Advertisement
Guest User

Untitled

a guest
Jul 3rd, 2014
200
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.78 KB | None | 0 0
  1. <--- SIP read from UDP:10.208.163.224:5060 --->
  2. INVITE sip:213@polybeacon.com SIP/2.0
  3. Record-Route: <sip:10.208.163.224;r2=on;lr=on;ftag=KHFk8frzM3uxGsNEbbX1;nat=yes>
  4. Record-Route: <sip:23.253.225.181;r2=on;lr=on;ftag=KHFk8frzM3uxGsNEbbX1;nat=yes>
  5. Via: SIP/2.0/UDP 10.208.163.224;branch=z9hG4bK92d7.5581599687c1e3315541644b9071bba4.0
  6. Via: SIP/2.0/UDP 188.165.231.30:14060;branch=z9hG4bKBGtlJPVAkFtEBkE473EIUTpEEXFSv1rf;rport=14060
  7. From: <sip:250@polybeacon.com>;tag=KHFk8frzM3uxGsNEbbX1
  8. To: <sip:213@polybeacon.com>
  9. Contact: <sip:250@188.165.231.30:14060;rtcweb-breaker=no;click2call=no;transport=udp;ws-src-ip=209.87.224.9;ws-src-port=45790;ws-src-proto=ws>;+g.oma.sip-im;+sip.ice;language="en,fr"
  10. Call-ID: b9be741c-e328-ce77-e1e3-a869892df8bd
  11. CSeq: 44171 INVITE
  12. Content-Type: application/sdp
  13. Content-Length: 3365
  14. Max-Forwards: 69
  15. User-Agent: IM-client/OMA1.0 sipML5-v1.2014.04.18
  16. Organization: Doubango Telecom
  17. Via: SIP/2.0/TCP 209.87.224.9:45790;rport;branch=z9hG4bKBGtlJPVAkFtEBkE473EIUTpEEXFSv1rf;ws-hacked=WS
  18. Remote-Party-ID: PolyBeacon, Inc. <6134545038>;privacy=off;screen=no
  19. v=0
  20. o=- 228967619761887940 2 IN IP4 127.0.0.1
  21. s=Doubango Telecom - chrome
  22. t=0 0
  23. a=group:BUNDLE audio
  24. a=msid-semantic: WMS aTWY0T5mcxOoE8W0LWFdDRjUUeuWDuiEfUbv
  25. m=audio 38368 RTP/SAVPF 111 103 104 0 8 106 105 13 126
  26. c=IN IP4 209.87.224.9
  27. a=rtcp:38368 IN IP4 209.87.224.9
  28. a=candidate:1882490999 1 udp 2113937151 192.168.0.72 59948 typ host generation 0
  29. a=candidate:1882490999 2 udp 2113937151 192.168.0.72 59948 typ host generation 0
  30. a=candidate:3107895089 1 udp 2113937151 192.168.254.14 56963 typ host generation 0
  31. a=candidate:3107895089 2 udp 2113937151 192.168.254.14 56963 typ host generation 0
  32. a=candidate:4062413514 1 udp 2113937151 192.168.122.1 38368 typ host generation 0
  33. a=candidate:4062413514 2 udp 2113937151 192.168.122.1 38368 typ host generation 0
  34. a=candidate:1414826366 1 udp 2113937151 192.168.132.1 36375 typ host generation 0
  35. a=candidate:1414826366 2 udp 2113937151 192.168.132.1 36375 typ host generation 0
  36. a=candidate:150227754 1 udp 2113937151 172.16.168.1 49885 typ host generation 0
  37. a=candidate:150227754 2 udp 2113937151 172.16.168.1 49885 typ host generation 0
  38. a=candidate:1936426110 1 udp 1845501695 209.87.224.9 38368 typ srflx raddr 192.168.122.1 rport 38368 generation 0
  39. a=candidate:1936426110 2 udp 1845501695 209.87.224.9 38368 typ srflx raddr 192.168.122.1 rport 38368 generation 0
  40. a=candidate:2250568099 1 udp 1845501695 209.87.224.9 59948 typ srflx raddr 192.168.0.72 rport 59948 generation 0
  41. a=candidate:2250568099 2 udp 1845501695 209.87.224.9 59948 typ srflx raddr 192.168.0.72 rport 59948 generation 0
  42. a=candidate:1052210311 1 tcp 1509957375 192.168.0.72 0 typ host generation 0
  43. a=candidate:1052210311 2 tcp 1509957375 192.168.0.72 0 typ host generation 0
  44. a=candidate:4156378049 1 tcp 1509957375 192.168.254.14 0 typ host generation 0
  45. a=candidate:4156378049 2 tcp 1509957375 192.168.254.14 0 typ host generation 0
  46. a=candidate:3164634682 1 tcp 1509957375 192.168.122.1 0 typ host generation 0
  47. a=candidate:3164634682 2 tcp 1509957375 192.168.122.1 0 typ host generation 0
  48. a=candidate:450327950 1 tcp 1509957375 192.168.132.1 0 typ host generation 0
  49. a=candidate:450327950 2 tcp 1509957375 192.168.132.1 0 typ host generation 0
  50. a=candidate:1182250970 1 tcp 1509957375 172.16.168.1 0 typ host generation 0
  51. a=candidate:1182250970 2 tcp 1509957375 172.16.168.1 0 typ host generation 0
  52. a=ice-ufrag:5GoqemmVkmmdvC1F
  53. a=ice-pwd:od8QXPsWDDC8DtPWo/d5T3nm
  54. a=ice-options:google-ice
  55. a=fingerprint:sha-256 FC:98:0E:B0:71:6E:85:67:76:7D:66:A2:0C:F6:61:D3:B6:67:56:9F:90:30:E2:F2:D5:1B:1A:3F:7A:2A:B3:F8
  56. a=setup:actpass
  57. a=mid:audio
  58. a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level
  59. a=sendrecv
  60. a=rtcp-mux
  61. a=crypto:0 AES_CM_128_HMAC_SHA1_32 inline:Ep/mE6OAg4XCLS3DA88pJY5b7NEUt77W6CjVA+Wf
  62. a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:8f+OhxpAXV/q/BWsXZ/vLnWbu2dogiMNcp003QIo
  63. a=rtpmap:111 opus/48000/2
  64. a=fmtp:111 minptime=10
  65. a=rtpmap:103 ISAC/16000
  66. a=rtpmap:104 ISAC/32000
  67. a=rtpmap:0 PCMU/8000
  68. a=rtpmap:8 PCMA/8000
  69. a=rtpmap:106 CN/32000
  70. a=rtpmap:105 CN/16000
  71. a=rtpmap:13 CN/8000
  72. a=rtpmap:126 telephone-event/8000
  73. a=maxptime:60
  74. a=ssrc:1148189963 cname:1Wa31hdeEuoo0/jk
  75. a=ssrc:1148189963 msid:aTWY0T5mcxOoE8W0LWFdDRjUUeuWDuiEfUbv fe93572c-4d26-42e1-b32c-b7925b3c9a70
  76. a=ssrc:1148189963 mslabel:aTWY0T5mcxOoE8W0LWFdDRjUUeuWDuiEfUbv
  77. a=ssrc:1148189963 label:fe93572c-4d26-42e1-b32c-b7925b3c9a70
  78. <------------->
  79. --- (64 headers 1 lines) ---
  80. Sending to 10.208.163.224:5060 (NAT)
  81. Sending to 10.208.163.224:5060 (NAT)
  82. Using INVITE request as basis request - b9be741c-e328-ce77-e1e3-a869892df8bd
  83. Found peer 'webrtc.offhook.io' for '250' from 10.208.163.224:5060
  84. == Using SIP RTP CoS mark 5
  85. [2014-07-03 17:57:35.988] WARNING[709][C-00000001]: chan_sip.c:10004 process_sdp: Insufficient information for SDP (m= not found)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement