Advertisement
amartin

ringing delay and no connection even after pickup

Apr 30th, 2015
414
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 23.58 KB | None | 0 0
  1. <--- SIP read from UDP:192.168.32.10:5062 --->
  2. INVITE sip:[email protected] SIP/2.0
  3. Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK2068841883
  4. From: "openvpn" <sip:[email protected]>;tag=212525766
  5. CSeq: 1 INVITE
  6. Contact: <sip:[email protected]:5062>
  7. Content-Type: application/sdp
  8. Allow: INVITE, INFO, PRACK, ACK, BYE, CANCEL, OPTIONS, NOTIFY, REGISTER, SUBSCRIBE, REFER, PUBLISH, UPDATE, MESSAGE
  9. Max-Forwards: 70
  10. User-Agent: Yealink SIP-T32G 32.70.0.131
  11. Supported: replaces
  12. Allow-Events: talk,hold,conference,refer,check-sync
  13. Content-Length: 309
  14.  
  15. v=0
  16. o=- 20005 20005 IN IP4 192.168.32.10
  17. s=SDP data
  18. c=IN IP4 192.168.32.10
  19. t=0 0
  20. m=audio 11790 RTP/AVP 0 8 18 9 101
  21. a=rtpmap:0 PCMU/8000
  22. a=rtpmap:8 PCMA/8000
  23. a=rtpmap:18 G729/8000
  24. a=fmtp:18 annexb=yes
  25. a=rtpmap:9 G722/8000
  26. a=fmtp:101 0-15
  27. a=rtpmap:101 telephone-event/8000
  28. a=ptime:20
  29. a=sendrecv
  30. <------------->
  31. --- (14 headers 15 lines) ---
  32. Sending to 192.168.32.10:5062 (no NAT)
  33. Sending to 192.168.32.10:5062 (no NAT)
  34. Using INVITE request as basis request - [email protected]
  35. Found peer '265' for '265' from 192.168.32.10:5062
  36.  
  37. <--- Reliably Transmitting (no NAT) to 192.168.32.10:5062 --->
  38. SIP/2.0 401 Unauthorized
  39. Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK2068841883;received=192.168.32.10
  40. From: "openvpn" <sip:[email protected]>;tag=212525766
  41. To: <sip:[email protected]>;tag=as73e883ac
  42. CSeq: 1 INVITE
  43. Server: Asterisk PBX 11.12.0
  44. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
  45. Supported: replaces, timer
  46. WWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="06d47abc"
  47. Content-Length: 0
  48.  
  49.  
  50. <------------>
  51. Scheduling destruction of SIP dialog '[email protected]' in 32000 ms (Method: INVITE)
  52.  
  53. <--- SIP read from UDP:192.168.32.10:5062 --->
  54. ACK sip:[email protected] SIP/2.0
  55. Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK2068841883
  56. From: "openvpn" <sip:[email protected]>;tag=212525766
  57. To: <sip:[email protected]>;tag=as73e883ac
  58. CSeq: 1 ACK
  59. Content-Length: 0
  60.  
  61. <------------->
  62. --- (7 headers 0 lines) ---
  63.  
  64. <--- SIP read from UDP:192.168.32.10:5062 --->
  65. INVITE sip:[email protected] SIP/2.0
  66. Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK887935696
  67. From: "openvpn" <sip:[email protected]>;tag=212525766
  68. CSeq: 2 INVITE
  69. Contact: <sip:[email protected]:5062>
  70. Authorization: Digest username="265", realm="asterisk", nonce="06d47abc", uri="sip:[email protected]", response="72e85740dfcfd6b537f1fb63e08d8b11", algorithm=MD5
  71. Content-Type: application/sdp
  72. Allow: INVITE, INFO, PRACK, ACK, BYE, CANCEL, OPTIONS, NOTIFY, REGISTER, SUBSCRIBE, REFER, PUBLISH, UPDATE, MESSAGE
  73. Max-Forwards: 70
  74. User-Agent: Yealink SIP-T32G 32.70.0.131
  75. Supported: replaces
  76. Allow-Events: talk,hold,conference,refer,check-sync
  77. Content-Length: 309
  78.  
  79. v=0
  80. o=- 20005 20005 IN IP4 192.168.32.10
  81. s=SDP data
  82. c=IN IP4 192.168.32.10
  83. t=0 0
  84. m=audio 11790 RTP/AVP 0 8 18 9 101
  85. a=rtpmap:0 PCMU/8000
  86. a=rtpmap:8 PCMA/8000
  87. a=rtpmap:18 G729/8000
  88. a=fmtp:18 annexb=yes
  89. a=rtpmap:9 G722/8000
  90. a=fmtp:101 0-15
  91. a=rtpmap:101 telephone-event/8000
  92. a=ptime:20
  93. a=sendrecv
  94. <------------->
  95. --- (15 headers 15 lines) ---
  96. Sending to 192.168.32.10:5062 (no NAT)
  97. Using INVITE request as basis request - [email protected]
  98. Found peer '265' for '265' from 192.168.32.10:5062
  99. == Using SIP RTP CoS mark 5
  100. Found RTP audio format 0
  101. Found RTP audio format 8
  102. Found RTP audio format 18
  103. Found RTP audio format 9
  104. Found RTP audio format 101
  105. Found audio description format PCMU for ID 0
  106. Found audio description format PCMA for ID 8
  107. Found audio description format G729 for ID 18
  108. Found audio description format G722 for ID 9
  109. Found audio description format telephone-event for ID 101
  110. Capabilities: us - (ulaw), peer - audio=(ulaw|alaw|g729|g722)/video=(nothing)/text=(nothing), combined - (ulaw)
  111. Non-codec capabilities (dtmf): us - 0x1 (telephone-event|), peer - 0x1 (telephone-event|), combined - 0x1 (telephone-event|)
  112. Peer audio RTP is at port 192.168.32.10:11790
  113. Looking for 146 in xes-internal (domain 10.52.32.251)
  114. list_route: hop: <sip:[email protected]:5062>
  115.  
  116. <--- Transmitting (no NAT) to 192.168.32.10:5062 --->
  117. SIP/2.0 100 Trying
  118. Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK887935696;received=192.168.32.10
  119. From: "openvpn" <sip:[email protected]>;tag=212525766
  120. CSeq: 2 INVITE
  121. Server: Asterisk PBX 11.12.0
  122. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
  123. Supported: replaces, timer
  124. Contact: <sip:[email protected]:5060>
  125. Content-Length: 0
  126.  
  127.  
  128. <------------>
  129. -- Executing [146@xes-internal:1] Goto("SIP/265-000024dc", "dial-extension,146,1") in new stack
  130. -- Goto (dial-extension,146,1)
  131. -- Executing [146@dial-extension:1] Dial("SIP/265-000024dc", "SIP/146,12") in new stack
  132. == Using SIP RTP CoS mark 5
  133. -- Called SIP/146
  134. == Extension Changed 146[BLF] new state Ringing for Notify User 133
  135. == Extension Changed 146[BLF] new state Ringing for Notify User 178
  136. == Extension Changed 146[BLF] new state Ringing for Notify User 169
  137. -- SIP/146-000024dd is ringing
  138.  
  139. <--- Transmitting (no NAT) to 192.168.32.10:5062 --->
  140. SIP/2.0 180 Ringing
  141. Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK887935696;received=192.168.32.10
  142. From: "openvpn" <sip:[email protected]>;tag=212525766
  143. To: <sip:[email protected]>;tag=as547b304c
  144. CSeq: 2 INVITE
  145. Server: Asterisk PBX 11.12.0
  146. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
  147. Supported: replaces, timer
  148. Contact: <sip:[email protected]:5060>
  149. Content-Length: 0
  150.  
  151.  
  152. <------------>
  153. == Extension Changed 146[BLF] new state Ringing for Notify User 133 (queued)
  154. == Extension Changed 146[BLF] new state Ringing for Notify User 178 (queued)
  155. == Extension Changed 146[BLF] new state Ringing for Notify User 169 (queued)
  156. [2015-04-30 11:02:48] NOTICE[21037]: chan_sip.c:16419 check_auth: Correct auth, but based on stale nonce received from '"Zach Krohn" <sip:[email protected]>;tag=3697113213'
  157. [2015-04-30 11:02:48] NOTICE[21037]: chan_sip.c:16419 check_auth: Correct auth, but based on stale nonce received from '"Ben Davenport" <sip:[email protected]>;tag=131227993'
  158. [2015-04-30 11:02:48] NOTICE[21037]: chan_sip.c:16419 check_auth: Correct auth, but based on stale nonce received from '"Steve Johnson" <sip:[email protected]>;tag=884199709'
  159. [2015-04-30 11:02:49] NOTICE[21037]: chan_sip.c:16419 check_auth: Correct auth, but based on stale nonce received from '"Matt Starzewski" <sip:[email protected]>;tag=219689552'
  160. [2015-04-30 11:02:50] NOTICE[21037]: chan_sip.c:16419 check_auth: Correct auth, but based on stale nonce received from '"Jay Kobor" <sip:[email protected]>;tag=2045714715'
  161. -- SIP/146-000024dd answered SIP/265-000024dc
  162. Audio is at 13634
  163. == Extension Changed 146[BLF] new state InUse for Notify User 133
  164. Adding codec 100003 (ulaw) to SDP
  165. Adding non-codec 0x1 (telephone-event) to SDP
  166.  
  167. <--- Reliably Transmitting (no NAT) to 192.168.32.10:5062 --->
  168. SIP/2.0 200 OK
  169. Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK887935696;received=192.168.32.10
  170. From: "openvpn" <sip:[email protected]>;tag=212525766
  171. To: <sip:[email protected]>;tag=as547b304c
  172. CSeq: 2 INVITE
  173. Server: Asterisk PBX 11.12.0
  174. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
  175. Supported: replaces, timer
  176. Contact: <sip:[email protected]:5060>
  177. Content-Type: application/sdp
  178. Content-Length: 236
  179.  
  180. v=0
  181. o=root 1909632502 1909632502 IN IP4 10.52.32.251
  182. s=Asterisk PBX 11.12.0
  183. c=IN IP4 10.52.32.251
  184. t=0 0
  185. m=audio 13634 RTP/AVP 0 101
  186. a=rtpmap:0 PCMU/8000
  187. a=rtpmap:101 telephone-event/8000
  188. a=fmtp:101 0-16
  189. a=ptime:20
  190. a=sendrecv
  191.  
  192. <------------>
  193. == Extension Changed 146[BLF] new state InUse for Notify User 178
  194. == Extension Changed 146[BLF] new state InUse for Notify User 169 (queued)
  195. -- Locally bridging SIP/265-000024dc and SIP/146-000024dd
  196. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  197. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  198. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  199. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  200. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  201. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  202. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  203. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  204. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  205. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  206. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  207. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  208. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  209. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  210. Got RTP packet from 192.168.32.10:11790 (type 13, seq 009572, ts 056080, len 000001)
  211. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  212. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  213. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  214. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  215. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  216. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  217.  
  218. <--- SIP read from UDP:192.168.32.10:5062 --->
  219. ACK sip:[email protected]:5060 SIP/2.0
  220. Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK1295065116
  221. From: "openvpn" <sip:[email protected]>;tag=212525766
  222. To: <sip:[email protected]>;tag=as547b304c
  223. CSeq: 2 ACK
  224. Contact: <sip:[email protected]:5062>
  225. Max-Forwards: 70
  226. User-Agent: Yealink SIP-T32G 32.70.0.131
  227. Content-Length: 0
  228.  
  229. <------------->
  230. --- (10 headers 0 lines) ---
  231.  
  232. <--- SIP read from UDP:192.168.32.10:5062 --->
  233. ACK sip:[email protected]:5060 SIP/2.0
  234. Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK1295065116
  235. From: "openvpn" <sip:[email protected]>;tag=212525766
  236. To: <sip:[email protected]>;tag=as547b304c
  237. CSeq: 2 ACK
  238. Contact: <sip:[email protected]:5062>
  239. Max-Forwards: 70
  240. User-Agent: Yealink SIP-T32G 32.70.0.131
  241. Content-Length: 0
  242.  
  243. <------------->
  244. --- (10 headers 0 lines) ---
  245. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  246. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  247. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  248. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  249. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  250. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  251. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  252. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  253. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  254. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  255. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  256. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  257. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  258. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  259. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  260. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  261. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  262. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  263. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  264. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  265. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  266. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  267. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  268. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  269. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  270. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  271. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  272. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  273. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  274. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  275. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  276. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  277. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  278. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  279. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  280. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  281. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  282. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  283. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  284. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  285. Got RTP packet from 192.168.32.10:11790 (type 13, seq 009610, ts 064480, len 000001)
  286. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  287. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  288. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  289. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  290. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  291. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  292. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  293. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  294. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  295. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  296. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  297. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  298. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  299. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  300. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  301. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  302. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  303. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  304. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  305. [2015-04-30 11:02:52] NOTICE[21037]: chan_sip.c:16419 check_auth: Correct auth, but based on stale nonce received from '"Nickolas Moser" <sip:[email protected]>;tag=129882940'
  306. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  307. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  308. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  309. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  310. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  311. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  312. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  313. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  314. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  315. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  316. Got RTP packet from 192.168.32.10:11790 (type 13, seq 009640, ts 071440, len 000001)
  317. [2015-04-30 11:02:53] NOTICE[21037]: chan_sip.c:16419 check_auth: Correct auth, but based on stale nonce received from '"Scott Ludwig" <sip:[email protected]>;tag=2823380259'
  318. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  319. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  320. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  321. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  322. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  323. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  324. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  325. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  326. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  327. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  328. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  329. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  330. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  331. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  332. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  333. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  334. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  335. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  336. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  337. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  338. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  339. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  340. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  341. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  342. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  343. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  344. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  345. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  346. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000080)
  347. Got RTP packet from 192.168.32.10:11790 (type 13, seq 009678, ts 079840, len 000001)
  348. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  349. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  350. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  351. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  352. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  353. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  354. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  355. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  356. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  357. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  358. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  359. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  360. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  361. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  362. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  363. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  364. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  365. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  366. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  367. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  368. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  369. Got RTP packet from 192.168.32.10:11790 (type 13, seq 009699, ts 083280, len 000001)
  370. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  371. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  372. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  373. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  374. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  375. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  376. [2015-04-30 11:02:54] NOTICE[21037]: chan_sip.c:16419 check_auth: Correct auth, but based on stale nonce received from '"Brad Bilse" <sip:[email protected]>;tag=971795806'
  377. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  378. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  379. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  380. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  381. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  382. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  383. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  384. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  385. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  386. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  387. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  388. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  389. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  390. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  391. Got RTP packet from 192.168.32.10:11790 (type 00, seq 009748, ts 091040, len 000160)
  392. == Extension Changed 146[BLF] new state Idle for Notify User 133
  393. == Extension Changed 146[BLF] new state Idle for Notify User 178
  394. == Extension Changed 146[BLF] new state Idle for Notify User 169
  395. == Spawn extension (dial-extension, 146, 1) exited non-zero on 'SIP/265-000024dc'
  396. Scheduling destruction of SIP dialog '[email protected]' in 32000 ms (Method: ACK)
  397. set_destination: Parsing <sip:[email protected]:5062> for address/port to send to
  398. set_destination: set destination to 192.168.32.10:5062
  399. Reliably Transmitting (no NAT) to 192.168.32.10:5062:
  400. BYE sip:[email protected]:5062 SIP/2.0
  401. Via: SIP/2.0/UDP 10.52.32.251:5060;branch=z9hG4bK639fc521
  402. Max-Forwards: 70
  403. From: <sip:[email protected]>;tag=as547b304c
  404. To: "openvpn" <sip:[email protected]>;tag=212525766
  405. CSeq: 102 BYE
  406. User-Agent: Asterisk PBX 11.12.0
  407. Proxy-Authorization: Digest username="265", realm="asterisk", algorithm=MD5, uri="sip:10.52.32.251", nonce="06d47abc", response="f26c562bf9d44be78a81d47d0a2ec4b5"
  408. X-Asterisk-HangupCause: Normal Clearing
  409. X-Asterisk-HangupCauseCode: 16
  410. Content-Length: 0
  411.  
  412.  
  413. ---
  414. Retransmitting #1 (no NAT) to 192.168.32.10:5062:
  415. BYE sip:[email protected]:5062 SIP/2.0
  416. Via: SIP/2.0/UDP 10.52.32.251:5060;branch=z9hG4bK639fc521
  417. Max-Forwards: 70
  418. From: <sip:[email protected]>;tag=as547b304c
  419. To: "openvpn" <sip:[email protected]>;tag=212525766
  420. CSeq: 102 BYE
  421. User-Agent: Asterisk PBX 11.12.0
  422. Proxy-Authorization: Digest username="265", realm="asterisk", algorithm=MD5, uri="sip:10.52.32.251", nonce="06d47abc", response="f26c562bf9d44be78a81d47d0a2ec4b5"
  423. X-Asterisk-HangupCause: Normal Clearing
  424. X-Asterisk-HangupCauseCode: 16
  425. Content-Length: 0
  426.  
  427.  
  428. ---
  429. [2015-04-30 11:02:56] NOTICE[21037]: chan_sip.c:16419 check_auth: Correct auth, but based on stale nonce received from '"Brian Borkovec" <sip:[email protected]>;tag=933433589'
  430. [2015-04-30 11:02:56] NOTICE[21037]: chan_sip.c:16419 check_auth: Correct auth, but based on stale nonce received from '"Bill Landucci" <sip:[email protected]>;tag=573194324'
  431. Retransmitting #2 (no NAT) to 192.168.32.10:5062:
  432. BYE sip:[email protected]:5062 SIP/2.0
  433. Via: SIP/2.0/UDP 10.52.32.251:5060;branch=z9hG4bK639fc521
  434. Max-Forwards: 70
  435. From: <sip:[email protected]>;tag=as547b304c
  436. To: "openvpn" <sip:[email protected]>;tag=212525766
  437. CSeq: 102 BYE
  438. User-Agent: Asterisk PBX 11.12.0
  439. Proxy-Authorization: Digest username="265", realm="asterisk", algorithm=MD5, uri="sip:10.52.32.251", nonce="06d47abc", response="f26c562bf9d44be78a81d47d0a2ec4b5"
  440. X-Asterisk-HangupCause: Normal Clearing
  441. X-Asterisk-HangupCauseCode: 16
  442. Content-Length: 0
  443.  
  444.  
  445. ---
  446.  
  447. <--- SIP read from UDP:192.168.32.10:5062 --->
  448. SIP/2.0 200 OK
  449. Via: SIP/2.0/UDP 10.52.32.251:5060;branch=z9hG4bK639fc521
  450. From: <sip:[email protected]>;tag=as547b304c
  451. To: "openvpn" <sip:[email protected]>;tag=212525766
  452. CSeq: 102 BYE
  453. User-Agent: Yealink SIP-T32G 32.70.0.131
  454. Content-Length: 0
  455.  
  456. <------------->
  457. --- (8 headers 0 lines) ---
  458. SIP Response message for INCOMING dialog BYE arrived
  459. Really destroying SIP dialog '[email protected]' Method: ACK
  460. [2015-04-30 11:02:57] NOTICE[21037]: chan_sip.c:16419 check_auth: Correct auth, but based on stale nonce received from '"Jeff Porter" <sip:[email protected]>;tag=463566012'
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement