Advertisement
Guest User

Untitled

a guest
Feb 6th, 2017
179
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 15.43 KB | None | 0 0
  1. *CLI> <--- Received SIP request (1146 bytes) from TCP:192.168.1.72:54609 --->
  2. INVITE sip:100@192.168.1.73;transport=TCP SIP/2.0
  3. Via: SIP/2.0/TCP 192.168.1.72:54567;rport;branch=z9hG4bKPjAlyqFTTsio1ZMfP4iI7EyCVAFscPwsfA;alias
  4. Max-Forwards: 70
  5. From: sip:6001@192.168.1.73;tag=UY7HJkEkGYsXpLEiBWC1paIrAzz4HVcS
  6. To: sip:100@192.168.1.73
  7. Contact: <sip:6001@192.168.1.72:54609;transport=TCP;ob>
  8. Call-ID: XcN-n196VNPmYKOPYRLw0hJRh9lraiXb
  9. CSeq: 26675 INVITE
  10. Allow: PRACK, INVITE, ACK, BYE, CANCEL, UPDATE, INFO, SUBSCRIBE, NOTIFY, REFER, MESSAGE, OPTIONS
  11. Supported: replaces, 100rel, timer, norefersub
  12. Session-Expires: 1800
  13. Min-SE: 90
  14. User-Agent: PJSUA v2.6 iOS-10.2.1/arm-iPhone7,1/iOS-SDK
  15. Content-Type: application/sdp
  16. Content-Length: 473
  17.  
  18. v=0
  19. o=- 3695379233 3695379233 IN IP4 192.168.1.72
  20. s=pjmedia
  21. b=AS:84
  22. t=0 0
  23. a=X-nat:0
  24. m=audio 4090 RTP/AVP 98 97 99 104 3 0 8 9 96
  25. c=IN IP4 192.168.1.72
  26. b=TIAS:64000
  27. a=rtcp:4091 IN IP4 192.168.1.72
  28. a=sendrecv
  29. a=rtpmap:98 speex/16000
  30. a=rtpmap:97 speex/8000
  31. a=rtpmap:99 speex/32000
  32. a=rtpmap:104 iLBC/8000
  33. a=fmtp:104 mode=30
  34. a=rtpmap:3 GSM/8000
  35. a=rtpmap:0 PCMU/8000
  36. a=rtpmap:8 PCMA/8000
  37. a=rtpmap:9 G722/8000
  38. a=rtpmap:96 telephone-event/8000
  39. a=fmtp:96 0-16
  40.  
  41. [Feb 6 15:13:53] DEBUG[7684]: netsock2.c:172 ast_sockaddr_split_hostport: Splitting '192.168.1.72:54609' into...
  42. [Feb 6 15:13:53] DEBUG[7684]: netsock2.c:226 ast_sockaddr_split_hostport: ...host '192.168.1.72' and port '54609'.
  43. [Feb 6 15:13:53] DEBUG[7684]: netsock2.c:172 ast_sockaddr_split_hostport: Splitting '192.168.1.73:5060' into...
  44. [Feb 6 15:13:53] DEBUG[7684]: netsock2.c:226 ast_sockaddr_split_hostport: ...host '192.168.1.73' and port '5060'.
  45. [Feb 6 15:13:53] DEBUG[7684]: res_pjsip/pjsip_distributor.c:267 find_dialog: Could not find matching transaction for Request msg INVITE/cseq=26675 (rdata0x7fadf0006690)
  46. [Feb 6 15:13:53] DEBUG[7684]: res_pjsip/pjsip_distributor.c:359 ast_sip_get_distributor_serializer: Calculated serializer pjsip/distributor-00000020 to use for Request msg INVITE/cseq=26675 (rdata0x7fadf0006690)
  47. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_endpoint_identifier_ip.c:128 ip_identify: No identify sections to match against
  48. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_endpoint_identifier_user.c:133 username_identify: Attempting identify by From username '6001' domain '192.168.1.73'
  49. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_endpoint_identifier_user.c:145 username_identify: Identified by From username '6001' domain '192.168.1.73'
  50. [Feb 6 15:13:53] DEBUG[7968]: netsock2.c:172 ast_sockaddr_split_hostport: Splitting '192.168.1.73' into...
  51. [Feb 6 15:13:53] DEBUG[7968]: netsock2.c:226 ast_sockaddr_split_hostport: ...host '192.168.1.73' and port ''.
  52. [Feb 6 15:13:53] DEBUG[7968]: netsock2.c:172 ast_sockaddr_split_hostport: Splitting '192.168.1.72' into...
  53. [Feb 6 15:13:53] DEBUG[7968]: netsock2.c:226 ast_sockaddr_split_hostport: ...host '192.168.1.72' and port ''.
  54. [Feb 6 15:13:53] DEBUG[7968]: netsock2.c:172 ast_sockaddr_split_hostport: Splitting '192.168.1.73:5060' into...
  55. [Feb 6 15:13:53] DEBUG[7968]: netsock2.c:226 ast_sockaddr_split_hostport: ...host '192.168.1.73' and port '5060'.
  56. [Feb 6 15:13:53] DEBUG[7968]: netsock2.c:172 ast_sockaddr_split_hostport: Splitting '192.168.1.72:54609' into...
  57. [Feb 6 15:13:53] DEBUG[7968]: netsock2.c:226 ast_sockaddr_split_hostport: ...host '192.168.1.72' and port '54609'.
  58. <--- Transmitting SIP response (555 bytes) to TCP:192.168.1.72:54609 --->
  59. SIP/2.0 401 Unauthorized
  60. Via: SIP/2.0/TCP 192.168.1.72:54567;rport=54609;received=192.168.1.72;branch=z9hG4bKPjAlyqFTTsio1ZMfP4iI7EyCVAFscPwsfA;alias
  61. Call-ID: XcN-n196VNPmYKOPYRLw0hJRh9lraiXb
  62. From: <sip:6001@192.168.1.73>;tag=UY7HJkEkGYsXpLEiBWC1paIrAzz4HVcS
  63. To: <sip:100@192.168.1.73>;tag=z9hG4bKPjAlyqFTTsio1ZMfP4iI7EyCVAFscPwsfA
  64. CSeq: 26675 INVITE
  65. WWW-Authenticate: Digest realm="asterisk",nonce="1486390433/e0464c6858dec0ed0d80ef8af2374fd7",opaque="3eecbb0917f8ca62",algorithm=md5,qop="auth"
  66. Server: Asterisk PBX 14.2.1
  67. Content-Length: 0
  68.  
  69.  
  70. <--- Received SIP request (384 bytes) from TCP:192.168.1.72:54609 --->
  71. ACK sip:100@192.168.1.73;transport=TCP SIP/2.0
  72. Via: SIP/2.0/TCP 192.168.1.72:54567;rport;branch=z9hG4bKPjAlyqFTTsio1ZMfP4iI7EyCVAFscPwsfA;alias
  73. Max-Forwards: 70
  74. From: sip:6001@192.168.1.73;tag=UY7HJkEkGYsXpLEiBWC1paIrAzz4HVcS
  75. To: sip:100@192.168.1.73;tag=z9hG4bKPjAlyqFTTsio1ZMfP4iI7EyCVAFscPwsfA
  76. Call-ID: XcN-n196VNPmYKOPYRLw0hJRh9lraiXb
  77. CSeq: 26675 ACK
  78. Content-Length: 0
  79.  
  80.  
  81. [Feb 6 15:13:53] DEBUG[7684]: netsock2.c:172 ast_sockaddr_split_hostport: Splitting '192.168.1.72:54609' into...
  82. [Feb 6 15:13:53] DEBUG[7684]: netsock2.c:226 ast_sockaddr_split_hostport: ...host '192.168.1.72' and port '54609'.
  83. [Feb 6 15:13:53] DEBUG[7684]: netsock2.c:172 ast_sockaddr_split_hostport: Splitting '192.168.1.73:5060' into...
  84. [Feb 6 15:13:53] DEBUG[7684]: netsock2.c:226 ast_sockaddr_split_hostport: ...host '192.168.1.73' and port '5060'.
  85. [Feb 6 15:13:53] DEBUG[7684]: res_pjsip/pjsip_distributor.c:267 find_dialog: Could not find matching transaction for Request msg ACK/cseq=26675 (rdata0x7fadf0006690)
  86. [Feb 6 15:13:53] DEBUG[7684]: res_pjsip/pjsip_distributor.c:359 ast_sip_get_distributor_serializer: Calculated serializer pjsip/distributor-00000020 to use for Request msg ACK/cseq=26675 (rdata0x7fadf0006690)
  87. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_endpoint_identifier_ip.c:128 ip_identify: No identify sections to match against
  88. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_endpoint_identifier_user.c:133 username_identify: Attempting identify by From username '6001' domain '192.168.1.73'
  89. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_endpoint_identifier_user.c:145 username_identify: Identified by From username '6001' domain '192.168.1.73'
  90. <--- Received SIP request (1451 bytes) from TCP:192.168.1.72:54609 --->
  91. INVITE sip:100@192.168.1.73;transport=TCP SIP/2.0
  92. Via: SIP/2.0/TCP 192.168.1.72:54567;rport;branch=z9hG4bKPjFVKm7N4lJp-yl4qAIgkGRt23oS94-EiF;alias
  93. Max-Forwards: 70
  94. From: sip:6001@192.168.1.73;tag=UY7HJkEkGYsXpLEiBWC1paIrAzz4HVcS
  95. To: sip:100@192.168.1.73
  96. Contact: <sip:6001@192.168.1.72:54609;transport=TCP;ob>
  97. Call-ID: XcN-n196VNPmYKOPYRLw0hJRh9lraiXb
  98. CSeq: 26676 INVITE
  99. Allow: PRACK, INVITE, ACK, BYE, CANCEL, UPDATE, INFO, SUBSCRIBE, NOTIFY, REFER, MESSAGE, OPTIONS
  100. Supported: replaces, 100rel, timer, norefersub
  101. Session-Expires: 1800
  102. Min-SE: 90
  103. User-Agent: PJSUA v2.6 iOS-10.2.1/arm-iPhone7,1/iOS-SDK
  104. Authorization: Digest username="6001", realm="asterisk", nonce="1486390433/e0464c6858dec0ed0d80ef8af2374fd7", uri="sip:100@192.168.1.73;transport=TCP", response="a612f0080af078a0ffa2ececd0da212c", algorithm=md5, cnonce="ALCOWGo6J0pediKE04bEXtQMyqYYHnYw", opaque="3eecbb0917f8ca62", qop=auth, nc=00000001
  105. Content-Type: application/sdp
  106. Content-Length: 473
  107.  
  108. v=0
  109. o=- 3695379233 3695379233 IN IP4 192.168.1.72
  110. s=pjmedia
  111. b=AS:84
  112. t=0 0
  113. a=X-nat:0
  114. m=audio 4090 RTP/AVP 98 97 99 104 3 0 8 9 96
  115. c=IN IP4 192.168.1.72
  116. b=TIAS:64000
  117. a=rtcp:4091 IN IP4 192.168.1.72
  118. a=sendrecv
  119. a=rtpmap:98 speex/16000
  120. a=rtpmap:97 speex/8000
  121. a=rtpmap:99 speex/32000
  122. a=rtpmap:104 iLBC/8000
  123. a=fmtp:104 mode=30
  124. a=rtpmap:3 GSM/8000
  125. a=rtpmap:0 PCMU/8000
  126. a=rtpmap:8 PCMA/8000
  127. a=rtpmap:9 G722/8000
  128. a=rtpmap:96 telephone-event/8000
  129. a=fmtp:96 0-16
  130.  
  131. [Feb 6 15:13:53] DEBUG[7684]: netsock2.c:172 ast_sockaddr_split_hostport: Splitting '192.168.1.72:54609' into...
  132. [Feb 6 15:13:53] DEBUG[7684]: netsock2.c:226 ast_sockaddr_split_hostport: ...host '192.168.1.72' and port '54609'.
  133. [Feb 6 15:13:53] DEBUG[7684]: netsock2.c:172 ast_sockaddr_split_hostport: Splitting '192.168.1.73:5060' into...
  134. [Feb 6 15:13:53] DEBUG[7684]: netsock2.c:226 ast_sockaddr_split_hostport: ...host '192.168.1.73' and port '5060'.
  135. [Feb 6 15:13:53] DEBUG[7684]: res_pjsip/pjsip_distributor.c:267 find_dialog: Could not find matching transaction for Request msg INVITE/cseq=26676 (rdata0x7fadf0006690)
  136. [Feb 6 15:13:53] DEBUG[7684]: res_pjsip/pjsip_distributor.c:359 ast_sip_get_distributor_serializer: Calculated serializer pjsip/distributor-00000020 to use for Request msg INVITE/cseq=26676 (rdata0x7fadf0006690)
  137. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_endpoint_identifier_ip.c:128 ip_identify: No identify sections to match against
  138. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_endpoint_identifier_user.c:133 username_identify: Attempting identify by From username '6001' domain '192.168.1.73'
  139. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_endpoint_identifier_user.c:145 username_identify: Identified by From username '6001' domain '192.168.1.73'
  140. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_authenticator_digest.c:257 check_nonce: Calculated nonce 1486390433/e0464c6858dec0ed0d80ef8af2374fd7. Actual nonce is 1486390433/e0464c6858dec0ed0d80ef8af2374fd7
  141. [Feb 6 15:13:53] DEBUG[7968]: netsock2.c:172 ast_sockaddr_split_hostport: Splitting '192.168.1.73' into...
  142. [Feb 6 15:13:53] DEBUG[7968]: netsock2.c:226 ast_sockaddr_split_hostport: ...host '192.168.1.73' and port ''.
  143. [Feb 6 15:13:53] DEBUG[7968]: netsock2.c:172 ast_sockaddr_split_hostport: Splitting '192.168.1.72' into...
  144. [Feb 6 15:13:53] DEBUG[7968]: netsock2.c:226 ast_sockaddr_split_hostport: ...host '192.168.1.72' and port ''.
  145. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip/pjsip_distributor.c:359 ast_sip_get_distributor_serializer: Calculated serializer pjsip/distributor-00000020 to use for Request msg INVITE/cseq=26676 (rdata0x7fadf000dd68)
  146. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:269 handle_incoming_sdp: Negotiating incoming SDP media stream 'audio' using audio SDP handler
  147. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2494 handle_outgoing_response: Method is INVITE, Response is 488 Not Acceptable Here
  148. [Feb 6 15:13:53] DEBUG[7968]: netsock2.c:172 ast_sockaddr_split_hostport: Splitting '192.168.1.73:5060' into...
  149. [Feb 6 15:13:53] DEBUG[7968]: netsock2.c:226 ast_sockaddr_split_hostport: ...host '192.168.1.73' and port '5060'.
  150. [Feb 6 15:13:53] DEBUG[7968]: netsock2.c:172 ast_sockaddr_split_hostport: Splitting '192.168.1.72:54609' into...
  151. [Feb 6 15:13:53] DEBUG[7968]: netsock2.c:226 ast_sockaddr_split_hostport: ...host '192.168.1.72' and port '54609'.
  152. <--- Transmitting SIP response (410 bytes) to TCP:192.168.1.72:54609 --->
  153. SIP/2.0 488 Not Acceptable Here
  154. Via: SIP/2.0/TCP 192.168.1.72:54567;rport=54609;received=192.168.1.72;branch=z9hG4bKPjFVKm7N4lJp-yl4qAIgkGRt23oS94-EiF;alias
  155. Call-ID: XcN-n196VNPmYKOPYRLw0hJRh9lraiXb
  156. From: <sip:6001@192.168.1.73>;tag=UY7HJkEkGYsXpLEiBWC1paIrAzz4HVcS
  157. To: <sip:100@192.168.1.73>;tag=1c8d19b7-6003-4004-ae66-df352f8f84f5
  158. CSeq: 26676 INVITE
  159. Server: Asterisk PBX 14.2.1
  160. Content-Length: 0
  161.  
  162.  
  163. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2384 __print_debug_details: Function session_inv_on_state_changed called on event TSX_STATE
  164. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2398 __print_debug_details: The state change pertains to the endpoint '6001()'
  165. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2403 __print_debug_details: The inv session still has an invite_tsx (0x7fae00004dc8)
  166. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2418 __print_debug_details: There is no transaction involved in this state change
  167. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2420 __print_debug_details: The current inv state is DISCONNCTD
  168. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2618 session_inv_on_state_changed: Source of transaction state change is TX_MSG
  169. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2384 __print_debug_details: Function session_inv_on_tsx_state_changed called on event TSX_STATE
  170. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2398 __print_debug_details: The state change pertains to the endpoint '6001()'
  171. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2403 __print_debug_details: The inv session still has an invite_tsx (0x7fae00004dc8)
  172. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2409 __print_debug_details: The UAS INVITE transaction involved in this state change is 0x7fae00004dc8
  173. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2413 __print_debug_details: The current transaction state is Completed
  174. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2415 __print_debug_details: The transaction state change event is TX_MSG
  175. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2420 __print_debug_details: The current inv state is DISCONNCTD
  176. <--- Received SIP request (379 bytes) from TCP:192.168.1.72:54609 --->
  177. ACK sip:100@192.168.1.73;transport=TCP SIP/2.0
  178. Via: SIP/2.0/TCP 192.168.1.72:54567;rport;branch=z9hG4bKPjFVKm7N4lJp-yl4qAIgkGRt23oS94-EiF;alias
  179. Max-Forwards: 70
  180. From: sip:6001@192.168.1.73;tag=UY7HJkEkGYsXpLEiBWC1paIrAzz4HVcS
  181. To: sip:100@192.168.1.73;tag=1c8d19b7-6003-4004-ae66-df352f8f84f5
  182. Call-ID: XcN-n196VNPmYKOPYRLw0hJRh9lraiXb
  183. CSeq: 26676 ACK
  184. Content-Length: 0
  185.  
  186.  
  187. [Feb 6 15:13:53] DEBUG[7684]: netsock2.c:172 ast_sockaddr_split_hostport: Splitting '192.168.1.72:54609' into...
  188. [Feb 6 15:13:53] DEBUG[7684]: netsock2.c:226 ast_sockaddr_split_hostport: ...host '192.168.1.72' and port '54609'.
  189. [Feb 6 15:13:53] DEBUG[7684]: netsock2.c:172 ast_sockaddr_split_hostport: Splitting '192.168.1.73:5060' into...
  190. [Feb 6 15:13:53] DEBUG[7684]: netsock2.c:226 ast_sockaddr_split_hostport: ...host '192.168.1.73' and port '5060'.
  191. [Feb 6 15:13:53] DEBUG[7684]: res_pjsip/pjsip_distributor.c:390 distributor: Searching for serializer on dialog dlg0x7fae00005fd8 for Request msg ACK/cseq=26676 (rdata0x7fadf0006690)
  192. [Feb 6 15:13:53] DEBUG[7684]: res_pjsip/pjsip_distributor.c:396 distributor: Found serializer pjsip/distributor-00000020 on dialog dlg0x7fae00005fd8
  193. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2384 __print_debug_details: Function session_inv_on_tsx_state_changed called on event TSX_STATE
  194. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2398 __print_debug_details: The state change pertains to the endpoint '6001()'
  195. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2403 __print_debug_details: The inv session still has an invite_tsx (0x7fae00004dc8)
  196. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2409 __print_debug_details: The UAS INVITE transaction involved in this state change is 0x7fae00004dc8
  197. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2413 __print_debug_details: The current transaction state is Confirmed
  198. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2415 __print_debug_details: The transaction state change event is RX_MSG
  199. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2420 __print_debug_details: The current inv state is DISCONNCTD
  200. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2463 handle_incoming: Received request
  201. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2430 handle_incoming_request: Method is ACK
  202. [Feb 6 15:13:53] DEBUG[7684]: res_pjsip_session.c:2384 __print_debug_details: Function session_inv_on_tsx_state_changed called on event TSX_STATE
  203. [Feb 6 15:13:53] DEBUG[7684]: res_pjsip_session.c:2398 __print_debug_details: The state change pertains to the endpoint '6001()'
  204. [Feb 6 15:13:53] DEBUG[7684]: res_pjsip_session.c:2406 __print_debug_details: The inv session does NOT have an invite_tsx
  205. [Feb 6 15:13:53] DEBUG[7684]: res_pjsip_session.c:2409 __print_debug_details: The UAS INVITE transaction involved in this state change is 0x7fae00004dc8
  206. [Feb 6 15:13:53] DEBUG[7684]: res_pjsip_session.c:2413 __print_debug_details: The current transaction state is Terminated
  207. [Feb 6 15:13:53] DEBUG[7684]: res_pjsip_session.c:2415 __print_debug_details: The transaction state change event is TIMER
  208. [Feb 6 15:13:53] DEBUG[7684]: res_pjsip_session.c:2420 __print_debug_details: The current inv state is DISCONNCTD
  209. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:1322 session_destructor: Destroying SIP session with endpoint 6001
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement