0
19:54:51.406160 IP (tos 0x0, ttl 57, id 0, offset 0, flags [DF], proto UDP (17), length 395) 77.37.241.151.57288 > 194.190.8.171.5060: SIP, length: 367 OPTIONS sip:194.190.8.171 SIP/2.0 Call-ID: 28b382a24bc3e426f030593cec5f852a@192.168.1.103 CSeq: 1287 OPTIONS From: "1002" sip:1002@194.190.8.171;tag=3866552602 To: "1002" sip:1002@194.190.8.171 Via: SIP/2.0/UDP 192.168.1.103:57288 ;branch=z9hG4bK9bddae72a5ccaf0df80be00ba2882dfd353236;rport Max-Forwards: 70 User-Agent: SIPAUA/0.1.001 Content-Length: 0
19:54:51.407799 IP (tos 0x10, ttl 64, id 35867, offset 0, flags [none], proto UDP (17), length 458) 194.190.8.171.5060 > 77.37.241.151.57288: SIP, length: 430 SIP/2.0 484 Address Incomplete Call-ID: 28b382a24bc3e426f030593cec5f852a@192.168.1.103 CSeq: 1287 OPTIONS From: "1002" sip:1002@194.190.8.171;tag=3866552602 To: "1002" <sip:1002@194.190.8.171
;tag=c5aea4efd01978ba46557f38f3d08cfc.5162
Via: SIP/2.0/UDP 192.168.1.103:57288 ;branch=z9hG4bK9bddae72a5ccaf0df80be00ba2882dfd353236;rport=57288;received=77.37.241.151 Server: kamailio (4.1.1 (x86_64/linux)) Content-Length: 0
2. from kamailio to asterisk. [root@kamaz sm1ly]# tcpdump -nn -i eth1 host 50.0.0.10 -v and port 5060 tcpdump: listening on eth1, link-type EN10MB (Ethernet), capture size 65535 bytes 19:54:41.906391 IP (tos 0x0, ttl 64, id 5618, offset 0, flags [none], proto UDP (17), length 597) 50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569 OPTIONS sip:1002@192.168.1.103:34713;transport=udp SIP/2.0 Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK75f42160;rport Max-Forwards: 70 From: "asterisk" sip:asterisk@50.0.0.10;tag=as40fc69ea To: sip:1002@192.168.1.103:34713;transport=udp Contact: sip:asterisk@50.0.0.10:5060 Call-ID: 7bacfa62676409266240568c5c9d055b@50.0.0.10:5060 CSeq: 102 OPTIONS User-Agent: Asterisk PBX 1.8.20.0 Date: Mon, 03 Feb 2014 15:54:41 GMT Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH Supported: replaces, timer Content-Length: 0
19:54:42.906385 IP (tos 0x0, ttl 64, id 5619, offset 0, flags [none], proto UDP (17), length 597) 50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569 OPTIONS sip:1002@192.168.1.103:34713;transport=udp SIP/2.0 Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK75f42160;rport Max-Forwards: 70 From: "asterisk" sip:asterisk@50.0.0.10;tag=as40fc69ea To: sip:1002@192.168.1.103:34713;transport=udp Contact: sip:asterisk@50.0.0.10:5060 Call-ID: 7bacfa62676409266240568c5c9d055b@50.0.0.10:5060 CSeq: 102 OPTIONS User-Agent: Asterisk PBX 1.8.20.0 Date: Mon, 03 Feb 2014 15:54:41 GMT Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH Supported: replaces, timer Content-Length: 0
19:54:43.906565 IP (tos 0x0, ttl 64, id 5620, offset 0, flags [none], proto UDP (17), length 597) 50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569 OPTIONS sip:1002@192.168.1.103:34713;transport=udp SIP/2.0 Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK75f42160;rport Max-Forwards: 70 From: "asterisk" sip:asterisk@50.0.0.10;tag=as40fc69ea To: sip:1002@192.168.1.103:34713;transport=udp Contact: sip:asterisk@50.0.0.10:5060 Call-ID: 7bacfa62676409266240568c5c9d055b@50.0.0.10:5060 CSeq: 102 OPTIONS User-Agent: Asterisk PBX 1.8.20.0 Date: Mon, 03 Feb 2014 15:54:41 GMT Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH Supported: replaces, timer Content-Length: 0
19:54:44.904726 IP (tos 0x10, ttl 64, id 34743, offset 0, flags [none], proto UDP (17), length 413) 50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 385 SIP/2.0 408 Request Timeout Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK75f42160;rport=5060 From: "asterisk" sip:asterisk@50.0.0.10;tag=as40fc69ea To: sip:1002@192.168.1.103:34713 ;transport=udp;tag=6f6209fafb0c4bc816e1e7aa854ee2dd-8578 Call-ID: 7bacfa62676409266240568c5c9d055b@50.0.0.10:5060 CSeq: 102 OPTIONS Server: kamailio (4.1.1 (x86_64/linux)) Content-Length: 0
19:54:51.207422 IP (tos 0x10, ttl 64, id 34744, offset 0, flags [none], proto UDP (17), length 531) 50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 503 REGISTER sip:194.190.8.171 SIP/2.0 Call-ID: 676c32ab221a665a9bc9875ffb74930a@192.168.1.103 CSeq: 5569 REGISTER From: "1002" sip:1002@194.190.8.171;tag=2801080754 To: "1002" sip:1002@194.190.8.171 Via: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bKd8a1.094de0504827adb22c7b874f77dfd698.0 Via: SIP/2.0/UDP 192.168.1.103:57288 ;received=77.37.241.151;branch=z9hG4bKe5bd1a6ceba7f0a0f4e7487cb17ca365353236;rport=57288 Max-Forwards: 16 User-Agent: SIPAUA/0.1.001 Contact: * Expires: 0 Content-Length: 0
19:54:51.209052 IP (tos 0x0, ttl 64, id 5621, offset 0, flags [none], proto UDP (17), length 713) 50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 685 SIP/2.0 401 Unauthorized Via: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bKd8a1.094de0504827adb22c7b874f77dfd698.0;received=50.0.0.1;rport=5060 Via: SIP/2.0/UDP 192.168.1.103:57288 ;received=77.37.241.151;branch=z9hG4bKe5bd1a6ceba7f0a0f4e7487cb17ca365353236;rport=57288 From: "1002" sip:1002@194.190.8.171;tag=2801080754 To: "1002" sip:1002@194.190.8.171;tag=as518dbea9 Call-ID: 676c32ab221a665a9bc9875ffb74930a@192.168.1.103 CSeq: 5569 REGISTER Server: Asterisk PBX 1.8.20.0 Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH Supported: replaces, timer WWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="31daf0f8" Content-Length: 0
19:54:51.258759 IP (tos 0x10, ttl 64, id 34745, offset 0, flags [none], proto UDP (17), length 696) 50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 668 REGISTER sip:194.190.8.171:5060 SIP/2.0 Call-ID: 676c32ab221a665a9bc9875ffb74930a@192.168.1.103 CSeq: 5570 REGISTER From: "1002" sip:1002@194.190.8.171;tag=2801080754 To: "1002" sip:1002@194.190.8.171 Via: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK56b1.d46d0ab6448c5edd99f24aa7ba8a2881.0 Via: SIP/2.0/UDP 192.168.1.103:57288 ;received=77.37.241.151;branch=z9hG4bK440337c23337c9913220fd825f4d9ded353236;rport=57288 Max-Forwards: 16 User-Agent: SIPAUA/0.1.001 Contact: * Expires: 0 Authorization: Digest username="1002",realm="asterisk",nonce="31daf0f8",uri="sip: 194.190.8.171:5060 ",response="2b0222b07da7af1c3b72c2eb36241f5f",algorithm=MD5 Content-Length: 0
19:54:51.259902 IP (tos 0x0, ttl 64, id 5622, offset 0, flags [none], proto UDP (17), length 713) 50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 685 SIP/2.0 401 Unauthorized Via: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK56b1.d46d0ab6448c5edd99f24aa7ba8a2881.0;received=50.0.0.1;rport=5060 Via: SIP/2.0/UDP 192.168.1.103:57288 ;received=77.37.241.151;branch=z9hG4bK440337c23337c9913220fd825f4d9ded353236;rport=57288 From: "1002" sip:1002@194.190.8.171;tag=2801080754 To: "1002" sip:1002@194.190.8.171;tag=as0716dea5 Call-ID: 676c32ab221a665a9bc9875ffb74930a@192.168.1.103 CSeq: 5570 REGISTER Server: Asterisk PBX 1.8.20.0 Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH Supported: replaces, timer WWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="2f70c759" Content-Length: 0
19:54:51.292190 IP (tos 0x10, ttl 64, id 34746, offset 0, flags [none], proto UDP (17), length 696) 50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 668 REGISTER sip:194.190.8.171:5060 SIP/2.0 Call-ID: 676c32ab221a665a9bc9875ffb74930a@192.168.1.103 CSeq: 5571 REGISTER From: "1002" sip:1002@194.190.8.171;tag=2801080754 To: "1002" sip:1002@194.190.8.171 Via: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK66b1.0173e2524e6deda0f27b83591a62730f.0 Via: SIP/2.0/UDP 192.168.1.103:57288 ;received=77.37.241.151;branch=z9hG4bK30fe030eee49e2eb50c619074c0f057b353236;rport=57288 Max-Forwards: 16 User-Agent: SIPAUA/0.1.001 Contact: * Expires: 0 Authorization: Digest username="1002",realm="asterisk",nonce="2f70c759",uri="sip: 194.190.8.171:5060 ",response="9eb7d157cfd0d8e8575b59c94c5f82f6",algorithm=MD5 Content-Length: 0
19:54:51.293302 IP (tos 0x0, ttl 64, id 5623, offset 0, flags [none], proto UDP (17), length 676) 50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 648 SIP/2.0 200 OK Via: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK66b1.0173e2524e6deda0f27b83591a62730f.0;received=50.0.0.1;rport=5060 Via: SIP/2.0/UDP 192.168.1.103:57288 ;received=77.37.241.151;branch=z9hG4bK30fe030eee49e2eb50c619074c0f057b353236;rport=57288 From: "1002" sip:1002@194.190.8.171;tag=2801080754 To: "1002" sip:1002@194.190.8.171;tag=as0716dea5 Call-ID: 676c32ab221a665a9bc9875ffb74930a@192.168.1.103 CSeq: 5571 REGISTER Server: Asterisk PBX 1.8.20.0 Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH Supported: replaces, timer Expires: 0 Date: Mon, 03 Feb 2014 15:54:51 GMT Content-Length: 0
19:54:51.317242 IP (tos 0x10, ttl 64, id 34747, offset 0, flags [none], proto UDP (17), length 583) 50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 555 REGISTER sip:194.190.8.171 SIP/2.0 Call-ID: fffb7a09e489ce1cad6783709652b6f9@192.168.1.103 CSeq: 2404 REGISTER From: "1002" sip:1002@194.190.8.171;tag=134783744 To: "1002" sip:1002@194.190.8.171 Via: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK2624.44980ae0ad3ba5026d6f044c24770539.0 Via: SIP/2.0/UDP 192.168.1.103:57288 ;received=77.37.241.151;branch=z9hG4bKdeb946998664720c2c93538625cc649e353236;rport=57288 Max-Forwards: 16 User-Agent: SIPAUA/0.1.001 Contact: "1002" sip:1002@192.168.1.103:57288;transport=udp Expires: 3600 Content-Length: 0
19:54:51.318123 IP (tos 0x0, ttl 64, id 5624, offset 0, flags [none], proto UDP (17), length 712) 50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 684 SIP/2.0 401 Unauthorized Via: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK2624.44980ae0ad3ba5026d6f044c24770539.0;received=50.0.0.1;rport=5060 Via: SIP/2.0/UDP 192.168.1.103:57288 ;received=77.37.241.151;branch=z9hG4bKdeb946998664720c2c93538625cc649e353236;rport=57288 From: "1002" sip:1002@194.190.8.171;tag=134783744 To: "1002" sip:1002@194.190.8.171;tag=as0bba2324 Call-ID: fffb7a09e489ce1cad6783709652b6f9@192.168.1.103 CSeq: 2404 REGISTER Server: Asterisk PBX 1.8.20.0 Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH Supported: replaces, timer WWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="023deb34" Content-Length: 0
19:54:51.346522 IP (tos 0x10, ttl 64, id 34748, offset 0, flags [none], proto UDP (17), length 748) 50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 720 REGISTER sip:194.190.8.171:5060 SIP/2.0 Call-ID: fffb7a09e489ce1cad6783709652b6f9@192.168.1.103 CSeq: 2405 REGISTER From: "1002" sip:1002@194.190.8.171;tag=134783744 To: "1002" sip:1002@194.190.8.171 Via: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK3624.173cef757dc8f7da8b864ee1ab1bfe50.0 Via: SIP/2.0/UDP 192.168.1.103:57288 ;received=77.37.241.151;branch=z9hG4bK60a6798f72024444a9870698b766a04c353236;rport=57288 Max-Forwards: 16 User-Agent: SIPAUA/0.1.001 Contact: "1002" sip:1002@192.168.1.103:57288;transport=udp Expires: 3600 Authorization: Digest username="1002",realm="asterisk",nonce="023deb34",uri="sip: 194.190.8.171:5060 ",response="7fa5be98c7c0c395ed41f9e7da095629",algorithm=MD5 Content-Length: 0
19:54:51.348056 IP (tos 0x0, ttl 64, id 5625, offset 0, flags [none], proto UDP (17), length 712) 50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 684 SIP/2.0 401 Unauthorized Via: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK3624.173cef757dc8f7da8b864ee1ab1bfe50.0;received=50.0.0.1;rport=5060 Via: SIP/2.0/UDP 192.168.1.103:57288 ;received=77.37.241.151;branch=z9hG4bK60a6798f72024444a9870698b766a04c353236;rport=57288 From: "1002" sip:1002@194.190.8.171;tag=134783744 To: "1002" sip:1002@194.190.8.171;tag=as065abeba Call-ID: fffb7a09e489ce1cad6783709652b6f9@192.168.1.103 CSeq: 2405 REGISTER Server: Asterisk PBX 1.8.20.0 Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH Supported: replaces, timer WWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="26886c3d" Content-Length: 0
19:54:51.373298 IP (tos 0x10, ttl 64, id 34749, offset 0, flags [none], proto UDP (17), length 748) 50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 720 REGISTER sip:194.190.8.171:5060 SIP/2.0 Call-ID: fffb7a09e489ce1cad6783709652b6f9@192.168.1.103 CSeq: 2406 REGISTER From: "1002" sip:1002@194.190.8.171;tag=134783744 To: "1002" sip:1002@194.190.8.171 Via: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK0624.82ac15efd62f203c1b009e3ab3c711bc.0 Via: SIP/2.0/UDP 192.168.1.103:57288 ;received=77.37.241.151;branch=z9hG4bKf4d831e0612e1074bf49397d92907c80353236;rport=57288 Max-Forwards: 16 User-Agent: SIPAUA/0.1.001 Contact: "1002" sip:1002@192.168.1.103:57288;transport=udp Expires: 3600 Authorization: Digest username="1002",realm="asterisk",nonce="26886c3d",uri="sip: 194.190.8.171:5060 ",response="cc17aae74d45f06e4712aa66b08e68df",algorithm=MD5 Content-Length: 0
19:54:51.374893 IP (tos 0x0, ttl 64, id 5626, offset 0, flags [none], proto UDP (17), length 597) 50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569 OPTIONS sip:1002@192.168.1.103:57288;transport=udp SIP/2.0 Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK129c83a7;rport Max-Forwards: 70 From: "asterisk" sip:asterisk@50.0.0.10;tag=as40306b56 To: sip:1002@192.168.1.103:57288;transport=udp Contact: sip:asterisk@50.0.0.10:5060 Call-ID: 0e6d3cec7afd68275843c14303988ff3@50.0.0.10:5060 CSeq: 102 OPTIONS User-Agent: Asterisk PBX 1.8.20.0 Date: Mon, 03 Feb 2014 15:54:51 GMT Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH Supported: replaces, timer Content-Length: 0
19:54:51.374906 IP (tos 0x0, ttl 64, id 5627, offset 0, flags [none], proto UDP (17), length 746) 50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 718 SIP/2.0 200 OK Via: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK0624.82ac15efd62f203c1b009e3ab3c711bc.0;received=50.0.0.1;rport=5060 Via: SIP/2.0/UDP 192.168.1.103:57288 ;received=77.37.241.151;branch=z9hG4bKf4d831e0612e1074bf49397d92907c80353236;rport=57288 From: "1002" sip:1002@194.190.8.171;tag=134783744 To: "1002" sip:1002@194.190.8.171;tag=as065abeba Call-ID: fffb7a09e489ce1cad6783709652b6f9@192.168.1.103 CSeq: 2406 REGISTER Server: Asterisk PBX 1.8.20.0 Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH Supported: replaces, timer Expires: 3600 Contact: sip:1002@192.168.1.103:57288;transport=udp;expires=3600 Date: Mon, 03 Feb 2014 15:54:51 GMT Content-Length: 0
19:54:52.375165 IP (tos 0x0, ttl 64, id 5628, offset 0, flags [none], proto UDP (17), length 597) 50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569 OPTIONS sip:1002@192.168.1.103:57288;transport=udp SIP/2.0 Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK129c83a7;rport Max-Forwards: 70 From: "asterisk" sip:asterisk@50.0.0.10;tag=as40306b56 To: sip:1002@192.168.1.103:57288;transport=udp Contact: sip:asterisk@50.0.0.10:5060 Call-ID: 0e6d3cec7afd68275843c14303988ff3@50.0.0.10:5060 CSeq: 102 OPTIONS User-Agent: Asterisk PBX 1.8.20.0 Date: Mon, 03 Feb 2014 15:54:51 GMT Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH Supported: replaces, timer Content-Length: 0
19:54:53.375333 IP (tos 0x0, ttl 64, id 5629, offset 0, flags [none], proto UDP (17), length 597) 50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569 OPTIONS sip:1002@192.168.1.103:57288;transport=udp SIP/2.0 Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK129c83a7;rport Max-Forwards: 70 From: "asterisk" sip:asterisk@50.0.0.10;tag=as40306b56 To: sip:1002@192.168.1.103:57288;transport=udp Contact: sip:asterisk@50.0.0.10:5060 Call-ID: 0e6d3cec7afd68275843c14303988ff3@50.0.0.10:5060 CSeq: 102 OPTIONS User-Agent: Asterisk PBX 1.8.20.0 Date: Mon, 03 Feb 2014 15:54:51 GMT Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH Supported: replaces, timer Content-Length: 0
19:54:54.342025 IP (tos 0x10, ttl 64, id 34750, offset 0, flags [none], proto UDP (17), length 413) 50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 385 SIP/2.0 408 Request Timeout Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK129c83a7;rport=5060 From: "asterisk" sip:asterisk@50.0.0.10;tag=as40306b56 To: sip:1002@192.168.1.103:57288 ;transport=udp;tag=6f6209fafb0c4bc816e1e7aa854ee2dd-1f6e Call-ID: 0e6d3cec7afd68275843c14303988ff3@50.0.0.10:5060 CSeq: 102 OPTIONS Server: kamailio (4.1.1 (x86_64/linux)) Content-Length: 0
3. on asterisk to kamailio [root@astkamaz sm1ly]# tcpdump -nn -i eth0 -v host 50.0.0.1 and port 5060 tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes 19:54:41.906401 IP (tos 0x0, ttl 64, id 5618, offset 0, flags [none], proto UDP (17), length 597) 50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569 OPTIONS sip:1002@192.168.1.103:34713;transport=udp SIP/2.0 Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK75f42160;rport Max-Forwards: 70 From: "asterisk" sip:asterisk@50.0.0.10;tag=as40fc69ea To: sip:1002@192.168.1.103:34713;transport=udp Contact: sip:asterisk@50.0.0.10:5060 Call-ID: 7bacfa62676409266240568c5c9d055b@50.0.0.10:5060 CSeq: 102 OPTIONS User-Agent: Asterisk PBX 1.8.20.0 Date: Mon, 03 Feb 2014 15:54:41 GMT Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH Supported: replaces, timer Content-Length: 0
19:54:42.906581 IP (tos 0x0, ttl 64, id 5619, offset 0, flags [none], proto UDP (17), length 597) 50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569 OPTIONS sip:1002@192.168.1.103:34713;transport=udp SIP/2.0 Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK75f42160;rport Max-Forwards: 70 From: "asterisk" sip:asterisk@50.0.0.10;tag=as40fc69ea To: sip:1002@192.168.1.103:34713;transport=udp Contact: sip:asterisk@50.0.0.10:5060 Call-ID: 7bacfa62676409266240568c5c9d055b@50.0.0.10:5060 CSeq: 102 OPTIONS User-Agent: Asterisk PBX 1.8.20.0 Date: Mon, 03 Feb 2014 15:54:41 GMT Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH Supported: replaces, timer Content-Length: 0
19:54:43.906740 IP (tos 0x0, ttl 64, id 5620, offset 0, flags [none], proto UDP (17), length 597) 50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569 OPTIONS sip:1002@192.168.1.103:34713;transport=udp SIP/2.0 Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK75f42160;rport Max-Forwards: 70 From: "asterisk" sip:asterisk@50.0.0.10;tag=as40fc69ea To: sip:1002@192.168.1.103:34713;transport=udp Contact: sip:asterisk@50.0.0.10:5060 Call-ID: 7bacfa62676409266240568c5c9d055b@50.0.0.10:5060 CSeq: 102 OPTIONS User-Agent: Asterisk PBX 1.8.20.0 Date: Mon, 03 Feb 2014 15:54:41 GMT Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH Supported: replaces, timer Content-Length: 0
19:54:44.905366 IP (tos 0x10, ttl 64, id 34743, offset 0, flags [none], proto UDP (17), length 413) 50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 385 SIP/2.0 408 Request Timeout Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK75f42160;rport=5060 From: "asterisk" sip:asterisk@50.0.0.10;tag=as40fc69ea To: sip:1002@192.168.1.103:34713 ;transport=udp;tag=6f6209fafb0c4bc816e1e7aa854ee2dd-8578 Call-ID: 7bacfa62676409266240568c5c9d055b@50.0.0.10:5060 CSeq: 102 OPTIONS Server: kamailio (4.1.1 (x86_64/linux)) Content-Length: 0
19:54:51.208464 IP (tos 0x10, ttl 64, id 34744, offset 0, flags [none], proto UDP (17), length 531) 50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 503 REGISTER sip:194.190.8.171 SIP/2.0 Call-ID: 676c32ab221a665a9bc9875ffb74930a@192.168.1.103 CSeq: 5569 REGISTER From: "1002" sip:1002@194.190.8.171;tag=2801080754 To: "1002" sip:1002@194.190.8.171 Via: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bKd8a1.094de0504827adb22c7b874f77dfd698.0 Via: SIP/2.0/UDP 192.168.1.103:57288 ;received=77.37.241.151;branch=z9hG4bKe5bd1a6ceba7f0a0f4e7487cb17ca365353236;rport=57288 Max-Forwards: 16 User-Agent: SIPAUA/0.1.001 Contact: * Expires: 0 Content-Length: 0
19:54:51.209176 IP (tos 0x0, ttl 64, id 5621, offset 0, flags [none], proto UDP (17), length 713) 50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 685 SIP/2.0 401 Unauthorized Via: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bKd8a1.094de0504827adb22c7b874f77dfd698.0;received=50.0.0.1;rport=5060 Via: SIP/2.0/UDP 192.168.1.103:57288 ;received=77.37.241.151;branch=z9hG4bKe5bd1a6ceba7f0a0f4e7487cb17ca365353236;rport=57288 From: "1002" sip:1002@194.190.8.171;tag=2801080754 To: "1002" sip:1002@194.190.8.171;tag=as518dbea9 Call-ID: 676c32ab221a665a9bc9875ffb74930a@192.168.1.103 CSeq: 5569 REGISTER Server: Asterisk PBX 1.8.20.0 Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH Supported: replaces, timer WWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="31daf0f8" Content-Length: 0
19:54:51.259436 IP (tos 0x10, ttl 64, id 34745, offset 0, flags [none], proto UDP (17), length 696) 50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 668 REGISTER sip:194.190.8.171:5060 SIP/2.0 Call-ID: 676c32ab221a665a9bc9875ffb74930a@192.168.1.103 CSeq: 5570 REGISTER From: "1002" sip:1002@194.190.8.171;tag=2801080754 To: "1002" sip:1002@194.190.8.171 Via: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK56b1.d46d0ab6448c5edd99f24aa7ba8a2881.0 Via: SIP/2.0/UDP 192.168.1.103:57288 ;received=77.37.241.151;branch=z9hG4bK440337c23337c9913220fd825f4d9ded353236;rport=57288 Max-Forwards: 16 User-Agent: SIPAUA/0.1.001 Contact: * Expires: 0 Authorization: Digest username="1002",realm="asterisk",nonce="31daf0f8",uri="sip: 194.190.8.171:5060 ",response="2b0222b07da7af1c3b72c2eb36241f5f",algorithm=MD5 Content-Length: 0
19:54:51.260101 IP (tos 0x0, ttl 64, id 5622, offset 0, flags [none], proto UDP (17), length 713) 50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 685 SIP/2.0 401 Unauthorized Via: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK56b1.d46d0ab6448c5edd99f24aa7ba8a2881.0;received=50.0.0.1;rport=5060 Via: SIP/2.0/UDP 192.168.1.103:57288 ;received=77.37.241.151;branch=z9hG4bK440337c23337c9913220fd825f4d9ded353236;rport=57288 From: "1002" sip:1002@194.190.8.171;tag=2801080754 To: "1002" sip:1002@194.190.8.171;tag=as0716dea5 Call-ID: 676c32ab221a665a9bc9875ffb74930a@192.168.1.103 CSeq: 5570 REGISTER Server: Asterisk PBX 1.8.20.0 Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH Supported: replaces, timer WWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="2f70c759" Content-Length: 0
19:54:51.292708 IP (tos 0x10, ttl 64, id 34746, offset 0, flags [none], proto UDP (17), length 696) 50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 668 REGISTER sip:194.190.8.171:5060 SIP/2.0 Call-ID: 676c32ab221a665a9bc9875ffb74930a@192.168.1.103 CSeq: 5571 REGISTER From: "1002" sip:1002@194.190.8.171;tag=2801080754 To: "1002" sip:1002@194.190.8.171 Via: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK66b1.0173e2524e6deda0f27b83591a62730f.0 Via: SIP/2.0/UDP 192.168.1.103:57288 ;received=77.37.241.151;branch=z9hG4bK30fe030eee49e2eb50c619074c0f057b353236;rport=57288 Max-Forwards: 16 User-Agent: SIPAUA/0.1.001 Contact: * Expires: 0 Authorization: Digest username="1002",realm="asterisk",nonce="2f70c759",uri="sip: 194.190.8.171:5060 ",response="9eb7d157cfd0d8e8575b59c94c5f82f6",algorithm=MD5 Content-Length: 0
19:54:51.293541 IP (tos 0x0, ttl 64, id 5623, offset 0, flags [none], proto UDP (17), length 676) 50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 648 SIP/2.0 200 OK Via: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK66b1.0173e2524e6deda0f27b83591a62730f.0;received=50.0.0.1;rport=5060 Via: SIP/2.0/UDP 192.168.1.103:57288 ;received=77.37.241.151;branch=z9hG4bK30fe030eee49e2eb50c619074c0f057b353236;rport=57288 From: "1002" sip:1002@194.190.8.171;tag=2801080754 To: "1002" sip:1002@194.190.8.171;tag=as0716dea5 Call-ID: 676c32ab221a665a9bc9875ffb74930a@192.168.1.103 CSeq: 5571 REGISTER Server: Asterisk PBX 1.8.20.0 Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH Supported: replaces, timer Expires: 0 Date: Mon, 03 Feb 2014 15:54:51 GMT Content-Length: 0
19:54:51.317704 IP (tos 0x10, ttl 64, id 34747, offset 0, flags [none], proto UDP (17), length 583) 50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 555 REGISTER sip:194.190.8.171 SIP/2.0 Call-ID: fffb7a09e489ce1cad6783709652b6f9@192.168.1.103 CSeq: 2404 REGISTER From: "1002" sip:1002@194.190.8.171;tag=134783744 To: "1002" sip:1002@194.190.8.171 Via: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK2624.44980ae0ad3ba5026d6f044c24770539.0 Via: SIP/2.0/UDP 192.168.1.103:57288 ;received=77.37.241.151;branch=z9hG4bKdeb946998664720c2c93538625cc649e353236;rport=57288 Max-Forwards: 16 User-Agent: SIPAUA/0.1.001 Contact: "1002" sip:1002@192.168.1.103:57288;transport=udp Expires: 3600 Content-Length: 0
19:54:51.318355 IP (tos 0x0, ttl 64, id 5624, offset 0, flags [none], proto UDP (17), length 712) 50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 684 SIP/2.0 401 Unauthorized Via: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK2624.44980ae0ad3ba5026d6f044c24770539.0;received=50.0.0.1;rport=5060 Via: SIP/2.0/UDP 192.168.1.103:57288 ;received=77.37.241.151;branch=z9hG4bKdeb946998664720c2c93538625cc649e353236;rport=57288 From: "1002" sip:1002@194.190.8.171;tag=134783744 To: "1002" sip:1002@194.190.8.171;tag=as0bba2324 Call-ID: fffb7a09e489ce1cad6783709652b6f9@192.168.1.103 CSeq: 2404 REGISTER Server: Asterisk PBX 1.8.20.0 Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH Supported: replaces, timer WWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="023deb34" Content-Length: 0
19:54:51.347429 IP (tos 0x10, ttl 64, id 34748, offset 0, flags [none], proto UDP (17), length 748) 50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 720 REGISTER sip:194.190.8.171:5060 SIP/2.0 Call-ID: fffb7a09e489ce1cad6783709652b6f9@192.168.1.103 CSeq: 2405 REGISTER From: "1002" sip:1002@194.190.8.171;tag=134783744 To: "1002" sip:1002@194.190.8.171 Via: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK3624.173cef757dc8f7da8b864ee1ab1bfe50.0 Via: SIP/2.0/UDP 192.168.1.103:57288 ;received=77.37.241.151;branch=z9hG4bK60a6798f72024444a9870698b766a04c353236;rport=57288 Max-Forwards: 16 User-Agent: SIPAUA/0.1.001 Contact: "1002" sip:1002@192.168.1.103:57288;transport=udp Expires: 3600 Authorization: Digest username="1002",realm="asterisk",nonce="023deb34",uri="sip: 194.190.8.171:5060 ",response="7fa5be98c7c0c395ed41f9e7da095629",algorithm=MD5 Content-Length: 0
19:54:51.348212 IP (tos 0x0, ttl 64, id 5625, offset 0, flags [none], proto UDP (17), length 712) 50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 684 SIP/2.0 401 Unauthorized Via: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK3624.173cef757dc8f7da8b864ee1ab1bfe50.0;received=50.0.0.1;rport=5060 Via: SIP/2.0/UDP 192.168.1.103:57288 ;received=77.37.241.151;branch=z9hG4bK60a6798f72024444a9870698b766a04c353236;rport=57288 From: "1002" sip:1002@194.190.8.171;tag=134783744 To: "1002" sip:1002@194.190.8.171;tag=as065abeba Call-ID: fffb7a09e489ce1cad6783709652b6f9@192.168.1.103 CSeq: 2405 REGISTER Server: Asterisk PBX 1.8.20.0 Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH Supported: replaces, timer WWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="26886c3d" Content-Length: 0
19:54:51.373777 IP (tos 0x10, ttl 64, id 34749, offset 0, flags [none], proto UDP (17), length 748) 50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 720 REGISTER sip:194.190.8.171:5060 SIP/2.0 Call-ID: fffb7a09e489ce1cad6783709652b6f9@192.168.1.103 CSeq: 2406 REGISTER From: "1002" sip:1002@194.190.8.171;tag=134783744 To: "1002" sip:1002@194.190.8.171 Via: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK0624.82ac15efd62f203c1b009e3ab3c711bc.0 Via: SIP/2.0/UDP 192.168.1.103:57288 ;received=77.37.241.151;branch=z9hG4bKf4d831e0612e1074bf49397d92907c80353236;rport=57288 Max-Forwards: 16 User-Agent: SIPAUA/0.1.001 Contact: "1002" sip:1002@192.168.1.103:57288;transport=udp Expires: 3600 Authorization: Digest username="1002",realm="asterisk",nonce="26886c3d",uri="sip: 194.190.8.171:5060 ",response="cc17aae74d45f06e4712aa66b08e68df",algorithm=MD5 Content-Length: 0
19:54:51.374731 IP (tos 0x0, ttl 64, id 5626, offset 0, flags [none], proto UDP (17), length 597) 50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569 OPTIONS sip:1002@192.168.1.103:57288;transport=udp SIP/2.0 Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK129c83a7;rport Max-Forwards: 70 From: "asterisk" sip:asterisk@50.0.0.10;tag=as40306b56 To: sip:1002@192.168.1.103:57288;transport=udp Contact: sip:asterisk@50.0.0.10:5060 Call-ID: 0e6d3cec7afd68275843c14303988ff3@50.0.0.10:5060 CSeq: 102 OPTIONS User-Agent: Asterisk PBX 1.8.20.0 Date: Mon, 03 Feb 2014 15:54:51 GMT Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH Supported: replaces, timer Content-Length: 0
19:54:51.374804 IP (tos 0x0, ttl 64, id 5627, offset 0, flags [none], proto UDP (17), length 746) 50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 718 SIP/2.0 200 OK Via: SIP/2.0/UDP 50.0.0.1;branch=z9hG4bK0624.82ac15efd62f203c1b009e3ab3c711bc.0;received=50.0.0.1;rport=5060 Via: SIP/2.0/UDP 192.168.1.103:57288 ;received=77.37.241.151;branch=z9hG4bKf4d831e0612e1074bf49397d92907c80353236;rport=57288 From: "1002" sip:1002@194.190.8.171;tag=134783744 To: "1002" sip:1002@194.190.8.171;tag=as065abeba Call-ID: fffb7a09e489ce1cad6783709652b6f9@192.168.1.103 CSeq: 2406 REGISTER Server: Asterisk PBX 1.8.20.0 Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH Supported: replaces, timer Expires: 3600 Contact: sip:1002@192.168.1.103:57288;transport=udp;expires=3600 Date: Mon, 03 Feb 2014 15:54:51 GMT Content-Length: 0
19:54:52.375348 IP (tos 0x0, ttl 64, id 5628, offset 0, flags [none], proto UDP (17), length 597) 50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569 OPTIONS sip:1002@192.168.1.103:57288;transport=udp SIP/2.0 Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK129c83a7;rport Max-Forwards: 70 From: "asterisk" sip:asterisk@50.0.0.10;tag=as40306b56 To: sip:1002@192.168.1.103:57288;transport=udp Contact: sip:asterisk@50.0.0.10:5060 Call-ID: 0e6d3cec7afd68275843c14303988ff3@50.0.0.10:5060 CSeq: 102 OPTIONS User-Agent: Asterisk PBX 1.8.20.0 Date: Mon, 03 Feb 2014 15:54:51 GMT Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH Supported: replaces, timer Content-Length: 0
19:54:53.375562 IP (tos 0x0, ttl 64, id 5629, offset 0, flags [none], proto UDP (17), length 597) 50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569 OPTIONS sip:1002@192.168.1.103:57288;transport=udp SIP/2.0 Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK129c83a7;rport Max-Forwards: 70 From: "asterisk" sip:asterisk@50.0.0.10;tag=as40306b56 To: sip:1002@192.168.1.103:57288;transport=udp Contact: sip:asterisk@50.0.0.10:5060 Call-ID: 0e6d3cec7afd68275843c14303988ff3@50.0.0.10:5060 CSeq: 102 OPTIONS User-Agent: Asterisk PBX 1.8.20.0 Date: Mon, 03 Feb 2014 15:54:51 GMT Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH Supported: replaces, timer Content-Length: 0
19:54:54.342525 IP (tos 0x10, ttl 64, id 34750, offset 0, flags [none], proto UDP (17), length 413) 50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 385 SIP/2.0 408 Request Timeout Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK129c83a7;rport=5060 From: "asterisk" sip:asterisk@50.0.0.10;tag=as40306b56 To: sip:1002@192.168.1.103:57288 ;transport=udp;tag=6f6209fafb0c4bc816e1e7aa854ee2dd-1f6e Call-ID: 0e6d3cec7afd68275843c14303988ff3@50.0.0.10:5060 CSeq: 102 OPTIONS Server: kamailio (4.1.1 (x86_64/linux)) Content-Length: 0
####### Defined Values #########
# - flags # FLT_ - per transaction (message) flags # FLB_ - per branch flags #!define FLT_ACC 1 #!define FLT_ACCMISSED 2 #!define FLT_ACCFAILED 3 #!define FLT_NATS 5
#!define FLB_NATB 6 #!define FLB_NATSIPPING 7
####### Global Parameters #########
# Enable debugging only when kamailio is mading boo-boo ### LOG Levels: 3=DBG, 2=INFO, 1=NOTICE, 0=WARN, -1=ERR debug=3 log_stderror=no
memdbg=5 memlog=5
log_facility=LOG_LOCAL0
fork=yes children=8
/* uncomment the next line to disable TCP (default on) */ disable_tcp=yes
/* uncomment the next line to disable the auto discovery of local aliases based on reverse DNS on IPs (default on) */ auto_aliases=no
/* add local domain aliases */ #alias="kamaz.ikatele.com"
/* uncomment and configure the following line if you want Kamailio to bind on a specific interface/port/proto (default bind on all available) */
#listen=udp:50.0.0.1:5060 advertise 194.190.8.171:5060 #listen=udp:194.190.8.171:5060 advertise 50.0.0.1:5060
listen=udp:194.190.8.171 listen=udp:50.0.0.1
dns=no rev_dns=no check_via=yes
/* port to listen to * - can be specified more than once if needed to listen on many ports */ port=5060
mhomed=1
####### Modules Section ########
# set paths to location of modules (to sources or installation folders) mpath="/usr/lib64/kamailio/modules/"
loadmodule "mi_fifo.so" loadmodule "kex.so" loadmodule "tm.so" loadmodule "tmx.so" loadmodule "sl.so" loadmodule "rr.so" loadmodule "pv.so" loadmodule "maxfwd.so" loadmodule "usrloc.so" loadmodule "registrar.so" loadmodule "textops.so" loadmodule "siputils.so" loadmodule "xlog.so" loadmodule "sanity.so" loadmodule "ctl.so" loadmodule "cfg_rpc.so" loadmodule "mi_rpc.so" loadmodule "acc.so"
loadmodule "nathelper.so" loadmodule "rtpproxy.so"
#loadmodule "topoh.so" #modparam("topoh", "mask_key", "balalayka") #modparam("topoh", "mask_ip", "50.0.0.1")
# ----------------- setting module-specific parameters ---------------
# ----- mi_fifo params ----- modparam("mi_fifo", "fifo_name", "/tmp/kamailio_fifo")
# ----- tm params ----- # auto-discard branches from previous serial forking leg modparam("tm", "failure_reply_mode", 3) # default retransmission timeout: 30sec modparam("tm", "fr_timer", 3000) # default invite retransmission timeout after 1xx: 120sec modparam("tm", "fr_inv_timer", 12000)
# ----- rr params ----- # add value to ;lr param to cope with most of the UAs modparam("rr", "enable_full_lr", 1) # do not append from tag to the RR (no need for this script) modparam("rr", "append_fromtag", 1)
# ----- rtpproxy params ----- modparam("rtpproxy", "rtpproxy_sock", "udp:127.0.0.1:7722")
# ----- nathelper params ----- modparam("nathelper", "natping_interval", 30) modparam("nathelper", "ping_nated_only", 1) modparam("nathelper", "sipping_bflag", FLB_NATSIPPING) modparam("nathelper", "sipping_from", "sip:pinger@194.190.8.171")
# params needed for NAT traversal in other modules modparam("nathelper", "received_avp", "$avp(RECEIVED)") modparam("usrloc", "nat_bflag", FLB_NATB)
####### Routing Logic ########
# Main SIP request routing logic # - processing of any incoming SIP request starts with this route # - note: this is the same as route { ... }
route {
# per request initial checks route(REQINIT);
# NAT detection xlog("L_NOTICE","$rm from $fu (IP:$si:$sp) Main Route before ---NAT---\n"); route(NATDETECT);
xlog("L_NOTICE","$rm from $fu (IP:$si:$sp) in Route[NATDETECT] fix_nat-register\n");
# CANCEL processing if (is_method("CANCEL")) { if (t_check_trans()) { route(RELAY); } exit; }
# handle requests within SIP dialogs route(WITHINDLG);
### only initial requests (no To tag)
t_check_trans();
# record routing for dialog forming requests (in case they are routed) # - remove preloaded route headers remove_hf("Route"); if (is_method("INVITE|SUBSCRIBE")) record_route();
# account only INVITEs if (is_method("INVITE")) { setflag(FLT_ACC); # do accounting }
# dispatch requests to foreign domains route(SIPOUT);
# handle registrations route(REGISTRAR);
if ($rU==$null) { # request with no Username in RURI sl_send_reply("484","Address Incomplete"); exit; }
route(RELAY);
}
# Per SIP request initial checks route[REQINIT] { if (!mf_process_maxfwd_header("20")) { xlog("L_NOTICE","$rm from $fu (IP:$si:$sp) in MAX FDW HEADERS ALARMO\n");
sl_send_reply("483","Too Many Hops"); exit; }
if(!sanity_check("1511", "7")) { xlog("Malformed SIP message from $si:$sp\n"); exit; } }
# Caller NAT detection route route[NATDETECT] { force_rport(); if (nat_uac_test("19")) { if (is_method("REGISTER")) { fix_nated_register(); } else { if(is_first_hop()) set_contact_alias(); } setflag(FLT_NATS);
} return; }
# Handle requests within SIP dialogs route[WITHINDLG] { if (has_totag()) { # sequential request withing a dialog should # take the path determined by record-routing if (loose_route()) { route(DLGURI); if (is_method("BYE")) { setflag(FLT_ACC); # do accounting ... setflag(FLT_ACCFAILED); # ... even if the transaction fails } else if ( is_method("ACK") ) { # ACK is forwarded statelessy route(NATMANAGE); } else if ( is_method("NOTIFY") ) { # Add Record-Route for in-dialog NOTIFY as per RFC 6665. record_route(); } route(RELAY); } else { if ( is_method("ACK") ) { if ( t_check_trans() ) { # no loose-route, but stateful ACK; # must be an ACK after a 487 # or e.g. 404 from upstream server route(RELAY); exit; } else { xlog("L_NOTICE","ACK without matching transaction ... ignore and discard\n"); # ACK without matching transaction ... ignore and discard exit; } } sl_send_reply("404","Not here"); } exit; } }
# Routing to foreign domains route[SIPOUT] { if (!uri==myself) { append_hf("P-hint: outbound\r\n"); route(RELAY); } } # Handle SIP registrations route[REGISTRAR] { if (is_method("REGISTER")) { # if(isflagset(FLT_NATS)) # { # setbflag(FLB_NATB); # # uncomment next line to do SIP NAT pinging # xlog("L_NOTICE","--------------------- SIP NAT PINGING --------------------------------------\n"); # setbflag(FLB_NATSIPPING); # } # if (!save("location")) # sl_reply_error(); # xlog("L_NOTICE","--------------------- SL REPLY ERROR --------------------------------------\n"); if( t_check_trans() ) { xlog("L_NOTICE","Transaction already exist, forwarding\n"); } else { xlog("L_NOTICE","New transaction upcoming, creating\n");
# forward("50.0.0.10"); # save("sip:50.0.0.10","0x02"); t_relay_to_udp("50.0.0.10", "5060"); exit; } exit; } }
route[RELAY] { # enable additional event routes for forwarded requests # - serial forking, RTP relaying handling, a.s.o. xlog("L_NOTICE","Default routing block raised!\n"); if (is_method("INVITE|BYE|SUBSCRIBE|UPDATE")) { if(!t_is_set("branch_route")) t_on_branch("MANAGE_BRANCH"); } if (is_method("INVITE|SUBSCRIBE|UPDATE")) { if(!t_is_set("onreply_route")) t_on_reply("MANAGE_REPLY"); } if (is_method("INVITE")) { if(!t_is_set("failure_route")) t_on_failure("MANAGE_FAILURE"); }
if (!t_relay()) { sl_reply_error(); } exit; }
# RTPProxy control route[NATMANAGE] { if (is_request()) { if(has_totag()) { if(check_route_param("nat=yes")) { xlog("L_NOTICE","------------------------------------ SETBFLAG ----------------------------\n"); setbflag(FLB_NATB); } } } if (!(isflagset(FLT_NATS) || isbflagset(FLB_NATB))) return;
rtpproxy_manage();
if (is_request()) { if (!has_totag()) { if(t_is_branch_route()) { xlog("L_NOTICE","------------------------------------ ADD RR PARAM NAT YES ----------------------------\n"); add_rr_param(";nat=yes"); } } } if (is_reply()) { if(isbflagset(FLB_NATB)) { if(is_first_hop()) xlog("L_NOTICE","------------------------------------ IS FIRST HOP SRT CONACT ALIAS ----------------------------\n"); set_contact_alias(); }
xlog("L_NOTICE","$rm from $fu (IP:$si:$sp) in route[NATMANAGE] RTPproxy with EI Flags\n");
} return; }
# URI update for dialog requests route[DLGURI] { if(!isdsturiset()) { handle_ruri_alias();
xlog("L_NOTICE","$rm from $fu (IP:$si:$sp) in route[DLGURI] RTPproxy with EI Flags\n");
} return; }
# manage outgoing branches branch_route[MANAGE_BRANCH] { xlog("L_NOTICE","$rm from $fu (IP:$si:$sp) in MANAGE_BRANCH\n"); xdbg("new branch [$T_branch_idx] to $ru\n"); route(NATMANAGE); }
# manage incoming replies onreply_route[MANAGE_REPLY] { xlog("L_NOTICE","$rm from $fu (IP:$si:$sp) in MANAGE_REPLY\n"); xdbg("incoming reply\n"); if(status=~"[12][0-9][0-9]") route(NATMANAGE); }
# manage failure routing cases failure_route[MANAGE_FAILURE] { xlog("L_NOTICE","$rm from $fu (IP:$si:$sp) in MANAGE_FAILURE\n"); route(NATMANAGE);
if (t_is_canceled()) { exit; } }
route[DEBUG] { if (method==("PUBLISH|SUBSCRIBE|REGISTER|OPTIONS")) { return; } xlog("[$mi] Received SIP Message (method: $rm) ($ml bytes) to $Ri:$Rp from $si:$sp:\n$mb\n"); }
my config looks like this:
#!KAMAILIO
# Dipak 01/23/2014 - Added FreeSWITCH server forwarding, User auth and additional debug prints #!define WITH_MYSQL #!define WITH_AUTH #!define WITH_USRLOCDB #!define WITH_FREESWITCH #!define WITH_NAT #!define WITH_DEBUG #!define WITH_CFGSAMPLES #!define WITH_WEBSOCKETS #!define WITH_TLS
#!substdef "!MY_IP_ADDR!10.1.128.11!g" #!substdef "!MY_DOMAIN!10.1.128.11!g" #!substdef "!MY_WS_PORT!4232!g" #!substdef "!MY_WSS_PORT!4233!g" #!substdef "!MY_WS_ADDR!tcp:MY_IP_ADDR:MY_WS_PORT!g" #!substdef "!MY_WSS_ADDR!tls:MY_IP_ADDR:MY_WSS_PORT!g"
# # Kamailio (OpenSER) SIP Server v3.3 - default configuration script # - web: http://www.kamailio.org # - git: http://sip-router.org # # Direct your questions about this file to: sr-users@lists.sip-router.org # # Refer to the Core CookBook at http://www.kamailio.org/dokuwiki/doku.php # for an explanation of possible statements, functions and parameters. # # Several features can be enabled using '#!define WITH_FEATURE' directives: # # *** To run in debug mode: # - define WITH_DEBUG # # *** To enable mysql: # - define WITH_MYSQL # # *** To enable authentication execute: # - enable mysql # - define WITH_AUTH # - add users using 'kamctl' # # *** To enable IP authentication execute: # - enable mysql # - enable authentication # - define WITH_IPAUTH # - add IP addresses with group id '1' to 'address' table # # *** To enable persistent user location execute: # - enable mysql # - define WITH_USRLOCDB # # *** To enable presence server execute: # - enable mysql # - define WITH_PRESENCE # # *** To enable nat traversal execute: # - define WITH_NAT # - install RTPProxy: http://www.rtpproxy.org # - start RTPProxy: # rtpproxy -l _your_public_ip_ -s udp:localhost:7722 # # *** To enable PSTN gateway routing execute: # - define WITH_PSTN # - set the value of pstn.gw_ip # - check route[PSTN] for regexp routing condition # # *** To enable database aliases lookup execute: # - enable mysql # - define WITH_ALIASDB # # *** To enable speed dial lookup execute: # - enable mysql # - define WITH_SPEEDDIAL # # *** To enable multi-domain support execute: # - enable mysql # - define WITH_MULTIDOMAIN # # *** To enable TLS support execute: # - adjust CFGDIR/tls.cfg as needed # - define WITH_TLS # # *** To enable XMLRPC support execute: # - define WITH_XMLRPC # - adjust route[XMLRPC] for access policy # # *** To enable anti-flood detection execute: # - adjust pike and htable=>ipban settings as needed (default is # block if more than 16 requests in 2 seconds and ban for 300 seconds) # - define WITH_ANTIFLOOD # # *** To block 3XX redirect replies execute: # - define WITH_BLOCK3XX # # *** To enable VoiceMail routing execute: # - define WITH_VOICEMAIL # - set the value of voicemail.srv_ip # - adjust the value of voicemail.srv_port # # *** To enhance accounting execute: # - enable mysql # - define WITH_ACCDB # - add following columns to database #!ifdef ACCDB_COMMENT ALTER TABLE acc ADD COLUMN src_user VARCHAR(64) NOT NULL DEFAULT ''; ALTER TABLE acc ADD COLUMN src_domain VARCHAR(128) NOT NULL DEFAULT ''; ALTER TABLE acc ADD COLUMN src_ip varchar(64) NOT NULL default ''; ALTER TABLE acc ADD COLUMN dst_ouser VARCHAR(64) NOT NULL DEFAULT ''; ALTER TABLE acc ADD COLUMN dst_user VARCHAR(64) NOT NULL DEFAULT ''; ALTER TABLE acc ADD COLUMN dst_domain VARCHAR(128) NOT NULL DEFAULT ''; ALTER TABLE missed_calls ADD COLUMN src_user VARCHAR(64) NOT NULL DEFAULT ''; ALTER TABLE missed_calls ADD COLUMN src_domain VARCHAR(128) NOT NULL DEFAULT ''; ALTER TABLE missed_calls ADD COLUMN src_ip varchar(64) NOT NULL default ''; ALTER TABLE missed_calls ADD COLUMN dst_ouser VARCHAR(64) NOT NULL DEFAULT ''; ALTER TABLE missed_calls ADD COLUMN dst_user VARCHAR(64) NOT NULL DEFAULT ''; ALTER TABLE missed_calls ADD COLUMN dst_domain VARCHAR(128) NOT NULL DEFAULT ''; #!endif
####### Defined Values #########
# *** Value defines - IDs used later in config #!ifdef WITH_MYSQL # - database URL - used to connect to database server by modules such # as: auth_db, acc, usrloc, a.s.o. # -define DBURL "mysql://openser:openserrw@localhost/openser" #!define DBURL "mysql://mysql:123456@localhost/kamailio" #!endif #!ifdef WITH_MULTIDOMAIN # - the value for 'use_domain' parameters #!define MULTIDOMAIN 1 #!else #!define MULTIDOMAIN 0 #!endif
# - flags # FLT_ - per transaction (message) flags # FLB_ - per branch flags #!define FLT_ACC 1 #!define FLT_ACCMISSED 2 #!define FLT_ACCFAILED 3 #!define FLT_NATS 5
#!define FLB_NATB 6 #!define FLB_NATSIPPING 7
####### Global Parameters #########
#!ifdef WITH_DEBUG debug=4 log_stderror=yes #!else debug=2 log_stderror=no #!endif
memdbg=5 memlog=5
log_facility=LOG_LOCAL0
fork=yes children=4
/* uncomment the next line to disable TCP (default on) */ #disable_tcp=yes
/* uncomment the next line to disable the auto discovery of local aliases based on reverse DNS on IPs (default on) */ #auto_aliases=no
/* add local domain aliases */ #alias="sip.mydomain.com"
/* uncomment and configure the following line if you want Kamailio to bind on a specific interface/port/proto (default bind on all available) */ #listen=udp:10.0.0.10:5060
/* port to listen to * - can be specified more than once if needed to listen on many ports */ #port=5060 listen=udp:<public ip>:5060 listen=tcp:<public ip>:5060 listen=tls:<public ip>:5061 listen=udp:10.1.128.11:5060 listen=tcp:10.1.128.11:5060 #!ifdef WITH_WEBSOCKETS listen=MY_WS_ADDR #!ifdef WITH_TLS listen=MY_WSS_ADDR #!endif #!endif
mhomed=1
#!ifdef WITH_TLS enable_tls=yes #!endif
# life time of TCP connection when there is no traffic # - a bit higher than registration expires to cope with UA behind NAT tcp_connection_lifetime=3605
tcp_accept_no_cl=yes tcp_rd_buf_size=16384
#syn_branch=0
####### Custom Parameters #########
# These parameters can be modified runtime via RPC interface # - see the documentation of 'cfg_rpc' module. # # Format: group.id = value 'desc' description # Access: $sel(cfg_get.group.id) or @cfg_get.group.id #
#!ifdef WITH_PSTN # PSTN GW Routing # # - pstn.gw_ip: valid IP or hostname as string value, example: # pstn.gw_ip = "10.0.0.101" desc "My PSTN GW Address" # # - by default is empty to avoid misrouting pstn.gw_ip = "" desc "PSTN GW Address" #!endif
#!ifdef WITH_VOICEMAIL # VoiceMail Routing on offline, busy or no answer # # - by default Voicemail server IP is empty to avoid misrouting voicemail.srv_ip = "" desc "VoiceMail IP Address" voicemail.srv_port = "5060" desc "VoiceMail Port" #!endif
#!ifdef WITH_FREESWITCH freeswitch.bindip = "10.1.128.34" desc "FreeSWITCH IP Address, to be changed to DN to be resolved by DNSSRV for load distribution" freeswitch.bindport = "5060" desc "FreeSWITCH Port" kamailio.bindip = "10.1.128.11" desc "Kamailio Internal SIP Address" kamailio.bindport = "5060" desc "Kamailio Internal SIP listen Port" kamailio.pubbindip = "<public ip>" desc "Kamailio External SIP Address" kamailio.pubbindport = "5060" desc "Kamailio External SIP listen Port" #!endif
####### Modules Section ########
# set paths to location of modules (to sources or installation folders) #!ifdef WITH_SRCPATH #mpath="modules_k:modules" mpath="modules" #!else mpath="/usr/lib64/kamailio/modules/" #!endif
#!ifdef WITH_MYSQL loadmodule "db_mysql.so" #!endif
loadmodule "mi_fifo.so" loadmodule "kex.so" loadmodule "tm.so" loadmodule "tmx.so" loadmodule "sl.so" loadmodule "rr.so" loadmodule "pv.so" loadmodule "maxfwd.so" loadmodule "usrloc.so" loadmodule "registrar.so" loadmodule "textops.so" loadmodule "siputils.so" loadmodule "xlog.so" loadmodule "sanity.so" loadmodule "ctl.so" loadmodule "cfg_rpc.so" loadmodule "mi_rpc.so" loadmodule "acc.so"
#!ifdef WITH_AUTH loadmodule "auth.so" loadmodule "auth_db.so" #!ifdef WITH_IPAUTH loadmodule "permissions.so" #!endif #!endif
#!ifdef WITH_ALIASDB loadmodule "alias_db.so" #!endif
#!ifdef WITH_SPEEDDIAL loadmodule "speeddial.so" #!endif
#!ifdef WITH_MULTIDOMAIN loadmodule "domain.so" #!endif
#!ifdef WITH_PRESENCE loadmodule "presence.so" loadmodule "presence_xml.so" #!endif
#!ifdef WITH_NAT loadmodule "nathelper.so" loadmodule "rtpproxy.so" #!endif
#!ifdef WITH_TLS loadmodule "tls.so" #!endif
#!ifdef WITH_ANTIFLOOD loadmodule "htable.so" loadmodule "pike.so" #!endif
#!ifdef WITH_XMLRPC loadmodule "xmlrpc.so" #!endif
#!ifdef WITH_DEBUG loadmodule "debugger.so" #!endif
#!ifdef WITH_FREESWITCH loadmodule "uac.so"
#loadmodule "ipops.so" #loadmodule "sqlops.so" #modparam("sqlops","sqlcon","ca=>mysql://mysql:XXXXXX@localhost/kamailio") #!endif
#!ifdef WITH_WEBSOCKETS loadmodule "xhttp.so" loadmodule "websocket.so" #!ifdef WITH_NAT #loadmodule "nathelper.so" #!endif #!endif
# ----------------- setting module-specific parameters ---------------
# ----- mi_fifo params ----- modparam("mi_fifo", "fifo_name", "/tmp/kamailio_fifo")
# ----- tm params ----- # auto-discard branches from previous serial forking leg modparam("tm", "failure_reply_mode", 3) # default retransmission timeout: 30sec modparam("tm", "fr_timer", 30000) # default invite retransmission timeout after 1xx: 120sec modparam("tm", "fr_inv_timer", 120000)
# ----- rr params ----- # add value to ;lr param to cope with most of the UAs modparam("rr", "enable_full_lr", 1) # do not append from tag to the RR (no need for this script) #!ifdef WITH_FREESWITCH modparam("rr", "append_fromtag", 1) #!else modparam("rr", "append_fromtag", 0) #!endif
# ----- registrar params ----- modparam("registrar", "method_filtering", 1) /* uncomment the next line to disable parallel forking via location */ # modparam("registrar", "append_branches", 0) /* uncomment the next line not to allow more than 10 contacts per AOR */ #modparam("registrar", "max_contacts", 10) # max value for expires of registrations modparam("registrar", "max_expires", 3600) # set it to 1 to enable GRUU modparam("registrar", "gruu_enabled", 0)
# ----- acc params ----- /* what special events should be accounted ? */ modparam("acc", "early_media", 0) modparam("acc", "report_ack", 0) modparam("acc", "report_cancels", 0) /* by default ww do not adjust the direct of the sequential requests. if you enable this parameter, be sure the enable "append_fromtag" in "rr" module */ modparam("acc", "detect_direction", 0) /* account triggers (flags) */ modparam("acc", "log_flag", FLT_ACC) modparam("acc", "log_missed_flag", FLT_ACCMISSED) modparam("acc", "log_extra", "src_user=$fU;src_domain=$fd;src_ip=$si;" "dst_ouser=$tU;dst_user=$rU;dst_domain=$rd") modparam("acc", "failed_transaction_flag", FLT_ACCFAILED) /* enhanced DB accounting */ #!ifdef WITH_ACCDB modparam("acc", "db_flag", FLT_ACC) modparam("acc", "db_missed_flag", FLT_ACCMISSED) modparam("acc", "db_url", DBURL) modparam("acc", "db_extra", "src_user=$fU;src_domain=$fd;src_ip=$si;" "dst_ouser=$tU;dst_user=$rU;dst_domain=$rd") #!endif
# ----- usrloc params ----- /* enable DB persistency for location entries */ #!ifdef WITH_USRLOCDB modparam("usrloc", "db_url", DBURL) modparam("usrloc", "db_mode", 2) modparam("usrloc", "use_domain", MULTIDOMAIN) #!endif
# ----- auth_db params ----- #!ifdef WITH_AUTH modparam("auth_db", "db_url", DBURL) modparam("auth_db", "calculate_ha1", yes) modparam("auth_db", "password_column", "password") modparam("auth_db", "load_credentials", "") modparam("auth_db", "use_domain", MULTIDOMAIN)
# ----- permissions params ----- #!ifdef WITH_IPAUTH modparam("permissions", "db_url", DBURL) modparam("permissions", "db_mode", 1) #!endif
#!endif
# ----- alias_db params ----- #!ifdef WITH_ALIASDB modparam("alias_db", "db_url", DBURL) modparam("alias_db", "use_domain", MULTIDOMAIN) #!endif
# ----- speedial params ----- #!ifdef WITH_SPEEDDIAL modparam("speeddial", "db_url", DBURL) modparam("speeddial", "use_domain", MULTIDOMAIN) #!endif
# ----- domain params ----- #!ifdef WITH_MULTIDOMAIN modparam("domain", "db_url", DBURL) # register callback to match myself condition with domains list modparam("domain", "register_myself", 1) #!endif
#!ifdef WITH_PRESENCE # ----- presence params ----- modparam("presence", "db_url", DBURL)
# ----- presence_xml params ----- modparam("presence_xml", "db_url", DBURL) modparam("presence_xml", "force_active", 1) #!endif
#!ifdef WITH_NAT # ----- rtpproxy params ----- modparam("rtpproxy", "rtpproxy_sock", "udp:127.0.0.1:7722")
# ----- nathelper params ----- modparam("nathelper", "natping_interval", 30) modparam("nathelper", "ping_nated_only", 1) modparam("nathelper", "sipping_bflag", FLB_NATSIPPING) modparam("nathelper", "sipping_from", "sip:pinger@kamailio.org")
# params needed for NAT traversal in other modules modparam("nathelper|registrar", "received_avp", "$avp(RECEIVED)") modparam("usrloc", "nat_bflag", FLB_NATB) #!endif
#!ifdef WITH_TLS # ----- tls params ----- modparam("tls", "config", "/etc/kamailio/tls.cfg") #!endif
#!ifdef WITH_ANTIFLOOD # ----- pike params ----- modparam("pike", "sampling_time_unit", 2) modparam("pike", "reqs_density_per_unit", 16) modparam("pike", "remove_latency", 4)
# ----- htable params ----- # ip ban htable with autoexpire after 5 minutes modparam("htable", "htable", "ipban=>size=8;autoexpire=300;") #!endif
#!ifdef WITH_XMLRPC # ----- xmlrpc params ----- modparam("xmlrpc", "route", "XMLRPC"); modparam("xmlrpc", "url_match", "^/RPC") #!endif
#!ifdef WITH_DEBUG # ----- debugger params ----- modparam("debugger", "cfgtrace", 1) #!endif
####### Routing Logic ########
# Main SIP request routing logic # - processing of any incoming SIP request starts with this route # - note: this is the same as route { ... } request_route {
# per request initial checks route(REQINIT);
#!ifdef WITH_WEBSOCKETS if (nat_uac_test(64)) { # Do NAT traversal stuff for requests from a WebSocket # connection - even if it is not behind a NAT! # This won't be needed in the future if Kamailio and the # WebSocket client support Outbound and Path. xlog("L_INFO", "Websockets NAT detection!!!\n"); force_rport(); if (is_method("REGISTER")) { fix_nated_register(); } else { if (!add_contact_alias()) { xlog("L_ERR", "Error aliasing contact <$ct>\n"); sl_send_reply("400", "Bad Request"); exit; } } } #!endif
# NAT detection route(NATDETECT);
# CANCEL processing if (is_method("CANCEL")) { if (t_check_trans()) t_relay(); exit; }
# handle requests within SIP dialogs route(WITHINDLG);
### only initial requests (no To tag)
t_check_trans();
# authentication route(AUTH);
# record routing for dialog forming requests (in case they are routed) # - remove preloaded route headers remove_hf("Route"); if (is_method("INVITE|SUBSCRIBE")) record_route();
# account only INVITEs if (is_method("INVITE")) { setflag(FLT_ACC); # do accounting }
# dispatch requests to foreign domains route(SIPOUT);
### requests for my local domains
# handle presence related requests route(PRESENCE);
# handle registrations route(REGISTRAR);
if ($rU==$null) { # request with no Username in RURI sl_send_reply("484","Address Incomplete"); exit; }
# dispatch destinations to PSTN route(PSTN);
#!ifdef WITH_FREESWITCH # save callee ID $avp(callee) = $rU; route(FSDISPATCH); #!endif
# user location service route(LOCATION);
route(RELAY); }
route[RELAY] {
# enable additional event routes for forwarded requests # - serial forking, RTP relaying handling, a.s.o. #!ifdef WITH_CFGSAMPLES if (is_method("INVITE|SUBSCRIBE")) { t_on_branch("MANAGE_BRANCH"); t_on_reply("MANAGE_REPLY"); } if (is_method("INVITE")) { t_on_failure("MANAGE_FAILURE"); } #!endif if (!t_relay()) { sl_reply_error(); } exit; }
# Per SIP request initial checks route[REQINIT] { #!ifdef WITH_ANTIFLOOD # flood dection from same IP and traffic ban for a while # be sure you exclude checking trusted peers, such as pstn gateways # - local host excluded (e.g., loop to self) if(src_ip!=myself) { if($sht(ipban=>$si)!=$null) { # ip is already blocked xdbg("request from blocked IP - $rm from $fu (IP:$si:$sp)\n"); exit; } if (!pike_check_req()) { xlog("L_ALERT","ALERT: pike blocking $rm from $fu (IP:$si:$sp)\n"); $sht(ipban=>$si) = 1; exit; } } #!endif
if (!mf_process_maxfwd_header("10")) { sl_send_reply("483","Too Many Hops"); exit; }
if(!sanity_check("1511", "7")) { xlog("Malformed SIP message from $si:$sp\n"); exit; } }
# Handle requests within SIP dialogs route[WITHINDLG] { if (has_totag()) { # sequential request withing a dialog should # take the path determined by record-routing if (loose_route()) { #!ifdef WITH_WEBSOCKETS xlog("L_INFO", "Websockets handling ruri in WITHINDLG!!!\n"); if ($du == "") { if (!handle_ruri_alias()) { xlog("L_ERR", "Bad alias <$ru>\n"); sl_send_reply("400", "Bad Request"); exit; } } #!endif route(DLGURI); if (is_method("BYE")) { setflag(FLT_ACC); # do accounting ... setflag(FLT_ACCFAILED); # ... even if the transaction fails } else if ( is_method("ACK") ) { # ACK is forwarded statelessy route(NATMANAGE); } else if ( is_method("NOTIFY") ) { # Add Record-Route for in-dialog NOTIFY as per RFC 6665. record_route(); } route(RELAY); } else { if (is_method("SUBSCRIBE") && uri == myself) { # in-dialog subscribe requests route(PRESENCE); exit; } if ( is_method("ACK") ) { if ( t_check_trans() ) { # no loose-route, but stateful ACK; # must be an ACK after a 487 # or e.g. 404 from upstream server t_relay(); exit; } else { # ACK without matching transaction ... ignore and discard exit; } } sl_send_reply("404","Not here"); } exit; } }
# Handle SIP registrations route[REGISTRAR] { if (is_method("REGISTER")) { if(isflagset(FLT_NATS)) { setbflag(FLB_NATB); # uncomment next line to do SIP NAT pinging ## setbflag(FLB_NATSIPPING); } if (!save("location")) sl_reply_error();
#!ifdef WITH_FREESWITCH route(FSREGFWD); #!endif exit; } }
# USER location service route[LOCATION] {
#!ifdef WITH_SPEEDIAL # search for short dialing - 2-digit extension if($rU=~"^[0-9][0-9]$") if(sd_lookup("speed_dial")) route(SIPOUT); #!endif
#!ifdef WITH_ALIASDB # search in DB-based aliases if(alias_db_lookup("dbaliases")) route(SIPOUT); #!endif
$avp(oexten) = $rU; if (!lookup("location")) { $var(rc) = $rc; route(TOVOICEMAIL); t_newtran(); switch ($var(rc)) { case -1: case -3: send_reply("404", "Not Found"); exit; case -2: send_reply("405", "Method Not Allowed"); exit; } }
# when routing via usrloc, log the missed calls also if (is_method("INVITE")) { setflag(FLT_ACCMISSED); } }
# Presence server route route[PRESENCE] { if(!is_method("PUBLISH|SUBSCRIBE")) return;
#!ifdef WITH_PRESENCE if (!t_newtran()) { sl_reply_error(); exit; };
if(is_method("PUBLISH")) { handle_publish(); t_release(); } else if( is_method("SUBSCRIBE")) { handle_subscribe(); t_release(); } exit; #!endif
# if presence enabled, this part will not be executed if (is_method("PUBLISH") || $rU==$null) { sl_send_reply("404", "Not here"); exit; } return; }
# Authentication route route[AUTH] { #!ifdef WITH_AUTH
#!ifdef WITH_IPAUTH if((!is_method("REGISTER")) && allow_source_address()) { # source IP allowed return; } #!endif
#!ifdef WITH_FREESWITCH if(route(FSINBOUND)) return; #!endif
if (is_method("REGISTER") || from_uri==myself) { # authenticate requests if (!auth_check("$fd", "subscriber", "1")) { auth_challenge("$fd", "0"); exit; } # user authenticated - remove auth header if(!is_method("REGISTER|PUBLISH")) consume_credentials(); } # if caller is not local subscriber, then check if it calls # a local destination, otherwise deny, not an open relay here xlog("L_INFO", "REGISTER REceived from from_uri\n");#+", for "+uri+", at "+myself+"...\n"); if (from_uri!=myself && uri!=myself) { sl_send_reply("403","Not relaying"); exit; }
#!endif return; }
# Caller NAT detection route route[NATDETECT] { #!ifdef WITH_NAT force_rport(); xlog("L_INFO", "In NATDETECT!!!\n"); #We are SBC, receiving from Public UAC and passing it to FS to Private LAN - so, removing the nat test #if (nat_uac_test("19")) { if (is_method("REGISTER")) { fix_nated_register(); } else { remove_hf("Contact"); if(route(FSINBOUND)) { xlog("L_INFO", "From FS --->\n"); $var(contact_uri) = $fU + "@" + $sel(cfg_get.kamailio.pubbindip) + ":" + $sel(cfg_get.kamailio.pubbindport); xlog("L_INFO", "Replacing Contact $ct with $var(contact_uri)...\n"); #add_contact_alias(); #fix_nated_contact(); insert_hf("Contact: sip:$var(contact_uri)\r\n", "Contact"); xlog("L_INFO", "Removing Route header!!!\n"); remove_hf("Route"); } else { xlog("L_INFO", "<--- To FS\n"); $var(contact_uri) = $fU + "@" + $sel(cfg_get.kamailio.bindip) + ":" + $sel(cfg_get.kamailio.bindport); xlog("L_INFO", "Replacing Contact $ct with $var(contact_uri)...\n"); insert_hf("Contact: sip:$var(contact_uri)\r\n", "Contact"); } } setflag(FLT_NATS); #} #!endif return; }
# RTPProxy control route[NATMANAGE] { #!ifdef WITH_NAT xlog("L_INFO", "In NATMANAGE!!!\n"); #if (is_request()) { if(has_totag()) { if(check_route_param("nat=yes")) { setbflag(FLB_NATB); } } #} if (!(isflagset(FLT_NATS) || isbflagset(FLB_NATB))) return;
if(route(FSINBOUND)) { xlog("L_INFO", "Call is going to public domain. Engaging RTPProxy\n"); rtpproxy_manage("rwei"); } else { xlog("L_INFO", "Call is going to private IPv4 Media Server. Engaging RTPProxy\n"); rtpproxy_manage("rwie"); }
if (is_request()) { if (!has_totag()) { add_rr_param(";nat=yes"); } } if (is_reply()) { xlog("L_INFO", "Reply handling, Contact header shows -> $ct!!!\n"); remove_hf("Contact"); if(route(FSINBOUND)) { xlog("L_INFO", "From FS --->\n"); #$var(contact_uri) = $(ct{tobody.user}) + "@" + $(ct{tobody.host}); $var(contact_uri) = $fU + "@" + $sel(cfg_get.kamailio.pubbindip) + ":" + $sel(cfg_get.kamailio.pubbindport); xlog("L_INFO", "Replacing with $var(contact_uri)...\n"); insert_hf("Contact: sip:$var(contact_uri)\r\n", "Contact"); xlog("L_INFO", "Removing Route header!!!\n"); remove_hf("Route"); } else { xlog("L_INFO", "<--- To FS\n"); $var(contact_uri) = $fU + "@" + $sel(cfg_get.kamailio.bindip) + ":" + $sel(cfg_get.kamailio.bindport); xlog("L_INFO", "Replacing with $var(contact_uri)...\n"); insert_hf("Contact: sip:$var(contact_uri)\r\n", "Contact"); } if(isbflagset(FLB_NATB)) { add_contact_alias(); } } #!endif return; }
# URI update for dialog requests route[DLGURI] { #!ifdef WITH_NAT if(!isdsturiset()) { handle_ruri_alias(); } #!endif return; }
# Routing to foreign domains route[SIPOUT] { if (!uri==myself) { append_hf("P-hint: outbound\r\n"); route(RELAY); } }
# PSTN GW routing route[PSTN] { #!ifdef WITH_PSTN # check if PSTN GW IP is defined if (strempty($sel(cfg_get.pstn.gw_ip))) { xlog("SCRIPT: PSTN rotuing enabled but pstn.gw_ip not defined\n"); return; }
# route to PSTN dialed numbers starting with '+' or '00' # (international format) # - update the condition to match your dialing rules for PSTN routing if(!($rU=~"^(+|00)[1-9][0-9]{3,20}$")) return;
# only local users allowed to call if(from_uri!=myself) { sl_send_reply("403", "Not Allowed"); exit; }
$ru = "sip:" + $rU + "@" + $sel(cfg_get.pstn.gw_ip);
route(RELAY); exit; #!endif
return; }
# XMLRPC routing #!ifdef WITH_XMLRPC route[XMLRPC] { # allow XMLRPC from localhost if ((method=="POST" || method=="GET") && (src_ip==127.0.0.1)) { # close connection only for xmlrpclib user agents (there is a bug in # xmlrpclib: it waits for EOF before interpreting the response). if ($hdr(User-Agent) =~ "xmlrpclib") set_reply_close(); set_reply_no_connect(); dispatch_rpc(); exit; } send_reply("403", "Forbidden"); exit; } #!endif
# route to voicemail server route[TOVOICEMAIL] { #!ifdef WITH_VOICEMAIL if(!is_method("INVITE")) return;
# check if VoiceMail server IP is defined if (strempty($sel(cfg_get.voicemail.srv_ip))) { xlog("SCRIPT: VoiceMail rotuing enabled but IP not defined\n"); return; } if($avp(oexten)==$null) return;
$ru = "sip:" + $avp(oexten) + "@" + $sel(cfg_get.voicemail.srv_ip) + ":" + $sel(cfg_get.voicemail.srv_port); route(RELAY); exit; #!endif
return; }
#!ifdef WITH_FREESWITCH # FreeSWITCH routing blocks route[FSINBOUND] { if($si== $sel(cfg_get.freeswitch.bindip) && $sp==$sel(cfg_get.freeswitch.bindport)) return 1; return -1; }
# Forward REGISTER to FreeSWITCH route[FSREGFWD] { if(!is_method("REGISTER")) { return; } $var(rip) = $sel(cfg_get.freeswitch.bindip); $uac_req(method) = "REGISTER"; $uac_req(ruri)="sip:" + $var(rip) + ":" + $sel(cfg_get.freeswitch.bindport); $uac_req(furi)="sip:" + $au + "@" + $var(rip); $uac_req(turi)="sip:" + $au + "@" + $var(rip); $uac_req(hdrs)="Contact: <sip:" + $au + "@" + $sel(cfg_get.kamailio.bindip) + ":" + $sel(cfg_get.kamailio.bindport) + ">\r\n"; if($sel(contact.expires) != $null) $uac_req(hdrs)= $uac_req(hdrs) + "Expires: " + $sel(contact.expires) + "\r\n"; else $uac_req(hdrs)= $uac_req(hdrs) + "Expires: " + $hdr(Expires) + "\r\n"; uac_req_send(); }
route[FSDISPATCH] { if(!is_method("INVITE")) return; if(route(FSINBOUND)) return;
# dial number selection switch($rU) { case /"^41$": # 41 - voicebox menu # allow only authenticated users if($au==$null) { sl_send_reply("403", "Not allowed"); exit; } $rU = "vm-" + $au; break; case /"^441[0-9][0-9]$": # starting with 44 folowed by 1XY - direct call to voice box strip(2); route(FSVBOX); break; case /"^433[01][0-9][0-9]$": # starting with 433 folowed by (0|1)XY - conference strip(2); break; case /"^45[0-9]+$": strip(2); break; default: # offline - send to voicebox #Dipak 01/27/2014 Commemted the following block, FS to handle VMBox #!ifdef NOT_COMMENTED_OUT if (!registered("location")) { route(FSVBOX); exit; } #!endif # online - do bridging #Dipak 01/27/2014 Commemted the following, not needed #prefix("kb-"); if(is_method("INVITE")) { # in case of failure - re-route to FreeSWITCH VoiceMail t_on_failure("FAIL_FSVBOX"); } } route(FSRELAY); exit; }
route[FSVBOX] { if(!($rU=~"^1[0-9][0-9]+$")) return; prefix("vb-"); route(FSRELAY); }
# Send to FreeSWITCH route[FSRELAY] { $du = "sip:" + $sel(cfg_get.freeswitch.bindip) + ":" + $sel(cfg_get.freeswitch.bindport); route(RELAY); exit; }
#!endif
# manage outgoing branches branch_route[MANAGE_BRANCH] { xdbg("new branch [$T_branch_idx] to $ru\n"); route(NATMANAGE); }
# manage incoming replies onreply_route[MANAGE_REPLY] { xdbg("incoming reply\n"); if(status=~"[12][0-9][0-9]") route(NATMANAGE); }
# manage failure routing cases failure_route[MANAGE_FAILURE] { route(NATMANAGE);
if (t_is_canceled()) { exit; }
#!ifdef WITH_BLOCK3XX # block call redirect based on 3xx replies. if (t_check_status("3[0-9][0-9]")) { t_reply("404","Not found"); exit; } #!endif
#!ifdef WITH_VOICEMAIL # serial forking # - route to voicemail on busy or no answer (timeout) if (t_check_status("486|408")) { route(TOVOICEMAIL); exit; } #!endif }
#!ifdef WITH_FREESWITCH failure_route[FAIL_FSVBOX] { #!ifdef WITH_NAT if (is_method("INVITE") && (isbflagset(FLB_NATB) || isflagset(FLT_NATS))) { unforce_rtp_proxy(); } #!endif
if (t_is_canceled()) { exit; }
if (t_check_status("486|408")) { # re-route to FreeSWITCH VoiceMail $rU = $avp(callee); route(FSVBOX); } } #!endif
#!ifdef WITH_WEBSOCKETS onreply_route { if ((($Rp == MY_WS_PORT || $Rp == MY_WSS_PORT) && !(proto == WS || proto == WSS))) { # || $Rp == MY_MSRP_PORT) { xlog("L_WARN", "SIP response received on websocket $Rp\n"); drop; exit; }
if (nat_uac_test(64)) { # Do NAT traversal stuff for replies to a WebSocket connection # - even if it is not behind a NAT! # This won't be needed in the future if Kamailio and the # WebSocket client support Outbound and Path. add_contact_alias(); } }
event_route[xhttp:request] { set_reply_close(); set_reply_no_connect(); if ($Rp != MY_WS_PORT #!ifdef WITH_TLS && $Rp != MY_WSS_PORT #!endif ) { xlog("L_WARN", "HTTP request received on $Rp\n"); xhttp_reply("403", "Forbidden", "", ""); exit; }
xlog("L_DBG", "HTTP Request Received\n");
if ($hdr(Upgrade)=~"websocket" && $hdr(Connection)=~"Upgrade" && $rm=~"GET") {
# Validate Host - make sure the client is using the correct # alias for WebSockets if ($hdr(Host) == $null || !is_myself("sip:" + $hdr(Host))) { xlog("L_WARN", "Bad host $hdr(Host)\n"); xhttp_reply("403", "Forbidden", "", ""); exit; }
# Optional... validate Origin - make sure the client is from an # authorised website. For example, # # if ($hdr(Origin) != "http://communicator.MY_DOMAIN" # && $hdr(Origin) != "https://communicator.MY_DOMAIN") { # xlog("L_WARN", "Unauthorised client $hdr(Origin)\n"); # xhttp_reply("403", "Forbidden", "", ""); # exit; # }
# Optional... perform HTTP authentication
# ws_handle_handshake() exits (no further configuration file # processing of the request) when complete. if (ws_handle_handshake()) { # Optional... cache some information about the # successful connection exit; } }
xhttp_reply("404", "Not Found", "", ""); }
event_route[websocket:closed] { xlog("L_INFO", "WebSocket connection from $si:$sp has closed\n"); } #!endif
On Mon, Feb 3, 2014 at 10:56 AM, *sm1Ly st.uzver@gmail.com wrote: