[Serusers] buggy CANCEL hangling?

Antanas Masevicius zolia at z1sys.com
Fri Sep 17 10:19:21 CEST 2004



On Thu, 16 Sep 2004, Jan Janak wrote:

> B_CANCEL_prob does not contain contain any CANCEL, the last message I
> can see is 18
Yes, this is exaclty what it is. Last message SER sends to 213.226.186.195
is INVITE and last what SER gets is 180 Ringing.

>
> In A_CANCEL_prob SER forwards the INVITE to itself but different number,
> what happens next I do not know because I do not see the messages being
> sent over the loopback. The request probably did not make it to the
> callee and so ser sends "no more pending branches". That's correct.

SER in our setup works as transparent proxy (iptables redirects all
traffic to SER and after authorization SER forwards it to original
destination (213.226.186.195). After sniffing all interfaces i didn't
detected any other messages i sent you last time. I added a cut from SER
log to this CANCEL related transaction if it may be of any help.

Could it be some sort of delay related?

Antanas

>
>    Jan.
>
> On 16-09 13:53, Antanas Masevicius wrote:
> > adding ngrep dumps for both sides. In my setup:
> >
> > 82.135.142.16 A client
> > 213.226.186.250 SER
> > 213.226.186.195 SIP proxy
> > 82.135.142.22 B client
> >
> > On Thu, 16 Sep 2004, Jan Janak wrote:
> >
> > > Could you send me SIP message dumps ?
> > >
> > >   Jan.
> > >
> > > On 16-09 12:28, Antanas Masevicius wrote:
> > > > yes, in normal situation, i get "200 cancelling" and "487 Request
> > > > cancelled". In my case i just get "200 ok -- no more pending
> > > > branches", INVITE IS forwarded further and tries to establish a call, but
> > > > i don't see any forwarded CANCEL messages. Activity would look like this:
> > > >
> > > > A client     SER                    B client
> > > >
> > > > INVITE ----> INVITE       ------->
> > > > CANCEL ---->(doesn't forward)
> > > >        <---- [100 trying -- your call is important to us]
> > > >        <---- [200 ok no more pending br..]
> > > >        <---- [487 Request cancelled]
> > > >
> > > > does this 100 trying means that SER doesn't intend to
> > > > cancel transaction?
> > > >
> > > > On Thu, 16 Sep 2004, Jan Janak wrote:
> > > >
> > > > > SER does not send 100 to CANCEL. It tries to lookup the original INVITE
> > > > > transaction and sends back 200 (immediately) if found. Then it sends 487
> > > > > when all downstream branches have been cancelled.
> > > > >
> > > > >    Jan.
> > > > >
> > > > > On 15-09 17:56, Antanas Masevicius wrote:
> > > > > > Hello,
> > > > > >
> > > > > > my configuration follows:
> > > > > >
> > > > > > SIPclientA <--> SER(0.8.14) <--> SIPproxy <--> SIPclientB
> > > > > >
> > > > > > SER performs authorization and forwards all REGISTER requets to SIPproxy.
> > > > > >
> > > > > > Scenario:
> > > > > > SIPclientA calls to SIPclientB, then changes his mind and releases call.
> > > > > > SIPclientA generates CANCEL, but this CANCEL isn't forwarded to SIPproxy
> > > > > > by SER and SIPproxy continues its conversation with SIPclientB by
> > > > > > forwarding "180 Ringing" to SIPclientA.
> > > > > >
> > > > > > This isn't the case if SIPclientA receives "180 Ringing" by the time it
> > > > > > sends CANCEL.
> > > > > >
> > > > > > What client gets in first case is:
> > > > > > t_reply( t_cancel, cancel_msg, 200, "ok, no more pending branches" );
> > > > > >
> > > > > > and to my understanding is should be:
> > > > > > t_reply( t_cancel, cancel_msg, 100, "trying to cancel" );
> > > > > >
> > > > > > ngrep looks like:
> > > > > >
> > > > > > U 82.135.142.16:5060 -> 213.226.186.195:5060
> > > > > > CANCEL sip:70000037 at 213.226.186.195 SIP/2.0..
> > > > > > From: <sip:70000031 at 213.226.186.195>;tag=0-13c4-4148435c-1f825298-792d..
> > > > > > To: <sip:70000037 at 213.226.186.195>..
> > > > > >   Call-ID: cc4698-0-13c4-4148435c-1f825298-157 at 213.226.186.195..CSeq: 2
> > > > > > CANCEL..Via: SIP/2.0/UDP 82.135.142.16:5060;branch=z9hG4bK-4148435c-1f82552c-60b0..
> > > > > > Max-Forwards: 70..
> > > > > > Supported: 100rel..
> > > > > > User-Agent: SIP-RG..
> > > > > > Authorization: Digest username="70000031", realm="213.226.186.195",
> > > > > > nonce="414844890f0b1edbefcbd
> > > > > >   badce4c02ed59f058ef", uri="sip:70000037 at 213.226.186.195",
> > > > > > response="5d22fe8fe3517aa72a51b8abc83bd9f2",
> > > > > > algorithm=MD5..Content-Length: 0....
> > > > > >
> > > > > > #
> > > > > > U 213.226.186.195:5060 -> 82.135.142.16:5060
> > > > > >   SIP/2.0 200 ok -- no more pending branches..
> > > > > > From: <sip:70000031 at 213.226.186.195>;tag=0-13c4-4148435c-1f825298-792d..
> > > > > > To: <sip:70000037 at 213.226.186.195>;tag=855fc458e92794ef4dd58c58d38d34d1-0196..Call-ID:
> > > > > > cc4698-0-13c4-4148435c-1f825298-157 at 213.226.186.195..CSeq: 2 CANCEL..
> > > > > > Via: SIP/2.0/UDP 82.135.142.16:5060;branch=z9hG4bK-4148435c-1f82552c-60b0..Server: Sip EXpress router
> > > > > > (0.8.14 (i386/linux))..Content-Length: 0..Warning: 392
> > > > > > 213.226.186.250:5060 "Noisy feedback tells:  pid=17371 req_src_ip=82.135.142.16 req_src_port=5060
> > > > > > in_uri=sip:70000037 at 213.226.186.195 out_uri=sip:70000037 at 213.226.186.195
> > > > > > via_cnt==1".
> > > > > >
> > > > > > Somehow SER doesn't detect in this case that it already forwarded INVITE
> > > > > > and that is needs to be CANCEL'ed.
> > > > > >
> > > > > > Here i provide logs for both cases. If more logs are needed, tell me.
> > > > > > What could be the reason of such behaviour?
> > > > > >
> > > > > > SER handling of CANCEL in case of proper termination:
> > > > > >
> > > > > > ser[17364]:  method:  <CANCEL>
> > > > > > ser[17364]:  uri:     <sip:70000037 at 213.226.186.195>
> > > > > > ser[17364]:  version: <SIP/2.0>
> > > > > > ser[17364]: parse_headers: flags=1
> > > > > > ser[17364]: end of header reached, state=9
> > > > > > ser[17364]: DEBUG: get_hdr_field: <To> [32];
> > > > > > uri=[sip:70000037 at 213.226.186.195]
> > > > > > ser[17364]: DEBUG: to body [<sip:70000037 at 213.226.186.195>^M ]
> > > > > > ser[17364]: get_hdr_field: cseq <CSeq>: <2> <CANCEL>
> > > > > > ser[17364]: Found param type 232, <branch> =
> > > > > > <z9hG4bK-41483835-1f56c420-429>; state=16
> > > > > > ser[17364]: end of header reached, state=5
> > > > > > ser[17364]: parse_headers: Via found, flags=1
> > > > > > ser[17364]: parse_headers: this is the first via
> > > > > > ser[17364]: After parse_msg...
> > > > > > ser[17364]: preparing to run routing scripts...
> > > > > > ser[17364]: DEBUG: add_param: tag=0-13c4-41483835-1f56c394-362
> > > > > > ser[17364]: end of header reached, state=29
> > > > > > ser[17364]: parse_headers: flags=256
> > > > > > ser[17364]: DEBUG: get_hdr_body : content_length=0
> > > > > > ser[17364]: found end of header
> > > > > > ser[17364]: find_first_route(): No Route headers found
> > > > > > ser[17364]: loose_route(): There is no Route HF
> > > > > > ser[17364]: DEBUG: t_addifnew: msg id=14502 , global msg id=14501 , T on
> > > > > > entrance=0xffffffff
> > > > > > ser[17364]: parse_headers: flags=-1
> > > > > > ser[17364]: parse_headers: flags=60
> > > > > > ser[17364]: t_lookup_request: start searching: hash=21608, isACK=0
> > > > > > ser[17364]: DEBUG: RFC3261 transaction matching failed
> > > > > > ser[17364]: DEBUG: t_lookup_request: no transaction found
> > > > > > ser[17364]: DEBUG: t_lookupOriginalT: searching on hash entry 21608
> > > > > > ser[17364]: DEBUG: RFC3261 transaction matched, tid=-41483835-1f56c420-429
> > > > > > ser[17364]: DEBUG: t_lookupOriginalT: canceled transaction found
> > > > > > (0x402ea680)!
> > > > > > ser[17364]: DEBUG: t_lookupOriginalT completed
> > > > > > ser[17364]: check_via_address(82.135.142.16, 82.135.142.16, 0)
> > > > > > ser[17364]: DEBUG: add_to_tail_of_timer[4]: 0x402ed988
> > > > > > ser[17364]: DEBUG: add_to_tail_of_timer[0]: 0x402ed99c
> > > > > > ser[17364]: DEBUG: e2e_cancel: e2e cancel proceeding
> > > > > > ser[17364]: parse_headers: flags=-1
> > > > > > ser[17364]: check_via_address(82.135.142.16, 82.135.142.16, 0)
> > > > > > ser[17364]: WARNING:vqm_resize: resize(0) called
> > > > > > ser[17364]: DEBUG: cleanup_uacs: RETR/FR timers reset
> > > > > > ser[17364]: DEBUG: add_to_tail_of_timer[2]: 0x402ed8a8
> > > > > > ser[17364]: DEBUG: reply sent out. buf=0x80e07f0: SIP/2.0 2...,
> > > > > > shmem=0x402cc9b8: SIP/2.0 2
> > > > > > ser[17364]: DEBUG: t_reply: finished
> > > > > > ser[17364]: DEBUG: e2e_cancel: sending 487
> > > > > > ser[17364]: parse_headers: flags=-1
> > > > > > ser[17364]: check_via_address(82.135.142.16, 82.135.142.16, 0)
> > > > > > ser[17364]: DEBUG: cleanup_uacs: RETR/FR timers reset
> > > > > > ser[17364]: DEBUG: add_to_tail_of_timer[4]: 0x402ea734
> > > > > > ser[17364]: DEBUG: add_to_tail_of_timer[0]: 0x402ea748
> > > > > > ser[17364]: DEBUG: reply sent out. buf=0x80e07f0: SIP/2.0 4...,
> > > > > > shmem=0x402d14b8: SIP/2.0 4
> > > > > > ser[17364]: DEBUG: t_reply: finished
> > > > > > ser[17364]: SER: new transaction fwd'ed
> > > > > > ser[17364]: DEBUG:destroy_avp_list: destroing list (nil)
> > > > > > ser[17364]: receive_msg: cleaning up
> > > > > >
> > > > > >
> > > > > > SER handling of CANCEL in case of inproper termination:
> > > > > >
> > > > > > ser[17359]: SIP Request:
> > > > > > ser[17359]:  method:  <CANCEL>
> > > > > > ser[17359]:  uri:     <sip:70000037 at 213.226.186.195>
> > > > > > ser[17359]:  version: <SIP/2.0>
> > > > > > ser[17359]: parse_headers: flags=1
> > > > > > ser[17359]: end of header reached, state=9
> > > > > > ser[17359]: DEBUG: get_hdr_field: <To> [32];
> > > > > > uri=[sip:70000037 at 213.226.186.195]
> > > > > > ser[17359]: DEBUG: to body [<sip:70000037 at 213.226.186.195>^M ]
> > > > > > ser[17359]: get_hdr_field: cseq <CSeq>: <2> <CANCEL>
> > > > > > ser[17359]: Found param type 232, <branch> =
> > > > > > <z9hG4bK-414837ae-1f54b338-47f1>; state=16
> > > > > > ser[17359]: end of header reached, state=5
> > > > > > ser[17359]: parse_headers: Via found, flags=1
> > > > > > ser[17359]: parse_headers: this is the first via
> > > > > > ser[17359]: After parse_msg...
> > > > > > ser[17359]: preparing to run routing scripts...
> > > > > > ser[17359]: DEBUG: add_param: tag=0-13c4-414837ad-1f54b1bc-5d0a
> > > > > > ser[17359]: end of header reached, state=29
> > > > > > ser[17359]: parse_headers: flags=256
> > > > > > ser[17359]: DEBUG: get_hdr_body : content_length=0
> > > > > > ser[17359]: found end of header
> > > > > > ser[17359]: find_first_route(): No Route headers found
> > > > > > ser[17359]: loose_route(): There is no Route HF
> > > > > > ser[17359]: DEBUG: t_addifnew: msg id=14611 , global msg id=14608 , T on
> > > > > > entrance=(nil)
> > > > > > ser[17359]: parse_headers: flags=-1
> > > > > > ser[17359]: parse_headers: flags=60
> > > > > > ser[17359]: t_lookup_request: start searching: hash=36669, isACK=0
> > > > > > ser[17359]: DEBUG: RFC3261 transaction matching failed
> > > > > > ser[17359]: DEBUG: t_lookup_request: no transaction found
> > > > > > ser[17359]: DEBUG: t_lookupOriginalT: searching on hash entry 36669
> > > > > > ser[17359]: DEBUG: RFC3261 transaction matched,
> > > > > > tid=-414837ae-1f54b338-47f1
> > > > > > ser[17359]: DEBUG: t_lookupOriginalT: canceled transaction found
> > > > > > (0x402ea680)!
> > > > > > ser[17359]: DEBUG: t_lookupOriginalT completed
> > > > > > ser[17359]: DEBUG: e2e_cancel: e2e cancel -- no more pending branches
> > > > > > ser[17359]: parse_headers: flags=-1
> > > > > > ser[17359]: check_via_address(82.135.142.16, 82.135.142.16, 0)
> > > > > > ser[17359]: WARNING:vqm_resize: resize(0) called
> > > > > > ser[17359]: DEBUG: cleanup_uacs: RETR/FR timers reset
> > > > > > ser[17359]: DEBUG: add_to_tail_of_timer[2]: 0x402e4f98
> > > > > > ser[17359]: DEBUG: reply sent out. buf=0x80e1540: SIP/2.0 2...,
> > > > > > shmem=0x402d0828: SIP/2.0 2
> > > > > > ser[17359]: DEBUG: t_reply: finished
> > > > > > ser[17359]: DEBUG: e2e_cancel: sending 487
> > > > > > ser[17359]: parse_headers: flags=-1
> > > > > > ser[17359]: check_via_address(82.135.142.16, 82.135.142.16, 0)
> > > > > > ser[17359]: DEBUG: cleanup_uacs: RETR/FR timers reset
> > > > > > ser[17359]: DEBUG: add_to_tail_of_timer[4]: 0x402ea734
> > > > > > ser[17359]: DEBUG: add_to_tail_of_timer[0]: 0x402ea748
> > > > > > ser[17359]: DEBUG: reply sent out. buf=0x80e0c90: SIP/2.0 4...,
> > > > > > shmem=0x402dada0: SIP/2.0 4
> > > > > > ser[17359]: DEBUG: t_reply: finished
> > > > > > ser[17359]: SER: new transaction fwd'ed
> > > > > > ser[17359]: DEBUG:destroy_avp_list: destroing list (nil)
> > > > > >
> > > > > >
> > > > > > Antanas
> > > > > >
> > > > > > _______________________________________________
> > > > > > Serusers mailing list
> > > > > > serusers at lists.iptel.org
> > > > > > http://lists.iptel.org/mailman/listinfo/serusers
> > > > >
> > >
> > interface: eth2 (213.226.186.250/255.255.255.255)
> > match: 82.135.142.16
> > ########################
> > U 213.226.186.250:5060 -> 213.226.186.195:5060
> > INVITE sip:70000037 at 213.226.186.195 SIP/2.0.
> > Record-Route: <sip:70000037 at 213.226.186.250;ftag=0-13c4-41496c88-66b7b4-cac;lr=on>.
> > From: <sip:70000031 at 213.226.186.195>;tag=0-13c4-41496c88-66b7b4-cac.
> > To: <sip:70000037 at 213.226.186.195>.
> > Call-ID: cc4544-0-13c4-41496c88-66b7b4-72fe at 213.226.186.195.
> > CSeq: 2 INVITE.
> > Via: SIP/2.0/UDP 213.226.186.250;branch=z9hG4bKa706.a59b4431.0.
> > Via: SIP/2.0/UDP 82.135.142.16:5060;branch=z9hG4bK-41496c88-66b840-6d7b.
> > Max-Forwards: 70.
> > Supported: 100rel.
> > User-Agent: SIP-RG.
> > Contact: <sip:70000031 at 82.135.142.16>.
> > Authorization: Digest username="70000031", realm="213.226.186.195", nonce="41496db50f6ff90e24656717077421318025d85f", uri="sip:70000037 at 213.226.186.195", response="492b8c270b7c7a570a5d5d1b32342ca5", algorithm=MD5.
> > Content-Type: application/sdp.
> > Content-Length: 227.
> > .
> > v=0.
> > o=SIP-TA 0 0 IN IP4 82.135.142.16.
> > s=52878E10 07D0 52878E10 07D0 02 0.
> > c=IN IP4 82.135.142.16.
> > t=0 0.
> > m=audio 4014 RTP/AVP 18 8 0 4.
> > a=rtpmap:18 G729/8000.
> > a=rtpmap:8 PCMA/8000.
> > a=rtpmap:0 PCMU/8000.
> > a=rtpmap:4 G723/8000.
> >
> > ##
> > U 213.226.186.250:5060 -> 213.226.186.195:5060
> > INVITE sip:70000037 at 213.226.186.195 SIP/2.0.
> > Record-Route: <sip:70000037 at 213.226.186.250;ftag=0-13c4-41496c88-66b7b4-cac;lr=on>.
> > From: <sip:70000031 at 213.226.186.195>;tag=0-13c4-41496c88-66b7b4-cac.
> > To: <sip:70000037 at 213.226.186.195>.
> > Call-ID: cc4544-0-13c4-41496c88-66b7b4-72fe at 213.226.186.195.
> > CSeq: 2 INVITE.
> > Via: SIP/2.0/UDP 213.226.186.250;branch=z9hG4bKa706.a59b4431.0.
> > Via: SIP/2.0/UDP 82.135.142.16:5060;branch=z9hG4bK-41496c88-66b840-6d7b.
> > Max-Forwards: 70.
> > Supported: 100rel.
> > User-Agent: SIP-RG.
> > Contact: <sip:70000031 at 82.135.142.16>.
> > Authorization: Digest username="70000031", realm="213.226.186.195", nonce="41496db50f6ff90e24656717077421318025d85f", uri="sip:70000037 at 213.226.186.195", response="492b8c270b7c7a570a5d5d1b32342ca5", algorithm=MD5.
> > Content-Type: application/sdp.
> > Content-Length: 227.
> > .
> > v=0.
> > o=SIP-TA 0 0 IN IP4 82.135.142.16.
> > s=52878E10 07D0 52878E10 07D0 02 0.
> > c=IN IP4 82.135.142.16.
> > t=0 0.
> > m=audio 4014 RTP/AVP 18 8 0 4.
> > a=rtpmap:18 G729/8000.
> > a=rtpmap:8 PCMA/8000.
> > a=rtpmap:0 PCMU/8000.
> > a=rtpmap:4 G723/8000.
> >
> > ############
> > U 213.226.186.195:5060 -> 213.226.186.250:5060
> > SIP/2.0 180 Ringing.
> > Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, REFER, NOTIFY, REGISTER.
> > Supported: timer .
> > Via: SIP/2.0/UDP 213.226.186.250;branch=z9hG4bKa706.a59b4431.0.
> > Via: SIP/2.0/UDP 82.135.142.16:5060;branch=z9hG4bK-41496c88-66b840-6d7b.
> > Record-Route: <sip:70000037 at 213.226.186.250;ftag=0-13c4-41496c88-66b7b4-cac;lr=on>.
> > To: <sip:70000037 at 213.226.186.195>.
> > From: <sip:70000031 at 213.226.186.195>;tag=0-13c4-41496c88-66b7b4-cac.
> > Call-ID: cc4544-0-13c4-41496c88-66b7b4-72fe at 213.226.186.195.
> > X-SHOUT-Channel: INBOUND 1:15:26:1.
> > CSeq: 2 INVITE.
> > User-Agent: SHOUT 3.3.4v6.
> > Content-Length: 0.
> > .
> >
> > ###############exit
> > 55 received, 0 dropped
>
> > interface: eth1 (213.226.186.224/255.255.255.224)
> > match: 82.135.142.16
> > #####################################
> > U 82.135.142.16:5060 -> 213.226.186.195:5060
> > INVITE sip:70000037 at 213.226.186.195 SIP/2.0.
> > From: <sip:70000031 at 213.226.186.195>;tag=0-13c4-41496c88-66b7b4-cac.
> > To: <sip:70000037 at 213.226.186.195>.
> > Call-ID: cc4544-0-13c4-41496c88-66b7b4-72fe at 213.226.186.195.
> > CSeq: 1 INVITE.
> > Via: SIP/2.0/UDP 82.135.142.16:5060;branch=z9hG4bK-41496c88-66b7b4-7d75.
> > Max-Forwards: 70.
> > Supported: 100rel.
> > User-Agent: SIP-RG.
> > Contact: <sip:70000031 at 82.135.142.16>.
> > Content-Type: application/sdp.
> > Content-Length: 227.
> > .
> > v=0.
> > o=SIP-TA 0 0 IN IP4 82.135.142.16.
> > s=52878E10 07D0 52878E10 07D0 02 0.
> > c=IN IP4 82.135.142.16.
> > t=0 0.
> > m=audio 4014 RTP/AVP 18 8 0 4.
> > a=rtpmap:18 G729/8000.
> > a=rtpmap:8 PCMA/8000.
> > a=rtpmap:0 PCMU/8000.
> > a=rtpmap:4 G723/8000.
> >
> > #
> > U 213.226.186.195:5060 -> 82.135.142.16:5060
> > SIP/2.0 401 Unauthorized.
> > From: <sip:70000031 at 213.226.186.195>;tag=0-13c4-41496c88-66b7b4-cac.
> > To: <sip:70000037 at 213.226.186.195>;tag=58451be0870a0a50b35bf0ab28a442d9.032c.
> > Call-ID: cc4544-0-13c4-41496c88-66b7b4-72fe at 213.226.186.195.
> > CSeq: 1 INVITE.
> > Via: SIP/2.0/UDP 82.135.142.16:5060;branch=z9hG4bK-41496c88-66b7b4-7d75.
> > WWW-Authenticate: Digest realm="213.226.186.195", nonce="41496db50f6ff90e24656717077421318025d85f".
> > Server: Sip EXpress router (0.8.14 (i386/linux)).
> > Content-Length: 0.
> > Warning: 392 213.226.186.250:5060 "Noisy feedback tells:  pid=20513 req_src_ip=82.135.142.16 req_src_port=5060 in_uri=sip:70000037 at 213.226.186.195 out_uri=sip:70000037 at 213.226.186.195 via_cnt==1".
> > .
> >
> > #
> > U 82.135.142.16:5060 -> 213.226.186.195:5060
> > ACK sip:70000037 at 213.226.186.195 SIP/2.0.
> > From: <sip:70000031 at 213.226.186.195>;tag=0-13c4-41496c88-66b7b4-cac.
> > To: <sip:70000037 at 213.226.186.195>;tag=58451be0870a0a50b35bf0ab28a442d9.032c.
> > Call-ID: cc4544-0-13c4-41496c88-66b7b4-72fe at 213.226.186.195.
> > CSeq: 1 ACK.
> > Via: SIP/2.0/UDP 82.135.142.16:5060;branch=z9hG4bK-41496c88-66b7b4-7d75.
> > Max-Forwards: 70.
> > User-Agent: SIP-RG.
> > Contact: <sip:70000031 at 82.135.142.16>.
> > Content-Length: 0.
> > .
> >
> > #
> > U 82.135.142.16:5060 -> 213.226.186.195:5060
> > INVITE sip:70000037 at 213.226.186.195 SIP/2.0.
> > From: <sip:70000031 at 213.226.186.195>;tag=0-13c4-41496c88-66b7b4-cac.
> > To: <sip:70000037 at 213.226.186.195>.
> > Call-ID: cc4544-0-13c4-41496c88-66b7b4-72fe at 213.226.186.195.
> > CSeq: 2 INVITE.
> > Via: SIP/2.0/UDP 82.135.142.16:5060;branch=z9hG4bK-41496c88-66b840-6d7b.
> > Max-Forwards: 70.
> > Supported: 100rel.
> > User-Agent: SIP-RG.
> > Contact: <sip:70000031 at 82.135.142.16>.
> > Authorization: Digest username="70000031", realm="213.226.186.195", nonce="41496db50f6ff90e24656717077421318025d85f", uri="sip:70000037 at 213.226.186.195", response="492b8c270b7c7a570a5d5d1b32342ca5", algorithm=MD5.
> > Content-Type: application/sdp.
> > Content-Length: 227.
> > .
> > v=0.
> > o=SIP-TA 0 0 IN IP4 82.135.142.16.
> > s=52878E10 07D0 52878E10 07D0 02 0.
> > c=IN IP4 82.135.142.16.
> > t=0 0.
> > m=audio 4014 RTP/AVP 18 8 0 4.
> > a=rtpmap:18 G729/8000.
> > a=rtpmap:8 PCMA/8000.
> > a=rtpmap:0 PCMU/8000.
> > a=rtpmap:4 G723/8000.
> >
> > #
> > U 213.226.186.195:5060 -> 82.135.142.16:5060
> > SIP/2.0 100 trying -- your call is important to us.
> > From: <sip:70000031 at 213.226.186.195>;tag=0-13c4-41496c88-66b7b4-cac.
> > To: <sip:70000037 at 213.226.186.195>.
> > Call-ID: cc4544-0-13c4-41496c88-66b7b4-72fe at 213.226.186.195.
> > CSeq: 2 INVITE.
> > Via: SIP/2.0/UDP 82.135.142.16:5060;branch=z9hG4bK-41496c88-66b840-6d7b.
> > Server: Sip EXpress router (0.8.14 (i386/linux)).
> > Content-Length: 0.
> > Warning: 392 213.226.186.250:5060 "Noisy feedback tells:  pid=20518 req_src_ip=82.135.142.16 req_src_port=5060 in_uri=sip:70000037 at 213.226.186.195 out_uri=sip:70000037 at 213.226.186.195 via_cnt==1".
> > .
> >
> > #############
> > U 82.135.142.16:5060 -> 213.226.186.195:5060
> > CANCEL sip:70000037 at 213.226.186.195 SIP/2.0.
> > From: <sip:70000031 at 213.226.186.195>;tag=0-13c4-41496c88-66b7b4-cac.
> > To: <sip:70000037 at 213.226.186.195>.
> > Call-ID: cc4544-0-13c4-41496c88-66b7b4-72fe at 213.226.186.195.
> > CSeq: 2 CANCEL.
> > Via: SIP/2.0/UDP 82.135.142.16:5060;branch=z9hG4bK-41496c88-66b840-6d7b.
> > Max-Forwards: 70.
> > Supported: 100rel.
> > User-Agent: SIP-RG.
> > Authorization: Digest username="70000031", realm="213.226.186.195", nonce="41496db50f6ff90e24656717077421318025d85f", uri="sip:70000037 at 213.226.186.195", response="da3636f2b421718f7e47bb1a1b3ad7f1", algorithm=MD5.
> > Content-Length: 0.
> > .
> >
> > #
> > U 213.226.186.195:5060 -> 82.135.142.16:5060
> > SIP/2.0 200 ok -- no more pending branches.
> > From: <sip:70000031 at 213.226.186.195>;tag=0-13c4-41496c88-66b7b4-cac.
> > To: <sip:70000037 at 213.226.186.195>;tag=855fc458e92794ef4dd58c58d38d34d1-da37.
> > Call-ID: cc4544-0-13c4-41496c88-66b7b4-72fe at 213.226.186.195.
> > CSeq: 2 CANCEL.
> > Via: SIP/2.0/UDP 82.135.142.16:5060;branch=z9hG4bK-41496c88-66b840-6d7b.
> > Server: Sip EXpress router (0.8.14 (i386/linux)).
> > Content-Length: 0.
> > Warning: 392 213.226.186.250:5060 "Noisy feedback tells:  pid=20519 req_src_ip=82.135.142.16 req_src_port=5060 in_uri=sip:70000037 at 213.226.186.195 out_uri=sip:70000037 at 213.226.186.195 via_cnt==1".
> > .
> >
> > #
> > U 213.226.186.195:5060 -> 82.135.142.16:5060
> > SIP/2.0 487 Request cancelled.
> > From: <sip:70000031 at 213.226.186.195>;tag=0-13c4-41496c88-66b7b4-cac.
> > To: <sip:70000037 at 213.226.186.195>;tag=855fc458e92794ef4dd58c58d38d34d1-da37.
> > Call-ID: cc4544-0-13c4-41496c88-66b7b4-72fe at 213.226.186.195.
> > CSeq: 2 INVITE.
> > Via: SIP/2.0/UDP 82.135.142.16:5060;branch=z9hG4bK-41496c88-66b840-6d7b.
> > Server: Sip EXpress router (0.8.14 (i386/linux)).
> > Content-Length: 0.
> > Warning: 392 213.226.186.250:5060 "Noisy feedback tells:  pid=20519 req_src_ip=82.135.142.16 req_src_port=5060 in_uri=sip:70000037 at 213.226.186.195 out_uri=sip:70000037 at 213.226.186.195 via_cnt==1".
> > .
> >
> > ##
> > U 82.135.142.16:5060 -> 213.226.186.195:5060
> > ACK sip:70000037 at 213.226.186.195 SIP/2.0.
> > From: <sip:70000031 at 213.226.186.195>;tag=0-13c4-41496c88-66b7b4-cac.
> > To: <sip:70000037 at 213.226.186.195>;tag=855fc458e92794ef4dd58c58d38d34d1-da37.
> > Call-ID: cc4544-0-13c4-41496c88-66b7b4-72fe at 213.226.186.195.
> > CSeq: 2 ACK.
> > Via: SIP/2.0/UDP 82.135.142.16:5060;branch=z9hG4bK-41496c88-66b840-6d7b.
> > Max-Forwards: 70.
> > User-Agent: SIP-RG.
> > Contact: <sip:70000031 at 82.135.142.16>.
> > Content-Length: 0.
> > .
> >
> > ###########################################exit
> > 122 received, 0 dropped
>
> _______________________________________________
> Serusers mailing list
> serusers at lists.iptel.org
> http://lists.iptel.org/mailman/listinfo/serusers
>
-------------- next part --------------
Sep 17 10:54:45 siege ./ser[20518]: SIP Request: 
Sep 17 10:54:45 siege ./ser[20518]:  method:  <INVITE> 
Sep 17 10:54:45 siege ./ser[20518]:  uri:     <sip:70000037 at 213.226.186.195> 
Sep 17 10:54:45 siege ./ser[20518]:  version: <SIP/2.0> 
Sep 17 10:54:45 siege ./ser[20518]: parse_headers: flags=1 
Sep 17 10:54:45 siege ./ser[20518]: end of header reached, state=9 
Sep 17 10:54:45 siege ./ser[20518]: DEBUG: get_hdr_field: <To> [32]; uri=[sip:70000037 at 213.226.186.195]  
Sep 17 10:54:45 siege ./ser[20518]: DEBUG: to body [<sip:70000037 at 213.226.186.195>^M ] 
Sep 17 10:54:45 siege ./ser[20518]: get_hdr_field: cseq <CSeq>: <1> <INVITE> 
Sep 17 10:54:45 siege ./ser[20518]: Found param type 232, <branch> = <z9hG4bK-414a9843-402bb98-1030>; state=16 
Sep 17 10:54:45 siege ./ser[20518]: end of header reached, state=5 
Sep 17 10:54:45 siege ./ser[20518]: parse_headers: Via found, flags=1 
Sep 17 10:54:45 siege ./ser[20518]: parse_headers: this is the first via 
Sep 17 10:54:45 siege ./ser[20518]: After parse_msg... 
Sep 17 10:54:45 siege ./ser[20518]: preparing to run routing scripts... 
Sep 17 10:54:45 siege ./ser[20518]: DEBUG: add_param: tag=0-13c4-414a9843-402bb98-1973 
Sep 17 10:54:45 siege ./ser[20518]: end of header reached, state=29 
Sep 17 10:54:45 siege ./ser[20518]: parse_headers: flags=256 
Sep 17 10:54:45 siege ./ser[20518]: DEBUG: get_hdr_body : content_length=227 
Sep 17 10:54:45 siege ./ser[20518]: found end of header 
Sep 17 10:54:45 siege ./ser[20518]: find_first_route(): No Route headers found 
Sep 17 10:54:45 siege ./ser[20518]: loose_route(): There is no Route HF 
Sep 17 10:54:45 siege ./ser[20518]: parse_headers: flags=4096 
Sep 17 10:54:45 siege ./ser[20518]: pre_auth(): Credentials with given realm not found 
Sep 17 10:54:45 siege ./ser[20518]: build_auth_hf(): 'WWW-Authenticate: Digest realm="213.226.186.195", nonce="414a99719d77734549ab6e83f2227bdb0db8218d"^M ' 
Sep 17 10:54:45 siege ./ser[20518]: parse_headers: flags=-1 
Sep 17 10:54:45 siege ./ser[20518]: check_via_address(82.135.142.16, 82.135.142.16, 0) 
Sep 17 10:54:45 siege ./ser[20518]: DEBUG: get_out_socket: socket determined: 0 
Sep 17 10:54:45 siege ./ser[20518]: DEBUG:destroy_avp_list: destroing list (nil) 
Sep 17 10:54:45 siege ./ser[20518]: receive_msg: cleaning up 
Sep 17 10:54:45 siege ./ser[20507]: SIP Request: 
Sep 17 10:54:45 siege ./ser[20507]:  method:  <ACK> 
Sep 17 10:54:45 siege ./ser[20507]:  uri:     <sip:70000037 at 213.226.186.195> 
Sep 17 10:54:45 siege ./ser[20507]:  version: <SIP/2.0> 
Sep 17 10:54:45 siege ./ser[20507]: parse_headers: flags=1 
Sep 17 10:54:45 siege ./ser[20507]: DEBUG: add_param: tag=58451be0870a0a50b35bf0ab28a442d9.7dfd 
Sep 17 10:54:45 siege ./ser[20507]: end of header reached, state=29 
Sep 17 10:54:45 siege ./ser[20507]: DEBUG: get_hdr_field: <To> [74]; uri=[sip:70000037 at 213.226.186.195]  
Sep 17 10:54:45 siege ./ser[20507]: DEBUG: to body [<sip:70000037 at 213.226.186.195>] 
Sep 17 10:54:45 siege ./ser[20507]: get_hdr_field: cseq <CSeq>: <1> <ACK> 
Sep 17 10:54:45 siege ./ser[20507]: Found param type 232, <branch> = <z9hG4bK-414a9843-402bb98-1030>; state=16 
Sep 17 10:54:45 siege ./ser[20507]: end of header reached, state=5 
Sep 17 10:54:45 siege ./ser[20507]: parse_headers: Via found, flags=1 
Sep 17 10:54:45 siege ./ser[20507]: parse_headers: this is the first via 
Sep 17 10:54:45 siege ./ser[20507]: After parse_msg... 
Sep 17 10:54:45 siege ./ser[20507]: preparing to run routing scripts... 
Sep 17 10:54:45 siege ./ser[20507]: parse_headers: flags=4 
Sep 17 10:54:45 siege ./ser[20507]: DEBUG: sl_filter_ACK : local ACK found -> dropping it!  
Sep 17 10:54:45 siege ./ser[20507]: DEBUG:destroy_avp_list: destroing list (nil) 
Sep 17 10:54:45 siege ./ser[20507]: receive_msg: cleaning up 
Sep 17 10:54:45 siege ./ser[20512]: SIP Request: 
Sep 17 10:54:45 siege ./ser[20512]:  method:  <INVITE> 
Sep 17 10:54:45 siege ./ser[20512]:  uri:     <sip:70000037 at 213.226.186.195> 
Sep 17 10:54:45 siege ./ser[20512]:  version: <SIP/2.0> 
Sep 17 10:54:45 siege ./ser[20512]: parse_headers: flags=1 
Sep 17 10:54:45 siege ./ser[20512]: end of header reached, state=9 
Sep 17 10:54:45 siege ./ser[20512]: DEBUG: get_hdr_field: <To> [32]; uri=[sip:70000037 at 213.226.186.195]  
Sep 17 10:54:45 siege ./ser[20512]: DEBUG: to body [<sip:70000037 at 213.226.186.195>^M ] 
Sep 17 10:54:45 siege ./ser[20512]: get_hdr_field: cseq <CSeq>: <2> <INVITE> 
Sep 17 10:54:45 siege ./ser[20512]: Found param type 232, <branch> = <z9hG4bK-414a9843-402bc24-1a2e>; state=16 
Sep 17 10:54:45 siege ./ser[20512]: end of header reached, state=5 
Sep 17 10:54:45 siege ./ser[20512]: parse_headers: Via found, flags=1 
Sep 17 10:54:45 siege ./ser[20512]: parse_headers: this is the first via 
Sep 17 10:54:45 siege ./ser[20512]: After parse_msg... 
Sep 17 10:54:45 siege ./ser[20512]: preparing to run routing scripts... 
Sep 17 10:54:45 siege ./ser[20512]: DEBUG: add_param: tag=0-13c4-414a9843-402bb98-1973 
Sep 17 10:54:45 siege ./ser[20512]: end of header reached, state=29 
Sep 17 10:54:45 siege ./ser[20512]: parse_headers: flags=256 
Sep 17 10:54:45 siege ./ser[20512]: DEBUG: get_hdr_body : content_length=227 
Sep 17 10:54:45 siege ./ser[20512]: found end of header 
Sep 17 10:54:45 siege ./ser[20512]: find_first_route(): No Route headers found 
Sep 17 10:54:45 siege ./ser[20512]: loose_route(): There is no Route HF 
Sep 17 10:54:45 siege ./ser[20512]: check_nonce(): comparing [414a99719d77734549ab6e83f2227bdb0db8218d] and [414a99719d77734549ab6e83f2227bdb0db8218d] 
Sep 17 10:54:45 siege ./ser[20512]: query="select password from subscriber where username='70000031' AND domain='213.226.186.195' AND acc_ip='82.135.142.16'" 
Sep 17 10:54:45 siege ./ser[20512]: HA1 string calculated: ef55dba3f323e9dd829e746d56c34938 
Sep 17 10:54:45 siege ./ser[20512]: check_response(): Our result = 'df8104e1577572762333556115d2b8e3' 
Sep 17 10:54:45 siege ./ser[20512]: check_response(): Authorization is OK 
Sep 17 10:54:45 siege ./ser[20512]: save_rpid(): rpid value is '' 
Sep 17 10:54:45 siege ./ser[20512]: DEBUG: t_addifnew: msg id=5816 , global msg id=5815 , T on entrance=0xffffffff 
Sep 17 10:54:45 siege ./ser[20512]: parse_headers: flags=-1 
Sep 17 10:54:45 siege ./ser[20512]: parse_headers: flags=60 
Sep 17 10:54:45 siege ./ser[20512]: t_lookup_request: start searching: hash=32382, isACK=0 
Sep 17 10:54:45 siege ./ser[20512]: DEBUG: RFC3261 transaction matching failed 
Sep 17 10:54:45 siege ./ser[20512]: DEBUG: t_lookup_request: no transaction found 
Sep 17 10:54:45 siege ./ser[20512]: DEBUG: get_out_socket: socket determined: 0 
Sep 17 10:54:45 siege ./ser[20512]: SER: new INVITE 
Sep 17 10:54:45 siege ./ser[20512]: parse_headers: flags=-1 
Sep 17 10:54:45 siege ./ser[20512]: check_via_address(82.135.142.16, 82.135.142.16, 0) 
Sep 17 10:54:45 siege ./ser[20512]: WARNING:vqm_resize: resize(0) called 
Sep 17 10:54:45 siege ./ser[20512]: DEBUG: reply sent out. buf=0x80e1200: SIP/2.0 1..., shmem=0x402e4d80: SIP/2.0 1 
Sep 17 10:54:45 siege ./ser[20512]: DEBUG: t_reply: finished 
Sep 17 10:54:45 siege ./ser[20512]: DEBUG: mk_proxy: doing DNS lookup... 
Sep 17 10:54:45 siege ./ser[20512]: DEBUG: get_out_socket: socket determined: 0 
Sep 17 10:54:45 siege ./ser[20512]: check_via_address(82.135.142.16, 82.135.142.16, 0) 
Sep 17 10:54:45 siege ./ser[20512]: DEBUG: add_to_tail_of_timer[4]: 0x402f8c28 
Sep 17 10:54:45 siege ./ser[20512]: DEBUG: add_to_tail_of_timer[0]: 0x402f8c3c 
Sep 17 10:54:45 siege ./ser[20512]: SER: new transaction fwd'ed 
Sep 17 10:54:45 siege ./ser[20512]: DEBUG:destroy_avp_list: destroing list (nil) 
Sep 17 10:54:45 siege ./ser[20512]: receive_msg: cleaning up 
Sep 17 10:54:46 siege ./ser[20525]: DEBUG: timer routine:4,tl=0x402f8c28 next=(nil) 
Sep 17 10:54:46 siege ./ser[20525]: DEBUG: retransmission_handler : request resending (t=0x402f8b00, INVITE si ... ) 
Sep 17 10:54:46 siege ./ser[20525]: DEBUG: add_to_tail_of_timer[5]: 0x402f8c28 
Sep 17 10:54:46 siege ./ser[20525]: DEBUG: retransmission_handler : done 
Sep 17 10:54:46 siege ./ser[20513]: SIP Request: 
Sep 17 10:54:46 siege ./ser[20513]:  method:  <CANCEL> 
Sep 17 10:54:46 siege ./ser[20513]:  uri:     <sip:70000037 at 213.226.186.195> 
Sep 17 10:54:46 siege ./ser[20513]:  version: <SIP/2.0> 
Sep 17 10:54:46 siege ./ser[20513]: parse_headers: flags=1 
Sep 17 10:54:46 siege ./ser[20513]: end of header reached, state=9 
Sep 17 10:54:46 siege ./ser[20513]: DEBUG: get_hdr_field: <To> [32]; uri=[sip:70000037 at 213.226.186.195]  
Sep 17 10:54:46 siege ./ser[20513]: DEBUG: to body [<sip:70000037 at 213.226.186.195>^M ] 
Sep 17 10:54:46 siege ./ser[20513]: get_hdr_field: cseq <CSeq>: <2> <CANCEL> 
Sep 17 10:54:46 siege ./ser[20513]: Found param type 232, <branch> = <z9hG4bK-414a9843-402bc24-1a2e>; state=16 
Sep 17 10:54:46 siege ./ser[20513]: end of header reached, state=5 
Sep 17 10:54:46 siege ./ser[20513]: parse_headers: Via found, flags=1 
Sep 17 10:54:46 siege ./ser[20513]: parse_headers: this is the first via 
Sep 17 10:54:46 siege ./ser[20513]: After parse_msg... 
Sep 17 10:54:46 siege ./ser[20513]: preparing to run routing scripts... 
Sep 17 10:54:46 siege ./ser[20513]: DEBUG: add_param: tag=0-13c4-414a9843-402bb98-1973 
Sep 17 10:54:46 siege ./ser[20513]: end of header reached, state=29 
Sep 17 10:54:46 siege ./ser[20513]: parse_headers: flags=256 
Sep 17 10:54:46 siege ./ser[20513]: DEBUG: get_hdr_body : content_length=0 
Sep 17 10:54:46 siege ./ser[20513]: found end of header 
Sep 17 10:54:46 siege ./ser[20513]: find_first_route(): No Route headers found 
Sep 17 10:54:46 siege ./ser[20513]: loose_route(): There is no Route HF 
Sep 17 10:54:46 siege ./ser[20513]: DEBUG: t_addifnew: msg id=5747 , global msg id=5746 , T on entrance=(nil) 
Sep 17 10:54:46 siege ./ser[20513]: parse_headers: flags=-1 
Sep 17 10:54:46 siege ./ser[20513]: parse_headers: flags=60 
Sep 17 10:54:46 siege ./ser[20513]: t_lookup_request: start searching: hash=32382, isACK=0 
Sep 17 10:54:46 siege ./ser[20513]: DEBUG: RFC3261 transaction matching failed 
Sep 17 10:54:46 siege ./ser[20513]: DEBUG: t_lookup_request: no transaction found 
Sep 17 10:54:46 siege ./ser[20513]: DEBUG: get_out_socket: socket determined: 0 
Sep 17 10:54:46 siege ./ser[20513]: DEBUG: t_lookupOriginalT: searching on hash entry 32382 
Sep 17 10:54:46 siege ./ser[20513]: DEBUG: RFC3261 transaction matched, tid=-414a9843-402bc24-1a2e 
Sep 17 10:54:46 siege ./ser[20513]: DEBUG: t_lookupOriginalT: canceled transaction found (0x402f8b00)!  
Sep 17 10:54:46 siege ./ser[20513]: DEBUG: t_lookupOriginalT completed 
Sep 17 10:54:46 siege ./ser[20513]: DEBUG: e2e_cancel: e2e cancel -- no more pending branches 
Sep 17 10:54:46 siege ./ser[20513]: parse_headers: flags=-1 
Sep 17 10:54:46 siege ./ser[20513]: check_via_address(82.135.142.16, 82.135.142.16, 0) 
Sep 17 10:54:46 siege ./ser[20513]: WARNING:vqm_resize: resize(0) called 
Sep 17 10:54:46 siege ./ser[20513]: DEBUG: cleanup_uacs: RETR/FR timers reset 
Sep 17 10:54:46 siege ./ser[20513]: DEBUG: add_to_tail_of_timer[2]: 0x402dff60 
Sep 17 10:54:46 siege ./ser[20513]: DEBUG: reply sent out. buf=0x80e1040: SIP/2.0 2..., shmem=0x402d3bc0: SIP/2.0 2 
Sep 17 10:54:46 siege ./ser[20513]: DEBUG: t_reply: finished 
Sep 17 10:54:46 siege ./ser[20513]: DEBUG: e2e_cancel: sending 487 
Sep 17 10:54:46 siege ./ser[20513]: parse_headers: flags=-1 
Sep 17 10:54:46 siege ./ser[20513]: check_via_address(82.135.142.16, 82.135.142.16, 0) 
Sep 17 10:54:46 siege ./ser[20513]: DEBUG: cleanup_uacs: RETR/FR timers reset 
Sep 17 10:54:46 siege ./ser[20513]: DEBUG: add_to_tail_of_timer[4]: 0x402f8bb4 
Sep 17 10:54:46 siege ./ser[20513]: DEBUG: add_to_tail_of_timer[0]: 0x402f8bc8 
Sep 17 10:54:46 siege ./ser[20513]: DEBUG: reply sent out. buf=0x80e1040: SIP/2.0 4..., shmem=0x402e2938: SIP/2.0 4 
Sep 17 10:54:46 siege ./ser[20513]: DEBUG: t_reply: finished 
Sep 17 10:54:46 siege ./ser[20513]: SER: new transaction fwd'ed 
Sep 17 10:54:46 siege ./ser[20513]: DEBUG:destroy_avp_list: destroing list (nil) 
Sep 17 10:54:46 siege ./ser[20513]: receive_msg: cleaning up 
Sep 17 10:54:46 siege ./ser[20507]: SIP Request: 
Sep 17 10:54:46 siege ./ser[20507]:  method:  <ACK> 
Sep 17 10:54:46 siege ./ser[20507]:  uri:     <sip:70000037 at 213.226.186.195> 
Sep 17 10:54:46 siege ./ser[20507]:  version: <SIP/2.0> 
Sep 17 10:54:46 siege ./ser[20507]: parse_headers: flags=1 
Sep 17 10:54:46 siege ./ser[20507]: DEBUG: add_param: tag=855fc458e92794ef4dd58c58d38d34d1-1dcd 
Sep 17 10:54:46 siege ./ser[20507]: end of header reached, state=29 
Sep 17 10:54:46 siege ./ser[20507]: DEBUG: get_hdr_field: <To> [74]; uri=[sip:70000037 at 213.226.186.195]  
Sep 17 10:54:46 siege ./ser[20507]: DEBUG: to body [<sip:70000037 at 213.226.186.195>] 
Sep 17 10:54:46 siege ./ser[20507]: get_hdr_field: cseq <CSeq>: <2> <ACK> 
Sep 17 10:54:46 siege ./ser[20507]: Found param type 232, <branch> = <z9hG4bK-414a9843-402bc24-1a2e>; state=16 
Sep 17 10:54:46 siege ./ser[20507]: end of header reached, state=5 
Sep 17 10:54:46 siege ./ser[20507]: parse_headers: Via found, flags=1 
Sep 17 10:54:46 siege ./ser[20507]: parse_headers: this is the first via 
Sep 17 10:54:46 siege ./ser[20507]: After parse_msg... 
Sep 17 10:54:46 siege ./ser[20507]: preparing to run routing scripts... 
Sep 17 10:54:46 siege ./ser[20507]: parse_headers: flags=4 
Sep 17 10:54:46 siege ./ser[20507]: DEBUG: add_param: tag=0-13c4-414a9843-402bb98-1973 
Sep 17 10:54:46 siege ./ser[20507]: end of header reached, state=29 
Sep 17 10:54:46 siege ./ser[20507]: parse_headers: flags=256 
Sep 17 10:54:46 siege ./ser[20507]: DEBUG: get_hdr_body : content_length=0 
Sep 17 10:54:46 siege ./ser[20507]: found end of header 
Sep 17 10:54:46 siege ./ser[20507]: find_first_route(): No Route headers found 
Sep 17 10:54:46 siege ./ser[20507]: loose_route(): There is no Route HF 
Sep 17 10:54:46 siege ./ser[20507]: DEBUG: t_addifnew: msg id=5729 , global msg id=5727 , T on entrance=0xffffffff 
Sep 17 10:54:46 siege ./ser[20507]: parse_headers: flags=-1 
Sep 17 10:54:46 siege ./ser[20507]: parse_headers: flags=60 
Sep 17 10:54:46 siege ./ser[20507]: t_lookup_request: start searching: hash=32382, isACK=1 
Sep 17 10:54:46 siege ./ser[20507]: DEBUG: RFC3261 transaction matched, tid=-414a9843-402bc24-1a2e 
Sep 17 10:54:46 siege ./ser[20507]: DEBUG: t_lookup_request: transaction found (T=0x402f8b00) 
Sep 17 10:54:46 siege ./ser[20507]: DEBUG: cleanup_uacs: RETR/FR timers reset 
Sep 17 10:54:46 siege ./ser[20507]: DEBUG: add_to_tail_of_timer[2]: 0x402f8b48 
Sep 17 10:54:46 siege ./ser[20507]: DEBUG:destroy_avp_list: destroing list (nil) 
Sep 17 10:54:46 siege ./ser[20507]: receive_msg: cleaning up 
Sep 17 10:54:47 siege ./ser[20525]: DEBUG: timer routine:0,tl=0x402f8c3c next=0x402f8bc8 
Sep 17 10:54:47 siege ./ser[20525]: DEBUG: timer routine:0,tl=0x402f8bc8 next=(nil) 
Sep 17 10:54:47 siege ./ser[20525]: DEBUG: timer routine:4,tl=0x402f8bb4 next=(nil) 
Sep 17 10:54:47 siege ./ser[20525]: DEBUG: timer routine:5,tl=0x402f8c28 next=(nil) 
Sep 17 10:54:47 siege ./ser[20519]: SIP Request: 
Sep 17 10:54:47 siege ./ser[20519]:  method:  <INVITE> 
Sep 17 10:54:47 siege ./ser[20519]:  uri:     <sip:70000037 at 82.135.142.22> 
Sep 17 10:54:47 siege ./ser[20519]:  version: <SIP/2.0> 
Sep 17 10:54:47 siege ./ser[20519]: parse_headers: flags=1 
Sep 17 10:54:47 siege ./ser[20519]: end of header reached, state=2 
Sep 17 10:54:47 siege ./ser[20519]: parse_headers: Via found, flags=1 
Sep 17 10:54:47 siege ./ser[20519]: parse_headers: this is the first via 
Sep 17 10:54:47 siege ./ser[20519]: After parse_msg... 
Sep 17 10:54:47 siege ./ser[20519]: preparing to run routing scripts... 
Sep 17 10:54:47 siege ./ser[20519]: parse_headers: flags=8 
Sep 17 10:54:47 siege ./ser[20519]: end of header reached, state=9 
Sep 17 10:54:47 siege ./ser[20519]: DEBUG: get_hdr_field: <To> [30]; uri=[sip:70000037 at 82.135.142.22]  
Sep 17 10:54:47 siege ./ser[20519]: DEBUG: to body [<sip:70000037 at 82.135.142.22>^M ] 
Sep 17 10:54:47 siege ./ser[20519]: DEBUG: add_param: tag=b960e3f 
Sep 17 10:54:47 siege ./ser[20519]: end of header reached, state=29 
Sep 17 10:54:47 siege ./ser[20519]: parse_headers: flags=256 
Sep 17 10:54:47 siege ./ser[20519]: get_hdr_field: cseq <CSeq>: <1> <INVITE> 
Sep 17 10:54:47 siege ./ser[20519]: DEBUG: get_hdr_body : content_length=180 
Sep 17 10:54:47 siege ./ser[20519]: found end of header 
Sep 17 10:54:47 siege ./ser[20519]: find_first_route(): No Route headers found 
Sep 17 10:54:47 siege ./ser[20519]: loose_route(): There is no Route HF 
Sep 17 10:54:47 siege ./ser[20519]: DEBUG: t_addifnew: msg id=5712 , global msg id=5711 , T on entrance=0xffffffff 
Sep 17 10:54:47 siege ./ser[20519]: parse_headers: flags=-1 
Sep 17 10:54:47 siege ./ser[20519]: parse_headers: flags=60 
Sep 17 10:54:47 siege ./ser[20519]: t_lookup_request: start searching: hash=12319, isACK=0 
Sep 17 10:54:47 siege ./ser[20519]: DEBUG: proceeding to pre-RFC3261 transaction matching 
Sep 17 10:54:47 siege ./ser[20519]: DEBUG: t_lookup_request: no transaction found 
Sep 17 10:54:47 siege ./ser[20519]: DEBUG: get_out_socket: socket determined: 0 
Sep 17 10:54:47 siege ./ser[20519]: SER: new INVITE 
Sep 17 10:54:47 siege ./ser[20519]: parse_headers: flags=-1 
Sep 17 10:54:47 siege ./ser[20519]: check_via_address(213.226.186.195, 213.226.186.195, 0) 
Sep 17 10:54:47 siege ./ser[20519]: WARNING:vqm_resize: resize(0) called 
Sep 17 10:54:47 siege ./ser[20519]: DEBUG: reply sent out. buf=0x80de4a8: SIP/2.0 1..., shmem=0x402dd670: SIP/2.0 1 
Sep 17 10:54:47 siege ./ser[20519]: DEBUG: t_reply: finished 
Sep 17 10:54:47 siege ./ser[20519]: DEBUG: mk_proxy: doing DNS lookup... 
Sep 17 10:54:47 siege ./ser[20519]: DEBUG: get_out_socket: socket determined: 0 
Sep 17 10:54:47 siege ./ser[20519]: check_via_address(213.226.186.195, 213.226.186.195, 0) 
Sep 17 10:54:47 siege ./ser[20519]: DEBUG: add_to_tail_of_timer[4]: 0x402f6610 
Sep 17 10:54:47 siege ./ser[20519]: DEBUG: add_to_tail_of_timer[0]: 0x402f6624 
Sep 17 10:54:47 siege ./ser[20519]: SER: new transaction fwd'ed 
Sep 17 10:54:47 siege ./ser[20519]: DEBUG:destroy_avp_list: destroing list (nil) 
Sep 17 10:54:47 siege ./ser[20519]: receive_msg: cleaning up 
Sep 17 10:54:47 siege ./ser[20511]: SIP Reply  (status): 
Sep 17 10:54:47 siege ./ser[20511]:  version: <SIP/2.0> 
Sep 17 10:54:47 siege ./ser[20511]:  status:  <100> 
Sep 17 10:54:47 siege ./ser[20511]:  reason:  <trying> 
Sep 17 10:54:47 siege ./ser[20511]: parse_headers: flags=1 
Sep 17 10:54:47 siege ./ser[20511]: Found param type 232, <branch> = <z9hG4bKf103.8f202116.0>; state=16 
Sep 17 10:54:47 siege ./ser[20511]: end of header reached, state=5 
Sep 17 10:54:47 siege ./ser[20511]: parse_headers: Via found, flags=1 
Sep 17 10:54:47 siege ./ser[20511]: parse_headers: this is the first via 
Sep 17 10:54:47 siege ./ser[20511]: After parse_msg... 
Sep 17 10:54:47 siege ./ser[20511]: forward_reply: found module tm, passing reply to it 
Sep 17 10:54:47 siege ./ser[20511]: DEBUG: t_check: msg id=5909 global id=5908 T start=0xffffffff 
Sep 17 10:54:47 siege ./ser[20511]: parse_headers: flags=17 
Sep 17 10:54:47 siege ./ser[20511]: end of header reached, state=2 
Sep 17 10:54:47 siege ./ser[20511]: parse_headers: Via found, flags=17 
Sep 17 10:54:47 siege ./ser[20511]: parse_headers: this is the second via 
Sep 17 10:54:47 siege ./ser[20511]: end of header reached, state=9 
Sep 17 10:54:47 siege ./ser[20511]: DEBUG: get_hdr_field: <To> [30]; uri=[sip:70000037 at 82.135.142.22]  
Sep 17 10:54:47 siege ./ser[20511]: DEBUG: to body [<sip:70000037 at 82.135.142.22>^M ] 
Sep 17 10:54:47 siege ./ser[20511]: get_hdr_field: cseq <CSeq>: <1> <INVITE> 
Sep 17 10:54:47 siege ./ser[20511]: parse_headers: flags=4 
Sep 17 10:54:47 siege ./ser[20511]: DEBUG: t_reply_matching: hash 12319 label 1628570360 branch 0 
Sep 17 10:54:47 siege ./ser[20511]: DEBUG: t_reply_matching: reply matched (T=0x402f64e8)! 
Sep 17 10:54:47 siege ./ser[20511]: DEBUG: t_check: msg id=5909 global id=5909 T end=0x402f64e8 
Sep 17 10:54:47 siege ./ser[20511]: DEBUG: t_on_reply: org. status uas=100, uac[0]=0 local=0 is_invite=1) 
Sep 17 10:54:47 siege ./ser[20511]: ->>>>>>>>> T_code=100, new_code=100 
Sep 17 10:54:47 siege ./ser[20511]: DEBUG: relay_reply: branch=0, save=0, relay=-1 
Sep 17 10:54:47 siege ./ser[20511]: DEBUG: add_to_tail_of_timer[1]: 0x402f6624 
Sep 17 10:54:47 siege ./ser[20511]: DEBUG:destroy_avp_list: destroing list (nil) 
Sep 17 10:54:47 siege ./ser[20511]: receive_msg: cleaning up 
Sep 17 10:54:47 siege ./ser[20517]: SIP Reply  (status): 
Sep 17 10:54:47 siege ./ser[20517]:  version: <SIP/2.0> 
Sep 17 10:54:47 siege ./ser[20517]:  status:  <180> 
Sep 17 10:54:47 siege ./ser[20517]:  reason:  <ringing> 
Sep 17 10:54:47 siege ./ser[20517]: parse_headers: flags=1 
Sep 17 10:54:47 siege ./ser[20517]: Found param type 232, <branch> = <z9hG4bKf103.8f202116.0>; state=16 
Sep 17 10:54:47 siege ./ser[20517]: end of header reached, state=5 
Sep 17 10:54:47 siege ./ser[20517]: parse_headers: Via found, flags=1 
Sep 17 10:54:47 siege ./ser[20517]: parse_headers: this is the first via 
Sep 17 10:54:47 siege ./ser[20517]: After parse_msg... 
Sep 17 10:54:47 siege ./ser[20517]: forward_reply: found module tm, passing reply to it 
Sep 17 10:54:47 siege ./ser[20517]: DEBUG: t_check: msg id=5678 global id=5677 T start=(nil) 
Sep 17 10:54:47 siege ./ser[20517]: parse_headers: flags=17 
Sep 17 10:54:47 siege ./ser[20517]: end of header reached, state=2 
Sep 17 10:54:47 siege ./ser[20517]: parse_headers: Via found, flags=17 
Sep 17 10:54:47 siege ./ser[20517]: parse_headers: this is the second via 
Sep 17 10:54:47 siege ./ser[20517]: DEBUG: add_param: tag=f292f2202d771805 
Sep 17 10:54:47 siege ./ser[20517]: end of header reached, state=29 
Sep 17 10:54:47 siege ./ser[20517]: DEBUG: get_hdr_field: <To> [51]; uri=[sip:70000037 at 82.135.142.22]  
Sep 17 10:54:47 siege ./ser[20517]: DEBUG: to body [<sip:70000037 at 82.135.142.22>] 
Sep 17 10:54:47 siege ./ser[20517]: get_hdr_field: cseq <CSeq>: <1> <INVITE> 
Sep 17 10:54:47 siege ./ser[20517]: parse_headers: flags=4 
Sep 17 10:54:47 siege ./ser[20517]: DEBUG: t_reply_matching: hash 12319 label 1628570360 branch 0 
Sep 17 10:54:47 siege ./ser[20517]: DEBUG: t_reply_matching: reply matched (T=0x402f64e8)! 
Sep 17 10:54:47 siege ./ser[20517]: DEBUG: t_check: msg id=5678 global id=5678 T end=0x402f64e8 
Sep 17 10:54:47 siege ./ser[20517]: DEBUG: t_on_reply: org. status uas=100, uac[0]=100 local=0 is_invite=1) 
Sep 17 10:54:47 siege ./ser[20517]: ->>>>>>>>> T_code=100, new_code=180 
Sep 17 10:54:47 siege ./ser[20517]: DEBUG: relay_reply: branch=0, save=0, relay=0 
Sep 17 10:54:47 siege ./ser[20517]:  old size: 402, new size: 338 
Sep 17 10:54:47 siege ./ser[20517]: build_res_from_sip_res: copied size: orig:85, new: 21, rest: 317 msg= SIP/2.0 180 ringing^M Via: SIP/2.0/UDP 213.226.186.195^M Record-Route: <sip:70000037 at 213.226.186.250;ftag=b960e3f;lr=on>^M From: <sip:70000031 at 213.226.186.195>;tag=b960e3f^M To: <sip:70000037 at 82.135.142.22>;tag=f292f2202d771805^M Call-ID: 3647-4a64 at 213.226.186.195^M CSeq: 1 INVITE^M User-Agent: Grandstream BT100 1.0.5.10^M Content-Length: 0^M ^M  
Sep 17 10:54:47 siege ./ser[20517]: DEBUG: reply relayed. buf=0x80dcc68: SIP/2.0 1..., shmem=0x402d9b30: SIP/2.0 1 
Sep 17 10:54:47 siege ./ser[20517]: DEBUG: add_to_tail_of_timer[1]: 0x402f6624 
Sep 17 10:54:47 siege ./ser[20517]: DEBUG:destroy_avp_list: destroing list (nil) 
Sep 17 10:54:47 siege ./ser[20517]: receive_msg: cleaning up 
Sep 17 10:54:47 siege ./ser[20513]: SIP Reply  (status): 
Sep 17 10:54:47 siege ./ser[20513]:  version: <SIP/2.0> 
Sep 17 10:54:47 siege ./ser[20513]:  status:  <180> 
Sep 17 10:54:47 siege ./ser[20513]:  reason:  <Ringing> 
Sep 17 10:54:47 siege ./ser[20513]: parse_headers: flags=1 
Sep 17 10:54:47 siege ./ser[20513]: Found param type 232, <branch> = <z9hG4bKe7e7.554d6d51.0>; state=16 
Sep 17 10:54:47 siege ./ser[20513]: end of header reached, state=5 
Sep 17 10:54:47 siege ./ser[20513]: parse_headers: Via found, flags=1 
Sep 17 10:54:47 siege ./ser[20513]: parse_headers: this is the first via 
Sep 17 10:54:47 siege ./ser[20513]: After parse_msg... 
Sep 17 10:54:47 siege ./ser[20513]: forward_reply: found module tm, passing reply to it 
Sep 17 10:54:47 siege ./ser[20513]: DEBUG: t_check: msg id=5748 global id=5747 T start=0xffffffff 
Sep 17 10:54:47 siege ./ser[20513]: parse_headers: flags=17 
Sep 17 10:54:47 siege ./ser[20513]: Found param type 232, <branch> = <z9hG4bK-414a9843-402bc24-1a2e>; state=16 
Sep 17 10:54:47 siege ./ser[20513]: end of header reached, state=5 
Sep 17 10:54:47 siege ./ser[20513]: parse_headers: Via found, flags=17 
Sep 17 10:54:47 siege ./ser[20513]: parse_headers: this is the second via 
Sep 17 10:54:47 siege ./ser[20513]: end of header reached, state=9 
Sep 17 10:54:47 siege ./ser[20513]: DEBUG: get_hdr_field: <To> [32]; uri=[sip:70000037 at 213.226.186.195]  
Sep 17 10:54:47 siege ./ser[20513]: DEBUG: to body [<sip:70000037 at 213.226.186.195>^M ] 
Sep 17 10:54:47 siege ./ser[20513]: get_hdr_field: cseq <CSeq>: <2> <INVITE> 
Sep 17 10:54:47 siege ./ser[20513]: parse_headers: flags=4 
Sep 17 10:54:47 siege ./ser[20513]: DEBUG: t_reply_matching: hash 32382 label 366400597 branch 0 
Sep 17 10:54:47 siege ./ser[20513]: DEBUG: t_reply_matching: reply matched (T=0x402f8b00)! 
Sep 17 10:54:47 siege ./ser[20513]: DEBUG: t_check: msg id=5748 global id=5748 T end=0x402f8b00 
Sep 17 10:54:47 siege ./ser[20513]: DEBUG: t_on_reply: org. status uas=487, uac[0]=0 local=0 is_invite=1) 
Sep 17 10:54:47 siege ./ser[20513]: ->>>>>>>>> T_code=487, new_code=180 
Sep 17 10:54:47 siege ./ser[20513]: DEBUG: relay_reply: branch=0, save=0, relay=-1 
Sep 17 10:54:47 siege ./ser[20513]: WARNING: set_timer called on a "detached" timer -- ignoring: 0x402f8c3c 
Sep 17 10:54:47 siege ./ser[20513]: DEBUG:destroy_avp_list: destroing list (nil) 
Sep 17 10:54:47 siege ./ser[20513]: receive_msg: cleaning up 
Sep 17 10:54:48 siege ./ser[20525]: DEBUG: timer routine:4,tl=0x402f6610 next=(nil) 


More information about the sr-users mailing list