[OpenSER-Users-ES] Problemas Forward de llamadas de openser a Asterisk
andresdb at adinet.com.uy
andresdb at adinet.com.uy
Tue Jan 15 17:27:15 CET 2008
Va la captura,
Jan 15 14:29:24 [32215] DBG:core:parse_headers: flags=ffffffffffffffff
Jan 15 14:29:24 [32215] DBG:tm:t_newtran: transaction on
entrance=0xffffffff
Jan 15 14:29:24 [32215] DBG:core:parse_headers: flags=ffffffffffffffff
Jan 15 14:29:24 [32215] DBG:core:parse_headers: flags=78
Jan 15 14:29:24 [32215] DBG:tm:t_lookup_request: start searching:
hash=45439, isACK=0
Jan 15 14:29:24 [32215] DBG:tm:matching_3261: RFC3261 transaction
matching failed
Jan 15 14:29:24 [32215] DBG:tm:t_lookup_request: no transaction found
Jan 15 14:29:24 [32215] DBG:core:mk_proxy: doing DNS lookup...
Jan 15 14:29:24 [32215] DBG:core:check_via_address: params 190.132.174.
xxx, 190.132.174.xxx, 0
Jan 15 14:29:24 [32215] DBG:tm:set_timer: relative timeout is 500000
Jan 15 14:29:24 [32215] DBG:tm:insert_timer_unsafe: [4]: 0xb614313c
(98200000)
Jan 15 14:29:24 [32215] DBG:tm:set_timer: relative timeout is 30
Jan 15 14:29:24 [32215] DBG:tm:insert_timer_unsafe: [0]: 0xb6143158
(127)
Jan 15 14:29:24 [32215] DBG:tm:t_relay_to: new transaction fwd'ed
Jan 15 14:29:24 [32215] DBG:tm:t_unref: UNREF_UNSAFE: after is 0
Jan 15 14:29:24 [32215] DBG:core:destroy_avp_list: destroying list
(nil)
Jan 15 14:29:24 [32215] DBG:core:receive_msg: cleaning up
Jan 15 14:29:24 [32218] DBG:core:parse_msg: SIP Reply (status):
Jan 15 14:29:24 [32218] DBG:core:parse_msg: version: <SIP/2.0>
Jan 15 14:29:24 [32218] DBG:core:parse_msg: status: <489>
Jan 15 14:29:24 [32218] DBG:core:parse_msg: reason: <Event Package
Not Supported>
Jan 15 14:29:24 [32218] DBG:core:parse_headers: flags=2
Jan 15 14:29:24 [32218] DBG:core:parse_via_param: found param type
232, <branch> = <z9hG4bKf71b.f1369954.0>; state=16
Jan 15 14:29:24 [32218] DBG:core:parse_via: end of header reached,
state=5
Jan 15 14:29:24 [32218] DBG:core:parse_headers: via found, flags=2
Jan 15 14:29:24 [32218] DBG:core:parse_headers: this is the first via
Jan 15 14:29:24 [32218] DBG:core:receive_msg: After parse_msg...
Jan 15 14:29:24 [32218] DBG:core:forward_reply: found module tm,
passing reply to it
Jan 15 14:29:24 [32218] DBG:tm:t_check: start=0xffffffff
Jan 15 14:29:24 [32218] DBG:core:parse_headers: flags=22
Jan 15 14:29:24 [32218] DBG:core:parse_via_param: found param type
232, <branch> = <z9hG4bK-d87543-8d7344018518fb1b-1--d87543->; state=6
Jan 15 14:29:24 [32218] DBG:core:parse_via_param: found param type
235, <rport> = <64438>; state=16
Jan 15 14:29:24 [32218] DBG:core:parse_via: end of header reached,
state=5
Jan 15 14:29:24 [32218] DBG:core:parse_headers: via found, flags=22
Jan 15 14:29:24 [32218] DBG:core:parse_headers: parse_headers: this is
the second via
Jan 15 14:29:24 [32218] DBG:core:parse_to_param: tag=d81f7914
Jan 15 14:29:24 [32218] DBG:core:parse_to: end of header reached,
state=29
Jan 15 14:29:24 [32218] DBG:core:parse_to: display={"pruebas ser desde
adsl"}, ruri={sip:100%40netgate.com at 200.40.xxx.xxx}
Jan 15 14:29:24 [32218] DBG:core:get_hdr_field: <To> [77]; uri=[sip:
100%40netgate.com at 200.40.xxx.xxx]
Jan 15 14:29:24 [32218] DBG:core:get_hdr_field: to body ["pruebas ser
desde adsl"<sip:100%40netgate.com at 200.40.xxx.xxx>]
Jan 15 14:29:24 [32218] DBG:core:get_hdr_field: cseq <CSeq>: <1>
<SUBSCRIBE>
Jan 15 14:29:24 [32218] DBG:tm:t_reply_matching: hash 45439 label
1167680287 branch 0
Jan 15 14:29:24 [32218] DBG:tm:t_reply_matching: REF_UNSAFE: after is
1
Jan 15 14:29:24 [32218] DBG:tm:t_reply_matching: reply matched
(T=0xb6142ff0)!
Jan 15 14:29:24 [32218] DBG:tm:t_check: end=0xb6142ff0
Jan 15 14:29:24 [32218] DBG:tm:reply_received: org. status uas=0, uac
[0]=0 local=0 is_invite=0)
Jan 15 14:29:24 [32218] DBG:tm:t_should_relay_response: T_code=0,
new_code=489
Jan 15 14:29:24 [32218] DBG:tm:t_pick_branch: picked branch 0, code
489
Jan 15 14:29:24 [32218] DBG:tm:is_3263_failure: dns-failover test:
branch=0, last_recv=489, flags=2
Jan 15 14:29:24 [32218] DBG:tm:relay_reply: branch=0, save=0, relay=0
Jan 15 14:29:24 [32218] DBG:core:build_res_buf_from_sip_res: old
size: 527, new size: 464
Jan 15 14:29:24 [32218] DBG:core:build_res_buf_from_sip_res: copied
size: orig:104, new: 41, rest: 423 msg=
SIP/2.0 489 Event Package Not Supported
Via: SIP/2.0/UDP 190.132.174.235:64438;branch=z9hG4bK-d87543-
8d7344018518fb1b-1--d87543-;rport=64438
To: "pruebas ser desde adsl"<sip:100%40netgate.com at 200.40.xxx.xxx>;
tag=d81f7914
From: "pruebas ser desde adsl"<sip:100%40netgate.com at 200.40.xxx.xxx>;
tag=3363de79
Call-ID: ac388b1869603b1bNDdmMWE3Mjk4MTgxZGY3N2I1ODJhNTQwZTE2OWJkMTU.
CSeq: 1 SUBSCRIBE
User-Agent: X-Lite release 1003l stamp 30942
Content-Length: 0
Jan 15 14:29:24 [32218] DBG:core:_shm_resize: resize(0) called
Jan 15 14:29:24 [32218] DBG:tm:insert_timer_unsafe: [2]: 0xb6143038
(102)
Jan 15 14:29:24 [32218] DBG:tm:relay_reply: sent buf=0x8185340: SIP/2.
0 4..., shmem=0xb6144f18: SIP/2.0 4
Jan 15 14:29:24 [32218] DBG:tm:cleanup_uac_timers: RETR/FR timers
reset
Jan 15 14:29:24 [32218] DBG:tm:t_unref: UNREF_UNSAFE: after is 0
Jan 15 14:29:24 [32218] DBG:core:destroy_avp_list: destroying list
(nil)
Jan 15 14:29:24 [32218] DBG:core:receive_msg: cleaning up
Jan 15 14:29:25 [32219] DBG:tm:utimer_routine: timer routine:4,
tl=0xb614313c next=(nil), timeout=98200000
Jan 15 14:29:28 [32219] DBG:tm:timer_routine: timer routine:2,
tl=0xb6143038 next=(nil), timeout=102
Jan 15 14:29:28 [32219] DBG:tm:wait_handler: removing 0xb6142ff0 from
table
Jan 15 14:29:28 [32219] DBG:tm:delete_cell: delete transaction
0xb6142ff0
Jan 15 14:29:28 [32219] DBG:tm:wait_handler: done
Jan 15 14:29:41 [32216] DBG:core:parse_msg: SIP Request:
Jan 15 14:29:41 [32216] DBG:core:parse_msg: method: <INVITE>
Jan 15 14:29:41 [32216] DBG:core:parse_msg: uri: <sip:751 at 200.40.
xxx.xxx>
Jan 15 14:29:41 [32216] DBG:core:parse_msg: version: <SIP/2.0>
Jan 15 14:29:41 [32216] DBG:core:parse_headers: flags=2
Jan 15 14:29:41 [32216] DBG:core:parse_via_param: found param type
232, <branch> = <z9hG4bK-d87543-40390549c060936b-1--d87543->; state=6
Jan 15 14:29:41 [32216] DBG:core:parse_via_param: found param type
235, <rport> = <n/a>; state=17
Jan 15 14:29:41 [32216] DBG:core:parse_via: end of header reached,
state=5
Jan 15 14:29:41 [32216] DBG:core:parse_headers: via found, flags=2
Jan 15 14:29:41 [32216] DBG:core:parse_headers: this is the first via
Jan 15 14:29:41 [32216] DBG:core:receive_msg: After parse_msg...
Jan 15 14:29:41 [32216] DBG:core:receive_msg: preparing to run routing
scripts...
Jan 15 14:29:41 [32216] DBG:core:parse_headers: flags=100
Jan 15 14:29:41 [32216] DBG:maxfwd:is_maxfwd_present: value = 70
Jan 15 14:29:41 [32216] DBG:core:parse_headers: flags=10
Jan 15 14:29:41 [32216] DBG:core:parse_to: end of header reached,
state=10
Jan 15 14:29:41 [32216] DBG:core:parse_to: display={"751"}, ruri={sip:
751 at 200.40.xxx.xxx}
Jan 15 14:29:41 [32216] DBG:core:get_hdr_field: <To> [31]; uri=[sip:
751 at 200.40.xxx.xxx]
Jan 15 14:29:41 [32216] DBG:core:get_hdr_field: to body ["751"<sip:
751 at 200.40.xxx.xxx>
]
Jan 15 14:29:41 [32216] DBG:core:parse_to_param: tag=747fa53e
Jan 15 14:29:41 [32216] DBG:core:parse_to: end of header reached,
state=29
Jan 15 14:29:41 [32216] DBG:core:parse_to: display={"pruebas ser desde
adsl"}, ruri={sip:100%40netgate.com at 200.40.xxx.xxx}
Jan 15 14:29:41 [32216] DBG:core:parse_headers: flags=200
Jan 15 14:29:41 [32216] DBG:core:get_hdr_field: cseq <CSeq>: <1>
<INVITE>
Jan 15 14:29:41 [32216] DBG:core:get_hdr_field: content_length=438
Jan 15 14:29:41 [32216] DBG:core:get_hdr_field: found end of header
Jan 15 14:29:41 [32216] DBG:rr:find_first_route: No Route headers
found
Jan 15 14:29:41 [32216] DBG:rr:loose_route: There is no Route HF
Jan 15 14:29:41 [32216] DBG:core:grep_sock_info: checking if host==us:
14==13 && [200.40.xxx.xxx] == [192.168.1.200]
Jan 15 14:29:41 [32216] DBG:core:grep_sock_info: checking if port 5060
matches port 5060
Jan 15 14:29:41 [32216] DBG:core:grep_sock_info: checking if host==us:
14==14 && [200.40.xxx.xxx] == [200.40.xxx.xxx]
Jan 15 14:29:41 [32216] DBG:core:grep_sock_info: checking if port 5060
matches port 5060
Jan 15 14:29:41 [32216] DBG:tm:t_newtran: transaction on
entrance=0xffffffff
Jan 15 14:29:41 [32216] DBG:core:parse_headers: flags=ffffffffffffffff
Jan 15 14:29:41 [32216] DBG:core:parse_headers: flags=78
Jan 15 14:29:41 [32216] DBG:tm:t_lookup_request: start searching:
hash=13046, isACK=0
Jan 15 14:29:41 [32216] DBG:tm:matching_3261: RFC3261 transaction
matching failed
Jan 15 14:29:41 [32216] DBG:tm:t_lookup_request: no transaction found
Jan 15 14:29:41 [32216] DBG:core:parse_headers: flags=ffffffffffffffff
Jan 15 14:29:41 [32216] DBG:core:check_via_address: params 190.132.174.
xxx, 190.132.174.xxx, 0
Jan 15 14:29:41 [32216] DBG:core:_shm_resize: resize(0) called
Jan 15 14:29:41 [32216] DBG:tm:_reply_light: reply sent out.
buf=0x8185858: SIP/2.0 1..., shmem=0xb6144bc8: SIP/2.0 1
Jan 15 14:29:41 [32216] DBG:tm:_reply_light: finished
Jan 15 14:29:41 [32216] DBG:core:mk_proxy: doing DNS lookup...
Jan 15 14:29:41 [32216] DBG:core:check_via_address: params 190.132.174.
xxx, 190.132.174.xxx, 0
Jan 15 14:29:41 [32216] DBG:tm:set_timer: relative timeout is 500000
Jan 15 14:29:41 [32216] DBG:tm:insert_timer_unsafe: [4]: 0xb614313c
(115600000)
Jan 15 14:29:41 [32216] DBG:tm:set_timer: relative timeout is 30
Jan 15 14:29:41 [32216] DBG:tm:insert_timer_unsafe: [0]: 0xb6143158
(145)
Jan 15 14:29:41 [32216] DBG:tm:t_relay_to: new transaction fwd'ed
Jan 15 14:29:41 [32216] DBG:tm:t_unref: UNREF_UNSAFE: after is 0
Jan 15 14:29:41 [32216] DBG:core:destroy_avp_list: destroying list
(nil)
Jan 15 14:29:41 [32216] DBG:core:receive_msg: cleaning up
Jan 15 14:29:42 [32219] DBG:tm:utimer_routine: timer routine:4,
tl=0xb614313c next=(nil), timeout=115600000
Jan 15 14:29:42 [32219] DBG:tm:retransmission_handler:
retransmission_handler : request resending (t=0xb6142ff0, INVITE si ...
)
Jan 15 14:29:42 [32219] DBG:tm:set_timer: relative timeout is 1000000
Jan 15 14:29:42 [32219] DBG:tm:insert_timer_unsafe: [5]: 0xb614313c
(116600000)
Jan 15 14:29:42 [32219] DBG:tm:retransmission_handler:
retransmission_handler : done
Jan 15 14:29:43 [32219] DBG:tm:utimer_routine: timer routine:5,
tl=0xb614313c next=(nil), timeout=116600000
Jan 15 14:29:43 [32219] DBG:tm:retransmission_handler:
retransmission_handler : request resending (t=0xb6142ff0, INVITE si ...
)
Jan 15 14:29:43 [32219] DBG:tm:set_timer: relative timeout is 2000000
Jan 15 14:29:43 [32219] DBG:tm:insert_timer_unsafe: [6]: 0xb614313c
(118600000)
Jan 15 14:29:43 [32219] DBG:tm:retransmission_handler:
retransmission_handler : done
Jan 15 14:29:45 [32219] DBG:tm:utimer_routine: timer routine:6,
tl=0xb614313c next=(nil), timeout=118600000
Jan 15 14:29:45 [32219] DBG:tm:retransmission_handler:
retransmission_handler : request resending (t=0xb6142ff0, INVITE si ...
)
Jan 15 14:29:45 [32219] DBG:tm:set_timer: relative timeout is 4000000
Jan 15 14:29:45 [32219] DBG:tm:insert_timer_unsafe: [7]: 0xb614313c
(122600000)
Jan 15 14:29:45 [32219] DBG:tm:retransmission_handler:
retransmission_handler : done
Jan 15 14:29:46 [32219] DBG:dbtext:dbt_db_get_table: cache or mtime
succeeded
Jan 15 14:29:46 [32219] DBG:dbtext:dbt_insert: done!
Jan 15 14:29:49 [32219] DBG:tm:utimer_routine: timer routine:7,
tl=0xb614313c next=(nil), timeout=122600000
Jan 15 14:29:49 [32219] DBG:tm:retransmission_handler:
retransmission_handler : request resending (t=0xb6142ff0, INVITE si ...
)
Jan 15 14:29:49 [32219] DBG:tm:set_timer: relative timeout is 4000000
Jan 15 14:29:49 [32219] DBG:tm:insert_timer_unsafe: [7]: 0xb614313c
(126600000)
Jan 15 14:29:49 [32219] DBG:tm:retransmission_handler:
retransmission_handler : done
Jan 15 14:29:53 [32219] DBG:tm:utimer_routine: timer routine:7,
tl=0xb614313c next=(nil), timeout=126600000
Jan 15 14:29:53 [32219] DBG:tm:retransmission_handler:
retransmission_handler : request resending (t=0xb6142ff0, INVITE si ...
)
Jan 15 14:29:53 [32219] DBG:tm:set_timer: relative timeout is 4000000
Jan 15 14:29:53 [32219] DBG:tm:insert_timer_unsafe: [7]: 0xb614313c
(130600000)
Jan 15 14:29:53 [32219] DBG:tm:retransmission_handler:
retransmission_handler : done
Jan 15 14:29:54 [32215] DBG:core:udp_rcv_loop: probing packet received
from 190.132.174.xxx 46843
Jan 15 14:29:57 [32219] DBG:tm:utimer_routine: timer routine:7,
tl=0xb614313c next=(nil), timeout=130600000
Jan 15 14:29:57 [32219] DBG:tm:retransmission_handler:
retransmission_handler : request resending (t=0xb6142ff0, INVITE si ...
)
Jan 15 14:29:57 [32219] DBG:tm:set_timer: relative timeout is 4000000
Jan 15 14:29:57 [32219] DBG:tm:insert_timer_unsafe: [7]: 0xb614313c
(134600000)
Jan 15 14:29:57 [32219] DBG:tm:retransmission_handler:
retransmission_handler : done
Jan 15 14:30:01 [32219] DBG:tm:utimer_routine: timer routine:7,
tl=0xb614313c next=(nil), timeout=134600000
Jan 15 14:30:01 [32219] DBG:tm:retransmission_handler:
retransmission_handler : request resending (t=0xb6142ff0, INVITE si ...
)
Jan 15 14:30:01 [32219] DBG:tm:set_timer: relative timeout is 4000000
Jan 15 14:30:01 [32219] DBG:tm:insert_timer_unsafe: [7]: 0xb614313c
(138600000)
Jan 15 14:30:01 [32219] DBG:tm:retransmission_handler:
retransmission_handler : done
Jan 15 14:30:05 [32219] DBG:tm:utimer_routine: timer routine:7,
tl=0xb614313c next=(nil), timeout=138600000
Jan 15 14:30:05 [32219] DBG:tm:retransmission_handler:
retransmission_handler : request resending (t=0xb6142ff0, INVITE si ...
)
Jan 15 14:30:05 [32219] DBG:tm:set_timer: relative timeout is 4000000
Jan 15 14:30:05 [32219] DBG:tm:insert_timer_unsafe: [7]: 0xb614313c
(142600000)
Jan 15 14:30:05 [32219] DBG:tm:retransmission_handler:
retransmission_handler : done
Jan 15 14:30:09 [32219] DBG:tm:utimer_routine: timer routine:7,
tl=0xb614313c next=(nil), timeout=142600000
Jan 15 14:30:09 [32219] DBG:tm:retransmission_handler:
retransmission_handler : request resending (t=0xb6142ff0, INVITE si ...
)
Jan 15 14:30:09 [32219] DBG:tm:set_timer: relative timeout is 4000000
Jan 15 14:30:09 [32219] DBG:tm:insert_timer_unsafe: [7]: 0xb614313c
(146600000)
Jan 15 14:30:09 [32219] DBG:tm:retransmission_handler:
retransmission_handler : done
Jan 15 14:30:11 [32219] DBG:tm:timer_routine: timer routine:0,
tl=0xb6143158 next=(nil), timeout=145
Jan 15 14:30:11 [32219] DBG:tm:final_response_handler: stop retr. and
send CANCEL (0xb6142ff0)
Jan 15 14:30:11 [32219] DBG:tm:t_should_relay_response: T_code=100,
new_code=408
Jan 15 14:30:11 [32219] DBG:tm:t_pick_branch: picked branch 0, code
408
Jan 15 14:30:11 [32219] DBG:tm:is_3263_failure: dns-failover test:
branch=0, last_recv=408, flags=1
Jan 15 14:30:11 [32219] DBG:tm:t_should_relay_response: trying DNS-
based failover
Jan 15 14:30:11 [32219] DBG:tm:relay_reply: branch=0, save=0, relay=0
Jan 15 14:30:11 [32219] DBG:core:parse_headers: flags=ffffffffffffffff
Jan 15 14:30:11 [32219] DBG:core:check_via_address: params 190.132.174.
xxx, 190.132.174.xxx, 0
Jan 15 14:30:11 [32219] DBG:tm:set_timer: relative timeout is 500000
Jan 15 14:30:11 [32219] DBG:tm:insert_timer_unsafe: [4]: 0xb61430b8
(145500000)
Jan 15 14:30:11 [32219] DBG:tm:set_timer: relative timeout is 30
Jan 15 14:30:11 [32219] DBG:tm:insert_timer_unsafe: [0]: 0xb61430d4
(175)
Jan 15 14:30:11 [32219] DBG:tm:relay_reply: sent buf=0x81801f0: SIP/2.
0 4..., shmem=0xb6144bc8: SIP/2.0 4
Jan 15 14:30:11 [32219] DBG:tm:final_response_handler: done
Jan 15 14:30:12 [32219] DBG:tm:utimer_routine: timer routine:4,
tl=0xb61430b8 next=(nil), timeout=145500000
Jan 15 14:30:12 [32219] DBG:tm:retransmission_handler:
retransmission_handler : reply resending (t=0xb6142ff0, SIP/2.0 4 ... )
Jan 15 14:30:12 [32219] DBG:tm:t_retransmit_reply: buf=0x3c4860: SIP/2.
0 4..., shmem=0xb6144bc8: SIP/2.0 4
Jan 15 14:30:12 [32219] DBG:tm:set_timer: relative timeout is 1000000
Jan 15 14:30:12 [32219] DBG:tm:insert_timer_unsafe: [5]: 0xb61430b8
(146500000)
Jan 15 14:30:12 [32219] DBG:tm:retransmission_handler:
retransmission_handler : done
Jan 15 14:30:12 [32217] DBG:core:parse_msg: SIP Request:
Jan 15 14:30:12 [32217] DBG:core:parse_msg: method: <ACK>
Jan 15 14:30:12 [32217] DBG:core:parse_msg: uri: <sip:751 at 200.40.
xxx.xxx>
Jan 15 14:30:12 [32217] DBG:core:parse_msg: version: <SIP/2.0>
Jan 15 14:30:12 [32217] DBG:core:parse_headers: flags=2
Jan 15 14:30:12 [32217] DBG:core:parse_via_param: found param type
232, <branch> = <z9hG4bK-d87543-40390549c060936b-1--d87543->; state=6
Jan 15 14:30:12 [32217] DBG:core:parse_via_param: found param type
235, <rport> = <n/a>; state=17
Jan 15 14:30:12 [32217] DBG:core:parse_via: end of header reached,
state=5
Jan 15 14:30:12 [32217] DBG:core:parse_headers: via found, flags=2
Jan 15 14:30:12 [32217] DBG:core:parse_headers: this is the first via
Jan 15 14:30:12 [32217] DBG:core:receive_msg: After parse_msg...
Jan 15 14:30:12 [32217] DBG:core:receive_msg: preparing to run routing
scripts...
Jan 15 14:30:12 [32217] DBG:sl:sl_filter_ACK: to late to be a local
ACK!
Jan 15 14:30:12 [32217] DBG:core:parse_headers: flags=100
Jan 15 14:30:12 [32217] DBG:core:parse_to_param:
tag=a675395d39bf06a14f949f34d60ba9bb-be39
Jan 15 14:30:12 [32217] DBG:core:parse_to: end of header reached,
state=29
Jan 15 14:30:12 [32217] DBG:core:parse_to: display={"751"}, ruri={sip:
751 at 200.40.xxx.xxx}
Jan 15 14:30:12 [32217] DBG:core:get_hdr_field: <To> [73]; uri=[sip:
751 at 200.40.xxx.xxx]
Jan 15 14:30:12 [32217] DBG:core:get_hdr_field: to body ["751"<sip:
751 at 200.40.xxx.xxx>]
Jan 15 14:30:12 [32217] DBG:core:get_hdr_field: cseq <CSeq>: <1> <ACK>
Jan 15 14:30:12 [32217] DBG:core:get_hdr_field: content_length=0
Jan 15 14:30:12 [32217] DBG:core:get_hdr_field: found end of header
Jan 15 14:30:12 [32217] DBG:maxfwd:is_maxfwd_present: max_forwards
header not found!
Jan 15 14:30:12 [32217] DBG:core:parse_to_param: tag=747fa53e
Jan 15 14:30:12 [32217] DBG:core:parse_to: end of header reached,
state=29
Jan 15 14:30:12 [32217] DBG:core:parse_to: display={"pruebas ser desde
adsl"}, ruri={sip:100%40netgate.com at 200.40.xxx.xxx}
Jan 15 14:30:12 [32217] DBG:core:parse_headers: flags=200
Jan 15 14:30:12 [32217] DBG:rr:find_first_route: No Route headers
found
Jan 15 14:30:12 [32217] DBG:rr:loose_route: There is no Route HF
Jan 15 14:30:12 [32217] DBG:core:grep_sock_info: checking if host==us:
14==13 && [200.40.xxx.xxx] == [192.168.1.200]
Jan 15 14:30:12 [32217] DBG:core:grep_sock_info: checking if port 5060
matches port 5060
Jan 15 14:30:12 [32217] DBG:core:grep_sock_info: checking if host==us:
14==14 && [200.40.xxx.xxx] == [200.40.xxx.xxx]
Jan 15 14:30:12 [32217] DBG:core:grep_sock_info: checking if port 5060
matches port 5060
Jan 15 14:30:12 [32217] DBG:core:grep_sock_info: checking if host==us:
14==13 && [200.40.xxx.xxx] == [192.168.1.200]
Jan 15 14:30:12 [32217] DBG:core:grep_sock_info: checking if port 5060
matches port 5060
Jan 15 14:30:12 [32217] DBG:core:grep_sock_info: checking if host==us:
14==14 && [200.40.xxx.xxx] == [200.40.xxx.xxx]
Jan 15 14:30:12 [32217] DBG:core:grep_sock_info: checking if port 5060
matches port 5060
Jan 15 14:30:12 [32217] DBG:registrar:lookup: '751' Not found in
usrloc
Jan 15 14:30:12 [32217] DBG:core:grep_sock_info: checking if host==us:
14==13 && [200.40.xxx.xxx] == [192.168.1.200]
Jan 15 14:30:12 [32217] DBG:core:grep_sock_info: checking if port 5060
matches port 5060
Jan 15 14:30:12 [32217] DBG:core:grep_sock_info: checking if host==us:
14==14 && [200.40.xxx.xxx] == [200.40.xxx.xxx]
Jan 15 14:30:12 [32217] DBG:core:grep_sock_info: checking if port 5060
matches port 5060
Jan 15 14:30:12 [32217] DBG:registrar:lookup: '751' Not found in
usrloc
Jan 15 14:30:12 [32217] DBG:core:destroy_avp_list: destroying list
(nil)
Jan 15 14:30:12 [32217] DBG:core:receive_msg: cleaning up
Jan 15 14:30:12 [32215] DBG:core:parse_msg: SIP Request:
Jan 15 14:30:12 [32215] DBG:core:parse_msg: method: <ACK>
Jan 15 14:30:12 [32215] DBG:core:parse_msg: uri: <sip:751 at 200.40.
xxx.xxx>
Jan 15 14:30:12 [32215] DBG:core:parse_msg: version: <SIP/2.0>
Jan 15 14:30:12 [32215] DBG:core:parse_headers: flags=2
Jan 15 14:30:12 [32215] DBG:core:parse_via_param: found param type
232, <branch> = <z9hG4bK-d87543-40390549c060936b-1--d87543->; state=6
Jan 15 14:30:12 [32215] DBG:core:parse_via_param: found param type
235, <rport> = <n/a>; state=17
Jan 15 14:30:12 [32215] DBG:core:parse_via: end of header reached,
state=5
Jan 15 14:30:12 [32215] DBG:core:parse_headers: via found, flags=2
Jan 15 14:30:12 [32215] DBG:core:parse_headers: this is the first via
Jan 15 14:30:12 [32215] DBG:core:receive_msg: After parse_msg...
Jan 15 14:30:12 [32215] DBG:core:receive_msg: preparing to run routing
scripts...
Jan 15 14:30:12 [32215] DBG:sl:sl_filter_ACK: to late to be a local
ACK!
Jan 15 14:30:12 [32215] DBG:core:parse_headers: flags=100
>----Mensaje original----
>De: ggb at tid.es
>Fecha: 06/12/2007 11:03
>Para: "Lista de usuarios de OpenSER"<users-es at lists.openser.org>
>Asunto: Re: [OpenSER-Users-ES] Problemas Forward de llamadas de
openser a Asterisk
>
>Puedes mandar una captura del wireshark en tu SER a ver que pasa con
el
>INVITE cuando lo mandas desde Internet?
>
>G.
>
>On Tue, 2008-01-15 at 05:49 -0800, Andresdb wrote:
>> Estimado amigos,
>>
>> Tengo el siguiente inconveniente y la situación es la siguiente:
>> INTERNET----<ippublica SER x.x.x.x:5060>----ServerSER----<iplan SER
>> 192.168.1.200:5060>--LAN--<iplan Asterisk 192.168.1.201:5060>
>> Lo que queremos hacer es utilizar SER como un proxy para no exponer
asterisk
>> a una ip publica.
>> Si me registro contra el openser con la ip de lan el forward de las
llamadas
>> al Asterisk se hace correctamente, pero si intento registrarme
contra la ip
>> publica me registro al ser pero no puedo hacer llamadas, el forward
a la ip
>> de astrerisk no se hace, te detallo la configuración del cfg de
ser, les
>> agradezco mucho en lo que me puedan ayudar.
>>
>> openser.cfg
>> # ----------- global configuration parameters
------------------------
>>
>> debug=7 # debug level (cmd line: -dddddddddd)
>> fork=yes
>> log_stderror=yes # (cmd line: -E)
>>
>> check_via=no # (cmd. line: -v)
>> dns=no # (cmd. line: -r)
>> rev_dns=no # (cmd. line: -R)
>> children=4
>>
>> listen=192.168.1.200
>> listen=200.40.119.215
>> port=5060
>>
>> # ------------------ module loading
----------------------------------
>>
>> # use dbtext database
>> mpath="/usr/local/lib/openser/modules/"
>> loadmodule "dbtext.so"
>> loadmodule "sl.so"
>> loadmodule "tm.so"
>> loadmodule "rr.so"
>> loadmodule "maxfwd.so"
>> loadmodule "usrloc.so"
>> loadmodule "registrar.so"
>> loadmodule "textops.so"
>> loadmodule "mi_fifo.so"
>> #loadmodule "mediaproxy.so"
>> #loadmodule "nathelper.so"
>> #loadmodule "acc.so"
>> #loadmodule "exec.so"
>> #loadmodule "xlog.so"
>>
>> # modules for digest authentication
>> loadmodule "auth.so"
>> loadmodule "auth_db.so"
>>
>> # ----------------- setting module-specific parameters
---------------
>>
>> # -- mi_fifo params --
>>
>> modparam("mi_fifo", "fifo_name", "/tmp/openser_fifo")
>>
>> # -- nathelper
>> #modparam("nathelper", "rtpproxy_disable", 1)
>> #modparam("nathelper", "natping_interval", 30)
>> #modparam("nathelper", "sipping_from", "sip:ping at 192.168.0.7")
>>
>> # -- usrloc params --
>>
>> # use dbtext database for persistent storage
>> modparam("usrloc", "db_mode", 2)
>> modparam("usrloc|auth_db", "db_url",
>> "dbtext:///usr/local/etc/openser/dbtext")
>>
>> # -- auth params --
>> #
>> modparam("auth_db", "calculate_ha1", 1)
>> modparam("auth_db", "password_column", "password")
>> modparam("auth_db", "user_column", "username")
>> modparam("auth_db", "domain_column", "domain")
>>
>> # -- rr params --
>> # add value to ;lr param to make some broken UAs happy
>> modparam("rr", "enable_full_lr", 1)
>>
>> # ------------------------- request routing logic
-------------------
>>
>> # main routing logic
>>
>> route{
>> # initial sanity checks -- messages with
>> # max_forwards==0, or excessively long requests
>> if (!mf_process_maxfwd_header("10")) {
>> sl_send_reply("483","Too Many Hops");
>> exit;
>> };
>> if (msg:len >= max_len ) {
>> sl_send_reply("513", "Message too big");
>> exit;
>> };
>>
>> # we record-route all messages -- to make sure that
>> # subsequent messages will go through our proxy; that's
>> # particularly good if upstream and downstream entities
>> # use different transport protocol
>> if (!method=="REGISTER") record_route();
>>
>> # subsequent messages withing a dialog should take the
>> # path determined by record-routing
>> if (loose_route()) {
>> # mark routing logic in request
>> append_hf("P-hint: rr-enforced\r\n");
>> route(1);
>> exit;
>> };
>>
>> if (!uri==myself) {
>> # mark routing logic in request
>> append_hf("P-hint: outbound\r\n");
>> route(1);
>> exit;
>> };
>> if (is_method("INVITE")) {
>> rewritehostport("192.168.1.201:5060");
>> t_relay();
>> exit;
>> }
>> # if the request is for other domain use UsrLoc
>> # (in case, it does not work, use the following command
>> # with proper names and addresses in it)
>> if (uri==myself) {
>> if (method=="REGISTER") {
>> # digest authentication
>> if (!www_authorize("*", "subscriber")) {
>> www_challenge("*", "0");
>> exit;
>> };
>>
>> save("location");
>> exit;
>> };
>>
>> lookup("aliases");
>> if (!uri==myself) {
>> append_hf("P-hint: outbound alias\r\n");
>> route(1);
>> exit;
>> };
>>
>> # native SIP destinations are handled using our USRLOC DB
>> if (!lookup("location")) {
>> sl_send_reply("404", "Not Found");
>> exit;
>> };
>> };
>> append_hf("P-hint: usrloc applied\r\n");
>> route(1);
>> }
>>
>> route[1]
>> {
>> # send it out now; use stateful forwarding as it works reliably
>> # even for UDP2TCP
>> if (!t_relay()) {
>> sl_reply_error();
>> };
>> }
>>
>
>
>
>_______________________________________________
>Users-es mailing list
>Users-es at lists.openser.org
>http://lists.openser.org/cgi-bin/mailman/listinfo/users-es
>
More information about the Users-es
mailing list