[Serusers] Radius Accounting - HowTo !

Jan Janak jan at iptel.org
Wed Jun 16 10:43:54 CEST 2004


The error is not related to radius. I went through your logs and did not
find any errors. Given the fact that radius authentication works, I
suppose there is no problem on radius side, so make sure that the
corresponding flag is set, that you restarted your server when you
changed the config file, try to see if there are any radius accounting
requests from ser on the radius server side.

  Jan.

On 08-06 12:17, Rafael J. Risco G.V. wrote:
> Hi 
> 
> About my problem with radius accounting I?ve seen some errors in debug mode when starting ser:
> .
> .
> 16(0) DEBUG: callid: '7edfe76a-0 at 200.110.2.132'
> 16(0) DEBUG: init_mod_child (8): usrloc
> 16(0) DEBUG: init_mod_child (8): acc
> 16(6427) DBG: open_uac_fifo: opening fifo...
> 16(6427) DEBUG: open_fifo_server: FIFO stat failed: Bad file descriptor
> 16(6427) DEBUG: FIFO created @ /tmp/ser_fifo
> 16(6427) DEBUG: fifo /tmp/ser_fifo opened, mode=432
> 17(0) INFO: fifo process starting: 6428
> .
> .
> in fact I do not know if there are more, please see my attached files (startSer.txt and callDebug.txt),
> 
> thank you   
> Rafael  
> 
> 
> Jan Janak <jan at iptel.org> escribi?:
> 
> > Are there any error messages in ser logs ?
> > 
> >  Jan.
> > 
> > On 07-06 13:14, Rafael J. Risco G.V. wrote:
> > > hello
> > > 
> > > I?m still having problems with radius accounting module, ...I can see
> > that authentication process works well but I did not see any "Accounting
> > Report" in /var/log/radius/radacct/ or neither in radiusd -X debug ,
> > please can someone share an example of its ser.cfg file for this
> > function?
> > > 
> > > thanks 
> > > Rafael
> > > 
> > > PS: my current ser.cfg configuration is shown below, freeradius it?s
> > installed
> > > in the same host (SuSe Linux 9.0) and I have included setflag(1) for
> > all transactions as Klaus D. recommend me some days ago...
> > > 
> > > 
> > > ser:/var/log/radius/radacct# more /etc/ser/ser.cfg 
> > > 
> > > # simple quick-start config script
> > > #
> > > 
> > > # ----------- global configuration parameters
> > ------------------------
> > > 
> > > #debug=3         # debug level (cmd line: -dddddddddd)
> > > #fork=yes
> > > #log_stderror=no        # (cmd line: -E)
> > > 
> > > #/* Uncomment these lines to enter debugging mode 
> > > debug=9
> > > fork=yes
> > > log_stderror=yes
> > > #*/
> > > 
> > > check_via=no    # (cmd. line: -v)
> > > dns=no           # (cmd. line: -r)
> > > rev_dns=no      # (cmd. line: -R)
> > > #port=5060
> > > #children=4
> > > fifo="/tmp/ser_fifo"
> > > 
> > > # ------------------ module loading
> > ----------------------------------
> > > 
> > > # Uncomment this if you want to use SQL database
> > > #loadmodule "//lib/ser/modules/mysql.so"
> > > 
> > > loadmodule "//lib/ser/modules/sl.so"
> > > loadmodule "//lib/ser/modules/tm.so"
> > > loadmodule "//lib/ser/modules/rr.so"
> > > loadmodule "//lib/ser/modules/maxfwd.so"
> > > loadmodule "//lib/ser/modules/usrloc.so"
> > > loadmodule "//lib/ser/modules/registrar.so"
> > > loadmodule "//lib/ser/modules/group_radius.so"
> > > #loadmodule "//lib/ser/modules/group.so"
> > > # Uncomment this if you want digest authentication
> > > # mysql.so must be loaded !
> > > loadmodule "//lib/ser/modules/auth.so"
> > > #loadmodule "//lib/ser/modules/auth_db.so"
> > > loadmodule "//lib/ser/modules/auth_radius.so"
> > > loadmodule "//lib/ser/modules/acc.so"
> > > #loadmodule "//lib/ser/modules/uri.so"
> > > # ----------------- setting module-specific parameters
> > ---------------
> > > 
> > > # -- usrloc params --
> > > #modparam("usrloc", "db_mode",   0)
> > > # Uncomment this if you want to use SQL database 
> > > # for persistent storage and comment the previous line
> > > #modparam("usrloc", "db_mode", 2)
> > > # -- auth params --
> > > # Uncomment if you are using auth module
> > > #
> > > #modparam("auth_db", "calculate_ha1", yes)
> > > #
> > > # If you set "calculate_ha1" parameter to yes (which true in this
> > config), 
> > > # uncomment also the following parameter)
> > > #
> > > #modparam("auth_db", "password_column", "password")
> > > # -- rr params --
> > > # add value to ;lr param to make some broken UAs happy
> > > 
> > > modparam("rr", "enable_full_lr", 1)
> > >
> > modparam("auth_radius","radius_config","/etc/radiusclient/radiusclient.conf")
> > > modparam("auth_radius","service_type",15)
> > > modparam("acc", "log_level", 1)
> > > modparam("acc",
> > "radius_config","/etc/radiusclient/radiusclient.conf")
> > > modparam("acc", "service_type", 15)
> > > modparam("acc", "radius_flag", 1)
> > > modparam("acc", "radius_missed_flag", 3)
> > > 
> > > 
> > > 
> > > # -------------------------  request routing logic
> > -------------------
> > > 
> > > # main routing logic
> > > 
> > > 
> > > route{
> > > 
> > > setflag(1);
> > >         if (method=="REGISTER")
> > >                 log(1, "REGISTER message received\n");
> > > 
> > >         if (method=="INVITE")
> > >                 log(1, "INVITE message received\n");
> > > 
> > >         if (method=="ACK")
> > >                 log(1, "ACK message received\n");
> > > 
> > >         if (method=="BYE")
> > >                 log(1, "BYE message received\n");
> > > 
> > >         if (method=="CANCEL")
> > >                 log(1, "CANCEL message received\n");
> > > 
> > >         if (method=="SUBSCRIBE")
> > >                 log(1, "SUBSCRIBE message received\n");
> > > 
> > >         if (method=="NOTIFY")
> > >                 log(1, "NOTIFY message received\n");
> > > 
> > >         if (method=="OPTIONS")
> > >                 log(1, "OPTIONS message received\n");
> > > 
> > >         if (method=="INFO")
> > >                 log(1, "INFO message received\n");
> > > 
> > >         if (method=="MESSAGE")
> > >                 log(1, "MESSAGE message received\n");
> > > 
> > >         if (method=="REFER")
> > >                 log(1, "REFER message received\n");
> > > 
> > > 
> > > 
> > >         # initial sanity checks -- messages with
> > >         # max_forwards==0, or excessively long requests
> > >         if (!mf_process_maxfwd_header("10")) {
> > >                 sl_send_reply("483","Too Many Hops");
> > >                 break;
> > >         };
> > >         if ( msg:len > max_len ) {
> > >                 sl_send_reply("513", "Message too big");
> > >                 break;
> > >         };
> > > 
> > >         # we record-route all messages -- to make sure that
> > >         # subsequent messages will go through our proxy; that's
> > >         # particularly good if upstream and downstream entities
> > >         # use different transport protocol
> > >         record_route();
> > >         # loose-route processing
> > >         if (loose_route()) {
> > >                 t_relay();
> > >                 break;
> > >         };
> > > 
> > > 
> > >         # if the request is for other domain use UsrLoc
> > >         # (in case, it does not work, use the following command
> > >         # with proper names and addresses in it)
> > >         if (uri==myself) {
> > > 
> > >                 if (method=="REGISTER") {
> > > 
> > > # Uncomment this if you want to use digest authentication
> > >                         if (!radius_www_authorize("")) {
> > >                                 www_challenge("", "1");
> > >                                 break;
> > >                         };
> > > 
> > >                         save("location");
> > >                         break;
> > >                 };
> > > 
> > > 
> > > #Labeled  transactions for accounting
> > > #if (method =="INVITE" | method == "BYE")
> > > # {
> > > # log(1,"INVITE or BYE\n");
> > > # setflag(1);
> > > # };
> > > #if (method=="MESSAGE") {
> > > # log(1,"MESSAGE\n");
> > > # setflag(1);
> > > # };
> > > #if (method=="BYE"){
> > > # log (1, "BYEd or CANCEL\n");
> > > # setflag(1);
> > > # };
> > > #if (method=="CANCEL"){
> > > # log (1, "BYEe or CANCEL\n");
> > > # setflag(1);
> > > # };
> > > 
> > > 
> > > 
> > >                 # native SIP destinations are handled using our USRLOC
> > DB
> > >                 if (!lookup("location")) {
> > >                         sl_send_reply("404", "Not Found");
> > >                         break;
> > >                 };
> > >         };
> > >         # forward to current uri now; use stateful forwarding; that
> > >         # works reliably even if we forward from TCP to UDP
> > >         if (!t_relay()) {
> > >                 sl_reply_error();
> > >         };
> > > 
> > > }
> > > 
> > > ser:/var/log/radius/radacct #  
> > > 
> > > 
> > > 
> > > 
> > > 
> > > 
> > > 
> > > [Serusers] Still trying to get radius Accounting!!!!!!!!!!
> > > 
> > > 
> > > 
> > > 
> > > 
> > > 
> > > 
> > > 
> > > 
> > > Klaus Darilion <klaus.mailinglists at pernau.at> escribi?:
> > > 
> > > > try setflag(1); for the transactions you want to account!
> > > > 
> > > > klaus
> > > > 
> > > > Rafael J. Risco G.V. wrote:
> > > > 
> > > > > hello serusers!
> > > > > I have followed these instructions carefully
> > > > again(http://iptel.org/ser/doc/ser_radius/ser_radius.html) and now I
> > can
> > > > see that authentication process works well but I did not see any
> > > > "Accounting Report" in /var/log/radius/radacct/ or neither in
> > radiusd -X
> > > > debug, please can someone send me an example of ser.cfg
> > configuration
> > > > for this purpose?
> > > > > 
> > > > > thanks 
> > > > > Rafael
> > > > > 
> > > > > PS: my current ser.cfg configuration is shown below, freeradius it
> > is
> > > > installed in the same host (SuSe Linux 9.0):
> > > > > 
> > > > > ser:/var/log/radius/radacct # more /etc/ser/ser.cfg      
> > > > > #
> > > > > # $Id: ser.cfg,v 1.21.4.1 2003/11/10 15:35:15 andrei Exp $
> > > > > #
> > > > > # simple quick-start config script
> > > > > #
> > > > > 
> > > > > # ----------- global configuration parameters
> > > > ------------------------
> > > > > 
> > > > > #debug=3         # debug level (cmd line: -dddddddddd)
> > > > > #fork=yes
> > > > > #log_stderror=no        # (cmd line: -E)
> > > > > 
> > > > > #/* Uncomment these lines to enter debugging mode 
> > > > > debug=9
> > > > > fork=yes
> > > > > log_stderror=yes
> > > > > #*/
> > > > > 
> > > > > check_via=no    # (cmd. line: -v)
> > > > > dns=no           # (cmd. line: -r)
> > > > > rev_dns=no      # (cmd. line: -R)
> > > > > #port=5060
> > > > > #children=4
> > > > > fifo="/tmp/ser_fifo"
> > > > > 
> > > > > # ------------------ module loading
> > > > ----------------------------------
> > > > > 
> > > > > # Uncomment this if you want to use SQL database
> > > > > #loadmodule "//lib/ser/modules/mysql.so"
> > > > > 
> > > > > loadmodule "//lib/ser/modules/sl.so"
> > > > > loadmodule "//lib/ser/modules/tm.so"
> > > > > loadmodule "//lib/ser/modules/rr.so"
> > > > > loadmodule "//lib/ser/modules/maxfwd.so"
> > > > > loadmodule "//lib/ser/modules/usrloc.so"
> > > > > loadmodule "//lib/ser/modules/registrar.so"
> > > > > loadmodule "//lib/ser/modules/group_radius.so"
> > > > > 
> > > > > #loadmodule "//lib/ser/modules/group.so"
> > > > > # Uncomment this if you want digest authentication
> > > > > # mysql.so must be loaded !
> > > > > 
> > > > > loadmodule "//lib/ser/modules/auth.so"
> > > > > 
> > > > > #loadmodule "//lib/ser/modules/auth_db.so"
> > > > > 
> > > > > loadmodule "//lib/ser/modules/auth_radius.so"
> > > > > loadmodule "//lib/ser/modules/acc.so"
> > > > > 
> > > > > #loadmodule "//lib/ser/modules/uri.so"
> > > > > 
> > > > > # ----------------- setting module-specific parameters
> > > > ---------------
> > > > > # -- usrloc params --
> > > > > #modparam("usrloc", "db_mode",   0)
> > > > > # Uncomment this if you want to use SQL database 
> > > > > # for persistent storage and comment the previous line
> > > > > #modparam("usrloc", "db_mode", 2)
> > > > > # -- auth params --
> > > > > # Uncomment if you are using auth module
> > > > > #
> > > > > #modparam("auth_db", "calculate_ha1", yes)
> > > > > #
> > > > > # If you set "calculate_ha1" parameter to yes (which true in this
> > > > config), 
> > > > > # uncomment also the following parameter)
> > > > > #
> > > > > #modparam("auth_db", "password_column", "password")
> > > > > 
> > > > > # -- rr params --
> > > > > # add value to ;lr param to make some broken UAs happy
> > > > > 
> > > > > modparam("rr", "enable_full_lr", 1)
> > > > >
> > > >
> > modparam("auth_radius","radius_config","/etc/radiusclient/radiusclient.conf")
> > > > > modparam("auth_radius","service_type",15)
> > > > > modparam("acc",
> > > > "radius_config","/etc/radiusclient/radiusclient.conf")
> > > > > modparam("acc", "service_type", 15)
> > > > > modparam("acc", "radius_flag", 1)
> > > > > modparam("acc", "radius_missed_flag", 3)
> > > > > 
> > > > > 
> > > > > 
> > > > > # -------------------------  request routing logic
> > > > -------------------
> > > > > 
> > > > > # main routing logic
> > > > > 
> > > > > route{
> > > > > 
> > > > >         # initial sanity checks -- messages with
> > > > >         # max_forwards==0, or excessively long requests
> > > > >         if (!mf_process_maxfwd_header("10")) {
> > > > >                 sl_send_reply("483","Too Many Hops");
> > > > >                 break;
> > > > >         };
> > > > >         if ( msg:len > max_len ) {
> > > > >                 sl_send_reply("513", "Message too big");
> > > > >                 break;
> > > > >         };
> > > > > 
> > > > >         # we record-route all messages -- to make sure that
> > > > >         # subsequent messages will go through our proxy; that's
> > > > >         # particularly good if upstream and downstream entities
> > > > >         # use different transport protocol
> > > > >         record_route();
> > > > >         # loose-route processing
> > > > >         if (loose_route()) {
> > > > >                 t_relay();
> > > > >                 break;
> > > > >         };
> > > > > 
> > > > >         # if the request is for other domain use UsrLoc
> > > > >         # (in case, it does not work, use the following command
> > > > >         # with proper names and addresses in it)
> > > > >         if (uri==myself) {
> > > > > 
> > > > >                 if (method=="REGISTER") {
> > > > > 
> > > > > # Uncomment this if you want to use digest authentication
> > > > >                         if (!radius_www_authorize("")) {
> > > > >                                 www_challenge("", "0");
> > > > >                                 break;
> > > > >                         };
> > > > > 
> > > > >                         save("location");
> > > > >                         break;
> > > > >                 };
> > > > > 
> > > > >                 # native SIP destinations are handled using our
> > USRLOC
> > > > DB
> > > > >                 if (!lookup("location")) {
> > > > >                         sl_send_reply("404", "Not Found");
> > > > >                         break;
> > > > >                 };
> > > > >         };
> > > > >         # forward to current uri now; use stateful forwarding;
> > that
> > > > >         # works reliably even if we forward from TCP to UDP
> > > > >         if (!t_relay()) {
> > > > >                 sl_reply_error();
> > > > >         };
> > > > > 
> > > > > }
> > > > > ser:/var/log/radius/radacct #  
> > > > > 
> > > > > 
> > > > > _______________________________________________
> > > > > Serusers mailing list
> > > > > serusers at lists.iptel.org
> > > > > http://lists.iptel.org/mailman/listinfo/serusers
> > > > > 
> > > > > 
> > > > 
> > > 
> > > _______________________________________________
> > > Serusers mailing list
> > > serusers at lists.iptel.org
> > > http://lists.iptel.org/mailman/listinfo/serusers
> > 

> 
> 
> ser:/ # 
> ser:/ # 
> ser:/ # 
> ser:/ # 
> ser:/ # /etc/init.d/ser start
> Starting SIP Express Router  0(6409) loading module //lib/ser/modules/sl.so
>  0(6409) loading module //lib/ser/modules/tm.so
>  0(6409) loading module //lib/ser/modules/rr.so
>  0(6409) loading module //lib/ser/modules/maxfwd.so
>  0(6409) loading module //lib/ser/modules/usrloc.so
>  0(6409) loading module //lib/ser/modules/registrar.so
>  0(6409) loading module //lib/ser/modules/group_radius.so
>  0(6409) loading module //lib/ser/modules/auth.so
>  0(6409) loading module //lib/ser/modules/auth_radius.so
>  0(6409) loading module //lib/ser/modules/acc.so
>  0(6409) set_mod_param_regex: rr matches module rr
>  0(6409) set_mod_param_regex: found <enable_full_lr> in module rr [//lib/ser/modules/rr.so]
>  0(6409) set_mod_param_regex: auth_radius matches module auth_radius
>  0(6409) set_mod_param_regex: found <radius_config> in module auth_radius [//lib/ser/modules/auth_radius.so]
>  0(6409) set_mod_param_regex: auth_radius matches module auth_radius
>  0(6409) set_mod_param_regex: found <service_type> in module auth_radius [//lib/ser/modules/auth_radius.so]
>  0(6409) set_mod_param_regex: acc matches module acc
>  0(6409) set_mod_param_regex: found <log_level> in module acc [//lib/ser/modules/acc.so]
>  0(6409) set_mod_param_regex: acc matches module acc
>  0(6409) set_mod_param_regex: found <radius_config> in module acc [//lib/ser/modules/acc.so]
>  0(6409) set_mod_param_regex: acc matches module acc
>  0(6409) set_mod_param_regex: found <radius_flag> in module acc [//lib/ser/modules/acc.so]
>  0(6409) set_mod_param_regex: acc matches module acc
>  0(6409) set_mod_param_regex: found <radius_missed_flag> in module acc [//lib/ser/modules/acc.so]
>  0(6409) find_export: found <mf_process_maxfwd_header> in module maxfwd_module [//lib/ser/modules/maxfwd.so]
>  0(6409) find_export: found <sl_send_reply> in module sl_module [//lib/ser/modules/sl.so]
>  0(6409) find_export: found <sl_send_reply> in module sl_module [//lib/ser/modules/sl.so]
>  0(6409) find_export: found <record_route> in module rr [//lib/ser/modules/rr.so]
>  0(6409) find_export: found <loose_route> in module rr [//lib/ser/modules/rr.so]
>  0(6409) find_export: found <t_relay> in module tm [//lib/ser/modules/tm.so]
>  0(6409) find_export: found <radius_www_authorize> in module auth_radius [//lib/ser/modules/auth_radius.so]
>  0(6409) find_export: found <www_challenge> in module auth [//lib/ser/modules/auth.so]
>  0(6409) find_export: found <save> in module registrar [//lib/ser/modules/registrar.so]
>  0(6409) find_export: found <lookup> in module registrar [//lib/ser/modules/registrar.so]
>  0(6409) find_export: found <sl_send_reply> in module sl_module [//lib/ser/modules/sl.so]
>  0(6409) find_export: found <t_relay> in module tm [//lib/ser/modules/tm.so]
>  0(6409) find_export: found <sl_reply_error> in module sl_module [//lib/ser/modules/sl.so]
>  0(6409) routing table 0:
>  0(6409) if ( 0(6409) NOT(  0(6409)  external_module_call( 0(6409) f_ptr<0x421a9c30> 0(6409) , "10" 0(6409) );  0(6409)  external_module_call( 0(6409) f_ptr<0x421a9c30> 0(6409) , "10" 0(6409) );  0(6409)  ) 0(6409) ) { 0(6409)  external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "483" 0(6409) , "Too Many Hops" 0(6409) );  0(6409) drop( 0(6409) type<0> 0(6409) );  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) UNKNOWN 0(6409) <UNKNOWN> 0(6409) 65535 0(6409) ) { 0(6409)  external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "513" 0(6409) , "Message too big" 0(6409) );  0(6409) drop( 0(6409) type<0> 0(6409) );  0(6409) } else { 0(6409) };  0(6409)  external_module_call( 0(6409) f_ptr<0x40022e10> 0(6409) );  0(6409) if ( 0(6409)  external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) );  0(6409)  external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) );  0(6409) ) { 0(6409)  external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) );  0(6409) drop( 0(6409) type<0> 0(6409) );  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) uri 0(6409) == 0(6409) _myself_ 0(6409) ) { 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "REGISTER" 0(6409) ) { 0(6409) if ( 0(6409) NOT(  0(6409)  external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) );  0(6409)  external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) );  0(6409)  ) 0(6409) ) { 0(6409)  external_module_call( 0(6409) f_ptr<0x421cb530> 0(6409) , "" 0(6409) , "0" 0(6409) );  0(6409) drop( 0(6409) type<0> 0(6409) );  0(6409) } else { 0(6409) };  0(6409)  external_module_call( 0(6409) f_ptr<0x421bfa20> 0(6409) , "location" 0(6409) );  0(6409) drop( 0(6409) type<0> 0(6409) );  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) OR(  0(6409) method 0(6409) == 0(6409) "INVITE" 0(6409) ,  0(6409) method 0(6409) == 0(6409) "BYE" 0(6409)  ) 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "INVITE or BYE
> " 0(6409) );  0(6409) setflag( 0(6409) 1 0(6409) );  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) method 0(6409) == 0(6409) "MESSAGE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "MESSAGE
> " 0(6409) );  0(6409) setflag( 0(6409) 1 0(6409) );  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEd or CANCEL
> " 0(6409) );  0(6409) setflag( 0(6409) 1 0(6409) );  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) method 0(6409) == 0(6409) "CANCEL" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEe or CANCEL
> " 0(6409) );  0(6409) setflag( 0(6409) 1 0(6409) );  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) NOT(  0(6409)  external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) );  0(6409)  external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) );  0(6409)  ) 0(6409) ) { 0(6409)  external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "404" 0(6409) , "Not Found" 0(6409) );  0(6409) drop( 0(6409) type<0> 0(6409) );  0(6409) } else { 0(6409) };  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) NOT(  0(6409)  external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) );  0(6409)  external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) );  0(6409)  ) 0(6409) ) { 0(6409)  external_module_call( 0(6409) f_ptr<0x4001c7a0> 0(6409) );  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) UNKNOWN 0(6409) <UNKNOWN> 0(6409) 65535 0(6409) ) { 0(6409)  external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "513" 0(6409) , "Message too big" 0(6409) );  0(6409) drop( 0(6409) type<0> 0(6409) );  0(6409) } else { 0(6409) };  0(6409)  external_module_call( 0(6409) f_ptr<0x40022e10> 0(6409) );  0(6409) if ( 0(6409)  external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) );  0(6409)  external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) );  0(6409) ) { 0(6409)  external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) );  0(6409) drop( 0(6409) type<0> 0(6409) );  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) uri 0(6409) == 0(6409) _myself_ 0(6409) ) { 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "REGISTER" 0(6409) ) { 0(6409) if ( 0(6409) NOT(  0(6409)  external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) );  0(6409)  external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) );  0(6409)  ) 0(6409) ) { 0(6409)  external_module_call( 0(6409) f_ptr<0x421cb530> 0(6409) , "" 0(6409) , "0" 0(6409) );  0(6409) drop( 0(6409) type<0> 0(6409) );  0(6409) } else { 0(6409) };  0(6409)  external_module_call( 0(6409) f_ptr<0x421bfa20> 0(6409) , "location" 0(6409) );  0(6409) drop( 0(6409) type<0> 0(6409) );  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) OR(  0(6409) method 0(6409) == 0(6409) "INVITE" 0(6409) ,  0(6409) method 0(6409) == 0(6409) "BYE" 0(6409)  ) 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "INVITE or BYE
> " 0(6409) );  0(6409) setflag( 0(6409) 1 0(6409) );  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) method 0(6409) == 0(6409) "MESSAGE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "MESSAGE
> " 0(6409) );  0(6409) setflag( 0(6409) 1 0(6409) );  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEd or CANCEL
> " 0(6409) );  0(6409) setflag( 0(6409) 1 0(6409) );  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) method 0(6409) == 0(6409) "CANCEL" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEe or CANCEL
> " 0(6409) );  0(6409) setflag( 0(6409) 1 0(6409) );  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) NOT(  0(6409)  external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) );  0(6409)  external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) );  0(6409)  ) 0(6409) ) { 0(6409)  external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "404" 0(6409) , "Not Found" 0(6409) );  0(6409) drop( 0(6409) type<0> 0(6409) );  0(6409) } else { 0(6409) };  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) NOT(  0(6409)  external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) );  0(6409)  external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) );  0(6409)  ) 0(6409) ) { 0(6409)  external_module_call( 0(6409) f_ptr<0x4001c7a0> 0(6409) );  0(6409) } else { 0(6409) };  0(6409)  external_module_call( 0(6409) f_ptr<0x40022e10> 0(6409) );  0(6409) if ( 0(6409)  external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) );  0(6409)  external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) );  0(6409) ) { 0(6409)  external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) );  0(6409) drop( 0(6409) type<0> 0(6409) );  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) uri 0(6409) == 0(6409) _myself_ 0(6409) ) { 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "REGISTER" 0(6409) ) { 0(6409) if ( 0(6409) NOT(  0(6409)  external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) );  0(6409)  external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) );  0(6409)  ) 0(6409) ) { 0(6409)  external_module_call( 0(6409) f_ptr<0x421cb530> 0(6409) , "" 0(6409) , "0" 0(6409) );  0(6409) drop( 0(6409) type<0> 0(6409) );  0(6409) } else { 0(6409) };  0(6409)  external_module_call( 0(6409) f_ptr<0x421bfa20> 0(6409) , "location" 0(6409) );  0(6409) drop( 0(6409) type<0> 0(6409) );  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) OR(  0(6409) method 0(6409) == 0(6409) "INVITE" 0(6409) ,  0(6409) method 0(6409) == 0(6409) "BYE" 0(6409)  ) 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "INVITE or BYE
> " 0(6409) );  0(6409) setflag( 0(6409) 1 0(6409) );  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) method 0(6409) == 0(6409) "MESSAGE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "MESSAGE
> " 0(6409) );  0(6409) setflag( 0(6409) 1 0(6409) );  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEd or CANCEL
> " 0(6409) );  0(6409) setflag( 0(6409) 1 0(6409) );  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) method 0(6409) == 0(6409) "CANCEL" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEe or CANCEL
> " 0(6409) );  0(6409) setflag( 0(6409) 1 0(6409) );  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) NOT(  0(6409)  external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) );  0(6409)  external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) );  0(6409)  ) 0(6409) ) { 0(6409)  external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "404" 0(6409) , "Not Found" 0(6409) );  0(6409) drop( 0(6409) type<0> 0(6409) );  0(6409) } else { 0(6409) };  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) NOT(  0(6409)  external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) );  0(6409)  external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) );  0(6409)  ) 0(6409) ) { 0(6409)  external_module_call( 0(6409) f_ptr<0x4001c7a0> 0(6409) );  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409)  external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) );  0(6409)  external_module_call( 0(6409) f_ptr<0x40020e00> 0(6409) );  0(6409) ) { 0(6409)  external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) );  0(6409) drop( 0(6409) type<0> 0(6409) );  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) uri 0(6409) == 0(6409) _myself_ 0(6409) ) { 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "REGISTER" 0(6409) ) { 0(6409) if ( 0(6409) NOT(  0(6409)  external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) );  0(6409)  external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) );  0(6409)  ) 0(6409) ) { 0(6409)  external_module_call( 0(6409) f_ptr<0x421cb530> 0(6409) , "" 0(6409) , "0" 0(6409) );  0(6409) drop( 0(6409) type<0> 0(6409) );  0(6409) } else { 0(6409) };  0(6409)  external_module_call( 0(6409) f_ptr<0x421bfa20> 0(6409) , "location" 0(6409) );  0(6409) drop( 0(6409) type<0> 0(6409) );  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) OR(  0(6409) method 0(6409) == 0(6409) "INVITE" 0(6409) ,  0(6409) method 0(6409) == 0(6409) "BYE" 0(6409)  ) 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "INVITE or BYE
> " 0(6409) );  0(6409) setflag( 0(6409) 1 0(6409) );  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) method 0(6409) == 0(6409) "MESSAGE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "MESSAGE
> " 0(6409) );  0(6409) setflag( 0(6409) 1 0(6409) );  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEd or CANCEL
> " 0(6409) );  0(6409) setflag( 0(6409) 1 0(6409) );  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) method 0(6409) == 0(6409) "CANCEL" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEe or CANCEL
> " 0(6409) );  0(6409) setflag( 0(6409) 1 0(6409) );  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) NOT(  0(6409)  external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) );  0(6409)  external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) );  0(6409)  ) 0(6409) ) { 0(6409)  external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "404" 0(6409) , "Not Found" 0(6409) );  0(6409) drop( 0(6409) type<0> 0(6409) );  0(6409) } else { 0(6409) };  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) NOT(  0(6409)  external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) );  0(6409)  external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) );  0(6409)  ) 0(6409) ) { 0(6409)  external_module_call( 0(6409) f_ptr<0x4001c7a0> 0(6409) );  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) uri 0(6409) == 0(6409) _myself_ 0(6409) ) { 0(6409) if ( 0(6409) method 0(6409) == 0(6409) "REGISTER" 0(6409) ) { 0(6409) if ( 0(6409) NOT(  0(6409)  external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) );  0(6409)  external_module_call( 0(6409) f_ptr<0x421cfdf0> 0(6409) , "" 0(6409) );  0(6409)  ) 0(6409) ) { 0(6409)  external_module_call( 0(6409) f_ptr<0x421cb530> 0(6409) , "" 0(6409) , "0" 0(6409) );  0(6409) drop( 0(6409) type<0> 0(6409) );  0(6409) } else { 0(6409) };  0(6409)  external_module_call( 0(6409) f_ptr<0x421bfa20> 0(6409) , "location" 0(6409) );  0(6409) drop( 0(6409) type<0> 0(6409) );  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) OR(  0(6409) method 0(6409) == 0(6409) "INVITE" 0(6409) ,  0(6409) method 0(6409) == 0(6409) "BYE" 0(6409)  ) 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "INVITE or BYE
> " 0(6409) );  0(6409) setflag( 0(6409) 1 0(6409) );  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) method 0(6409) == 0(6409) "MESSAGE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "MESSAGE
> " 0(6409) );  0(6409) setflag( 0(6409) 1 0(6409) );  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) method 0(6409) == 0(6409) "BYE" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEd or CANCEL
> " 0(6409) );  0(6409) setflag( 0(6409) 1 0(6409) );  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) method 0(6409) == 0(6409) "CANCEL" 0(6409) ) { 0(6409) log( 0(6409) 1 0(6409) , "BYEe or CANCEL
> " 0(6409) );  0(6409) setflag( 0(6409) 1 0(6409) );  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) NOT(  0(6409)  external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) );  0(6409)  external_module_call( 0(6409) f_ptr<0x421beb20> 0(6409) , "location" 0(6409) );  0(6409)  ) 0(6409) ) { 0(6409)  external_module_call( 0(6409) f_ptr<0x4001c760> 0(6409) , "404" 0(6409) , "Not Found" 0(6409) );  0(6409) drop( 0(6409) type<0> 0(6409) );  0(6409) } else { 0(6409) };  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) NOT(  0(6409)  external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) );  0(6409)  external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) );  0(6409)  ) 0(6409) ) { 0(6409)  external_module_call( 0(6409) f_ptr<0x4001c7a0> 0(6409) );  0(6409) } else { 0(6409) };  0(6409) if ( 0(6409) NOT(  0(6409)  external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) );  0(6409)  external_module_call( 0(6409) f_ptr<0x42183810> 0(6409) );  0(6409)  ) 0(6409) ) { 0(6409)  external_module_call( 0(6409) f_ptr<0x4001c7a0> 0(6409) );  0(6409) } else { 0(6409) };  0(6409) 
> Listening on 
>               127.0.0.1 [127.0.0.1]:5060
>               200.110.2.132 [200.110.2.132]:5060
> Aliases: ser:5060 ser.local:5060 localhost:5060 
>  0(6411) DEBUG: init_mod: sl_module
> stateless - initializing
>  0(6411) DEBUG: register_fifo_cmd: new command (sl_stats) registered
>  0(6411) DEBUG: MD5 calculated: b27e1a1d33761e85846fc98f5f3a7e58
>  0(6411) DEBUG: init_mod: tm
>  0(6411) TM - initializing...
>  0(6411) Call-ID initialization: '7edfe76a'
>  0(6411) DEBUG: register_fifo_cmd: new command (t_uac_dlg) registered
>  0(6411) DEBUG: register_fifo_cmd: new command (t_hash) registered
>  0(6411) DEBUG: lock_initialize: lock initialization started
>                                                                                                                          done
> ser:/ #  0(6411) DEBUG: register_fifo_cmd: new command (t_stats) registered
>  0(6411) DEBUG: MD5 calculated: 533cb9e91f4b999cf76861cbb9ed54ed
>  0(6411) DEBUG: MD5 calculated: a6a1c5f60faecf035a1ae5b6e96e979a
>  0(6411) DEBUG: init_mod: rr
>  0(6411) rr - initializing
>  0(6411) DEBUG: init_mod: maxfwd_module
> Maxfwd module- initializing
>  0(6411) DEBUG: init_mod: usrloc
>  0(6411) usrloc - initializing
>  0(6411) DEBUG: register_fifo_cmd: new command (ul_stats) registered
>  0(6411) DEBUG: register_fifo_cmd: new command (ul_rm) registered
>  0(6411) DEBUG: register_fifo_cmd: new command (ul_rm_contact) registered
>  0(6411) DEBUG: register_fifo_cmd: new command (ul_dump) registered
>  0(6411) DEBUG: register_fifo_cmd: new command (ul_flush) registered
>  0(6411) DEBUG: register_fifo_cmd: new command (ul_add) registered
>  0(6411) DEBUG: register_fifo_cmd: new command (ul_show_contact) registered
>  0(6411) DEBUG: init_mod: registrar
>  0(6411) registrar - initializing
>  0(6411) find_export: found <sl_send_reply> in module sl_module [//lib/ser/modules/sl.so]
>  0(6411) find_export: found <ul_bind_usrloc> in module usrloc [//lib/ser/modules/usrloc.so]
>  0(6411) find_export: found <ul_register_udomain> in module usrloc [//lib/ser/modules/usrloc.so]
>  0(6411) find_export: found <ul_get_all_ucontacts> in module usrloc [//lib/ser/modules/usrloc.so]
>  0(6411) find_export: found <ul_insert_urecord> in module usrloc [//lib/ser/modules/usrloc.so]
>  0(6411) find_export: found <ul_delete_urecord> in module usrloc [//lib/ser/modules/usrloc.so]
>  0(6411) find_export: found <ul_get_urecord> in module usrloc [//lib/ser/modules/usrloc.so]
>  0(6411) find_export: found <ul_lock_udomain> in module usrloc [//lib/ser/modules/usrloc.so]
>  0(6411) find_export: found <ul_unlock_udomain> in module usrloc [//lib/ser/modules/usrloc.so]
>  0(6411) find_export: found <ul_release_urecord> in module usrloc [//lib/ser/modules/usrloc.so]
>  0(6411) find_export: found <ul_insert_ucontact> in module usrloc [//lib/ser/modules/usrloc.so]
>  0(6411) find_export: found <ul_delete_ucontact> in module usrloc [//lib/ser/modules/usrloc.so]
>  0(6411) find_export: found <ul_get_ucontact> in module usrloc [//lib/ser/modules/usrloc.so]
>  0(6411) find_export: found <ul_update_ucontact> in module usrloc [//lib/ser/modules/usrloc.so]
>  0(6411) DEBUG: init_mod: group_radius
>  0(6411) group_radius - initializing
>  0(6411) DEBUG: init_mod: auth
>  0(6411) auth module - initializing
>  0(6411) find_export: found <sl_send_reply> in module sl_module [//lib/ser/modules/sl.so]
>  0(6411) DEBUG: init_mod: auth_radius
>  0(6411) auth_radius - Initializing
>  0(6411) find_export: found <pre_auth> in module auth [//lib/ser/modules/auth.so]
>  0(6411) find_export: found <post_auth> in module auth [//lib/ser/modules/auth.so]
>  0(6411) DEBUG: init_mod: acc
> acc - initializing
>  0(6411) find_export: found <load_tm> in module tm [//lib/ser/modules/tm.so]
>  0(6411) find_export: found <register_tmcb> in module tm [//lib/ser/modules/tm.so]
>  0(6411) find_export: found <t_relay_to_tcp> in module tm [//lib/ser/modules/tm.so]
>  0(6411) find_export: found <t_relay_to_udp> in module tm [//lib/ser/modules/tm.so]
>  0(6411) find_export: found <t_relay> in module tm [//lib/ser/modules/tm.so]
>  0(6411) find_export: found <t_reply> in module tm [//lib/ser/modules/tm.so]
>  0(6411) find_export: found <t_reply_with_body> in module tm [//lib/ser/modules/tm.so]
>  0(6411) find_export: found <t_is_local> in module tm [//lib/ser/modules/tm.so]
>  0(6411) find_export: found <t_get_trans_ident> in module tm [//lib/ser/modules/tm.so]
>  0(6411) find_export: found <t_lookup_ident> in module tm [//lib/ser/modules/tm.so]
>  0(6411) find_export: found <t_add_blind> in module tm [//lib/ser/modules/tm.so]
>  0(6411) find_export: found <t_forward_nonack> in module tm [//lib/ser/modules/tm.so]
>  0(6411) find_export: found <t_request_within> in module tm [//lib/ser/modules/tm.so]
>  0(6411) find_export: found <t_request_outside> in module tm [//lib/ser/modules/tm.so]
>  0(6411) find_export: found <t_request> in module tm [//lib/ser/modules/tm.so]
>  0(6411) find_export: found <new_dlg_uac> in module tm [//lib/ser/modules/tm.so]
>  0(6411) find_export: found <dlg_response_uac> in module tm [//lib/ser/modules/tm.so]
>  0(6411) find_export: found <new_dlg_uas> in module tm [//lib/ser/modules/tm.so]
>  0(6411) find_export: found <dlg_request_uas> in module tm [//lib/ser/modules/tm.so]
>  0(6411) find_export: found <free_dlg> in module tm [//lib/ser/modules/tm.so]
>  0(6411) find_export: found <print_dlg> in module tm [//lib/ser/modules/tm.so]
>  0(0) fixing //lib/ser/modules/maxfwd.so mf_process_maxfwd_header
>  0(0) fixing //lib/ser/modules/sl.so sl_send_reply
>  0(0) fixing //lib/ser/modules/sl.so sl_send_reply
>  0(0) fixing //lib/ser/modules/rr.so record_route
>  0(0) fixing //lib/ser/modules/rr.so loose_route
>  0(0) fixing //lib/ser/modules/tm.so t_relay
>  0(0) fixing //lib/ser/modules/auth_radius.so radius_www_authorize
>  0(0) fixing //lib/ser/modules/auth.so www_challenge
>  0(0) fixing //lib/ser/modules/registrar.so save
>  0(0) fixing //lib/ser/modules/registrar.so lookup
>  0(0) fixing //lib/ser/modules/sl.so sl_send_reply
>  0(0) fixing //lib/ser/modules/tm.so t_relay
>  0(0) fixing //lib/ser/modules/sl.so sl_reply_error
>  0(0) INFO: udp_init: SO_RCVBUF is initially 65535
>  0(0) DEBUG: udp_init: trying SO_RCVBUF: 131070
>  0(0) DEBUG: setting SO_RCVBUF; set=131070,verify=131070
>  0(0) DEBUG: udp_init: trying SO_RCVBUF: 262140
>  0(0) DEBUG: setting SO_RCVBUF; set=262140,verify=131070
>  0(0) DEBUG: setting SO_RCVBUF has no effect
>  0(0) DEBUG: udp_init: trying SO_RCVBUF: 133118
>  0(0) DEBUG: setting SO_RCVBUF; set=133118,verify=131070
>  0(0) DEBUG: setting SO_RCVBUF has no effect
>  0(0) INFO: udp_init: SO_RCVBUF is finally 131070
>  0(0) INFO: udp_init: SO_RCVBUF is initially 65535
>  0(0) DEBUG: udp_init: trying SO_RCVBUF: 131070
>  0(0) DEBUG: setting SO_RCVBUF; set=131070,verify=131070
>  0(0) DEBUG: udp_init: trying SO_RCVBUF: 262140
>  0(0) DEBUG: setting SO_RCVBUF; set=262140,verify=131070
>  0(0) DEBUG: setting SO_RCVBUF has no effect
>  0(0) DEBUG: udp_init: trying SO_RCVBUF: 133118
>  0(0) DEBUG: setting SO_RCVBUF; set=133118,verify=131070
>  0(0) DEBUG: setting SO_RCVBUF has no effect
>  0(0) INFO: udp_init: SO_RCVBUF is finally 131070
>  1(0) DEBUG: init_mod_child (1): tm
>  1(0) DEBUG: callid: '7edfe76a-0 at 127.0.0.1'
>  1(0) DEBUG: init_mod_child (1): usrloc
>  1(0) DEBUG: init_mod_child (1): acc
>  2(0) DEBUG: init_mod_child (2): tm
>  2(0) DEBUG: callid: '7edfe76a-0 at 127.0.0.1'
>  2(0) DEBUG: init_mod_child (2): usrloc
>  2(0) DEBUG: init_mod_child (2): acc
>  3(0) DEBUG: init_mod_child (3): tm
>  3(0) DEBUG: callid: '7edfe76a-0 at 127.0.0.1'
>  3(0) DEBUG: init_mod_child (3): usrloc
>  3(0) DEBUG: init_mod_child (3): acc
>  4(0) DEBUG: init_mod_child (4): tm
>  4(0) DEBUG: callid: '7edfe76a-0 at 127.0.0.1'
>  4(0) DEBUG: init_mod_child (4): usrloc
>  4(0) DEBUG: init_mod_child (4): acc
>  5(0) DEBUG: init_mod_child (5): tm
>  5(0) DEBUG: callid: '7edfe76a-0 at 127.0.0.1'
>  5(0) DEBUG: init_mod_child (5): usrloc
>  5(0) DEBUG: init_mod_child (5): acc
>  6(0) DEBUG: init_mod_child (6): tm
>  6(0) DEBUG: callid: '7edfe76a-0 at 127.0.0.1'
>  6(0) DEBUG: init_mod_child (6): usrloc
>  6(0) DEBUG: init_mod_child (6): acc
>  7(0) DEBUG: init_mod_child (7): tm
>  7(0) DEBUG: callid: '7edfe76a-0 at 127.0.0.1'
>  7(0) DEBUG: init_mod_child (7): usrloc
>  7(0) DEBUG: init_mod_child (7): acc
>  8(0) DEBUG: init_mod_child (8): tm
>  8(0) DEBUG: callid: '7edfe76a-0 at 127.0.0.1'
>  8(0) DEBUG: init_mod_child (8): usrloc
>  8(0) DEBUG: init_mod_child (8): acc
>  9(0) DEBUG: init_mod_child (1): tm
>  9(0) DEBUG: callid: '7edfe76a-0 at 200.110.2.132'
>  9(0) DEBUG: init_mod_child (1): usrloc
>  9(0) DEBUG: init_mod_child (1): acc
> 10(0) DEBUG: init_mod_child (2): tm
> 10(0) DEBUG: callid: '7edfe76a-0 at 200.110.2.132'
> 10(0) DEBUG: init_mod_child (2): usrloc
> 10(0) DEBUG: init_mod_child (2): acc
> 11(0) DEBUG: init_mod_child (3): tm
> 11(0) DEBUG: callid: '7edfe76a-0 at 200.110.2.132'
> 11(0) DEBUG: init_mod_child (3): usrloc
> 11(0) DEBUG: init_mod_child (3): acc
> 12(0) DEBUG: init_mod_child (4): tm
> 12(0) DEBUG: callid: '7edfe76a-0 at 200.110.2.132'
> 12(0) DEBUG: init_mod_child (4): usrloc
> 12(0) DEBUG: init_mod_child (4): acc
> 13(0) DEBUG: init_mod_child (5): tm
> 13(0) DEBUG: callid: '7edfe76a-0 at 200.110.2.132'
> 13(0) DEBUG: init_mod_child (5): usrloc
> 13(0) DEBUG: init_mod_child (5): acc
> 14(0) DEBUG: init_mod_child (6): tm
> 14(0) DEBUG: callid: '7edfe76a-0 at 200.110.2.132'
> 14(0) DEBUG: init_mod_child (6): usrloc
> 14(0) DEBUG: init_mod_child (6): acc
> 15(0) DEBUG: init_mod_child (7): tm
> 15(0) DEBUG: callid: '7edfe76a-0 at 200.110.2.132'
> 15(0) DEBUG: init_mod_child (7): usrloc
> 15(0) DEBUG: init_mod_child (7): acc
> 16(0) DEBUG: init_mod_child (8): tm
> 16(0) DEBUG: callid: '7edfe76a-0 at 200.110.2.132'
> 16(0) DEBUG: init_mod_child (8): usrloc
> 16(0) DEBUG: init_mod_child (8): acc
> 16(6427) DBG: open_uac_fifo: opening fifo...
> 16(6427) DEBUG: open_fifo_server: FIFO stat failed: Bad file descriptor
> 16(6427) DEBUG: FIFO created @ /tmp/ser_fifo
> 16(6427) DEBUG: fifo /tmp/ser_fifo opened, mode=432
> 17(0) INFO: fifo process starting: 6428
> 17(0) DEBUG: init_mod_child (-2): tm
> 17(0) DEBUG: callid: '7edfe76a-0 at 127.0.0.1'
> 17(0) DEBUG: init_mod_child (-2): usrloc
> 17(0) DEBUG: init_mod_child (-2): acc
> 18(0) DEBUG: init_mod_child (-1): tm
> 18(0) DEBUG: callid: '7edfe76a-0 at 127.0.0.1'
> 18(0) DEBUG: init_mod_child (-1): usrloc
> 18(0) DEBUG: init_mod_child (-1): acc
> 17(6428) SER: open_uac_fifo: fifo server up at /tmp/ser_fifo...
> 19(0) DEBUG: init_mod_child (9): tm
> 19(0) DEBUG: callid: '7edfe76a-0 at 127.0.0.1'
> 19(0) DEBUG: init_mod_child (9): usrloc
> 19(0) DEBUG: init_mod_child (9): acc
> 20(0) DEBUG: init_mod_child (10): tm
> 20(0) DEBUG: callid: '7edfe76a-0 at 127.0.0.1'
> 20(0) DEBUG: init_mod_child (10): usrloc
> 20(0) DEBUG: init_mod_child (10): acc
> 21(0) DEBUG: init_mod_child (11): tm
> 21(0) DEBUG: callid: '7edfe76a-0 at 127.0.0.1'
> 21(0) DEBUG: init_mod_child (11): usrloc
> 21(0) DEBUG: init_mod_child (11): acc
> 22(0) DEBUG: init_mod_child (12): tm
> 22(0) DEBUG: callid: '7edfe76a-0 at 127.0.0.1'
> 22(0) DEBUG: init_mod_child (12): usrloc
> 22(0) DEBUG: init_mod_child (12): acc
> 23(0) DEBUG: init_mod_child (13): tm
> 23(0) DEBUG: callid: '7edfe76a-0 at 127.0.0.1'
> 23(0) DEBUG: init_mod_child (13): usrloc
> 23(0) DEBUG: init_mod_child (13): acc
> 24(0) DEBUG: init_mod_child (14): tm
> 24(0) DEBUG: callid: '7edfe76a-0 at 127.0.0.1'
> 24(0) DEBUG: init_mod_child (14): usrloc
> 24(0) DEBUG: init_mod_child (14): acc
> 25(0) DEBUG: init_mod_child (15): tm
> 25(0) DEBUG: callid: '7edfe76a-0 at 127.0.0.1'
> 25(0) DEBUG: init_mod_child (15): usrloc
> 25(0) DEBUG: init_mod_child (15): acc
> 26(0) DEBUG: init_mod_child (16): tm
> 26(0) DEBUG: callid: '7edfe76a-0 at 127.0.0.1'
> 26(0) DEBUG: init_mod_child (16): usrloc
> 26(0) DEBUG: init_mod_child (16): acc
> 27(0) DEBUG: init_mod_child (-4): tm
> 27(0) DEBUG: callid: '7edfe76a-0 at 127.0.0.1'
> 27(0) DEBUG: init_mod_child (-4): usrloc
> 27(0) DEBUG: init_mod_child (-4): acc
>  0(6411) DEBUG: init_mod_child (0): tm
>  0(6411) DEBUG: callid: '7edfe76a-6411 at 127.0.0.1'
>  0(6411) DEBUG: init_mod_child (0): usrloc
>  0(6411) DEBUG: init_mod_child (0): acc

> 
> 
> ser:/ # 
> ser:/ # 13(6424) SIP Request:
> 13(6424)  method:  <INVITE>
> 13(6424)  uri:     <sip:6604000 at 200.110.2.132>
> 13(6424)  version: <SIP/2.0>
> 13(6424) parse_headers: flags=1
> 13(6424) Found param type 232, <branch> = <z9hG4bK6e00fdeaa4180>; state=16
> 13(6424) end of header reached, state=5
> 13(6424) parse_headers: Via found, flags=1
> 13(6424) parse_headers: this is the first via
> 13(6424) After parse_msg...
> 13(6424) preparing to run routing scripts...
> 13(6424) DEBUG : is_maxfwd_present: searching for max_forwards header
> 13(6424) parse_headers: flags=128
> 13(6424) end of header reached, state=9
> 13(6424) DEBUG: get_hdr_field: <To> [29]; uri=[sip:6604000 at 200.110.2.132] 
> 13(6424) DEBUG: to body [<sip:6604000 at 200.110.2.132>
> ]
> 13(6424) get_hdr_field: cseq <CSeq>: <180> <INVITE>
> 13(6424) DEBUG: get_hdr_body : content_length=137
> 13(6424) DEBUG: is_maxfwd_present: value = 70 
> 13(6424) DEBUG: add_param: tag=6e00fdeaa4
> 13(6424) end of header reached, state=29
> 13(6424) parse_headers: flags=256
> 13(6424) found end of header
> 13(6424) find_first_route(): No Route headers found
> 13(6424) loose_route(): There is no Route HF
> 13(6424) check_self - checking if host==us: 13==9 &&  [200.110.2.132] == [127.0.0.1]
> 13(6424) check_self - checking if port 5060 matches port 5060
> 13(6424) check_self - checking if host==us: 13==13 &&  [200.110.2.132] == [200.110.2.132]
> 13(6424) check_self - checking if port 5060 matches port 5060
> 13(6424) INVITE or BYE
> 13(6424) rwrite(): Rewriting Request-URI with 'sip:6604000 at 200.110.6.58'
> 13(6424) DEBUG: t_addifnew: msg id=4 , global msg id=0 , T on entrance=0xffffffff
> 13(6424) parse_headers: flags=-1
> 13(6424) parse_headers: flags=60
> 13(6424) t_lookup_request: start searching: hash=28567, isACK=0
> 13(6424) DEBUG: RFC3261 transaction matching failed
> 13(6424) DEBUG: t_lookup_request: no transaction found
> 13(6424) DBG: callback type 2, id 3 entered
> 13(6424) parse_headers: flags=44
> 13(6424) DEBUG: noisy_timer set for accounting
> 13(6424) SER: new INVITE
> 13(6424) parse_headers: flags=-1
> 13(6424) check_via_address(10.0.0.236, 10.0.0.236, 0)
> 13(6424) WARNING:vqm_resize: resize(0) called
> 13(6424) DEBUG: reply sent out. buf=0x80cb880: SIP/2.0 1..., shmem=0x402f6b10: SIP/2.0 1
> 13(6424) DEBUG: t_reply: finished
> 13(6424) DEBUG: mk_proxy: doing DNS lookup...
> 13(6424) check_via_address(10.0.0.236, 10.0.0.236, 0)
> 13(6424) DEBUG: add_to_tail_of_timer[4]: 0x402f5574
> 13(6424) DEBUG: add_to_tail_of_timer[0]: 0x402f5588
> 13(6424) SER: new transaction fwd'ed
> 13(6424) receive_msg: cleaning up
> 15(6426) SIP Reply  (status):
> 15(6426)  version: <SIP/2.0>
> 15(6426)  status:  <100>
> 15(6426)  reason:  <Trying>
> 15(6426) parse_headers: flags=1
> 15(6426) Found param type 232, <branch> = <z9hG4bK79f6.7d19d563.0>; state=16
> 15(6426) end of header reached, state=5
> 15(6426) parse_headers: Via found, flags=1
> 15(6426) parse_headers: this is the first via
> 15(6426) After parse_msg...
> 15(6426) forward_reply: found module tm, passing reply to it
> 15(6426) DEBUG: t_check: msg id=5 global id=0 T start=0xffffffff
> 15(6426) parse_headers: flags=17
> 15(6426) Found param type 232, <branch> = <z9hG4bK6e00fdeaa4180>; state=16
> 15(6426) end of header reached, state=5
> 15(6426) parse_headers: Via found, flags=17
> 15(6426) parse_headers: this is the second via
> 15(6426) end of header reached, state=9
> 15(6426) DEBUG: get_hdr_field: <To> [29]; uri=[sip:6604000 at 200.110.2.132] 
> 15(6426) DEBUG: to body [<sip:6604000 at 200.110.2.132>
> ]
> 15(6426) get_hdr_field: cseq <CSeq>: <180> <INVITE>
> 15(6426) parse_headers: flags=4
> 15(6426) DEBUG: t_reply_matching: hash 28567 label 912101847 branch 0
> 15(6426) DEBUG: t_reply_matching: reply matched (T=0x402f5450)!
> 15(6426) DBG: callback type 1, id 5 entered
> 15(6426) DEBUG: t_check: msg id=5 global id=5 T end=0x402f5450
> 15(6426) DEBUG: t_on_reply: org. status uas=100, uac[0]=0 local=0 is_invite=1)
> 15(6426) ->>>>>>>>> T_code=100, new_code=100
> 15(6426) DEBUG: relay_reply: branch=0, save=0, relay=-1
> 15(6426) DEBUG: add_to_tail_of_timer[1]: 0x402f5588
> 15(6426) receive_msg: cleaning up
> 10(6421) SIP Reply  (status):
> 10(6421)  version: <SIP/2.0>
> 10(6421)  status:  <180>
> 10(6421)  reason:  <Ringing>
> 10(6421) parse_headers: flags=1
> 10(6421) Found param type 232, <branch> = <z9hG4bK79f6.7d19d563.0>; state=16
> 10(6421) end of header reached, state=5
> 10(6421) parse_headers: Via found, flags=1
> 10(6421) parse_headers: this is the first via
> 10(6421) After parse_msg...
> 10(6421) forward_reply: found module tm, passing reply to it
> 10(6421) DEBUG: t_check: msg id=4 global id=0 T start=0xffffffff
> 10(6421) parse_headers: flags=17
> 10(6421) Found param type 232, <branch> = <z9hG4bK6e00fdeaa4180>; state=16
> 10(6421) end of header reached, state=5
> 10(6421) parse_headers: Via found, flags=17
> 10(6421) parse_headers: this is the second via
> 10(6421) DEBUG: add_param: tag=218f2c81a4
> 10(6421) end of header reached, state=29
> 10(6421) DEBUG: get_hdr_field: <To> [44]; uri=[sip:6604000 at 200.110.2.132] 
> 10(6421) DEBUG: to body [<sip:6604000 at 200.110.2.132>]
> 10(6421) get_hdr_field: cseq <CSeq>: <180> <INVITE>
> 10(6421) parse_headers: flags=4
> 10(6421) DEBUG: t_reply_matching: hash 28567 label 912101847 branch 0
> 10(6421) DEBUG: t_reply_matching: reply matched (T=0x402f5450)!
> 10(6421) DBG: callback type 1, id 5 entered
> 10(6421) DEBUG: t_check: msg id=4 global id=4 T end=0x402f5450
> 10(6421) DEBUG: t_on_reply: org. status uas=100, uac[0]=100 local=0 is_invite=1)
> 10(6421) ->>>>>>>>> T_code=100, new_code=180
> 10(6421) DEBUG: relay_reply: branch=0, save=0, relay=0
> 10(6421)  old size: 472, new size: 410
> 10(6421) build_res_from_sip_res: copied size: orig:83, new: 21, rest: 389 msg=
> SIP/2.0 180 Ringing
> Via: SIP/2.0/UDP 10.0.0.236:5060;branch=z9hG4bK6e00fdeaa4180
> From: <sip:6603000 at 200.110.2.132>;tag=6e00fdeaa4
> To: <sip:6604000 at 200.110.2.132>;tag=218f2c81a4
> Call-ID: 6e124000-5d1c-fd5d-80ea-0002a40055b2 at 10.0.0.236
> CSeq: 180 INVITE
> User-Agent: AddPac SIP Gateway
> Contact: sip:6604000 at 200.110.6.58
> Content-Length: 0
> Record-Route: <sip:6604000 at 200.110.2.132;ftag=6e00fdeaa4;lr=on>
> 
> 
> 10(6421) DEBUG: reply relayed. buf=0x80cb900: SIP/2.0 1..., shmem=0x402f6b10: SIP/2.0 1
> 10(6421) DBG: callback type 7, id 1 entered
> 10(6421) DEBUG: add_to_tail_of_timer[1]: 0x402f5588
> 10(6421) receive_msg: cleaning up
> 12(6423) SIP Request:
> 12(6423)  method:  <REGISTER>
> 12(6423)  uri:     <sip:200.110.2.132>
> 12(6423)  version: <SIP/2.0>
> 12(6423) parse_headers: flags=1
> 12(6423) Found param type 232, <branch> = <z9hG4bK2f003c00a422890>; state=16
> 12(6423) end of header reached, state=5
> 12(6423) parse_headers: Via found, flags=1
> 12(6423) parse_headers: this is the first via
> 12(6423) After parse_msg...
> 12(6423) preparing to run routing scripts...
> 12(6423) DEBUG : is_maxfwd_present: searching for max_forwards header
> 12(6423) parse_headers: flags=128
> 12(6423) end of header reached, state=8
> 12(6423) DEBUG: get_hdr_field: <To> [27]; uri=[sip:6600020 at 200.110.2.132] 
> 12(6423) DEBUG: to body [sip:6600020 at 200.110.2.132
> ]
> 12(6423) get_hdr_field: cseq <CSeq>: <22890> <REGISTER>
> 12(6423) DEBUG: get_hdr_body : content_length=0
> 12(6423) DEBUG: is_maxfwd_present: value = 70 
> 12(6423) DEBUG: add_param: tag=2f003c00a4
> 12(6423) end of header reached, state=29
> 12(6423) parse_headers: flags=256
> 12(6423) found end of header
> 12(6423) find_first_route(): No Route headers found
> 12(6423) loose_route(): There is no Route HF
> 12(6423) check_self - checking if host==us: 13==9 &&  [200.110.2.132] == [127.0.0.1]
> 12(6423) check_self - checking if port 5060 matches port 5060
> 12(6423) check_self - checking if host==us: 13==13 &&  [200.110.2.132] == [200.110.2.132]
> 12(6423) check_self - checking if port 5060 matches port 5060
> 12(6423) check_nonce(): comparing [40c5e31099e63fbafaee2c72c460ad2f587a5354] and [40c5e31099e63fbafaee2c72c460ad2f587a5354]
> 12(6423) radius_authorize_sterman(): Success
> 12(6423) save_rpid(): rpid value is ''
> 12(6423) parse_headers: flags=-1
> 12(6423) parse_headers: flags=-1
> 12(6423) check_via_address(10.0.0.236, 10.0.0.236, 0)
> 12(6423) receive_msg: cleaning up
> 13(6424) SIP Request:
> 13(6424)  method:  <REGISTER>
> 13(6424)  uri:     <sip:200.110.2.132>
> 13(6424)  version: <SIP/2.0>
> 13(6424) parse_headers: flags=1
> 13(6424) Found param type 232, <branch> = <z9hG4bK2f003c00a422891>; state=16
> 13(6424) end of header reached, state=5
> 13(6424) parse_headers: Via found, flags=1
> 13(6424) parse_headers: this is the first via
> 13(6424) After parse_msg...
> 13(6424) preparing to run routing scripts...
> 13(6424) DEBUG : is_maxfwd_present: searching for max_forwards header
> 13(6424) parse_headers: flags=128
> 13(6424) end of header reached, state=8
> 13(6424) DEBUG: get_hdr_field: <To> [27]; uri=[sip:6603000 at 200.110.2.132] 
> 13(6424) DEBUG: to body [sip:6603000 at 200.110.2.132
> ]
> 13(6424) get_hdr_field: cseq <CSeq>: <22891> <REGISTER>
> 13(6424) DEBUG: get_hdr_body : content_length=0
> 13(6424) DEBUG: is_maxfwd_present: value = 70 
> 13(6424) DEBUG: add_param: tag=2f003c00a4
> 13(6424) end of header reached, state=29
> 13(6424) parse_headers: flags=256
> 13(6424) found end of header
> 13(6424) find_first_route(): No Route headers found
> 13(6424) loose_route(): There is no Route HF
> 13(6424) check_self - checking if host==us: 13==9 &&  [200.110.2.132] == [127.0.0.1]
> 13(6424) check_self - checking if port 5060 matches port 5060
> 13(6424) check_self - checking if host==us: 13==13 &&  [200.110.2.132] == [200.110.2.132]
> 13(6424) check_self - checking if port 5060 matches port 5060
> 13(6424) check_nonce(): comparing [40c5e31099e63fbafaee2c72c460ad2f587a5354] and [40c5e31099e63fbafaee2c72c460ad2f587a5354]
> 13(6424) radius_authorize_sterman(): Success
> 13(6424) save_rpid(): rpid value is ''
> 13(6424) parse_headers: flags=-1
> 13(6424) parse_headers: flags=-1
> 13(6424) check_via_address(10.0.0.236, 10.0.0.236, 0)
> 13(6424) receive_msg: cleaning up
> 18(6429) DEBUG: timer routine:4,tl=0x402f5574 next=(nil)
> 16(6427) SIP Request:
> 16(6427)  method:  <REGISTER>
> 16(6427)  uri:     <sip:200.110.2.132>
> 16(6427)  version: <SIP/2.0>
> 16(6427) parse_headers: flags=1
> 16(6427) Found param type 232, <branch> = <z9hG4bK2f003c00a422892>; state=16
> 16(6427) end of header reached, state=5
> 16(6427) parse_headers: Via found, flags=1
> 16(6427) parse_headers: this is the first via
> 16(6427) After parse_msg...
> 16(6427) preparing to run routing scripts...
> 16(6427) DEBUG : is_maxfwd_present: searching for max_forwards header
> 16(6427) parse_headers: flags=128
> 16(6427) end of header reached, state=8
> 16(6427) DEBUG: get_hdr_field: <To> [27]; uri=[sip:6600020 at 200.110.2.132] 
> 16(6427) DEBUG: to body [sip:6600020 at 200.110.2.132
> ]
> 16(6427) get_hdr_field: cseq <CSeq>: <22892> <REGISTER>
> 16(6427) DEBUG: get_hdr_body : content_length=0
> 16(6427) DEBUG: is_maxfwd_present: value = 70 
> 16(6427) DEBUG: add_param: tag=2f003c00a4
> 16(6427) end of header reached, state=29
> 16(6427) parse_headers: flags=256
> 16(6427) found end of header
> 16(6427) find_first_route(): No Route headers found
> 16(6427) loose_route(): There is no Route HF
> 16(6427) check_self - checking if host==us: 13==9 &&  [200.110.2.132] == [127.0.0.1]
> 16(6427) check_self - checking if port 5060 matches port 5060
> 16(6427) check_self - checking if host==us: 13==13 &&  [200.110.2.132] == [200.110.2.132]
> 16(6427) check_self - checking if port 5060 matches port 5060
> 16(6427) check_nonce(): comparing [40c5e31099e63fbafaee2c72c460ad2f587a5354] and [40c5e31099e63fbafaee2c72c460ad2f587a5354]
> 16(6427) radius_authorize_sterman(): Success
> 16(6427) save_rpid(): rpid value is ''
> 16(6427) parse_headers: flags=-1
> 16(6427) parse_headers: flags=-1
> 16(6427) check_via_address(10.0.0.236, 10.0.0.236, 0)
> 16(6427) receive_msg: cleaning up
> 10(6421) SIP Request:
> 10(6421)  method:  <REGISTER>
> 10(6421)  uri:     <sip:200.110.2.132>
> 10(6421)  version: <SIP/2.0>
> 10(6421) parse_headers: flags=1
> 10(6421) Found param type 232, <branch> = <z9hG4bK2f003c00a422893>; state=16
> 10(6421) end of header reached, state=5
> 10(6421) parse_headers: Via found, flags=1
> 10(6421) parse_headers: this is the first via
> 10(6421) After parse_msg...
> 10(6421) preparing to run routing scripts...
> 10(6421) DEBUG : is_maxfwd_present: searching for max_forwards header
> 10(6421) parse_headers: flags=128
> 10(6421) end of header reached, state=8
> 10(6421) DEBUG: get_hdr_field: <To> [27]; uri=[sip:6603000 at 200.110.2.132] 
> 10(6421) DEBUG: to body [sip:6603000 at 200.110.2.132
> ]
> 10(6421) get_hdr_field: cseq <CSeq>: <22893> <REGISTER>
> 10(6421) DEBUG: get_hdr_body : content_length=0
> 10(6421) DEBUG: is_maxfwd_present: value = 70 
> 10(6421) DEBUG: add_param: tag=2f003c00a4
> 10(6421) end of header reached, state=29
> 10(6421) parse_headers: flags=256
> 10(6421) found end of header
> 10(6421) find_first_route(): No Route headers found
> 10(6421) loose_route(): There is no Route HF
> 10(6421) check_self - checking if host==us: 13==9 &&  [200.110.2.132] == [127.0.0.1]
> 10(6421) check_self - checking if port 5060 matches port 5060
> 10(6421) check_self - checking if host==us: 13==13 &&  [200.110.2.132] == [200.110.2.132]
> 10(6421) check_self - checking if port 5060 matches port 5060
> 10(6421) check_nonce(): comparing [40c5e31099e63fbafaee2c72c460ad2f587a5354] and [40c5e31099e63fbafaee2c72c460ad2f587a5354]
> 10(6421) radius_authorize_sterman(): Success
> 10(6421) save_rpid(): rpid value is ''
> 10(6421) parse_headers: flags=-1
> 10(6421) parse_headers: flags=-1
> 10(6421) check_via_address(10.0.0.236, 10.0.0.236, 0)
> 10(6421) receive_msg: cleaning up
> 11(6422) SIP Reply  (status):
> 11(6422)  version: <SIP/2.0>
> 11(6422)  status:  <200>
> 11(6422)  reason:  <OK>
> 11(6422) parse_headers: flags=1
> 11(6422) Found param type 232, <branch> = <z9hG4bK79f6.7d19d563.0>; state=16
> 11(6422) end of header reached, state=5
> 11(6422) parse_headers: Via found, flags=1
> 11(6422) parse_headers: this is the first via
> 11(6422) After parse_msg...
> 11(6422) forward_reply: found module tm, passing reply to it
> 11(6422) DEBUG: t_check: msg id=6 global id=0 T start=0xffffffff
> 11(6422) parse_headers: flags=17
> 11(6422) Found param type 232, <branch> = <z9hG4bK6e00fdeaa4180>; state=16
> 11(6422) end of header reached, state=5
> 11(6422) parse_headers: Via found, flags=17
> 11(6422) parse_headers: this is the second via
> 11(6422) DEBUG: add_param: tag=218f2c81a4
> 11(6422) end of header reached, state=29
> 11(6422) DEBUG: get_hdr_field: <To> [44]; uri=[sip:6604000 at 200.110.2.132] 
> 11(6422) DEBUG: to body [<sip:6604000 at 200.110.2.132>]
> 11(6422) get_hdr_field: cseq <CSeq>: <180> <INVITE>
> 11(6422) parse_headers: flags=4
> 11(6422) DEBUG: t_reply_matching: hash 28567 label 912101847 branch 0
> 11(6422) DEBUG: t_reply_matching: reply matched (T=0x402f5450)!
> 11(6422) parse_headers: flags=4
> 11(6422) DBG: callback type 1, id 5 entered
> 11(6422) parse_headers: flags=4
> 11(6422) DEBUG: t_check: msg id=6 global id=6 T end=0x402f5450
> 11(6422) DEBUG: t_on_reply: org. status uas=180, uac[0]=180 local=0 is_invite=1)
> 11(6422) ->>>>>>>>> T_code=180, new_code=200
> 11(6422) DEBUG: relay_reply: branch=0, save=0, relay=0
> 11(6422)  old size: 682, new size: 620
> 11(6422) build_res_from_sip_res: copied size: orig:78, new: 16, rest: 604 msg=
> SIP/2.0 200 OK
> Via: SIP/2.0/UDP 10.0.0.236:5060;branch=z9hG4bK6e00fdeaa4180
> From: <sip:6603000 at 200.110.2.132>;tag=6e00fdeaa4
> To: <sip:6604000 at 200.110.2.132>;tag=218f2c81a4
> Call-ID: 6e124000-5d1c-fd5d-80ea-0002a40055b2 at 10.0.0.236
> CSeq: 180 INVITE
> Session-Expires: 1800;refresher=uac
> User-Agent: AddPac SIP Gateway
> Contact: sip:6604000 at 200.110.6.58
> Require: timer
> Content-Type: application/sdp
> Content-Length: 129
> Record-Route: <sip:6604000 at 200.110.2.132;ftag=6e00fdeaa4;lr=on>
> 
> v=0
> o=AddpacTechSIP-GW-UserAgent 0 0 IN IP4 200.110.6.58
> s=SIP Session
> c=IN IP4 200.110.6.58
> t=0 0
> m=audio 23120 RTP/AVP 4
> 
> 11(6422) DEBUG: update_totag_set: new totag 
> 11(6422) DEBUG: reply relayed. buf=0x80cbda0: SIP/2.0 2..., shmem=0x402f70d8: SIP/2.0 2
> 11(6422) DBG: callback type 7, id 1 entered
> 18(6429) DEBUG: timer routine:1,tl=0x402f5588 next=(nil)
> 
> 




More information about the sr-users mailing list