Advertisement
amartin

ringing delay and no connection even after pickup

Apr 30th, 2015
373
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 23.58 KB | None | 0 0
  1. <--- SIP read from UDP:192.168.32.10:5062 --->
  2. INVITE sip:146@10.52.32.251 SIP/2.0
  3. Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK2068841883
  4. From: "openvpn" <sip:265@10.52.32.251>;tag=212525766
  5. To: <sip:146@10.52.32.251>
  6. Call-ID: 1390599296@192.168.32.10
  7. CSeq: 1 INVITE
  8. Contact: <sip:265@192.168.32.10:5062>
  9. Content-Type: application/sdp
  10. Allow: INVITE, INFO, PRACK, ACK, BYE, CANCEL, OPTIONS, NOTIFY, REGISTER, SUBSCRIBE, REFER, PUBLISH, UPDATE, MESSAGE
  11. Max-Forwards: 70
  12. User-Agent: Yealink SIP-T32G 32.70.0.131
  13. Supported: replaces
  14. Allow-Events: talk,hold,conference,refer,check-sync
  15. Content-Length: 309
  16.  
  17. v=0
  18. o=- 20005 20005 IN IP4 192.168.32.10
  19. s=SDP data
  20. c=IN IP4 192.168.32.10
  21. t=0 0
  22. m=audio 11790 RTP/AVP 0 8 18 9 101
  23. a=rtpmap:0 PCMU/8000
  24. a=rtpmap:8 PCMA/8000
  25. a=rtpmap:18 G729/8000
  26. a=fmtp:18 annexb=yes
  27. a=rtpmap:9 G722/8000
  28. a=fmtp:101 0-15
  29. a=rtpmap:101 telephone-event/8000
  30. a=ptime:20
  31. a=sendrecv
  32. <------------->
  33. --- (14 headers 15 lines) ---
  34. Sending to 192.168.32.10:5062 (no NAT)
  35. Sending to 192.168.32.10:5062 (no NAT)
  36. Using INVITE request as basis request - 1390599296@192.168.32.10
  37. Found peer '265' for '265' from 192.168.32.10:5062
  38.  
  39. <--- Reliably Transmitting (no NAT) to 192.168.32.10:5062 --->
  40. SIP/2.0 401 Unauthorized
  41. Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK2068841883;received=192.168.32.10
  42. From: "openvpn" <sip:265@10.52.32.251>;tag=212525766
  43. To: <sip:146@10.52.32.251>;tag=as73e883ac
  44. Call-ID: 1390599296@192.168.32.10
  45. CSeq: 1 INVITE
  46. Server: Asterisk PBX 11.12.0
  47. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
  48. Supported: replaces, timer
  49. WWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="06d47abc"
  50. Content-Length: 0
  51.  
  52.  
  53. <------------>
  54. Scheduling destruction of SIP dialog '1390599296@192.168.32.10' in 32000 ms (Method: INVITE)
  55.  
  56. <--- SIP read from UDP:192.168.32.10:5062 --->
  57. ACK sip:146@10.52.32.251 SIP/2.0
  58. Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK2068841883
  59. From: "openvpn" <sip:265@10.52.32.251>;tag=212525766
  60. To: <sip:146@10.52.32.251>;tag=as73e883ac
  61. Call-ID: 1390599296@192.168.32.10
  62. CSeq: 1 ACK
  63. Content-Length: 0
  64.  
  65. <------------->
  66. --- (7 headers 0 lines) ---
  67.  
  68. <--- SIP read from UDP:192.168.32.10:5062 --->
  69. INVITE sip:146@10.52.32.251 SIP/2.0
  70. Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK887935696
  71. From: "openvpn" <sip:265@10.52.32.251>;tag=212525766
  72. To: <sip:146@10.52.32.251>
  73. Call-ID: 1390599296@192.168.32.10
  74. CSeq: 2 INVITE
  75. Contact: <sip:265@192.168.32.10:5062>
  76. Authorization: Digest username="265", realm="asterisk", nonce="06d47abc", uri="sip:146@10.52.32.251", response="72e85740dfcfd6b537f1fb63e08d8b11", algorithm=MD5
  77. Content-Type: application/sdp
  78. Allow: INVITE, INFO, PRACK, ACK, BYE, CANCEL, OPTIONS, NOTIFY, REGISTER, SUBSCRIBE, REFER, PUBLISH, UPDATE, MESSAGE
  79. Max-Forwards: 70
  80. User-Agent: Yealink SIP-T32G 32.70.0.131
  81. Supported: replaces
  82. Allow-Events: talk,hold,conference,refer,check-sync
  83. Content-Length: 309
  84.  
  85. v=0
  86. o=- 20005 20005 IN IP4 192.168.32.10
  87. s=SDP data
  88. c=IN IP4 192.168.32.10
  89. t=0 0
  90. m=audio 11790 RTP/AVP 0 8 18 9 101
  91. a=rtpmap:0 PCMU/8000
  92. a=rtpmap:8 PCMA/8000
  93. a=rtpmap:18 G729/8000
  94. a=fmtp:18 annexb=yes
  95. a=rtpmap:9 G722/8000
  96. a=fmtp:101 0-15
  97. a=rtpmap:101 telephone-event/8000
  98. a=ptime:20
  99. a=sendrecv
  100. <------------->
  101. --- (15 headers 15 lines) ---
  102. Sending to 192.168.32.10:5062 (no NAT)
  103. Using INVITE request as basis request - 1390599296@192.168.32.10
  104. Found peer '265' for '265' from 192.168.32.10:5062
  105. == Using SIP RTP CoS mark 5
  106. Found RTP audio format 0
  107. Found RTP audio format 8
  108. Found RTP audio format 18
  109. Found RTP audio format 9
  110. Found RTP audio format 101
  111. Found audio description format PCMU for ID 0
  112. Found audio description format PCMA for ID 8
  113. Found audio description format G729 for ID 18
  114. Found audio description format G722 for ID 9
  115. Found audio description format telephone-event for ID 101
  116. Capabilities: us - (ulaw), peer - audio=(ulaw|alaw|g729|g722)/video=(nothing)/text=(nothing), combined - (ulaw)
  117. Non-codec capabilities (dtmf): us - 0x1 (telephone-event|), peer - 0x1 (telephone-event|), combined - 0x1 (telephone-event|)
  118. Peer audio RTP is at port 192.168.32.10:11790
  119. Looking for 146 in xes-internal (domain 10.52.32.251)
  120. list_route: hop: <sip:265@192.168.32.10:5062>
  121.  
  122. <--- Transmitting (no NAT) to 192.168.32.10:5062 --->
  123. SIP/2.0 100 Trying
  124. Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK887935696;received=192.168.32.10
  125. From: "openvpn" <sip:265@10.52.32.251>;tag=212525766
  126. To: <sip:146@10.52.32.251>
  127. Call-ID: 1390599296@192.168.32.10
  128. CSeq: 2 INVITE
  129. Server: Asterisk PBX 11.12.0
  130. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
  131. Supported: replaces, timer
  132. Contact: <sip:146@10.52.32.251:5060>
  133. Content-Length: 0
  134.  
  135.  
  136. <------------>
  137. -- Executing [146@xes-internal:1] Goto("SIP/265-000024dc", "dial-extension,146,1") in new stack
  138. -- Goto (dial-extension,146,1)
  139. -- Executing [146@dial-extension:1] Dial("SIP/265-000024dc", "SIP/146,12") in new stack
  140. == Using SIP RTP CoS mark 5
  141. -- Called SIP/146
  142. == Extension Changed 146[BLF] new state Ringing for Notify User 133
  143. == Extension Changed 146[BLF] new state Ringing for Notify User 178
  144. == Extension Changed 146[BLF] new state Ringing for Notify User 169
  145. -- SIP/146-000024dd is ringing
  146.  
  147. <--- Transmitting (no NAT) to 192.168.32.10:5062 --->
  148. SIP/2.0 180 Ringing
  149. Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK887935696;received=192.168.32.10
  150. From: "openvpn" <sip:265@10.52.32.251>;tag=212525766
  151. To: <sip:146@10.52.32.251>;tag=as547b304c
  152. Call-ID: 1390599296@192.168.32.10
  153. CSeq: 2 INVITE
  154. Server: Asterisk PBX 11.12.0
  155. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
  156. Supported: replaces, timer
  157. Contact: <sip:146@10.52.32.251:5060>
  158. Content-Length: 0
  159.  
  160.  
  161. <------------>
  162. == Extension Changed 146[BLF] new state Ringing for Notify User 133 (queued)
  163. == Extension Changed 146[BLF] new state Ringing for Notify User 178 (queued)
  164. == Extension Changed 146[BLF] new state Ringing for Notify User 169 (queued)
  165. [2015-04-30 11:02:48] NOTICE[21037]: chan_sip.c:16419 check_auth: Correct auth, but based on stale nonce received from '"Zach Krohn" <sip:110@10.52.32.251>;tag=3697113213'
  166. [2015-04-30 11:02:48] NOTICE[21037]: chan_sip.c:16419 check_auth: Correct auth, but based on stale nonce received from '"Ben Davenport" <sip:209@10.52.32.251>;tag=131227993'
  167. [2015-04-30 11:02:48] NOTICE[21037]: chan_sip.c:16419 check_auth: Correct auth, but based on stale nonce received from '"Steve Johnson" <sip:156@10.52.32.251>;tag=884199709'
  168. [2015-04-30 11:02:49] NOTICE[21037]: chan_sip.c:16419 check_auth: Correct auth, but based on stale nonce received from '"Matt Starzewski" <sip:106@10.52.32.251>;tag=219689552'
  169. [2015-04-30 11:02:50] NOTICE[21037]: chan_sip.c:16419 check_auth: Correct auth, but based on stale nonce received from '"Jay Kobor" <sip:233@10.52.32.251>;tag=2045714715'
  170. -- SIP/146-000024dd answered SIP/265-000024dc
  171. Audio is at 13634
  172. == Extension Changed 146[BLF] new state InUse for Notify User 133
  173. Adding codec 100003 (ulaw) to SDP
  174. Adding non-codec 0x1 (telephone-event) to SDP
  175.  
  176. <--- Reliably Transmitting (no NAT) to 192.168.32.10:5062 --->
  177. SIP/2.0 200 OK
  178. Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK887935696;received=192.168.32.10
  179. From: "openvpn" <sip:265@10.52.32.251>;tag=212525766
  180. To: <sip:146@10.52.32.251>;tag=as547b304c
  181. Call-ID: 1390599296@192.168.32.10
  182. CSeq: 2 INVITE
  183. Server: Asterisk PBX 11.12.0
  184. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE
  185. Supported: replaces, timer
  186. Contact: <sip:146@10.52.32.251:5060>
  187. Content-Type: application/sdp
  188. Content-Length: 236
  189.  
  190. v=0
  191. o=root 1909632502 1909632502 IN IP4 10.52.32.251
  192. s=Asterisk PBX 11.12.0
  193. c=IN IP4 10.52.32.251
  194. t=0 0
  195. m=audio 13634 RTP/AVP 0 101
  196. a=rtpmap:0 PCMU/8000
  197. a=rtpmap:101 telephone-event/8000
  198. a=fmtp:101 0-16
  199. a=ptime:20
  200. a=sendrecv
  201.  
  202. <------------>
  203. == Extension Changed 146[BLF] new state InUse for Notify User 178
  204. == Extension Changed 146[BLF] new state InUse for Notify User 169 (queued)
  205. -- Locally bridging SIP/265-000024dc and SIP/146-000024dd
  206. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  207. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  208. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  209. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  210. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  211. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  212. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  213. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  214. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  215. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  216. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  217. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  218. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  219. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  220. Got RTP packet from 192.168.32.10:11790 (type 13, seq 009572, ts 056080, len 000001)
  221. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  222. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  223. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  224. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  225. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  226. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  227.  
  228. <--- SIP read from UDP:192.168.32.10:5062 --->
  229. ACK sip:146@10.52.32.251:5060 SIP/2.0
  230. Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK1295065116
  231. From: "openvpn" <sip:265@10.52.32.251>;tag=212525766
  232. To: <sip:146@10.52.32.251>;tag=as547b304c
  233. Call-ID: 1390599296@192.168.32.10
  234. CSeq: 2 ACK
  235. Contact: <sip:265@192.168.32.10:5062>
  236. Max-Forwards: 70
  237. User-Agent: Yealink SIP-T32G 32.70.0.131
  238. Content-Length: 0
  239.  
  240. <------------->
  241. --- (10 headers 0 lines) ---
  242.  
  243. <--- SIP read from UDP:192.168.32.10:5062 --->
  244. ACK sip:146@10.52.32.251:5060 SIP/2.0
  245. Via: SIP/2.0/UDP 192.168.32.10:5062;branch=z9hG4bK1295065116
  246. From: "openvpn" <sip:265@10.52.32.251>;tag=212525766
  247. To: <sip:146@10.52.32.251>;tag=as547b304c
  248. Call-ID: 1390599296@192.168.32.10
  249. CSeq: 2 ACK
  250. Contact: <sip:265@192.168.32.10:5062>
  251. Max-Forwards: 70
  252. User-Agent: Yealink SIP-T32G 32.70.0.131
  253. Content-Length: 0
  254.  
  255. <------------->
  256. --- (10 headers 0 lines) ---
  257. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  258. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  259. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  260. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  261. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  262. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  263. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  264. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  265. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  266. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  267. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  268. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  269. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  270. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  271. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  272. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  273. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  274. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  275. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  276. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  277. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  278. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  279. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  280. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  281. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  282. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  283. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  284. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  285. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  286. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  287. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  288. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  289. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  290. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  291. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  292. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  293. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  294. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  295. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  296. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  297. Got RTP packet from 192.168.32.10:11790 (type 13, seq 009610, ts 064480, len 000001)
  298. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  299. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  300. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  301. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  302. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  303. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  304. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  305. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  306. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  307. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  308. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  309. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  310. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  311. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  312. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  313. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  314. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  315. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  316. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  317. [2015-04-30 11:02:52] NOTICE[21037]: chan_sip.c:16419 check_auth: Correct auth, but based on stale nonce received from '"Nickolas Moser" <sip:207@10.52.32.251>;tag=129882940'
  318. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  319. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  320. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  321. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  322. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  323. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  324. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  325. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  326. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  327. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  328. Got RTP packet from 192.168.32.10:11790 (type 13, seq 009640, ts 071440, len 000001)
  329. [2015-04-30 11:02:53] NOTICE[21037]: chan_sip.c:16419 check_auth: Correct auth, but based on stale nonce received from '"Scott Ludwig" <sip:140@10.52.32.251>;tag=2823380259'
  330. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  331. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  332. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  333. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  334. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  335. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  336. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  337. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  338. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  339. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  340. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  341. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  342. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  343. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  344. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  345. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  346. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  347. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  348. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  349. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  350. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  351. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  352. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  353. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  354. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  355. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  356. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  357. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  358. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000080)
  359. Got RTP packet from 192.168.32.10:11790 (type 13, seq 009678, ts 079840, len 000001)
  360. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  361. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  362. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  363. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  364. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  365. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  366. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  367. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  368. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  369. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  370. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  371. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  372. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  373. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  374. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  375. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  376. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  377. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  378. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  379. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  380. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  381. Got RTP packet from 192.168.32.10:11790 (type 13, seq 009699, ts 083280, len 000001)
  382. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  383. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  384. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  385. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  386. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  387. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  388. [2015-04-30 11:02:54] NOTICE[21037]: chan_sip.c:16419 check_auth: Correct auth, but based on stale nonce received from '"Brad Bilse" <sip:104@10.52.32.251>;tag=971795806'
  389. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  390. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  391. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  392. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  393. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  394. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  395. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  396. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  397. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  398. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  399. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  400. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  401. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  402. Sent RTP P2P packet to 192.168.32.10:11790 (type 00, len 000160)
  403. Got RTP packet from 192.168.32.10:11790 (type 00, seq 009748, ts 091040, len 000160)
  404. == Extension Changed 146[BLF] new state Idle for Notify User 133
  405. == Extension Changed 146[BLF] new state Idle for Notify User 178
  406. == Extension Changed 146[BLF] new state Idle for Notify User 169
  407. == Spawn extension (dial-extension, 146, 1) exited non-zero on 'SIP/265-000024dc'
  408. Scheduling destruction of SIP dialog '1390599296@192.168.32.10' in 32000 ms (Method: ACK)
  409. set_destination: Parsing <sip:265@192.168.32.10:5062> for address/port to send to
  410. set_destination: set destination to 192.168.32.10:5062
  411. Reliably Transmitting (no NAT) to 192.168.32.10:5062:
  412. BYE sip:265@192.168.32.10:5062 SIP/2.0
  413. Via: SIP/2.0/UDP 10.52.32.251:5060;branch=z9hG4bK639fc521
  414. Max-Forwards: 70
  415. From: <sip:146@10.52.32.251>;tag=as547b304c
  416. To: "openvpn" <sip:265@10.52.32.251>;tag=212525766
  417. Call-ID: 1390599296@192.168.32.10
  418. CSeq: 102 BYE
  419. User-Agent: Asterisk PBX 11.12.0
  420. Proxy-Authorization: Digest username="265", realm="asterisk", algorithm=MD5, uri="sip:10.52.32.251", nonce="06d47abc", response="f26c562bf9d44be78a81d47d0a2ec4b5"
  421. X-Asterisk-HangupCause: Normal Clearing
  422. X-Asterisk-HangupCauseCode: 16
  423. Content-Length: 0
  424.  
  425.  
  426. ---
  427. Retransmitting #1 (no NAT) to 192.168.32.10:5062:
  428. BYE sip:265@192.168.32.10:5062 SIP/2.0
  429. Via: SIP/2.0/UDP 10.52.32.251:5060;branch=z9hG4bK639fc521
  430. Max-Forwards: 70
  431. From: <sip:146@10.52.32.251>;tag=as547b304c
  432. To: "openvpn" <sip:265@10.52.32.251>;tag=212525766
  433. Call-ID: 1390599296@192.168.32.10
  434. CSeq: 102 BYE
  435. User-Agent: Asterisk PBX 11.12.0
  436. Proxy-Authorization: Digest username="265", realm="asterisk", algorithm=MD5, uri="sip:10.52.32.251", nonce="06d47abc", response="f26c562bf9d44be78a81d47d0a2ec4b5"
  437. X-Asterisk-HangupCause: Normal Clearing
  438. X-Asterisk-HangupCauseCode: 16
  439. Content-Length: 0
  440.  
  441.  
  442. ---
  443. [2015-04-30 11:02:56] NOTICE[21037]: chan_sip.c:16419 check_auth: Correct auth, but based on stale nonce received from '"Brian Borkovec" <sip:202@10.52.32.251>;tag=933433589'
  444. [2015-04-30 11:02:56] NOTICE[21037]: chan_sip.c:16419 check_auth: Correct auth, but based on stale nonce received from '"Bill Landucci" <sip:160@10.52.32.251>;tag=573194324'
  445. Retransmitting #2 (no NAT) to 192.168.32.10:5062:
  446. BYE sip:265@192.168.32.10:5062 SIP/2.0
  447. Via: SIP/2.0/UDP 10.52.32.251:5060;branch=z9hG4bK639fc521
  448. Max-Forwards: 70
  449. From: <sip:146@10.52.32.251>;tag=as547b304c
  450. To: "openvpn" <sip:265@10.52.32.251>;tag=212525766
  451. Call-ID: 1390599296@192.168.32.10
  452. CSeq: 102 BYE
  453. User-Agent: Asterisk PBX 11.12.0
  454. Proxy-Authorization: Digest username="265", realm="asterisk", algorithm=MD5, uri="sip:10.52.32.251", nonce="06d47abc", response="f26c562bf9d44be78a81d47d0a2ec4b5"
  455. X-Asterisk-HangupCause: Normal Clearing
  456. X-Asterisk-HangupCauseCode: 16
  457. Content-Length: 0
  458.  
  459.  
  460. ---
  461.  
  462. <--- SIP read from UDP:192.168.32.10:5062 --->
  463. SIP/2.0 200 OK
  464. Via: SIP/2.0/UDP 10.52.32.251:5060;branch=z9hG4bK639fc521
  465. From: <sip:146@10.52.32.251>;tag=as547b304c
  466. To: "openvpn" <sip:265@10.52.32.251>;tag=212525766
  467. Call-ID: 1390599296@192.168.32.10
  468. CSeq: 102 BYE
  469. User-Agent: Yealink SIP-T32G 32.70.0.131
  470. Content-Length: 0
  471.  
  472. <------------->
  473. --- (8 headers 0 lines) ---
  474. SIP Response message for INCOMING dialog BYE arrived
  475. Really destroying SIP dialog '1390599296@192.168.32.10' Method: ACK
  476. [2015-04-30 11:02:57] NOTICE[21037]: chan_sip.c:16419 check_auth: Correct auth, but based on stale nonce received from '"Jeff Porter" <sip:111@10.52.32.251>;tag=463566012'
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement