11(26780) tcpconn_new: new tcp connection to: 192.168.20.187 11(26780) tcpconn_new: on port 2049, type 3 11(26780) tls_tcpconn_init: Entered: Creating a whole new ssl connection 11(26780) tls_tcpconn_init: Looking up tls domain [192.168.20.156:5061] 11(26780) tls_tcpconn_init: Using default tls server settings 11(26780) tls_tcpconn_init: Setting in ACCEPT mode (server) 11(26780) tcpconn_add: hashes: 193, 209 11(26780) handle_new_connect: new connection: 0x4060b6c8 25 flags: 0002 11(26780) send2child: to tcp child 0 7(26766), 0x4060b6c8 7(26766) received n=4 con=0x4060b6c8, fd=20 7(26766) DBG: io_watch_add(0x80f17c0, 20, 2, 0x4060b6c8), fd_no=1 7(26766) tls_update_fd: New fd is 20 7(26766) tls_update_fd: New fd is 20 7(26766) tls_accept: TLS handshake successful 7(26766) tls_update_fd: New fd is 20 7(26766) tls_update_fd: New fd is 20 7(26766) tls_update_fd: New fd is 20 7(26766) _tls_read: 866 bytes read 7(26766) tcp_read_req: content-length= 0 7(26766) SIP Request: 7(26766) method: 7(26766) uri: 7(26766) version: 7(26766) parse_headers: flags=2 7(26766) Found param type 232, = ; state=6 7(26766) Found param type 235, = ; state=17 7(26766) end of header reached, state=5 7(26766) parse_headers: Via found, flags=2 7(26766) parse_headers: this is the first via 7(26766) After parse_msg... 7(26766) preparing to run routing scripts... 7(26766) parse_headers: flags=100 7(26766) DEBUG:parse_to:end of header reached, state=9 7(26766) DEBUG: get_hdr_field: [53]; uri=[sip:test@192.168.20.156:5061;transport=tls] 7(26766) DEBUG: to body ["test" ] 7(26766) get_hdr_field: cseq : <1> 7(26766) DEBUG:maxfwd:is_maxfwd_present: value = 70 7(26766) parse_headers: flags=200 7(26766) DEBUG: get_hdr_body : content_length=0 7(26766) found end of header 7(26766) find_first_route: No Route headers found 7(26766) loose_route: There is no Route HF 7(26766) grep_sock_info - checking if host==us: 14==14 && [192.168.20.156] == [192.168.20.156] 7(26766) grep_sock_info - checking if port 5060 matches port 5061 7(26766) grep_sock_info - checking if host==us: 14==14 && [192.168.20.156] == [192.168.20.156] 7(26766) grep_sock_info - checking if port 5061 matches port 5061 7(26766) grep_sock_info - checking if host==us: 14==14 && [192.168.20.156] == [192.168.20.156] 7(26766) grep_sock_info - checking if port 5060 matches port 5061 7(26766) grep_sock_info - checking if host==us: 14==14 && [192.168.20.156] == [192.168.20.156] 7(26766) grep_sock_info - checking if port 5061 matches port 5061 7(26766) parse_headers: flags=4000 7(26766) pre_auth(): Credentials with given realm not found 7(26766) build_auth_hf(): 'WWW-Authenticate: Digest realm="192.168.20.156", nonce="4423cd4c884708795300456efae3cc8121e7155c" ' 7(26766) parse_headers: flags=ffffffffffffffff 7(26766) check_via_address(192.168.20.187, 192.168.20.187, 0) 7(26766) tcp_send: tcp connection found (0x4060b6c8), acquiring fd 7(26766) tcp_send, c= 0x4060b6c8, n=8 11(26780) handle_ser_child: read response= 4060b6c8, 1, fd -1 from 7 (26766) 7(26766) tcp_send: after receive_fd: c= 0x4060b6c8 n=4 fd=21 7(26766) tcp_send: sending... 7(26766) tls_update_fd: New fd is 21 7(26766) tls_write: Write was successful (722 bytes) 7(26766) tcp_send: after write: c= 0x4060b6c8 n=722 fd=21 7(26766) tcp_send: buf= SIP/2.0 401 Unauthorized Via: SIP/2.0/TLS 192.168.20.187:2049;branch=z9hG4bK-xwuy1h54dryy;rport=2049 From: "test" ;tag=3ntprlhika To: "test" ;tag=010b4fa55c4d08d1039c6a916bb5ecdc.9c39 Call-ID: 3c26700a0c35-l9lq3hhij6ml@snom190 CSeq: 1 REGISTER WWW-Authenticate: Digest realm="192.168.20.156", nonce="4423cd4c884708795300456efae3cc8121e7155c" Server: OpenSer (1.1.0-dev16 -tls (i386/linux)) Content-Length: 0 Warning: 392 192.168.20.156:5061 "Noisy feedback tells: pid=26766 req_src_ip=192.168.20.187 req_src_port=2049 in_uri=sip:192.168.20.156:5061;transport=tls out_uri=sip:192.168.20.156:5061;transport=tls via_cnt==1" 7(26766) DEBUG:destroy_avp_list: destroying list (nil) 7(26766) receive_msg: cleaning up 7(26766) tls_update_fd: New fd is 20 7(26766) tls_update_fd: New fd is 20 7(26766) tls_update_fd: New fd is 20 7(26766) _tls_read: 1079 bytes read 7(26766) tcp_read_req: content-length= 0 7(26766) SIP Request: 7(26766) method: 7(26766) uri: 7(26766) version: 7(26766) parse_headers: flags=2 7(26766) Found param type 232, = ; state=6 7(26766) Found param type 235, = ; state=17 7(26766) end of header reached, state=5 7(26766) parse_headers: Via found, flags=2 7(26766) parse_headers: this is the first via 7(26766) After parse_msg... 7(26766) preparing to run routing scripts... 7(26766) parse_headers: flags=100 7(26766) DEBUG:parse_to:end of header reached, state=9 7(26766) DEBUG: get_hdr_field: [53]; uri=[sip:test@192.168.20.156:5061;transport=tls] 7(26766) DEBUG: to body ["test" ] 7(26766) get_hdr_field: cseq : <2> 7(26766) DEBUG:maxfwd:is_maxfwd_present: value = 70 7(26766) parse_headers: flags=200 7(26766) DEBUG: get_hdr_body : content_length=0 7(26766) found end of header 7(26766) find_first_route: No Route headers found 7(26766) loose_route: There is no Route HF 7(26766) grep_sock_info - checking if host==us: 14==14 && [192.168.20.156] == [192.168.20.156] 7(26766) grep_sock_info - checking if port 5060 matches port 5061 7(26766) grep_sock_info - checking if host==us: 14==14 && [192.168.20.156] == [192.168.20.156] 7(26766) grep_sock_info - checking if port 5061 matches port 5061 7(26766) grep_sock_info - checking if host==us: 14==14 && [192.168.20.156] == [192.168.20.156] 7(26766) grep_sock_info - checking if port 5060 matches port 5061 7(26766) grep_sock_info - checking if host==us: 14==14 && [192.168.20.156] == [192.168.20.156] 7(26766) grep_sock_info - checking if port 5061 matches port 5061 7(26766) check_nonce(): comparing [4423cd4c884708795300456efae3cc8121e7155c] and [4423cd4c884708795300456efae3cc8121e7155c] 7(26766) HA1 string calculated: 53ee6c16b5102c59afa23cbd21a6d936 7(26766) check_response(): Our result = '5eea837512ca0655ce1369c41b5185b6' 7(26766) check_response(): Authorization is OK 7(26766) parse_headers: flags=ffffffffffffffff 7(26766) parse_headers: flags=8000000 7(26766) build_contact(): Created Contact HF: Contact: ;q=1;expires=246, ;q=1;expires=759, ;q=1;expires=1073, ;q=1;expires=1538, ;q=1;expires=1849, ;q=1;expires=2150, ;q=1;expires=2637, ;q=1;expires=3022, ;q=1;expires=3323, ;q=1;expires=3442, ;q=1;expires=3600 7(26766) parse_headers: flags=ffffffffffffffff 7(26766) check_via_address(192.168.20.187, 192.168.20.187, 0) 7(26766) tcp_send: tcp connection found (0x4060b6c8), acquiring fd 7(26766) tcp_send, c= 0x4060b6c8, n=8 11(26780) handle_ser_child: read response= 4060b6c8, 1, fd -1 from 7 (26766) 7(26766) tcp_send: after receive_fd: c= 0x4060b6c8 n=4 fd=21 7(26766) tcp_send: sending... 7(26766) tls_update_fd: New fd is 21 7(26766) tls_write: Write was successful (1467 bytes) 7(26766) tcp_send: after write: c= 0x4060b6c8 n=1467 fd=21 7(26766) tcp_send: buf= SIP/2.0 200 OK Via: SIP/2.0/TLS 192.168.20.187:2049;branch=z9hG4bK-6fjbha0qxrtw;rport=2049 From: "test" ;tag=3ntprlhika To: "test" ;tag=010b4fa55c4d08d1039c6a916bb5ecdc.a59e Call-ID: 3c26700a0c35-l9lq3hhij6ml@snom190 CSeq: 2 REGISTER Contact: ;q=1;expires=246, ;q=1;expires=759, ;q=1;expires=1073, ;q=1;expires=1538, ;q=1;expires=1849, ;q=1;expires=2150, ;q=1;expires=2637, ;q=1;expires=3022, ;q=1;expires=3323, ;q=1;expires=3442, ;q=1;expires=3600 Server: OpenSer (1.1.0-dev16 -tls (i386/linux)) Content-Length: 0 Warning: 392 192.168.20.156:5061 "Noisy feedback tells: pid=26766 req_src_ip=192.168.20.187 req_src_port=2049 in_uri=sip:192.168.20.156:5061;transport=tls out_uri=sip:192.168.20.156:5061;transport=tls via_cnt==1" 7(26766) DEBUG:destroy_avp_list: destroying list (nil) 7(26766) receive_msg: cleaning up 7(26766) tcp_receive_loop: 0x4060b6c8 expired (81329, 81330) 7(26766) DBG: io_watch_del (0x80f17c0, 20, -1, 0x10) fd_no=2 called 7(26766) releasing con 0x4060b6c8, state 0, fd=20, id=209 7(26766) extra_data 0x405dad88 11(26780) handle_tcp_child: reader response= 4060b6c8, 0 from 0 11(26780) DBG: io_watch_add(0x80f14a0, 25, 2, 0x4060b6c8), fd_no=15 11(26780) handle_tcp_child: CONN_RELEASE 0x4060b6c8 refcnt= 0