Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- [blink4]
- type=friend
- callerid="Peer 5"<1004>
- host=dynamic
- context=tlscon
- transport=tls
- encryption=yes
- disallow=all
- allow=gsm
- allow=alaw
- allow=ulaw
- directmedia=no
- qualify=yes
- nat=force_rport,comedia
- mailbox=1004@default
- disallowed_methods = UPDATE
- <--- SIP read from TLS:189.152.96.184:24717 --->
- INVITE sip:123@45.221.32.147;user=phone SIP/2.0
- Via: SIP/2.0/TLS 192.168.5.44:4097;branch=z9hG4bK-c01jn4dzhch9;rport
- From: "Secure 4" <sip:blink4@45.221.32.147>;tag=5cdf2xjkyv
- To: <sip:123@45.221.32.147;user=phone>
- Call-ID: 3e2e4b527a0f-lzl36wcoci5p
- CSeq: 2 INVITE
- Max-Forwards: 70
- Contact: <sip:blink4@192.168.5.44:4097;transport=tls>;reg-id=1
- X-Serialnumber: 00041348E1EF
- P-Key-Flags: resolution="31x13", keys="4"
- User-Agent: snom821/8.7.3.16
- Accept: application/sdp
- Allow: INVITE, ACK, CANCEL, BYE, REFER, OPTIONS, NOTIFY, SUBSCRIBE, PRACK, MESSAGE, INFO, UPDATE
- Allow-Events: talk, hold, refer, call-info
- Supported: timer, 100rel, replaces, from-change
- Session-Expires: 3600;refresher=uas
- Min-SE: 90
- Authorization: Digest username="blink4",realm="asterisk",nonce="51a50f6e",uri="sip:123@45.221.32.147;user=phone",response="cb8663d31701e14fe7c6d9cbd34a8755",algorithm=MD5
- Content-Type: application/sdp
- Content-Length: 465
- v=0
- o=root 1252038392 1252038392 IN IP4 192.168.5.44
- s=call
- c=IN IP4 192.168.5.44
- t=0 0
- m=audio 55142 RTP/SAVP 9 0 8 99 108 18 101
- a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:uQSatluThiFAsp1seGaBdqhSnoinxtqaTVz4DouM
- a=rtpmap:9 G722/8000
- a=rtpmap:0 PCMU/8000
- a=rtpmap:8 PCMA/8000
- a=rtpmap:99 G726-32/8000
- a=rtpmap:108 AAL2-G726-32/8000
- a=rtpmap:18 G729/8000
- a=fmtp:18 annexb=no
- a=rtpmap:101 telephone-event/8000
- a=fmtp:101 0-15
- a=ptime:20
- a=sendrecv
- <------------->
- --- (20 headers 18 lines) ---
- Sending to 189.152.96.184:24717 (NAT)
- Using INVITE request as basis request - 3e2e4b527a0f-lzl36wcoci5p
- Found peer 'blink4' for 'blink4' from 189.152.96.184:24717
- == Using SIP RTP CoS mark 5
- Found RTP audio format 9
- Found RTP audio format 0
- Found RTP audio format 8
- Found RTP audio format 99
- Found RTP audio format 108
- Found RTP audio format 18
- Found RTP audio format 101
- Found audio description format G722 for ID 9
- Found audio description format PCMU for ID 0
- Found audio description format PCMA for ID 8
- Found audio description format G726-32 for ID 99
- Found audio description format AAL2-G726-32 for ID 108
- Found audio description format G729 for ID 18
- Found audio description format telephone-event for ID 101
- Capabilities: us - (gsm|ulaw|alaw), peer - audio=(ulaw|alaw|g726|g729|g726aal2|g722)/video=(nothing)/text=(nothing), combined - (ulaw|alaw)
- Non-codec capabilities (dtmf): us - 0x1 (telephone-event|), peer - 0x1 (telephone-event|), combined - 0x1 (telephone-event|)
- Peer audio RTP is at port 192.168.5.44:55142
- Looking for 123 in tlscon (domain 45.221.32.147)
- list_route: hop: <sip:blink4@192.168.5.44:4097;transport=tls>
- <--- Transmitting (NAT) to 189.152.96.184:24717 --->
- SIP/2.0 100 Trying
- Via: SIP/2.0/TLS 192.168.5.44:4097;branch=z9hG4bK-c01jn4dzhch9;received=189.152.96.184;rport=24717
- From: "Secure 4" <sip:blink4@45.221.32.147>;tag=5cdf2xjkyv
- To: <sip:123@45.221.32.147;user=phone>
- Call-ID: 3e2e4b527a0f-lzl36wcoci5p
- CSeq: 2 INVITE
- Server: Asterisk PBX 11.5.1
- Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH
- Supported: replaces, timer
- Session-Expires: 1800;refresher=uas
- Contact: <sip:123@45.221.32.147:5061;transport=TLS>
- Content-Length: 0
- <------------>
- -- Executing [123@tlscon:1] Answer("SIP/blink4-00000007", "") in new stack
- Audio is at 12682
- Adding codec 100004 (alaw) to SDP
- Adding codec 100003 (ulaw) to SDP
- Adding non-codec 0x1 (telephone-event) to SDP
- <--- Reliably Transmitting (NAT) to 189.152.96.184:24717 --->
- SIP/2.0 200 OK
- Via: SIP/2.0/TLS 192.168.5.44:4097;branch=z9hG4bK-c01jn4dzhch9;received=189.152.96.184;rport=24717
- From: "Secure 4" <sip:blink4@45.221.32.147>;tag=5cdf2xjkyv
- To: <sip:123@45.221.32.147;user=phone>;tag=as10014fcb
- Call-ID: 3e2e4b527a0f-lzl36wcoci5p
- CSeq: 2 INVITE
- Server: Asterisk PBX 11.5.1
- Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH
- Supported: replaces, timer
- Session-Expires: 1800;refresher=uas
- Contact: <sip:123@45.221.32.147:5061;transport=TLS>
- Content-Type: application/sdp
- Require: timer
- Content-Length: 346
- v=0
- o=root 1833255652 1833255652 IN IP4 45.221.32.147
- s=Asterisk PBX 11.5.1
- c=IN IP4 45.221.32.147
- t=0 0
- m=audio 12682 RTP/SAVP 8 0 101
- a=rtpmap:8 PCMA/8000
- a=rtpmap:0 PCMU/8000
- a=rtpmap:101 telephone-event/8000
- a=fmtp:101 0-16
- a=ptime:20
- a=sendrecv
- a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:84LCYzsaPLhNsqyb6fu82A5btT1AzEMVEwMYLrXG
- <------------>
- <--- SIP read from TLS:189.152.96.184:24717 --->
- ACK sip:123@45.221.32.147:5061;transport=TLS SIP/2.0
- Via: SIP/2.0/TLS 192.168.5.44:4097;branch=z9hG4bK-zj7knah7wtjz;rport
- From: "Secure 4" <sip:blink4@45.221.32.147>;tag=5cdf2xjkyv
- To: <sip:123@45.221.32.147;user=phone>;tag=as10014fcb
- Call-ID: 3e2e4b527a0f-lzl36wcoci5p
- CSeq: 2 ACK
- Max-Forwards: 70
- Contact: <sip:blink4@192.168.5.44:4097;transport=tls>;reg-id=1
- Content-Length: 0
- <------------->
- --- (9 headers 0 lines) ---
- -- Executing [123@tlscon:2] Wait("SIP/blink4-00000007", ".5") in new stack
- -- Executing [123@tlscon:3] Playback("SIP/blink4-00000007", "tt-monkeys") in new stack
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046800, ts 000160, len 000170)
- -- <SIP/blink4-00000007> Playing 'tt-monkeys.gsm' (language 'en')
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046801, ts 000320, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046802, ts 000480, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046803, ts 000640, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046804, ts 000800, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046805, ts 000960, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046806, ts 001120, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046807, ts 001280, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046808, ts 001440, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046809, ts 001600, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046810, ts 001760, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046811, ts 001920, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046812, ts 002080, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046813, ts 002240, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046814, ts 002400, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046815, ts 002560, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046816, ts 002720, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046817, ts 002880, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046818, ts 003040, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046819, ts 003200, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046820, ts 003360, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046821, ts 003520, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046822, ts 003680, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046823, ts 003840, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046824, ts 004000, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046825, ts 004160, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046826, ts 004320, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046827, ts 004480, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046828, ts 004640, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046829, ts 004800, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046830, ts 004960, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046831, ts 005120, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046832, ts 005280, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046833, ts 005440, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046834, ts 005600, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046835, ts 005760, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046836, ts 005920, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046837, ts 006080, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046838, ts 006240, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046839, ts 006400, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046840, ts 006560, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046841, ts 006720, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046842, ts 006880, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046843, ts 007040, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046844, ts 007200, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046845, ts 007360, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046846, ts 007520, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046847, ts 007680, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046848, ts 007840, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046849, ts 008000, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046850, ts 008160, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046851, ts 008320, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046852, ts 008480, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046853, ts 008640, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046854, ts 008800, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046855, ts 008960, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046856, ts 009120, len 000170)
- Sent RTP packet to 192.168.5.44:55142 (type 08, seq 046857, ts 009280, len 000170)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement