U 61.144.140.110:42075 -> 210.184.138.8:5066 INVITE sip:02061241205@210.184.138.8:5066 SIP/2.0. To: . From: 3068878;tag=6a33d80f. Via: SIP/2.0/UDP 192.168.1.168:9801;branch=z9hG4bK-d87543-443309010-1--d87543-;rport. Call-ID: c47ef44f950e7a56. CSeq: 1 INVITE. Contact: . Max-Forwards: 70. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO. Content-Type: application/sdp. User-Agent: eyeBeam release 3004t stamp 16741. Content-Length: 234. . v=0. o=- 21525734 21525766 IN IP4 192.168.1.168. s=eyeBeam. c=IN IP4 192.168.1.168. t=0 0. m=audio 9802 RTP/AVP 18 101. a=alt:1 1 : 8743E761 095E081B 192.168.1.168 9802. a=fmtp:101 0-15. a=rtpmap:101 telephone-event/8000. a=sendrecv. # U 210.184.138.8:5066 -> 61.144.140.110:42075 SIP/2.0 100 trying -- your call is important to us. To: . From: 3068878;tag=6a33d80f. Via: SIP/2.0/UDP 192.168.1.168:9801;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075;received=61.144.140.110. Call-ID: c47ef44f950e7a56. CSeq: 1 INVITE. Server: OpenSer (1.1.0-pre2-notls (i386/linux)). Content-Length: 0. . # U 210.184.138.8:5066 -> 219.136.10.86:64189 INVITE sip:862061241205@219.136.10.86:64189 SIP/2.0. Record-Route: . To: . From: 3068878;tag=6a33d80f. Via: SIP/2.0/UDP 210.184.138.8:5066;branch=z9hG4bK72b9.90fc56c.0. Via: SIP/2.0/UDP 192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075. Call-ID: c47ef44f950e7a56. CSeq: 1 INVITE. Contact: . Max-Forwards: 69. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO. Content-Type: application/sdp. User-Agent: eyeBeam release 3004t stamp 16741. Content-Length: 273. P-hint: Proxied. P-hint: usrloc applied. . v=0. o=- 21525734 21525766 IN IP4 192.168.1.168. s=eyeBeam. c=IN IP4 210.184.138.8. t=0 0. m=audio 35130 RTP/AVP 18 101. a=alt:1 1 : 8743E761 095E081B 192.168.1.168 9802. a=fmtp:101 0-15. a=rtpmap:101 telephone-event/8000. a=sendrecv. a=direction:active. a=nortpproxy:yes. # U 219.136.10.86:64189 -> 210.184.138.8:5066 SIP/2.0 100 Trying. To: . From: 3068878;tag=6a33d80f. Call-ID: c47ef44f950e7a56. CSeq: 1 INVITE. Via: SIP/2.0/UDP 210.184.138.8:5066;branch=z9hG4bK72b9.90fc56c.0. Via: SIP/2.0/UDP 192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075. Record-Route: . Server: Sipura/SPA2000-2.0.13(g). Content-Length: 0. . # U 219.136.10.86:64189 -> 210.184.138.8:5066 SIP/2.0 180 Ringing. To: ;tag=3b3dbe3871bbfa37i0. From: 3068878;tag=6a33d80f. Call-ID: c47ef44f950e7a56. CSeq: 1 INVITE. Via: SIP/2.0/UDP 210.184.138.8:5066;branch=z9hG4bK72b9.90fc56c.0. Via: SIP/2.0/UDP 192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075. Record-Route: . Server: Sipura/SPA2000-2.0.13(g). Content-Length: 0. . # U 210.184.138.8:5066 -> 61.144.140.110:42075 SIP/2.0 180 Ringing. To: ;tag=3b3dbe3871bbfa37i0. From: 3068878;tag=6a33d80f. Call-ID: c47ef44f950e7a56. CSeq: 1 INVITE. Via: SIP/2.0/UDP 192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075. Record-Route: . Server: Sipura/SPA2000-2.0.13(g). Content-Length: 0. . # U 61.144.140.110:46935 -> 210.184.138.8:5066 SIP/2.0 404 Not Found. To: sip:61.144.140.110:46935;tag=ab59191034906d25i0. From: sip:keepitopen@broadz.net;tag=75ca79a5. Call-ID: c60b3302-3e11e12-c8@210.184.138.8. CSeq: 1 OPTIONS. Via: SIP/2.0/UDP 210.184.138.8:5066;branch=0. Server: Sipura/SPA2002-3.1.2(a). Content-Length: 0. . # U 219.136.10.86:64189 -> 210.184.138.8:5066 SIP/2.0 180 Ringing. To: ;tag=3b3dbe3871bbfa37i0. From: 3068878;tag=6a33d80f. Call-ID: c47ef44f950e7a56. CSeq: 1 INVITE. Via: SIP/2.0/UDP 210.184.138.8:5066;branch=z9hG4bK72b9.90fc56c.0. Via: SIP/2.0/UDP 192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075. Record-Route: . Server: Sipura/SPA2000-2.0.13(g). Content-Length: 0. . # U 210.184.138.8:5066 -> 61.144.140.110:42075 SIP/2.0 180 Ringing. To: ;tag=3b3dbe3871bbfa37i0. From: 3068878;tag=6a33d80f. Call-ID: c47ef44f950e7a56. CSeq: 1 INVITE. Via: SIP/2.0/UDP 192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075. Record-Route: . Server: Sipura/SPA2000-2.0.13(g). Content-Length: 0. . # U 219.136.10.86:64189 -> 210.184.138.8:5066 SIP/2.0 200 OK. To: ;tag=3b3dbe3871bbfa37i0. From: 3068878;tag=6a33d80f. Call-ID: c47ef44f950e7a56. CSeq: 1 INVITE. Via: SIP/2.0/UDP 210.184.138.8:5066;branch=z9hG4bK72b9.90fc56c.0. Via: SIP/2.0/UDP 192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075. Record-Route: . Contact: 862061241205 . Server: Sipura/SPA2000-2.0.13(g). Content-Length: 238. Allow: ACK, BYE, CANCEL, INFO, INVITE, NOTIFY, OPTIONS, REFER. Supported: x-sipura. Content-Type: application/sdp. . v=0. o=- 12432 12432 IN IP4 192.168.10.244. s=-. c=IN IP4 192.168.10.244. t=0 0. m=audio 43712 RTP/AVP 18 100 101. a=rtpmap:18 G729a/8000. a=rtpmap:100 NSE/8000. a=rtpmap:101 telephone-event/8000. a=fmtp:101 0-15. a=ptime:30. a=sendrecv. # U 210.184.138.8:5066 -> 61.144.140.110:42075 SIP/2.0 200 OK. To: ;tag=3b3dbe3871bbfa37i0. From: 3068878;tag=6a33d80f. Call-ID: c47ef44f950e7a56. CSeq: 1 INVITE. Via: SIP/2.0/UDP 192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075. Record-Route: . Contact: 862061241205 . Server: Sipura/SPA2000-2.0.13(g). Content-Length: 255. Allow: ACK, BYE, CANCEL, INFO, INVITE, NOTIFY, OPTIONS, REFER. Supported: x-sipura. Content-Type: application/sdp. P-hint: Reply-Proxied. . v=0. o=- 12432 12432 IN IP4 192.168.10.244. s=-. c=IN IP4 210.184.138.8. t=0 0. m=audio 35132 RTP/AVP 18 100 101. a=rtpmap:18 G729a/8000. a=rtpmap:100 NSE/8000. a=rtpmap:101 telephone-event/8000. a=fmtp:101 0-15. a=ptime:30. a=sendrecv. a=nortpproxy:yes. # U 61.144.140.110:42075 -> 210.184.138.8:5066 ACK sip:862061241205@219.136.10.86:64189 SIP/2.0. To: ;tag=3b3dbe3871bbfa37i0. From: 3068878;tag=6a33d80f. Via: SIP/2.0/UDP 192.168.1.168:9801;branch=z9hG4bK-d87543-708924014-1--d87543-;rport. Call-ID: c47ef44f950e7a56. CSeq: 1 ACK. Route: . Contact: . Max-Forwards: 70. User-Agent: eyeBeam release 3004t stamp 16741. Content-Length: 0. . # U 210.184.138.8:5066 -> 219.136.10.86:64189 ACK sip:862061241205@219.136.10.86:64189 SIP/2.0. To: ;tag=3b3dbe3871bbfa37i0. From: 3068878;tag=6a33d80f. Via: SIP/2.0/UDP 210.184.138.8:5066;branch=z9hG4bK72b9.90fc56c.2. Via: SIP/2.0/UDP 192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-708924014-1--d87543-;rport=42075. Call-ID: c47ef44f950e7a56. CSeq: 1 ACK. Contact: . Max-Forwards: 69. User-Agent: eyeBeam release 3004t stamp 16741. Content-Length: 0. P-hint: Proxied. P-hint: rr-enforced. . # U 61.144.140.110:42075 -> 210.184.138.8:5066 BYE sip:862061241205@219.136.10.86:64189 SIP/2.0. To: ;tag=3b3dbe3871bbfa37i0. From: 3068878;tag=6a33d80f. Via: SIP/2.0/UDP 192.168.1.168:9801;branch=z9hG4bK-d87543-956249433-1--d87543-;rport. Call-ID: c47ef44f950e7a56. CSeq: 2 BYE. Route: . Contact: . Max-Forwards: 70. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO. User-Agent: eyeBeam release 3004t stamp 16741. Content-Length: 0. . # U 210.184.138.8:5066 -> 219.136.10.86:64189 BYE sip:862061241205@219.136.10.86:64189 SIP/2.0. To: ;tag=3b3dbe3871bbfa37i0. From: 3068878;tag=6a33d80f. Via: SIP/2.0/UDP 210.184.138.8:5066;branch=z9hG4bK42b9.d7afa485.0. Via: SIP/2.0/UDP 192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-956249433-1--d87543-;rport=42075. Call-ID: c47ef44f950e7a56. CSeq: 2 BYE. Contact: . Max-Forwards: 69. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO. User-Agent: eyeBeam release 3004t stamp 16741. Content-Length: 0. P-hint: Proxied. P-hint: rr-enforced. . # U 219.136.10.86:64189 -> 210.184.138.8:5066 SIP/2.0 200 OK. To: ;tag=3b3dbe3871bbfa37i0. From: 3068878;tag=6a33d80f. Call-ID: c47ef44f950e7a56. CSeq: 2 BYE. Via: SIP/2.0/UDP 210.184.138.8:5066;branch=z9hG4bK42b9.d7afa485.0. Via: SIP/2.0/UDP 192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-956249433-1--d87543-;rport=42075. Server: Sipura/SPA2000-2.0.13(g). Content-Length: 0. . # U 210.184.138.8:5066 -> 61.144.140.110:42075 SIP/2.0 200 OK. To: ;tag=3b3dbe3871bbfa37i0. From: 3068878;tag=6a33d80f. Call-ID: c47ef44f950e7a56. CSeq: 2 BYE. Via: SIP/2.0/UDP 192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-956249433-1--d87543-;rport=42075. Server: Sipura/SPA2000-2.0.13(g). Content-Length: 0. 0(2815) receive_msg: cleaning up 0(2815) SIP Request: 0(2815) method: 0(2815) uri: 0(2815) version: 0(2815) parse_headers: flags=2 0(2815) DEBUG:parse_to:end of header reached, state=10 0(2815) DBUG:parse_to: display={}, ruri={sip:02061241205@210.184.138.8} 0(2815) DEBUG: get_hdr_field: [33]; uri=[sip:02061241205@210.184.138.8] 0(2815) DEBUG: to body [ ] 0(2815) Found param type 232, = ; state=6 0(2815) Found param type 235, = ; state=17 0(2815) end of header reached, state=5 0(2815) parse_headers: Via found, flags=2 0(2815) parse_headers: this is the first via 0(2815) After parse_msg... 0(2815) preparing to run routing scripts... 0(2815) parse_headers: flags=100 0(2815) get_hdr_field: cseq : <1> 0(2815) DEBUG:maxfwd:is_maxfwd_present: value = 70 0(2815) parse_headers: flags=80 0(2815) parse_headers: flags=ffffffffffffffff 0(2815) DEBUG: get_hdr_body : content_length=234 0(2815) found end of header 0(2815) DEBUG:check_content_type: type found valid 0(2815) parse_headers: flags=ffffffffffffffff 0(2815) parse_headers: flags=200 0(2815) find_first_route: No Route headers found 0(2815) loose_route: There is no Route HF 0(2815) DEBUG: add_param: tag=6a33d80f 0(2815) DEBUG:parse_to:end of header reached, state=29 0(2815) DBUG:parse_to: display={3068878}, ruri={sip:3068878@210.184.138.8} 0(2815) grep_sock_info - checking if host==us: 13==13 && [210.184.138.8] == [210.184.138.8] 0(2815) grep_sock_info - checking if port 5066 matches port 5066 0(2815) DEBUG:avpops:load_avps: loaded avps = 0 0(2815) rewrite_uri: Rewriting Request-URI with 'sip:862061241205@219.136.10.86:64189' 0(2815) DEBUG:avpops:load_avps: loaded avps = 0 0(2815) parse_headers: flags=ffffffffffffffff 0(2815) parse_headers: flags=ffffffffffffffff 0(2815) DEBUG:check_content_type: type found valid 0(2815) parse_headers: flags=40 0(2815) force_rtp_proxy2: proxy reply: 35130 210.184.138.8 0(2815) DEBUG: t_newtran: msg id=69 , global msg id=40 , T on entrance=0xffffffff 0(2815) parse_headers: flags=ffffffffffffffff 0(2815) parse_headers: flags=78 0(2815) t_lookup_request: start searching: hash=39719, isACK=0 0(2815) DEBUG: RFC3261 transaction matching failed 0(2815) DEBUG: t_lookup_request: no transaction found 0(2815) DEBUG:tm:t_relay: new INVITE 0(2815) parse_headers: flags=ffffffffffffffff 0(2815) check_via_address(61.144.140.110, 192.168.1.168, 1) 0(2815) check_via_address: doing dns lookup 0(2815) WARNING:vqm_resize: resize(0) called 0(2815) DEBUG:tm:_reply_light: reply sent out. buf=0x81631c0: SIP/2.0 1..., shmem=0xb60aff08: SIP/2.0 1 0(2815) DEBUG:tm:_reply_light: finished 0(2815) DEBUG: mk_proxy: doing DNS lookup... 0(2815) parse_headers: flags=2000 0(2815) parse_headers: flags=ffffffffffffffff 0(2815) clen_builder: content-length: 273 (273) 0(2815) check_via_address(61.144.140.110, 192.168.1.168, 1) 0(2815) check_via_address: doing dns lookup 0(2815) DEBUG: add_to_tail_of_timer[4]: 0xb60b048c 0(2815) DEBUG: add_to_tail_of_timer[0]: 0xb60b049c 0(2815) SER: new transaction fwd'ed 0(2815) DEBUG:tm:UNREF_UNSAFE: after is 0 0(2815) DEBUG:destroy_avp_list: destroying list (nil) 0(2815) receive_msg: cleaning up 0(2815) SIP Reply (status): 0(2815) version: 0(2815) status: <100> 0(2815) reason: 0(2815) parse_headers: flags=2 0(2815) DEBUG:parse_to:end of header reached, state=10 0(2815) DBUG:parse_to: display={}, ruri={sip:02061241205@210.184.138.8} 0(2815) DEBUG: get_hdr_field: [33]; uri=[sip:02061241205@210.184.138.8] 0(2815) DEBUG: to body [ ] 0(2815) get_hdr_field: cseq : <1> 0(2815) Found param type 232, = ; state=16 0(2815) end of header reached, state=5 0(2815) parse_headers: Via found, flags=2 0(2815) parse_headers: this is the first via 0(2815) After parse_msg... 0(2815) forward_reply: found module nathelper, passing reply to it 0(2815) forward_reply: found module tm, passing reply to it 0(2815) DEBUG: t_check: msg id=70 global id=69 T start=0xffffffff 0(2815) parse_headers: flags=22 0(2815) parse_headers: flags=8 0(2815) DEBUG: t_reply_matching: hash 39719 label 207998729 branch 0 0(2815) DEBUG:tm:REF_UNSAFE: after is 1 0(2815) DEBUG: t_reply_matching: reply matched (T=0xb60b0370)! 0(2815) DEBUG: t_check: msg id=70 global id=70 T end=0xb60b0370 0(2815) DEBUG:tm:reply_received: org. status uas=100, uac[0]=0 local=0 is_invite=1) 0(2815) parse_headers: flags=80 0(2815) Found param type 234, = <61.144.140.110>; state=6 0(2815) Found param type 232, = ; state=6 0(2815) Found param type 235, = <42075>; state=16 0(2815) end of header reached, state=5 0(2815) parse_headers: Via found, flags=80 0(2815) parse_headers: this is the second via 0(2815) DEBUG: get_hdr_body : content_length=0 0(2815) found end of header 0(2815) DEBUG:tm:t_should_relay_response: T_code=100, new_code=100 0(2815) DEBUG:tm:relay_reply: branch=0, save=0, relay=-1 0(2815) DEBUG: add_to_tail_of_timer[1]: 0xb60b049c 0(2815) DEBUG:tm:UNREF_UNSAFE: after is 0 0(2815) DEBUG:destroy_avp_list: destroying list (nil) 0(2815) receive_msg: cleaning up 0(2815) SIP Reply (status): 0(2815) version: 0(2815) status: <180> 0(2815) reason: 0(2815) parse_headers: flags=2 0(2815) DEBUG: add_param: tag=3b3dbe3871bbfa37i0 0(2815) DEBUG:parse_to:end of header reached, state=29 0(2815) DBUG:parse_to: display={}, ruri={sip:02061241205@210.184.138.8} 0(2815) DEBUG: get_hdr_field: [56]; uri=[sip:02061241205@210.184.138.8] 0(2815) DEBUG: to body [] 0(2815) get_hdr_field: cseq : <1> 0(2815) Found param type 232, = ; state=16 0(2815) end of header reached, state=5 0(2815) parse_headers: Via found, flags=2 0(2815) parse_headers: this is the first via 0(2815) After parse_msg... 0(2815) forward_reply: found module nathelper, passing reply to it 0(2815) forward_reply: found module tm, passing reply to it 0(2815) DEBUG: t_check: msg id=71 global id=70 T start=0xffffffff 0(2815) parse_headers: flags=22 0(2815) parse_headers: flags=8 0(2815) DEBUG: t_reply_matching: hash 39719 label 207998729 branch 0 0(2815) DEBUG:tm:REF_UNSAFE: after is 1 0(2815) DEBUG: t_reply_matching: reply matched (T=0xb60b0370)! 0(2815) DEBUG: t_check: msg id=71 global id=71 T end=0xb60b0370 0(2815) DEBUG:tm:reply_received: org. status uas=100, uac[0]=100 local=0 is_invite=1) 0(2815) parse_headers: flags=80 0(2815) Found param type 234, = <61.144.140.110>; state=6 0(2815) Found param type 232, = ; state=6 0(2815) Found param type 235, = <42075>; state=16 0(2815) end of header reached, state=5 0(2815) parse_headers: Via found, flags=80 0(2815) parse_headers: this is the second via 0(2815) DEBUG: get_hdr_body : content_length=0 0(2815) found end of header 0(2815) DEBUG:tm:t_should_relay_response: T_code=100, new_code=180 0(2815) DEBUG:tm:relay_reply: branch=0, save=0, relay=0 0(2815) old size: 476, new size: 410 0(2815) build_res_from_sip_res: copied size: orig:245, new: 179, rest: 231 msg= SIP/2.0 180 Ringing To: ;tag=3b3dbe3871bbfa37i0 From: 3068878;tag=6a33d80f Call-ID: c47ef44f950e7a56 CSeq: 1 INVITE Via: SIP/2.0/UDP 192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075 Record-Route: Server: Sipura/SPA2000-2.0.13(g) Content-Length: 0 0(2815) DEBUG:tm:relay_reply: sent buf=0x81631c0: SIP/2.0 1..., shmem=0xb60ae728: SIP/2.0 1 0(2815) DEBUG: add_to_tail_of_timer[1]: 0xb60b049c 0(2815) DEBUG:tm:UNREF_UNSAFE: after is 0 0(2815) DEBUG:destroy_avp_list: destroying list (nil) 0(2815) receive_msg: cleaning up 1(2817) DEBUG: timer routine:4,tl=0xb60b048c next=(nil) 0(2815) SIP Reply (status): 0(2815) version: 0(2815) status: <404> 0(2815) reason: 0(2815) parse_headers: flags=2 0(2815) DEBUG: add_param: tag=ab59191034906d25i0 0(2815) DEBUG:parse_to:end of header reached, state=29 0(2815) DBUG:parse_to: display={}, ruri={sip:61.144.140.110:46935} 0(2815) DEBUG: get_hdr_field: [49]; uri=[sip:61.144.140.110:46935] 0(2815) DEBUG: to body [sip:61.144.140.110:46935] 0(2815) get_hdr_field: cseq : <1> 0(2815) Found param type 232, = <0>; state=16 0(2815) end of header reached, state=5 0(2815) parse_headers: Via found, flags=2 0(2815) parse_headers: this is the first via 0(2815) After parse_msg... 0(2815) forward_reply: found module nathelper, passing reply to it 0(2815) DEBUG:nathelper:sipping_rpl_filter: reply for SIP natping filtered 0(2815) DEBUG:destroy_avp_list: destroying list (nil) 0(2815) receive_msg: cleaning up 0(2815) SIP Reply (status): 0(2815) version: 0(2815) status: <180> 0(2815) reason: 0(2815) parse_headers: flags=2 0(2815) DEBUG: add_param: tag=3b3dbe3871bbfa37i0 0(2815) DEBUG:parse_to:end of header reached, state=29 0(2815) DBUG:parse_to: display={}, ruri={sip:02061241205@210.184.138.8} 0(2815) DEBUG: get_hdr_field: [56]; uri=[sip:02061241205@210.184.138.8] 0(2815) DEBUG: to body [] 0(2815) get_hdr_field: cseq : <1> 0(2815) Found param type 232, = ; state=16 0(2815) end of header reached, state=5 0(2815) parse_headers: Via found, flags=2 0(2815) parse_headers: this is the first via 0(2815) After parse_msg... 0(2815) forward_reply: found module nathelper, passing reply to it 0(2815) forward_reply: found module tm, passing reply to it 0(2815) DEBUG: t_check: msg id=73 global id=71 T start=0xffffffff 0(2815) parse_headers: flags=22 0(2815) parse_headers: flags=8 0(2815) DEBUG: t_reply_matching: hash 39719 label 207998729 branch 0 0(2815) DEBUG:tm:REF_UNSAFE: after is 1 0(2815) DEBUG: t_reply_matching: reply matched (T=0xb60b0370)! 0(2815) DEBUG: t_check: msg id=73 global id=73 T end=0xb60b0370 0(2815) DEBUG:tm:reply_received: org. status uas=180, uac[0]=180 local=0 is_invite=1) 0(2815) parse_headers: flags=80 0(2815) Found param type 234, = <61.144.140.110>; state=6 0(2815) Found param type 232, = ; state=6 0(2815) Found param type 235, = <42075>; state=16 0(2815) end of header reached, state=5 0(2815) parse_headers: Via found, flags=80 0(2815) parse_headers: this is the second via 0(2815) DEBUG: get_hdr_body : content_length=0 0(2815) found end of header 0(2815) DEBUG:tm:t_should_relay_response: T_code=180, new_code=180 0(2815) DEBUG:tm:relay_reply: branch=0, save=0, relay=0 0(2815) old size: 476, new size: 410 0(2815) build_res_from_sip_res: copied size: orig:245, new: 179, rest: 231 msg= SIP/2.0 180 Ringing To: ;tag=3b3dbe3871bbfa37i0 From: 3068878;tag=6a33d80f Call-ID: c47ef44f950e7a56 CSeq: 1 INVITE Via: SIP/2.0/UDP 192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075 Record-Route: Server: Sipura/SPA2000-2.0.13(g) Content-Length: 0 0(2815) DEBUG:tm:relay_reply: sent buf=0x81631c0: SIP/2.0 1..., shmem=0xb60ae728: SIP/2.0 1 0(2815) DEBUG: add_to_tail_of_timer[1]: 0xb60b049c 0(2815) DEBUG:tm:UNREF_UNSAFE: after is 0 0(2815) DEBUG:destroy_avp_list: destroying list (nil) 0(2815) receive_msg: cleaning up 0(2815) SIP Reply (status): 0(2815) version: 0(2815) status: <200> 0(2815) reason: 0(2815) parse_headers: flags=2 0(2815) DEBUG: add_param: tag=3b3dbe3871bbfa37i0 0(2815) DEBUG:parse_to:end of header reached, state=29 0(2815) DBUG:parse_to: display={}, ruri={sip:02061241205@210.184.138.8} 0(2815) DEBUG: get_hdr_field: [56]; uri=[sip:02061241205@210.184.138.8] 0(2815) DEBUG: to body [] 0(2815) get_hdr_field: cseq : <1> 0(2815) Found param type 232, = ; state=16 0(2815) end of header reached, state=5 0(2815) parse_headers: Via found, flags=2 0(2815) parse_headers: this is the first via 0(2815) After parse_msg... 0(2815) forward_reply: found module nathelper, passing reply to it 0(2815) forward_reply: found module tm, passing reply to it 0(2815) DEBUG: t_check: msg id=74 global id=73 T start=0xffffffff 0(2815) parse_headers: flags=22 0(2815) parse_headers: flags=8 0(2815) DEBUG: t_reply_matching: hash 39719 label 207998729 branch 0 0(2815) DEBUG:tm:REF_UNSAFE: after is 1 0(2815) DEBUG: t_reply_matching: reply matched (T=0xb60b0370)! 0(2815) DEBUG: t_check: msg id=74 global id=74 T end=0xb60b0370 0(2815) DEBUG:tm:reply_received: org. status uas=180, uac[0]=180 local=0 is_invite=1) 0(2815) parse_headers: flags=ffffffffffffffff 0(2815) Found param type 234, = <61.144.140.110>; state=6 0(2815) Found param type 232, = ; state=6 0(2815) Found param type 235, = <42075>; state=16 0(2815) end of header reached, state=5 0(2815) parse_headers: Via found, flags=ffffffffffffffff 0(2815) parse_headers: this is the second via 0(2815) DEBUG: get_hdr_body : content_length=238 0(2815) found end of header 0(2815) DEBUG:check_content_type: type found valid 0(2815) parse_headers: flags=40 0(2815) DEBUG: add_param: tag=6a33d80f 0(2815) DEBUG:parse_to:end of header reached, state=29 0(2815) DBUG:parse_to: display={3068878}, ruri={sip:3068878@210.184.138.8} 0(2815) force_rtp_proxy2: proxy reply: 35132 210.184.138.8 0(2815) parse_headers: flags=ffffffffffffffff 0(2815) parse_headers: flags=80 0(2815) parse_headers: flags=80 0(2815) DEBUG:tm:t_should_relay_response: T_code=180, new_code=200 0(2815) DEBUG:tm:relay_reply: branch=0, save=0, relay=0 0(2815) parse_headers: flags=2000 0(2815) parse_headers: flags=ffffffffffffffff 0(2815) clen_builder: content-length: 255 (255) 0(2815) old size: 888, new size: 862 0(2815) build_res_from_sip_res: copied size: orig:888, new: 862, rest: 0 msg= SIP/2.0 200 OK To: ;tag=3b3dbe3871bbfa37i0 From: 3068878;tag=6a33d80f Call-ID: c47ef44f950e7a56 CSeq: 1 INVITE Via: SIP/2.0/UDP 192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075 Record-Route: Contact: 862061241205 Server: Sipura/SPA2000-2.0.13(g) Content-Length: 255 Allow: ACK, BYE, CANCEL, INFO, INVITE, NOTIFY, OPTIONS, REFER Supported: x-sipura Content-Type: application/sdp P-hint: Reply-Proxied v=0 o=- 12432 12432 IN IP4 192.168.10.244 s=- c=IN IP4 210.184.138.8 t=0 0 m=audio 35132 RTP/AVP 18 100 101 a=rtpmap:18 G729a/8000 a=rtpmap:100 NSE/8000 a=rtpmap:101 telephone-event/8000 a=fmtp:101 0-15 a=ptime:30 a=sendrecv a=nortpproxy:yes 0(2815) DEBUG: add_to_tail_of_timer[2]: 0xb60b03b8 0(2815) DEBUG:tm:relay_reply: sent buf=0x81633c8: SIP/2.0 2..., shmem=0xb60b2060: SIP/2.0 2 0(2815) DEBUG: cleanup_uac_timers: RETR/FR timers reset 0(2815) DEBUG:tm:UNREF_UNSAFE: after is 0 0(2815) DEBUG:destroy_avp_list: destroying list (nil) 0(2815) receive_msg: cleaning up 0(2815) SIP Request: 0(2815) method: 0(2815) uri: 0(2815) version: 0(2815) parse_headers: flags=2 0(2815) DEBUG: add_param: tag=3b3dbe3871bbfa37i0 0(2815) DEBUG:parse_to:end of header reached, state=29 0(2815) DBUG:parse_to: display={}, ruri={sip:02061241205@210.184.138.8} 0(2815) DEBUG: get_hdr_field: [56]; uri=[sip:02061241205@210.184.138.8] 0(2815) DEBUG: to body [] 0(2815) Found param type 232, = ; state=6 0(2815) Found param type 235, = ; state=17 0(2815) end of header reached, state=5 0(2815) parse_headers: Via found, flags=2 0(2815) parse_headers: this is the first via 0(2815) After parse_msg... 0(2815) preparing to run routing scripts... 0(2815) DEBUG : sl_filter_ACK: to late to be a local ACK! 0(2815) parse_headers: flags=100 0(2815) get_hdr_field: cseq : <1> 0(2815) DEBUG:maxfwd:is_maxfwd_present: value = 70 0(2815) parse_headers: flags=80 0(2815) parse_headers: flags=ffffffffffffffff 0(2815) DEBUG: get_hdr_body : content_length=0 0(2815) found end of header 0(2815) parse_headers: flags=200 0(2815) is_preloaded: No 0(2815) grep_sock_info - checking if host==us: 13==13 && [219.136.10.86] == [210.184.138.8] 0(2815) grep_sock_info - checking if port 5066 matches port 64189 0(2815) grep_sock_info - checking if host==us: 13==13 && [219.136.10.86] == [210.184.138.8] 0(2815) grep_sock_info - checking if port 5066 matches port 64189 0(2815) check_self: host != me 0(2815) grep_sock_info - checking if host==us: 13==13 && [210.184.138.8] == [210.184.138.8] 0(2815) grep_sock_info - checking if port 5066 matches port 5066 0(2815) after_loose: Topmost route URI: 'sip:210.184.138.8:5066;lr;ftag=6a33d80f' is me 0(2815) parse_headers: flags=200 0(2815) found end of header 0(2815) find_next_route: No next Route HF found 0(2815) after_loose: No next URI found 0(2815) DBG:rr:run_rr_callbacks: callback id 0 entered 0(2815) DEBUG:uac:restore_from: getting 'vsf' Route param 0(2815) DEBUG:uac:restore_from: Route param 'vsf' not found 0(2815) parse_headers: flags=ffffffffffffffff 0(2815) parse_headers: flags=ffffffffffffffff 0(2815) ERROR: extract_body: message body has length zero 0(2815) ERROR: force_rtp_proxy2: can't extract body from the message 0(2815) DEBUG: t_newtran: msg id=75 , global msg id=74 , T on entrance=0xffffffff 0(2815) parse_headers: flags=ffffffffffffffff 0(2815) parse_headers: flags=78 0(2815) t_lookup_request: start searching: hash=39719, isACK=1 0(2815) parse_headers: flags=38 0(2815) DEBUG: add_param: tag=6a33d80f 0(2815) DEBUG:parse_to:end of header reached, state=29 0(2815) DBUG:parse_to: display={3068878}, ruri={sip:3068878@210.184.138.8} 0(2815) DEBUG: t_lookup_request: e2e proxy ACK found 0(2815) DEBUG:tm:REF_UNSAFE: after is 1 0(2815) DEBUG:tm:t_relay: forwarding ACK 0(2815) DEBUG:tm:t_relay: it's an end2end ACK 0(2815) DEBUG:tm:UNREF_UNSAFE: after is 0 0(2815) DEBUG: mk_proxy: doing DNS lookup... 0(2815) check_via_address(61.144.140.110, 192.168.1.168, 1) 0(2815) check_via_address: doing dns lookup 0(2815) Sending: ACK sip:862061241205@219.136.10.86:64189 SIP/2.0 To: ;tag=3b3dbe3871bbfa37i0 From: 3068878;tag=6a33d80f Via: SIP/2.0/UDP 210.184.138.8:5066;branch=z9hG4bK72b9.90fc56c.2 Via: SIP/2.0/UDP 192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-708924014-1--d87543-;rport=42075 Call-ID: c47ef44f950e7a56 CSeq: 1 ACK Contact: Max-Forwards: 69 User-Agent: eyeBeam release 3004t stamp 16741 Content-Length: 0 P-hint: Proxied P-hint: rr-enforced . 0(2815) orig. len=470, new_len=556, proto=1 0(2815) DEBUG:destroy_avp_list: destroying list (nil) 0(2815) receive_msg: cleaning up 1(2817) DEBUG: timer routine:1,tl=0xb60b049c next=(nil) 0(2815) SIP Request: 0(2815) method: 0(2815) uri: 0(2815) version: 0(2815) parse_headers: flags=2 0(2815) DEBUG: add_param: tag=3b3dbe3871bbfa37i0 0(2815) DEBUG:parse_to:end of header reached, state=29 0(2815) DBUG:parse_to: display={}, ruri={sip:02061241205@210.184.138.8} 0(2815) DEBUG: get_hdr_field: [56]; uri=[sip:02061241205@210.184.138.8] 0(2815) DEBUG: to body [] 0(2815) Found param type 232, = ; state=6 0(2815) Found param type 235, = ; state=17 0(2815) end of header reached, state=5 0(2815) parse_headers: Via found, flags=2 configuration : if (nat_uac_test("19")) { if (!search("^Record-Route:")) { fix_nated_contact(); # Rewrite contact with source IP of signalling if (method=="REGISTER") { fix_nated_register(); } else if (method == "INVITE") { fix_nated_sdp("1"); # Add direction=active to SDP }; force_rport(); # Add rport parameter to topmost Via append_hf("P-hint: Proxied\r\n"); setflag(10); # Mark as NATed }; }; if (loose_route()) { append_hf("P-hint: rr-enforced\r\n"); route(1); exit(); }; if (method=="REGISTER") { if (src_ip==222.88.222.67 || src_ip==210.184.138.4) { save("location"); exit(); } if (!www_authorize("", "subscriber")) { www_challenge("", "0"); exit(); }; save("location"); if (isflagset(10)) { if (!(src_ip==222.88.222.67 || src_ip==210.184.138.4)) { #add_path_received(); append_branch("sip:222.88.222.67:80"); t_replicate("sip:210.184.138.4:80"); } } else { if (!(src_ip==222.88.222.67 || src_ip==210.184.138.4)) { #add_path(); append_branch("sip:222.88.222.67:80"); t_replicate("sip:210.184.138.4:80"); } } return; }; route[1] { # if client or server know to be behind a NAT, enable relay if (isflagset(10)) { force_rtp_proxy(); }; # NAT processing of replies; apply to all transactions (for example, # re-INVITEs from public to private UA are hard to identify as # NATed at the moment of request processing); look at replies t_on_reply("1"); t_on_failure("1"); # send it out now; use stateful forwarding as it works reliably # even for UDP2TCP if (!t_relay()) { sl_reply_error(); return; }; }