7(18696) tcpconn_new: new tcp connection to: 192.168.20.130 7(18696) tcpconn_new: on port 53605, type 3 7(18696) tls_tcpconn_init: Entered: Creating a whole new ssl connection 7(18696) tls_tcpconn_init: Looking up tls domain [192.168.20.156:5061] 7(18696) tls_tcpconn_init: Using default tls server settings 7(18696) tls_tcpconn_init: Setting in ACCEPT mode (server) 7(18696) tcpconn_add: hashes: 421, 1 7(18696) handle_new_connect: new connection: 0x405ca688 20 flags: 0002 7(18696) send2child: to tcp child 0 3(18691), 0x405ca688 3(18691) received n=4 con=0x405ca688, fd=15 3(18691) DBG: io_watch_add(0x80f17c0, 15, 2, 0x405ca688), fd_no=1 3(18691) tls_update_fd: New fd is 15 3(18691) tls_update_fd: New fd is 15 3(18691) tls_accept: TLS handshake successful 3(18691) tls_update_fd: New fd is 15 3(18691) tls_update_fd: New fd is 15 3(18691) _tls_read: 394 bytes read 3(18691) tcp_read_req: content-length= 0 3(18691) SIP Request: 3(18691) method: 3(18691) uri: 3(18691) version: 3(18691) parse_headers: flags=2 3(18691) DEBUG:parse_to:end of header reached, state=9 3(18691) DEBUG: get_hdr_field: [25]; uri=[sip:10@192.168.20.156] 3(18691) DEBUG: to body [] 3(18691) get_hdr_field: cseq : <301> 3(18691) Found param type 232, = ; state=16 3(18691) end of header reached, state=5 3(18691) parse_headers: Via found, flags=2 3(18691) parse_headers: this is the first via 3(18691) After parse_msg... 3(18691) preparing to run routing scripts... 3(18691) DEBUG:maxfwd:is_maxfwd_present: value = 70 3(18691) parse_headers: flags=200 3(18691) is_preloaded: Yes 3(18691) grep_sock_info - checking if host==us: 14==14 && [192.168.20.156] == [192.168.20.156] 3(18691) grep_sock_info - checking if port 5061 matches port 5061 3(18691) after_loose: Topmost route URI: 'sip:192.168.20.156:5061;transport=TLS;lr' is me 3(18691) parse_headers: flags=200 3(18691) DEBUG: get_hdr_body : content_length=0 3(18691) found end of header 3(18691) find_next_route: No next Route HF found 3(18691) after_loose: No next URI found 3(18691) grep_sock_info - checking if host==us: 14==14 && [192.168.20.156] == [192.168.20.156] 3(18691) grep_sock_info - checking if port 5061 matches port 5060 3(18691) check_self: host != me 3(18691) parse_headers: flags=ffffffffffffffff 3(18691) DEBUG: t_newtran: msg id=1 , global msg id=0 , T on entrance=0xffffffff 3(18691) parse_headers: flags=ffffffffffffffff 3(18691) parse_headers: flags=78 3(18691) t_lookup_request: start searching: hash=58053, isACK=0 3(18691) DEBUG: RFC3261 transaction matching failed 3(18691) DEBUG: t_lookup_request: no transaction found 3(18691) DEBUG: mk_proxy: doing DNS lookup... 3(18691) ERROR:tm:add_uac: can't fwd to af 2, proto 1 (no corresponding listening socket) 3(18691) ERROR:tm:t_forward_nonack: failure to add branches 3(18691) ERROR:tm:t_relay_to: t_forward_nonack returned error 3(18691) parse_headers: flags=ffffffffffffffff 3(18691) check_via_address(192.168.20.130, 192.168.20.130, 0) 3(18691) WARNING:vqm_resize: resize(0) called 3(18691) DEBUG: cleanup_uac_timers: RETR/FR timers reset 3(18691) DEBUG: add_to_tail_of_timer[2]: 0x405ee610 3(18691) tcp_send: tcp connection found (0x405ca688), acquiring fd 3(18691) tcp_send, c= 0x405ca688, n=8 7(18696) handle_ser_child: read response= 405ca688, 1, fd -1 from 3 (18691) 3(18691) tcp_send: after receive_fd: c= 0x405ca688 n=4 fd=16 3(18691) tcp_send: sending... 3(18691) tls_update_fd: New fd is 16 3(18691) tls_write: Write was successful (531 bytes) 3(18691) tcp_send: after write: c= 0x405ca688 n=531 fd=16 3(18691) tcp_send: buf= SIP/2.0 500 I'm terribly sorry, server error occurred (7/TM) From: To: ;tag=ddf051b13744e2e8329237e95d7a9ade-5806 Call-ID: 532272529@192.168.20.130 CSeq: 301 REGISTER Via: SIP/2.0/TLS 192.168.20.130:34820;branch=z9hG4bK1474748722 Server: OpenSer (1.1.0-dev16 -tls (i386/linux)) Content-Length: 0 Warning: 392 192.168.20.156:5061 "Noisy feedback tells: pid=18691 req_src_ip=19 2.168.20.130 req_src_port=53605 in_uri=sip:192.168.20.156 out_uri=sip:192.168.20.156 via_cnt==1" 3(18691) DEBUG:tm:_reply_light: reply sent out. buf=0x812e300: SIP/2.0 5..., sh mem=0x405ef8c0: SIP/2.0 5 3(18691) DEBUG:tm:_reply_light: finished 3(18691) ERROR: generation of a stateful reply on error succeeded 3(18691) DEBUG:destroy_avp_list: destroying list (nil) 3(18691) receive_msg: cleaning up 2(18689) DEBUG: timer routine:2,tl=0x405ee610 next=(nil) 2(18689) DEBUG: wait_handler : removing 0x405ee5c8 from table 2(18689) DEBUG: delete transaction 0x405ee5c8 2(18689) DEBUG: wait_handler : done 3(18691) tcp_receive_loop: 0x405ca688 expired (22, 23) 3(18691) DBG: io_watch_del (0x80f17c0, 15, -1, 0x10) fd_no=2 called 3(18691) releasing con 0x405ca688, state 0, fd=15, id=1 3(18691) extra_data 0x405da7a0 7(18696) handle_tcp_child: reader response= 405ca688, 0 from 0 7(18696) DBG: io_watch_add(0x80f14a0, 20, 2, 0x405ca688), fd_no=11 7(18696) handle_tcp_child: CONN_RELEASE 0x405ca688 refcnt= 0 7(18696) handle_tcpconn_ev: data available on 0x405ca688 20 7(18696) DBG: io_watch_del (0x80f14a0, 20, -1, 0x0) fd_no=12 called 7(18696) send2child: to tcp child 0 3(18691), 0x405ca688 3(18691) received n=4 con=0x405ca688, fd=15 3(18691) DBG: io_watch_add(0x80f17c0, 15, 2, 0x405ca688), fd_no=1 3(18691) tls_update_fd: New fd is 15 3(18691) _tls_read: Error in SSL: 3(18691) ERROR: tcp_read_req: error reading 3(18691) DBG: io_watch_del (0x80f17c0, 15, -1, 0x10) fd_no=2 called 3(18691) releasing con 0x405ca688, state -2, fd=15, id=1 3(18691) extra_data 0x405da7a0 7(18696) handle_tcp_child: reader response= 405ca688, -2 from 0 7(18696) tcpconn_destroy: destroying connection 0x405ca688, flags 0002 7(18696) tls_close: Closing SSL connection 7(18696) tls_update_fd: New fd is 20 7(18696) tls_shutdown: First phase of 2-way handshake completed succesfuly 7(18696) tls_tcpconn_clean: Entered