As you can see in the snippet a left from the debug, the re-INVITE is
managed by the nathelper module. Please provide network trace to be able
to see the result of the processing (received and sent messages). Use:
ngrep -qt -d any port 5060
on your sip server.
Cheers,
Daniel
On 08/10/06 14:57, Pavel D. Kuzin wrote:
this is a debug view with debug=5
[...]
0(14154) SIP Request:
0(14154) method: <INVITE>
0(14154) uri: <sip:400@192.168.39.50:5060;nat=yes>
0(14154) version: <SIP/2.0>
0(14154) parse_headers: flags=2
0(14154) DEBUG: add_param: tag=0-13c4-44db1c5c-b38bc-7e15
0(14154) DEBUG:parse_to:end of header reached, state=29
0(14154) DBUG:parse_to: display={}, ruri={sip:anonymous@anonymous.com}
0(14154) DEBUG: get_hdr_field: <To> [62];
uri=[sip:anonymous@anonymous.com]
0(14154) DEBUG: to body [<sip:anonymous@anonymous.com>]
0(14154) get_hdr_field: cseq <CSeq>: <1> <INVITE>
0(14154) Found param type 232, <branch> =
<z9hG4bK-44db1c63-b5374-2864>; state=16
0(14154) end of header reached, state=5
0(14154) parse_headers: Via found, flags=2
0(14154) parse_headers: this is the first via
0(14154) After parse_msg...
0(14154) preparing to run routing scripts...
0(14154) parse_headers: flags=100
0(14154) DEBUG:maxfwd:is_maxfwd_present: value = 70
0(14154) check_via_address(192.168.39.50, 192.168.39.50, 0)
0(14154) parse_headers: flags=80
0(14154) parse_headers: flags=80
0(14154) DEBUG: add_param: tag=0-13c4-44db1c5c-b390c-6691
0(14154) DEBUG:parse_to:end of header reached, state=29
0(14154) DBUG:parse_to: display={}, ruri={sip:500@192.168.39.54}
0(14154) parse_headers: flags=200
0(14154) is_preloaded: No
0(14154) grep_sock_info - checking if host==us: 13==13 &&
[192.168.39.50] == [192.168.39.54]
0(14154) grep_sock_info - checking if port 5060 matches port 5060
0(14154) grep_sock_info - checking if host==us: 13==13 &&
[192.168.39.50] == [192.168.39.54]
0(14154) grep_sock_info - checking if port 5060 matches port 5060
0(14154) check_self: host != me
0(14154) grep_sock_info - checking if host==us: 13==13 &&
[192.168.39.54] == [192.168.39.54]
0(14154) grep_sock_info - checking if port 5060 matches port 5060
0(14154) after_loose: Topmost route URI:
'sip:192.168.39.54;lr;ftag=0-13c4-44db1c5c-b38bc-7e15' is me
0(14154) parse_headers: flags=200
0(14154) DEBUG: get_hdr_body : content_length=318
0(14154) found end of header
0(14154) find_next_route: No next Route HF found
0(14154) after_loose: No next URI found
0(14154) parse_headers: flags=ffffffffffffffff
0(14154) parse_headers: flags=40
0(14154) parse_headers: flags=ffffffffffffffff
0(14154) DEBUG:check_content_type: type <application/sdp> found valid
0(14154) parse_headers: flags=40
0(14154) force_rtp_proxy2: proxy reply: 35030 192.168.39.54
0(14154) subst_run: running. r=0
0(14154) subst_run: matched (0, 34): [sip:400@192.168.39.50:5060;nat=yes]
0(14154) textops: subst_uri_f: match - old uri=
[sip:400@192.168.39.50:5060;nat=yes], new uri=
[sip:400@192.168.39.50:5060]
0(14154) parse_headers: flags=ffffffffffffffff
0(14154) DEBUG:check_content_type: type <application/sdp> found valid
0(14154) parse_headers: flags=40
0(14154) force_rtp_proxy2: proxy reply: 35030 192.168.39.54
0(14154) DEBUG: t_newtran: msg id=6 , global msg id=5 , T on
entrance=0xffffffffffffffff
0(14154) parse_headers: flags=ffffffffffffffff
0(14154) parse_headers: flags=78
0(14154) t_lookup_request: start searching: hash=34382, isACK=0
0(14154) DEBUG: RFC3261 transaction matching failed
0(14154) DEBUG: t_lookup_request: no transaction found
0(14154) DEBUG:tm:t_relay: new INVITE
0(14154) parse_headers: flags=ffffffffffffffff
0(14154) check_via_address(192.168.39.50, 192.168.39.50, 0)
0(14154) WARNING:vqm_resize: resize(0) called
0(14154) DEBUG:tm:_reply_light: reply sent out. buf=0x6166b8: SIP/2.0
1..., shmem=0x2ba62f3c3f30: SIP/2.0 1
0(14154) DEBUG:tm:_reply_light: finished
0(14154) DEBUG: mk_proxy: doing DNS lookup...
0(14154) parse_headers: flags=2000
0(14154) parse_headers: flags=ffffffffffffffff
0(14154) clen_builder: content-length: 372 (372)
0(14154) check_via_address(192.168.39.50, 192.168.39.50, 0)
0(14154) DEBUG: add_to_tail_of_timer[4]: 0x2ba62f3c16a8
0(14154) DEBUG: add_to_tail_of_timer[0]: 0x2ba62f3c16c8
0(14154) SER: new transaction fwd'ed
0(14154) DEBUG:tm:UNREF_UNSAFE: after is 0
0(14154) DEBUG:destroy_avp_list: destroying list (nil)
0(14154) receive_msg: cleaning up