Advertisement
Guest User

Untitled

a guest
Oct 1st, 2013
85
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 10.27 KB | None | 0 0
  1. <--- SIP read from TLS:189.152.96.184:29350 --->
  2. INVITE sip:123@45.221.32.147;user=phone SIP/2.0
  3. Via: SIP/2.0/TLS 192.168.5.44:4650;branch=z9hG4bK-zdctfocym5ea;rport
  4. From: "Secure 4" <sip:blink4@45.221.32.147>;tag=vaxzlzcdtm
  5. To: <sip:123@45.221.32.147;user=phone>
  6. Call-ID: c2624b52e309-3ps43luzq5r0
  7. CSeq: 2 INVITE
  8. Max-Forwards: 70
  9. Contact: <sip:blink4@192.168.5.44:4650;transport=tls>;reg-id=1
  10. X-Serialnumber: 00041348E1EF
  11. P-Key-Flags: resolution="31x13", keys="4"
  12. User-Agent: snom821/8.7.3.19
  13. Accept: application/sdp
  14. Allow: INVITE, ACK, CANCEL, BYE, REFER, OPTIONS, NOTIFY, SUBSCRIBE, PRACK, MESSAGE, INFO, UPDATE
  15. Allow-Events: talk, hold, refer, call-info
  16. Supported: timer, 100rel, replaces, from-change
  17. Session-Expires: 3600;refresher=uas
  18. Min-SE: 90
  19. Authorization: Digest username="blink4",realm="asterisk",nonce="6959dc3c",uri="sip:123@45.221.32.147;user=phone",response="93204ee2973a6e53c5bcddf3d2e24a8e",algorithm=MD5
  20. Content-Type: application/sdp
  21. Content-Length: 465
  22.  
  23. v=0
  24. o=root 1611785460 1611785460 IN IP4 192.168.5.44
  25. s=call
  26. c=IN IP4 192.168.5.44
  27. t=0 0
  28. m=audio 56050 RTP/SAVP 9 0 8 99 108 18 101
  29. a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:GHr4L+O1RJpG7gl8LHyU4k75ESVEWe2ux4rcjtIC
  30. a=rtpmap:9 G722/8000
  31. a=rtpmap:0 PCMU/8000
  32. a=rtpmap:8 PCMA/8000
  33. a=rtpmap:99 G726-32/8000
  34. a=rtpmap:108 AAL2-G726-32/8000
  35. a=rtpmap:18 G729/8000
  36. a=fmtp:18 annexb=no
  37. a=rtpmap:101 telephone-event/8000
  38. a=fmtp:101 0-15
  39. a=ptime:20
  40. a=sendrecv
  41. <------------->
  42. --- (20 headers 18 lines) ---
  43. Sending to 189.152.96.184:29350 (NAT)
  44. Using INVITE request as basis request - c2624b52e309-3ps43luzq5r0
  45. Found peer 'blink4' for 'blink4' from 189.152.96.184:29350
  46. == Using SIP RTP CoS mark 5
  47. Found RTP audio format 9
  48. Found RTP audio format 0
  49. Found RTP audio format 8
  50. Found RTP audio format 99
  51. Found RTP audio format 108
  52. Found RTP audio format 18
  53. Found RTP audio format 101
  54. Found audio description format G722 for ID 9
  55. Found audio description format PCMU for ID 0
  56. Found audio description format PCMA for ID 8
  57. Found audio description format G726-32 for ID 99
  58. Found audio description format AAL2-G726-32 for ID 108
  59. Found audio description format G729 for ID 18
  60. Found audio description format telephone-event for ID 101
  61. Capabilities: us - (gsm|ulaw|alaw), peer - audio=(ulaw|alaw|g726|g729|g726aal2|g722)/video=(nothing)/text=(nothing), combined - (ulaw|alaw)
  62. Non-codec capabilities (dtmf): us - 0x1 (telephone-event|), peer - 0x1 (telephone-event|), combined - 0x1 (telephone-event|)
  63. Peer audio RTP is at port 192.168.5.44:56050
  64. Looking for 123 in tlscon (domain 45.221.32.147)
  65. list_route: hop: <sip:blink4@192.168.5.44:4650;transport=tls>
  66.  
  67. <--- Transmitting (NAT) to 189.152.96.184:29350 --->
  68. SIP/2.0 100 Trying
  69. Via: SIP/2.0/TLS 192.168.5.44:4650;branch=z9hG4bK-zdctfocym5ea;received=189.152.96.184;rport=29350
  70. From: "Secure 4" <sip:blink4@45.221.32.147>;tag=vaxzlzcdtm
  71. To: <sip:123@45.221.32.147;user=phone>
  72. Call-ID: c2624b52e309-3ps43luzq5r0
  73. CSeq: 2 INVITE
  74. Server: Asterisk PBX 11.4.0
  75. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH
  76. Supported: replaces, timer
  77. Session-Expires: 1800;refresher=uas
  78. Contact: <sip:123@45.221.32.147:5061;transport=TLS>
  79. Content-Length: 0
  80.  
  81.  
  82. <------------>
  83. -- Executing [123@tlscon:1] Answer("SIP/blink4-0000001c", "") in new stack
  84. Audio is at 19494
  85. Adding codec 100004 (alaw) to SDP
  86. Adding codec 100003 (ulaw) to SDP
  87. Adding non-codec 0x1 (telephone-event) to SDP
  88.  
  89. <--- Reliably Transmitting (NAT) to 189.152.96.184:29350 --->
  90. SIP/2.0 200 OK
  91. Via: SIP/2.0/TLS 192.168.5.44:4650;branch=z9hG4bK-zdctfocym5ea;received=189.152.96.184;rport=29350
  92. From: "Secure 4" <sip:blink4@45.221.32.147>;tag=vaxzlzcdtm
  93. To: <sip:123@45.221.32.147;user=phone>;tag=as74e644cb
  94. Call-ID: c2624b52e309-3ps43luzq5r0
  95. CSeq: 2 INVITE
  96. Server: Asterisk PBX 11.4.0
  97. Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH
  98. Supported: replaces, timer
  99. Session-Expires: 1800;refresher=uas
  100. Contact: <sip:123@45.221.32.147:5061;transport=TLS>
  101. Content-Type: application/sdp
  102. Require: timer
  103. Content-Length: 346
  104.  
  105. v=0
  106. o=root 1324107578 1324107578 IN IP4 45.221.32.147
  107. s=Asterisk PBX 11.4.0
  108. c=IN IP4 45.221.32.147
  109. t=0 0
  110. m=audio 19494 RTP/SAVP 8 0 101
  111. a=rtpmap:8 PCMA/8000
  112. a=rtpmap:0 PCMU/8000
  113. a=rtpmap:101 telephone-event/8000
  114. a=fmtp:101 0-16
  115. a=ptime:20
  116. a=sendrecv
  117. a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:1W7agDfRn/zU5puCbAQzGHwM3UVUj4/OFln8m0TG
  118.  
  119. <------------>
  120.  
  121. <--- SIP read from TLS:189.152.96.184:29350 --->
  122. ACK sip:123@45.221.32.147:5061;transport=TLS SIP/2.0
  123. Via: SIP/2.0/TLS 192.168.5.44:4650;branch=z9hG4bK-zq4ildv4gulv;rport
  124. From: "Secure 4" <sip:blink4@45.221.32.147>;tag=vaxzlzcdtm
  125. To: <sip:123@45.221.32.147;user=phone>;tag=as74e644cb
  126. Call-ID: c2624b52e309-3ps43luzq5r0
  127. CSeq: 2 ACK
  128. Max-Forwards: 70
  129. Contact: <sip:blink4@192.168.5.44:4650;transport=tls>;reg-id=1
  130. Content-Length: 0
  131.  
  132. <------------->
  133. --- (9 headers 0 lines) ---
  134. > 0x7f9e0c030500 -- Probation passed - setting RTP source address to 189.152.96.184:55934
  135. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021082, ts 000000, len 000160)
  136. -- Executing [123@tlscon:2] Wait("SIP/blink4-0000001c", ".5") in new stack
  137. > 0x7f9e0c030500 -- Probation passed - setting RTP source address to 189.152.96.184:55934
  138. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021083, ts 000160, len 000160)
  139. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021084, ts 000320, len 000160)
  140. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021085, ts 000480, len 000160)
  141. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021086, ts 000640, len 000160)
  142. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021087, ts 000800, len 000160)
  143. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021088, ts 000960, len 000160)
  144. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021089, ts 001120, len 000160)
  145. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021090, ts 001280, len 000160)
  146. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021091, ts 001440, len 000160)
  147. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021092, ts 001600, len 000160)
  148. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021093, ts 001760, len 000160)
  149. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021094, ts 001920, len 000160)
  150. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021095, ts 002080, len 000160)
  151. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021096, ts 002240, len 000160)
  152. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021097, ts 002400, len 000160)
  153. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021098, ts 002560, len 000160)
  154. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021099, ts 002720, len 000160)
  155. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021100, ts 002880, len 000160)
  156. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021101, ts 003040, len 000160)
  157. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021102, ts 003200, len 000160)
  158. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021103, ts 003360, len 000160)
  159. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021104, ts 003520, len 000160)
  160. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021105, ts 003680, len 000160)
  161. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021106, ts 003840, len 000160)
  162. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021107, ts 004000, len 000160)
  163. -- Executing [123@tlscon:3] Playback("SIP/blink4-0000001c", "tt-monkeys") in new stack
  164. Sent RTP packet to 189.152.96.184:55934 (type 08, seq 036739, ts 000160, len 000170)
  165. -- <SIP/blink4-0000001c> Playing 'tt-monkeys.gsm' (language 'en')
  166. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021108, ts 004160, len 000160)
  167. Sent RTP packet to 189.152.96.184:55934 (type 08, seq 036740, ts 000320, len 000170)
  168. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021109, ts 004320, len 000160)
  169. Sent RTP packet to 189.152.96.184:55934 (type 08, seq 036741, ts 000480, len 000170)
  170. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021110, ts 004480, len 000160)
  171. Sent RTP packet to 189.152.96.184:55934 (type 08, seq 036742, ts 000640, len 000170)
  172. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021111, ts 004640, len 000160)
  173. Sent RTP packet to 189.152.96.184:55934 (type 08, seq 036743, ts 000800, len 000170)
  174. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021112, ts 004800, len 000160)
  175. Sent RTP packet to 189.152.96.184:55934 (type 08, seq 036744, ts 000960, len 000170)
  176. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021113, ts 004960, len 000160)
  177. Sent RTP packet to 189.152.96.184:55934 (type 08, seq 036745, ts 001120, len 000170)
  178. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021114, ts 005120, len 000160)
  179. Sent RTP packet to 189.152.96.184:55934 (type 08, seq 036746, ts 001280, len 000170)
  180. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021115, ts 005280, len 000160)
  181. Sent RTP packet to 189.152.96.184:55934 (type 08, seq 036747, ts 001440, len 000170)
  182. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021116, ts 005440, len 000160)
  183. Sent RTP packet to 189.152.96.184:55934 (type 08, seq 036748, ts 001600, len 000170)
  184. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021117, ts 005600, len 000160)
  185. Sent RTP packet to 189.152.96.184:55934 (type 08, seq 036749, ts 001760, len 000170)
  186. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021118, ts 005760, len 000160)
  187. Sent RTP packet to 189.152.96.184:55934 (type 08, seq 036750, ts 001920, len 000170)
  188. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021119, ts 005920, len 000160)
  189. Sent RTP packet to 189.152.96.184:55934 (type 08, seq 036751, ts 002080, len 000170)
  190. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021120, ts 006080, len 000160)
  191. Sent RTP packet to 189.152.96.184:55934 (type 08, seq 036752, ts 002240, len 000170)
  192. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021121, ts 006240, len 000160)
  193. Sent RTP packet to 189.152.96.184:55934 (type 08, seq 036753, ts 002400, len 000170)
  194. Got RTP packet from 189.152.96.184:55934 (type 08, seq 021122, ts 006400, len 000160)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement