[Serusers] no BYE request

Daniel-Constantin Mierla Daniel-Constantin.Mierla at fokus.fraunhofer.de
Tue Sep 28 16:04:32 CEST 2004


make sure you set the accounting flag for BYEs. For example, if you use
record routing and in your config file you have:

if (loose_route()) {
    t_relay();
    break;
};

replace the block with:

if (loose_route()) {
    if (method=="BYE" /* | method=="..." */){
        log (1, "Accounting flag on\n");
        setflag(1); /* the flag value may be different in your config */
    };
    t_relay();
    break;
};

Daniel




On 09/28/04 15:30, Pavel Siderov wrote:

> I'm using latest CVS version of asterisk and I have one problem - I 
> start ser this way:
> ser -dddddddddddddddddddddddddd
> So when user is calling another user there is INVITE - everything is 
> ok. But when user hang up call is
> finished but I don't see BYE... So this way I can't use acc module to 
> calculate call time.
> Somebody can help me?
> Thanks in advance.
>  
>  
> P.S.
>  
> root at sip:/var/www/sw <mailto:root at sip:/var/www/sw>#  9(12166) SIP Request:
>  9(12166)  method:  <INVITE>
>  9(12166)  uri:     <sip:piem at 192.168.2.14>
>  9(12166)  version: <SIP/2.0>
>  9(12166) parse_headers: flags=1
>  9(12166) Found param type 235, <rport> = <n/a>; state=6
>  9(12166) Found param type 232, <branch> = 
> <z9hG4bK05DA6E2E759C4BFEBA57195FC350EE17>; state=16
>  9(12166) end of header reached, state=5
>  9(12166) parse_headers: Via found, flags=1
>  9(12166) parse_headers: this is the first via
>  9(12166) After parse_msg...
>  9(12166) preparing to run routing scripts...
>  9(12166) parse_headers: flags=128
>  9(12166) end of header reached, state=9
>  9(12166) DEBUG: get_hdr_field: <To> [25]; uri=[sip:piem at 192.168.2.14]
>  9(12166) DEBUG: to body [<sip:piem at 192.168.2.14>
> ]
>  9(12166) get_hdr_field: cseq <CSeq>: <45242> <INVITE>
>  9(12166) DEBUG:maxfwd:is_maxfwd_present: value = 70
>  9(12166) DBG:maxfwd:process_maxfwd_header: value 70 decreased to 16
>  9(12166) parse_headers: flags=256
>  9(12166) DEBUG: get_hdr_body : content_length=295
>  9(12166) found end of header
>  9(12166) find_first_route(): No Route headers found
>  9(12166) loose_route(): There is no Route HF
>  9(12166) check_self - checking if host==us: 12==12 &&  [192.168.2.14] 
> == [192.168.2.14]
>  9(12166) check_self - checking if port 5060 matches port 5060
>  9(12166) rewrite(): Rewriting Request-URI with 
> 'sip:piem at 192.168.2.2:5060'
>  9(12166) DEBUG: t_newtran: msg id=5 , global msg id=3 , T on 
> entrance=0xffffffff
>  9(12166) parse_headers: flags=-1
>  9(12166) parse_headers: flags=60
>  9(12166) t_lookup_request: start searching: hash=23406, isACK=0
>  9(12166) DEBUG: RFC3261 transaction matching failed
>  9(12166) DEBUG: t_lookup_request: no transaction found
>  9(12166) DEBUG: add_param: tag=4060601702
>  9(12166) end of header reached, state=29
>  9(12166) DBG: trans=0x4043e0f8, callback type 1, id 0 entered
>  9(12166) SER: new INVITE
>  9(12166) parse_headers: flags=-1
>  9(12166) check_via_address(192.168.2.111, 192.168.2.111, 3)
>  9(12166) WARNING:vqm_resize: resize(0) called
>  9(12166) DEBUG: reply sent out. buf=0x80ff2a0: SIP/2.0 1..., 
> shmem=0x4043f9f0: SIP/2.0 1
>  9(12166) DEBUG: _reply_light: finished
>  9(12166) DEBUG: mk_proxy: doing DNS lookup...
>  9(12166) check_via_address(192.168.2.111, 192.168.2.111, 3)
>  9(12166) DEBUG: add_timer_unsafe[4]: 0x4043e210
>  9(12166) DEBUG: add_timer_unsafe[0]: 0x4043e220
>  9(12166) SER: new transaction fwd'ed
>  9(12166) parse_headers: flags=44
>  9(12166) DEBUG:destroy_avp_list: destroying list (nil)
>  9(12166) receive_msg: cleaning up
>  4(12158) SIP Reply  (status):
>  4(12158)  version: <SIP/2.0>
>  4(12158)  status:  <100>
>  4(12158)  reason:  <Trying>
>  4(12158) parse_headers: flags=1
>  4(12158) Found param type 232, <branch> = <z9hG4bKe6b5.2905a5f7.0>; 
> state=16
>  4(12158) end of header reached, state=5
>  4(12158) parse_headers: Via found, flags=1
>  4(12158) parse_headers: this is the first via
>  4(12158) After parse_msg...
>  4(12158) forward_reply: found module tm, passing reply to it
>  4(12158) DEBUG: t_check: msg id=2 global id=0 T start=0xffffffff
>  4(12158) parse_headers: flags=17
>  4(12158) Found param type 235, <rport> = <5060>; state=6
>  4(12158) Found param type 232, <branch> = 
> <z9hG4bK05DA6E2E759C4BFEBA57195FC350EE17>; state=16
>  4(12158) end of header reached, state=5
>  4(12158) parse_headers: Via found, flags=17
>  4(12158) parse_headers: this is the second via
>  4(12158) DEBUG: add_param: tag=2313100209
>  4(12158) end of header reached, state=29
>  4(12158) DEBUG: get_hdr_field: <To> [40]; uri=[sip:piem at 192.168.2.14]
>  4(12158) DEBUG: to body [<sip:piem at 192.168.2.14>]
>  4(12158) get_hdr_field: cseq <CSeq>: <45242> <INVITE>
>  4(12158) parse_headers: flags=4
>  4(12158) DEBUG: t_reply_matching: hash 23406 label 2136625298 branch 0
>  4(12158) DEBUG: t_reply_matching: reply matched (T=0x4043e0f8)!
>  4(12158) DEBUG: t_check: msg id=2 global id=2 T end=0x4043e0f8
>  4(12158) DEBUG: reply_received: org. status uas=100, uac[0]=0 local=0 
> is_invite=1)
>  4(12158) ->>>>>>>>> T_code=100, new_code=100
>  4(12158) DEBUG: relay_reply: branch=0, save=0, relay=-1
>  4(12158) DEBUG: add_timer_unsafe[1]: 0x4043e220
>  4(12158) DEBUG:destroy_avp_list: destroying list (nil)
>  4(12158) receive_msg: cleaning up
>  4(12158) SIP Reply  (status):
>  4(12158)  version: <SIP/2.0>
>  4(12158)  status:  <180>
>  4(12158)  reason:  <Ringing>
>  4(12158) parse_headers: flags=1
>  4(12158) Found param type 232, <branch> = <z9hG4bKe6b5.2905a5f7.0>; 
> state=16
>  4(12158) end of header reached, state=5
>  4(12158) parse_headers: Via found, flags=1
>  4(12158) parse_headers: this is the first via
>  4(12158) After parse_msg...
>  4(12158) forward_reply: found module tm, passing reply to it
>  4(12158) DEBUG: t_check: msg id=3 global id=2 T start=0xffffffff
>  4(12158) parse_headers: flags=17
>  4(12158) Found param type 235, <rport> = <5060>; state=6
>  4(12158) Found param type 232, <branch> = 
> <z9hG4bK05DA6E2E759C4BFEBA57195FC350EE17>; state=16
>  4(12158) end of header reached, state=5
>  4(12158) parse_headers: Via found, flags=17
>  4(12158) parse_headers: this is the second via
>  4(12158) DEBUG: add_param: tag=2313100209
>  4(12158) end of header reached, state=29
>  4(12158) DEBUG: get_hdr_field: <To> [40]; uri=[sip:piem at 192.168.2.14]
>  4(12158) DEBUG: to body [<sip:piem at 192.168.2.14>]
>  4(12158) get_hdr_field: cseq <CSeq>: <45242> <INVITE>
>  4(12158) parse_headers: flags=4
>  4(12158) DEBUG: t_reply_matching: hash 23406 label 2136625298 branch 0
>  4(12158) DEBUG: t_reply_matching: reply matched (T=0x4043e0f8)!
>  4(12158) DEBUG: t_check: msg id=3 global id=3 T end=0x4043e0f8
>  4(12158) DEBUG: reply_received: org. status uas=100, uac[0]=100 
> local=0 is_invite=1)
>  4(12158) ->>>>>>>>> T_code=100, new_code=180
>  4(12158) DEBUG: relay_reply: branch=0, save=0, relay=0
>  4(12158)  old size: 438, new size: 377
>  4(12158) build_res_from_sip_res: copied size: orig:82, new: 21, rest: 
> 356 msg=
> SIP/2.0 180 Ringing
> Via: SIP/2.0/UDP 
> 192.168.2.111:5060;rport=5060;branch=z9hG4bK05DA6E2E759C4BFEBA57195FC350EE17
> From: pi <sip:pi at 192.168.2.14>;tag=4060601702
> To: <sip:piem at 192.168.2.14>;tag=2313100209
> Contact: <sip:piem at 192.168.2.2:5060>
> Call-ID: B6387609-0B3E-4F5E-A9C2-BFFF87EF4F86 at 192.168.2.111 
> <mailto:B6387609-0B3E-4F5E-A9C2-BFFF87EF4F86 at 192.168.2.111>
> CSeq: 45242 INVITE
> Server: X-Lite release 1103m
> Content-Length: 0
>  
>
>  4(12158) DEBUG: reply relayed. buf=0x80ff088: SIP/2.0 1..., 
> shmem=0x4043f410: SIP/2.0 1
>  4(12158) DEBUG: add_timer_unsafe[1]: 0x4043e220
>  4(12158) DEBUG:destroy_avp_list: destroying list (nil)
>  4(12158) receive_msg: cleaning up
> 10(12171) DEBUG: timer routine:4,tl=0x4043e210 next=(nil)
>  8(12165) SIP Reply  (status):
>  8(12165)  version: <SIP/2.0>
>  8(12165)  status:  <200>
>  8(12165)  reason:  <Ok>
>  8(12165) parse_headers: flags=1
>  8(12165) Found param type 232, <branch> = <z9hG4bKe6b5.2905a5f7.0>; 
> state=16
>  8(12165) end of header reached, state=5
>  8(12165) parse_headers: Via found, flags=1
>  8(12165) parse_headers: this is the first via
>  8(12165) After parse_msg...
>  8(12165) forward_reply: found module tm, passing reply to it
>  8(12165) DEBUG: t_check: msg id=4 global id=0 T start=0xffffffff
>  8(12165) parse_headers: flags=17
>  8(12165) Found param type 235, <rport> = <5060>; state=6
>  8(12165) Found param type 232, <branch> = 
> <z9hG4bK05DA6E2E759C4BFEBA57195FC350EE17>; state=16
>  8(12165) end of header reached, state=5
>  8(12165) parse_headers: Via found, flags=17
>  8(12165) parse_headers: this is the second via
>  8(12165) DEBUG: add_param: tag=2313100209
>  8(12165) end of header reached, state=29
>  8(12165) DEBUG: get_hdr_field: <To> [40]; uri=[sip:piem at 192.168.2.14]
>  8(12165) DEBUG: to body [<sip:piem at 192.168.2.14>]
>  8(12165) get_hdr_field: cseq <CSeq>: <45242> <INVITE>
>  8(12165) parse_headers: flags=4
>  8(12165) DEBUG: t_reply_matching: hash 23406 label 2136625298 branch 0
>  8(12165) DEBUG: t_reply_matching: reply matched (T=0x4043e0f8)!
>  8(12165) parse_headers: flags=4
>  8(12165) DEBUG: t_check: msg id=4 global id=4 T end=0x4043e0f8
>  8(12165) DEBUG: reply_received: org. status uas=180, uac[0]=180 
> local=0 is_invite=1)
>  8(12165) ->>>>>>>>> T_code=180, new_code=200
>  8(12165) DEBUG: relay_reply: branch=0, save=0, relay=0
>  8(12165)  old size: 735, new size: 674
>  8(12165) build_res_from_sip_res: copied size: orig:77, new: 16, rest: 
> 658 msg=
> SIP/2.0 200 Ok
> Via: SIP/2.0/UDP 
> 192.168.2.111:5060;rport=5060;branch=z9hG4bK05DA6E2E759C4BFEBA57195FC350EE17
> From: pi <sip:pi at 192.168.2.14>;tag=4060601702
> To: <sip:piem at 192.168.2.14>;tag=2313100209
> Contact: <sip:piem at 192.168.2.2:5060>
> Call-ID: B6387609-0B3E-4F5E-A9C2-BFFF87EF4F86 at 192.168.2.111 
> <mailto:B6387609-0B3E-4F5E-A9C2-BFFF87EF4F86 at 192.168.2.111>
> CSeq: 45242 INVITE
> Content-Type: application/sdp
> Server: X-Lite release 1103m
> Content-Length: 269
>  
> v=0
> o=piem 101970734 101978031 IN IP4 192.168.2.2
> s=X-Lite
> c=IN IP4 192.168.2.2
> t=0 0
> m=audio 8000 RTP/AVP 8 3 98 97 101
> a=rtpmap:8 pcma/8000
> a=rtpmap:3 gsm/8000
> a=rtpmap:98 iLBC/8000
> a=rtpmap:97 speex/8000
> a=rtpmap:101 telephone-event/8000
> a=fmtp:101 0-15
>  
>  8(12165) DEBUG: update_totag_set: new totag
>  8(12165) DEBUG: reply relayed. buf=0x80ff110: SIP/2.0 2..., 
> shmem=0x4043f410: SIP/2.0 2
>  8(12165) DEBUG: cleanup_uac_timers: RETR/FR timers reset
>  8(12165) DEBUG: add_timer_unsafe[2]: 0x4043e140
>  8(12165) DEBUG:destroy_avp_list: destroying list (nil)
>  8(12165) receive_msg: cleaning up
> 10(12171) DEBUG: timer routine:1,tl=0x4043e220 next=(nil)
> 10(12171) DEBUG: timer routine:2,tl=0x4043e140 next=(nil)
> 10(12171) DEBUG: wait_handler : removing 0x4043e0f8 from table
> 10(12171) DEBUG: delete transaction 0x4043e0f8
> 10(12171) DEBUG: wait_handler : done
>  
>  
>
>------------------------------------------------------------------------
>
>_______________________________________________
>Serusers mailing list
>serusers at lists.iptel.org
>http://lists.iptel.org/mailman/listinfo/serusers
>  
>




More information about the sr-users mailing list