[SR-Users] Kamailio not mdifying Contact in multi-homed (*sm1Ly)
*sm1Ly
st.uzver at gmail.com
Mon Feb 3 16:56:43 CET 2014
I got really modify my config, and now it looks like:
http://pastebin.com/0M7938Mm
but now I got loopback problems. kamailio just asking itself.
ngrep -d lo port 5060 talks me:
U 194.190.8.171:5060 -> 194.190.8.171:5060
SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP
194.190.8.171;branch=z9hG4bKc2bb.e627f45ee16a4b45ca99321b3bc8832c.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.328c8c23df8e916010525f7f786cbc49.0..Via:
SIP/2.0/UDP 194.190.8.171;rport=5060
;branch=z9hG4bKc2bb.b8ec8f173657be182ad714f59d37d4a8.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.7bec0e7c4a5962e90811bf082f0e6635.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6bbb824e92f328ce4053167b2e2c596a.0..V
ia: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6f732fece1d8956bf5b075118b3dcb2f.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b4ab8b8de819be6fff9203bfdf4e758c.0..Via:
SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2
bb.977524b1111849dd2cd8020d4c09090c.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.cb7d178bf3fdb6596399beaf5b43e66d.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0c69cbf.0..Via:
SIP/2.0/UDP 1
94.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via:
SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a
7f73adc7761c7ba31b.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via:
SIP/2.0/UDP 194.190.8.171;rpor
t=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via:
SIP/2.0/UDP 192.168.1.119:5060
;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988
c4757dae14dfb;rport=5060..From: <sip:1001 at 194.190.8.171>;tag=1274477258..To:
<sip:1001 at 194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID:
00C46D3A-558B-E311-988A-4757DAE14DFB at 192.168.1.119..CSeq: 2
SUBSCRIBE..Server: kamailio (4.1.1 (x
86_64/linux))..Content-Length: 0....
#
U 194.190.8.171:5060 -> 194.190.8.171:5060
SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.328c8c23df8e916010525f7f786cbc49.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b8ec8f173657be182ad714f59d37d4a8.0..Via:
SIP/2.0/UDP 194.190.8.171
;rport=5060;branch=z9hG4bKc2bb.7bec0e7c4a5962e90811bf082f0e6635.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6bbb824e92f328ce4053167b2e2c596a.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6f732fece1d8956bf5b075118b
3dcb2f.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b4ab8b8de819be6fff9203bfdf4e758c.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.977524b1111849dd2cd8020d4c09090c.0..Via:
SIP/2.0/UDP 194.190.8.171;rport=5060;branc
h=z9hG4bKc2bb.cb7d178bf3fdb6596399beaf5b43e66d.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0c69cbf.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via:
SI
P/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via:
SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01d
cad6cb7e8257bcbe8ad7b66b7b095.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via:
SIP/2.0/UDP 194.190
.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via:
SIP/2.0/UDP 192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From:
<sip:1001 at 194.190.8.171>;tag=1274477258..To: <sip:1001
@194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID:
00C46D3A-558B-E311-988A-4757DAE14DFB at 192.168.1.119..CSeq: 2
SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....
#
U 194.190.8.171:5060 -> 194.190.8.171:5060
SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b8ec8f173657be182ad714f59d37d4a8.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.7bec0e7c4a5962e90811bf082f0e6635.0..Via:
SIP/2.0/UDP 194.190.8.171
;rport=5060;branch=z9hG4bKc2bb.6bbb824e92f328ce4053167b2e2c596a.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6f732fece1d8956bf5b075118b3dcb2f.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b4ab8b8de819be6fff9203bfdf
4e758c.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.977524b1111849dd2cd8020d4c09090c.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.cb7d178bf3fdb6596399beaf5b43e66d.0..Via:
SIP/2.0/UDP 194.190.8.171;rport=5060;branc
h=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0c69cbf.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via:
SI
P/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via:
SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946
cc81be473148e1a6dc5a173b2cfb1.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via:
SIP/2.0/UDP 192.168
.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From:
<sip:1001 at 194.190.8.171>;tag=1274477258..To:
<sip:1001 at 194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID:
00C46D3A-558B-E311-988A-4757D
AE14DFB at 192.168.1.119..CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1
(x86_64/linux))..Content-Length: 0....
#
U 194.190.8.171:5060 -> 194.190.8.171:5060
SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.7bec0e7c4a5962e90811bf082f0e6635.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6bbb824e92f328ce4053167b2e2c596a.0..Via:
SIP/2.0/UDP 194.190.8.171
;rport=5060;branch=z9hG4bKc2bb.6f732fece1d8956bf5b075118b3dcb2f.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b4ab8b8de819be6fff9203bfdf4e758c.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.977524b1111849dd2cd8020d4c
09090c.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.cb7d178bf3fdb6596399beaf5b43e66d.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0c69cbf.0..Via:
SIP/2.0/UDP 194.190.8.171;rport=5060;branc
h=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via:
SI
P/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via:
SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0ea
f0b545ac8239ad5e105fc2804cae8.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via:
SIP/2.0/UDP 192.168.1.119:5060
;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..Fro
m: <sip:1001 at 194.190.8.171>;tag=1274477258..To:
<sip:1001 at 194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID:
00C46D3A-558B-E311-988A-4757DAE14DFB at 192.168.1.119..CSeq: 2
SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length
: 0....
#
U 194.190.8.171:5060 -> 194.190.8.171:5060
SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6bbb824e92f328ce4053167b2e2c596a.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6f732fece1d8956bf5b075118b3dcb2f.0..Via:
SIP/2.0/UDP 194.190.8.171
;rport=5060;branch=z9hG4bKc2bb.b4ab8b8de819be6fff9203bfdf4e758c.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.977524b1111849dd2cd8020d4c09090c.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.cb7d178bf3fdb6596399beaf5b
43e66d.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0c69cbf.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via:
SIP/2.0/UDP 194.190.8.171;rport=5060;branc
h=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via:
SI
P/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via:
SIP/2.0/UDP 194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d
28c8a5ba1eeda8f8b296f6d2232e8.0..Via: SIP/2.0/UDP
192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From:
<sip:1001 at 194.190.8.171>;tag=1274477258..To: <sip:1001 at 194.190.8.171
>;tag=c5aea4efd01978ba4655
7f38f3d08cfc.2793..Call-ID:
00C46D3A-558B-E311-988A-4757DAE14DFB at 192.168.1.119..CSeq: 2
SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....
#
U 194.190.8.171:5060 -> 194.190.8.171:5060
SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.6f732fece1d8956bf5b075118b3dcb2f.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b4ab8b8de819be6fff9203bfdf4e758c.0..Via:
SIP/2.0/UDP 194.190.8.171
;rport=5060;branch=z9hG4bKc2bb.977524b1111849dd2cd8020d4c09090c.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.cb7d178bf3fdb6596399beaf5b43e66d.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0
c69cbf.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via:
SIP/2.0/UDP 194.190.8.171;rport=5060;branc
h=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via:
SI
P/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via:
SIP/2.0/UDP 192.168.1.119:5060;received=77.37.241.151;branc
h=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From: <
sip:1001 at 194.190.8.171>;tag=1274477258..To:
<sip:1001 at 194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID:
00C46D3A-558B-E311-988A-4757DAE14DFB at 192.168.1.119..CSeq: 2 SUBSCRIBE
..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....
#
U 194.190.8.171:5060 -> 194.190.8.171:5060
SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b4ab8b8de819be6fff9203bfdf4e758c.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.977524b1111849dd2cd8020d4c09090c.0..Via:
SIP/2.0/UDP 194.190.8.171
;rport=5060;branch=z9hG4bKc2bb.cb7d178bf3fdb6596399beaf5b43e66d.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0c69cbf.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e
520e4e.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via:
SIP/2.0/UDP 194.190.8.171;rport=5060;branc
h=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via:
SI
P/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via:
SIP/2.0/UDP 192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From:
<sip:1001 at 194.190.8.171>;tag=12744772
58..To: <sip:1001 at 194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID:
00C46D3A-558B-E311-988A-4757DAE14DFB at 192.168.1.119..CSeq: 2
SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....
#
U 194.190.8.171:5060 -> 194.190.8.171:5060
SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.977524b1111849dd2cd8020d4c09090c.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.cb7d178bf3fdb6596399beaf5b43e66d.0..Via:
SIP/2.0/UDP 194.190.8.171
;rport=5060;branch=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0c69cbf.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf7
3e9e32.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via:
SIP/2.0/UDP 194.190.8.171;rport=5060;branc
h=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via:
SI
P/2.0/UDP 192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From:
<sip:1001 at 194.190.8.171>;tag=1274477258..To:
<sip:1001 at 194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID:
00C46D3A-558
B-E311-988A-4757DAE14DFB at 192.168.1.119..CSeq: 2 SUBSCRIBE..Server:
kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....
#
U 194.190.8.171:5060 -> 194.190.8.171:5060
SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.cb7d178bf3fdb6596399beaf5b43e66d.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0c69cbf.0..Via:
SIP/2.0/UDP 194.190.8.171
;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c
7ba31b.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via:
SIP/2.0/UDP 194.190.8.171;rport=5060;branc
h=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via:
SIP/2.0/UDP 192.168.1.119:5060
;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14df
b;rport=5060..From: <sip:1001 at 194.190.8.171>;tag=1274477258..To: <
sip:1001 at 194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID:
00C46D3A-558B-E311-988A-4757DAE14DFB at 192.168.1.119..CSeq: 2
SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux)
)..Content-Length: 0....
#
U 194.190.8.171:5060 -> 194.190.8.171:5060
SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.bd5d0e524121d2fd121fa6e8f0c69cbf.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via:
SIP/2.0/UDP 194.190.8.171
;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66
b7b095.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via:
SIP/2.0/UDP 194.190.8.171;rport=5060;branc
h=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via: SIP/2.0/UDP
192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From:
<sip:1001 at 194.190.8.171>;tag=1274477258..To: <sip:1001 at 194.190.8.171
>;tag=c5a
ea4efd01978ba46557f38f3d08cfc.2793..Call-ID:
00C46D3A-558B-E311-988A-4757DAE14DFB at 192.168.1.119..CSeq: 2
SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....
#
U 194.190.8.171:5060 -> 194.190.8.171:5060
SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.98352f1121cb37b6feb7814a0e520e4e.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via:
SIP/2.0/UDP 194.190.8.171
;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173
b2cfb1.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via:
SIP/2.0/UDP 192.168.1.119:5060;received=77
.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From:
<sip:1001 at 194.190.8.171>;tag=1274477258..To:
<sip:1001 at 194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID:
00C46D3A-558B-E311-988A-4757DAE14DFB at 192.168.1.119..
CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1
(x86_64/linux))..Content-Length: 0....
#
U 194.190.8.171:5060 -> 194.190.8.171:5060
SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.b670b117fb4d3a40912cb25cf73e9e32.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via:
SIP/2.0/UDP 194.190.8.171
;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc28
04cae8.0..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via:
SIP/2.0/UDP 192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From:
<sip:1001 at 194.190.8.
171>;tag=1274477258..To:
<sip:1001 at 194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID:
00C46D3A-558B-E311-988A-4757DAE14DFB at 192.168.1.119..CSeq: 2
SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....
#
U 194.190.8.171:5060 -> 194.190.8.171:5060
SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.ac9e718c5fd57a7f73adc7761c7ba31b.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via:
SIP/2.0/UDP 194.190.8.171
;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d
2232e8.0..Via: SIP/2.0/UDP
192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From:
<sip:1001 at 194.190.8.171>;tag=1274477258..To: <sip:1001 at 194.190.8.171
>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call
-ID: 00C46D3A-558B-E311-988A-4757DAE14DFB at 192.168.1.119..CSeq: 2
SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....
#
U 194.190.8.171:5060 -> 194.190.8.171:5060
SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.01dcad6cb7e8257bcbe8ad7b66b7b095.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via:
SIP/2.0/UDP 194.190.8.171
;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via:
SIP/2.0/UDP 192.168.1.119:5060
;received=77.37.241.151;branch=z9hG4bK00c46d3a558be3
11988c4757dae14dfb;rport=5060..From:
<sip:1001 at 194.190.8.171>;tag=1274477258..To:
<sip:1001 at 194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID:
00C46D3A-558B-E311-988A-4757DAE14DFB at 192.168.1.119..CSeq: 2
SUBSCRIBE..Server: kamailio (4.1
.1 (x86_64/linux))..Content-Length: 0....
#
U 194.190.8.171:5060 -> 194.190.8.171:5060
SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.946cc81be473148e1a6dc5a173b2cfb1.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via:
SIP/2.0/UDP 194.190.8.171
;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via:
SIP/2.0/UDP 192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From:
<sip:1001 at 194.190.8.171>;tag=1274477258..To: <sip:1001 at 194.1
90.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID:
00C46D3A-558B-E311-988A-4757DAE14DFB at 192.168.1.119..CSeq: 2
SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0....
#
U 194.190.8.171:5060 -> 194.190.8.171:5060
SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.0eaf0b545ac8239ad5e105fc2804cae8.0..Via:
SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via:
SIP/2.0/UDP 192.168.1.119
:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From:
<sip:1001 at 194.190.8.171>;tag=1274477258..To:
<sip:1001 at 194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID:
00C46D3A-558B-E311-988A-4757DAE14DF
B at 192.168.1.119..CSeq: 2 SUBSCRIBE..Server: kamailio (4.1.1
(x86_64/linux))..Content-Length: 0....
#
U 194.190.8.171:5060 -> 194.190.8.171:5060
SIP/2.0 483 Too Many Hops..Via: SIP/2.0/UDP
194.190.8.171;rport=5060;branch=z9hG4bKc2bb.c1d28c8a5ba1eeda8f8b296f6d2232e8.0..Via:
SIP/2.0/UDP 192.168.1.119:5060;received=77.37.241.151;branch=z9hG4bK00c46d3a558be311988c4757dae14dfb;rport=5060..From:
<si
p:1001 at 194.190.8.171>;tag=1274477258..To:
<sip:1001 at 194.190.8.171>;tag=c5aea4efd01978ba46557f38f3d08cfc.2793..Call-ID:
00C46D3A-558B-E311-988A-4757DAE14DFB at 192.168.1.119..CSeq: 2
SUBSCRIBE..Server: kamailio (4.1.1 (x86_64/linux))..Content-Length: 0...
.
and how looks dump
1. from sip device to kamailio
[root at kamaz sm1ly]# tcpdump -nn -i eth0 host 77.37.241.151 -v
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 65535
bytes
19:54:51.205942 IP (tos 0x0, ttl 57, id 0, offset 0, flags [DF], proto UDP
(17), length 421)
77.37.241.151.57288 > 194.190.8.171.5060: SIP, length: 393
REGISTER sip:194.190.8.171 SIP/2.0
Call-ID: 676c32ab221a665a9bc9875ffb74930a at 192.168.1.103
CSeq: 5569 REGISTER
From: "1002" <sip:1002 at 194.190.8.171>;tag=2801080754
To: "1002" <sip:1002 at 194.190.8.171>
Via: SIP/2.0/UDP 192.168.1.103:57288
;branch=z9hG4bKe5bd1a6ceba7f0a0f4e7487cb17ca365353236;rport
Max-Forwards: 70
User-Agent: SIPAUA/0.1.001
Contact: *
Expires: 0
Content-Length: 0
19:54:51.210060 IP (tos 0x10, ttl 64, id 35861, offset 0, flags [none],
proto UDP (17), length 603)
194.190.8.171.5060 > 77.37.241.151.57288: SIP, length: 575
SIP/2.0 401 Unauthorized
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bKe5bd1a6ceba7f0a0f4e7487cb17ca365353236;rport=57288
From: "1002" <sip:1002 at 194.190.8.171>;tag=2801080754
To: "1002" <sip:1002 at 194.190.8.171>;tag=as518dbea9
Call-ID: 676c32ab221a665a9bc9875ffb74930a at 192.168.1.103
CSeq: 5569 REGISTER
Server: Asterisk PBX 1.8.20.0
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
WWW-Authenticate: Digest algorithm=MD5, realm="asterisk",
nonce="31daf0f8"
Content-Length: 0
19:54:51.257552 IP (tos 0x0, ttl 57, id 0, offset 0, flags [DF], proto UDP
(17), length 586)
77.37.241.151.57288 > 194.190.8.171.5060: SIP, length: 558
REGISTER sip:194.190.8.171:5060 SIP/2.0
Call-ID: 676c32ab221a665a9bc9875ffb74930a at 192.168.1.103
CSeq: 5570 REGISTER
From: "1002" <sip:1002 at 194.190.8.171>;tag=2801080754
To: "1002" <sip:1002 at 194.190.8.171>
Via: SIP/2.0/UDP 192.168.1.103:57288
;branch=z9hG4bK440337c23337c9913220fd825f4d9ded353236;rport
Max-Forwards: 70
User-Agent: SIPAUA/0.1.001
Contact: *
Expires: 0
Authorization: Digest
username="1002",realm="asterisk",nonce="31daf0f8",uri="sip:
194.190.8.171:5060
",response="2b0222b07da7af1c3b72c2eb36241f5f",algorithm=MD5
Content-Length: 0
19:54:51.261209 IP (tos 0x10, ttl 64, id 35862, offset 0, flags [none],
proto UDP (17), length 603)
194.190.8.171.5060 > 77.37.241.151.57288: SIP, length: 575
SIP/2.0 401 Unauthorized
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bK440337c23337c9913220fd825f4d9ded353236;rport=57288
From: "1002" <sip:1002 at 194.190.8.171>;tag=2801080754
To: "1002" <sip:1002 at 194.190.8.171>;tag=as0716dea5
Call-ID: 676c32ab221a665a9bc9875ffb74930a at 192.168.1.103
CSeq: 5570 REGISTER
Server: Asterisk PBX 1.8.20.0
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
WWW-Authenticate: Digest algorithm=MD5, realm="asterisk",
nonce="2f70c759"
Content-Length: 0
19:54:51.290458 IP (tos 0x0, ttl 57, id 0, offset 0, flags [DF], proto UDP
(17), length 586)
77.37.241.151.57288 > 194.190.8.171.5060: SIP, length: 558
REGISTER sip:194.190.8.171:5060 SIP/2.0
Call-ID: 676c32ab221a665a9bc9875ffb74930a at 192.168.1.103
CSeq: 5571 REGISTER
From: "1002" <sip:1002 at 194.190.8.171>;tag=2801080754
To: "1002" <sip:1002 at 194.190.8.171>
Via: SIP/2.0/UDP 192.168.1.103:57288
;branch=z9hG4bK30fe030eee49e2eb50c619074c0f057b353236;rport
Max-Forwards: 70
User-Agent: SIPAUA/0.1.001
Contact: *
Expires: 0
Authorization: Digest
username="1002",realm="asterisk",nonce="2f70c759",uri="sip:
194.190.8.171:5060
",response="9eb7d157cfd0d8e8575b59c94c5f82f6",algorithm=MD5
Content-Length: 0
19:54:51.295285 IP (tos 0x10, ttl 64, id 35863, offset 0, flags [none],
proto UDP (17), length 566)
194.190.8.171.5060 > 77.37.241.151.57288: SIP, length: 538
SIP/2.0 200 OK
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bK30fe030eee49e2eb50c619074c0f057b353236;rport=57288
From: "1002" <sip:1002 at 194.190.8.171>;tag=2801080754
To: "1002" <sip:1002 at 194.190.8.171>;tag=as0716dea5
Call-ID: 676c32ab221a665a9bc9875ffb74930a at 192.168.1.103
CSeq: 5571 REGISTER
Server: Asterisk PBX 1.8.20.0
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
Expires: 0
Date: Mon, 03 Feb 2014 15:54:51 GMT
Content-Length: 0
19:54:51.314824 IP (tos 0x0, ttl 57, id 0, offset 0, flags [DF], proto UDP
(17), length 473)
77.37.241.151.57288 > 194.190.8.171.5060: SIP, length: 445
REGISTER sip:194.190.8.171 SIP/2.0
Call-ID: fffb7a09e489ce1cad6783709652b6f9 at 192.168.1.103
CSeq: 2404 REGISTER
From: "1002" <sip:1002 at 194.190.8.171>;tag=134783744
To: "1002" <sip:1002 at 194.190.8.171>
Via: SIP/2.0/UDP 192.168.1.103:57288
;branch=z9hG4bKdeb946998664720c2c93538625cc649e353236;rport
Max-Forwards: 70
User-Agent: SIPAUA/0.1.001
Contact: "1002" <sip:1002 at 192.168.1.103:57288;transport=udp>
Expires: 3600
Content-Length: 0
19:54:51.319697 IP (tos 0x10, ttl 64, id 35864, offset 0, flags [none],
proto UDP (17), length 602)
194.190.8.171.5060 > 77.37.241.151.57288: SIP, length: 574
SIP/2.0 401 Unauthorized
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bKdeb946998664720c2c93538625cc649e353236;rport=57288
From: "1002" <sip:1002 at 194.190.8.171>;tag=134783744
To: "1002" <sip:1002 at 194.190.8.171>;tag=as0bba2324
Call-ID: fffb7a09e489ce1cad6783709652b6f9 at 192.168.1.103
CSeq: 2404 REGISTER
Server: Asterisk PBX 1.8.20.0
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
WWW-Authenticate: Digest algorithm=MD5, realm="asterisk",
nonce="023deb34"
Content-Length: 0
19:54:51.344080 IP (tos 0x0, ttl 57, id 0, offset 0, flags [DF], proto UDP
(17), length 638)
77.37.241.151.57288 > 194.190.8.171.5060: SIP, length: 610
REGISTER sip:194.190.8.171:5060 SIP/2.0
Call-ID: fffb7a09e489ce1cad6783709652b6f9 at 192.168.1.103
CSeq: 2405 REGISTER
From: "1002" <sip:1002 at 194.190.8.171>;tag=134783744
To: "1002" <sip:1002 at 194.190.8.171>
Via: SIP/2.0/UDP 192.168.1.103:57288
;branch=z9hG4bK60a6798f72024444a9870698b766a04c353236;rport
Max-Forwards: 70
User-Agent: SIPAUA/0.1.001
Contact: "1002" <sip:1002 at 192.168.1.103:57288;transport=udp>
Expires: 3600
Authorization: Digest
username="1002",realm="asterisk",nonce="023deb34",uri="sip:
194.190.8.171:5060
",response="7fa5be98c7c0c395ed41f9e7da095629",algorithm=MD5
Content-Length: 0
19:54:51.350423 IP (tos 0x10, ttl 64, id 35865, offset 0, flags [none],
proto UDP (17), length 602)
194.190.8.171.5060 > 77.37.241.151.57288: SIP, length: 574
SIP/2.0 401 Unauthorized
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bK60a6798f72024444a9870698b766a04c353236;rport=57288
From: "1002" <sip:1002 at 194.190.8.171>;tag=134783744
To: "1002" <sip:1002 at 194.190.8.171>;tag=as065abeba
Call-ID: fffb7a09e489ce1cad6783709652b6f9 at 192.168.1.103
CSeq: 2405 REGISTER
Server: Asterisk PBX 1.8.20.0
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
WWW-Authenticate: Digest algorithm=MD5, realm="asterisk",
nonce="26886c3d"
Content-Length: 0
19:54:51.370976 IP (tos 0x0, ttl 57, id 0, offset 0, flags [DF], proto UDP
(17), length 638)
77.37.241.151.57288 > 194.190.8.171.5060: SIP, length: 610
REGISTER sip:194.190.8.171:5060 SIP/2.0
Call-ID: fffb7a09e489ce1cad6783709652b6f9 at 192.168.1.103
CSeq: 2406 REGISTER
From: "1002" <sip:1002 at 194.190.8.171>;tag=134783744
To: "1002" <sip:1002 at 194.190.8.171>
Via: SIP/2.0/UDP 192.168.1.103:57288
;branch=z9hG4bKf4d831e0612e1074bf49397d92907c80353236;rport
Max-Forwards: 70
User-Agent: SIPAUA/0.1.001
Contact: "1002" <sip:1002 at 192.168.1.103:57288;transport=udp>
Expires: 3600
Authorization: Digest
username="1002",realm="asterisk",nonce="26886c3d",uri="sip:
194.190.8.171:5060
",response="cc17aae74d45f06e4712aa66b08e68df",algorithm=MD5
Content-Length: 0
19:54:51.380962 IP (tos 0x10, ttl 64, id 35866, offset 0, flags [none],
proto UDP (17), length 636)
194.190.8.171.5060 > 77.37.241.151.57288: SIP, length: 608
SIP/2.0 200 OK
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bKf4d831e0612e1074bf49397d92907c80353236;rport=57288
From: "1002" <sip:1002 at 194.190.8.171>;tag=134783744
To: "1002" <sip:1002 at 194.190.8.171>;tag=as065abeba
Call-ID: fffb7a09e489ce1cad6783709652b6f9 at 192.168.1.103
CSeq: 2406 REGISTER
Server: Asterisk PBX 1.8.20.0
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
Expires: 3600
Contact: <sip:1002 at 192.168.1.103:57288;transport=udp>;expires=3600
Date: Mon, 03 Feb 2014 15:54:51 GMT
Content-Length: 0
19:54:51.406160 IP (tos 0x0, ttl 57, id 0, offset 0, flags [DF], proto UDP
(17), length 395)
77.37.241.151.57288 > 194.190.8.171.5060: SIP, length: 367
OPTIONS sip:194.190.8.171 SIP/2.0
Call-ID: 28b382a24bc3e426f030593cec5f852a at 192.168.1.103
CSeq: 1287 OPTIONS
From: "1002" <sip:1002 at 194.190.8.171>;tag=3866552602
To: "1002" <sip:1002 at 194.190.8.171>
Via: SIP/2.0/UDP 192.168.1.103:57288
;branch=z9hG4bK9bddae72a5ccaf0df80be00ba2882dfd353236;rport
Max-Forwards: 70
User-Agent: SIPAUA/0.1.001
Content-Length: 0
19:54:51.407799 IP (tos 0x10, ttl 64, id 35867, offset 0, flags [none],
proto UDP (17), length 458)
194.190.8.171.5060 > 77.37.241.151.57288: SIP, length: 430
SIP/2.0 484 Address Incomplete
Call-ID: 28b382a24bc3e426f030593cec5f852a at 192.168.1.103
CSeq: 1287 OPTIONS
From: "1002" <sip:1002 at 194.190.8.171>;tag=3866552602
To: "1002" <sip:1002 at 194.190.8.171
>;tag=c5aea4efd01978ba46557f38f3d08cfc.5162
Via: SIP/2.0/UDP 192.168.1.103:57288
;branch=z9hG4bK9bddae72a5ccaf0df80be00ba2882dfd353236;rport=57288;received=77.37.241.151
Server: kamailio (4.1.1 (x86_64/linux))
Content-Length: 0
2. from kamailio to asterisk.
[root at kamaz sm1ly]# tcpdump -nn -i eth1 host 50.0.0.10 -v and port 5060
tcpdump: listening on eth1, link-type EN10MB (Ethernet), capture size 65535
bytes
19:54:41.906391 IP (tos 0x0, ttl 64, id 5618, offset 0, flags [none], proto
UDP (17), length 597)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569
OPTIONS sip:1002 at 192.168.1.103:34713;transport=udp SIP/2.0
Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK75f42160;rport
Max-Forwards: 70
From: "asterisk" <sip:asterisk at 50.0.0.10>;tag=as40fc69ea
To: <sip:1002 at 192.168.1.103:34713;transport=udp>
Contact: <sip:asterisk at 50.0.0.10:5060>
Call-ID: 7bacfa62676409266240568c5c9d055b at 50.0.0.10:5060
CSeq: 102 OPTIONS
User-Agent: Asterisk PBX 1.8.20.0
Date: Mon, 03 Feb 2014 15:54:41 GMT
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
Content-Length: 0
19:54:42.906385 IP (tos 0x0, ttl 64, id 5619, offset 0, flags [none], proto
UDP (17), length 597)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569
OPTIONS sip:1002 at 192.168.1.103:34713;transport=udp SIP/2.0
Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK75f42160;rport
Max-Forwards: 70
From: "asterisk" <sip:asterisk at 50.0.0.10>;tag=as40fc69ea
To: <sip:1002 at 192.168.1.103:34713;transport=udp>
Contact: <sip:asterisk at 50.0.0.10:5060>
Call-ID: 7bacfa62676409266240568c5c9d055b at 50.0.0.10:5060
CSeq: 102 OPTIONS
User-Agent: Asterisk PBX 1.8.20.0
Date: Mon, 03 Feb 2014 15:54:41 GMT
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
Content-Length: 0
19:54:43.906565 IP (tos 0x0, ttl 64, id 5620, offset 0, flags [none], proto
UDP (17), length 597)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569
OPTIONS sip:1002 at 192.168.1.103:34713;transport=udp SIP/2.0
Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK75f42160;rport
Max-Forwards: 70
From: "asterisk" <sip:asterisk at 50.0.0.10>;tag=as40fc69ea
To: <sip:1002 at 192.168.1.103:34713;transport=udp>
Contact: <sip:asterisk at 50.0.0.10:5060>
Call-ID: 7bacfa62676409266240568c5c9d055b at 50.0.0.10:5060
CSeq: 102 OPTIONS
User-Agent: Asterisk PBX 1.8.20.0
Date: Mon, 03 Feb 2014 15:54:41 GMT
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
Content-Length: 0
19:54:44.904726 IP (tos 0x10, ttl 64, id 34743, offset 0, flags [none],
proto UDP (17), length 413)
50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 385
SIP/2.0 408 Request Timeout
Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK75f42160;rport=5060
From: "asterisk" <sip:asterisk at 50.0.0.10>;tag=as40fc69ea
To: <sip:1002 at 192.168.1.103:34713
;transport=udp>;tag=6f6209fafb0c4bc816e1e7aa854ee2dd-8578
Call-ID: 7bacfa62676409266240568c5c9d055b at 50.0.0.10:5060
CSeq: 102 OPTIONS
Server: kamailio (4.1.1 (x86_64/linux))
Content-Length: 0
19:54:51.207422 IP (tos 0x10, ttl 64, id 34744, offset 0, flags [none],
proto UDP (17), length 531)
50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 503
REGISTER sip:194.190.8.171 SIP/2.0
Call-ID: 676c32ab221a665a9bc9875ffb74930a at 192.168.1.103
CSeq: 5569 REGISTER
From: "1002" <sip:1002 at 194.190.8.171>;tag=2801080754
To: "1002" <sip:1002 at 194.190.8.171>
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bKd8a1.094de0504827adb22c7b874f77dfd698.0
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bKe5bd1a6ceba7f0a0f4e7487cb17ca365353236;rport=57288
Max-Forwards: 16
User-Agent: SIPAUA/0.1.001
Contact: *
Expires: 0
Content-Length: 0
19:54:51.209052 IP (tos 0x0, ttl 64, id 5621, offset 0, flags [none], proto
UDP (17), length 713)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 685
SIP/2.0 401 Unauthorized
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bKd8a1.094de0504827adb22c7b874f77dfd698.0;received=50.0.0.1;rport=5060
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bKe5bd1a6ceba7f0a0f4e7487cb17ca365353236;rport=57288
From: "1002" <sip:1002 at 194.190.8.171>;tag=2801080754
To: "1002" <sip:1002 at 194.190.8.171>;tag=as518dbea9
Call-ID: 676c32ab221a665a9bc9875ffb74930a at 192.168.1.103
CSeq: 5569 REGISTER
Server: Asterisk PBX 1.8.20.0
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
WWW-Authenticate: Digest algorithm=MD5, realm="asterisk",
nonce="31daf0f8"
Content-Length: 0
19:54:51.258759 IP (tos 0x10, ttl 64, id 34745, offset 0, flags [none],
proto UDP (17), length 696)
50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 668
REGISTER sip:194.190.8.171:5060 SIP/2.0
Call-ID: 676c32ab221a665a9bc9875ffb74930a at 192.168.1.103
CSeq: 5570 REGISTER
From: "1002" <sip:1002 at 194.190.8.171>;tag=2801080754
To: "1002" <sip:1002 at 194.190.8.171>
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK56b1.d46d0ab6448c5edd99f24aa7ba8a2881.0
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bK440337c23337c9913220fd825f4d9ded353236;rport=57288
Max-Forwards: 16
User-Agent: SIPAUA/0.1.001
Contact: *
Expires: 0
Authorization: Digest
username="1002",realm="asterisk",nonce="31daf0f8",uri="sip:
194.190.8.171:5060
",response="2b0222b07da7af1c3b72c2eb36241f5f",algorithm=MD5
Content-Length: 0
19:54:51.259902 IP (tos 0x0, ttl 64, id 5622, offset 0, flags [none], proto
UDP (17), length 713)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 685
SIP/2.0 401 Unauthorized
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK56b1.d46d0ab6448c5edd99f24aa7ba8a2881.0;received=50.0.0.1;rport=5060
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bK440337c23337c9913220fd825f4d9ded353236;rport=57288
From: "1002" <sip:1002 at 194.190.8.171>;tag=2801080754
To: "1002" <sip:1002 at 194.190.8.171>;tag=as0716dea5
Call-ID: 676c32ab221a665a9bc9875ffb74930a at 192.168.1.103
CSeq: 5570 REGISTER
Server: Asterisk PBX 1.8.20.0
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
WWW-Authenticate: Digest algorithm=MD5, realm="asterisk",
nonce="2f70c759"
Content-Length: 0
19:54:51.292190 IP (tos 0x10, ttl 64, id 34746, offset 0, flags [none],
proto UDP (17), length 696)
50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 668
REGISTER sip:194.190.8.171:5060 SIP/2.0
Call-ID: 676c32ab221a665a9bc9875ffb74930a at 192.168.1.103
CSeq: 5571 REGISTER
From: "1002" <sip:1002 at 194.190.8.171>;tag=2801080754
To: "1002" <sip:1002 at 194.190.8.171>
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK66b1.0173e2524e6deda0f27b83591a62730f.0
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bK30fe030eee49e2eb50c619074c0f057b353236;rport=57288
Max-Forwards: 16
User-Agent: SIPAUA/0.1.001
Contact: *
Expires: 0
Authorization: Digest
username="1002",realm="asterisk",nonce="2f70c759",uri="sip:
194.190.8.171:5060
",response="9eb7d157cfd0d8e8575b59c94c5f82f6",algorithm=MD5
Content-Length: 0
19:54:51.293302 IP (tos 0x0, ttl 64, id 5623, offset 0, flags [none], proto
UDP (17), length 676)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 648
SIP/2.0 200 OK
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK66b1.0173e2524e6deda0f27b83591a62730f.0;received=50.0.0.1;rport=5060
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bK30fe030eee49e2eb50c619074c0f057b353236;rport=57288
From: "1002" <sip:1002 at 194.190.8.171>;tag=2801080754
To: "1002" <sip:1002 at 194.190.8.171>;tag=as0716dea5
Call-ID: 676c32ab221a665a9bc9875ffb74930a at 192.168.1.103
CSeq: 5571 REGISTER
Server: Asterisk PBX 1.8.20.0
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
Expires: 0
Date: Mon, 03 Feb 2014 15:54:51 GMT
Content-Length: 0
19:54:51.317242 IP (tos 0x10, ttl 64, id 34747, offset 0, flags [none],
proto UDP (17), length 583)
50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 555
REGISTER sip:194.190.8.171 SIP/2.0
Call-ID: fffb7a09e489ce1cad6783709652b6f9 at 192.168.1.103
CSeq: 2404 REGISTER
From: "1002" <sip:1002 at 194.190.8.171>;tag=134783744
To: "1002" <sip:1002 at 194.190.8.171>
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK2624.44980ae0ad3ba5026d6f044c24770539.0
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bKdeb946998664720c2c93538625cc649e353236;rport=57288
Max-Forwards: 16
User-Agent: SIPAUA/0.1.001
Contact: "1002" <sip:1002 at 192.168.1.103:57288;transport=udp>
Expires: 3600
Content-Length: 0
19:54:51.318123 IP (tos 0x0, ttl 64, id 5624, offset 0, flags [none], proto
UDP (17), length 712)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 684
SIP/2.0 401 Unauthorized
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK2624.44980ae0ad3ba5026d6f044c24770539.0;received=50.0.0.1;rport=5060
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bKdeb946998664720c2c93538625cc649e353236;rport=57288
From: "1002" <sip:1002 at 194.190.8.171>;tag=134783744
To: "1002" <sip:1002 at 194.190.8.171>;tag=as0bba2324
Call-ID: fffb7a09e489ce1cad6783709652b6f9 at 192.168.1.103
CSeq: 2404 REGISTER
Server: Asterisk PBX 1.8.20.0
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
WWW-Authenticate: Digest algorithm=MD5, realm="asterisk",
nonce="023deb34"
Content-Length: 0
19:54:51.346522 IP (tos 0x10, ttl 64, id 34748, offset 0, flags [none],
proto UDP (17), length 748)
50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 720
REGISTER sip:194.190.8.171:5060 SIP/2.0
Call-ID: fffb7a09e489ce1cad6783709652b6f9 at 192.168.1.103
CSeq: 2405 REGISTER
From: "1002" <sip:1002 at 194.190.8.171>;tag=134783744
To: "1002" <sip:1002 at 194.190.8.171>
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK3624.173cef757dc8f7da8b864ee1ab1bfe50.0
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bK60a6798f72024444a9870698b766a04c353236;rport=57288
Max-Forwards: 16
User-Agent: SIPAUA/0.1.001
Contact: "1002" <sip:1002 at 192.168.1.103:57288;transport=udp>
Expires: 3600
Authorization: Digest
username="1002",realm="asterisk",nonce="023deb34",uri="sip:
194.190.8.171:5060
",response="7fa5be98c7c0c395ed41f9e7da095629",algorithm=MD5
Content-Length: 0
19:54:51.348056 IP (tos 0x0, ttl 64, id 5625, offset 0, flags [none], proto
UDP (17), length 712)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 684
SIP/2.0 401 Unauthorized
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK3624.173cef757dc8f7da8b864ee1ab1bfe50.0;received=50.0.0.1;rport=5060
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bK60a6798f72024444a9870698b766a04c353236;rport=57288
From: "1002" <sip:1002 at 194.190.8.171>;tag=134783744
To: "1002" <sip:1002 at 194.190.8.171>;tag=as065abeba
Call-ID: fffb7a09e489ce1cad6783709652b6f9 at 192.168.1.103
CSeq: 2405 REGISTER
Server: Asterisk PBX 1.8.20.0
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
WWW-Authenticate: Digest algorithm=MD5, realm="asterisk",
nonce="26886c3d"
Content-Length: 0
19:54:51.373298 IP (tos 0x10, ttl 64, id 34749, offset 0, flags [none],
proto UDP (17), length 748)
50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 720
REGISTER sip:194.190.8.171:5060 SIP/2.0
Call-ID: fffb7a09e489ce1cad6783709652b6f9 at 192.168.1.103
CSeq: 2406 REGISTER
From: "1002" <sip:1002 at 194.190.8.171>;tag=134783744
To: "1002" <sip:1002 at 194.190.8.171>
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK0624.82ac15efd62f203c1b009e3ab3c711bc.0
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bKf4d831e0612e1074bf49397d92907c80353236;rport=57288
Max-Forwards: 16
User-Agent: SIPAUA/0.1.001
Contact: "1002" <sip:1002 at 192.168.1.103:57288;transport=udp>
Expires: 3600
Authorization: Digest
username="1002",realm="asterisk",nonce="26886c3d",uri="sip:
194.190.8.171:5060
",response="cc17aae74d45f06e4712aa66b08e68df",algorithm=MD5
Content-Length: 0
19:54:51.374893 IP (tos 0x0, ttl 64, id 5626, offset 0, flags [none], proto
UDP (17), length 597)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569
OPTIONS sip:1002 at 192.168.1.103:57288;transport=udp SIP/2.0
Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK129c83a7;rport
Max-Forwards: 70
From: "asterisk" <sip:asterisk at 50.0.0.10>;tag=as40306b56
To: <sip:1002 at 192.168.1.103:57288;transport=udp>
Contact: <sip:asterisk at 50.0.0.10:5060>
Call-ID: 0e6d3cec7afd68275843c14303988ff3 at 50.0.0.10:5060
CSeq: 102 OPTIONS
User-Agent: Asterisk PBX 1.8.20.0
Date: Mon, 03 Feb 2014 15:54:51 GMT
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
Content-Length: 0
19:54:51.374906 IP (tos 0x0, ttl 64, id 5627, offset 0, flags [none], proto
UDP (17), length 746)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 718
SIP/2.0 200 OK
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK0624.82ac15efd62f203c1b009e3ab3c711bc.0;received=50.0.0.1;rport=5060
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bKf4d831e0612e1074bf49397d92907c80353236;rport=57288
From: "1002" <sip:1002 at 194.190.8.171>;tag=134783744
To: "1002" <sip:1002 at 194.190.8.171>;tag=as065abeba
Call-ID: fffb7a09e489ce1cad6783709652b6f9 at 192.168.1.103
CSeq: 2406 REGISTER
Server: Asterisk PBX 1.8.20.0
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
Expires: 3600
Contact: <sip:1002 at 192.168.1.103:57288;transport=udp>;expires=3600
Date: Mon, 03 Feb 2014 15:54:51 GMT
Content-Length: 0
19:54:52.375165 IP (tos 0x0, ttl 64, id 5628, offset 0, flags [none], proto
UDP (17), length 597)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569
OPTIONS sip:1002 at 192.168.1.103:57288;transport=udp SIP/2.0
Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK129c83a7;rport
Max-Forwards: 70
From: "asterisk" <sip:asterisk at 50.0.0.10>;tag=as40306b56
To: <sip:1002 at 192.168.1.103:57288;transport=udp>
Contact: <sip:asterisk at 50.0.0.10:5060>
Call-ID: 0e6d3cec7afd68275843c14303988ff3 at 50.0.0.10:5060
CSeq: 102 OPTIONS
User-Agent: Asterisk PBX 1.8.20.0
Date: Mon, 03 Feb 2014 15:54:51 GMT
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
Content-Length: 0
19:54:53.375333 IP (tos 0x0, ttl 64, id 5629, offset 0, flags [none], proto
UDP (17), length 597)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569
OPTIONS sip:1002 at 192.168.1.103:57288;transport=udp SIP/2.0
Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK129c83a7;rport
Max-Forwards: 70
From: "asterisk" <sip:asterisk at 50.0.0.10>;tag=as40306b56
To: <sip:1002 at 192.168.1.103:57288;transport=udp>
Contact: <sip:asterisk at 50.0.0.10:5060>
Call-ID: 0e6d3cec7afd68275843c14303988ff3 at 50.0.0.10:5060
CSeq: 102 OPTIONS
User-Agent: Asterisk PBX 1.8.20.0
Date: Mon, 03 Feb 2014 15:54:51 GMT
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
Content-Length: 0
19:54:54.342025 IP (tos 0x10, ttl 64, id 34750, offset 0, flags [none],
proto UDP (17), length 413)
50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 385
SIP/2.0 408 Request Timeout
Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK129c83a7;rport=5060
From: "asterisk" <sip:asterisk at 50.0.0.10>;tag=as40306b56
To: <sip:1002 at 192.168.1.103:57288
;transport=udp>;tag=6f6209fafb0c4bc816e1e7aa854ee2dd-1f6e
Call-ID: 0e6d3cec7afd68275843c14303988ff3 at 50.0.0.10:5060
CSeq: 102 OPTIONS
Server: kamailio (4.1.1 (x86_64/linux))
Content-Length: 0
3. on asterisk to kamailio
[root at astkamaz sm1ly]# tcpdump -nn -i eth0 -v host 50.0.0.1 and port 5060
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 65535
bytes
19:54:41.906401 IP (tos 0x0, ttl 64, id 5618, offset 0, flags [none], proto
UDP (17), length 597)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569
OPTIONS sip:1002 at 192.168.1.103:34713;transport=udp SIP/2.0
Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK75f42160;rport
Max-Forwards: 70
From: "asterisk" <sip:asterisk at 50.0.0.10>;tag=as40fc69ea
To: <sip:1002 at 192.168.1.103:34713;transport=udp>
Contact: <sip:asterisk at 50.0.0.10:5060>
Call-ID: 7bacfa62676409266240568c5c9d055b at 50.0.0.10:5060
CSeq: 102 OPTIONS
User-Agent: Asterisk PBX 1.8.20.0
Date: Mon, 03 Feb 2014 15:54:41 GMT
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
Content-Length: 0
19:54:42.906581 IP (tos 0x0, ttl 64, id 5619, offset 0, flags [none], proto
UDP (17), length 597)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569
OPTIONS sip:1002 at 192.168.1.103:34713;transport=udp SIP/2.0
Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK75f42160;rport
Max-Forwards: 70
From: "asterisk" <sip:asterisk at 50.0.0.10>;tag=as40fc69ea
To: <sip:1002 at 192.168.1.103:34713;transport=udp>
Contact: <sip:asterisk at 50.0.0.10:5060>
Call-ID: 7bacfa62676409266240568c5c9d055b at 50.0.0.10:5060
CSeq: 102 OPTIONS
User-Agent: Asterisk PBX 1.8.20.0
Date: Mon, 03 Feb 2014 15:54:41 GMT
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
Content-Length: 0
19:54:43.906740 IP (tos 0x0, ttl 64, id 5620, offset 0, flags [none], proto
UDP (17), length 597)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569
OPTIONS sip:1002 at 192.168.1.103:34713;transport=udp SIP/2.0
Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK75f42160;rport
Max-Forwards: 70
From: "asterisk" <sip:asterisk at 50.0.0.10>;tag=as40fc69ea
To: <sip:1002 at 192.168.1.103:34713;transport=udp>
Contact: <sip:asterisk at 50.0.0.10:5060>
Call-ID: 7bacfa62676409266240568c5c9d055b at 50.0.0.10:5060
CSeq: 102 OPTIONS
User-Agent: Asterisk PBX 1.8.20.0
Date: Mon, 03 Feb 2014 15:54:41 GMT
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
Content-Length: 0
19:54:44.905366 IP (tos 0x10, ttl 64, id 34743, offset 0, flags [none],
proto UDP (17), length 413)
50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 385
SIP/2.0 408 Request Timeout
Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK75f42160;rport=5060
From: "asterisk" <sip:asterisk at 50.0.0.10>;tag=as40fc69ea
To: <sip:1002 at 192.168.1.103:34713
;transport=udp>;tag=6f6209fafb0c4bc816e1e7aa854ee2dd-8578
Call-ID: 7bacfa62676409266240568c5c9d055b at 50.0.0.10:5060
CSeq: 102 OPTIONS
Server: kamailio (4.1.1 (x86_64/linux))
Content-Length: 0
19:54:51.208464 IP (tos 0x10, ttl 64, id 34744, offset 0, flags [none],
proto UDP (17), length 531)
50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 503
REGISTER sip:194.190.8.171 SIP/2.0
Call-ID: 676c32ab221a665a9bc9875ffb74930a at 192.168.1.103
CSeq: 5569 REGISTER
From: "1002" <sip:1002 at 194.190.8.171>;tag=2801080754
To: "1002" <sip:1002 at 194.190.8.171>
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bKd8a1.094de0504827adb22c7b874f77dfd698.0
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bKe5bd1a6ceba7f0a0f4e7487cb17ca365353236;rport=57288
Max-Forwards: 16
User-Agent: SIPAUA/0.1.001
Contact: *
Expires: 0
Content-Length: 0
19:54:51.209176 IP (tos 0x0, ttl 64, id 5621, offset 0, flags [none], proto
UDP (17), length 713)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 685
SIP/2.0 401 Unauthorized
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bKd8a1.094de0504827adb22c7b874f77dfd698.0;received=50.0.0.1;rport=5060
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bKe5bd1a6ceba7f0a0f4e7487cb17ca365353236;rport=57288
From: "1002" <sip:1002 at 194.190.8.171>;tag=2801080754
To: "1002" <sip:1002 at 194.190.8.171>;tag=as518dbea9
Call-ID: 676c32ab221a665a9bc9875ffb74930a at 192.168.1.103
CSeq: 5569 REGISTER
Server: Asterisk PBX 1.8.20.0
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
WWW-Authenticate: Digest algorithm=MD5, realm="asterisk",
nonce="31daf0f8"
Content-Length: 0
19:54:51.259436 IP (tos 0x10, ttl 64, id 34745, offset 0, flags [none],
proto UDP (17), length 696)
50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 668
REGISTER sip:194.190.8.171:5060 SIP/2.0
Call-ID: 676c32ab221a665a9bc9875ffb74930a at 192.168.1.103
CSeq: 5570 REGISTER
From: "1002" <sip:1002 at 194.190.8.171>;tag=2801080754
To: "1002" <sip:1002 at 194.190.8.171>
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK56b1.d46d0ab6448c5edd99f24aa7ba8a2881.0
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bK440337c23337c9913220fd825f4d9ded353236;rport=57288
Max-Forwards: 16
User-Agent: SIPAUA/0.1.001
Contact: *
Expires: 0
Authorization: Digest
username="1002",realm="asterisk",nonce="31daf0f8",uri="sip:
194.190.8.171:5060
",response="2b0222b07da7af1c3b72c2eb36241f5f",algorithm=MD5
Content-Length: 0
19:54:51.260101 IP (tos 0x0, ttl 64, id 5622, offset 0, flags [none], proto
UDP (17), length 713)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 685
SIP/2.0 401 Unauthorized
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK56b1.d46d0ab6448c5edd99f24aa7ba8a2881.0;received=50.0.0.1;rport=5060
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bK440337c23337c9913220fd825f4d9ded353236;rport=57288
From: "1002" <sip:1002 at 194.190.8.171>;tag=2801080754
To: "1002" <sip:1002 at 194.190.8.171>;tag=as0716dea5
Call-ID: 676c32ab221a665a9bc9875ffb74930a at 192.168.1.103
CSeq: 5570 REGISTER
Server: Asterisk PBX 1.8.20.0
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
WWW-Authenticate: Digest algorithm=MD5, realm="asterisk",
nonce="2f70c759"
Content-Length: 0
19:54:51.292708 IP (tos 0x10, ttl 64, id 34746, offset 0, flags [none],
proto UDP (17), length 696)
50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 668
REGISTER sip:194.190.8.171:5060 SIP/2.0
Call-ID: 676c32ab221a665a9bc9875ffb74930a at 192.168.1.103
CSeq: 5571 REGISTER
From: "1002" <sip:1002 at 194.190.8.171>;tag=2801080754
To: "1002" <sip:1002 at 194.190.8.171>
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK66b1.0173e2524e6deda0f27b83591a62730f.0
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bK30fe030eee49e2eb50c619074c0f057b353236;rport=57288
Max-Forwards: 16
User-Agent: SIPAUA/0.1.001
Contact: *
Expires: 0
Authorization: Digest
username="1002",realm="asterisk",nonce="2f70c759",uri="sip:
194.190.8.171:5060
",response="9eb7d157cfd0d8e8575b59c94c5f82f6",algorithm=MD5
Content-Length: 0
19:54:51.293541 IP (tos 0x0, ttl 64, id 5623, offset 0, flags [none], proto
UDP (17), length 676)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 648
SIP/2.0 200 OK
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK66b1.0173e2524e6deda0f27b83591a62730f.0;received=50.0.0.1;rport=5060
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bK30fe030eee49e2eb50c619074c0f057b353236;rport=57288
From: "1002" <sip:1002 at 194.190.8.171>;tag=2801080754
To: "1002" <sip:1002 at 194.190.8.171>;tag=as0716dea5
Call-ID: 676c32ab221a665a9bc9875ffb74930a at 192.168.1.103
CSeq: 5571 REGISTER
Server: Asterisk PBX 1.8.20.0
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
Expires: 0
Date: Mon, 03 Feb 2014 15:54:51 GMT
Content-Length: 0
19:54:51.317704 IP (tos 0x10, ttl 64, id 34747, offset 0, flags [none],
proto UDP (17), length 583)
50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 555
REGISTER sip:194.190.8.171 SIP/2.0
Call-ID: fffb7a09e489ce1cad6783709652b6f9 at 192.168.1.103
CSeq: 2404 REGISTER
From: "1002" <sip:1002 at 194.190.8.171>;tag=134783744
To: "1002" <sip:1002 at 194.190.8.171>
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK2624.44980ae0ad3ba5026d6f044c24770539.0
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bKdeb946998664720c2c93538625cc649e353236;rport=57288
Max-Forwards: 16
User-Agent: SIPAUA/0.1.001
Contact: "1002" <sip:1002 at 192.168.1.103:57288;transport=udp>
Expires: 3600
Content-Length: 0
19:54:51.318355 IP (tos 0x0, ttl 64, id 5624, offset 0, flags [none], proto
UDP (17), length 712)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 684
SIP/2.0 401 Unauthorized
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK2624.44980ae0ad3ba5026d6f044c24770539.0;received=50.0.0.1;rport=5060
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bKdeb946998664720c2c93538625cc649e353236;rport=57288
From: "1002" <sip:1002 at 194.190.8.171>;tag=134783744
To: "1002" <sip:1002 at 194.190.8.171>;tag=as0bba2324
Call-ID: fffb7a09e489ce1cad6783709652b6f9 at 192.168.1.103
CSeq: 2404 REGISTER
Server: Asterisk PBX 1.8.20.0
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
WWW-Authenticate: Digest algorithm=MD5, realm="asterisk",
nonce="023deb34"
Content-Length: 0
19:54:51.347429 IP (tos 0x10, ttl 64, id 34748, offset 0, flags [none],
proto UDP (17), length 748)
50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 720
REGISTER sip:194.190.8.171:5060 SIP/2.0
Call-ID: fffb7a09e489ce1cad6783709652b6f9 at 192.168.1.103
CSeq: 2405 REGISTER
From: "1002" <sip:1002 at 194.190.8.171>;tag=134783744
To: "1002" <sip:1002 at 194.190.8.171>
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK3624.173cef757dc8f7da8b864ee1ab1bfe50.0
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bK60a6798f72024444a9870698b766a04c353236;rport=57288
Max-Forwards: 16
User-Agent: SIPAUA/0.1.001
Contact: "1002" <sip:1002 at 192.168.1.103:57288;transport=udp>
Expires: 3600
Authorization: Digest
username="1002",realm="asterisk",nonce="023deb34",uri="sip:
194.190.8.171:5060
",response="7fa5be98c7c0c395ed41f9e7da095629",algorithm=MD5
Content-Length: 0
19:54:51.348212 IP (tos 0x0, ttl 64, id 5625, offset 0, flags [none], proto
UDP (17), length 712)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 684
SIP/2.0 401 Unauthorized
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK3624.173cef757dc8f7da8b864ee1ab1bfe50.0;received=50.0.0.1;rport=5060
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bK60a6798f72024444a9870698b766a04c353236;rport=57288
From: "1002" <sip:1002 at 194.190.8.171>;tag=134783744
To: "1002" <sip:1002 at 194.190.8.171>;tag=as065abeba
Call-ID: fffb7a09e489ce1cad6783709652b6f9 at 192.168.1.103
CSeq: 2405 REGISTER
Server: Asterisk PBX 1.8.20.0
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
WWW-Authenticate: Digest algorithm=MD5, realm="asterisk",
nonce="26886c3d"
Content-Length: 0
19:54:51.373777 IP (tos 0x10, ttl 64, id 34749, offset 0, flags [none],
proto UDP (17), length 748)
50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 720
REGISTER sip:194.190.8.171:5060 SIP/2.0
Call-ID: fffb7a09e489ce1cad6783709652b6f9 at 192.168.1.103
CSeq: 2406 REGISTER
From: "1002" <sip:1002 at 194.190.8.171>;tag=134783744
To: "1002" <sip:1002 at 194.190.8.171>
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK0624.82ac15efd62f203c1b009e3ab3c711bc.0
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bKf4d831e0612e1074bf49397d92907c80353236;rport=57288
Max-Forwards: 16
User-Agent: SIPAUA/0.1.001
Contact: "1002" <sip:1002 at 192.168.1.103:57288;transport=udp>
Expires: 3600
Authorization: Digest
username="1002",realm="asterisk",nonce="26886c3d",uri="sip:
194.190.8.171:5060
",response="cc17aae74d45f06e4712aa66b08e68df",algorithm=MD5
Content-Length: 0
19:54:51.374731 IP (tos 0x0, ttl 64, id 5626, offset 0, flags [none], proto
UDP (17), length 597)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569
OPTIONS sip:1002 at 192.168.1.103:57288;transport=udp SIP/2.0
Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK129c83a7;rport
Max-Forwards: 70
From: "asterisk" <sip:asterisk at 50.0.0.10>;tag=as40306b56
To: <sip:1002 at 192.168.1.103:57288;transport=udp>
Contact: <sip:asterisk at 50.0.0.10:5060>
Call-ID: 0e6d3cec7afd68275843c14303988ff3 at 50.0.0.10:5060
CSeq: 102 OPTIONS
User-Agent: Asterisk PBX 1.8.20.0
Date: Mon, 03 Feb 2014 15:54:51 GMT
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
Content-Length: 0
19:54:51.374804 IP (tos 0x0, ttl 64, id 5627, offset 0, flags [none], proto
UDP (17), length 746)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 718
SIP/2.0 200 OK
Via: SIP/2.0/UDP
50.0.0.1;branch=z9hG4bK0624.82ac15efd62f203c1b009e3ab3c711bc.0;received=50.0.0.1;rport=5060
Via: SIP/2.0/UDP 192.168.1.103:57288
;received=77.37.241.151;branch=z9hG4bKf4d831e0612e1074bf49397d92907c80353236;rport=57288
From: "1002" <sip:1002 at 194.190.8.171>;tag=134783744
To: "1002" <sip:1002 at 194.190.8.171>;tag=as065abeba
Call-ID: fffb7a09e489ce1cad6783709652b6f9 at 192.168.1.103
CSeq: 2406 REGISTER
Server: Asterisk PBX 1.8.20.0
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
Expires: 3600
Contact: <sip:1002 at 192.168.1.103:57288;transport=udp>;expires=3600
Date: Mon, 03 Feb 2014 15:54:51 GMT
Content-Length: 0
19:54:52.375348 IP (tos 0x0, ttl 64, id 5628, offset 0, flags [none], proto
UDP (17), length 597)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569
OPTIONS sip:1002 at 192.168.1.103:57288;transport=udp SIP/2.0
Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK129c83a7;rport
Max-Forwards: 70
From: "asterisk" <sip:asterisk at 50.0.0.10>;tag=as40306b56
To: <sip:1002 at 192.168.1.103:57288;transport=udp>
Contact: <sip:asterisk at 50.0.0.10:5060>
Call-ID: 0e6d3cec7afd68275843c14303988ff3 at 50.0.0.10:5060
CSeq: 102 OPTIONS
User-Agent: Asterisk PBX 1.8.20.0
Date: Mon, 03 Feb 2014 15:54:51 GMT
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
Content-Length: 0
19:54:53.375562 IP (tos 0x0, ttl 64, id 5629, offset 0, flags [none], proto
UDP (17), length 597)
50.0.0.10.5060 > 50.0.0.1.5060: SIP, length: 569
OPTIONS sip:1002 at 192.168.1.103:57288;transport=udp SIP/2.0
Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK129c83a7;rport
Max-Forwards: 70
From: "asterisk" <sip:asterisk at 50.0.0.10>;tag=as40306b56
To: <sip:1002 at 192.168.1.103:57288;transport=udp>
Contact: <sip:asterisk at 50.0.0.10:5060>
Call-ID: 0e6d3cec7afd68275843c14303988ff3 at 50.0.0.10:5060
CSeq: 102 OPTIONS
User-Agent: Asterisk PBX 1.8.20.0
Date: Mon, 03 Feb 2014 15:54:51 GMT
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY,
INFO, PUBLISH
Supported: replaces, timer
Content-Length: 0
19:54:54.342525 IP (tos 0x10, ttl 64, id 34750, offset 0, flags [none],
proto UDP (17), length 413)
50.0.0.1.5060 > 50.0.0.10.5060: SIP, length: 385
SIP/2.0 408 Request Timeout
Via: SIP/2.0/UDP 50.0.0.10:5060;branch=z9hG4bK129c83a7;rport=5060
From: "asterisk" <sip:asterisk at 50.0.0.10>;tag=as40306b56
To: <sip:1002 at 192.168.1.103:57288
;transport=udp>;tag=6f6209fafb0c4bc816e1e7aa854ee2dd-1f6e
Call-ID: 0e6d3cec7afd68275843c14303988ff3 at 50.0.0.10:5060
CSeq: 102 OPTIONS
Server: kamailio (4.1.1 (x86_64/linux))
Content-Length: 0
####### Defined Values #########
# - flags
# FLT_ - per transaction (message) flags
# FLB_ - per branch flags
#!define FLT_ACC 1
#!define FLT_ACCMISSED 2
#!define FLT_ACCFAILED 3
#!define FLT_NATS 5
#!define FLB_NATB 6
#!define FLB_NATSIPPING 7
####### Global Parameters #########
# Enable debugging only when kamailio is mading boo-boo
### LOG Levels: 3=DBG, 2=INFO, 1=NOTICE, 0=WARN, -1=ERR
debug=3
log_stderror=no
memdbg=5
memlog=5
log_facility=LOG_LOCAL0
fork=yes
children=8
/* uncomment the next line to disable TCP (default on) */
disable_tcp=yes
/* uncomment the next line to disable the auto discovery of local aliases
based on reverse DNS on IPs (default on) */
auto_aliases=no
/* add local domain aliases */
#alias="kamaz.ikatele.com"
/* uncomment and configure the following line if you want Kamailio to
bind on a specific interface/port/proto (default bind on all available) */
#listen=udp:50.0.0.1:5060 advertise 194.190.8.171:5060
#listen=udp:194.190.8.171:5060 advertise 50.0.0.1:5060
listen=udp:194.190.8.171
listen=udp:50.0.0.1
dns=no
rev_dns=no
check_via=yes
/* port to listen to
* - can be specified more than once if needed to listen on many ports */
port=5060
mhomed=1
####### Modules Section ########
# set paths to location of modules (to sources or installation folders)
mpath="/usr/lib64/kamailio/modules/"
loadmodule "mi_fifo.so"
loadmodule "kex.so"
loadmodule "tm.so"
loadmodule "tmx.so"
loadmodule "sl.so"
loadmodule "rr.so"
loadmodule "pv.so"
loadmodule "maxfwd.so"
loadmodule "usrloc.so"
loadmodule "registrar.so"
loadmodule "textops.so"
loadmodule "siputils.so"
loadmodule "xlog.so"
loadmodule "sanity.so"
loadmodule "ctl.so"
loadmodule "cfg_rpc.so"
loadmodule "mi_rpc.so"
loadmodule "acc.so"
loadmodule "nathelper.so"
loadmodule "rtpproxy.so"
#loadmodule "topoh.so"
#modparam("topoh", "mask_key", "balalayka")
#modparam("topoh", "mask_ip", "50.0.0.1")
# ----------------- setting module-specific parameters ---------------
# ----- mi_fifo params -----
modparam("mi_fifo", "fifo_name", "/tmp/kamailio_fifo")
# ----- tm params -----
# auto-discard branches from previous serial forking leg
modparam("tm", "failure_reply_mode", 3)
# default retransmission timeout: 30sec
modparam("tm", "fr_timer", 3000)
# default invite retransmission timeout after 1xx: 120sec
modparam("tm", "fr_inv_timer", 12000)
# ----- rr params -----
# add value to ;lr param to cope with most of the UAs
modparam("rr", "enable_full_lr", 1)
# do not append from tag to the RR (no need for this script)
modparam("rr", "append_fromtag", 1)
# ----- rtpproxy params -----
modparam("rtpproxy", "rtpproxy_sock", "udp:127.0.0.1:7722")
# ----- nathelper params -----
modparam("nathelper", "natping_interval", 30)
modparam("nathelper", "ping_nated_only", 1)
modparam("nathelper", "sipping_bflag", FLB_NATSIPPING)
modparam("nathelper", "sipping_from", "sip:pinger at 194.190.8.171")
# params needed for NAT traversal in other modules
modparam("nathelper", "received_avp", "$avp(RECEIVED)")
modparam("usrloc", "nat_bflag", FLB_NATB)
####### Routing Logic ########
# Main SIP request routing logic
# - processing of any incoming SIP request starts with this route
# - note: this is the same as route { ... }
route {
# per request initial checks
route(REQINIT);
# NAT detection
xlog("L_NOTICE","$rm from $fu (IP:$si:$sp) Main Route before ---NAT---\n");
route(NATDETECT);
xlog("L_NOTICE","$rm from $fu (IP:$si:$sp) in Route[NATDETECT]
fix_nat-register\n");
# CANCEL processing
if (is_method("CANCEL"))
{
if (t_check_trans()) {
route(RELAY);
}
exit;
}
# handle requests within SIP dialogs
route(WITHINDLG);
### only initial requests (no To tag)
t_check_trans();
# record routing for dialog forming requests (in case they are routed)
# - remove preloaded route headers
remove_hf("Route");
if (is_method("INVITE|SUBSCRIBE"))
record_route();
# account only INVITEs
if (is_method("INVITE"))
{
setflag(FLT_ACC); # do accounting
}
# dispatch requests to foreign domains
route(SIPOUT);
# handle registrations
route(REGISTRAR);
if ($rU==$null)
{
# request with no Username in RURI
sl_send_reply("484","Address Incomplete");
exit;
}
route(RELAY);
}
# Per SIP request initial checks
route[REQINIT] {
if (!mf_process_maxfwd_header("20")) {
xlog("L_NOTICE","$rm from $fu (IP:$si:$sp) in MAX FDW HEADERS ALARMO\n");
sl_send_reply("483","Too Many Hops");
exit;
}
if(!sanity_check("1511", "7"))
{
xlog("Malformed SIP message from $si:$sp\n");
exit;
}
}
# Caller NAT detection route
route[NATDETECT] {
force_rport();
if (nat_uac_test("19")) {
if (is_method("REGISTER")) {
fix_nated_register();
} else {
if(is_first_hop())
set_contact_alias();
}
setflag(FLT_NATS);
}
return;
}
# Handle requests within SIP dialogs
route[WITHINDLG] {
if (has_totag()) {
# sequential request withing a dialog should
# take the path determined by record-routing
if (loose_route()) {
route(DLGURI);
if (is_method("BYE")) {
setflag(FLT_ACC); # do accounting ...
setflag(FLT_ACCFAILED); # ... even if the transaction fails
}
else if ( is_method("ACK") ) {
# ACK is forwarded statelessy
route(NATMANAGE);
}
else if ( is_method("NOTIFY") ) {
# Add Record-Route for in-dialog NOTIFY as per RFC 6665.
record_route();
}
route(RELAY);
} else {
if ( is_method("ACK") ) {
if ( t_check_trans() ) {
# no loose-route, but stateful ACK;
# must be an ACK after a 487
# or e.g. 404 from upstream server
route(RELAY);
exit;
} else {
xlog("L_NOTICE","ACK without matching transaction ... ignore and
discard\n");
# ACK without matching transaction ... ignore and discard
exit;
}
}
sl_send_reply("404","Not here");
}
exit;
}
}
# Routing to foreign domains
route[SIPOUT] {
if (!uri==myself)
{
append_hf("P-hint: outbound\r\n");
route(RELAY);
}
}
# Handle SIP registrations
route[REGISTRAR] {
if (is_method("REGISTER"))
{
# if(isflagset(FLT_NATS))
# {
# setbflag(FLB_NATB);
# # uncomment next line to do SIP NAT pinging
# xlog("L_NOTICE","--------------------- SIP NAT PINGING
--------------------------------------\n");
# setbflag(FLB_NATSIPPING);
# }
# if (!save("location"))
# sl_reply_error();
# xlog("L_NOTICE","--------------------- SL REPLY ERROR
--------------------------------------\n");
if( t_check_trans() )
{
xlog("L_NOTICE","Transaction already exist, forwarding\n");
}
else
{
xlog("L_NOTICE","New transaction upcoming, creating\n");
# forward("50.0.0.10");
# save("sip:50.0.0.10","0x02");
t_relay_to_udp("50.0.0.10", "5060");
exit;
}
exit;
}
}
route[RELAY] {
# enable additional event routes for forwarded requests
# - serial forking, RTP relaying handling, a.s.o.
xlog("L_NOTICE","Default routing block raised!\n");
if (is_method("INVITE|BYE|SUBSCRIBE|UPDATE")) {
if(!t_is_set("branch_route")) t_on_branch("MANAGE_BRANCH");
}
if (is_method("INVITE|SUBSCRIBE|UPDATE")) {
if(!t_is_set("onreply_route")) t_on_reply("MANAGE_REPLY");
}
if (is_method("INVITE")) {
if(!t_is_set("failure_route")) t_on_failure("MANAGE_FAILURE");
}
if (!t_relay()) {
sl_reply_error();
}
exit;
}
# RTPProxy control
route[NATMANAGE] {
if (is_request()) {
if(has_totag()) {
if(check_route_param("nat=yes")) {
xlog("L_NOTICE","------------------------------------ SETBFLAG
----------------------------\n");
setbflag(FLB_NATB);
}
}
}
if (!(isflagset(FLT_NATS) || isbflagset(FLB_NATB)))
return;
rtpproxy_manage();
if (is_request()) {
if (!has_totag()) {
if(t_is_branch_route()) {
xlog("L_NOTICE","------------------------------------ ADD RR PARAM
NAT YES ----------------------------\n");
add_rr_param(";nat=yes");
}
}
}
if (is_reply()) {
if(isbflagset(FLB_NATB)) {
if(is_first_hop())
xlog("L_NOTICE","------------------------------------ IS FIRST HOP
SRT CONACT ALIAS ----------------------------\n");
set_contact_alias();
}
xlog("L_NOTICE","$rm from $fu (IP:$si:$sp) in route[NATMANAGE]
RTPproxy with EI Flags\n");
}
return;
}
# URI update for dialog requests
route[DLGURI] {
if(!isdsturiset()) {
handle_ruri_alias();
xlog("L_NOTICE","$rm from $fu (IP:$si:$sp) in route[DLGURI] RTPproxy
with EI Flags\n");
}
return;
}
# manage outgoing branches
branch_route[MANAGE_BRANCH] {
xlog("L_NOTICE","$rm from $fu (IP:$si:$sp) in MANAGE_BRANCH\n");
xdbg("new branch [$T_branch_idx] to $ru\n");
route(NATMANAGE);
}
# manage incoming replies
onreply_route[MANAGE_REPLY] {
xlog("L_NOTICE","$rm from $fu (IP:$si:$sp) in MANAGE_REPLY\n");
xdbg("incoming reply\n");
if(status=~"[12][0-9][0-9]")
route(NATMANAGE);
}
# manage failure routing cases
failure_route[MANAGE_FAILURE] {
xlog("L_NOTICE","$rm from $fu (IP:$si:$sp) in MANAGE_FAILURE\n");
route(NATMANAGE);
if (t_is_canceled()) {
exit;
}
}
route[DEBUG] {
if (method==("PUBLISH|SUBSCRIBE|REGISTER|OPTIONS")) {
return;
}
xlog("[$mi] Received SIP Message (method: $rm) ($ml bytes) to
$Ri:$Rp from $si:$sp:\n$mb\n");
}
> ----------------------------------------------------------------------
>
> Message: 1
> Date: Mon, 3 Feb 2014 15:14:19 +0400
> From: "*sm1Ly" <st.uzver at gmail.com>
> To: dipak.biswas at mezocliq.com, sr-users at lists.sip-router.org
> Subject: Re: [SR-Users] Kamailio not mdifying Contact in multi-homed
> setup
> Message-ID:
> <
> CABCivXiED_CDQiJtgQ-p_XQ1h8p3rbkE3fnxnS2iuUH+kdHZvA at mail.gmail.com>
> Content-Type: text/plain; charset="iso-8859-1"
>
> hello, I got the same issue. my sip device getting ok from kamailio, but
> asterisk reply 401.
> but.
> this is my config: http://pastebin.com/jGCak01E
>
> and I changed regfwd route to
> $du = "sip:50.0.0.10:5060;transport=udp";
> forward();
>
> and now I see this in logs:
>
> Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
> [parser/msg_parser.c:633]: parse_msg(): SIP Reply (status):
> Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
> [parser/msg_parser.c:635]: parse_msg(): version: <SIP/2.0>
> Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
> [parser/msg_parser.c:637]: parse_msg(): status: <200>
> Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
> [parser/msg_parser.c:639]: parse_msg(): reason: <OK>
> Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
> [parser/parse_via.c:1284]: parse_via_param(): Found param type 232,
> <branch> = <0>; state=16
> Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
> [parser/parse_via.c:2672]: parse_via(): end of header reached, state=5
> Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
> [parser/msg_parser.c:513]: parse_headers(): parse_headers: Via found,
> flags=2
> Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
> [parser/msg_parser.c:515]: parse_headers(): parse_headers: this is the
> first via
> Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
> [receive.c:152]: receive_msg(): After parse_msg...
> Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: tm
> [t_lookup.c:1071]: t_check_msg(): DEBUG: t_check_msg: msg id=25 global
> id=24 T start=(nil)
> Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
> [parser/parse_addr_spec.c:176]: parse_to_param(): DEBUG: add_param:
> tag=006cfccc318be31188fc19977b3a5651
> Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
> [parser/parse_addr_spec.c:885]: parse_addr_spec(): end of header reached,
> state=29
> Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
> [parser/msg_parser.c:190]: get_hdr_field(): DEBUG: get_hdr_field: <To>
> [63]; uri=[sip:77.37.241.151:5060]
> Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
> [parser/msg_parser.c:192]: get_hdr_field(): DEBUG: to body [<sip:
> 77.37.241.151:5060>]
> Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
> [parser/msg_parser.c:170]: get_hdr_field(): get_hdr_field: cseq <CSeq>: <1>
> <OPTIONS>
> *Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: tm
> [t_lookup.c:1045]: t_reply_matching(): DEBUG: t_reply_matching: failure to
> match a transaction*
> Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: tm
> [t_lookup.c:1140]: t_check_msg(): DEBUG: t_check_msg: msg id=25 global
> id=25 T end=(nil)
> Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
> [parser/msg_parser.c:204]: get_hdr_field(): DEBUG: get_hdr_body :
> content_length=0
> Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
> [parser/msg_parser.c:106]: get_hdr_field(): found end of header
> *Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
> [forward.c:784]: do_forward_reply(): reply cannot be forwarded - no 2nd
> via*
> Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
> [usr_avp.c:644]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
> list (nil)
> Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
> [usr_avp.c:644]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
> list (nil)
> Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
> [usr_avp.c:644]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
> list (nil)
> Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
> [usr_avp.c:644]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
> list (nil)
> Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
> [usr_avp.c:644]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
> list (nil)
> Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
> [usr_avp.c:644]: destroy_avp_list(): DEBUG:destroy_avp_list: destroying
> list (nil)
> Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
> [xavp.c:448]: xavp_destroy_list(): destroying xavp list (nil)
> Feb 3 15:13:38 kamaz /usr/sbin/kamailio[14502]: DEBUG: <core>
> [receive.c:296]: receive_msg(): receive_msg: cleaning up
>
>
> any ideas?
> and show me ur conf please.
>
>
> --
>
> Hi All,
>
> I'm running into an issue, I'm not sure whether any of you seen this
> yourselves and resolved it. Please share some pointers. My network is:
>
> clients <--> Public IP(Kamailio/RTPProxy)10.1.128.11 <--> 10.1.128.34
> (Freeswitch)
>
> The 200 OK response from Freeswitch (on the way back from called party to
> caller) to Kamailio is shown below. Notice the Contact header URI host part
> contains Freeswitch Private IP (10.1.128.34). Kamailio suppose to change
> that to Public IP before forwarding the 200 OK (copied below) to Caller in
> public domain. But, it's not. As a result, ACK from Caller is not reaching
> back to Kamailio.
>
> How did you or anybody out there using Kamailio resolve this problem? If
> needed, I can copy/paste my kamailio.cfg.
>
> --
> yours respectfully, Alexander Vasin.
>
> 8 926 1437200
> icq: 9906064
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL: <
> http://lists.sip-router.org/pipermail/sr-users/attachments/20140203/e075d4f0/attachment-0001.html
> >
>
> ------------------------------
>
>
--
yours respectfully, Alexander Vasin.
8 926 1437200
icq: 9906064
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.sip-router.org/pipermail/sr-users/attachments/20140203/108d5548/attachment-0001.html>
More information about the sr-users
mailing list