[Serusers] buggy CANCEL hangling?

Jan Janak jan at iptel.org
Fri Sep 17 11:19:21 CEST 2004


I am pretty sure that the dumps are not complete, 100 is missing in
B_CANCEL which SER would send for sure before it relays the INVITE.

Neither the second dump is complete, in the Warning header field you can
see that ser relays the message to itself over loopback (see out_uri).

  Jan.

On 17-09 11:19, Antanas Masevicius wrote:
> 
> 
> On Thu, 16 Sep 2004, Jan Janak wrote:
> 
> > B_CANCEL_prob does not contain contain any CANCEL, the last message I
> > can see is 18
> Yes, this is exaclty what it is. Last message SER sends to 213.226.186.195
> is INVITE and last what SER gets is 180 Ringing.
> 
> >
> > In A_CANCEL_prob SER forwards the INVITE to itself but different number,
> > what happens next I do not know because I do not see the messages being
> > sent over the loopback. The request probably did not make it to the
> > callee and so ser sends "no more pending branches". That's correct.
> 
> SER in our setup works as transparent proxy (iptables redirects all
> traffic to SER and after authorization SER forwards it to original
> destination (213.226.186.195). After sniffing all interfaces i didn't
> detected any other messages i sent you last time. I added a cut from SER
> log to this CANCEL related transaction if it may be of any help.
> 
> Could it be some sort of delay related?
> 
> Antanas
> 
> >
> >    Jan.
> >
> > On 16-09 13:53, Antanas Masevicius wrote:
> > > adding ngrep dumps for both sides. In my setup:
> > >
> > > 82.135.142.16 A client
> > > 213.226.186.250 SER
> > > 213.226.186.195 SIP proxy
> > > 82.135.142.22 B client
> > >
> > > On Thu, 16 Sep 2004, Jan Janak wrote:
> > >
> > > > Could you send me SIP message dumps ?
> > > >
> > > >   Jan.
> > > >
> > > > On 16-09 12:28, Antanas Masevicius wrote:
> > > > > yes, in normal situation, i get "200 cancelling" and "487 Request
> > > > > cancelled". In my case i just get "200 ok -- no more pending
> > > > > branches", INVITE IS forwarded further and tries to establish a call, but
> > > > > i don't see any forwarded CANCEL messages. Activity would look like this:
> > > > >
> > > > > A client     SER                    B client
> > > > >
> > > > > INVITE ----> INVITE       ------->
> > > > > CANCEL ---->(doesn't forward)
> > > > >        <---- [100 trying -- your call is important to us]
> > > > >        <---- [200 ok no more pending br..]
> > > > >        <---- [487 Request cancelled]
> > > > >
> > > > > does this 100 trying means that SER doesn't intend to
> > > > > cancel transaction?
> > > > >
> > > > > On Thu, 16 Sep 2004, Jan Janak wrote:
> > > > >
> > > > > > SER does not send 100 to CANCEL. It tries to lookup the original INVITE
> > > > > > transaction and sends back 200 (immediately) if found. Then it sends 487
> > > > > > when all downstream branches have been cancelled.
> > > > > >
> > > > > >    Jan.
> > > > > >
> > > > > > On 15-09 17:56, Antanas Masevicius wrote:
> > > > > > > Hello,
> > > > > > >
> > > > > > > my configuration follows:
> > > > > > >
> > > > > > > SIPclientA <--> SER(0.8.14) <--> SIPproxy <--> SIPclientB
> > > > > > >
> > > > > > > SER performs authorization and forwards all REGISTER requets to SIPproxy.
> > > > > > >
> > > > > > > Scenario:
> > > > > > > SIPclientA calls to SIPclientB, then changes his mind and releases call.
> > > > > > > SIPclientA generates CANCEL, but this CANCEL isn't forwarded to SIPproxy
> > > > > > > by SER and SIPproxy continues its conversation with SIPclientB by
> > > > > > > forwarding "180 Ringing" to SIPclientA.
> > > > > > >
> > > > > > > This isn't the case if SIPclientA receives "180 Ringing" by the time it
> > > > > > > sends CANCEL.
> > > > > > >
> > > > > > > What client gets in first case is:
> > > > > > > t_reply( t_cancel, cancel_msg, 200, "ok, no more pending branches" );
> > > > > > >
> > > > > > > and to my understanding is should be:
> > > > > > > t_reply( t_cancel, cancel_msg, 100, "trying to cancel" );
> > > > > > >
> > > > > > > ngrep looks like:
> > > > > > >
> > > > > > > U 82.135.142.16:5060 -> 213.226.186.195:5060
> > > > > > > CANCEL sip:70000037 at 213.226.186.195 SIP/2.0..
> > > > > > > From: <sip:70000031 at 213.226.186.195>;tag=0-13c4-4148435c-1f825298-792d..
> > > > > > > To: <sip:70000037 at 213.226.186.195>..
> > > > > > >   Call-ID: cc4698-0-13c4-4148435c-1f825298-157 at 213.226.186.195..CSeq: 2
> > > > > > > CANCEL..Via: SIP/2.0/UDP 82.135.142.16:5060;branch=z9hG4bK-4148435c-1f82552c-60b0..
> > > > > > > Max-Forwards: 70..
> > > > > > > Supported: 100rel..
> > > > > > > User-Agent: SIP-RG..
> > > > > > > Authorization: Digest username="70000031", realm="213.226.186.195",
> > > > > > > nonce="414844890f0b1edbefcbd
> > > > > > >   badce4c02ed59f058ef", uri="sip:70000037 at 213.226.186.195",
> > > > > > > response="5d22fe8fe3517aa72a51b8abc83bd9f2",
> > > > > > > algorithm=MD5..Content-Length: 0....
> > > > > > >
> > > > > > > #
> > > > > > > U 213.226.186.195:5060 -> 82.135.142.16:5060
> > > > > > >   SIP/2.0 200 ok -- no more pending branches..
> > > > > > > From: <sip:70000031 at 213.226.186.195>;tag=0-13c4-4148435c-1f825298-792d..
> > > > > > > To: <sip:70000037 at 213.226.186.195>;tag=855fc458e92794ef4dd58c58d38d34d1-0196..Call-ID:
> > > > > > > cc4698-0-13c4-4148435c-1f825298-157 at 213.226.186.195..CSeq: 2 CANCEL..
> > > > > > > Via: SIP/2.0/UDP 82.135.142.16:5060;branch=z9hG4bK-4148435c-1f82552c-60b0..Server: Sip EXpress router
> > > > > > > (0.8.14 (i386/linux))..Content-Length: 0..Warning: 392
> > > > > > > 213.226.186.250:5060 "Noisy feedback tells:  pid=17371 req_src_ip=82.135.142.16 req_src_port=5060
> > > > > > > in_uri=sip:70000037 at 213.226.186.195 out_uri=sip:70000037 at 213.226.186.195
> > > > > > > via_cnt==1".
> > > > > > >
> > > > > > > Somehow SER doesn't detect in this case that it already forwarded INVITE
> > > > > > > and that is needs to be CANCEL'ed.
> > > > > > >
> > > > > > > Here i provide logs for both cases. If more logs are needed, tell me.
> > > > > > > What could be the reason of such behaviour?
> > > > > > >
> > > > > > > SER handling of CANCEL in case of proper termination:
> > > > > > >
> > > > > > > ser[17364]:  method:  <CANCEL>
> > > > > > > ser[17364]:  uri:     <sip:70000037 at 213.226.186.195>
> > > > > > > ser[17364]:  version: <SIP/2.0>
> > > > > > > ser[17364]: parse_headers: flags=1
> > > > > > > ser[17364]: end of header reached, state=9
> > > > > > > ser[17364]: DEBUG: get_hdr_field: <To> [32];
> > > > > > > uri=[sip:70000037 at 213.226.186.195]
> > > > > > > ser[17364]: DEBUG: to body [<sip:70000037 at 213.226.186.195>^M ]
> > > > > > > ser[17364]: get_hdr_field: cseq <CSeq>: <2> <CANCEL>
> > > > > > > ser[17364]: Found param type 232, <branch> =
> > > > > > > <z9hG4bK-41483835-1f56c420-429>; state=16
> > > > > > > ser[17364]: end of header reached, state=5
> > > > > > > ser[17364]: parse_headers: Via found, flags=1
> > > > > > > ser[17364]: parse_headers: this is the first via
> > > > > > > ser[17364]: After parse_msg...
> > > > > > > ser[17364]: preparing to run routing scripts...
> > > > > > > ser[17364]: DEBUG: add_param: tag=0-13c4-41483835-1f56c394-362
> > > > > > > ser[17364]: end of header reached, state=29
> > > > > > > ser[17364]: parse_headers: flags=256
> > > > > > > ser[17364]: DEBUG: get_hdr_body : content_length=0
> > > > > > > ser[17364]: found end of header
> > > > > > > ser[17364]: find_first_route(): No Route headers found
> > > > > > > ser[17364]: loose_route(): There is no Route HF
> > > > > > > ser[17364]: DEBUG: t_addifnew: msg id=14502 , global msg id=14501 , T on
> > > > > > > entrance=0xffffffff
> > > > > > > ser[17364]: parse_headers: flags=-1
> > > > > > > ser[17364]: parse_headers: flags=60
> > > > > > > ser[17364]: t_lookup_request: start searching: hash=21608, isACK=0
> > > > > > > ser[17364]: DEBUG: RFC3261 transaction matching failed
> > > > > > > ser[17364]: DEBUG: t_lookup_request: no transaction found
> > > > > > > ser[17364]: DEBUG: t_lookupOriginalT: searching on hash entry 21608
> > > > > > > ser[17364]: DEBUG: RFC3261 transaction matched, tid=-41483835-1f56c420-429
> > > > > > > ser[17364]: DEBUG: t_lookupOriginalT: canceled transaction found
> > > > > > > (0x402ea680)!
> > > > > > > ser[17364]: DEBUG: t_lookupOriginalT completed
> > > > > > > ser[17364]: check_via_address(82.135.142.16, 82.135.142.16, 0)
> > > > > > > ser[17364]: DEBUG: add_to_tail_of_timer[4]: 0x402ed988
> > > > > > > ser[17364]: DEBUG: add_to_tail_of_timer[0]: 0x402ed99c
> > > > > > > ser[17364]: DEBUG: e2e_cancel: e2e cancel proceeding
> > > > > > > ser[17364]: parse_headers: flags=-1
> > > > > > > ser[17364]: check_via_address(82.135.142.16, 82.135.142.16, 0)
> > > > > > > ser[17364]: WARNING:vqm_resize: resize(0) called
> > > > > > > ser[17364]: DEBUG: cleanup_uacs: RETR/FR timers reset
> > > > > > > ser[17364]: DEBUG: add_to_tail_of_timer[2]: 0x402ed8a8
> > > > > > > ser[17364]: DEBUG: reply sent out. buf=0x80e07f0: SIP/2.0 2...,
> > > > > > > shmem=0x402cc9b8: SIP/2.0 2
> > > > > > > ser[17364]: DEBUG: t_reply: finished
> > > > > > > ser[17364]: DEBUG: e2e_cancel: sending 487
> > > > > > > ser[17364]: parse_headers: flags=-1
> > > > > > > ser[17364]: check_via_address(82.135.142.16, 82.135.142.16, 0)
> > > > > > > ser[17364]: DEBUG: cleanup_uacs: RETR/FR timers reset
> > > > > > > ser[17364]: DEBUG: add_to_tail_of_timer[4]: 0x402ea734
> > > > > > > ser[17364]: DEBUG: add_to_tail_of_timer[0]: 0x402ea748
> > > > > > > ser[17364]: DEBUG: reply sent out. buf=0x80e07f0: SIP/2.0 4...,
> > > > > > > shmem=0x402d14b8: SIP/2.0 4
> > > > > > > ser[17364]: DEBUG: t_reply: finished
> > > > > > > ser[17364]: SER: new transaction fwd'ed
> > > > > > > ser[17364]: DEBUG:destroy_avp_list: destroing list (nil)
> > > > > > > ser[17364]: receive_msg: cleaning up
> > > > > > >
> > > > > > >
> > > > > > > SER handling of CANCEL in case of inproper termination:
> > > > > > >
> > > > > > > ser[17359]: SIP Request:
> > > > > > > ser[17359]:  method:  <CANCEL>
> > > > > > > ser[17359]:  uri:     <sip:70000037 at 213.226.186.195>
> > > > > > > ser[17359]:  version: <SIP/2.0>
> > > > > > > ser[17359]: parse_headers: flags=1
> > > > > > > ser[17359]: end of header reached, state=9
> > > > > > > ser[17359]: DEBUG: get_hdr_field: <To> [32];
> > > > > > > uri=[sip:70000037 at 213.226.186.195]
> > > > > > > ser[17359]: DEBUG: to body [<sip:70000037 at 213.226.186.195>^M ]
> > > > > > > ser[17359]: get_hdr_field: cseq <CSeq>: <2> <CANCEL>
> > > > > > > ser[17359]: Found param type 232, <branch> =
> > > > > > > <z9hG4bK-414837ae-1f54b338-47f1>; state=16
> > > > > > > ser[17359]: end of header reached, state=5
> > > > > > > ser[17359]: parse_headers: Via found, flags=1
> > > > > > > ser[17359]: parse_headers: this is the first via
> > > > > > > ser[17359]: After parse_msg...
> > > > > > > ser[17359]: preparing to run routing scripts...
> > > > > > > ser[17359]: DEBUG: add_param: tag=0-13c4-414837ad-1f54b1bc-5d0a
> > > > > > > ser[17359]: end of header reached, state=29
> > > > > > > ser[17359]: parse_headers: flags=256
> > > > > > > ser[17359]: DEBUG: get_hdr_body : content_length=0
> > > > > > > ser[17359]: found end of header
> > > > > > > ser[17359]: find_first_route(): No Route headers found
> > > > > > > ser[17359]: loose_route(): There is no Route HF
> > > > > > > ser[17359]: DEBUG: t_addifnew: msg id=14611 , global msg id=14608 , T on
> > > > > > > entrance=(nil)
> > > > > > > ser[17359]: parse_headers: flags=-1
> > > > > > > ser[17359]: parse_headers: flags=60
> > > > > > > ser[17359]: t_lookup_request: start searching: hash=36669, isACK=0
> > > > > > > ser[17359]: DEBUG: RFC3261 transaction matching failed
> > > > > > > ser[17359]: DEBUG: t_lookup_request: no transaction found
> > > > > > > ser[17359]: DEBUG: t_lookupOriginalT: searching on hash entry 36669
> > > > > > > ser[17359]: DEBUG: RFC3261 transaction matched,
> > > > > > > tid=-414837ae-1f54b338-47f1
> > > > > > > ser[17359]: DEBUG: t_lookupOriginalT: canceled transaction found
> > > > > > > (0x402ea680)!
> > > > > > > ser[17359]: DEBUG: t_lookupOriginalT completed
> > > > > > > ser[17359]: DEBUG: e2e_cancel: e2e cancel -- no more pending branches
> > > > > > > ser[17359]: parse_headers: flags=-1
> > > > > > > ser[17359]: check_via_address(82.135.142.16, 82.135.142.16, 0)
> > > > > > > ser[17359]: WARNING:vqm_resize: resize(0) called
> > > > > > > ser[17359]: DEBUG: cleanup_uacs: RETR/FR timers reset
> > > > > > > ser[17359]: DEBUG: add_to_tail_of_timer[2]: 0x402e4f98
> > > > > > > ser[17359]: DEBUG: reply sent out. buf=0x80e1540: SIP/2.0 2...,
> > > > > > > shmem=0x402d0828: SIP/2.0 2
> > > > > > > ser[17359]: DEBUG: t_reply: finished
> > > > > > > ser[17359]: DEBUG: e2e_cancel: sending 487
> > > > > > > ser[17359]: parse_headers: flags=-1
> > > > > > > ser[17359]: check_via_address(82.135.142.16, 82.135.142.16, 0)
> > > > > > > ser[17359]: DEBUG: cleanup_uacs: RETR/FR timers reset
> > > > > > > ser[17359]: DEBUG: add_to_tail_of_timer[4]: 0x402ea734
> > > > > > > ser[17359]: DEBUG: add_to_tail_of_timer[0]: 0x402ea748
> > > > > > > ser[17359]: DEBUG: reply sent out. buf=0x80e0c90: SIP/2.0 4...,
> > > > > > > shmem=0x402dada0: SIP/2.0 4
> > > > > > > ser[17359]: DEBUG: t_reply: finished
> > > > > > > ser[17359]: SER: new transaction fwd'ed
> > > > > > > ser[17359]: DEBUG:destroy_avp_list: destroing list (nil)
> > > > > > >
> > > > > > >
> > > > > > > Antanas
> > > > > > >
> > > > > > > _______________________________________________
> > > > > > > Serusers mailing list
> > > > > > > serusers at lists.iptel.org
> > > > > > > http://lists.iptel.org/mailman/listinfo/serusers
> > > > > >
> > > >
> > > interface: eth2 (213.226.186.250/255.255.255.255)
> > > match: 82.135.142.16
> > > ########################
> > > U 213.226.186.250:5060 -> 213.226.186.195:5060
> > > INVITE sip:70000037 at 213.226.186.195 SIP/2.0.
> > > Record-Route: <sip:70000037 at 213.226.186.250;ftag=0-13c4-41496c88-66b7b4-cac;lr=on>.
> > > From: <sip:70000031 at 213.226.186.195>;tag=0-13c4-41496c88-66b7b4-cac.
> > > To: <sip:70000037 at 213.226.186.195>.
> > > Call-ID: cc4544-0-13c4-41496c88-66b7b4-72fe at 213.226.186.195.
> > > CSeq: 2 INVITE.
> > > Via: SIP/2.0/UDP 213.226.186.250;branch=z9hG4bKa706.a59b4431.0.
> > > Via: SIP/2.0/UDP 82.135.142.16:5060;branch=z9hG4bK-41496c88-66b840-6d7b.
> > > Max-Forwards: 70.
> > > Supported: 100rel.
> > > User-Agent: SIP-RG.
> > > Contact: <sip:70000031 at 82.135.142.16>.
> > > Authorization: Digest username="70000031", realm="213.226.186.195", nonce="41496db50f6ff90e24656717077421318025d85f", uri="sip:70000037 at 213.226.186.195", response="492b8c270b7c7a570a5d5d1b32342ca5", algorithm=MD5.
> > > Content-Type: application/sdp.
> > > Content-Length: 227.
> > > .
> > > v=0.
> > > o=SIP-TA 0 0 IN IP4 82.135.142.16.
> > > s=52878E10 07D0 52878E10 07D0 02 0.
> > > c=IN IP4 82.135.142.16.
> > > t=0 0.
> > > m=audio 4014 RTP/AVP 18 8 0 4.
> > > a=rtpmap:18 G729/8000.
> > > a=rtpmap:8 PCMA/8000.
> > > a=rtpmap:0 PCMU/8000.
> > > a=rtpmap:4 G723/8000.
> > >
> > > ##
> > > U 213.226.186.250:5060 -> 213.226.186.195:5060
> > > INVITE sip:70000037 at 213.226.186.195 SIP/2.0.
> > > Record-Route: <sip:70000037 at 213.226.186.250;ftag=0-13c4-41496c88-66b7b4-cac;lr=on>.
> > > From: <sip:70000031 at 213.226.186.195>;tag=0-13c4-41496c88-66b7b4-cac.
> > > To: <sip:70000037 at 213.226.186.195>.
> > > Call-ID: cc4544-0-13c4-41496c88-66b7b4-72fe at 213.226.186.195.
> > > CSeq: 2 INVITE.
> > > Via: SIP/2.0/UDP 213.226.186.250;branch=z9hG4bKa706.a59b4431.0.
> > > Via: SIP/2.0/UDP 82.135.142.16:5060;branch=z9hG4bK-41496c88-66b840-6d7b.
> > > Max-Forwards: 70.
> > > Supported: 100rel.
> > > User-Agent: SIP-RG.
> > > Contact: <sip:70000031 at 82.135.142.16>.
> > > Authorization: Digest username="70000031", realm="213.226.186.195", nonce="41496db50f6ff90e24656717077421318025d85f", uri="sip:70000037 at 213.226.186.195", response="492b8c270b7c7a570a5d5d1b32342ca5", algorithm=MD5.
> > > Content-Type: application/sdp.
> > > Content-Length: 227.
> > > .
> > > v=0.
> > > o=SIP-TA 0 0 IN IP4 82.135.142.16.
> > > s=52878E10 07D0 52878E10 07D0 02 0.
> > > c=IN IP4 82.135.142.16.
> > > t=0 0.
> > > m=audio 4014 RTP/AVP 18 8 0 4.
> > > a=rtpmap:18 G729/8000.
> > > a=rtpmap:8 PCMA/8000.
> > > a=rtpmap:0 PCMU/8000.
> > > a=rtpmap:4 G723/8000.
> > >
> > > ############
> > > U 213.226.186.195:5060 -> 213.226.186.250:5060
> > > SIP/2.0 180 Ringing.
> > > Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, REFER, NOTIFY, REGISTER.
> > > Supported: timer .
> > > Via: SIP/2.0/UDP 213.226.186.250;branch=z9hG4bKa706.a59b4431.0.
> > > Via: SIP/2.0/UDP 82.135.142.16:5060;branch=z9hG4bK-41496c88-66b840-6d7b.
> > > Record-Route: <sip:70000037 at 213.226.186.250;ftag=0-13c4-41496c88-66b7b4-cac;lr=on>.
> > > To: <sip:70000037 at 213.226.186.195>.
> > > From: <sip:70000031 at 213.226.186.195>;tag=0-13c4-41496c88-66b7b4-cac.
> > > Call-ID: cc4544-0-13c4-41496c88-66b7b4-72fe at 213.226.186.195.
> > > X-SHOUT-Channel: INBOUND 1:15:26:1.
> > > CSeq: 2 INVITE.
> > > User-Agent: SHOUT 3.3.4v6.
> > > Content-Length: 0.
> > > .
> > >
> > > ###############exit
> > > 55 received, 0 dropped
> >
> > > interface: eth1 (213.226.186.224/255.255.255.224)
> > > match: 82.135.142.16
> > > #####################################
> > > U 82.135.142.16:5060 -> 213.226.186.195:5060
> > > INVITE sip:70000037 at 213.226.186.195 SIP/2.0.
> > > From: <sip:70000031 at 213.226.186.195>;tag=0-13c4-41496c88-66b7b4-cac.
> > > To: <sip:70000037 at 213.226.186.195>.
> > > Call-ID: cc4544-0-13c4-41496c88-66b7b4-72fe at 213.226.186.195.
> > > CSeq: 1 INVITE.
> > > Via: SIP/2.0/UDP 82.135.142.16:5060;branch=z9hG4bK-41496c88-66b7b4-7d75.
> > > Max-Forwards: 70.
> > > Supported: 100rel.
> > > User-Agent: SIP-RG.
> > > Contact: <sip:70000031 at 82.135.142.16>.
> > > Content-Type: application/sdp.
> > > Content-Length: 227.
> > > .
> > > v=0.
> > > o=SIP-TA 0 0 IN IP4 82.135.142.16.
> > > s=52878E10 07D0 52878E10 07D0 02 0.
> > > c=IN IP4 82.135.142.16.
> > > t=0 0.
> > > m=audio 4014 RTP/AVP 18 8 0 4.
> > > a=rtpmap:18 G729/8000.
> > > a=rtpmap:8 PCMA/8000.
> > > a=rtpmap:0 PCMU/8000.
> > > a=rtpmap:4 G723/8000.
> > >
> > > #
> > > U 213.226.186.195:5060 -> 82.135.142.16:5060
> > > SIP/2.0 401 Unauthorized.
> > > From: <sip:70000031 at 213.226.186.195>;tag=0-13c4-41496c88-66b7b4-cac.
> > > To: <sip:70000037 at 213.226.186.195>;tag=58451be0870a0a50b35bf0ab28a442d9.032c.
> > > Call-ID: cc4544-0-13c4-41496c88-66b7b4-72fe at 213.226.186.195.
> > > CSeq: 1 INVITE.
> > > Via: SIP/2.0/UDP 82.135.142.16:5060;branch=z9hG4bK-41496c88-66b7b4-7d75.
> > > WWW-Authenticate: Digest realm="213.226.186.195", nonce="41496db50f6ff90e24656717077421318025d85f".
> > > Server: Sip EXpress router (0.8.14 (i386/linux)).
> > > Content-Length: 0.
> > > Warning: 392 213.226.186.250:5060 "Noisy feedback tells:  pid=20513 req_src_ip=82.135.142.16 req_src_port=5060 in_uri=sip:70000037 at 213.226.186.195 out_uri=sip:70000037 at 213.226.186.195 via_cnt==1".
> > > .
> > >
> > > #
> > > U 82.135.142.16:5060 -> 213.226.186.195:5060
> > > ACK sip:70000037 at 213.226.186.195 SIP/2.0.
> > > From: <sip:70000031 at 213.226.186.195>;tag=0-13c4-41496c88-66b7b4-cac.
> > > To: <sip:70000037 at 213.226.186.195>;tag=58451be0870a0a50b35bf0ab28a442d9.032c.
> > > Call-ID: cc4544-0-13c4-41496c88-66b7b4-72fe at 213.226.186.195.
> > > CSeq: 1 ACK.
> > > Via: SIP/2.0/UDP 82.135.142.16:5060;branch=z9hG4bK-41496c88-66b7b4-7d75.
> > > Max-Forwards: 70.
> > > User-Agent: SIP-RG.
> > > Contact: <sip:70000031 at 82.135.142.16>.
> > > Content-Length: 0.
> > > .
> > >
> > > #
> > > U 82.135.142.16:5060 -> 213.226.186.195:5060
> > > INVITE sip:70000037 at 213.226.186.195 SIP/2.0.
> > > From: <sip:70000031 at 213.226.186.195>;tag=0-13c4-41496c88-66b7b4-cac.
> > > To: <sip:70000037 at 213.226.186.195>.
> > > Call-ID: cc4544-0-13c4-41496c88-66b7b4-72fe at 213.226.186.195.
> > > CSeq: 2 INVITE.
> > > Via: SIP/2.0/UDP 82.135.142.16:5060;branch=z9hG4bK-41496c88-66b840-6d7b.
> > > Max-Forwards: 70.
> > > Supported: 100rel.
> > > User-Agent: SIP-RG.
> > > Contact: <sip:70000031 at 82.135.142.16>.
> > > Authorization: Digest username="70000031", realm="213.226.186.195", nonce="41496db50f6ff90e24656717077421318025d85f", uri="sip:70000037 at 213.226.186.195", response="492b8c270b7c7a570a5d5d1b32342ca5", algorithm=MD5.
> > > Content-Type: application/sdp.
> > > Content-Length: 227.
> > > .
> > > v=0.
> > > o=SIP-TA 0 0 IN IP4 82.135.142.16.
> > > s=52878E10 07D0 52878E10 07D0 02 0.
> > > c=IN IP4 82.135.142.16.
> > > t=0 0.
> > > m=audio 4014 RTP/AVP 18 8 0 4.
> > > a=rtpmap:18 G729/8000.
> > > a=rtpmap:8 PCMA/8000.
> > > a=rtpmap:0 PCMU/8000.
> > > a=rtpmap:4 G723/8000.
> > >
> > > #
> > > U 213.226.186.195:5060 -> 82.135.142.16:5060
> > > SIP/2.0 100 trying -- your call is important to us.
> > > From: <sip:70000031 at 213.226.186.195>;tag=0-13c4-41496c88-66b7b4-cac.
> > > To: <sip:70000037 at 213.226.186.195>.
> > > Call-ID: cc4544-0-13c4-41496c88-66b7b4-72fe at 213.226.186.195.
> > > CSeq: 2 INVITE.
> > > Via: SIP/2.0/UDP 82.135.142.16:5060;branch=z9hG4bK-41496c88-66b840-6d7b.
> > > Server: Sip EXpress router (0.8.14 (i386/linux)).
> > > Content-Length: 0.
> > > Warning: 392 213.226.186.250:5060 "Noisy feedback tells:  pid=20518 req_src_ip=82.135.142.16 req_src_port=5060 in_uri=sip:70000037 at 213.226.186.195 out_uri=sip:70000037 at 213.226.186.195 via_cnt==1".
> > > .
> > >
> > > #############
> > > U 82.135.142.16:5060 -> 213.226.186.195:5060
> > > CANCEL sip:70000037 at 213.226.186.195 SIP/2.0.
> > > From: <sip:70000031 at 213.226.186.195>;tag=0-13c4-41496c88-66b7b4-cac.
> > > To: <sip:70000037 at 213.226.186.195>.
> > > Call-ID: cc4544-0-13c4-41496c88-66b7b4-72fe at 213.226.186.195.
> > > CSeq: 2 CANCEL.
> > > Via: SIP/2.0/UDP 82.135.142.16:5060;branch=z9hG4bK-41496c88-66b840-6d7b.
> > > Max-Forwards: 70.
> > > Supported: 100rel.
> > > User-Agent: SIP-RG.
> > > Authorization: Digest username="70000031", realm="213.226.186.195", nonce="41496db50f6ff90e24656717077421318025d85f", uri="sip:70000037 at 213.226.186.195", response="da3636f2b421718f7e47bb1a1b3ad7f1", algorithm=MD5.
> > > Content-Length: 0.
> > > .
> > >
> > > #
> > > U 213.226.186.195:5060 -> 82.135.142.16:5060
> > > SIP/2.0 200 ok -- no more pending branches.
> > > From: <sip:70000031 at 213.226.186.195>;tag=0-13c4-41496c88-66b7b4-cac.
> > > To: <sip:70000037 at 213.226.186.195>;tag=855fc458e92794ef4dd58c58d38d34d1-da37.
> > > Call-ID: cc4544-0-13c4-41496c88-66b7b4-72fe at 213.226.186.195.
> > > CSeq: 2 CANCEL.
> > > Via: SIP/2.0/UDP 82.135.142.16:5060;branch=z9hG4bK-41496c88-66b840-6d7b.
> > > Server: Sip EXpress router (0.8.14 (i386/linux)).
> > > Content-Length: 0.
> > > Warning: 392 213.226.186.250:5060 "Noisy feedback tells:  pid=20519 req_src_ip=82.135.142.16 req_src_port=5060 in_uri=sip:70000037 at 213.226.186.195 out_uri=sip:70000037 at 213.226.186.195 via_cnt==1".
> > > .
> > >
> > > #
> > > U 213.226.186.195:5060 -> 82.135.142.16:5060
> > > SIP/2.0 487 Request cancelled.
> > > From: <sip:70000031 at 213.226.186.195>;tag=0-13c4-41496c88-66b7b4-cac.
> > > To: <sip:70000037 at 213.226.186.195>;tag=855fc458e92794ef4dd58c58d38d34d1-da37.
> > > Call-ID: cc4544-0-13c4-41496c88-66b7b4-72fe at 213.226.186.195.
> > > CSeq: 2 INVITE.
> > > Via: SIP/2.0/UDP 82.135.142.16:5060;branch=z9hG4bK-41496c88-66b840-6d7b.
> > > Server: Sip EXpress router (0.8.14 (i386/linux)).
> > > Content-Length: 0.
> > > Warning: 392 213.226.186.250:5060 "Noisy feedback tells:  pid=20519 req_src_ip=82.135.142.16 req_src_port=5060 in_uri=sip:70000037 at 213.226.186.195 out_uri=sip:70000037 at 213.226.186.195 via_cnt==1".
> > > .
> > >
> > > ##
> > > U 82.135.142.16:5060 -> 213.226.186.195:5060
> > > ACK sip:70000037 at 213.226.186.195 SIP/2.0.
> > > From: <sip:70000031 at 213.226.186.195>;tag=0-13c4-41496c88-66b7b4-cac.
> > > To: <sip:70000037 at 213.226.186.195>;tag=855fc458e92794ef4dd58c58d38d34d1-da37.
> > > Call-ID: cc4544-0-13c4-41496c88-66b7b4-72fe at 213.226.186.195.
> > > CSeq: 2 ACK.
> > > Via: SIP/2.0/UDP 82.135.142.16:5060;branch=z9hG4bK-41496c88-66b840-6d7b.
> > > Max-Forwards: 70.
> > > User-Agent: SIP-RG.
> > > Contact: <sip:70000031 at 82.135.142.16>.
> > > Content-Length: 0.
> > > .
> > >
> > > ###########################################exit
> > > 122 received, 0 dropped
> >
> > _______________________________________________
> > Serusers mailing list
> > serusers at lists.iptel.org
> > http://lists.iptel.org/mailman/listinfo/serusers
> >
> Sep 17 10:54:45 siege ./ser[20518]: SIP Request: 
> Sep 17 10:54:45 siege ./ser[20518]:  method:  <INVITE> 
> Sep 17 10:54:45 siege ./ser[20518]:  uri:     <sip:70000037 at 213.226.186.195> 
> Sep 17 10:54:45 siege ./ser[20518]:  version: <SIP/2.0> 
> Sep 17 10:54:45 siege ./ser[20518]: parse_headers: flags=1 
> Sep 17 10:54:45 siege ./ser[20518]: end of header reached, state=9 
> Sep 17 10:54:45 siege ./ser[20518]: DEBUG: get_hdr_field: <To> [32]; uri=[sip:70000037 at 213.226.186.195]  
> Sep 17 10:54:45 siege ./ser[20518]: DEBUG: to body [<sip:70000037 at 213.226.186.195>^M ] 
> Sep 17 10:54:45 siege ./ser[20518]: get_hdr_field: cseq <CSeq>: <1> <INVITE> 
> Sep 17 10:54:45 siege ./ser[20518]: Found param type 232, <branch> = <z9hG4bK-414a9843-402bb98-1030>; state=16 
> Sep 17 10:54:45 siege ./ser[20518]: end of header reached, state=5 
> Sep 17 10:54:45 siege ./ser[20518]: parse_headers: Via found, flags=1 
> Sep 17 10:54:45 siege ./ser[20518]: parse_headers: this is the first via 
> Sep 17 10:54:45 siege ./ser[20518]: After parse_msg... 
> Sep 17 10:54:45 siege ./ser[20518]: preparing to run routing scripts... 
> Sep 17 10:54:45 siege ./ser[20518]: DEBUG: add_param: tag=0-13c4-414a9843-402bb98-1973 
> Sep 17 10:54:45 siege ./ser[20518]: end of header reached, state=29 
> Sep 17 10:54:45 siege ./ser[20518]: parse_headers: flags=256 
> Sep 17 10:54:45 siege ./ser[20518]: DEBUG: get_hdr_body : content_length=227 
> Sep 17 10:54:45 siege ./ser[20518]: found end of header 
> Sep 17 10:54:45 siege ./ser[20518]: find_first_route(): No Route headers found 
> Sep 17 10:54:45 siege ./ser[20518]: loose_route(): There is no Route HF 
> Sep 17 10:54:45 siege ./ser[20518]: parse_headers: flags=4096 
> Sep 17 10:54:45 siege ./ser[20518]: pre_auth(): Credentials with given realm not found 
> Sep 17 10:54:45 siege ./ser[20518]: build_auth_hf(): 'WWW-Authenticate: Digest realm="213.226.186.195", nonce="414a99719d77734549ab6e83f2227bdb0db8218d"^M ' 
> Sep 17 10:54:45 siege ./ser[20518]: parse_headers: flags=-1 
> Sep 17 10:54:45 siege ./ser[20518]: check_via_address(82.135.142.16, 82.135.142.16, 0) 
> Sep 17 10:54:45 siege ./ser[20518]: DEBUG: get_out_socket: socket determined: 0 
> Sep 17 10:54:45 siege ./ser[20518]: DEBUG:destroy_avp_list: destroing list (nil) 
> Sep 17 10:54:45 siege ./ser[20518]: receive_msg: cleaning up 
> Sep 17 10:54:45 siege ./ser[20507]: SIP Request: 
> Sep 17 10:54:45 siege ./ser[20507]:  method:  <ACK> 
> Sep 17 10:54:45 siege ./ser[20507]:  uri:     <sip:70000037 at 213.226.186.195> 
> Sep 17 10:54:45 siege ./ser[20507]:  version: <SIP/2.0> 
> Sep 17 10:54:45 siege ./ser[20507]: parse_headers: flags=1 
> Sep 17 10:54:45 siege ./ser[20507]: DEBUG: add_param: tag=58451be0870a0a50b35bf0ab28a442d9.7dfd 
> Sep 17 10:54:45 siege ./ser[20507]: end of header reached, state=29 
> Sep 17 10:54:45 siege ./ser[20507]: DEBUG: get_hdr_field: <To> [74]; uri=[sip:70000037 at 213.226.186.195]  
> Sep 17 10:54:45 siege ./ser[20507]: DEBUG: to body [<sip:70000037 at 213.226.186.195>] 
> Sep 17 10:54:45 siege ./ser[20507]: get_hdr_field: cseq <CSeq>: <1> <ACK> 
> Sep 17 10:54:45 siege ./ser[20507]: Found param type 232, <branch> = <z9hG4bK-414a9843-402bb98-1030>; state=16 
> Sep 17 10:54:45 siege ./ser[20507]: end of header reached, state=5 
> Sep 17 10:54:45 siege ./ser[20507]: parse_headers: Via found, flags=1 
> Sep 17 10:54:45 siege ./ser[20507]: parse_headers: this is the first via 
> Sep 17 10:54:45 siege ./ser[20507]: After parse_msg... 
> Sep 17 10:54:45 siege ./ser[20507]: preparing to run routing scripts... 
> Sep 17 10:54:45 siege ./ser[20507]: parse_headers: flags=4 
> Sep 17 10:54:45 siege ./ser[20507]: DEBUG: sl_filter_ACK : local ACK found -> dropping it!  
> Sep 17 10:54:45 siege ./ser[20507]: DEBUG:destroy_avp_list: destroing list (nil) 
> Sep 17 10:54:45 siege ./ser[20507]: receive_msg: cleaning up 
> Sep 17 10:54:45 siege ./ser[20512]: SIP Request: 
> Sep 17 10:54:45 siege ./ser[20512]:  method:  <INVITE> 
> Sep 17 10:54:45 siege ./ser[20512]:  uri:     <sip:70000037 at 213.226.186.195> 
> Sep 17 10:54:45 siege ./ser[20512]:  version: <SIP/2.0> 
> Sep 17 10:54:45 siege ./ser[20512]: parse_headers: flags=1 
> Sep 17 10:54:45 siege ./ser[20512]: end of header reached, state=9 
> Sep 17 10:54:45 siege ./ser[20512]: DEBUG: get_hdr_field: <To> [32]; uri=[sip:70000037 at 213.226.186.195]  
> Sep 17 10:54:45 siege ./ser[20512]: DEBUG: to body [<sip:70000037 at 213.226.186.195>^M ] 
> Sep 17 10:54:45 siege ./ser[20512]: get_hdr_field: cseq <CSeq>: <2> <INVITE> 
> Sep 17 10:54:45 siege ./ser[20512]: Found param type 232, <branch> = <z9hG4bK-414a9843-402bc24-1a2e>; state=16 
> Sep 17 10:54:45 siege ./ser[20512]: end of header reached, state=5 
> Sep 17 10:54:45 siege ./ser[20512]: parse_headers: Via found, flags=1 
> Sep 17 10:54:45 siege ./ser[20512]: parse_headers: this is the first via 
> Sep 17 10:54:45 siege ./ser[20512]: After parse_msg... 
> Sep 17 10:54:45 siege ./ser[20512]: preparing to run routing scripts... 
> Sep 17 10:54:45 siege ./ser[20512]: DEBUG: add_param: tag=0-13c4-414a9843-402bb98-1973 
> Sep 17 10:54:45 siege ./ser[20512]: end of header reached, state=29 
> Sep 17 10:54:45 siege ./ser[20512]: parse_headers: flags=256 
> Sep 17 10:54:45 siege ./ser[20512]: DEBUG: get_hdr_body : content_length=227 
> Sep 17 10:54:45 siege ./ser[20512]: found end of header 
> Sep 17 10:54:45 siege ./ser[20512]: find_first_route(): No Route headers found 
> Sep 17 10:54:45 siege ./ser[20512]: loose_route(): There is no Route HF 
> Sep 17 10:54:45 siege ./ser[20512]: check_nonce(): comparing [414a99719d77734549ab6e83f2227bdb0db8218d] and [414a99719d77734549ab6e83f2227bdb0db8218d] 
> Sep 17 10:54:45 siege ./ser[20512]: query="select password from subscriber where username='70000031' AND domain='213.226.186.195' AND acc_ip='82.135.142.16'" 
> Sep 17 10:54:45 siege ./ser[20512]: HA1 string calculated: ef55dba3f323e9dd829e746d56c34938 
> Sep 17 10:54:45 siege ./ser[20512]: check_response(): Our result = 'df8104e1577572762333556115d2b8e3' 
> Sep 17 10:54:45 siege ./ser[20512]: check_response(): Authorization is OK 
> Sep 17 10:54:45 siege ./ser[20512]: save_rpid(): rpid value is '' 
> Sep 17 10:54:45 siege ./ser[20512]: DEBUG: t_addifnew: msg id=5816 , global msg id=5815 , T on entrance=0xffffffff 
> Sep 17 10:54:45 siege ./ser[20512]: parse_headers: flags=-1 
> Sep 17 10:54:45 siege ./ser[20512]: parse_headers: flags=60 
> Sep 17 10:54:45 siege ./ser[20512]: t_lookup_request: start searching: hash=32382, isACK=0 
> Sep 17 10:54:45 siege ./ser[20512]: DEBUG: RFC3261 transaction matching failed 
> Sep 17 10:54:45 siege ./ser[20512]: DEBUG: t_lookup_request: no transaction found 
> Sep 17 10:54:45 siege ./ser[20512]: DEBUG: get_out_socket: socket determined: 0 
> Sep 17 10:54:45 siege ./ser[20512]: SER: new INVITE 
> Sep 17 10:54:45 siege ./ser[20512]: parse_headers: flags=-1 
> Sep 17 10:54:45 siege ./ser[20512]: check_via_address(82.135.142.16, 82.135.142.16, 0) 
> Sep 17 10:54:45 siege ./ser[20512]: WARNING:vqm_resize: resize(0) called 
> Sep 17 10:54:45 siege ./ser[20512]: DEBUG: reply sent out. buf=0x80e1200: SIP/2.0 1..., shmem=0x402e4d80: SIP/2.0 1 
> Sep 17 10:54:45 siege ./ser[20512]: DEBUG: t_reply: finished 
> Sep 17 10:54:45 siege ./ser[20512]: DEBUG: mk_proxy: doing DNS lookup... 
> Sep 17 10:54:45 siege ./ser[20512]: DEBUG: get_out_socket: socket determined: 0 
> Sep 17 10:54:45 siege ./ser[20512]: check_via_address(82.135.142.16, 82.135.142.16, 0) 
> Sep 17 10:54:45 siege ./ser[20512]: DEBUG: add_to_tail_of_timer[4]: 0x402f8c28 
> Sep 17 10:54:45 siege ./ser[20512]: DEBUG: add_to_tail_of_timer[0]: 0x402f8c3c 
> Sep 17 10:54:45 siege ./ser[20512]: SER: new transaction fwd'ed 
> Sep 17 10:54:45 siege ./ser[20512]: DEBUG:destroy_avp_list: destroing list (nil) 
> Sep 17 10:54:45 siege ./ser[20512]: receive_msg: cleaning up 
> Sep 17 10:54:46 siege ./ser[20525]: DEBUG: timer routine:4,tl=0x402f8c28 next=(nil) 
> Sep 17 10:54:46 siege ./ser[20525]: DEBUG: retransmission_handler : request resending (t=0x402f8b00, INVITE si ... ) 
> Sep 17 10:54:46 siege ./ser[20525]: DEBUG: add_to_tail_of_timer[5]: 0x402f8c28 
> Sep 17 10:54:46 siege ./ser[20525]: DEBUG: retransmission_handler : done 
> Sep 17 10:54:46 siege ./ser[20513]: SIP Request: 
> Sep 17 10:54:46 siege ./ser[20513]:  method:  <CANCEL> 
> Sep 17 10:54:46 siege ./ser[20513]:  uri:     <sip:70000037 at 213.226.186.195> 
> Sep 17 10:54:46 siege ./ser[20513]:  version: <SIP/2.0> 
> Sep 17 10:54:46 siege ./ser[20513]: parse_headers: flags=1 
> Sep 17 10:54:46 siege ./ser[20513]: end of header reached, state=9 
> Sep 17 10:54:46 siege ./ser[20513]: DEBUG: get_hdr_field: <To> [32]; uri=[sip:70000037 at 213.226.186.195]  
> Sep 17 10:54:46 siege ./ser[20513]: DEBUG: to body [<sip:70000037 at 213.226.186.195>^M ] 
> Sep 17 10:54:46 siege ./ser[20513]: get_hdr_field: cseq <CSeq>: <2> <CANCEL> 
> Sep 17 10:54:46 siege ./ser[20513]: Found param type 232, <branch> = <z9hG4bK-414a9843-402bc24-1a2e>; state=16 
> Sep 17 10:54:46 siege ./ser[20513]: end of header reached, state=5 
> Sep 17 10:54:46 siege ./ser[20513]: parse_headers: Via found, flags=1 
> Sep 17 10:54:46 siege ./ser[20513]: parse_headers: this is the first via 
> Sep 17 10:54:46 siege ./ser[20513]: After parse_msg... 
> Sep 17 10:54:46 siege ./ser[20513]: preparing to run routing scripts... 
> Sep 17 10:54:46 siege ./ser[20513]: DEBUG: add_param: tag=0-13c4-414a9843-402bb98-1973 
> Sep 17 10:54:46 siege ./ser[20513]: end of header reached, state=29 
> Sep 17 10:54:46 siege ./ser[20513]: parse_headers: flags=256 
> Sep 17 10:54:46 siege ./ser[20513]: DEBUG: get_hdr_body : content_length=0 
> Sep 17 10:54:46 siege ./ser[20513]: found end of header 
> Sep 17 10:54:46 siege ./ser[20513]: find_first_route(): No Route headers found 
> Sep 17 10:54:46 siege ./ser[20513]: loose_route(): There is no Route HF 
> Sep 17 10:54:46 siege ./ser[20513]: DEBUG: t_addifnew: msg id=5747 , global msg id=5746 , T on entrance=(nil) 
> Sep 17 10:54:46 siege ./ser[20513]: parse_headers: flags=-1 
> Sep 17 10:54:46 siege ./ser[20513]: parse_headers: flags=60 
> Sep 17 10:54:46 siege ./ser[20513]: t_lookup_request: start searching: hash=32382, isACK=0 
> Sep 17 10:54:46 siege ./ser[20513]: DEBUG: RFC3261 transaction matching failed 
> Sep 17 10:54:46 siege ./ser[20513]: DEBUG: t_lookup_request: no transaction found 
> Sep 17 10:54:46 siege ./ser[20513]: DEBUG: get_out_socket: socket determined: 0 
> Sep 17 10:54:46 siege ./ser[20513]: DEBUG: t_lookupOriginalT: searching on hash entry 32382 
> Sep 17 10:54:46 siege ./ser[20513]: DEBUG: RFC3261 transaction matched, tid=-414a9843-402bc24-1a2e 
> Sep 17 10:54:46 siege ./ser[20513]: DEBUG: t_lookupOriginalT: canceled transaction found (0x402f8b00)!  
> Sep 17 10:54:46 siege ./ser[20513]: DEBUG: t_lookupOriginalT completed 
> Sep 17 10:54:46 siege ./ser[20513]: DEBUG: e2e_cancel: e2e cancel -- no more pending branches 
> Sep 17 10:54:46 siege ./ser[20513]: parse_headers: flags=-1 
> Sep 17 10:54:46 siege ./ser[20513]: check_via_address(82.135.142.16, 82.135.142.16, 0) 
> Sep 17 10:54:46 siege ./ser[20513]: WARNING:vqm_resize: resize(0) called 
> Sep 17 10:54:46 siege ./ser[20513]: DEBUG: cleanup_uacs: RETR/FR timers reset 
> Sep 17 10:54:46 siege ./ser[20513]: DEBUG: add_to_tail_of_timer[2]: 0x402dff60 
> Sep 17 10:54:46 siege ./ser[20513]: DEBUG: reply sent out. buf=0x80e1040: SIP/2.0 2..., shmem=0x402d3bc0: SIP/2.0 2 
> Sep 17 10:54:46 siege ./ser[20513]: DEBUG: t_reply: finished 
> Sep 17 10:54:46 siege ./ser[20513]: DEBUG: e2e_cancel: sending 487 
> Sep 17 10:54:46 siege ./ser[20513]: parse_headers: flags=-1 
> Sep 17 10:54:46 siege ./ser[20513]: check_via_address(82.135.142.16, 82.135.142.16, 0) 
> Sep 17 10:54:46 siege ./ser[20513]: DEBUG: cleanup_uacs: RETR/FR timers reset 
> Sep 17 10:54:46 siege ./ser[20513]: DEBUG: add_to_tail_of_timer[4]: 0x402f8bb4 
> Sep 17 10:54:46 siege ./ser[20513]: DEBUG: add_to_tail_of_timer[0]: 0x402f8bc8 
> Sep 17 10:54:46 siege ./ser[20513]: DEBUG: reply sent out. buf=0x80e1040: SIP/2.0 4..., shmem=0x402e2938: SIP/2.0 4 
> Sep 17 10:54:46 siege ./ser[20513]: DEBUG: t_reply: finished 
> Sep 17 10:54:46 siege ./ser[20513]: SER: new transaction fwd'ed 
> Sep 17 10:54:46 siege ./ser[20513]: DEBUG:destroy_avp_list: destroing list (nil) 
> Sep 17 10:54:46 siege ./ser[20513]: receive_msg: cleaning up 
> Sep 17 10:54:46 siege ./ser[20507]: SIP Request: 
> Sep 17 10:54:46 siege ./ser[20507]:  method:  <ACK> 
> Sep 17 10:54:46 siege ./ser[20507]:  uri:     <sip:70000037 at 213.226.186.195> 
> Sep 17 10:54:46 siege ./ser[20507]:  version: <SIP/2.0> 
> Sep 17 10:54:46 siege ./ser[20507]: parse_headers: flags=1 
> Sep 17 10:54:46 siege ./ser[20507]: DEBUG: add_param: tag=855fc458e92794ef4dd58c58d38d34d1-1dcd 
> Sep 17 10:54:46 siege ./ser[20507]: end of header reached, state=29 
> Sep 17 10:54:46 siege ./ser[20507]: DEBUG: get_hdr_field: <To> [74]; uri=[sip:70000037 at 213.226.186.195]  
> Sep 17 10:54:46 siege ./ser[20507]: DEBUG: to body [<sip:70000037 at 213.226.186.195>] 
> Sep 17 10:54:46 siege ./ser[20507]: get_hdr_field: cseq <CSeq>: <2> <ACK> 
> Sep 17 10:54:46 siege ./ser[20507]: Found param type 232, <branch> = <z9hG4bK-414a9843-402bc24-1a2e>; state=16 
> Sep 17 10:54:46 siege ./ser[20507]: end of header reached, state=5 
> Sep 17 10:54:46 siege ./ser[20507]: parse_headers: Via found, flags=1 
> Sep 17 10:54:46 siege ./ser[20507]: parse_headers: this is the first via 
> Sep 17 10:54:46 siege ./ser[20507]: After parse_msg... 
> Sep 17 10:54:46 siege ./ser[20507]: preparing to run routing scripts... 
> Sep 17 10:54:46 siege ./ser[20507]: parse_headers: flags=4 
> Sep 17 10:54:46 siege ./ser[20507]: DEBUG: add_param: tag=0-13c4-414a9843-402bb98-1973 
> Sep 17 10:54:46 siege ./ser[20507]: end of header reached, state=29 
> Sep 17 10:54:46 siege ./ser[20507]: parse_headers: flags=256 
> Sep 17 10:54:46 siege ./ser[20507]: DEBUG: get_hdr_body : content_length=0 
> Sep 17 10:54:46 siege ./ser[20507]: found end of header 
> Sep 17 10:54:46 siege ./ser[20507]: find_first_route(): No Route headers found 
> Sep 17 10:54:46 siege ./ser[20507]: loose_route(): There is no Route HF 
> Sep 17 10:54:46 siege ./ser[20507]: DEBUG: t_addifnew: msg id=5729 , global msg id=5727 , T on entrance=0xffffffff 
> Sep 17 10:54:46 siege ./ser[20507]: parse_headers: flags=-1 
> Sep 17 10:54:46 siege ./ser[20507]: parse_headers: flags=60 
> Sep 17 10:54:46 siege ./ser[20507]: t_lookup_request: start searching: hash=32382, isACK=1 
> Sep 17 10:54:46 siege ./ser[20507]: DEBUG: RFC3261 transaction matched, tid=-414a9843-402bc24-1a2e 
> Sep 17 10:54:46 siege ./ser[20507]: DEBUG: t_lookup_request: transaction found (T=0x402f8b00) 
> Sep 17 10:54:46 siege ./ser[20507]: DEBUG: cleanup_uacs: RETR/FR timers reset 
> Sep 17 10:54:46 siege ./ser[20507]: DEBUG: add_to_tail_of_timer[2]: 0x402f8b48 
> Sep 17 10:54:46 siege ./ser[20507]: DEBUG:destroy_avp_list: destroing list (nil) 
> Sep 17 10:54:46 siege ./ser[20507]: receive_msg: cleaning up 
> Sep 17 10:54:47 siege ./ser[20525]: DEBUG: timer routine:0,tl=0x402f8c3c next=0x402f8bc8 
> Sep 17 10:54:47 siege ./ser[20525]: DEBUG: timer routine:0,tl=0x402f8bc8 next=(nil) 
> Sep 17 10:54:47 siege ./ser[20525]: DEBUG: timer routine:4,tl=0x402f8bb4 next=(nil) 
> Sep 17 10:54:47 siege ./ser[20525]: DEBUG: timer routine:5,tl=0x402f8c28 next=(nil) 
> Sep 17 10:54:47 siege ./ser[20519]: SIP Request: 
> Sep 17 10:54:47 siege ./ser[20519]:  method:  <INVITE> 
> Sep 17 10:54:47 siege ./ser[20519]:  uri:     <sip:70000037 at 82.135.142.22> 
> Sep 17 10:54:47 siege ./ser[20519]:  version: <SIP/2.0> 
> Sep 17 10:54:47 siege ./ser[20519]: parse_headers: flags=1 
> Sep 17 10:54:47 siege ./ser[20519]: end of header reached, state=2 
> Sep 17 10:54:47 siege ./ser[20519]: parse_headers: Via found, flags=1 
> Sep 17 10:54:47 siege ./ser[20519]: parse_headers: this is the first via 
> Sep 17 10:54:47 siege ./ser[20519]: After parse_msg... 
> Sep 17 10:54:47 siege ./ser[20519]: preparing to run routing scripts... 
> Sep 17 10:54:47 siege ./ser[20519]: parse_headers: flags=8 
> Sep 17 10:54:47 siege ./ser[20519]: end of header reached, state=9 
> Sep 17 10:54:47 siege ./ser[20519]: DEBUG: get_hdr_field: <To> [30]; uri=[sip:70000037 at 82.135.142.22]  
> Sep 17 10:54:47 siege ./ser[20519]: DEBUG: to body [<sip:70000037 at 82.135.142.22>^M ] 
> Sep 17 10:54:47 siege ./ser[20519]: DEBUG: add_param: tag=b960e3f 
> Sep 17 10:54:47 siege ./ser[20519]: end of header reached, state=29 
> Sep 17 10:54:47 siege ./ser[20519]: parse_headers: flags=256 
> Sep 17 10:54:47 siege ./ser[20519]: get_hdr_field: cseq <CSeq>: <1> <INVITE> 
> Sep 17 10:54:47 siege ./ser[20519]: DEBUG: get_hdr_body : content_length=180 
> Sep 17 10:54:47 siege ./ser[20519]: found end of header 
> Sep 17 10:54:47 siege ./ser[20519]: find_first_route(): No Route headers found 
> Sep 17 10:54:47 siege ./ser[20519]: loose_route(): There is no Route HF 
> Sep 17 10:54:47 siege ./ser[20519]: DEBUG: t_addifnew: msg id=5712 , global msg id=5711 , T on entrance=0xffffffff 
> Sep 17 10:54:47 siege ./ser[20519]: parse_headers: flags=-1 
> Sep 17 10:54:47 siege ./ser[20519]: parse_headers: flags=60 
> Sep 17 10:54:47 siege ./ser[20519]: t_lookup_request: start searching: hash=12319, isACK=0 
> Sep 17 10:54:47 siege ./ser[20519]: DEBUG: proceeding to pre-RFC3261 transaction matching 
> Sep 17 10:54:47 siege ./ser[20519]: DEBUG: t_lookup_request: no transaction found 
> Sep 17 10:54:47 siege ./ser[20519]: DEBUG: get_out_socket: socket determined: 0 
> Sep 17 10:54:47 siege ./ser[20519]: SER: new INVITE 
> Sep 17 10:54:47 siege ./ser[20519]: parse_headers: flags=-1 
> Sep 17 10:54:47 siege ./ser[20519]: check_via_address(213.226.186.195, 213.226.186.195, 0) 
> Sep 17 10:54:47 siege ./ser[20519]: WARNING:vqm_resize: resize(0) called 
> Sep 17 10:54:47 siege ./ser[20519]: DEBUG: reply sent out. buf=0x80de4a8: SIP/2.0 1..., shmem=0x402dd670: SIP/2.0 1 
> Sep 17 10:54:47 siege ./ser[20519]: DEBUG: t_reply: finished 
> Sep 17 10:54:47 siege ./ser[20519]: DEBUG: mk_proxy: doing DNS lookup... 
> Sep 17 10:54:47 siege ./ser[20519]: DEBUG: get_out_socket: socket determined: 0 
> Sep 17 10:54:47 siege ./ser[20519]: check_via_address(213.226.186.195, 213.226.186.195, 0) 
> Sep 17 10:54:47 siege ./ser[20519]: DEBUG: add_to_tail_of_timer[4]: 0x402f6610 
> Sep 17 10:54:47 siege ./ser[20519]: DEBUG: add_to_tail_of_timer[0]: 0x402f6624 
> Sep 17 10:54:47 siege ./ser[20519]: SER: new transaction fwd'ed 
> Sep 17 10:54:47 siege ./ser[20519]: DEBUG:destroy_avp_list: destroing list (nil) 
> Sep 17 10:54:47 siege ./ser[20519]: receive_msg: cleaning up 
> Sep 17 10:54:47 siege ./ser[20511]: SIP Reply  (status): 
> Sep 17 10:54:47 siege ./ser[20511]:  version: <SIP/2.0> 
> Sep 17 10:54:47 siege ./ser[20511]:  status:  <100> 
> Sep 17 10:54:47 siege ./ser[20511]:  reason:  <trying> 
> Sep 17 10:54:47 siege ./ser[20511]: parse_headers: flags=1 
> Sep 17 10:54:47 siege ./ser[20511]: Found param type 232, <branch> = <z9hG4bKf103.8f202116.0>; state=16 
> Sep 17 10:54:47 siege ./ser[20511]: end of header reached, state=5 
> Sep 17 10:54:47 siege ./ser[20511]: parse_headers: Via found, flags=1 
> Sep 17 10:54:47 siege ./ser[20511]: parse_headers: this is the first via 
> Sep 17 10:54:47 siege ./ser[20511]: After parse_msg... 
> Sep 17 10:54:47 siege ./ser[20511]: forward_reply: found module tm, passing reply to it 
> Sep 17 10:54:47 siege ./ser[20511]: DEBUG: t_check: msg id=5909 global id=5908 T start=0xffffffff 
> Sep 17 10:54:47 siege ./ser[20511]: parse_headers: flags=17 
> Sep 17 10:54:47 siege ./ser[20511]: end of header reached, state=2 
> Sep 17 10:54:47 siege ./ser[20511]: parse_headers: Via found, flags=17 
> Sep 17 10:54:47 siege ./ser[20511]: parse_headers: this is the second via 
> Sep 17 10:54:47 siege ./ser[20511]: end of header reached, state=9 
> Sep 17 10:54:47 siege ./ser[20511]: DEBUG: get_hdr_field: <To> [30]; uri=[sip:70000037 at 82.135.142.22]  
> Sep 17 10:54:47 siege ./ser[20511]: DEBUG: to body [<sip:70000037 at 82.135.142.22>^M ] 
> Sep 17 10:54:47 siege ./ser[20511]: get_hdr_field: cseq <CSeq>: <1> <INVITE> 
> Sep 17 10:54:47 siege ./ser[20511]: parse_headers: flags=4 
> Sep 17 10:54:47 siege ./ser[20511]: DEBUG: t_reply_matching: hash 12319 label 1628570360 branch 0 
> Sep 17 10:54:47 siege ./ser[20511]: DEBUG: t_reply_matching: reply matched (T=0x402f64e8)! 
> Sep 17 10:54:47 siege ./ser[20511]: DEBUG: t_check: msg id=5909 global id=5909 T end=0x402f64e8 
> Sep 17 10:54:47 siege ./ser[20511]: DEBUG: t_on_reply: org. status uas=100, uac[0]=0 local=0 is_invite=1) 
> Sep 17 10:54:47 siege ./ser[20511]: ->>>>>>>>> T_code=100, new_code=100 
> Sep 17 10:54:47 siege ./ser[20511]: DEBUG: relay_reply: branch=0, save=0, relay=-1 
> Sep 17 10:54:47 siege ./ser[20511]: DEBUG: add_to_tail_of_timer[1]: 0x402f6624 
> Sep 17 10:54:47 siege ./ser[20511]: DEBUG:destroy_avp_list: destroing list (nil) 
> Sep 17 10:54:47 siege ./ser[20511]: receive_msg: cleaning up 
> Sep 17 10:54:47 siege ./ser[20517]: SIP Reply  (status): 
> Sep 17 10:54:47 siege ./ser[20517]:  version: <SIP/2.0> 
> Sep 17 10:54:47 siege ./ser[20517]:  status:  <180> 
> Sep 17 10:54:47 siege ./ser[20517]:  reason:  <ringing> 
> Sep 17 10:54:47 siege ./ser[20517]: parse_headers: flags=1 
> Sep 17 10:54:47 siege ./ser[20517]: Found param type 232, <branch> = <z9hG4bKf103.8f202116.0>; state=16 
> Sep 17 10:54:47 siege ./ser[20517]: end of header reached, state=5 
> Sep 17 10:54:47 siege ./ser[20517]: parse_headers: Via found, flags=1 
> Sep 17 10:54:47 siege ./ser[20517]: parse_headers: this is the first via 
> Sep 17 10:54:47 siege ./ser[20517]: After parse_msg... 
> Sep 17 10:54:47 siege ./ser[20517]: forward_reply: found module tm, passing reply to it 
> Sep 17 10:54:47 siege ./ser[20517]: DEBUG: t_check: msg id=5678 global id=5677 T start=(nil) 
> Sep 17 10:54:47 siege ./ser[20517]: parse_headers: flags=17 
> Sep 17 10:54:47 siege ./ser[20517]: end of header reached, state=2 
> Sep 17 10:54:47 siege ./ser[20517]: parse_headers: Via found, flags=17 
> Sep 17 10:54:47 siege ./ser[20517]: parse_headers: this is the second via 
> Sep 17 10:54:47 siege ./ser[20517]: DEBUG: add_param: tag=f292f2202d771805 
> Sep 17 10:54:47 siege ./ser[20517]: end of header reached, state=29 
> Sep 17 10:54:47 siege ./ser[20517]: DEBUG: get_hdr_field: <To> [51]; uri=[sip:70000037 at 82.135.142.22]  
> Sep 17 10:54:47 siege ./ser[20517]: DEBUG: to body [<sip:70000037 at 82.135.142.22>] 
> Sep 17 10:54:47 siege ./ser[20517]: get_hdr_field: cseq <CSeq>: <1> <INVITE> 
> Sep 17 10:54:47 siege ./ser[20517]: parse_headers: flags=4 
> Sep 17 10:54:47 siege ./ser[20517]: DEBUG: t_reply_matching: hash 12319 label 1628570360 branch 0 
> Sep 17 10:54:47 siege ./ser[20517]: DEBUG: t_reply_matching: reply matched (T=0x402f64e8)! 
> Sep 17 10:54:47 siege ./ser[20517]: DEBUG: t_check: msg id=5678 global id=5678 T end=0x402f64e8 
> Sep 17 10:54:47 siege ./ser[20517]: DEBUG: t_on_reply: org. status uas=100, uac[0]=100 local=0 is_invite=1) 
> Sep 17 10:54:47 siege ./ser[20517]: ->>>>>>>>> T_code=100, new_code=180 
> Sep 17 10:54:47 siege ./ser[20517]: DEBUG: relay_reply: branch=0, save=0, relay=0 
> Sep 17 10:54:47 siege ./ser[20517]:  old size: 402, new size: 338 
> Sep 17 10:54:47 siege ./ser[20517]: build_res_from_sip_res: copied size: orig:85, new: 21, rest: 317 msg= SIP/2.0 180 ringing^M Via: SIP/2.0/UDP 213.226.186.195^M Record-Route: <sip:70000037 at 213.226.186.250;ftag=b960e3f;lr=on>^M From: <sip:70000031 at 213.226.186.195>;tag=b960e3f^M To: <sip:70000037 at 82.135.142.22>;tag=f292f2202d771805^M Call-ID: 3647-4a64 at 213.226.186.195^M CSeq: 1 INVITE^M User-Agent: Grandstream BT100 1.0.5.10^M Content-Length: 0^M ^M  
> Sep 17 10:54:47 siege ./ser[20517]: DEBUG: reply relayed. buf=0x80dcc68: SIP/2.0 1..., shmem=0x402d9b30: SIP/2.0 1 
> Sep 17 10:54:47 siege ./ser[20517]: DEBUG: add_to_tail_of_timer[1]: 0x402f6624 
> Sep 17 10:54:47 siege ./ser[20517]: DEBUG:destroy_avp_list: destroing list (nil) 
> Sep 17 10:54:47 siege ./ser[20517]: receive_msg: cleaning up 
> Sep 17 10:54:47 siege ./ser[20513]: SIP Reply  (status): 
> Sep 17 10:54:47 siege ./ser[20513]:  version: <SIP/2.0> 
> Sep 17 10:54:47 siege ./ser[20513]:  status:  <180> 
> Sep 17 10:54:47 siege ./ser[20513]:  reason:  <Ringing> 
> Sep 17 10:54:47 siege ./ser[20513]: parse_headers: flags=1 
> Sep 17 10:54:47 siege ./ser[20513]: Found param type 232, <branch> = <z9hG4bKe7e7.554d6d51.0>; state=16 
> Sep 17 10:54:47 siege ./ser[20513]: end of header reached, state=5 
> Sep 17 10:54:47 siege ./ser[20513]: parse_headers: Via found, flags=1 
> Sep 17 10:54:47 siege ./ser[20513]: parse_headers: this is the first via 
> Sep 17 10:54:47 siege ./ser[20513]: After parse_msg... 
> Sep 17 10:54:47 siege ./ser[20513]: forward_reply: found module tm, passing reply to it 
> Sep 17 10:54:47 siege ./ser[20513]: DEBUG: t_check: msg id=5748 global id=5747 T start=0xffffffff 
> Sep 17 10:54:47 siege ./ser[20513]: parse_headers: flags=17 
> Sep 17 10:54:47 siege ./ser[20513]: Found param type 232, <branch> = <z9hG4bK-414a9843-402bc24-1a2e>; state=16 
> Sep 17 10:54:47 siege ./ser[20513]: end of header reached, state=5 
> Sep 17 10:54:47 siege ./ser[20513]: parse_headers: Via found, flags=17 
> Sep 17 10:54:47 siege ./ser[20513]: parse_headers: this is the second via 
> Sep 17 10:54:47 siege ./ser[20513]: end of header reached, state=9 
> Sep 17 10:54:47 siege ./ser[20513]: DEBUG: get_hdr_field: <To> [32]; uri=[sip:70000037 at 213.226.186.195]  
> Sep 17 10:54:47 siege ./ser[20513]: DEBUG: to body [<sip:70000037 at 213.226.186.195>^M ] 
> Sep 17 10:54:47 siege ./ser[20513]: get_hdr_field: cseq <CSeq>: <2> <INVITE> 
> Sep 17 10:54:47 siege ./ser[20513]: parse_headers: flags=4 
> Sep 17 10:54:47 siege ./ser[20513]: DEBUG: t_reply_matching: hash 32382 label 366400597 branch 0 
> Sep 17 10:54:47 siege ./ser[20513]: DEBUG: t_reply_matching: reply matched (T=0x402f8b00)! 
> Sep 17 10:54:47 siege ./ser[20513]: DEBUG: t_check: msg id=5748 global id=5748 T end=0x402f8b00 
> Sep 17 10:54:47 siege ./ser[20513]: DEBUG: t_on_reply: org. status uas=487, uac[0]=0 local=0 is_invite=1) 
> Sep 17 10:54:47 siege ./ser[20513]: ->>>>>>>>> T_code=487, new_code=180 
> Sep 17 10:54:47 siege ./ser[20513]: DEBUG: relay_reply: branch=0, save=0, relay=-1 
> Sep 17 10:54:47 siege ./ser[20513]: WARNING: set_timer called on a "detached" timer -- ignoring: 0x402f8c3c 
> Sep 17 10:54:47 siege ./ser[20513]: DEBUG:destroy_avp_list: destroing list (nil) 
> Sep 17 10:54:47 siege ./ser[20513]: receive_msg: cleaning up 
> Sep 17 10:54:48 siege ./ser[20525]: DEBUG: timer routine:4,tl=0x402f6610 next=(nil) 




More information about the sr-users mailing list