[Devel] xten to sipura compatbility issue

Raymond Chen rchen at broadz.com
Thu Jun 29 12:37:42 CEST 2006


Dear all,

I have set up both xten and sipura, I want to test onnet calls between 
them.  I am fine with xten eyebeam  to xten eyebeam,  and sipura to 
sipura, both scenario works fine.  when I do xten to sipura 2000, it 
rings and when pick up, xten sends BYE right after ACK.  I've tried 
1.0.1 verson and the CVS HEAD, happens to both version.  did anyone 
encountered the same problem?

thanks

Ray
ps.  debug attached
-------------- next part --------------
U 61.144.140.110:42075 -> 210.184.138.8:5066
INVITE sip:02061241205 at 210.184.138.8:5066 SIP/2.0.
To: <sip:02061241205 at 210.184.138.8>.
From: 3068878<sip:3068878 at 210.184.138.8>;tag=6a33d80f.
Via: SIP/2.0/UDP 192.168.1.168:9801;branch=z9hG4bK-d87543-443309010-1--d87543-;rport.
Call-ID: c47ef44f950e7a56.
CSeq: 1 INVITE.
Contact: <sip:3068878 at 192.168.1.168:9801>.
Max-Forwards: 70.
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO.
Content-Type: application/sdp.
User-Agent: eyeBeam release 3004t stamp 16741.
Content-Length: 234.
.
v=0.
o=- 21525734 21525766 IN IP4 192.168.1.168.
s=eyeBeam.
c=IN IP4 192.168.1.168.
t=0 0.
m=audio 9802 RTP/AVP 18 101.
a=alt:1 1 : 8743E761 095E081B 192.168.1.168 9802.
a=fmtp:101 0-15.
a=rtpmap:101 telephone-event/8000.
a=sendrecv.

#
U 210.184.138.8:5066 -> 61.144.140.110:42075
SIP/2.0 100 trying -- your call is important to us.
To: <sip:02061241205 at 210.184.138.8>.
From: 3068878<sip:3068878 at 210.184.138.8>;tag=6a33d80f.
Via: SIP/2.0/UDP 192.168.1.168:9801;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075;received=61.144.140.110.
Call-ID: c47ef44f950e7a56.
CSeq: 1 INVITE.
Server: OpenSer (1.1.0-pre2-notls (i386/linux)).
Content-Length: 0.
.

#
U 210.184.138.8:5066 -> 219.136.10.86:64189
INVITE sip:862061241205 at 219.136.10.86:64189 SIP/2.0.
Record-Route: <sip:210.184.138.8:5066;lr=on;ftag=6a33d80f>.
To: <sip:02061241205 at 210.184.138.8>.
From: 3068878<sip:3068878 at 210.184.138.8>;tag=6a33d80f.
Via: SIP/2.0/UDP 210.184.138.8:5066;branch=z9hG4bK72b9.90fc56c.0.
Via: SIP/2.0/UDP 192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075.
Call-ID: c47ef44f950e7a56.
CSeq: 1 INVITE.
Contact: <sip:3068878 at 61.144.140.110:42075>.
Max-Forwards: 69.
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO.
Content-Type: application/sdp.
User-Agent: eyeBeam release 3004t stamp 16741.
Content-Length: 273.
P-hint: Proxied.
P-hint: usrloc applied.
.
v=0.
o=- 21525734 21525766 IN IP4 192.168.1.168.
s=eyeBeam.
c=IN IP4 210.184.138.8.
t=0 0.
m=audio 35130 RTP/AVP 18 101.
a=alt:1 1 : 8743E761 095E081B 192.168.1.168 9802.
a=fmtp:101 0-15.
a=rtpmap:101 telephone-event/8000.
a=sendrecv.
a=direction:active.
a=nortpproxy:yes.

#
U 219.136.10.86:64189 -> 210.184.138.8:5066
SIP/2.0 100 Trying.
To: <sip:02061241205 at 210.184.138.8>.
From: 3068878<sip:3068878 at 210.184.138.8>;tag=6a33d80f.
Call-ID: c47ef44f950e7a56.
CSeq: 1 INVITE.
Via: SIP/2.0/UDP 210.184.138.8:5066;branch=z9hG4bK72b9.90fc56c.0.
Via: SIP/2.0/UDP 192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075.
Record-Route: <sip:210.184.138.8:5066;lr=on;ftag=6a33d80f>.
Server: Sipura/SPA2000-2.0.13(g).
Content-Length: 0.
.

#
U 219.136.10.86:64189 -> 210.184.138.8:5066
SIP/2.0 180 Ringing.
To: <sip:02061241205 at 210.184.138.8>;tag=3b3dbe3871bbfa37i0.
From: 3068878<sip:3068878 at 210.184.138.8>;tag=6a33d80f.
Call-ID: c47ef44f950e7a56.
CSeq: 1 INVITE.
Via: SIP/2.0/UDP 210.184.138.8:5066;branch=z9hG4bK72b9.90fc56c.0.
Via: SIP/2.0/UDP 192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075.
Record-Route: <sip:210.184.138.8:5066;lr=on;ftag=6a33d80f>.
Server: Sipura/SPA2000-2.0.13(g).
Content-Length: 0.
.

#
U 210.184.138.8:5066 -> 61.144.140.110:42075
SIP/2.0 180 Ringing.
To: <sip:02061241205 at 210.184.138.8>;tag=3b3dbe3871bbfa37i0.
From: 3068878<sip:3068878 at 210.184.138.8>;tag=6a33d80f.
Call-ID: c47ef44f950e7a56.
CSeq: 1 INVITE.
Via: SIP/2.0/UDP 192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075.
Record-Route: <sip:210.184.138.8:5066;lr=on;ftag=6a33d80f>.
Server: Sipura/SPA2000-2.0.13(g).
Content-Length: 0.
.

#
U 61.144.140.110:46935 -> 210.184.138.8:5066
SIP/2.0 404 Not Found.
To: sip:61.144.140.110:46935;tag=ab59191034906d25i0.
From: sip:keepitopen at broadz.net;tag=75ca79a5.
Call-ID: c60b3302-3e11e12-c8 at 210.184.138.8.
CSeq: 1 OPTIONS.
Via: SIP/2.0/UDP 210.184.138.8:5066;branch=0.
Server: Sipura/SPA2002-3.1.2(a).
Content-Length: 0.
.

#
U 219.136.10.86:64189 -> 210.184.138.8:5066
SIP/2.0 180 Ringing.
To: <sip:02061241205 at 210.184.138.8>;tag=3b3dbe3871bbfa37i0.
From: 3068878<sip:3068878 at 210.184.138.8>;tag=6a33d80f.
Call-ID: c47ef44f950e7a56.
CSeq: 1 INVITE.
Via: SIP/2.0/UDP 210.184.138.8:5066;branch=z9hG4bK72b9.90fc56c.0.
Via: SIP/2.0/UDP 192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075.
Record-Route: <sip:210.184.138.8:5066;lr=on;ftag=6a33d80f>.
Server: Sipura/SPA2000-2.0.13(g).
Content-Length: 0.
.

#
U 210.184.138.8:5066 -> 61.144.140.110:42075
SIP/2.0 180 Ringing.
To: <sip:02061241205 at 210.184.138.8>;tag=3b3dbe3871bbfa37i0.
From: 3068878<sip:3068878 at 210.184.138.8>;tag=6a33d80f.
Call-ID: c47ef44f950e7a56.
CSeq: 1 INVITE.
Via: SIP/2.0/UDP 192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075.
Record-Route: <sip:210.184.138.8:5066;lr=on;ftag=6a33d80f>.
Server: Sipura/SPA2000-2.0.13(g).
Content-Length: 0.
.

#
U 219.136.10.86:64189 -> 210.184.138.8:5066
SIP/2.0 200 OK.
To: <sip:02061241205 at 210.184.138.8>;tag=3b3dbe3871bbfa37i0.
From: 3068878<sip:3068878 at 210.184.138.8>;tag=6a33d80f.
Call-ID: c47ef44f950e7a56.
CSeq: 1 INVITE.
Via: SIP/2.0/UDP 210.184.138.8:5066;branch=z9hG4bK72b9.90fc56c.0.
Via: SIP/2.0/UDP 192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075.
Record-Route: <sip:210.184.138.8:5066;lr=on;ftag=6a33d80f>.
Contact: 862061241205 <sip:862061241205 at 192.168.10.244:8177>.
Server: Sipura/SPA2000-2.0.13(g).
Content-Length: 238.
Allow: ACK, BYE, CANCEL, INFO, INVITE, NOTIFY, OPTIONS, REFER.
Supported: x-sipura.
Content-Type: application/sdp.
.
v=0.
o=- 12432 12432 IN IP4 192.168.10.244.
s=-.
c=IN IP4 192.168.10.244.
t=0 0.
m=audio 43712 RTP/AVP 18 100 101.
a=rtpmap:18 G729a/8000.
a=rtpmap:100 NSE/8000.
a=rtpmap:101 telephone-event/8000.
a=fmtp:101 0-15.
a=ptime:30.
a=sendrecv.

#
U 210.184.138.8:5066 -> 61.144.140.110:42075
SIP/2.0 200 OK.
To: <sip:02061241205 at 210.184.138.8>;tag=3b3dbe3871bbfa37i0.
From: 3068878<sip:3068878 at 210.184.138.8>;tag=6a33d80f.
Call-ID: c47ef44f950e7a56.
CSeq: 1 INVITE.
Via: SIP/2.0/UDP 192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075.
Record-Route: <sip:210.184.138.8:5066;lr=on;ftag=6a33d80f>.
Contact: 862061241205 <sip:862061241205 at 219.136.10.86:64189>.
Server: Sipura/SPA2000-2.0.13(g).
Content-Length: 255.
Allow: ACK, BYE, CANCEL, INFO, INVITE, NOTIFY, OPTIONS, REFER.
Supported: x-sipura.
Content-Type: application/sdp.
P-hint: Reply-Proxied.
.
v=0.
o=- 12432 12432 IN IP4 192.168.10.244.
s=-.
c=IN IP4 210.184.138.8.
t=0 0.
m=audio 35132 RTP/AVP 18 100 101.
a=rtpmap:18 G729a/8000.
a=rtpmap:100 NSE/8000.
a=rtpmap:101 telephone-event/8000.
a=fmtp:101 0-15.
a=ptime:30.
a=sendrecv.
a=nortpproxy:yes.

#
U 61.144.140.110:42075 -> 210.184.138.8:5066
ACK sip:862061241205 at 219.136.10.86:64189 SIP/2.0.
To: <sip:02061241205 at 210.184.138.8>;tag=3b3dbe3871bbfa37i0.
From: 3068878<sip:3068878 at 210.184.138.8>;tag=6a33d80f.
Via: SIP/2.0/UDP 192.168.1.168:9801;branch=z9hG4bK-d87543-708924014-1--d87543-;rport.
Call-ID: c47ef44f950e7a56.
CSeq: 1 ACK.
Route: <sip:210.184.138.8:5066;lr;ftag=6a33d80f>.
Contact: <sip:3068878 at 192.168.1.168:9801>.
Max-Forwards: 70.
User-Agent: eyeBeam release 3004t stamp 16741.
Content-Length: 0.
.

#
U 210.184.138.8:5066 -> 219.136.10.86:64189
ACK sip:862061241205 at 219.136.10.86:64189 SIP/2.0.
To: <sip:02061241205 at 210.184.138.8>;tag=3b3dbe3871bbfa37i0.
From: 3068878<sip:3068878 at 210.184.138.8>;tag=6a33d80f.
Via: SIP/2.0/UDP 210.184.138.8:5066;branch=z9hG4bK72b9.90fc56c.2.
Via: SIP/2.0/UDP 192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-708924014-1--d87543-;rport=42075.
Call-ID: c47ef44f950e7a56.
CSeq: 1 ACK.
Contact: <sip:3068878 at 61.144.140.110:42075>.
Max-Forwards: 69.
User-Agent: eyeBeam release 3004t stamp 16741.
Content-Length: 0.
P-hint: Proxied.
P-hint: rr-enforced.
.

#
U 61.144.140.110:42075 -> 210.184.138.8:5066
BYE sip:862061241205 at 219.136.10.86:64189 SIP/2.0.
To: <sip:02061241205 at 210.184.138.8>;tag=3b3dbe3871bbfa37i0.
From: 3068878<sip:3068878 at 210.184.138.8>;tag=6a33d80f.
Via: SIP/2.0/UDP 192.168.1.168:9801;branch=z9hG4bK-d87543-956249433-1--d87543-;rport.
Call-ID: c47ef44f950e7a56.
CSeq: 2 BYE.
Route: <sip:210.184.138.8:5066;lr;ftag=6a33d80f>.
Contact: <sip:3068878 at 192.168.1.168:9801>.
Max-Forwards: 70.
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO.
User-Agent: eyeBeam release 3004t stamp 16741.
Content-Length: 0.
.

#
U 210.184.138.8:5066 -> 219.136.10.86:64189
BYE sip:862061241205 at 219.136.10.86:64189 SIP/2.0.
To: <sip:02061241205 at 210.184.138.8>;tag=3b3dbe3871bbfa37i0.
From: 3068878<sip:3068878 at 210.184.138.8>;tag=6a33d80f.
Via: SIP/2.0/UDP 210.184.138.8:5066;branch=z9hG4bK42b9.d7afa485.0.
Via: SIP/2.0/UDP 192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-956249433-1--d87543-;rport=42075.
Call-ID: c47ef44f950e7a56.
CSeq: 2 BYE.
Contact: <sip:3068878 at 61.144.140.110:42075>.
Max-Forwards: 69.
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO.
User-Agent: eyeBeam release 3004t stamp 16741.
Content-Length: 0.
P-hint: Proxied.
P-hint: rr-enforced.
.

#
U 219.136.10.86:64189 -> 210.184.138.8:5066
SIP/2.0 200 OK.
To: <sip:02061241205 at 210.184.138.8>;tag=3b3dbe3871bbfa37i0.
From: 3068878<sip:3068878 at 210.184.138.8>;tag=6a33d80f.
Call-ID: c47ef44f950e7a56.
CSeq: 2 BYE.
Via: SIP/2.0/UDP 210.184.138.8:5066;branch=z9hG4bK42b9.d7afa485.0.
Via: SIP/2.0/UDP 192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-956249433-1--d87543-;rport=42075.
Server: Sipura/SPA2000-2.0.13(g).
Content-Length: 0.
.

#
U 210.184.138.8:5066 -> 61.144.140.110:42075
SIP/2.0 200 OK.
To: <sip:02061241205 at 210.184.138.8>;tag=3b3dbe3871bbfa37i0.
From: 3068878<sip:3068878 at 210.184.138.8>;tag=6a33d80f.
Call-ID: c47ef44f950e7a56.
CSeq: 2 BYE.
Via: SIP/2.0/UDP 192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-956249433-1--d87543-;rport=42075.
Server: Sipura/SPA2000-2.0.13(g).
Content-Length: 0.


 0(2815) receive_msg: cleaning up
 0(2815) SIP Request:
 0(2815)  method:  <INVITE>
 0(2815)  uri:     <sip:02061241205 at 210.184.138.8:5066>
 0(2815)  version: <SIP/2.0>
 0(2815) parse_headers: flags=2
 0(2815) DEBUG:parse_to:end of header reached, state=10
 0(2815) DBUG:parse_to: display={}, ruri={sip:02061241205 at 210.184.138.8}
 0(2815) DEBUG: get_hdr_field: <To> [33]; uri=[sip:02061241205 at 210.184.138.8] 
 0(2815) DEBUG: to body [<sip:02061241205 at 210.184.138.8>
]
 0(2815) Found param type 232, <branch> = <z9hG4bK-d87543-443309010-1--d87543->; state=6
 0(2815) Found param type 235, <rport> = <n/a>; state=17
 0(2815) end of header reached, state=5
 0(2815) parse_headers: Via found, flags=2
 0(2815) parse_headers: this is the first via
 0(2815) After parse_msg...
 0(2815) preparing to run routing scripts...
 0(2815) parse_headers: flags=100
 0(2815) get_hdr_field: cseq <CSeq>: <1> <INVITE>
 0(2815) DEBUG:maxfwd:is_maxfwd_present: value = 70 
 0(2815) parse_headers: flags=80
 0(2815) parse_headers: flags=ffffffffffffffff
 0(2815) DEBUG: get_hdr_body : content_length=234
 0(2815) found end of header
 0(2815) DEBUG:check_content_type: type <application/sdp> found valid
 0(2815) parse_headers: flags=ffffffffffffffff
 0(2815) parse_headers: flags=200
 0(2815) find_first_route: No Route headers found
 0(2815) loose_route: There is no Route HF
 0(2815) DEBUG: add_param: tag=6a33d80f
 0(2815) DEBUG:parse_to:end of header reached, state=29
 0(2815) DBUG:parse_to: display={3068878}, ruri={sip:3068878 at 210.184.138.8}
 0(2815) grep_sock_info - checking if host==us: 13==13 &&  [210.184.138.8] == [210.184.138.8]
 0(2815) grep_sock_info - checking if port 5066 matches port 5066
 0(2815) DEBUG:avpops:load_avps: loaded avps = 0
 0(2815) rewrite_uri: Rewriting Request-URI with 'sip:862061241205 at 219.136.10.86:64189'
 0(2815) DEBUG:avpops:load_avps: loaded avps = 0
 0(2815) parse_headers: flags=ffffffffffffffff
 0(2815) parse_headers: flags=ffffffffffffffff
 0(2815) DEBUG:check_content_type: type <application/sdp> found valid
 0(2815) parse_headers: flags=40
 0(2815) force_rtp_proxy2: proxy reply: 35130 210.184.138.8

 0(2815) DEBUG: t_newtran: msg id=69 , global msg id=40 , T on entrance=0xffffffff
 0(2815) parse_headers: flags=ffffffffffffffff
 0(2815) parse_headers: flags=78
 0(2815) t_lookup_request: start searching: hash=39719, isACK=0
 0(2815) DEBUG: RFC3261 transaction matching failed
 0(2815) DEBUG: t_lookup_request: no transaction found
 0(2815) DEBUG:tm:t_relay: new INVITE
 0(2815) parse_headers: flags=ffffffffffffffff
 0(2815) check_via_address(61.144.140.110, 192.168.1.168, 1)
 0(2815) check_via_address: doing dns lookup
 0(2815) WARNING:vqm_resize: resize(0) called
 0(2815) DEBUG:tm:_reply_light: reply sent out. buf=0x81631c0: SIP/2.0 1..., shmem=0xb60aff08: SIP/2.0 1
 0(2815) DEBUG:tm:_reply_light: finished
 0(2815) DEBUG: mk_proxy: doing DNS lookup...
 0(2815) parse_headers: flags=2000
 0(2815) parse_headers: flags=ffffffffffffffff
 0(2815) clen_builder: content-length: 273 (273)
 0(2815) check_via_address(61.144.140.110, 192.168.1.168, 1)
 0(2815) check_via_address: doing dns lookup
 0(2815) DEBUG: add_to_tail_of_timer[4]: 0xb60b048c
 0(2815) DEBUG: add_to_tail_of_timer[0]: 0xb60b049c
 0(2815) SER: new transaction fwd'ed
 0(2815) DEBUG:tm:UNREF_UNSAFE: after is 0
 0(2815) DEBUG:destroy_avp_list: destroying list (nil)
 0(2815) receive_msg: cleaning up
 0(2815) SIP Reply  (status):
 0(2815)  version: <SIP/2.0>
 0(2815)  status:  <100>
 0(2815)  reason:  <Trying>
 0(2815) parse_headers: flags=2
 0(2815) DEBUG:parse_to:end of header reached, state=10
 0(2815) DBUG:parse_to: display={}, ruri={sip:02061241205 at 210.184.138.8}
 0(2815) DEBUG: get_hdr_field: <To> [33]; uri=[sip:02061241205 at 210.184.138.8] 
 0(2815) DEBUG: to body [<sip:02061241205 at 210.184.138.8>
]
 0(2815) get_hdr_field: cseq <CSeq>: <1> <INVITE>
 0(2815) Found param type 232, <branch> = <z9hG4bK72b9.90fc56c.0>; state=16
 0(2815) end of header reached, state=5
 0(2815) parse_headers: Via found, flags=2
 0(2815) parse_headers: this is the first via
 0(2815) After parse_msg...
 0(2815) forward_reply: found module nathelper, passing reply to it
 0(2815) forward_reply: found module tm, passing reply to it
 0(2815) DEBUG: t_check: msg id=70 global id=69 T start=0xffffffff
 0(2815) parse_headers: flags=22
 0(2815) parse_headers: flags=8
 0(2815) DEBUG: t_reply_matching: hash 39719 label 207998729 branch 0
 0(2815) DEBUG:tm:REF_UNSAFE: after is 1
 0(2815) DEBUG: t_reply_matching: reply matched (T=0xb60b0370)!
 0(2815) DEBUG: t_check: msg id=70 global id=70 T end=0xb60b0370
 0(2815) DEBUG:tm:reply_received: org. status uas=100, uac[0]=0 local=0 is_invite=1)
 0(2815) parse_headers: flags=80
 0(2815) Found param type 234, <received> = <61.144.140.110>; state=6
 0(2815) Found param type 232, <branch> = <z9hG4bK-d87543-443309010-1--d87543->; state=6
 0(2815) Found param type 235, <rport> = <42075>; state=16
 0(2815) end of header reached, state=5
 0(2815) parse_headers: Via found, flags=80
 0(2815) parse_headers: this is the second via
 0(2815) DEBUG: get_hdr_body : content_length=0
 0(2815) found end of header
 0(2815) DEBUG:tm:t_should_relay_response: T_code=100, new_code=100
 0(2815) DEBUG:tm:relay_reply: branch=0, save=0, relay=-1
 0(2815) DEBUG: add_to_tail_of_timer[1]: 0xb60b049c
 0(2815) DEBUG:tm:UNREF_UNSAFE: after is 0
 0(2815) DEBUG:destroy_avp_list: destroying list (nil)
 0(2815) receive_msg: cleaning up
 0(2815) SIP Reply  (status):
 0(2815)  version: <SIP/2.0>
 0(2815)  status:  <180>
 0(2815)  reason:  <Ringing>
 0(2815) parse_headers: flags=2
 0(2815) DEBUG: add_param: tag=3b3dbe3871bbfa37i0
 0(2815) DEBUG:parse_to:end of header reached, state=29
 0(2815) DBUG:parse_to: display={}, ruri={sip:02061241205 at 210.184.138.8}
 0(2815) DEBUG: get_hdr_field: <To> [56]; uri=[sip:02061241205 at 210.184.138.8] 
 0(2815) DEBUG: to body [<sip:02061241205 at 210.184.138.8>]
 0(2815) get_hdr_field: cseq <CSeq>: <1> <INVITE>
 0(2815) Found param type 232, <branch> = <z9hG4bK72b9.90fc56c.0>; state=16
 0(2815) end of header reached, state=5
 0(2815) parse_headers: Via found, flags=2
 0(2815) parse_headers: this is the first via
 0(2815) After parse_msg...
 0(2815) forward_reply: found module nathelper, passing reply to it
 0(2815) forward_reply: found module tm, passing reply to it
 0(2815) DEBUG: t_check: msg id=71 global id=70 T start=0xffffffff
 0(2815) parse_headers: flags=22
 0(2815) parse_headers: flags=8
 0(2815) DEBUG: t_reply_matching: hash 39719 label 207998729 branch 0
 0(2815) DEBUG:tm:REF_UNSAFE: after is 1
 0(2815) DEBUG: t_reply_matching: reply matched (T=0xb60b0370)!
 0(2815) DEBUG: t_check: msg id=71 global id=71 T end=0xb60b0370
 0(2815) DEBUG:tm:reply_received: org. status uas=100, uac[0]=100 local=0 is_invite=1)
 0(2815) parse_headers: flags=80
 0(2815) Found param type 234, <received> = <61.144.140.110>; state=6
 0(2815) Found param type 232, <branch> = <z9hG4bK-d87543-443309010-1--d87543->; state=6
 0(2815) Found param type 235, <rport> = <42075>; state=16
 0(2815) end of header reached, state=5
 0(2815) parse_headers: Via found, flags=80
 0(2815) parse_headers: this is the second via
 0(2815) DEBUG: get_hdr_body : content_length=0
 0(2815) found end of header
 0(2815) DEBUG:tm:t_should_relay_response: T_code=100, new_code=180
 0(2815) DEBUG:tm:relay_reply: branch=0, save=0, relay=0
 0(2815)  old size: 476, new size: 410
 0(2815) build_res_from_sip_res: copied size: orig:245, new: 179, rest: 231 msg=
SIP/2.0 180 Ringing
To: <sip:02061241205 at 210.184.138.8>;tag=3b3dbe3871bbfa37i0
From: 3068878<sip:3068878 at 210.184.138.8>;tag=6a33d80f
Call-ID: c47ef44f950e7a56
CSeq: 1 INVITE
Via: SIP/2.0/UDP 192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075
Record-Route: <sip:210.184.138.8:5066;lr=on;ftag=6a33d80f>
Server: Sipura/SPA2000-2.0.13(g)
Content-Length: 0


 0(2815) DEBUG:tm:relay_reply: sent buf=0x81631c0: SIP/2.0 1..., shmem=0xb60ae728: SIP/2.0 1
 0(2815) DEBUG: add_to_tail_of_timer[1]: 0xb60b049c
 0(2815) DEBUG:tm:UNREF_UNSAFE: after is 0
 0(2815) DEBUG:destroy_avp_list: destroying list (nil)
 0(2815) receive_msg: cleaning up
 1(2817) DEBUG: timer routine:4,tl=0xb60b048c next=(nil)
 0(2815) SIP Reply  (status):
 0(2815)  version: <SIP/2.0>
 0(2815)  status:  <404>
 0(2815)  reason:  <Not Found>
 0(2815) parse_headers: flags=2
 0(2815) DEBUG: add_param: tag=ab59191034906d25i0
 0(2815) DEBUG:parse_to:end of header reached, state=29
 0(2815) DBUG:parse_to: display={}, ruri={sip:61.144.140.110:46935}
 0(2815) DEBUG: get_hdr_field: <To> [49]; uri=[sip:61.144.140.110:46935] 
 0(2815) DEBUG: to body [sip:61.144.140.110:46935]
 0(2815) get_hdr_field: cseq <CSeq>: <1> <OPTIONS>
 0(2815) Found param type 232, <branch> = <0>; state=16
 0(2815) end of header reached, state=5
 0(2815) parse_headers: Via found, flags=2
 0(2815) parse_headers: this is the first via
 0(2815) After parse_msg...
 0(2815) forward_reply: found module nathelper, passing reply to it
 0(2815) DEBUG:nathelper:sipping_rpl_filter: reply for SIP natping filtered
 0(2815) DEBUG:destroy_avp_list: destroying list (nil)
 0(2815) receive_msg: cleaning up
 0(2815) SIP Reply  (status):
 0(2815)  version: <SIP/2.0>
 0(2815)  status:  <180>
 0(2815)  reason:  <Ringing>
 0(2815) parse_headers: flags=2
 0(2815) DEBUG: add_param: tag=3b3dbe3871bbfa37i0
 0(2815) DEBUG:parse_to:end of header reached, state=29
 0(2815) DBUG:parse_to: display={}, ruri={sip:02061241205 at 210.184.138.8}
 0(2815) DEBUG: get_hdr_field: <To> [56]; uri=[sip:02061241205 at 210.184.138.8] 
 0(2815) DEBUG: to body [<sip:02061241205 at 210.184.138.8>]
 0(2815) get_hdr_field: cseq <CSeq>: <1> <INVITE>
 0(2815) Found param type 232, <branch> = <z9hG4bK72b9.90fc56c.0>; state=16
 0(2815) end of header reached, state=5
 0(2815) parse_headers: Via found, flags=2
 0(2815) parse_headers: this is the first via
 0(2815) After parse_msg...
 0(2815) forward_reply: found module nathelper, passing reply to it
 0(2815) forward_reply: found module tm, passing reply to it
 0(2815) DEBUG: t_check: msg id=73 global id=71 T start=0xffffffff
 0(2815) parse_headers: flags=22
 0(2815) parse_headers: flags=8
 0(2815) DEBUG: t_reply_matching: hash 39719 label 207998729 branch 0
 0(2815) DEBUG:tm:REF_UNSAFE: after is 1
 0(2815) DEBUG: t_reply_matching: reply matched (T=0xb60b0370)!
 0(2815) DEBUG: t_check: msg id=73 global id=73 T end=0xb60b0370
 0(2815) DEBUG:tm:reply_received: org. status uas=180, uac[0]=180 local=0 is_invite=1)
 0(2815) parse_headers: flags=80
 0(2815) Found param type 234, <received> = <61.144.140.110>; state=6
 0(2815) Found param type 232, <branch> = <z9hG4bK-d87543-443309010-1--d87543->; state=6
 0(2815) Found param type 235, <rport> = <42075>; state=16
 0(2815) end of header reached, state=5
 0(2815) parse_headers: Via found, flags=80
 0(2815) parse_headers: this is the second via
 0(2815) DEBUG: get_hdr_body : content_length=0
 0(2815) found end of header
 0(2815) DEBUG:tm:t_should_relay_response: T_code=180, new_code=180
 0(2815) DEBUG:tm:relay_reply: branch=0, save=0, relay=0
 0(2815)  old size: 476, new size: 410
 0(2815) build_res_from_sip_res: copied size: orig:245, new: 179, rest: 231 msg=
SIP/2.0 180 Ringing
To: <sip:02061241205 at 210.184.138.8>;tag=3b3dbe3871bbfa37i0
From: 3068878<sip:3068878 at 210.184.138.8>;tag=6a33d80f
Call-ID: c47ef44f950e7a56
CSeq: 1 INVITE
Via: SIP/2.0/UDP 192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075
Record-Route: <sip:210.184.138.8:5066;lr=on;ftag=6a33d80f>
Server: Sipura/SPA2000-2.0.13(g)
Content-Length: 0


 0(2815) DEBUG:tm:relay_reply: sent buf=0x81631c0: SIP/2.0 1..., shmem=0xb60ae728: SIP/2.0 1
 0(2815) DEBUG: add_to_tail_of_timer[1]: 0xb60b049c
 0(2815) DEBUG:tm:UNREF_UNSAFE: after is 0
 0(2815) DEBUG:destroy_avp_list: destroying list (nil)
 0(2815) receive_msg: cleaning up
 0(2815) SIP Reply  (status):
 0(2815)  version: <SIP/2.0>
 0(2815)  status:  <200>
 0(2815)  reason:  <OK>
 0(2815) parse_headers: flags=2
 0(2815) DEBUG: add_param: tag=3b3dbe3871bbfa37i0
 0(2815) DEBUG:parse_to:end of header reached, state=29
 0(2815) DBUG:parse_to: display={}, ruri={sip:02061241205 at 210.184.138.8}
 0(2815) DEBUG: get_hdr_field: <To> [56]; uri=[sip:02061241205 at 210.184.138.8] 
 0(2815) DEBUG: to body [<sip:02061241205 at 210.184.138.8>]
 0(2815) get_hdr_field: cseq <CSeq>: <1> <INVITE>
 0(2815) Found param type 232, <branch> = <z9hG4bK72b9.90fc56c.0>; state=16
 0(2815) end of header reached, state=5
 0(2815) parse_headers: Via found, flags=2
 0(2815) parse_headers: this is the first via
 0(2815) After parse_msg...
 0(2815) forward_reply: found module nathelper, passing reply to it
 0(2815) forward_reply: found module tm, passing reply to it
 0(2815) DEBUG: t_check: msg id=74 global id=73 T start=0xffffffff
 0(2815) parse_headers: flags=22
 0(2815) parse_headers: flags=8
 0(2815) DEBUG: t_reply_matching: hash 39719 label 207998729 branch 0
 0(2815) DEBUG:tm:REF_UNSAFE: after is 1
 0(2815) DEBUG: t_reply_matching: reply matched (T=0xb60b0370)!
 0(2815) DEBUG: t_check: msg id=74 global id=74 T end=0xb60b0370
 0(2815) DEBUG:tm:reply_received: org. status uas=180, uac[0]=180 local=0 is_invite=1)
 0(2815) parse_headers: flags=ffffffffffffffff
 0(2815) Found param type 234, <received> = <61.144.140.110>; state=6
 0(2815) Found param type 232, <branch> = <z9hG4bK-d87543-443309010-1--d87543->; state=6
 0(2815) Found param type 235, <rport> = <42075>; state=16
 0(2815) end of header reached, state=5
 0(2815) parse_headers: Via found, flags=ffffffffffffffff
 0(2815) parse_headers: this is the second via
 0(2815) DEBUG: get_hdr_body : content_length=238
 0(2815) found end of header
 0(2815) DEBUG:check_content_type: type <application/sdp> found valid
 0(2815) parse_headers: flags=40
 0(2815) DEBUG: add_param: tag=6a33d80f
 0(2815) DEBUG:parse_to:end of header reached, state=29
 0(2815) DBUG:parse_to: display={3068878}, ruri={sip:3068878 at 210.184.138.8}
 0(2815) force_rtp_proxy2: proxy reply: 35132 210.184.138.8

 0(2815) parse_headers: flags=ffffffffffffffff
 0(2815) parse_headers: flags=80
 0(2815) parse_headers: flags=80
 0(2815) DEBUG:tm:t_should_relay_response: T_code=180, new_code=200
 0(2815) DEBUG:tm:relay_reply: branch=0, save=0, relay=0
 0(2815) parse_headers: flags=2000
 0(2815) parse_headers: flags=ffffffffffffffff
 0(2815) clen_builder: content-length: 255 (255)
 0(2815)  old size: 888, new size: 862
 0(2815) build_res_from_sip_res: copied size: orig:888, new: 862, rest: 0 msg=
SIP/2.0 200 OK
To: <sip:02061241205 at 210.184.138.8>;tag=3b3dbe3871bbfa37i0
From: 3068878<sip:3068878 at 210.184.138.8>;tag=6a33d80f
Call-ID: c47ef44f950e7a56
CSeq: 1 INVITE
Via: SIP/2.0/UDP 192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075
Record-Route: <sip:210.184.138.8:5066;lr=on;ftag=6a33d80f>
Contact: 862061241205 <sip:862061241205 at 219.136.10.86:64189>
Server: Sipura/SPA2000-2.0.13(g)
Content-Length: 255
Allow: ACK, BYE, CANCEL, INFO, INVITE, NOTIFY, OPTIONS, REFER
Supported: x-sipura
Content-Type: application/sdp
P-hint: Reply-Proxied

v=0
o=- 12432 12432 IN IP4 192.168.10.244
s=-
c=IN IP4 210.184.138.8
t=0 0
m=audio 35132 RTP/AVP 18 100 101
a=rtpmap:18 G729a/8000
a=rtpmap:100 NSE/8000
a=rtpmap:101 telephone-event/8000
a=fmtp:101 0-15
a=ptime:30
a=sendrecv
a=nortpproxy:yes

 0(2815) DEBUG: add_to_tail_of_timer[2]: 0xb60b03b8
 0(2815) DEBUG:tm:relay_reply: sent buf=0x81633c8: SIP/2.0 2..., shmem=0xb60b2060: SIP/2.0 2
 0(2815) DEBUG: cleanup_uac_timers: RETR/FR timers reset
 0(2815) DEBUG:tm:UNREF_UNSAFE: after is 0
 0(2815) DEBUG:destroy_avp_list: destroying list (nil)
 0(2815) receive_msg: cleaning up
 0(2815) SIP Request:
 0(2815)  method:  <ACK>
 0(2815)  uri:     <sip:862061241205 at 219.136.10.86:64189>
 0(2815)  version: <SIP/2.0>
 0(2815) parse_headers: flags=2
 0(2815) DEBUG: add_param: tag=3b3dbe3871bbfa37i0
 0(2815) DEBUG:parse_to:end of header reached, state=29
 0(2815) DBUG:parse_to: display={}, ruri={sip:02061241205 at 210.184.138.8}
 0(2815) DEBUG: get_hdr_field: <To> [56]; uri=[sip:02061241205 at 210.184.138.8] 
 0(2815) DEBUG: to body [<sip:02061241205 at 210.184.138.8>]
 0(2815) Found param type 232, <branch> = <z9hG4bK-d87543-708924014-1--d87543->; state=6
 0(2815) Found param type 235, <rport> = <n/a>; state=17
 0(2815) end of header reached, state=5
 0(2815) parse_headers: Via found, flags=2
 0(2815) parse_headers: this is the first via
 0(2815) After parse_msg...
 0(2815) preparing to run routing scripts...
 0(2815) DEBUG : sl_filter_ACK: to late to be a local ACK!
 0(2815) parse_headers: flags=100
 0(2815) get_hdr_field: cseq <CSeq>: <1> <ACK>
 0(2815) DEBUG:maxfwd:is_maxfwd_present: value = 70 
 0(2815) parse_headers: flags=80
 0(2815) parse_headers: flags=ffffffffffffffff
 0(2815) DEBUG: get_hdr_body : content_length=0
 0(2815) found end of header
 0(2815) parse_headers: flags=200
 0(2815) is_preloaded: No
 0(2815) grep_sock_info - checking if host==us: 13==13 &&  [219.136.10.86] == [210.184.138.8]
 0(2815) grep_sock_info - checking if port 5066 matches port 64189
 0(2815) grep_sock_info - checking if host==us: 13==13 &&  [219.136.10.86] == [210.184.138.8]
 0(2815) grep_sock_info - checking if port 5066 matches port 64189
 0(2815) check_self: host != me
 0(2815) grep_sock_info - checking if host==us: 13==13 &&  [210.184.138.8] == [210.184.138.8]
 0(2815) grep_sock_info - checking if port 5066 matches port 5066
 0(2815) after_loose: Topmost route URI: 'sip:210.184.138.8:5066;lr;ftag=6a33d80f' is me
 0(2815) parse_headers: flags=200
 0(2815) found end of header
 0(2815) find_next_route: No next Route HF found
 0(2815) after_loose: No next URI found
 0(2815) DBG:rr:run_rr_callbacks: callback id 0 entered
 0(2815) DEBUG:uac:restore_from: getting 'vsf' Route param
 0(2815) DEBUG:uac:restore_from: Route param 'vsf' not found
 0(2815) parse_headers: flags=ffffffffffffffff
 0(2815) parse_headers: flags=ffffffffffffffff
 0(2815) ERROR: extract_body: message body has length zero
 0(2815) ERROR: force_rtp_proxy2: can't extract body from the message
 0(2815) DEBUG: t_newtran: msg id=75 , global msg id=74 , T on entrance=0xffffffff
 0(2815) parse_headers: flags=ffffffffffffffff
 0(2815) parse_headers: flags=78
 0(2815) t_lookup_request: start searching: hash=39719, isACK=1
 0(2815) parse_headers: flags=38
 0(2815) DEBUG: add_param: tag=6a33d80f
 0(2815) DEBUG:parse_to:end of header reached, state=29
 0(2815) DBUG:parse_to: display={3068878}, ruri={sip:3068878 at 210.184.138.8}
 0(2815) DEBUG: t_lookup_request: e2e proxy ACK found
 0(2815) DEBUG:tm:REF_UNSAFE: after is 1
 0(2815) DEBUG:tm:t_relay: forwarding ACK
 0(2815) DEBUG:tm:t_relay: it's an end2end ACK
 0(2815) DEBUG:tm:UNREF_UNSAFE: after is 0
 0(2815) DEBUG: mk_proxy: doing DNS lookup...
 0(2815) check_via_address(61.144.140.110, 192.168.1.168, 1)
 0(2815) check_via_address: doing dns lookup
 0(2815) Sending:
ACK sip:862061241205 at 219.136.10.86:64189 SIP/2.0
To: <sip:02061241205 at 210.184.138.8>;tag=3b3dbe3871bbfa37i0
From: 3068878<sip:3068878 at 210.184.138.8>;tag=6a33d80f
Via: SIP/2.0/UDP 210.184.138.8:5066;branch=z9hG4bK72b9.90fc56c.2
Via: SIP/2.0/UDP 192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-708924014-1--d87543-;rport=42075
Call-ID: c47ef44f950e7a56
CSeq: 1 ACK
Contact: <sip:3068878 at 61.144.140.110:42075>
Max-Forwards: 69
User-Agent: eyeBeam release 3004t stamp 16741
Content-Length: 0
P-hint: Proxied
P-hint: rr-enforced

.
 0(2815) orig. len=470, new_len=556, proto=1
 0(2815) DEBUG:destroy_avp_list: destroying list (nil)
 0(2815) receive_msg: cleaning up
 1(2817) DEBUG: timer routine:1,tl=0xb60b049c next=(nil)
 0(2815) SIP Request:
 0(2815)  method:  <BYE>
 0(2815)  uri:     <sip:862061241205 at 219.136.10.86:64189>
 0(2815)  version: <SIP/2.0>
 0(2815) parse_headers: flags=2
 0(2815) DEBUG: add_param: tag=3b3dbe3871bbfa37i0
 0(2815) DEBUG:parse_to:end of header reached, state=29
 0(2815) DBUG:parse_to: display={}, ruri={sip:02061241205 at 210.184.138.8}
 0(2815) DEBUG: get_hdr_field: <To> [56]; uri=[sip:02061241205 at 210.184.138.8] 
 0(2815) DEBUG: to body [<sip:02061241205 at 210.184.138.8>]
 0(2815) Found param type 232, <branch> = <z9hG4bK-d87543-956249433-1--d87543->; state=6
 0(2815) Found param type 235, <rport> = <n/a>; state=17
 0(2815) end of header reached, state=5
 0(2815) parse_headers: Via found, flags=2







configuration :

        if (nat_uac_test("19")) {

                if (!search("^Record-Route:")) {

                        fix_nated_contact(); # Rewrite contact with source IP of signalling
                        if (method=="REGISTER") {
                                fix_nated_register();
                        } else if (method == "INVITE") {
                                fix_nated_sdp("1"); # Add direction=active to SDP
                        };

                        force_rport(); # Add rport parameter to topmost Via
                        append_hf("P-hint: Proxied\r\n");
                        setflag(10);    # Mark as NATed
                };
        
        };      
                        
        if (loose_route()) {
                append_hf("P-hint: rr-enforced\r\n");
                route(1);
                exit();
        }; 
                

        if (method=="REGISTER") {
                                
                if (src_ip==222.88.222.67 || src_ip==210.184.138.4) {
                        save("location");
                        exit();
                }

                if (!www_authorize("", "subscriber")) {
                        www_challenge("", "0");
                        exit();
                };
                                
                save("location");
                                
                if (isflagset(10)) {    
                        if (!(src_ip==222.88.222.67 || src_ip==210.184.138.4)) {
                                #add_path_received();
                                append_branch("sip:222.88.222.67:80");
                                t_replicate("sip:210.184.138.4:80");
                        }
                } else {
                        if (!(src_ip==222.88.222.67 || src_ip==210.184.138.4)) {
                                #add_path();
                                append_branch("sip:222.88.222.67:80");
                                t_replicate("sip:210.184.138.4:80");
                        }   
                }               
                        
                return;

        };

route[1]                                
{                                       

        # if client or server know to be behind a NAT, enable relay
        if (isflagset(10)) {
                force_rtp_proxy();
        };              
                        
        # NAT processing of replies; apply to all transactions (for example,
        # re-INVITEs from public to private UA are hard to identify as
        # NATed at the moment of request processing); look at replies
                        
        t_on_reply("1");
                        
        t_on_failure("1");

        # send it out now; use stateful forwarding as it works reliably
        # even for UDP2TCP
        if (!t_relay()) {
                sl_reply_error();
                return;         
        };                              
}       






More information about the Devel mailing list