[OpenSER-Users-ES] Problemas Forward de llamadas de openser a Asterisk

andresdb at adinet.com.uy andresdb at adinet.com.uy
Tue Jan 15 17:27:15 CET 2008


Va la captura,

Jan 15 14:29:24 [32215] DBG:core:parse_headers: flags=ffffffffffffffff
Jan 15 14:29:24 [32215] DBG:tm:t_newtran: transaction on 
entrance=0xffffffff
Jan 15 14:29:24 [32215] DBG:core:parse_headers: flags=ffffffffffffffff
Jan 15 14:29:24 [32215] DBG:core:parse_headers: flags=78
Jan 15 14:29:24 [32215] DBG:tm:t_lookup_request: start searching: 
hash=45439, isACK=0
Jan 15 14:29:24 [32215] DBG:tm:matching_3261: RFC3261 transaction 
matching failed
Jan 15 14:29:24 [32215] DBG:tm:t_lookup_request: no transaction found
Jan 15 14:29:24 [32215] DBG:core:mk_proxy: doing DNS lookup...
Jan 15 14:29:24 [32215] DBG:core:check_via_address: params 190.132.174.
xxx, 190.132.174.xxx, 0
Jan 15 14:29:24 [32215] DBG:tm:set_timer: relative timeout is 500000
Jan 15 14:29:24 [32215] DBG:tm:insert_timer_unsafe: [4]: 0xb614313c 
(98200000)
Jan 15 14:29:24 [32215] DBG:tm:set_timer: relative timeout is 30
Jan 15 14:29:24 [32215] DBG:tm:insert_timer_unsafe: [0]: 0xb6143158 
(127)
Jan 15 14:29:24 [32215] DBG:tm:t_relay_to: new transaction fwd'ed
Jan 15 14:29:24 [32215] DBG:tm:t_unref: UNREF_UNSAFE: after is 0
Jan 15 14:29:24 [32215] DBG:core:destroy_avp_list: destroying list 
(nil)
Jan 15 14:29:24 [32215] DBG:core:receive_msg: cleaning up
Jan 15 14:29:24 [32218] DBG:core:parse_msg: SIP Reply  (status):
Jan 15 14:29:24 [32218] DBG:core:parse_msg:  version: <SIP/2.0>
Jan 15 14:29:24 [32218] DBG:core:parse_msg:  status:  <489>
Jan 15 14:29:24 [32218] DBG:core:parse_msg:  reason:  <Event Package 
Not Supported>
Jan 15 14:29:24 [32218] DBG:core:parse_headers: flags=2
Jan 15 14:29:24 [32218] DBG:core:parse_via_param: found param type 
232, <branch> = <z9hG4bKf71b.f1369954.0>; state=16
Jan 15 14:29:24 [32218] DBG:core:parse_via: end of header reached, 
state=5
Jan 15 14:29:24 [32218] DBG:core:parse_headers: via found, flags=2
Jan 15 14:29:24 [32218] DBG:core:parse_headers: this is the first via
Jan 15 14:29:24 [32218] DBG:core:receive_msg: After parse_msg...
Jan 15 14:29:24 [32218] DBG:core:forward_reply: found module tm, 
passing reply to it
Jan 15 14:29:24 [32218] DBG:tm:t_check: start=0xffffffff
Jan 15 14:29:24 [32218] DBG:core:parse_headers: flags=22
Jan 15 14:29:24 [32218] DBG:core:parse_via_param: found param type 
232, <branch> = <z9hG4bK-d87543-8d7344018518fb1b-1--d87543->; state=6
Jan 15 14:29:24 [32218] DBG:core:parse_via_param: found param type 
235, <rport> = <64438>; state=16
Jan 15 14:29:24 [32218] DBG:core:parse_via: end of header reached, 
state=5
Jan 15 14:29:24 [32218] DBG:core:parse_headers: via found, flags=22
Jan 15 14:29:24 [32218] DBG:core:parse_headers: parse_headers: this is 
the second via
Jan 15 14:29:24 [32218] DBG:core:parse_to_param: tag=d81f7914
Jan 15 14:29:24 [32218] DBG:core:parse_to: end of header reached, 
state=29
Jan 15 14:29:24 [32218] DBG:core:parse_to: display={"pruebas ser desde 
adsl"}, ruri={sip:100%40netgate.com at 200.40.xxx.xxx}
Jan 15 14:29:24 [32218] DBG:core:get_hdr_field: <To> [77]; uri=[sip:
100%40netgate.com at 200.40.xxx.xxx] 
Jan 15 14:29:24 [32218] DBG:core:get_hdr_field: to body ["pruebas ser 
desde adsl"<sip:100%40netgate.com at 200.40.xxx.xxx>]
Jan 15 14:29:24 [32218] DBG:core:get_hdr_field: cseq <CSeq>: <1> 
<SUBSCRIBE>
Jan 15 14:29:24 [32218] DBG:tm:t_reply_matching: hash 45439 label 
1167680287 branch 0
Jan 15 14:29:24 [32218] DBG:tm:t_reply_matching: REF_UNSAFE: after is 
1
Jan 15 14:29:24 [32218] DBG:tm:t_reply_matching: reply matched 
(T=0xb6142ff0)!
Jan 15 14:29:24 [32218] DBG:tm:t_check: end=0xb6142ff0
Jan 15 14:29:24 [32218] DBG:tm:reply_received: org. status uas=0, uac
[0]=0 local=0 is_invite=0)
Jan 15 14:29:24 [32218] DBG:tm:t_should_relay_response: T_code=0, 
new_code=489
Jan 15 14:29:24 [32218] DBG:tm:t_pick_branch: picked branch 0, code 
489
Jan 15 14:29:24 [32218] DBG:tm:is_3263_failure: dns-failover test: 
branch=0, last_recv=489, flags=2
Jan 15 14:29:24 [32218] DBG:tm:relay_reply: branch=0, save=0, relay=0
Jan 15 14:29:24 [32218] DBG:core:build_res_buf_from_sip_res:  old 
size: 527, new size: 464
Jan 15 14:29:24 [32218] DBG:core:build_res_buf_from_sip_res: copied 
size: orig:104, new: 41, rest: 423 msg=
SIP/2.0 489 Event Package Not Supported
Via: SIP/2.0/UDP 190.132.174.235:64438;branch=z9hG4bK-d87543-
8d7344018518fb1b-1--d87543-;rport=64438
To: "pruebas ser desde adsl"<sip:100%40netgate.com at 200.40.xxx.xxx>;
tag=d81f7914
From: "pruebas ser desde adsl"<sip:100%40netgate.com at 200.40.xxx.xxx>;
tag=3363de79
Call-ID: ac388b1869603b1bNDdmMWE3Mjk4MTgxZGY3N2I1ODJhNTQwZTE2OWJkMTU.
CSeq: 1 SUBSCRIBE
User-Agent: X-Lite release 1003l stamp 30942
Content-Length: 0


Jan 15 14:29:24 [32218] DBG:core:_shm_resize: resize(0) called
Jan 15 14:29:24 [32218] DBG:tm:insert_timer_unsafe: [2]: 0xb6143038 
(102)
Jan 15 14:29:24 [32218] DBG:tm:relay_reply: sent buf=0x8185340: SIP/2.
0 4..., shmem=0xb6144f18: SIP/2.0 4
Jan 15 14:29:24 [32218] DBG:tm:cleanup_uac_timers: RETR/FR timers 
reset
Jan 15 14:29:24 [32218] DBG:tm:t_unref: UNREF_UNSAFE: after is 0
Jan 15 14:29:24 [32218] DBG:core:destroy_avp_list: destroying list 
(nil)
Jan 15 14:29:24 [32218] DBG:core:receive_msg: cleaning up
Jan 15 14:29:25 [32219] DBG:tm:utimer_routine: timer routine:4,
tl=0xb614313c next=(nil), timeout=98200000
Jan 15 14:29:28 [32219] DBG:tm:timer_routine: timer routine:2,
tl=0xb6143038 next=(nil), timeout=102
Jan 15 14:29:28 [32219] DBG:tm:wait_handler: removing 0xb6142ff0 from 
table 
Jan 15 14:29:28 [32219] DBG:tm:delete_cell: delete transaction 
0xb6142ff0
Jan 15 14:29:28 [32219] DBG:tm:wait_handler: done
Jan 15 14:29:41 [32216] DBG:core:parse_msg: SIP Request:
Jan 15 14:29:41 [32216] DBG:core:parse_msg:  method:  <INVITE>
Jan 15 14:29:41 [32216] DBG:core:parse_msg:  uri:     <sip:751 at 200.40.
xxx.xxx>
Jan 15 14:29:41 [32216] DBG:core:parse_msg:  version: <SIP/2.0>
Jan 15 14:29:41 [32216] DBG:core:parse_headers: flags=2
Jan 15 14:29:41 [32216] DBG:core:parse_via_param: found param type 
232, <branch> = <z9hG4bK-d87543-40390549c060936b-1--d87543->; state=6
Jan 15 14:29:41 [32216] DBG:core:parse_via_param: found param type 
235, <rport> = <n/a>; state=17
Jan 15 14:29:41 [32216] DBG:core:parse_via: end of header reached, 
state=5
Jan 15 14:29:41 [32216] DBG:core:parse_headers: via found, flags=2
Jan 15 14:29:41 [32216] DBG:core:parse_headers: this is the first via
Jan 15 14:29:41 [32216] DBG:core:receive_msg: After parse_msg...
Jan 15 14:29:41 [32216] DBG:core:receive_msg: preparing to run routing 
scripts...
Jan 15 14:29:41 [32216] DBG:core:parse_headers: flags=100
Jan 15 14:29:41 [32216] DBG:maxfwd:is_maxfwd_present: value = 70 
Jan 15 14:29:41 [32216] DBG:core:parse_headers: flags=10
Jan 15 14:29:41 [32216] DBG:core:parse_to: end of header reached, 
state=10
Jan 15 14:29:41 [32216] DBG:core:parse_to: display={"751"}, ruri={sip:
751 at 200.40.xxx.xxx}
Jan 15 14:29:41 [32216] DBG:core:get_hdr_field: <To> [31]; uri=[sip:
751 at 200.40.xxx.xxx] 
Jan 15 14:29:41 [32216] DBG:core:get_hdr_field: to body ["751"<sip:
751 at 200.40.xxx.xxx>
]
Jan 15 14:29:41 [32216] DBG:core:parse_to_param: tag=747fa53e
Jan 15 14:29:41 [32216] DBG:core:parse_to: end of header reached, 
state=29
Jan 15 14:29:41 [32216] DBG:core:parse_to: display={"pruebas ser desde 
adsl"}, ruri={sip:100%40netgate.com at 200.40.xxx.xxx}
Jan 15 14:29:41 [32216] DBG:core:parse_headers: flags=200
Jan 15 14:29:41 [32216] DBG:core:get_hdr_field: cseq <CSeq>: <1> 
<INVITE>
Jan 15 14:29:41 [32216] DBG:core:get_hdr_field: content_length=438
Jan 15 14:29:41 [32216] DBG:core:get_hdr_field: found end of header
Jan 15 14:29:41 [32216] DBG:rr:find_first_route: No Route headers 
found
Jan 15 14:29:41 [32216] DBG:rr:loose_route: There is no Route HF
Jan 15 14:29:41 [32216] DBG:core:grep_sock_info: checking if host==us: 
14==13 &&  [200.40.xxx.xxx] == [192.168.1.200]
Jan 15 14:29:41 [32216] DBG:core:grep_sock_info: checking if port 5060 
matches port 5060
Jan 15 14:29:41 [32216] DBG:core:grep_sock_info: checking if host==us: 
14==14 &&  [200.40.xxx.xxx] == [200.40.xxx.xxx]
Jan 15 14:29:41 [32216] DBG:core:grep_sock_info: checking if port 5060 
matches port 5060
Jan 15 14:29:41 [32216] DBG:tm:t_newtran: transaction on 
entrance=0xffffffff
Jan 15 14:29:41 [32216] DBG:core:parse_headers: flags=ffffffffffffffff
Jan 15 14:29:41 [32216] DBG:core:parse_headers: flags=78
Jan 15 14:29:41 [32216] DBG:tm:t_lookup_request: start searching: 
hash=13046, isACK=0
Jan 15 14:29:41 [32216] DBG:tm:matching_3261: RFC3261 transaction 
matching failed
Jan 15 14:29:41 [32216] DBG:tm:t_lookup_request: no transaction found
Jan 15 14:29:41 [32216] DBG:core:parse_headers: flags=ffffffffffffffff
Jan 15 14:29:41 [32216] DBG:core:check_via_address: params 190.132.174.
xxx, 190.132.174.xxx, 0
Jan 15 14:29:41 [32216] DBG:core:_shm_resize: resize(0) called
Jan 15 14:29:41 [32216] DBG:tm:_reply_light: reply sent out. 
buf=0x8185858: SIP/2.0 1..., shmem=0xb6144bc8: SIP/2.0 1
Jan 15 14:29:41 [32216] DBG:tm:_reply_light: finished
Jan 15 14:29:41 [32216] DBG:core:mk_proxy: doing DNS lookup...
Jan 15 14:29:41 [32216] DBG:core:check_via_address: params 190.132.174.
xxx, 190.132.174.xxx, 0
Jan 15 14:29:41 [32216] DBG:tm:set_timer: relative timeout is 500000
Jan 15 14:29:41 [32216] DBG:tm:insert_timer_unsafe: [4]: 0xb614313c 
(115600000)
Jan 15 14:29:41 [32216] DBG:tm:set_timer: relative timeout is 30
Jan 15 14:29:41 [32216] DBG:tm:insert_timer_unsafe: [0]: 0xb6143158 
(145)
Jan 15 14:29:41 [32216] DBG:tm:t_relay_to: new transaction fwd'ed
Jan 15 14:29:41 [32216] DBG:tm:t_unref: UNREF_UNSAFE: after is 0
Jan 15 14:29:41 [32216] DBG:core:destroy_avp_list: destroying list 
(nil)
Jan 15 14:29:41 [32216] DBG:core:receive_msg: cleaning up
Jan 15 14:29:42 [32219] DBG:tm:utimer_routine: timer routine:4,
tl=0xb614313c next=(nil), timeout=115600000
Jan 15 14:29:42 [32219] DBG:tm:retransmission_handler: 
retransmission_handler : request resending (t=0xb6142ff0, INVITE si ... 
)
Jan 15 14:29:42 [32219] DBG:tm:set_timer: relative timeout is 1000000
Jan 15 14:29:42 [32219] DBG:tm:insert_timer_unsafe: [5]: 0xb614313c 
(116600000)
Jan 15 14:29:42 [32219] DBG:tm:retransmission_handler: 
retransmission_handler : done
Jan 15 14:29:43 [32219] DBG:tm:utimer_routine: timer routine:5,
tl=0xb614313c next=(nil), timeout=116600000
Jan 15 14:29:43 [32219] DBG:tm:retransmission_handler: 
retransmission_handler : request resending (t=0xb6142ff0, INVITE si ... 
)
Jan 15 14:29:43 [32219] DBG:tm:set_timer: relative timeout is 2000000
Jan 15 14:29:43 [32219] DBG:tm:insert_timer_unsafe: [6]: 0xb614313c 
(118600000)
Jan 15 14:29:43 [32219] DBG:tm:retransmission_handler: 
retransmission_handler : done
Jan 15 14:29:45 [32219] DBG:tm:utimer_routine: timer routine:6,
tl=0xb614313c next=(nil), timeout=118600000
Jan 15 14:29:45 [32219] DBG:tm:retransmission_handler: 
retransmission_handler : request resending (t=0xb6142ff0, INVITE si ... 
)
Jan 15 14:29:45 [32219] DBG:tm:set_timer: relative timeout is 4000000
Jan 15 14:29:45 [32219] DBG:tm:insert_timer_unsafe: [7]: 0xb614313c 
(122600000)
Jan 15 14:29:45 [32219] DBG:tm:retransmission_handler: 
retransmission_handler : done
Jan 15 14:29:46 [32219] DBG:dbtext:dbt_db_get_table: cache or mtime 
succeeded
Jan 15 14:29:46 [32219] DBG:dbtext:dbt_insert: done!
Jan 15 14:29:49 [32219] DBG:tm:utimer_routine: timer routine:7,
tl=0xb614313c next=(nil), timeout=122600000
Jan 15 14:29:49 [32219] DBG:tm:retransmission_handler: 
retransmission_handler : request resending (t=0xb6142ff0, INVITE si ... 
)
Jan 15 14:29:49 [32219] DBG:tm:set_timer: relative timeout is 4000000
Jan 15 14:29:49 [32219] DBG:tm:insert_timer_unsafe: [7]: 0xb614313c 
(126600000)
Jan 15 14:29:49 [32219] DBG:tm:retransmission_handler: 
retransmission_handler : done
Jan 15 14:29:53 [32219] DBG:tm:utimer_routine: timer routine:7,
tl=0xb614313c next=(nil), timeout=126600000
Jan 15 14:29:53 [32219] DBG:tm:retransmission_handler: 
retransmission_handler : request resending (t=0xb6142ff0, INVITE si ... 
)
Jan 15 14:29:53 [32219] DBG:tm:set_timer: relative timeout is 4000000
Jan 15 14:29:53 [32219] DBG:tm:insert_timer_unsafe: [7]: 0xb614313c 
(130600000)
Jan 15 14:29:53 [32219] DBG:tm:retransmission_handler: 
retransmission_handler : done
Jan 15 14:29:54 [32215] DBG:core:udp_rcv_loop: probing packet received 
from 190.132.174.xxx 46843
Jan 15 14:29:57 [32219] DBG:tm:utimer_routine: timer routine:7,
tl=0xb614313c next=(nil), timeout=130600000
Jan 15 14:29:57 [32219] DBG:tm:retransmission_handler: 
retransmission_handler : request resending (t=0xb6142ff0, INVITE si ... 
)
Jan 15 14:29:57 [32219] DBG:tm:set_timer: relative timeout is 4000000
Jan 15 14:29:57 [32219] DBG:tm:insert_timer_unsafe: [7]: 0xb614313c 
(134600000)
Jan 15 14:29:57 [32219] DBG:tm:retransmission_handler: 
retransmission_handler : done
Jan 15 14:30:01 [32219] DBG:tm:utimer_routine: timer routine:7,
tl=0xb614313c next=(nil), timeout=134600000
Jan 15 14:30:01 [32219] DBG:tm:retransmission_handler: 
retransmission_handler : request resending (t=0xb6142ff0, INVITE si ... 
)
Jan 15 14:30:01 [32219] DBG:tm:set_timer: relative timeout is 4000000
Jan 15 14:30:01 [32219] DBG:tm:insert_timer_unsafe: [7]: 0xb614313c 
(138600000)
Jan 15 14:30:01 [32219] DBG:tm:retransmission_handler: 
retransmission_handler : done
Jan 15 14:30:05 [32219] DBG:tm:utimer_routine: timer routine:7,
tl=0xb614313c next=(nil), timeout=138600000
Jan 15 14:30:05 [32219] DBG:tm:retransmission_handler: 
retransmission_handler : request resending (t=0xb6142ff0, INVITE si ... 
)
Jan 15 14:30:05 [32219] DBG:tm:set_timer: relative timeout is 4000000
Jan 15 14:30:05 [32219] DBG:tm:insert_timer_unsafe: [7]: 0xb614313c 
(142600000)
Jan 15 14:30:05 [32219] DBG:tm:retransmission_handler: 
retransmission_handler : done
Jan 15 14:30:09 [32219] DBG:tm:utimer_routine: timer routine:7,
tl=0xb614313c next=(nil), timeout=142600000
Jan 15 14:30:09 [32219] DBG:tm:retransmission_handler: 
retransmission_handler : request resending (t=0xb6142ff0, INVITE si ... 
)
Jan 15 14:30:09 [32219] DBG:tm:set_timer: relative timeout is 4000000
Jan 15 14:30:09 [32219] DBG:tm:insert_timer_unsafe: [7]: 0xb614313c 
(146600000)
Jan 15 14:30:09 [32219] DBG:tm:retransmission_handler: 
retransmission_handler : done
Jan 15 14:30:11 [32219] DBG:tm:timer_routine: timer routine:0,
tl=0xb6143158 next=(nil), timeout=145
Jan 15 14:30:11 [32219] DBG:tm:final_response_handler: stop retr. and 
send CANCEL (0xb6142ff0)
Jan 15 14:30:11 [32219] DBG:tm:t_should_relay_response: T_code=100, 
new_code=408
Jan 15 14:30:11 [32219] DBG:tm:t_pick_branch: picked branch 0, code 
408
Jan 15 14:30:11 [32219] DBG:tm:is_3263_failure: dns-failover test: 
branch=0, last_recv=408, flags=1
Jan 15 14:30:11 [32219] DBG:tm:t_should_relay_response: trying DNS-
based failover
Jan 15 14:30:11 [32219] DBG:tm:relay_reply: branch=0, save=0, relay=0
Jan 15 14:30:11 [32219] DBG:core:parse_headers: flags=ffffffffffffffff
Jan 15 14:30:11 [32219] DBG:core:check_via_address: params 190.132.174.
xxx, 190.132.174.xxx, 0
Jan 15 14:30:11 [32219] DBG:tm:set_timer: relative timeout is 500000
Jan 15 14:30:11 [32219] DBG:tm:insert_timer_unsafe: [4]: 0xb61430b8 
(145500000)
Jan 15 14:30:11 [32219] DBG:tm:set_timer: relative timeout is 30
Jan 15 14:30:11 [32219] DBG:tm:insert_timer_unsafe: [0]: 0xb61430d4 
(175)
Jan 15 14:30:11 [32219] DBG:tm:relay_reply: sent buf=0x81801f0: SIP/2.
0 4..., shmem=0xb6144bc8: SIP/2.0 4
Jan 15 14:30:11 [32219] DBG:tm:final_response_handler: done
Jan 15 14:30:12 [32219] DBG:tm:utimer_routine: timer routine:4,
tl=0xb61430b8 next=(nil), timeout=145500000
Jan 15 14:30:12 [32219] DBG:tm:retransmission_handler: 
retransmission_handler : reply resending (t=0xb6142ff0, SIP/2.0 4 ... )
Jan 15 14:30:12 [32219] DBG:tm:t_retransmit_reply: buf=0x3c4860: SIP/2.
0 4..., shmem=0xb6144bc8: SIP/2.0 4
Jan 15 14:30:12 [32219] DBG:tm:set_timer: relative timeout is 1000000
Jan 15 14:30:12 [32219] DBG:tm:insert_timer_unsafe: [5]: 0xb61430b8 
(146500000)
Jan 15 14:30:12 [32219] DBG:tm:retransmission_handler: 
retransmission_handler : done
Jan 15 14:30:12 [32217] DBG:core:parse_msg: SIP Request:
Jan 15 14:30:12 [32217] DBG:core:parse_msg:  method:  <ACK>
Jan 15 14:30:12 [32217] DBG:core:parse_msg:  uri:     <sip:751 at 200.40.
xxx.xxx>
Jan 15 14:30:12 [32217] DBG:core:parse_msg:  version: <SIP/2.0>
Jan 15 14:30:12 [32217] DBG:core:parse_headers: flags=2
Jan 15 14:30:12 [32217] DBG:core:parse_via_param: found param type 
232, <branch> = <z9hG4bK-d87543-40390549c060936b-1--d87543->; state=6
Jan 15 14:30:12 [32217] DBG:core:parse_via_param: found param type 
235, <rport> = <n/a>; state=17
Jan 15 14:30:12 [32217] DBG:core:parse_via: end of header reached, 
state=5
Jan 15 14:30:12 [32217] DBG:core:parse_headers: via found, flags=2
Jan 15 14:30:12 [32217] DBG:core:parse_headers: this is the first via
Jan 15 14:30:12 [32217] DBG:core:receive_msg: After parse_msg...
Jan 15 14:30:12 [32217] DBG:core:receive_msg: preparing to run routing 
scripts...
Jan 15 14:30:12 [32217] DBG:sl:sl_filter_ACK: to late to be a local 
ACK!
Jan 15 14:30:12 [32217] DBG:core:parse_headers: flags=100
Jan 15 14:30:12 [32217] DBG:core:parse_to_param: 
tag=a675395d39bf06a14f949f34d60ba9bb-be39
Jan 15 14:30:12 [32217] DBG:core:parse_to: end of header reached, 
state=29
Jan 15 14:30:12 [32217] DBG:core:parse_to: display={"751"}, ruri={sip:
751 at 200.40.xxx.xxx}
Jan 15 14:30:12 [32217] DBG:core:get_hdr_field: <To> [73]; uri=[sip:
751 at 200.40.xxx.xxx] 
Jan 15 14:30:12 [32217] DBG:core:get_hdr_field: to body ["751"<sip:
751 at 200.40.xxx.xxx>]
Jan 15 14:30:12 [32217] DBG:core:get_hdr_field: cseq <CSeq>: <1> <ACK>
Jan 15 14:30:12 [32217] DBG:core:get_hdr_field: content_length=0
Jan 15 14:30:12 [32217] DBG:core:get_hdr_field: found end of header
Jan 15 14:30:12 [32217] DBG:maxfwd:is_maxfwd_present: max_forwards 
header not found!
Jan 15 14:30:12 [32217] DBG:core:parse_to_param: tag=747fa53e
Jan 15 14:30:12 [32217] DBG:core:parse_to: end of header reached, 
state=29
Jan 15 14:30:12 [32217] DBG:core:parse_to: display={"pruebas ser desde 
adsl"}, ruri={sip:100%40netgate.com at 200.40.xxx.xxx}
Jan 15 14:30:12 [32217] DBG:core:parse_headers: flags=200
Jan 15 14:30:12 [32217] DBG:rr:find_first_route: No Route headers 
found
Jan 15 14:30:12 [32217] DBG:rr:loose_route: There is no Route HF
Jan 15 14:30:12 [32217] DBG:core:grep_sock_info: checking if host==us: 
14==13 &&  [200.40.xxx.xxx] == [192.168.1.200]
Jan 15 14:30:12 [32217] DBG:core:grep_sock_info: checking if port 5060 
matches port 5060
Jan 15 14:30:12 [32217] DBG:core:grep_sock_info: checking if host==us: 
14==14 &&  [200.40.xxx.xxx] == [200.40.xxx.xxx]
Jan 15 14:30:12 [32217] DBG:core:grep_sock_info: checking if port 5060 
matches port 5060
Jan 15 14:30:12 [32217] DBG:core:grep_sock_info: checking if host==us: 
14==13 &&  [200.40.xxx.xxx] == [192.168.1.200]
Jan 15 14:30:12 [32217] DBG:core:grep_sock_info: checking if port 5060 
matches port 5060
Jan 15 14:30:12 [32217] DBG:core:grep_sock_info: checking if host==us: 
14==14 &&  [200.40.xxx.xxx] == [200.40.xxx.xxx]
Jan 15 14:30:12 [32217] DBG:core:grep_sock_info: checking if port 5060 
matches port 5060
Jan 15 14:30:12 [32217] DBG:registrar:lookup: '751' Not found in 
usrloc
Jan 15 14:30:12 [32217] DBG:core:grep_sock_info: checking if host==us: 
14==13 &&  [200.40.xxx.xxx] == [192.168.1.200]
Jan 15 14:30:12 [32217] DBG:core:grep_sock_info: checking if port 5060 
matches port 5060
Jan 15 14:30:12 [32217] DBG:core:grep_sock_info: checking if host==us: 
14==14 &&  [200.40.xxx.xxx] == [200.40.xxx.xxx]
Jan 15 14:30:12 [32217] DBG:core:grep_sock_info: checking if port 5060 
matches port 5060
Jan 15 14:30:12 [32217] DBG:registrar:lookup: '751' Not found in 
usrloc
Jan 15 14:30:12 [32217] DBG:core:destroy_avp_list: destroying list 
(nil)
Jan 15 14:30:12 [32217] DBG:core:receive_msg: cleaning up
Jan 15 14:30:12 [32215] DBG:core:parse_msg: SIP Request:
Jan 15 14:30:12 [32215] DBG:core:parse_msg:  method:  <ACK>
Jan 15 14:30:12 [32215] DBG:core:parse_msg:  uri:     <sip:751 at 200.40.
xxx.xxx>
Jan 15 14:30:12 [32215] DBG:core:parse_msg:  version: <SIP/2.0>
Jan 15 14:30:12 [32215] DBG:core:parse_headers: flags=2
Jan 15 14:30:12 [32215] DBG:core:parse_via_param: found param type 
232, <branch> = <z9hG4bK-d87543-40390549c060936b-1--d87543->; state=6
Jan 15 14:30:12 [32215] DBG:core:parse_via_param: found param type 
235, <rport> = <n/a>; state=17
Jan 15 14:30:12 [32215] DBG:core:parse_via: end of header reached, 
state=5
Jan 15 14:30:12 [32215] DBG:core:parse_headers: via found, flags=2
Jan 15 14:30:12 [32215] DBG:core:parse_headers: this is the first via
Jan 15 14:30:12 [32215] DBG:core:receive_msg: After parse_msg...
Jan 15 14:30:12 [32215] DBG:core:receive_msg: preparing to run routing 
scripts...
Jan 15 14:30:12 [32215] DBG:sl:sl_filter_ACK: to late to be a local 
ACK!
Jan 15 14:30:12 [32215] DBG:core:parse_headers: flags=100

>----Mensaje original----
>De: ggb at tid.es
>Fecha: 06/12/2007 11:03 
>Para: "Lista de usuarios de OpenSER"<users-es at lists.openser.org>
>Asunto: Re: [OpenSER-Users-ES] Problemas Forward de llamadas de	
openser	a	Asterisk
>
>Puedes mandar una captura del wireshark en tu SER a ver que pasa con 
el
>INVITE cuando lo mandas desde Internet?
>
>G.
>
>On Tue, 2008-01-15 at 05:49 -0800, Andresdb wrote:
>> Estimado amigos,
>> 
>> Tengo el siguiente inconveniente y la situación es la siguiente:
>> INTERNET----<ippublica SER x.x.x.x:5060>----ServerSER----<iplan SER
>> 192.168.1.200:5060>--LAN--<iplan Asterisk 192.168.1.201:5060>
>> Lo que queremos hacer es utilizar SER como un proxy para no exponer 
asterisk
>> a una ip publica.
>> Si me registro contra el openser con la ip de lan el forward de las 
llamadas
>> al Asterisk se hace correctamente, pero si intento registrarme 
contra la ip
>> publica me registro al ser pero no puedo hacer llamadas, el forward 
a la ip
>> de astrerisk no se hace, te detallo la configuración del cfg de 
ser, les
>> agradezco mucho en lo que me puedan ayudar.
>> 
>> openser.cfg
>> # ----------- global configuration parameters 
------------------------
>> 
>> debug=7         # debug level (cmd line: -dddddddddd)
>> fork=yes
>> log_stderror=yes        # (cmd line: -E)
>> 
>> check_via=no    # (cmd. line: -v)
>> dns=no          # (cmd. line: -r)
>> rev_dns=no      # (cmd. line: -R)
>> children=4
>> 
>> listen=192.168.1.200
>> listen=200.40.119.215
>> port=5060
>> 
>> # ------------------ module loading 
----------------------------------
>> 
>> # use dbtext database
>> mpath="/usr/local/lib/openser/modules/"
>> loadmodule "dbtext.so"
>> loadmodule "sl.so"
>> loadmodule "tm.so"
>> loadmodule "rr.so"
>> loadmodule "maxfwd.so"
>> loadmodule "usrloc.so"
>> loadmodule "registrar.so"
>> loadmodule "textops.so"
>> loadmodule "mi_fifo.so"
>> #loadmodule "mediaproxy.so"
>> #loadmodule "nathelper.so"
>> #loadmodule "acc.so"
>> #loadmodule "exec.so"
>> #loadmodule "xlog.so"
>> 
>> # modules for digest authentication
>> loadmodule "auth.so"
>> loadmodule "auth_db.so"
>> 
>> # ----------------- setting module-specific parameters 
---------------
>> 
>> # -- mi_fifo params --
>> 
>> modparam("mi_fifo", "fifo_name", "/tmp/openser_fifo")
>> 
>> # -- nathelper
>> #modparam("nathelper", "rtpproxy_disable", 1)
>> #modparam("nathelper", "natping_interval", 30)
>> #modparam("nathelper", "sipping_from", "sip:ping at 192.168.0.7")
>> 
>> # -- usrloc params --
>> 
>> # use dbtext database for persistent storage
>> modparam("usrloc", "db_mode", 2)
>> modparam("usrloc|auth_db", "db_url",
>> "dbtext:///usr/local/etc/openser/dbtext")
>> 
>> # -- auth params --
>> #
>> modparam("auth_db", "calculate_ha1", 1)
>> modparam("auth_db", "password_column", "password")
>> modparam("auth_db", "user_column", "username")
>> modparam("auth_db", "domain_column", "domain")
>> 
>> # -- rr params --
>> # add value to ;lr param to make some broken UAs happy
>> modparam("rr", "enable_full_lr", 1)
>> 
>> # -------------------------  request routing logic 
-------------------
>> 
>> # main routing logic
>> 
>> route{
>>     # initial sanity checks -- messages with
>>     # max_forwards==0, or excessively long requests
>>     if (!mf_process_maxfwd_header("10")) {
>>         sl_send_reply("483","Too Many Hops");
>>         exit;
>>     };
>>     if (msg:len >=  max_len ) {
>>         sl_send_reply("513", "Message too big");
>>         exit;
>>     };
>> 
>>     # we record-route all messages -- to make sure that
>>     # subsequent messages will go through our proxy; that's
>>     # particularly good if upstream and downstream entities
>>     # use different transport protocol
>>     if (!method=="REGISTER") record_route();
>> 
>>     # subsequent messages withing a dialog should take the
>>     # path determined by record-routing
>>     if (loose_route()) {
>>         # mark routing logic in request
>>         append_hf("P-hint: rr-enforced\r\n");
>>         route(1);
>>         exit;
>>     };
>> 
>>     if (!uri==myself) {
>>         # mark routing logic in request
>>         append_hf("P-hint: outbound\r\n");
>>         route(1);
>>         exit;
>>     };
>>     if (is_method("INVITE")) {
>>         rewritehostport("192.168.1.201:5060");
>>         t_relay();
>>         exit;
>>     }  
>>     # if the request is for other domain use UsrLoc
>>     # (in case, it does not work, use the following command
>>     # with proper names and addresses in it)
>>     if (uri==myself) {
>>         if (method=="REGISTER") {
>>             # digest authentication
>>             if (!www_authorize("*", "subscriber")) {
>>                 www_challenge("*", "0");
>>                 exit;
>>             };
>> 
>>             save("location");
>>             exit;
>>         };
>> 
>>         lookup("aliases");
>>         if (!uri==myself) {
>>             append_hf("P-hint: outbound alias\r\n");
>>             route(1);
>>             exit;
>>         };
>> 
>>         # native SIP destinations are handled using our USRLOC DB
>>         if (!lookup("location")) {
>>             sl_send_reply("404", "Not Found");
>>             exit;
>>         };
>>     };
>>     append_hf("P-hint: usrloc applied\r\n");
>>     route(1);
>> }
>> 
>> route[1]
>> {
>>     # send it out now; use stateful forwarding as it works reliably
>>     # even for UDP2TCP
>>     if (!t_relay()) {
>>         sl_reply_error();
>>     };
>> }
>> 
>
>
>
>_______________________________________________
>Users-es mailing list
>Users-es at lists.openser.org
>http://lists.openser.org/cgi-bin/mailman/listinfo/users-es
>






More information about the Users-es mailing list