Advertisement
Guest User

Untitled

a guest
Oct 1st, 2013
55
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 10.41 KB | None | 0 0
  1. [blink4]
  2. type=friend
  3. callerid="Peer 5"<1004>
  4. host=dynamic
  5. context=tlscon
  6. transport=tls
  7. encryption=yes
  8. disallow=all
  9. allow=gsm
  10. allow=alaw
  11. allow=ulaw
  12. directmedia=no
  13. qualify=yes
  14. nat=force_rport,comedia
  15. mailbox=1004@default
  16. disallowed_methods = UPDATE
  17.  
  18.  
  19.  
  20. <--- SIP read from TLS:189.152.96.184:24717 --->
  21. INVITE sip:123@45.221.32.147;user=phone SIP/2.0
  22. Via: SIP/2.0/TLS 192.168.5.44:4097;branch=z9hG4bK-c01jn4dzhch9;rport
  23. From: "Secure 4" <sip:blink4@45.221.32.147>;tag=5cdf2xjkyv
  24. To: <sip:123@45.221.32.147;user=phone>
  25. Call-ID: 3e2e4b527a0f-lzl36wcoci5p
  26. CSeq: 2 INVITE
  27. Max-Forwards: 70
  28. Contact: <sip:blink4@192.168.5.44:4097;transport=tls>;reg-id=1
  29. X-Serialnumber: 00041348E1EF
  30. P-Key-Flags: resolution="31x13", keys="4"
  31. User-Agent: snom821/8.7.3.16
  32. Accept: application/sdp
  33. Allow: INVITE, ACK, CANCEL, BYE, REFER, OPTIONS, NOTIFY, SUBSCRIBE, PRACK, MESSAGE, INFO, UPDATE
  34. Allow-Events: talk, hold, refer, call-info
  35. Supported: timer, 100rel, replaces, from-change
  36. Session-Expires: 3600;refresher=uas
  37. Min-SE: 90
  38. Authorization: Digest username="blink4",realm="asterisk",nonce="51a50f6e",uri="sip:123@45.221.32.147;user=phone",response="cb8663d31701e14fe7c6d9cbd34a8755",algorithm=MD5
  39. Content-Type: application/sdp
  40. Content-Length: 465
  41.  
  42. v=0
  43. o=root 1252038392 1252038392 IN IP4 192.168.5.44
  44. s=call
  45. c=IN IP4 192.168.5.44
  46. t=0 0
  47. m=audio 55142 RTP/SAVP 9 0 8 99 108 18 101
  48. a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:uQSatluThiFAsp1seGaBdqhSnoinxtqaTVz4DouM
  49. a=rtpmap:9 G722/8000
  50. a=rtpmap:0 PCMU/8000
  51. a=rtpmap:8 PCMA/8000
  52. a=rtpmap:99 G726-32/8000
  53. a=rtpmap:108 AAL2-G726-32/8000
  54. a=rtpmap:18 G729/8000
  55. a=fmtp:18 annexb=no
  56. a=rtpmap:101 telephone-event/8000
  57. a=fmtp:101 0-15
  58. a=ptime:20
  59. a=sendrecv
  60. <------------->
  61. --- (20 headers 18 lines) ---
  62. Sending to 189.152.96.184:24717 (NAT)
  63. Using INVITE request as basis request - 3e2e4b527a0f-lzl36wcoci5p
  64. Found peer 'blink4' for 'blink4' from 189.152.96.184:24717
  65. == Using SIP RTP CoS mark 5
  66. Found RTP audio format 9
  67. Found RTP audio format 0
  68. Found RTP audio format 8
  69. Found RTP audio format 99
  70. Found RTP audio format 108
  71. Found RTP audio format 18
  72. Found RTP audio format 101
  73. Found audio description format G722 for ID 9
  74. Found audio description format PCMU for ID 0
  75. Found audio description format PCMA for ID 8
  76. Found audio description format G726-32 for ID 99
  77. Found audio description format AAL2-G726-32 for ID 108
  78. Found audio description format G729 for ID 18
  79. Found audio description format telephone-event for ID 101
  80. Capabilities: us - (gsm|ulaw|alaw), peer - audio=(ulaw|alaw|g726|g729|g726aal2|g722)/video=(nothing)/text=(nothing), combined - (ulaw|alaw)
  81. Non-codec capabilities (dtmf): us - 0x1 (telephone-event|), peer - 0x1 (telephone-event|), combined - 0x1 (telephone-event|)
  82. Peer audio RTP is at port 192.168.5.44:55142
  83. Looking for 123 in tlscon (domain 45.221.32.147)
  84. list_route: hop: <sip:blink4@192.168.5.44:4097;transport=tls>
  85.  
  86. <--- Transmitting (NAT) to 189.152.96.184:24717 --->
  87. SIP/2.0 100 Trying
  88. Via: SIP/2.0/TLS 192.168.5.44:4097;branch=z9hG4bK-c01jn4dzhch9;received=189.152.96.184;rport=24717
  89. From: "Secure 4" <sip:blink4@45.221.32.147>;tag=5cdf2xjkyv
  90. To: <sip:123@45.221.32.147;user=phone>
  91. Call-ID: 3e2e4b527a0f-lzl36wcoci5p
  92. CSeq: 2 INVITE
  93. Server: Asterisk PBX 11.5.1
  94. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH
  95. Supported: replaces, timer
  96. Session-Expires: 1800;refresher=uas
  97. Contact: <sip:123@45.221.32.147:5061;transport=TLS>
  98. Content-Length: 0
  99.  
  100.  
  101. <------------>
  102. -- Executing [123@tlscon:1] Answer("SIP/blink4-00000007", "") in new stack
  103. Audio is at 12682
  104. Adding codec 100004 (alaw) to SDP
  105. Adding codec 100003 (ulaw) to SDP
  106. Adding non-codec 0x1 (telephone-event) to SDP
  107.  
  108. <--- Reliably Transmitting (NAT) to 189.152.96.184:24717 --->
  109. SIP/2.0 200 OK
  110. Via: SIP/2.0/TLS 192.168.5.44:4097;branch=z9hG4bK-c01jn4dzhch9;received=189.152.96.184;rport=24717
  111. From: "Secure 4" <sip:blink4@45.221.32.147>;tag=5cdf2xjkyv
  112. To: <sip:123@45.221.32.147;user=phone>;tag=as10014fcb
  113. Call-ID: 3e2e4b527a0f-lzl36wcoci5p
  114. CSeq: 2 INVITE
  115. Server: Asterisk PBX 11.5.1
  116. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH
  117. Supported: replaces, timer
  118. Session-Expires: 1800;refresher=uas
  119. Contact: <sip:123@45.221.32.147:5061;transport=TLS>
  120. Content-Type: application/sdp
  121. Require: timer
  122. Content-Length: 346
  123.  
  124. v=0
  125. o=root 1833255652 1833255652 IN IP4 45.221.32.147
  126. s=Asterisk PBX 11.5.1
  127. c=IN IP4 45.221.32.147
  128. t=0 0
  129. m=audio 12682 RTP/SAVP 8 0 101
  130. a=rtpmap:8 PCMA/8000
  131. a=rtpmap:0 PCMU/8000
  132. a=rtpmap:101 telephone-event/8000
  133. a=fmtp:101 0-16
  134. a=ptime:20
  135. a=sendrecv
  136. a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:84LCYzsaPLhNsqyb6fu82A5btT1AzEMVEwMYLrXG
  137.  
  138. <------------>
  139.  
  140. <--- SIP read from TLS:189.152.96.184:24717 --->
  141. ACK sip:123@45.221.32.147:5061;transport=TLS SIP/2.0
  142. Via: SIP/2.0/TLS 192.168.5.44:4097;branch=z9hG4bK-zj7knah7wtjz;rport
  143. From: "Secure 4" <sip:blink4@45.221.32.147>;tag=5cdf2xjkyv
  144. To: <sip:123@45.221.32.147;user=phone>;tag=as10014fcb
  145. Call-ID: 3e2e4b527a0f-lzl36wcoci5p
  146. CSeq: 2 ACK
  147. Max-Forwards: 70
  148. Contact: <sip:blink4@192.168.5.44:4097;transport=tls>;reg-id=1
  149. Content-Length: 0
  150.  
  151. <------------->
  152. --- (9 headers 0 lines) ---
  153. -- Executing [123@tlscon:2] Wait("SIP/blink4-00000007", ".5") in new stack
  154. -- Executing [123@tlscon:3] Playback("SIP/blink4-00000007", "tt-monkeys") in new stack
  155. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046800, ts 000160, len 000170)
  156. -- <SIP/blink4-00000007> Playing 'tt-monkeys.gsm' (language 'en')
  157. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046801, ts 000320, len 000170)
  158. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046802, ts 000480, len 000170)
  159. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046803, ts 000640, len 000170)
  160. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046804, ts 000800, len 000170)
  161. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046805, ts 000960, len 000170)
  162. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046806, ts 001120, len 000170)
  163. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046807, ts 001280, len 000170)
  164. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046808, ts 001440, len 000170)
  165. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046809, ts 001600, len 000170)
  166. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046810, ts 001760, len 000170)
  167. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046811, ts 001920, len 000170)
  168. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046812, ts 002080, len 000170)
  169. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046813, ts 002240, len 000170)
  170. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046814, ts 002400, len 000170)
  171. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046815, ts 002560, len 000170)
  172. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046816, ts 002720, len 000170)
  173. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046817, ts 002880, len 000170)
  174. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046818, ts 003040, len 000170)
  175. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046819, ts 003200, len 000170)
  176. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046820, ts 003360, len 000170)
  177. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046821, ts 003520, len 000170)
  178. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046822, ts 003680, len 000170)
  179. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046823, ts 003840, len 000170)
  180. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046824, ts 004000, len 000170)
  181. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046825, ts 004160, len 000170)
  182. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046826, ts 004320, len 000170)
  183. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046827, ts 004480, len 000170)
  184. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046828, ts 004640, len 000170)
  185. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046829, ts 004800, len 000170)
  186. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046830, ts 004960, len 000170)
  187. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046831, ts 005120, len 000170)
  188. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046832, ts 005280, len 000170)
  189. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046833, ts 005440, len 000170)
  190. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046834, ts 005600, len 000170)
  191. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046835, ts 005760, len 000170)
  192. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046836, ts 005920, len 000170)
  193. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046837, ts 006080, len 000170)
  194. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046838, ts 006240, len 000170)
  195. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046839, ts 006400, len 000170)
  196. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046840, ts 006560, len 000170)
  197. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046841, ts 006720, len 000170)
  198. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046842, ts 006880, len 000170)
  199. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046843, ts 007040, len 000170)
  200. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046844, ts 007200, len 000170)
  201. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046845, ts 007360, len 000170)
  202. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046846, ts 007520, len 000170)
  203. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046847, ts 007680, len 000170)
  204. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046848, ts 007840, len 000170)
  205. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046849, ts 008000, len 000170)
  206. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046850, ts 008160, len 000170)
  207. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046851, ts 008320, len 000170)
  208. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046852, ts 008480, len 000170)
  209. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046853, ts 008640, len 000170)
  210. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046854, ts 008800, len 000170)
  211. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046855, ts 008960, len 000170)
  212. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046856, ts 009120, len 000170)
  213. Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046857, ts 009280, len 000170)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement