Advertisement
Guest User

Untitled

a guest
Feb 6th, 2017
195
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 15.43 KB | None | 0 0
  1. *CLI> <--- Received SIP request (1146 bytes) from TCP:192.168.1.72:54609 --->
  2. INVITE sip:[email protected];transport=TCP SIP/2.0
  3. Via: SIP/2.0/TCP 192.168.1.72:54567;rport;branch=z9hG4bKPjAlyqFTTsio1ZMfP4iI7EyCVAFscPwsfA;alias
  4. Max-Forwards: 70
  5. From: sip:[email protected];tag=UY7HJkEkGYsXpLEiBWC1paIrAzz4HVcS
  6. Contact: <sip:[email protected]:54609;transport=TCP;ob>
  7. Call-ID: XcN-n196VNPmYKOPYRLw0hJRh9lraiXb
  8. CSeq: 26675 INVITE
  9. Allow: PRACK, INVITE, ACK, BYE, CANCEL, UPDATE, INFO, SUBSCRIBE, NOTIFY, REFER, MESSAGE, OPTIONS
  10. Supported: replaces, 100rel, timer, norefersub
  11. Session-Expires: 1800
  12. Min-SE: 90
  13. User-Agent: PJSUA v2.6 iOS-10.2.1/arm-iPhone7,1/iOS-SDK
  14. Content-Type: application/sdp
  15. Content-Length: 473
  16.  
  17. v=0
  18. o=- 3695379233 3695379233 IN IP4 192.168.1.72
  19. s=pjmedia
  20. b=AS:84
  21. t=0 0
  22. a=X-nat:0
  23. m=audio 4090 RTP/AVP 98 97 99 104 3 0 8 9 96
  24. c=IN IP4 192.168.1.72
  25. b=TIAS:64000
  26. a=rtcp:4091 IN IP4 192.168.1.72
  27. a=sendrecv
  28. a=rtpmap:98 speex/16000
  29. a=rtpmap:97 speex/8000
  30. a=rtpmap:99 speex/32000
  31. a=rtpmap:104 iLBC/8000
  32. a=fmtp:104 mode=30
  33. a=rtpmap:3 GSM/8000
  34. a=rtpmap:0 PCMU/8000
  35. a=rtpmap:8 PCMA/8000
  36. a=rtpmap:9 G722/8000
  37. a=rtpmap:96 telephone-event/8000
  38. a=fmtp:96 0-16
  39.  
  40. [Feb 6 15:13:53] DEBUG[7684]: netsock2.c:172 ast_sockaddr_split_hostport: Splitting '192.168.1.72:54609' into...
  41. [Feb 6 15:13:53] DEBUG[7684]: netsock2.c:226 ast_sockaddr_split_hostport: ...host '192.168.1.72' and port '54609'.
  42. [Feb 6 15:13:53] DEBUG[7684]: netsock2.c:172 ast_sockaddr_split_hostport: Splitting '192.168.1.73:5060' into...
  43. [Feb 6 15:13:53] DEBUG[7684]: netsock2.c:226 ast_sockaddr_split_hostport: ...host '192.168.1.73' and port '5060'.
  44. [Feb 6 15:13:53] DEBUG[7684]: res_pjsip/pjsip_distributor.c:267 find_dialog: Could not find matching transaction for Request msg INVITE/cseq=26675 (rdata0x7fadf0006690)
  45. [Feb 6 15:13:53] DEBUG[7684]: res_pjsip/pjsip_distributor.c:359 ast_sip_get_distributor_serializer: Calculated serializer pjsip/distributor-00000020 to use for Request msg INVITE/cseq=26675 (rdata0x7fadf0006690)
  46. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_endpoint_identifier_ip.c:128 ip_identify: No identify sections to match against
  47. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_endpoint_identifier_user.c:133 username_identify: Attempting identify by From username '6001' domain '192.168.1.73'
  48. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_endpoint_identifier_user.c:145 username_identify: Identified by From username '6001' domain '192.168.1.73'
  49. [Feb 6 15:13:53] DEBUG[7968]: netsock2.c:172 ast_sockaddr_split_hostport: Splitting '192.168.1.73' into...
  50. [Feb 6 15:13:53] DEBUG[7968]: netsock2.c:226 ast_sockaddr_split_hostport: ...host '192.168.1.73' and port ''.
