Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- <--- SIP read from UDP:192.168.32.10:5062 --->
- INVITE sip:146@10.52.32.251 SIP/2.0
- Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK2068841883
- From: "openvpn" <sip:265@10.52.32.251>;tag=212525766
- To: <sip:146@10.52.32.251>
- Call-ID: 1390599296@192.168.32.10
- CSeq: 1 INVITE
- Contact: <sip:265@192.168.32.10:5062>
- Content-Type: application/sdp
- Allow: INVITE, INFO, PRACK, ACK, BYE, CANCEL, OPTIONS, NOTIFY, REGISTER, SUBSCRIBE, REFER, PUBLISH, UPDATE, MESSAGE
- Max-Forwards: 70
- User-Agent: Yealink SIP-T32G 32.70.0.131
- Supported: replaces
- Allow-Events: talk,hold,conference,refer,check-sync
- Content-Length: 309
- v=0
- o=- 20005 20005 IN IP4 192.168.32.10
- s=SDP data
- c=IN IP4 192.168.32.10
- t=0 0
- m=audio 11790 RTP/AVP 0 8 18 9 101
- a=rtpmap:0 PCMU/8000
- a=rtpmap:8 PCMA/8000
- a=rtpmap:18 G729/8000
- a=fmtp:18 annexb=yes
- a=rtpmap:9 G722/8000
- a=fmtp:101 0-15
- a=rtpmap:101 telephone-event/8000
- a=ptime:20
- a=sendrecv
- <------------->
- --- (14 headers 15 lines) ---
- Sending to 192.168.32.10:5062 (no NAT)
- Sending to 192.168.32.10:5062 (no NAT)
- Using INVITE request as basis request - 1390599296@192.168.32.10
- Found peer '265' for '265' from 192.168.32.10:5062
- <--- Reliably Transmitting (no NAT) to 192.168.32.10:5062 --->
- SIP/2.0 401 Unauthorized
- Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK2068841883;received=192.168.32.10
- From: "openvpn" <sip:265@10.52.32.251>;tag=212525766
- To: <sip:146@10.52.32.251>;tag=as73e883ac
- Call-ID: 1390599296@192.168.32.10
- CSeq: 1 INVITE
- Server: Asterisk PBX 11.12.0
- Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
- Supported: replaces, timer
- WWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="06d47abc"
- Content-Length: 0
- <------------>
- Scheduling destruction of SIP dialog '1390599296@192.168.32.10' in 32000 ms (Method: INVITE)
- <--- SIP read from UDP:192.168.32.10:5062 --->
- ACK sip:146@10.52.32.251 SIP/2.0
- Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK2068841883
- From: "openvpn" <sip:265@10.52.32.251>;tag=212525766
- To: <sip:146@10.52.32.251>;tag=as73e883ac
- Call-ID: 1390599296@192.168.32.10
- CSeq: 1 ACK
- Content-Length: 0
- <------------->
- --- (7 headers 0 lines) ---
- <--- SIP read from UDP:192.168.32.10:5062 --->
- INVITE sip:146@10.52.32.251 SIP/2.0
- Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK887935696
- From: "openvpn" <sip:265@10.52.32.251>;tag=212525766
- To: <sip:146@10.52.32.251>
- Call-ID: 1390599296@192.168.32.10
- CSeq: 2 INVITE
- Contact: <sip:265@192.168.32.10:5062>
- Authorization: Digest username="265", realm="asterisk", nonce="06d47abc", uri="sip:146@10.52.32.251", response="72e85740dfcfd6b537f1fb63e08d8b11", algorithm=MD5
- Content-Type: application/sdp
- Allow: INVITE, INFO, PRACK, ACK, BYE, CANCEL, OPTIONS, NOTIFY, REGISTER, SUBSCRIBE, REFER, PUBLISH, UPDATE, MESSAGE
- Max-Forwards: 70
- User-Agent: Yealink SIP-T32G 32.70.0.131
- Supported: replaces
- Allow-Events: talk,hold,conference,refer,check-sync
- Content-Length: 309
- v=0
- o=- 20005 20005 IN IP4 192.168.32.10
- s=SDP data
- c=IN IP4 192.168.32.10
- t=0 0
- m=audio 11790 RTP/AVP 0 8 18 9 101
- a=rtpmap:0 PCMU/8000
- a=rtpmap:8 PCMA/8000
- a=rtpmap:18 G729/8000
- a=fmtp:18 annexb=yes
- a=rtpmap:9 G722/8000
- a=fmtp:101 0-15
- a=rtpmap:101 telephone-event/8000
- a=ptime:20
- a=sendrecv
- <------------->
- --- (15 headers 15 lines) ---
- Sending to 192.168.32.10:5062 (no NAT)
- Using INVITE request as basis request - 1390599296@192.168.32.10
- Found peer '265' for '265' from 192.168.32.10:5062
- == Using SIP RTP CoS mark 5
- Found RTP audio format 0
- Found RTP audio format 8
- Found RTP audio format 18
- Found RTP audio format 9
- Found RTP audio format 101
- Found audio description format PCMU for ID 0
- Found audio description format PCMA for ID 8
- Found audio description format G729 for ID 18
- Found audio description format G722 for ID 9
- Found audio description format telephone-event for ID 101
- Capabilities: us - (ulaw), peer - audio=(ulaw|alaw|g729|g722)/video=(nothing)/text=(nothing), combined - (ulaw)
- Non-codec capabilities (dtmf): us - 0x1 (telephone-event|), peer - 0x1 (telephone-event|), combined - 0x1 (telephone-event|)
- Peer audio RTP is at port 192.168.32.10:11790
- Looking for 146 in xes-internal (domain 10.52.32.251)
- list_route: hop: <sip:265@192.168.32.10:5062>
- <--- Transmitting (no NAT) to 192.168.32.10:5062 --->
- SIP/2.0 100 Trying
- Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK887935696;received=192.168.32.10
- From: "openvpn" <sip:265@10.52.32.251>;tag=212525766
- To: <sip:146@10.52.32.251>
- Call-ID: 1390599296@192.168.32.10
- CSeq: 2 INVITE
- Server: Asterisk PBX 11.12.0
- Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
- Supported: replaces, timer
- Contact: <sip:146@10.52.32.251:5060>
- Content-Length: 0
- <------------>
- -- Executing [146@xes-internal:1] Goto("SIP/265-000024dc", "dial-extension,146,1") in new stack
- -- Goto (dial-extension,146,1)
- -- Executing [146@dial-extension:1] Dial("SIP/265-000024dc", "SIP/146,12") in new stack
- == Using SIP RTP CoS mark 5
- -- Called SIP/146
- == Extension Changed 146[BLF] new state Ringing for Notify User 133
- == Extension Changed 146[BLF] new state Ringing for Notify User 178
- == Extension Changed 146[BLF] new state Ringing for Notify User 169
- -- SIP/146-000024dd is ringing
- <--- Transmitting (no NAT) to 192.168.32.10:5062 --->
- SIP/2.0 180 Ringing
- Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK887935696;received=192.168.32.10
- From: "openvpn" <sip:265@10.52.32.251>;tag=212525766
- To: <sip:146@10.52.32.251>;tag=as547b304c
- Call-ID: 1390599296@192.168.32.10
- CSeq: 2 INVITE
- Server: Asterisk PBX 11.12.0
- Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
- Supported: replaces, timer
- Contact: <sip:146@10.52.32.251:5060>
- Content-Length: 0
- <------------>
- == Extension Changed 146[BLF] new state Ringing for Notify User 133 (queued)
- == Extension Changed 146[BLF] new state Ringing for Notify User 178 (queued)
- == Extension Changed 146[BLF] new state Ringing for Notify User 169 (queued)
- [2015-04-30 11:02:48] NOTICE[21037]: chan_sip.c:16419 check_auth: Correct auth, but based on stale nonce received from '"Zach Krohn" <sip:110@10.52.32.251>;tag=3697113213'
- [2015-04-30 11:02:48] NOTICE[21037]: chan_sip.c:16419 check_auth: Correct auth, but based on stale nonce received from '"Ben Davenport" <sip:209@10.52.32.251>;tag=131227993'
- [2015-04-30 11:02:48] NOTICE[21037]: chan_sip.c:16419 check_auth: Correct auth, but based on stale nonce received from '"Steve Johnson" <sip:156@10.52.32.251>;tag=884199709'
- [2015-04-30 11:02:49] NOTICE[21037]: chan_sip.c:16419 check_auth: Correct auth, but based on stale nonce received from '"Matt Starzewski" <sip:106@10.52.32.251>;tag=219689552'
- [2015-04-30 11:02:50] NOTICE[21037]: chan_sip.c:16419 check_auth: Correct auth, but based on stale nonce received from '"Jay Kobor" <sip:233@10.52.32.251>;tag=2045714715'
- -- SIP/146-000024dd answered SIP/265-000024dc
- Audio is at 13634
- == Extension Changed 146[BLF] new state InUse for Notify User 133
- Adding codec 100003 (ulaw) to SDP
- Adding non-codec 0x1 (telephone-event) to SDP
- <--- Reliably Transmitting (no NAT) to 192.168.32.10:5062 --->
- SIP/2.0 200 OK
- Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK887935696;received=192.168.32.10
- From: "openvpn" <sip:265@10.52.32.251>;tag=212525766
- To: <sip:146@10.52.32.251>;tag=as547b304c
- Call-ID: 1390599296@192.168.32.10
- CSeq: 2 INVITE
- Server: Asterisk PBX 11.12.0
- Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
- Supported: replaces, timer
- Contact: <sip:146@10.52.32.251:5060>
- Content-Type: application/sdp
- Content-Length: 236
- v=0
- o=root 1909632502 1909632502 IN IP4 10.52.32.251
- s=Asterisk PBX 11.12.0
- c=IN IP4 10.52.32.251
- t=0 0
- m=audio 13634 RTP/AVP 0 101
- a=rtpmap:0 PCMU/8000
- a=rtpmap:101 telephone-event/8000
- a=fmtp:101 0-16
- a=ptime:20
- a=sendrecv
- <------------>
- == Extension Changed 146[BLF] new state InUse for Notify User 178
- == Extension Changed 146[BLF] new state InUse for Notify User 169 (queued)
- -- Locally bridging SIP/265-000024dc and SIP/146-000024dd
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Got RTP packet from 192.168.32.10:11790 (type 13, seq 009572, ts 056080, len 000001)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- <--- SIP read from UDP:192.168.32.10:5062 --->
- ACK sip:146@10.52.32.251:5060 SIP/2.0
- Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK1295065116
- From: "openvpn" <sip:265@10.52.32.251>;tag=212525766
- To: <sip:146@10.52.32.251>;tag=as547b304c
- Call-ID: 1390599296@192.168.32.10
- CSeq: 2 ACK
- Contact: <sip:265@192.168.32.10:5062>
- Max-Forwards: 70
- User-Agent: Yealink SIP-T32G 32.70.0.131
- Content-Length: 0
- <------------->
- --- (10 headers 0 lines) ---
- <--- SIP read from UDP:192.168.32.10:5062 --->
- ACK sip:146@10.52.32.251:5060 SIP/2.0
- Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK1295065116
- From: "openvpn" <sip:265@10.52.32.251>;tag=212525766
- To: <sip:146@10.52.32.251>;tag=as547b304c
- Call-ID: 1390599296@192.168.32.10
- CSeq: 2 ACK
- Contact: <sip:265@192.168.32.10:5062>
- Max-Forwards: 70
- User-Agent: Yealink SIP-T32G 32.70.0.131
- Content-Length: 0
- <------------->
- --- (10 headers 0 lines) ---
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Got RTP packet from 192.168.32.10:11790 (type 13, seq 009610, ts 064480, len 000001)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- [2015-04-30 11:02:52] NOTICE[21037]: chan_sip.c:16419 check_auth: Correct auth, but based on stale nonce received from '"Nickolas Moser" <sip:207@10.52.32.251>;tag=129882940'
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Got RTP packet from 192.168.32.10:11790 (type 13, seq 009640, ts 071440, len 000001)
- [2015-04-30 11:02:53] NOTICE[21037]: chan_sip.c:16419 check_auth: Correct auth, but based on stale nonce received from '"Scott Ludwig" <sip:140@10.52.32.251>;tag=2823380259'
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000080)
- Got RTP packet from 192.168.32.10:11790 (type 13, seq 009678, ts 079840, len 000001)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Got RTP packet from 192.168.32.10:11790 (type 13, seq 009699, ts 083280, len 000001)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- [2015-04-30 11:02:54] NOTICE[21037]: chan_sip.c:16419 check_auth: Correct auth, but based on stale nonce received from '"Brad Bilse" <sip:104@10.52.32.251>;tag=971795806'
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
- Got RTP packet from 192.168.32.10:11790 (type 00, seq 009748, ts 091040, len 000160)
- == Extension Changed 146[BLF] new state Idle for Notify User 133
- == Extension Changed 146[BLF] new state Idle for Notify User 178
- == Extension Changed 146[BLF] new state Idle for Notify User 169
- == Spawn extension (dial-extension, 146, 1) exited non-zero on 'SIP/265-000024dc'
- Scheduling destruction of SIP dialog '1390599296@192.168.32.10' in 32000 ms (Method: ACK)
- set_destination: Parsing <sip:265@192.168.32.10:5062> for address/port to send to
- set_destination: set destination to 192.168.32.10:5062
- Reliably Transmitting (no NAT) to 192.168.32.10:5062:
- BYE sip:265@192.168.32.10:5062 SIP/2.0
- Via: SIP/2.0/UDP 10.52.32.251:5060;branch=z9hG4bK639fc521
- Max-Forwards: 70
- From: <sip:146@10.52.32.251>;tag=as547b304c
- To: "openvpn" <sip:265@10.52.32.251>;tag=212525766
- Call-ID: 1390599296@192.168.32.10
- CSeq: 102 BYE
- User-Agent: Asterisk PBX 11.12.0
- Proxy-Authorization: Digest username="265", realm="asterisk", algorithm=MD5, uri="sip:10.52.32.251", nonce="06d47abc", response="f26c562bf9d44be78a81d47d0a2ec4b5"
- X-Asterisk-HangupCause: Normal Clearing
- X-Asterisk-HangupCauseCode: 16
- Content-Length: 0
- ---
- Retransmitting #1 (no NAT) to 192.168.32.10:5062:
- BYE sip:265@192.168.32.10:5062 SIP/2.0
- Via: SIP/2.0/UDP 10.52.32.251:5060;branch=z9hG4bK639fc521
- Max-Forwards: 70
- From: <sip:146@10.52.32.251>;tag=as547b304c
- To: "openvpn" <sip:265@10.52.32.251>;tag=212525766
- Call-ID: 1390599296@192.168.32.10
- CSeq: 102 BYE
- User-Agent: Asterisk PBX 11.12.0
- Proxy-Authorization: Digest username="265", realm="asterisk", algorithm=MD5, uri="sip:10.52.32.251", nonce="06d47abc", response="f26c562bf9d44be78a81d47d0a2ec4b5"
- X-Asterisk-HangupCause: Normal Clearing
- X-Asterisk-HangupCauseCode: 16
- Content-Length: 0
- ---
- [2015-04-30 11:02:56] NOTICE[21037]: chan_sip.c:16419 check_auth: Correct auth, but based on stale nonce received from '"Brian Borkovec" <sip:202@10.52.32.251>;tag=933433589'
- [2015-04-30 11:02:56] NOTICE[21037]: chan_sip.c:16419 check_auth: Correct auth, but based on stale nonce received from '"Bill Landucci" <sip:160@10.52.32.251>;tag=573194324'
- Retransmitting #2 (no NAT) to 192.168.32.10:5062:
- BYE sip:265@192.168.32.10:5062 SIP/2.0
- Via: SIP/2.0/UDP 10.52.32.251:5060;branch=z9hG4bK639fc521
- Max-Forwards: 70
- From: <sip:146@10.52.32.251>;tag=as547b304c
- To: "openvpn" <sip:265@10.52.32.251>;tag=212525766
- Call-ID: 1390599296@192.168.32.10
- CSeq: 102 BYE
- User-Agent: Asterisk PBX 11.12.0
- Proxy-Authorization: Digest username="265", realm="asterisk", algorithm=MD5, uri="sip:10.52.32.251", nonce="06d47abc", response="f26c562bf9d44be78a81d47d0a2ec4b5"
- X-Asterisk-HangupCause: Normal Clearing
- X-Asterisk-HangupCauseCode: 16
- Content-Length: 0
- ---
- <--- SIP read from UDP:192.168.32.10:5062 --->
- SIP/2.0 200 OK
- Via: SIP/2.0/UDP 10.52.32.251:5060;branch=z9hG4bK639fc521
- From: <sip:146@10.52.32.251>;tag=as547b304c
- To: "openvpn" <sip:265@10.52.32.251>;tag=212525766
- Call-ID: 1390599296@192.168.32.10
- CSeq: 102 BYE
- User-Agent: Yealink SIP-T32G 32.70.0.131
- Content-Length: 0
- <------------->
- --- (8 headers 0 lines) ---
- SIP Response message for INCOMING dialog BYE arrived
- Really destroying SIP dialog '1390599296@192.168.32.10' Method: ACK
- [2015-04-30 11:02:57] NOTICE[21037]: chan_sip.c:16419 check_auth: Correct auth, but based on stale nonce received from '"Jeff Porter" <sip:111@10.52.32.251>;tag=463566012'
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement