[Users] more on accounting
tele
tele at plexia.com
Thu Jun 29 13:39:34 CEST 2006
Bogdan-Andrei Iancu wrote:
> Hi,
>
> as you can seem the incoming BYE has no Route header. This leads to
> these cases:
> 1) you do not do record_route - check the outgoing INVITE to see if
> your RR hdr is present
yes is present
> 2) the RR set is not properly mirrored in the 200 OK (again, check
> the 200 OK reply)
yes there is
> 3) the UA that generates the BYE does not use the RR set (which is
> bogus)
yes. the call to PSTN pass for a softswitch. i contact the vendor. thanks
I've also tried with call UA --> UA that pass only from proxy and there
is the same problem on accounting.
To/From not swapped ,if the callee hangup phone, before send accounting
and yes there is RR present in the BYE message.
you can find attached here the full dump.
UA1 - 82.215.128.140
UA2 - 82.215.128.141
PROXY - 82.215.130.161
3(38040) udp_rcv_loop: probing packet received from 82.215.128.140 50195
3(38040) SIP Request:
3(38040) method: <BYE>
3(38040) uri: <sip:396006660009 at 82.215.128.140>
3(38040) version: <SIP/2.0>
3(38040) parse_headers: flags=2
3(38040) Found param type 232, <branch> = <z9hG4bK2b3078b2d0c5e3bd>;
state=16
3(38040) end of header reached, state=5
3(38040) parse_headers: Via found, flags=2
3(38040) parse_headers: this is the first via
3(38040) After parse_msg...
3(38040) preparing to run routing scripts...
3(38040) parse_headers: flags=100
3(38040) DEBUG: add_param: tag=bdb21d1b47a3e954
3(38040) DEBUG:parse_to:end of header reached, state=29
3(38040) DBUG:parse_to: display={"0104491009"},
ruri={sip:0104491009 at dispatcher.plexia.com}
3(38040) DEBUG: get_hdr_field: <To> [74];
uri=[sip:0104491009 at dispatcher.plexia.com]
3(38040) DEBUG: to body ["0104491009"
<sip:0104491009 at dispatcher.plexia.com>]
3(38040) get_hdr_field: cseq <CSeq>: <201> <BYE>
3(38040) DEBUG:maxfwd:is_maxfwd_present: value = 70
3(38040) DEBUG: add_param: tag=5539c21944091059
3(38040) DEBUG:parse_to:end of header reached, state=29
3(38040) DBUG:parse_to: display={},
ruri={sip:0104491002 at dispatcher.plexia.com}
3(38040) DEBUG:avpops:dbstore_avps: 1 avps were stored
3(38040) DEBUG:avpops:dbstore_avps: 1 avps were stored
3(38040) RETURN CODE: <null> <null>
3(38040) avpops:ops_dbquery_avps: query [select value from
usr_preferences where uuid='895e6709217a9c5c at 82.215.128.140' and
attribute='setup_time']
3(38040) avpops:ops_dbquery_avps: query [select value from
usr_preferences where uuid='895e6709217a9c5c at 82.215.128.140' and
attribute='connect_time']
3(38040) avpops:ops_dbquery_avps: query [select value from
usr_preferences where uuid='895e6709217a9c5c at 82.215.128.140' and
attribute='disconnect_time']
3(38040) db_flags=3, flags=4
3(38040) DEBUG:avpops:load_avps: loaded avps = 1
3(38040) parse_headers: flags=200
3(38040) is_preloaded: No
3(38040) grep_sock_info - checking if host==us: 14==14 &&
[82.215.128.140] == [82.215.130.161]
3(38040) grep_sock_info - checking if port 5060 matches port 5060
3(38040) grep_sock_info - checking if host==us: 14==9 &&
[82.215.128.140] == [127.0.0.1]
3(38040) grep_sock_info - checking if port 5060 matches port 5060
3(38040) grep_sock_info - checking if host==us: 14==14 &&
[82.215.128.140] == [82.215.130.161]
3(38040) grep_sock_info - checking if port 5060 matches port 5060
3(38040) grep_sock_info - checking if host==us: 14==9 &&
[82.215.128.140] == [127.0.0.1]
3(38040) grep_sock_info - checking if port 5060 matches port 5060
3(38040) check_self: host != me
3(38040) grep_sock_info - checking if host==us: 14==14 &&
[82.215.130.161] == [82.215.130.161]
3(38040) grep_sock_info - checking if port 5060 matches port 5060
3(38040) after_loose: Topmost route URI:
'sip:82.215.130.161;lr=on;ftag=bdb21d1b47a3e954;vsf=AAAAAAMIBgQEDwcGAAlwXSkXGRIEAhwGGksCQhUUDBlHAkEOb20-'
is me
3(38040) parse_headers: flags=200
3(38040) DEBUG: get_hdr_body : content_length=0
3(38040) found end of header
3(38040) find_next_route: No next Route HF found
3(38040) after_loose: No next URI found
3(38040) DBG:rr:run_rr_callbacks: callback id 0 entered
3(38040) DEBUG:uac:restore_from: getting 'vsf' Route param
3(38040) DEBUG:uac:restore_from: Route param is
'AAAAAAMIBgQEDwcGAAlwXSkXGRIEAhwGGksCQhUUDBlHAkEOb20-' (len=52)
3(38040) DEBUG:uac:restore_from: decoded uris are:
new=[sip:396006660009 at dispatcher.plexia.com]
old=[sip:0104491009 at dispatcher.plexia.com]
3(38040) DEBUG: t_check: msg id=2 global id=1 T start=0xffffffff
3(38040) parse_headers: flags=ffffffffffffffff
3(38040) parse_headers: flags=78
3(38040) t_lookup_request: start searching: hash=16278, isACK=0
3(38040) DEBUG: RFC3261 transaction matching failed
3(38040) DEBUG: t_lookup_request: no transaction found
3(38040) DEBUG: t_check: msg id=2 global id=2 T end=0x0
3(38040) parse_headers: flags=ffffffffffffffff
3(38040) DEBUG: t_newtran: msg id=2 , global msg id=2 , T on entrance=0x0
3(38040) parse_headers: flags=ffffffffffffffff
3(38040) parse_headers: flags=78
3(38040) t_lookup_request: start searching: hash=16278, isACK=0
3(38040) DEBUG: RFC3261 transaction matching failed
3(38040) DEBUG: t_lookup_request: no transaction found
3(38040) DBG: trans=0x28523c48, callback type 1, id 0 entered
3(38040) parse_headers: flags=58
3(38040) DEBUG: mk_proxy: doing DNS lookup...
3(38040) check_via_address(82.215.128.141, 82.215.128.141, 0)
3(38040) DEBUG: add_to_tail_of_timer[4]: 0x28523d64
3(38040) DEBUG: add_to_tail_of_timer[0]: 0x28523d74
3(38040) SER: new transaction fwd'ed
3(38040) DEBUG:tm:UNREF_UNSAFE: after is 0
3(38040) DEBUG:destroy_avp_list: destroying list 0x0
3(38040) receive_msg: cleaning up
4(38041) SIP Reply (status):
4(38041) version: <SIP/2.0>
4(38041) status: <200>
4(38041) reason: <OK>
-------------- next part --------------
An embedded and charset-unspecified text was scrubbed...
Name: call.txt
Url: http://lists.kamailio.org/pipermail/users/attachments/20060629/f1ac92c7/attachment.txt
More information about the Users
mailing list