  51. [Feb 6 15:13:53] DEBUG[7968]: netsock2.c:172 ast_sockaddr_split_hostport: Splitting '192.168.1.72' into...
  52. [Feb 6 15:13:53] DEBUG[7968]: netsock2.c:226 ast_sockaddr_split_hostport: ...host '192.168.1.72' and port ''.
  53. [Feb 6 15:13:53] DEBUG[7968]: netsock2.c:172 ast_sockaddr_split_hostport: Splitting '192.168.1.73:5060' into...
  54. [Feb 6 15:13:53] DEBUG[7968]: netsock2.c:226 ast_sockaddr_split_hostport: ...host '192.168.1.73' and port '5060'.
  55. [Feb 6 15:13:53] DEBUG[7968]: netsock2.c:172 ast_sockaddr_split_hostport: Splitting '192.168.1.72:54609' into...
  56. [Feb 6 15:13:53] DEBUG[7968]: netsock2.c:226 ast_sockaddr_split_hostport: ...host '192.168.1.72' and port '54609'.
  57. <--- Transmitting SIP response (555 bytes) to TCP:192.168.1.72:54609 --->
  58. SIP/2.0 401 Unauthorized
  59. Via: SIP/2.0/TCP 192.168.1.72:54567;rport=54609;received=192.168.1.72;branch=z9hG4bKPjAlyqFTTsio1ZMfP4iI7EyCVAFscPwsfA;alias
  60. Call-ID: XcN-n196VNPmYKOPYRLw0hJRh9lraiXb
  61. From: <sip:[email protected]>;tag=UY7HJkEkGYsXpLEiBWC1paIrAzz4HVcS
  62. To: <sip:[email protected]>;tag=z9hG4bKPjAlyqFTTsio1ZMfP4iI7EyCVAFscPwsfA
  63. CSeq: 26675 INVITE
  64. WWW-Authenticate: Digest realm="asterisk",nonce="1486390433/e0464c6858dec0ed0d80ef8af2374fd7",opaque="3eecbb0917f8ca62",algorithm=md5,qop="auth"
  65. Server: Asterisk PBX 14.2.1
  66. Content-Length: 0
  67.  
  68.  
  69. <--- Received SIP request (384 bytes) from TCP:192.168.1.72:54609 --->
  70. ACK sip:[email protected];transport=TCP SIP/2.0
  71. Via: SIP/2.0/TCP 192.168.1.72:54567;rport;branch=z9hG4bKPjAlyqFTTsio1ZMfP4iI7EyCVAFscPwsfA;alias
  72. Max-Forwards: 70
  73. From: sip:[email protected];tag=UY7HJkEkGYsXpLEiBWC1paIrAzz4HVcS
  74. To: sip:[email protected];tag=z9hG4bKPjAlyqFTTsio1ZMfP4iI7EyCVAFscPwsfA
  75. Call-ID: XcN-n196VNPmYKOPYRLw0hJRh9lraiXb
  76. CSeq: 26675 ACK
  77. Content-Length: 0
  78.  
  79.  
  80. [Feb 6 15:13:53] DEBUG[7684]: netsock2.c:172 ast_sockaddr_split_hostport: Splitting '192.168.1.72:54609' into...
  81. [Feb 6 15:13:53] DEBUG[7684]: netsock2.c:226 ast_sockaddr_split_hostport: ...host '192.168.1.72' and port '54609'.
  82. [Feb 6 15:13:53] DEBUG[7684]: netsock2.c:172 ast_sockaddr_split_hostport: Splitting '192.168.1.73:5060' into...
  83. [Feb 6 15:13:53] DEBUG[7684]: netsock2.c:226 ast_sockaddr_split_hostport: ...host '192.168.1.73' and port '5060'.
  84. [Feb 6 15:13:53] DEBUG[7684]: res_pjsip/pjsip_distributor.c:267 find_dialog: Could not find matching transaction for Request msg ACK/cseq=26675 (rdata0x7fadf0006690)
  85. [Feb 6 15:13:53] DEBUG[7684]: res_pjsip/pjsip_distributor.c:359 ast_sip_get_distributor_serializer: Calculated serializer pjsip/distributor-00000020 to use for Request msg ACK/cseq=26675 (rdata0x7fadf0006690)
  86. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_endpoint_identifier_ip.c:128 ip_identify: No identify sections to match against
  87. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_endpoint_identifier_user.c:133 username_identify: Attempting identify by From username '6001' domain '192.168.1.73'
  88. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_endpoint_identifier_user.c:145 username_identify: Identified by From username '6001' domain '192.168.1.73'
  89. <--- Received SIP request (1451 bytes) from TCP:192.168.1.72:54609 --->
  90. INVITE sip:[email protected];transport=TCP SIP/2.0
  91. Via: SIP/2.0/TCP 192.168.1.72:54567;rport;branch=z9hG4bKPjFVKm7N4lJp-yl4qAIgkGRt23oS94-EiF;alias
  92. Max-Forwards: 70
  93. From: sip:[email protected];tag=UY7HJkEkGYsXpLEiBWC1paIrAzz4HVcS
  94. Contact: <sip:[email protected]:54609;transport=TCP;ob>
  95. Call-ID: XcN-n196VNPmYKOPYRLw0hJRh9lraiXb
  96. CSeq: 26676 INVITE
  97. Allow: PRACK, INVITE, ACK, BYE, CANCEL, UPDATE, INFO, SUBSCRIBE, NOTIFY, REFER, MESSAGE, OPTIONS
  98. Supported: replaces, 100rel, timer, norefersub
  99. Session-Expires: 1800
  100. Min-SE: 90
  101. User-Agent: PJSUA v2.6 iOS-10.2.1/arm-iPhone7,1/iOS-SDK
  102. Authorization: Digest username="6001", realm="asterisk", nonce="1486390433/e0464c6858dec0ed0d80ef8af2374fd7", uri="sip:[email protected];transport=TCP", response="a612f0080af078a0ffa2ececd0da212c", algorithm=md5, cnonce="ALCOWGo6J0pediKE04bEXtQMyqYYHnYw", opaque="3eecbb0917f8ca62", qop=auth, nc=00000001
  103. Content-Type: application/sdp
  104. Content-Length: 473
  105.  
  106. v=0
  107. o=- 3695379233 3695379233 IN IP4 192.168.1.72
  108. s=pjmedia
  109. b=AS:84
  110. t=0 0
  111. a=X-nat:0
  112. m=audio 4090 RTP/AVP 98 97 99 104 3 0 8 9 96
  113. c=IN IP4 192.168.1.72
  114. b=TIAS:64000
  115. a=rtcp:4091 IN IP4 192.168.1.72
  116. a=sendrecv
  117. a=rtpmap:98 speex/16000
  118. a=rtpmap:97 speex/8000
  119. a=rtpmap:99 speex/32000
  120. a=rtpmap:104 iLBC/8000
  121. a=fmtp:104 mode=30
  122. a=rtpmap:3 GSM/8000
  123. a=rtpmap:0 PCMU/8000
  124. a=rtpmap:8 PCMA/8000
  125. a=rtpmap:9 G722/8000
  126. a=rtpmap:96 telephone-event/8000
  127. a=fmtp:96 0-16
  128.  
  129. [Feb 6 15:13:53] DEBUG[7684]: netsock2.c:172 ast_sockaddr_split_hostport: Splitting '192.168.1.72:54609' into...
  130. [Feb 6 15:13:53] DEBUG[7684]: netsock2.c:226 ast_sockaddr_split_hostport: ...host '192.168.1.72' and port '54609'.
  131. [Feb 6 15:13:53] DEBUG[7684]: netsock2.c:172 ast_sockaddr_split_hostport: Splitting '192.168.1.73:5060' into...
  132. [Feb 6 15:13:53] DEBUG[7684]: netsock2.c:226 ast_sockaddr_split_hostport: ...host '192.168.1.73' and port '5060'.
  133. [Feb 6 15:13:53] DEBUG[7684]: res_pjsip/pjsip_distributor.c:267 find_dialog: Could not find matching transaction for Request msg INVITE/cseq=26676 (rdata0x7fadf0006690)
  134. [Feb 6 15:13:53] DEBUG[7684]: res_pjsip/pjsip_distributor.c:359 ast_sip_get_distributor_serializer: Calculated serializer pjsip/distributor-00000020 to use for Request msg INVITE/cseq=26676 (rdata0x7fadf0006690)
  135. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_endpoint_identifier_ip.c:128 ip_identify: No identify sections to match against
  136. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_endpoint_identifier_user.c:133 username_identify: Attempting identify by From username '6001' domain '192.168.1.73'
  137. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_endpoint_identifier_user.c:145 username_identify: Identified by From username '6001' domain '192.168.1.73'
  138. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_authenticator_digest.c:257 check_nonce: Calculated nonce 1486390433/e0464c6858dec0ed0d80ef8af2374fd7. Actual nonce is 1486390433/e0464c6858dec0ed0d80ef8af2374fd7
  139. [Feb 6 15:13:53] DEBUG[7968]: netsock2.c:172 ast_sockaddr_split_hostport: Splitting '192.168.1.73' into...
  140. [Feb 6 15:13:53] DEBUG[7968]: netsock2.c:226 ast_sockaddr_split_hostport: ...host '192.168.1.73' and port ''.
  141. [Feb 6 15:13:53] DEBUG[7968]: netsock2.c:172 ast_sockaddr_split_hostport: Splitting '192.168.1.72' into...
  142. [Feb 6 15:13:53] DEBUG[7968]: netsock2.c:226 ast_sockaddr_split_hostport: ...host '192.168.1.72' and port ''.
  143. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip/pjsip_distributor.c:359 ast_sip_get_distributor_serializer: Calculated serializer pjsip/distributor-00000020 to use for Request msg INVITE/cseq=26676 (rdata0x7fadf000dd68)
  144. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:269 handle_incoming_sdp: Negotiating incoming SDP media stream 'audio' using audio SDP handler
  145. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2494 handle_outgoing_response: Method is INVITE, Response is 488 Not Acceptable Here
  146. [Feb 6 15:13:53] DEBUG[7968]: netsock2.c:172 ast_sockaddr_split_hostport: Splitting '192.168.1.73:5060' into...
  147. [Feb 6 15:13:53] DEBUG[7968]: netsock2.c:226 ast_sockaddr_split_hostport: ...host '192.168.1.73' and port '5060'.
  148. [Feb 6 15:13:53] DEBUG[7968]: netsock2.c:172 ast_sockaddr_split_hostport: Splitting '192.168.1.72:54609' into...
  149. [Feb 6 15:13:53] DEBUG[7968]: netsock2.c:226 ast_sockaddr_split_hostport: ...host '192.168.1.72' and port '54609'.
  150. <--- Transmitting SIP response (410 bytes) to TCP:192.168.1.72:54609 --->
  151. SIP/2.0 488 Not Acceptable Here
  152. Via: SIP/2.0/TCP 192.168.1.72:54567;rport=54609;received=192.168.1.72;branch=z9hG4bKPjFVKm7N4lJp-yl4qAIgkGRt23oS94-EiF;alias
  153. Call-ID: XcN-n196VNPmYKOPYRLw0hJRh9lraiXb
  154. From: <sip:[email protected]>;tag=UY7HJkEkGYsXpLEiBWC1paIrAzz4HVcS
  155. To: <sip:[email protected]>;tag=1c8d19b7-6003-4004-ae66-df352f8f84f5
  156. CSeq: 26676 INVITE
  157. Server: Asterisk PBX 14.2.1
  158. Content-Length: 0
  159.  
  160.  
  161. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2384 __print_debug_details: Function session_inv_on_state_changed called on event TSX_STATE
  162. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2398 __print_debug_details: The state change pertains to the endpoint '6001()'
  163. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2403 __print_debug_details: The inv session still has an invite_tsx (0x7fae00004dc8)
  164. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2418 __print_debug_details: There is no transaction involved in this state change
  165. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2420 __print_debug_details: The current inv state is DISCONNCTD
  166. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2618 session_inv_on_state_changed: Source of transaction state change is TX_MSG
  167. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2384 __print_debug_details: Function session_inv_on_tsx_state_changed called on event TSX_STATE
  168. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2398 __print_debug_details: The state change pertains to the endpoint '6001()'
  169. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2403 __print_debug_details: The inv session still has an invite_tsx (0x7fae00004dc8)
  170. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2409 __print_debug_details: The UAS INVITE transaction involved in this state change is 0x7fae00004dc8
  171. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2413 __print_debug_details: The current transaction state is Completed
  172. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2415 __print_debug_details: The transaction state change event is TX_MSG
  173. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2420 __print_debug_details: The current inv state is DISCONNCTD
  174. <--- Received SIP request (379 bytes) from TCP:192.168.1.72:54609 --->
  175. ACK sip:[email protected];transport=TCP SIP/2.0
  176. Via: SIP/2.0/TCP 192.168.1.72:54567;rport;branch=z9hG4bKPjFVKm7N4lJp-yl4qAIgkGRt23oS94-EiF;alias
  177. Max-Forwards: 70
  178. From: sip:[email protected];tag=UY7HJkEkGYsXpLEiBWC1paIrAzz4HVcS
  179. To: sip:[email protected];tag=1c8d19b7-6003-4004-ae66-df352f8f84f5
  180. Call-ID: XcN-n196VNPmYKOPYRLw0hJRh9lraiXb
  181. CSeq: 26676 ACK
  182. Content-Length: 0
  183.  
  184.  
  185. [Feb 6 15:13:53] DEBUG[7684]: netsock2.c:172 ast_sockaddr_split_hostport: Splitting '192.168.1.72:54609' into...
  186. [Feb 6 15:13:53] DEBUG[7684]: netsock2.c:226 ast_sockaddr_split_hostport: ...host '192.168.1.72' and port '54609'.
  187. [Feb 6 15:13:53] DEBUG[7684]: netsock2.c:172 ast_sockaddr_split_hostport: Splitting '192.168.1.73:5060' into...
  188. [Feb 6 15:13:53] DEBUG[7684]: netsock2.c:226 ast_sockaddr_split_hostport: ...host '192.168.1.73' and port '5060'.
  189. [Feb 6 15:13:53] DEBUG[7684]: res_pjsip/pjsip_distributor.c:390 distributor: Searching for serializer on dialog dlg0x7fae00005fd8 for Request msg ACK/cseq=26676 (rdata0x7fadf0006690)
  190. [Feb 6 15:13:53] DEBUG[7684]: res_pjsip/pjsip_distributor.c:396 distributor: Found serializer pjsip/distributor-00000020 on dialog dlg0x7fae00005fd8
  191. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2384 __print_debug_details: Function session_inv_on_tsx_state_changed called on event TSX_STATE
  192. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2398 __print_debug_details: The state change pertains to the endpoint '6001()'
  193. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2403 __print_debug_details: The inv session still has an invite_tsx (0x7fae00004dc8)
  194. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2409 __print_debug_details: The UAS INVITE transaction involved in this state change is 0x7fae00004dc8
  195. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2413 __print_debug_details: The current transaction state is Confirmed
  196. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2415 __print_debug_details: The transaction state change event is RX_MSG
  197. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2420 __print_debug_details: The current inv state is DISCONNCTD
  198. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2463 handle_incoming: Received request
  199. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:2430 handle_incoming_request: Method is ACK
  200. [Feb 6 15:13:53] DEBUG[7684]: res_pjsip_session.c:2384 __print_debug_details: Function session_inv_on_tsx_state_changed called on event TSX_STATE
  201. [Feb 6 15:13:53] DEBUG[7684]: res_pjsip_session.c:2398 __print_debug_details: The state change pertains to the endpoint '6001()'
  202. [Feb 6 15:13:53] DEBUG[7684]: res_pjsip_session.c:2406 __print_debug_details: The inv session does NOT have an invite_tsx
  203. [Feb 6 15:13:53] DEBUG[7684]: res_pjsip_session.c:2409 __print_debug_details: The UAS INVITE transaction involved in this state change is 0x7fae00004dc8
  204. [Feb 6 15:13:53] DEBUG[7684]: res_pjsip_session.c:2413 __print_debug_details: The current transaction state is Terminated
  205. [Feb 6 15:13:53] DEBUG[7684]: res_pjsip_session.c:2415 __print_debug_details: The transaction state change event is TIMER
  206. [Feb 6 15:13:53] DEBUG[7684]: res_pjsip_session.c:2420 __print_debug_details: The current inv state is DISCONNCTD
  207. [Feb 6 15:13:53] DEBUG[7968]: res_pjsip_session.c:1322 session_destructor: Destroying SIP session with endpoint 6001
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement