Dear all,
I have set up both xten and sipura, I want to test onnet calls between
them. I am fine with xten eyebeam to xten eyebeam, and sipura to
sipura, both scenario works fine. when I do xten to sipura 2000, it
rings and when pick up, xten sends BYE right after ACK. I've tried
1.0.1 verson and the CVS HEAD, happens to both version. did anyone
encountered the same problem?
thanks
Ray
ps. debug attached
--
U 61.144.140.110:42075 -> 210.184.138.8:5066
INVITE sip:02061241205@210.184.138.8:5066 SIP/2.0.
To: <sip:02061241205@210.184.138.8>.
From: 3068878<sip:3068878@210.184.138.8>;tag=6a33d80f.
Via: SIP/2.0/UDP 192.168.1.168:9801;branch=z9hG4bK-d87543-443309010-1--d87543-;rport.
Call-ID: c47ef44f950e7a56.
CSeq: 1 INVITE.
Contact: <sip:3068878@192.168.1.168:9801>.
Max-Forwards: 70.
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO.
Content-Type: application/sdp.
User-Agent: eyeBeam release 3004t stamp 16741.
Content-Length: 234.
.
v=0.
o=- 21525734 21525766 IN IP4 192.168.1.168.
s=eyeBeam.
c=IN IP4 192.168.1.168.
t=0 0.
m=audio 9802 RTP/AVP 18 101.
a=alt:1 1 : 8743E761 095E081B 192.168.1.168 9802.
a=fmtp:101 0-15.
a=rtpmap:101 telephone-event/8000.
a=sendrecv.
#
U 210.184.138.8:5066 -> 61.144.140.110:42075
SIP/2.0 100 trying -- your call is important to us.
To: <sip:02061241205@210.184.138.8>.
From: 3068878<sip:3068878@210.184.138.8>;tag=6a33d80f.
Via: SIP/2.0/UDP
192.168.1.168:9801;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075;received=61.144.140.110.
Call-ID: c47ef44f950e7a56.
CSeq: 1 INVITE.
Server: OpenSer (1.1.0-pre2-notls (i386/linux)).
Content-Length: 0.
.
#
U 210.184.138.8:5066 -> 219.136.10.86:64189
INVITE sip:862061241205@219.136.10.86:64189 SIP/2.0.
Record-Route: <sip:210.184.138.8:5066;lr=on;ftag=6a33d80f>.
To: <sip:02061241205@210.184.138.8>.
From: 3068878<sip:3068878@210.184.138.8>;tag=6a33d80f.
Via: SIP/2.0/UDP 210.184.138.8:5066;branch=z9hG4bK72b9.90fc56c.0.
Via: SIP/2.0/UDP
192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075.
Call-ID: c47ef44f950e7a56.
CSeq: 1 INVITE.
Contact: <sip:3068878@61.144.140.110:42075>.
Max-Forwards: 69.
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO.
Content-Type: application/sdp.
User-Agent: eyeBeam release 3004t stamp 16741.
Content-Length: 273.
P-hint: Proxied.
P-hint: usrloc applied.
.
v=0.
o=- 21525734 21525766 IN IP4 192.168.1.168.
s=eyeBeam.
c=IN IP4 210.184.138.8.
t=0 0.
m=audio 35130 RTP/AVP 18 101.
a=alt:1 1 : 8743E761 095E081B 192.168.1.168 9802.
a=fmtp:101 0-15.
a=rtpmap:101 telephone-event/8000.
a=sendrecv.
a=direction:active.
a=nortpproxy:yes.
#
U 219.136.10.86:64189 -> 210.184.138.8:5066
SIP/2.0 100 Trying.
To: <sip:02061241205@210.184.138.8>.
From: 3068878<sip:3068878@210.184.138.8>;tag=6a33d80f.
Call-ID: c47ef44f950e7a56.
CSeq: 1 INVITE.
Via: SIP/2.0/UDP 210.184.138.8:5066;branch=z9hG4bK72b9.90fc56c.0.
Via: SIP/2.0/UDP
192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075.
Record-Route: <sip:210.184.138.8:5066;lr=on;ftag=6a33d80f>.
Server: Sipura/SPA2000-2.0.13(g).
Content-Length: 0.
.
#
U 219.136.10.86:64189 -> 210.184.138.8:5066
SIP/2.0 180 Ringing.
To: <sip:02061241205@210.184.138.8>;tag=3b3dbe3871bbfa37i0.
From: 3068878<sip:3068878@210.184.138.8>;tag=6a33d80f.
Call-ID: c47ef44f950e7a56.
CSeq: 1 INVITE.
Via: SIP/2.0/UDP 210.184.138.8:5066;branch=z9hG4bK72b9.90fc56c.0.
Via: SIP/2.0/UDP
192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075.
Record-Route: <sip:210.184.138.8:5066;lr=on;ftag=6a33d80f>.
Server: Sipura/SPA2000-2.0.13(g).
Content-Length: 0.
.
#
U 210.184.138.8:5066 -> 61.144.140.110:42075
SIP/2.0 180 Ringing.
To: <sip:02061241205@210.184.138.8>;tag=3b3dbe3871bbfa37i0.
From: 3068878<sip:3068878@210.184.138.8>;tag=6a33d80f.
Call-ID: c47ef44f950e7a56.
CSeq: 1 INVITE.
Via: SIP/2.0/UDP
192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075.
Record-Route: <sip:210.184.138.8:5066;lr=on;ftag=6a33d80f>.
Server: Sipura/SPA2000-2.0.13(g).
Content-Length: 0.
.
#
U 61.144.140.110:46935 -> 210.184.138.8:5066
SIP/2.0 404 Not Found.
To: sip:61.144.140.110:46935;tag=ab59191034906d25i0.
From: sip:keepitopen@broadz.net;tag=75ca79a5.
Call-ID: c60b3302-3e11e12-c8(a)210.184.138.8.
CSeq: 1 OPTIONS.
Via: SIP/2.0/UDP 210.184.138.8:5066;branch=0.
Server: Sipura/SPA2002-3.1.2(a).
Content-Length: 0.
.
#
U 219.136.10.86:64189 -> 210.184.138.8:5066
SIP/2.0 180 Ringing.
To: <sip:02061241205@210.184.138.8>;tag=3b3dbe3871bbfa37i0.
From: 3068878<sip:3068878@210.184.138.8>;tag=6a33d80f.
Call-ID: c47ef44f950e7a56.
CSeq: 1 INVITE.
Via: SIP/2.0/UDP 210.184.138.8:5066;branch=z9hG4bK72b9.90fc56c.0.
Via: SIP/2.0/UDP
192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075.
Record-Route: <sip:210.184.138.8:5066;lr=on;ftag=6a33d80f>.
Server: Sipura/SPA2000-2.0.13(g).
Content-Length: 0.
.
#
U 210.184.138.8:5066 -> 61.144.140.110:42075
SIP/2.0 180 Ringing.
To: <sip:02061241205@210.184.138.8>;tag=3b3dbe3871bbfa37i0.
From: 3068878<sip:3068878@210.184.138.8>;tag=6a33d80f.
Call-ID: c47ef44f950e7a56.
CSeq: 1 INVITE.
Via: SIP/2.0/UDP
192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075.
Record-Route: <sip:210.184.138.8:5066;lr=on;ftag=6a33d80f>.
Server: Sipura/SPA2000-2.0.13(g).
Content-Length: 0.
.
#
U 219.136.10.86:64189 -> 210.184.138.8:5066
SIP/2.0 200 OK.
To: <sip:02061241205@210.184.138.8>;tag=3b3dbe3871bbfa37i0.
From: 3068878<sip:3068878@210.184.138.8>;tag=6a33d80f.
Call-ID: c47ef44f950e7a56.
CSeq: 1 INVITE.
Via: SIP/2.0/UDP 210.184.138.8:5066;branch=z9hG4bK72b9.90fc56c.0.
Via: SIP/2.0/UDP
192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075.
Record-Route: <sip:210.184.138.8:5066;lr=on;ftag=6a33d80f>.
Contact: 862061241205 <sip:862061241205@192.168.10.244:8177>.
Server: Sipura/SPA2000-2.0.13(g).
Content-Length: 238.
Allow: ACK, BYE, CANCEL, INFO, INVITE, NOTIFY, OPTIONS, REFER.
Supported: x-sipura.
Content-Type: application/sdp.
.
v=0.
o=- 12432 12432 IN IP4 192.168.10.244.
s=-.
c=IN IP4 192.168.10.244.
t=0 0.
m=audio 43712 RTP/AVP 18 100 101.
a=rtpmap:18 G729a/8000.
a=rtpmap:100 NSE/8000.
a=rtpmap:101 telephone-event/8000.
a=fmtp:101 0-15.
a=ptime:30.
a=sendrecv.
#
U 210.184.138.8:5066 -> 61.144.140.110:42075
SIP/2.0 200 OK.
To: <sip:02061241205@210.184.138.8>;tag=3b3dbe3871bbfa37i0.
From: 3068878<sip:3068878@210.184.138.8>;tag=6a33d80f.
Call-ID: c47ef44f950e7a56.
CSeq: 1 INVITE.
Via: SIP/2.0/UDP
192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075.
Record-Route: <sip:210.184.138.8:5066;lr=on;ftag=6a33d80f>.
Contact: 862061241205 <sip:862061241205@219.136.10.86:64189>.
Server: Sipura/SPA2000-2.0.13(g).
Content-Length: 255.
Allow: ACK, BYE, CANCEL, INFO, INVITE, NOTIFY, OPTIONS, REFER.
Supported: x-sipura.
Content-Type: application/sdp.
P-hint: Reply-Proxied.
.
v=0.
o=- 12432 12432 IN IP4 192.168.10.244.
s=-.
c=IN IP4 210.184.138.8.
t=0 0.
m=audio 35132 RTP/AVP 18 100 101.
a=rtpmap:18 G729a/8000.
a=rtpmap:100 NSE/8000.
a=rtpmap:101 telephone-event/8000.
a=fmtp:101 0-15.
a=ptime:30.
a=sendrecv.
a=nortpproxy:yes.
#
U 61.144.140.110:42075 -> 210.184.138.8:5066
ACK sip:862061241205@219.136.10.86:64189 SIP/2.0.
To: <sip:02061241205@210.184.138.8>;tag=3b3dbe3871bbfa37i0.
From: 3068878<sip:3068878@210.184.138.8>;tag=6a33d80f.
Via: SIP/2.0/UDP 192.168.1.168:9801;branch=z9hG4bK-d87543-708924014-1--d87543-;rport.
Call-ID: c47ef44f950e7a56.
CSeq: 1 ACK.
Route: <sip:210.184.138.8:5066;lr;ftag=6a33d80f>.
Contact: <sip:3068878@192.168.1.168:9801>.
Max-Forwards: 70.
User-Agent: eyeBeam release 3004t stamp 16741.
Content-Length: 0.
.
#
U 210.184.138.8:5066 -> 219.136.10.86:64189
ACK sip:862061241205@219.136.10.86:64189 SIP/2.0.
To: <sip:02061241205@210.184.138.8>;tag=3b3dbe3871bbfa37i0.
From: 3068878<sip:3068878@210.184.138.8>;tag=6a33d80f.
Via: SIP/2.0/UDP 210.184.138.8:5066;branch=z9hG4bK72b9.90fc56c.2.
Via: SIP/2.0/UDP
192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-708924014-1--d87543-;rport=42075.
Call-ID: c47ef44f950e7a56.
CSeq: 1 ACK.
Contact: <sip:3068878@61.144.140.110:42075>.
Max-Forwards: 69.
User-Agent: eyeBeam release 3004t stamp 16741.
Content-Length: 0.
P-hint: Proxied.
P-hint: rr-enforced.
.
#
U 61.144.140.110:42075 -> 210.184.138.8:5066
BYE sip:862061241205@219.136.10.86:64189 SIP/2.0.
To: <sip:02061241205@210.184.138.8>;tag=3b3dbe3871bbfa37i0.
From: 3068878<sip:3068878@210.184.138.8>;tag=6a33d80f.
Via: SIP/2.0/UDP 192.168.1.168:9801;branch=z9hG4bK-d87543-956249433-1--d87543-;rport.
Call-ID: c47ef44f950e7a56.
CSeq: 2 BYE.
Route: <sip:210.184.138.8:5066;lr;ftag=6a33d80f>.
Contact: <sip:3068878@192.168.1.168:9801>.
Max-Forwards: 70.
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO.
User-Agent: eyeBeam release 3004t stamp 16741.
Content-Length: 0.
.
#
U 210.184.138.8:5066 -> 219.136.10.86:64189
BYE sip:862061241205@219.136.10.86:64189 SIP/2.0.
To: <sip:02061241205@210.184.138.8>;tag=3b3dbe3871bbfa37i0.
From: 3068878<sip:3068878@210.184.138.8>;tag=6a33d80f.
Via: SIP/2.0/UDP 210.184.138.8:5066;branch=z9hG4bK42b9.d7afa485.0.
Via: SIP/2.0/UDP
192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-956249433-1--d87543-;rport=42075.
Call-ID: c47ef44f950e7a56.
CSeq: 2 BYE.
Contact: <sip:3068878@61.144.140.110:42075>.
Max-Forwards: 69.
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO.
User-Agent: eyeBeam release 3004t stamp 16741.
Content-Length: 0.
P-hint: Proxied.
P-hint: rr-enforced.
.
#
U 219.136.10.86:64189 -> 210.184.138.8:5066
SIP/2.0 200 OK.
To: <sip:02061241205@210.184.138.8>;tag=3b3dbe3871bbfa37i0.
From: 3068878<sip:3068878@210.184.138.8>;tag=6a33d80f.
Call-ID: c47ef44f950e7a56.
CSeq: 2 BYE.
Via: SIP/2.0/UDP 210.184.138.8:5066;branch=z9hG4bK42b9.d7afa485.0.
Via: SIP/2.0/UDP
192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-956249433-1--d87543-;rport=42075.
Server: Sipura/SPA2000-2.0.13(g).
Content-Length: 0.
.
#
U 210.184.138.8:5066 -> 61.144.140.110:42075
SIP/2.0 200 OK.
To: <sip:02061241205@210.184.138.8>;tag=3b3dbe3871bbfa37i0.
From: 3068878<sip:3068878@210.184.138.8>;tag=6a33d80f.
Call-ID: c47ef44f950e7a56.
CSeq: 2 BYE.
Via: SIP/2.0/UDP
192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-956249433-1--d87543-;rport=42075.
Server: Sipura/SPA2000-2.0.13(g).
Content-Length: 0.
0(2815) receive_msg: cleaning up
0(2815) SIP Request:
0(2815) method: <INVITE>
0(2815) uri: <sip:02061241205@210.184.138.8:5066>
0(2815) version: <SIP/2.0>
0(2815) parse_headers: flags=2
0(2815) DEBUG:parse_to:end of header reached, state=10
0(2815) DBUG:parse_to: display={}, ruri={sip:02061241205@210.184.138.8}
0(2815) DEBUG: get_hdr_field: <To> [33]; uri=[sip:02061241205@210.184.138.8]
0(2815) DEBUG: to body [<sip:02061241205@210.184.138.8>
]
0(2815) Found param type 232, <branch> =
<z9hG4bK-d87543-443309010-1--d87543->; state=6
0(2815) Found param type 235, <rport> = <n/a>; state=17
0(2815) end of header reached, state=5
0(2815) parse_headers: Via found, flags=2
0(2815) parse_headers: this is the first via
0(2815) After parse_msg...
0(2815) preparing to run routing scripts...
0(2815) parse_headers: flags=100
0(2815) get_hdr_field: cseq <CSeq>: <1> <INVITE>
0(2815) DEBUG:maxfwd:is_maxfwd_present: value = 70
0(2815) parse_headers: flags=80
0(2815) parse_headers: flags=ffffffffffffffff
0(2815) DEBUG: get_hdr_body : content_length=234
0(2815) found end of header
0(2815) DEBUG:check_content_type: type <application/sdp> found valid
0(2815) parse_headers: flags=ffffffffffffffff
0(2815) parse_headers: flags=200
0(2815) find_first_route: No Route headers found
0(2815) loose_route: There is no Route HF
0(2815) DEBUG: add_param: tag=6a33d80f
0(2815) DEBUG:parse_to:end of header reached, state=29
0(2815) DBUG:parse_to: display={3068878}, ruri={sip:3068878@210.184.138.8}
0(2815) grep_sock_info - checking if host==us: 13==13 && [210.184.138.8] ==
[210.184.138.8]
0(2815) grep_sock_info - checking if port 5066 matches port 5066
0(2815) DEBUG:avpops:load_avps: loaded avps = 0
0(2815) rewrite_uri: Rewriting Request-URI with
'sip:862061241205@219.136.10.86:64189'
0(2815) DEBUG:avpops:load_avps: loaded avps = 0
0(2815) parse_headers: flags=ffffffffffffffff
0(2815) parse_headers: flags=ffffffffffffffff
0(2815) DEBUG:check_content_type: type <application/sdp> found valid
0(2815) parse_headers: flags=40
0(2815) force_rtp_proxy2: proxy reply: 35130 210.184.138.8
0(2815) DEBUG: t_newtran: msg id=69 , global msg id=40 , T on entrance=0xffffffff
0(2815) parse_headers: flags=ffffffffffffffff
0(2815) parse_headers: flags=78
0(2815) t_lookup_request: start searching: hash=39719, isACK=0
0(2815) DEBUG: RFC3261 transaction matching failed
0(2815) DEBUG: t_lookup_request: no transaction found
0(2815) DEBUG:tm:t_relay: new INVITE
0(2815) parse_headers: flags=ffffffffffffffff
0(2815) check_via_address(61.144.140.110, 192.168.1.168, 1)
0(2815) check_via_address: doing dns lookup
0(2815) WARNING:vqm_resize: resize(0) called
0(2815) DEBUG:tm:_reply_light: reply sent out. buf=0x81631c0: SIP/2.0 1...,
shmem=0xb60aff08: SIP/2.0 1
0(2815) DEBUG:tm:_reply_light: finished
0(2815) DEBUG: mk_proxy: doing DNS lookup...
0(2815) parse_headers: flags=2000
0(2815) parse_headers: flags=ffffffffffffffff
0(2815) clen_builder: content-length: 273 (273)
0(2815) check_via_address(61.144.140.110, 192.168.1.168, 1)
0(2815) check_via_address: doing dns lookup
0(2815) DEBUG: add_to_tail_of_timer[4]: 0xb60b048c
0(2815) DEBUG: add_to_tail_of_timer[0]: 0xb60b049c
0(2815) SER: new transaction fwd'ed
0(2815) DEBUG:tm:UNREF_UNSAFE: after is 0
0(2815) DEBUG:destroy_avp_list: destroying list (nil)
0(2815) receive_msg: cleaning up
0(2815) SIP Reply (status):
0(2815) version: <SIP/2.0>
0(2815) status: <100>
0(2815) reason: <Trying>
0(2815) parse_headers: flags=2
0(2815) DEBUG:parse_to:end of header reached, state=10
0(2815) DBUG:parse_to: display={}, ruri={sip:02061241205@210.184.138.8}
0(2815) DEBUG: get_hdr_field: <To> [33]; uri=[sip:02061241205@210.184.138.8]
0(2815) DEBUG: to body [<sip:02061241205@210.184.138.8>
]
0(2815) get_hdr_field: cseq <CSeq>: <1> <INVITE>
0(2815) Found param type 232, <branch> = <z9hG4bK72b9.90fc56c.0>; state=16
0(2815) end of header reached, state=5
0(2815) parse_headers: Via found, flags=2
0(2815) parse_headers: this is the first via
0(2815) After parse_msg...
0(2815) forward_reply: found module nathelper, passing reply to it
0(2815) forward_reply: found module tm, passing reply to it
0(2815) DEBUG: t_check: msg id=70 global id=69 T start=0xffffffff
0(2815) parse_headers: flags=22
0(2815) parse_headers: flags=8
0(2815) DEBUG: t_reply_matching: hash 39719 label 207998729 branch 0
0(2815) DEBUG:tm:REF_UNSAFE: after is 1
0(2815) DEBUG: t_reply_matching: reply matched (T=0xb60b0370)!
0(2815) DEBUG: t_check: msg id=70 global id=70 T end=0xb60b0370
0(2815) DEBUG:tm:reply_received: org. status uas=100, uac[0]=0 local=0 is_invite=1)
0(2815) parse_headers: flags=80
0(2815) Found param type 234, <received> = <61.144.140.110>; state=6
0(2815) Found param type 232, <branch> =
<z9hG4bK-d87543-443309010-1--d87543->; state=6
0(2815) Found param type 235, <rport> = <42075>; state=16
0(2815) end of header reached, state=5
0(2815) parse_headers: Via found, flags=80
0(2815) parse_headers: this is the second via
0(2815) DEBUG: get_hdr_body : content_length=0
0(2815) found end of header
0(2815) DEBUG:tm:t_should_relay_response: T_code=100, new_code=100
0(2815) DEBUG:tm:relay_reply: branch=0, save=0, relay=-1
0(2815) DEBUG: add_to_tail_of_timer[1]: 0xb60b049c
0(2815) DEBUG:tm:UNREF_UNSAFE: after is 0
0(2815) DEBUG:destroy_avp_list: destroying list (nil)
0(2815) receive_msg: cleaning up
0(2815) SIP Reply (status):
0(2815) version: <SIP/2.0>
0(2815) status: <180>
0(2815) reason: <Ringing>
0(2815) parse_headers: flags=2
0(2815) DEBUG: add_param: tag=3b3dbe3871bbfa37i0
0(2815) DEBUG:parse_to:end of header reached, state=29
0(2815) DBUG:parse_to: display={}, ruri={sip:02061241205@210.184.138.8}
0(2815) DEBUG: get_hdr_field: <To> [56]; uri=[sip:02061241205@210.184.138.8]
0(2815) DEBUG: to body [<sip:02061241205@210.184.138.8>]
0(2815) get_hdr_field: cseq <CSeq>: <1> <INVITE>
0(2815) Found param type 232, <branch> = <z9hG4bK72b9.90fc56c.0>; state=16
0(2815) end of header reached, state=5
0(2815) parse_headers: Via found, flags=2
0(2815) parse_headers: this is the first via
0(2815) After parse_msg...
0(2815) forward_reply: found module nathelper, passing reply to it
0(2815) forward_reply: found module tm, passing reply to it
0(2815) DEBUG: t_check: msg id=71 global id=70 T start=0xffffffff
0(2815) parse_headers: flags=22
0(2815) parse_headers: flags=8
0(2815) DEBUG: t_reply_matching: hash 39719 label 207998729 branch 0
0(2815) DEBUG:tm:REF_UNSAFE: after is 1
0(2815) DEBUG: t_reply_matching: reply matched (T=0xb60b0370)!
0(2815) DEBUG: t_check: msg id=71 global id=71 T end=0xb60b0370
0(2815) DEBUG:tm:reply_received: org. status uas=100, uac[0]=100 local=0 is_invite=1)
0(2815) parse_headers: flags=80
0(2815) Found param type 234, <received> = <61.144.140.110>; state=6
0(2815) Found param type 232, <branch> =
<z9hG4bK-d87543-443309010-1--d87543->; state=6
0(2815) Found param type 235, <rport> = <42075>; state=16
0(2815) end of header reached, state=5
0(2815) parse_headers: Via found, flags=80
0(2815) parse_headers: this is the second via
0(2815) DEBUG: get_hdr_body : content_length=0
0(2815) found end of header
0(2815) DEBUG:tm:t_should_relay_response: T_code=100, new_code=180
0(2815) DEBUG:tm:relay_reply: branch=0, save=0, relay=0
0(2815) old size: 476, new size: 410
0(2815) build_res_from_sip_res: copied size: orig:245, new: 179, rest: 231 msg=
SIP/2.0 180 Ringing
To: <sip:02061241205@210.184.138.8>;tag=3b3dbe3871bbfa37i0
From: 3068878<sip:3068878@210.184.138.8>;tag=6a33d80f
Call-ID: c47ef44f950e7a56
CSeq: 1 INVITE
Via: SIP/2.0/UDP
192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075
Record-Route: <sip:210.184.138.8:5066;lr=on;ftag=6a33d80f>
Server: Sipura/SPA2000-2.0.13(g)
Content-Length: 0
0(2815) DEBUG:tm:relay_reply: sent buf=0x81631c0: SIP/2.0 1..., shmem=0xb60ae728: SIP/2.0
1
0(2815) DEBUG: add_to_tail_of_timer[1]: 0xb60b049c
0(2815) DEBUG:tm:UNREF_UNSAFE: after is 0
0(2815) DEBUG:destroy_avp_list: destroying list (nil)
0(2815) receive_msg: cleaning up
1(2817) DEBUG: timer routine:4,tl=0xb60b048c next=(nil)
0(2815) SIP Reply (status):
0(2815) version: <SIP/2.0>
0(2815) status: <404>
0(2815) reason: <Not Found>
0(2815) parse_headers: flags=2
0(2815) DEBUG: add_param: tag=ab59191034906d25i0
0(2815) DEBUG:parse_to:end of header reached, state=29
0(2815) DBUG:parse_to: display={}, ruri={sip:61.144.140.110:46935}
0(2815) DEBUG: get_hdr_field: <To> [49]; uri=[sip:61.144.140.110:46935]
0(2815) DEBUG: to body [sip:61.144.140.110:46935]
0(2815) get_hdr_field: cseq <CSeq>: <1> <OPTIONS>
0(2815) Found param type 232, <branch> = <0>; state=16
0(2815) end of header reached, state=5
0(2815) parse_headers: Via found, flags=2
0(2815) parse_headers: this is the first via
0(2815) After parse_msg...
0(2815) forward_reply: found module nathelper, passing reply to it
0(2815) DEBUG:nathelper:sipping_rpl_filter: reply for SIP natping filtered
0(2815) DEBUG:destroy_avp_list: destroying list (nil)
0(2815) receive_msg: cleaning up
0(2815) SIP Reply (status):
0(2815) version: <SIP/2.0>
0(2815) status: <180>
0(2815) reason: <Ringing>
0(2815) parse_headers: flags=2
0(2815) DEBUG: add_param: tag=3b3dbe3871bbfa37i0
0(2815) DEBUG:parse_to:end of header reached, state=29
0(2815) DBUG:parse_to: display={}, ruri={sip:02061241205@210.184.138.8}
0(2815) DEBUG: get_hdr_field: <To> [56]; uri=[sip:02061241205@210.184.138.8]
0(2815) DEBUG: to body [<sip:02061241205@210.184.138.8>]
0(2815) get_hdr_field: cseq <CSeq>: <1> <INVITE>
0(2815) Found param type 232, <branch> = <z9hG4bK72b9.90fc56c.0>; state=16
0(2815) end of header reached, state=5
0(2815) parse_headers: Via found, flags=2
0(2815) parse_headers: this is the first via
0(2815) After parse_msg...
0(2815) forward_reply: found module nathelper, passing reply to it
0(2815) forward_reply: found module tm, passing reply to it
0(2815) DEBUG: t_check: msg id=73 global id=71 T start=0xffffffff
0(2815) parse_headers: flags=22
0(2815) parse_headers: flags=8
0(2815) DEBUG: t_reply_matching: hash 39719 label 207998729 branch 0
0(2815) DEBUG:tm:REF_UNSAFE: after is 1
0(2815) DEBUG: t_reply_matching: reply matched (T=0xb60b0370)!
0(2815) DEBUG: t_check: msg id=73 global id=73 T end=0xb60b0370
0(2815) DEBUG:tm:reply_received: org. status uas=180, uac[0]=180 local=0 is_invite=1)
0(2815) parse_headers: flags=80
0(2815) Found param type 234, <received> = <61.144.140.110>; state=6
0(2815) Found param type 232, <branch> =
<z9hG4bK-d87543-443309010-1--d87543->; state=6
0(2815) Found param type 235, <rport> = <42075>; state=16
0(2815) end of header reached, state=5
0(2815) parse_headers: Via found, flags=80
0(2815) parse_headers: this is the second via
0(2815) DEBUG: get_hdr_body : content_length=0
0(2815) found end of header
0(2815) DEBUG:tm:t_should_relay_response: T_code=180, new_code=180
0(2815) DEBUG:tm:relay_reply: branch=0, save=0, relay=0
0(2815) old size: 476, new size: 410
0(2815) build_res_from_sip_res: copied size: orig:245, new: 179, rest: 231 msg=
SIP/2.0 180 Ringing
To: <sip:02061241205@210.184.138.8>;tag=3b3dbe3871bbfa37i0
From: 3068878<sip:3068878@210.184.138.8>;tag=6a33d80f
Call-ID: c47ef44f950e7a56
CSeq: 1 INVITE
Via: SIP/2.0/UDP
192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075
Record-Route: <sip:210.184.138.8:5066;lr=on;ftag=6a33d80f>
Server: Sipura/SPA2000-2.0.13(g)
Content-Length: 0
0(2815) DEBUG:tm:relay_reply: sent buf=0x81631c0: SIP/2.0 1..., shmem=0xb60ae728: SIP/2.0
1
0(2815) DEBUG: add_to_tail_of_timer[1]: 0xb60b049c
0(2815) DEBUG:tm:UNREF_UNSAFE: after is 0
0(2815) DEBUG:destroy_avp_list: destroying list (nil)
0(2815) receive_msg: cleaning up
0(2815) SIP Reply (status):
0(2815) version: <SIP/2.0>
0(2815) status: <200>
0(2815) reason: <OK>
0(2815) parse_headers: flags=2
0(2815) DEBUG: add_param: tag=3b3dbe3871bbfa37i0
0(2815) DEBUG:parse_to:end of header reached, state=29
0(2815) DBUG:parse_to: display={}, ruri={sip:02061241205@210.184.138.8}
0(2815) DEBUG: get_hdr_field: <To> [56]; uri=[sip:02061241205@210.184.138.8]
0(2815) DEBUG: to body [<sip:02061241205@210.184.138.8>]
0(2815) get_hdr_field: cseq <CSeq>: <1> <INVITE>
0(2815) Found param type 232, <branch> = <z9hG4bK72b9.90fc56c.0>; state=16
0(2815) end of header reached, state=5
0(2815) parse_headers: Via found, flags=2
0(2815) parse_headers: this is the first via
0(2815) After parse_msg...
0(2815) forward_reply: found module nathelper, passing reply to it
0(2815) forward_reply: found module tm, passing reply to it
0(2815) DEBUG: t_check: msg id=74 global id=73 T start=0xffffffff
0(2815) parse_headers: flags=22
0(2815) parse_headers: flags=8
0(2815) DEBUG: t_reply_matching: hash 39719 label 207998729 branch 0
0(2815) DEBUG:tm:REF_UNSAFE: after is 1
0(2815) DEBUG: t_reply_matching: reply matched (T=0xb60b0370)!
0(2815) DEBUG: t_check: msg id=74 global id=74 T end=0xb60b0370
0(2815) DEBUG:tm:reply_received: org. status uas=180, uac[0]=180 local=0 is_invite=1)
0(2815) parse_headers: flags=ffffffffffffffff
0(2815) Found param type 234, <received> = <61.144.140.110>; state=6
0(2815) Found param type 232, <branch> =
<z9hG4bK-d87543-443309010-1--d87543->; state=6
0(2815) Found param type 235, <rport> = <42075>; state=16
0(2815) end of header reached, state=5
0(2815) parse_headers: Via found, flags=ffffffffffffffff
0(2815) parse_headers: this is the second via
0(2815) DEBUG: get_hdr_body : content_length=238
0(2815) found end of header
0(2815) DEBUG:check_content_type: type <application/sdp> found valid
0(2815) parse_headers: flags=40
0(2815) DEBUG: add_param: tag=6a33d80f
0(2815) DEBUG:parse_to:end of header reached, state=29
0(2815) DBUG:parse_to: display={3068878}, ruri={sip:3068878@210.184.138.8}
0(2815) force_rtp_proxy2: proxy reply: 35132 210.184.138.8
0(2815) parse_headers: flags=ffffffffffffffff
0(2815) parse_headers: flags=80
0(2815) parse_headers: flags=80
0(2815) DEBUG:tm:t_should_relay_response: T_code=180, new_code=200
0(2815) DEBUG:tm:relay_reply: branch=0, save=0, relay=0
0(2815) parse_headers: flags=2000
0(2815) parse_headers: flags=ffffffffffffffff
0(2815) clen_builder: content-length: 255 (255)
0(2815) old size: 888, new size: 862
0(2815) build_res_from_sip_res: copied size: orig:888, new: 862, rest: 0 msg=
SIP/2.0 200 OK
To: <sip:02061241205@210.184.138.8>;tag=3b3dbe3871bbfa37i0
From: 3068878<sip:3068878@210.184.138.8>;tag=6a33d80f
Call-ID: c47ef44f950e7a56
CSeq: 1 INVITE
Via: SIP/2.0/UDP
192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075
Record-Route: <sip:210.184.138.8:5066;lr=on;ftag=6a33d80f>
Contact: 862061241205 <sip:862061241205@219.136.10.86:64189>
Server: Sipura/SPA2000-2.0.13(g)
Content-Length: 255
Allow: ACK, BYE, CANCEL, INFO, INVITE, NOTIFY, OPTIONS, REFER
Supported: x-sipura
Content-Type: application/sdp
P-hint: Reply-Proxied
v=0
o=- 12432 12432 IN IP4 192.168.10.244
s=-
c=IN IP4 210.184.138.8
t=0 0
m=audio 35132 RTP/AVP 18 100 101
a=rtpmap:18 G729a/8000
a=rtpmap:100 NSE/8000
a=rtpmap:101 telephone-event/8000
a=fmtp:101 0-15
a=ptime:30
a=sendrecv
a=nortpproxy:yes
0(2815) DEBUG: add_to_tail_of_timer[2]: 0xb60b03b8
0(2815) DEBUG:tm:relay_reply: sent buf=0x81633c8: SIP/2.0 2..., shmem=0xb60b2060: SIP/2.0
2
0(2815) DEBUG: cleanup_uac_timers: RETR/FR timers reset
0(2815) DEBUG:tm:UNREF_UNSAFE: after is 0
0(2815) DEBUG:destroy_avp_list: destroying list (nil)
0(2815) receive_msg: cleaning up
0(2815) SIP Request:
0(2815) method: <ACK>
0(2815) uri: <sip:862061241205@219.136.10.86:64189>
0(2815) version: <SIP/2.0>
0(2815) parse_headers: flags=2
0(2815) DEBUG: add_param: tag=3b3dbe3871bbfa37i0
0(2815) DEBUG:parse_to:end of header reached, state=29
0(2815) DBUG:parse_to: display={}, ruri={sip:02061241205@210.184.138.8}
0(2815) DEBUG: get_hdr_field: <To> [56]; uri=[sip:02061241205@210.184.138.8]
0(2815) DEBUG: to body [<sip:02061241205@210.184.138.8>]
0(2815) Found param type 232, <branch> =
<z9hG4bK-d87543-708924014-1--d87543->; state=6
0(2815) Found param type 235, <rport> = <n/a>; state=17
0(2815) end of header reached, state=5
0(2815) parse_headers: Via found, flags=2
0(2815) parse_headers: this is the first via
0(2815) After parse_msg...
0(2815) preparing to run routing scripts...
0(2815) DEBUG : sl_filter_ACK: to late to be a local ACK!
0(2815) parse_headers: flags=100
0(2815) get_hdr_field: cseq <CSeq>: <1> <ACK>
0(2815) DEBUG:maxfwd:is_maxfwd_present: value = 70
0(2815) parse_headers: flags=80
0(2815) parse_headers: flags=ffffffffffffffff
0(2815) DEBUG: get_hdr_body : content_length=0
0(2815) found end of header
0(2815) parse_headers: flags=200
0(2815) is_preloaded: No
0(2815) grep_sock_info - checking if host==us: 13==13 && [219.136.10.86] ==
[210.184.138.8]
0(2815) grep_sock_info - checking if port 5066 matches port 64189
0(2815) grep_sock_info - checking if host==us: 13==13 && [219.136.10.86] ==
[210.184.138.8]
0(2815) grep_sock_info - checking if port 5066 matches port 64189
0(2815) check_self: host != me
0(2815) grep_sock_info - checking if host==us: 13==13 && [210.184.138.8] ==
[210.184.138.8]
0(2815) grep_sock_info - checking if port 5066 matches port 5066
0(2815) after_loose: Topmost route URI: 'sip:210.184.138.8:5066;lr;ftag=6a33d80f'
is me
0(2815) parse_headers: flags=200
0(2815) found end of header
0(2815) find_next_route: No next Route HF found
0(2815) after_loose: No next URI found
0(2815) DBG:rr:run_rr_callbacks: callback id 0 entered
0(2815) DEBUG:uac:restore_from: getting 'vsf' Route param
0(2815) DEBUG:uac:restore_from: Route param 'vsf' not found
0(2815) parse_headers: flags=ffffffffffffffff
0(2815) parse_headers: flags=ffffffffffffffff
0(2815) ERROR: extract_body: message body has length zero
0(2815) ERROR: force_rtp_proxy2: can't extract body from the message
0(2815) DEBUG: t_newtran: msg id=75 , global msg id=74 , T on entrance=0xffffffff
0(2815) parse_headers: flags=ffffffffffffffff
0(2815) parse_headers: flags=78
0(2815) t_lookup_request: start searching: hash=39719, isACK=1
0(2815) parse_headers: flags=38
0(2815) DEBUG: add_param: tag=6a33d80f
0(2815) DEBUG:parse_to:end of header reached, state=29
0(2815) DBUG:parse_to: display={3068878}, ruri={sip:3068878@210.184.138.8}
0(2815) DEBUG: t_lookup_request: e2e proxy ACK found
0(2815) DEBUG:tm:REF_UNSAFE: after is 1
0(2815) DEBUG:tm:t_relay: forwarding ACK
0(2815) DEBUG:tm:t_relay: it's an end2end ACK
0(2815) DEBUG:tm:UNREF_UNSAFE: after is 0
0(2815) DEBUG: mk_proxy: doing DNS lookup...
0(2815) check_via_address(61.144.140.110, 192.168.1.168, 1)
0(2815) check_via_address: doing dns lookup
0(2815) Sending:
ACK sip:862061241205@219.136.10.86:64189 SIP/2.0
To: <sip:02061241205@210.184.138.8>;tag=3b3dbe3871bbfa37i0
From: 3068878<sip:3068878@210.184.138.8>;tag=6a33d80f
Via: SIP/2.0/UDP 210.184.138.8:5066;branch=z9hG4bK72b9.90fc56c.2
Via: SIP/2.0/UDP
192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-708924014-1--d87543-;rport=42075
Call-ID: c47ef44f950e7a56
CSeq: 1 ACK
Contact: <sip:3068878@61.144.140.110:42075>
Max-Forwards: 69
User-Agent: eyeBeam release 3004t stamp 16741
Content-Length: 0
P-hint: Proxied
P-hint: rr-enforced
.
0(2815) orig. len=470, new_len=556, proto=1
0(2815) DEBUG:destroy_avp_list: destroying list (nil)
0(2815) receive_msg: cleaning up
1(2817) DEBUG: timer routine:1,tl=0xb60b049c next=(nil)
0(2815) SIP Request:
0(2815) method: <BYE>
0(2815) uri: <sip:862061241205@219.136.10.86:64189>
0(2815) version: <SIP/2.0>
0(2815) parse_headers: flags=2
0(2815) DEBUG: add_param: tag=3b3dbe3871bbfa37i0
0(2815) DEBUG:parse_to:end of header reached, state=29
0(2815) DBUG:parse_to: display={}, ruri={sip:02061241205@210.184.138.8}
0(2815) DEBUG: get_hdr_field: <To> [56]; uri=[sip:02061241205@210.184.138.8]
0(2815) DEBUG: to body [<sip:02061241205@210.184.138.8>]
0(2815) Found param type 232, <branch> =
<z9hG4bK-d87543-956249433-1--d87543->; state=6
0(2815) Found param type 235, <rport> = <n/a>; state=17
0(2815) end of header reached, state=5
0(2815) parse_headers: Via found, flags=2
configuration :
if (nat_uac_test("19")) {
if (!search("^Record-Route:")) {
fix_nated_contact(); # Rewrite contact with source IP of
signalling
if (method=="REGISTER") {
fix_nated_register();
} else if (method == "INVITE") {
fix_nated_sdp("1"); # Add direction=active to
SDP
};
force_rport(); # Add rport parameter to topmost Via
append_hf("P-hint: Proxied\r\n");
setflag(10); # Mark as NATed
};
};
if (loose_route()) {
append_hf("P-hint: rr-enforced\r\n");
route(1);
exit();
};
if (method=="REGISTER") {
if (src_ip==222.88.222.67 || src_ip==210.184.138.4) {
save("location");
exit();
}
if (!www_authorize("", "subscriber")) {
www_challenge("", "0");
exit();
};
save("location");
if (isflagset(10)) {
if (!(src_ip==222.88.222.67 || src_ip==210.184.138.4)) {
#add_path_received();
append_branch("sip:222.88.222.67:80");
t_replicate("sip:210.184.138.4:80");
}
} else {
if (!(src_ip==222.88.222.67 || src_ip==210.184.138.4)) {
#add_path();
append_branch("sip:222.88.222.67:80");
t_replicate("sip:210.184.138.4:80");
}
}
return;
};
route[1]
{
# if client or server know to be behind a NAT, enable relay
if (isflagset(10)) {
force_rtp_proxy();
};
# NAT processing of replies; apply to all transactions (for example,
# re-INVITEs from public to private UA are hard to identify as
# NATed at the moment of request processing); look at replies
t_on_reply("1");
t_on_failure("1");
# send it out now; use stateful forwarding as it works reliably
# even for UDP2TCP
if (!t_relay()) {
sl_reply_error();
return;
};
}