Advertisement
Guest User

20170206_01_debug.txt

a guest
Feb 6th, 2017
367
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 134.92 KB | None | 0 0
  1.  
  2. [Feb 6 12:19:04] VERBOSE[26738] res_pjsip_logger.c: <--- Received SIP response (476 bytes) from UDP:217.10.79.9:5060 --->
  3. SIP/2.0 401 Unauthorized
  4. Via: SIP/2.0/UDP 192.168.178.207:5060;received=192.168.178.207;rport=5060;branch=z9hG4bKPjcc8fe22a-d71a-4999-979b-94f3dde5b2c9
  5. From: <sip:3224132@sipgate.de>;tag=c81e7543-618b-4587-b317-e7767d040533
  6. To: <sip:3224132@sipgate.de>;tag=86e53dd608d1c001e0b8060625977563.b46e
  7. Call-ID: 53ed47b6-cce5-45ab-a540-952fbcc2b8cd
  8. CSeq: 55998 REGISTER
  9. WWW-Authenticate: Digest realm="sipgate.de", nonce="WJhc1FiYW6g/CDDtW8usyhR0M0RoP4HN"
  10. Content-Length: 0
  11.  
  12.  
  13. [Feb 6 12:19:04] DEBUG[26738] netsock2.c: Splitting '217.10.79.9:5060' into...
  14. [Feb 6 12:19:04] DEBUG[26738] netsock2.c: ...host '217.10.79.9' and port '5060'.
  15. [Feb 6 12:19:04] DEBUG[26738] netsock2.c: Splitting '192.168.178.207:5060' into...
  16. [Feb 6 12:19:04] DEBUG[26738] netsock2.c: ...host '192.168.178.207' and port '5060'.
  17. [Feb 6 12:19:04] DEBUG[26738] res_pjsip/pjsip_distributor.c: No dialog serializer for response Response msg 401/REGISTER/cseq=55998 (rdata0x71c45104). Using request transaction as basis
  18. [Feb 6 12:19:04] DEBUG[26738] res_pjsip/pjsip_distributor.c: Found serializer pjsip/outreg/04_sipgate_Joerg_022529-0000005c on transaction tsx0x7600898c
  19. [Feb 6 12:19:04] DEBUG[26821] res_pjsip_outbound_registration.c: Received REGISTER response 401(Unauthorized)
  20. [Feb 6 12:19:04] DEBUG[26821] res_pjsip_outbound_registration.c: Processing REGISTER response 401 from server 'sip:sipgate.de:5060' for client 'sip:3224132@sipgate.de:5060'
  21. [Feb 6 12:19:04] DEBUG[26821] res_pjsip_outbound_registration.c: Sending authenticated REGISTER to server 'sip:sipgate.de:5060' from client 'sip:3224132@sipgate.de:5060'
  22. [Feb 6 12:19:04] DEBUG[26821] res_pjsip/pjsip_message_ip_updater.c: Re-wrote Contact URI host/port to 192.168.178.207:5060
  23. [Feb 6 12:19:04] DEBUG[26821] netsock2.c: Splitting '217.10.79.9' into...
  24. [Feb 6 12:19:04] DEBUG[26821] netsock2.c: ...host '217.10.79.9' and port ''.
  25. [Feb 6 12:19:04] DEBUG[26821] netsock2.c: Splitting '192.168.178.207:5060' into...
  26. [Feb 6 12:19:04] DEBUG[26821] netsock2.c: ...host '192.168.178.207' and port '5060'.
  27. [Feb 6 12:19:04] DEBUG[26821] netsock2.c: Splitting '217.10.79.9:5060' into...
  28. [Feb 6 12:19:04] DEBUG[26821] netsock2.c: ...host '217.10.79.9' and port '5060'.
  29. [Feb 6 12:19:04] VERBOSE[26821] res_pjsip_logger.c: <--- Transmitting SIP request (712 bytes) to UDP:217.10.79.9:5060 --->
  30. REGISTER sip:sipgate.de:5060 SIP/2.0
  31. Via: SIP/2.0/UDP 217.89.10.41:5060;rport;branch=z9hG4bKPj0910badc-4421-49fc-bc0e-25848df9cf56
  32. From: <sip:3224132@sipgate.de>;tag=c81e7543-618b-4587-b317-e7767d040533
  33. To: <sip:3224132@sipgate.de>
  34. Call-ID: 53ed47b6-cce5-45ab-a540-952fbcc2b8cd
  35. CSeq: 55999 REGISTER
  36. Contact: <sip:3224132@217.89.10.41:5060>
  37. Expires: 120
  38. Allow: OPTIONS, SUBSCRIBE, NOTIFY, PUBLISH, INVITE, ACK, BYE, CANCEL, UPDATE, PRACK, REGISTER, MESSAGE, REFER
  39. Max-Forwards: 70
  40. User-Agent: LasRamblas
  41. Authorization: Digest username="3224132", realm="sipgate.de", nonce="WJhc1FiYW6g/CDDtW8usyhR0M0RoP4HN", uri="sip:sipgate.de:5060", response="f65c1c871e49df456a5928a5cdbe9750"
  42. Content-Length: 0
  43.  
  44.  
  45. [Feb 6 12:19:04] VERBOSE[26738] res_pjsip_logger.c: <--- Received SIP response (436 bytes) from UDP:217.10.79.9:5060 --->
  46. SIP/2.0 200 OK
  47. Via: SIP/2.0/UDP 192.168.178.207:5060;received=192.168.178.207;rport=5060;branch=z9hG4bKPj0910badc-4421-49fc-bc0e-25848df9cf56
  48. From: <sip:3224132@sipgate.de>;tag=c81e7543-618b-4587-b317-e7767d040533
  49. To: <sip:3224132@sipgate.de>;tag=86e53dd608d1c001e0b8060625977563.48bf
  50. Call-ID: 53ed47b6-cce5-45ab-a540-952fbcc2b8cd
  51. CSeq: 55999 REGISTER
  52. Contact: <sip:3224132@192.168.178.207:5060>;expires=120
  53. Content-Length: 0
  54.  
  55.  
  56. [Feb 6 12:19:04] DEBUG[26738] netsock2.c: Splitting '217.10.79.9:5060' into...
  57. [Feb 6 12:19:04] DEBUG[26738] netsock2.c: ...host '217.10.79.9' and port '5060'.
  58. [Feb 6 12:19:04] DEBUG[26738] netsock2.c: Splitting '192.168.178.207:5060' into...
  59. [Feb 6 12:19:04] DEBUG[26738] netsock2.c: ...host '192.168.178.207' and port '5060'.
  60. [Feb 6 12:19:04] DEBUG[26738] res_pjsip/pjsip_distributor.c: No dialog serializer for response Response msg 200/REGISTER/cseq=55999 (rdata0x71c45104). Using request transaction as basis
  61. [Feb 6 12:19:04] DEBUG[26738] res_pjsip/pjsip_distributor.c: Found serializer pjsip/outreg/04_sipgate_Joerg_022529-0000005c on transaction tsx0x76012764
  62. [Feb 6 12:19:04] DEBUG[26821] res_pjsip_outbound_registration.c: Received REGISTER response 200(OK)
  63. [Feb 6 12:19:04] DEBUG[26821] res_pjsip_outbound_registration.c: Processing REGISTER response 200 from server 'sip:sipgate.de:5060' for client 'sip:3224132@sipgate.de:5060'
  64. [Feb 6 12:19:04] DEBUG[26821] res_pjsip_outbound_registration.c: Outbound registration to 'sip:sipgate.de:5060' with client 'sip:3224132@sipgate.de:5060' successful
  65. [Feb 6 12:19:04] DEBUG[26821] res_pjsip_outbound_registration.c: Scheduling outbound registration to server 'sip:sipgate.de:5060' from client 'sip:3224132@sipgate.de:5060' in 110 seconds
  66. [Feb 6 12:19:08] DEBUG[26772] res_pjsip_registrar_expire.c: Woke up at 1486379948 Interval: 30
  67. [Feb 6 12:19:08] DEBUG[26772] res_pjsip_registrar_expire.c: Expiring 0 contacts
  68. [Feb 6 12:19:33] DEBUG[26821] res_pjsip_outbound_registration.c: Outbound REGISTER attempt 1 to 'sip:tel.t-online.de' with client 'sip:+4922528362008@tel.t-online.de'
  69. [Feb 6 12:19:33] DEBUG[26821] res_pjsip/pjsip_resolver.c: Performing SIP DNS resolution of target 'tel.t-online.de'
  70. [Feb 6 12:19:33] DEBUG[26821] res_pjsip/pjsip_resolver.c: Transport type for target 'tel.t-online.de' is 'UDP'
  71. [Feb 6 12:19:33] DEBUG[26821] res_pjsip/pjsip_resolver.c: [0x76018fcc] Created resolution tracking for target 'tel.t-online.de'
  72. [Feb 6 12:19:33] DEBUG[26821] res_pjsip/pjsip_resolver.c: [0x76018fcc] Added target 'tel.t-online.de' with record type '35', transport 'UDP', and port '5060'
  73. [Feb 6 12:19:33] DEBUG[26821] res_pjsip/pjsip_resolver.c: [0x76018fcc] Added target '_sip._udp.tel.t-online.de' with record type '33', transport 'UDP', and port '5060'
  74. [Feb 6 12:19:33] DEBUG[26821] res_pjsip/pjsip_resolver.c: [0x76018fcc] Added target 'tel.t-online.de' with record type '1', transport 'UDP', and port '5060'
  75. [Feb 6 12:19:33] DEBUG[26821] res_pjsip/pjsip_resolver.c: [0x76018fcc] Starting initial resolution using parallel queries for target 'tel.t-online.de'
  76. [Feb 6 12:19:34] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x76018fcc] All parallel queries completed
  77. [Feb 6 12:19:34] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x76018fcc] NAPTR record received on target 'tel.t-online.de'
  78. [Feb 6 12:19:34] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x76018fcc] Added target '_sip._udp.tel.t-online.de' with record type '33', transport 'UDP', and port '5060'
  79. [Feb 6 12:19:34] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x76018fcc] SRV record being skipped on target '_sip._udp.tel.t-online.de' because NAPTR record exists
  80. [Feb 6 12:19:34] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x76018fcc] SRV record being skipped on target '_sip._udp.tel.t-online.de' because NAPTR record exists
  81. [Feb 6 12:19:34] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x76018fcc] A record being skipped on target 'tel.t-online.de' because NAPTR or SRV record exists
  82. [Feb 6 12:19:34] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x76018fcc] New queries added, performing parallel resolution again
  83. [Feb 6 12:19:34] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x76018fcc] All parallel queries completed
  84. [Feb 6 12:19:34] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x76018fcc] SRV record received on target '_sip._udp.tel.t-online.de'
  85. [Feb 6 12:19:34] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x76018fcc] Added target 'ims001.voip.t-ipnet.de' with record type '1', transport 'UDP', and port '5060'
  86. [Feb 6 12:19:34] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x76018fcc] SRV record received on target '_sip._udp.tel.t-online.de'
  87. [Feb 6 12:19:34] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x76018fcc] Added target 'ims002.voip.t-ipnet.de' with record type '1', transport 'UDP', and port '5060'
  88. [Feb 6 12:19:34] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x76018fcc] New queries added, performing parallel resolution again
  89. [Feb 6 12:19:34] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x76018fcc] All parallel queries completed
  90. [Feb 6 12:19:34] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x76018fcc] A record received on target 'ims001.voip.t-ipnet.de'
  91. [Feb 6 12:19:34] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x76018fcc] A record received on target 'ims002.voip.t-ipnet.de'
  92. [Feb 6 12:19:34] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x76018fcc] Resolution completed - 2 viable targets
  93. [Feb 6 12:19:34] DEBUG[26821] res_pjsip/pjsip_resolver.c: [0x76018fcc] Address '0' is 217.0.23.100:5060 with transport 'UDP'
  94. [Feb 6 12:19:34] DEBUG[26821] res_pjsip/pjsip_resolver.c: [0x76018fcc] Address '1' is 217.0.23.36:5060 with transport 'UDP'
  95. [Feb 6 12:19:34] DEBUG[26821] res_pjsip/pjsip_resolver.c: [0x76018fcc] Invoking user callback with '2' addresses
  96. [Feb 6 12:19:34] DEBUG[26821] res_pjsip/pjsip_message_ip_updater.c: Re-wrote Contact URI host/port to 192.168.178.207:5060
  97. [Feb 6 12:19:34] DEBUG[26821] netsock2.c: Splitting '217.0.23.100' into...
  98. [Feb 6 12:19:34] DEBUG[26821] netsock2.c: ...host '217.0.23.100' and port ''.
  99. [Feb 6 12:19:34] DEBUG[26821] netsock2.c: Splitting '192.168.178.207:5060' into...
  100. [Feb 6 12:19:34] DEBUG[26821] netsock2.c: ...host '192.168.178.207' and port '5060'.
  101. [Feb 6 12:19:34] DEBUG[26821] netsock2.c: Splitting '217.0.23.100:5060' into...
  102. [Feb 6 12:19:34] DEBUG[26821] netsock2.c: ...host '217.0.23.100' and port '5060'.
  103. [Feb 6 12:19:34] VERBOSE[26821] res_pjsip_logger.c: <--- Transmitting SIP request (565 bytes) to UDP:217.0.23.100:5060 --->
  104. REGISTER sip:tel.t-online.de SIP/2.0
  105. Via: SIP/2.0/UDP 217.89.10.41:5060;rport;branch=z9hG4bKPj43612ddc-b4a2-4480-8f7f-04aaecae2149
  106. From: <sip:+4922528362008@tel.t-online.de>;tag=5aed6f13-b3bd-47eb-ba21-889095570abc
  107. To: <sip:+4922528362008@tel.t-online.de>
  108. Call-ID: 8bf682f0-91f6-42be-ac12-93151e2e81c9
  109. CSeq: 40673 REGISTER
  110. Contact: <sip:022528362008@217.89.10.41:5060>
  111. Expires: 480
  112. Allow: OPTIONS, SUBSCRIBE, NOTIFY, PUBLISH, INVITE, ACK, BYE, CANCEL, UPDATE, PRACK, REGISTER, MESSAGE, REFER
  113. Max-Forwards: 70
  114. User-Agent: LasRamblas
  115. Content-Length: 0
  116.  
  117.  
  118. [Feb 6 12:19:34] VERBOSE[26738] res_pjsip_logger.c: <--- Received SIP response (750 bytes) from UDP:217.0.23.100:5060 --->
  119. SIP/2.0 200 OK
  120. Via: SIP/2.0/UDP 192.168.178.207:5060;received=192.168.178.207;rport=5060;branch=z9hG4bKPj43612ddc-b4a2-4480-8f7f-04aaecae2149
  121. To: <sip:+4922528362008@tel.t-online.de>;tag=exyw9h8g19seh1xmbbp2c6fmm1f3plb1
  122. From: <sip:+4922528362008@tel.t-online.de>;tag=5aed6f13-b3bd-47eb-ba21-889095570abc
  123. Call-ID: 8bf682f0-91f6-42be-ac12-93151e2e81c9
  124. CSeq: 40673 REGISTER
  125. Contact: <sip:022528362008@217.89.10.41:1024>;expires=545
  126. Contact: <sip:022528362008@192.168.178.207:5060>;expires=480
  127. P-Associated-Uri: <sip:+4922528362008@tel.t-online.de>
  128. P-Associated-Uri: <tel:+4922528362008>
  129. User-Agent: LasRamblas
  130. Content-Length: 0
  131. Allow: OPTIONS, SUBSCRIBE, NOTIFY, PUBLISH, INVITE, ACK, BYE, CANCEL, UPDATE, PRACK, REGISTER, MESSAGE, REFER
  132.  
  133.  
  134. [Feb 6 12:19:34] DEBUG[26738] netsock2.c: Splitting '217.0.23.100:5060' into...
  135. [Feb 6 12:19:34] DEBUG[26738] netsock2.c: ...host '217.0.23.100' and port '5060'.
  136. [Feb 6 12:19:34] DEBUG[26738] netsock2.c: Splitting '192.168.178.207:5060' into...
  137. [Feb 6 12:19:34] DEBUG[26738] netsock2.c: ...host '192.168.178.207' and port '5060'.
  138. [Feb 6 12:19:34] DEBUG[26738] res_pjsip/pjsip_distributor.c: No dialog serializer for response Response msg 200/REGISTER/cseq=40673 (rdata0x71c45104). Using request transaction as basis
  139. [Feb 6 12:19:34] DEBUG[26738] res_pjsip/pjsip_distributor.c: Found serializer pjsip/outreg/01_Telekom_022528362008-00000059 on transaction tsx0x76012764
  140. [Feb 6 12:19:34] DEBUG[26821] res_pjsip_outbound_registration.c: Received REGISTER response 200(OK)
  141. [Feb 6 12:19:34] DEBUG[26821] res_pjsip_outbound_registration.c: Processing REGISTER response 200 from server 'sip:tel.t-online.de' for client 'sip:+4922528362008@tel.t-online.de'
  142. [Feb 6 12:19:34] DEBUG[26821] res_pjsip_outbound_registration.c: Outbound registration to 'sip:tel.t-online.de' with client 'sip:+4922528362008@tel.t-online.de' successful
  143. [Feb 6 12:19:34] DEBUG[26821] res_pjsip_outbound_registration.c: Scheduling outbound registration to server 'sip:tel.t-online.de' from client 'sip:+4922528362008@tel.t-online.de' in 470 seconds
  144. [Feb 6 12:19:34] DEBUG[26821] res_pjsip_outbound_registration.c: Outbound REGISTER attempt 1 to 'sip:tel.t-online.de' with client 'sip:+4922528301471@tel.t-online.de'
  145. [Feb 6 12:19:34] DEBUG[26821] res_pjsip/pjsip_resolver.c: Performing SIP DNS resolution of target 'tel.t-online.de'
  146. [Feb 6 12:19:34] DEBUG[26821] res_pjsip/pjsip_resolver.c: Transport type for target 'tel.t-online.de' is 'UDP'
  147. [Feb 6 12:19:34] DEBUG[26821] res_pjsip/pjsip_resolver.c: [0x7600b294] Created resolution tracking for target 'tel.t-online.de'
  148. [Feb 6 12:19:34] DEBUG[26821] res_pjsip/pjsip_resolver.c: [0x7600b294] Added target 'tel.t-online.de' with record type '35', transport 'UDP', and port '5060'
  149. [Feb 6 12:19:34] DEBUG[26821] res_pjsip/pjsip_resolver.c: [0x7600b294] Added target '_sip._udp.tel.t-online.de' with record type '33', transport 'UDP', and port '5060'
  150. [Feb 6 12:19:34] DEBUG[26821] res_pjsip/pjsip_resolver.c: [0x7600b294] Added target 'tel.t-online.de' with record type '1', transport 'UDP', and port '5060'
  151. [Feb 6 12:19:34] DEBUG[26821] res_pjsip/pjsip_resolver.c: [0x7600b294] Starting initial resolution using parallel queries for target 'tel.t-online.de'
  152. [Feb 6 12:19:34] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x7600b294] All parallel queries completed
  153. [Feb 6 12:19:34] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x7600b294] NAPTR record received on target 'tel.t-online.de'
  154. [Feb 6 12:19:34] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x7600b294] Added target '_sip._udp.tel.t-online.de' with record type '33', transport 'UDP', and port '5060'
  155. [Feb 6 12:19:34] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x7600b294] SRV record being skipped on target '_sip._udp.tel.t-online.de' because NAPTR record exists
  156. [Feb 6 12:19:34] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x7600b294] SRV record being skipped on target '_sip._udp.tel.t-online.de' because NAPTR record exists
  157. [Feb 6 12:19:34] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x7600b294] A record being skipped on target 'tel.t-online.de' because NAPTR or SRV record exists
  158. [Feb 6 12:19:34] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x7600b294] New queries added, performing parallel resolution again
  159. [Feb 6 12:19:34] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x7600b294] All parallel queries completed
  160. [Feb 6 12:19:34] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x7600b294] SRV record received on target '_sip._udp.tel.t-online.de'
  161. [Feb 6 12:19:34] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x7600b294] Added target 'ims001.voip.t-ipnet.de' with record type '1', transport 'UDP', and port '5060'
  162. [Feb 6 12:19:34] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x7600b294] SRV record received on target '_sip._udp.tel.t-online.de'
  163. [Feb 6 12:19:34] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x7600b294] Added target 'ims002.voip.t-ipnet.de' with record type '1', transport 'UDP', and port '5060'
  164. [Feb 6 12:19:34] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x7600b294] New queries added, performing parallel resolution again
  165. [Feb 6 12:19:34] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x7600b294] All parallel queries completed
  166. [Feb 6 12:19:34] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x7600b294] A record received on target 'ims001.voip.t-ipnet.de'
  167. [Feb 6 12:19:34] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x7600b294] A record received on target 'ims002.voip.t-ipnet.de'
  168. [Feb 6 12:19:34] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x7600b294] Resolution completed - 2 viable targets
  169. [Feb 6 12:19:34] DEBUG[26821] res_pjsip/pjsip_resolver.c: [0x7600b294] Address '0' is 217.0.23.100:5060 with transport 'UDP'
  170. [Feb 6 12:19:34] DEBUG[26821] res_pjsip/pjsip_resolver.c: [0x7600b294] Address '1' is 217.0.23.36:5060 with transport 'UDP'
  171. [Feb 6 12:19:34] DEBUG[26821] res_pjsip/pjsip_resolver.c: [0x7600b294] Invoking user callback with '2' addresses
  172. [Feb 6 12:19:34] DEBUG[26821] res_pjsip/pjsip_message_ip_updater.c: Re-wrote Contact URI host/port to 192.168.178.207:5060
  173. [Feb 6 12:19:34] DEBUG[26821] netsock2.c: Splitting '217.0.23.100' into...
  174. [Feb 6 12:19:34] DEBUG[26821] netsock2.c: ...host '217.0.23.100' and port ''.
  175. [Feb 6 12:19:34] DEBUG[26821] netsock2.c: Splitting '192.168.178.207:5060' into...
  176. [Feb 6 12:19:34] DEBUG[26821] netsock2.c: ...host '192.168.178.207' and port '5060'.
  177. [Feb 6 12:19:34] DEBUG[26821] netsock2.c: Splitting '217.0.23.100:5060' into...
  178. [Feb 6 12:19:34] DEBUG[26821] netsock2.c: ...host '217.0.23.100' and port '5060'.
  179. [Feb 6 12:19:34] VERBOSE[26821] res_pjsip_logger.c: <--- Transmitting SIP request (564 bytes) to UDP:217.0.23.100:5060 --->
  180. REGISTER sip:tel.t-online.de SIP/2.0
  181. Via: SIP/2.0/UDP 217.89.10.41:5060;rport;branch=z9hG4bKPj9970302a-0160-459d-bfa8-797e1d0fb1d4
  182. From: <sip:+4922528301471@tel.t-online.de>;tag=da8c140d-3867-4f05-baca-e17ab9c9ad48
  183. To: <sip:+4922528301471@tel.t-online.de>
  184. Call-ID: de8c9ffa-204e-47cd-acbc-bab58a0c3c5d
  185. CSeq: 1309 REGISTER
  186. Contact: <sip:022528301471@217.89.10.41:5060>
  187. Expires: 480
  188. Allow: OPTIONS, SUBSCRIBE, NOTIFY, PUBLISH, INVITE, ACK, BYE, CANCEL, UPDATE, PRACK, REGISTER, MESSAGE, REFER
  189. Max-Forwards: 70
  190. User-Agent: LasRamblas
  191. Content-Length: 0
  192.  
  193.  
  194. [Feb 6 12:19:34] VERBOSE[26738] res_pjsip_logger.c: <--- Received SIP response (690 bytes) from UDP:217.0.23.100:5060 --->
  195. SIP/2.0 200 OK
  196. Via: SIP/2.0/UDP 192.168.178.207:5060;received=192.168.178.207;rport=5060;branch=z9hG4bKPj9970302a-0160-459d-bfa8-797e1d0fb1d4
  197. To: <sip:+4922528301471@tel.t-online.de>;tag=56xir7bxvec3gohng7u9lpmtbf255bur
  198. From: <sip:+4922528301471@tel.t-online.de>;tag=da8c140d-3867-4f05-baca-e17ab9c9ad48
  199. Call-ID: de8c9ffa-204e-47cd-acbc-bab58a0c3c5d
  200. CSeq: 1309 REGISTER
  201. Contact: <sip:022528301471@192.168.178.207:5060>;expires=480
  202. P-Associated-Uri: <sip:+4922528301471@tel.t-online.de>
  203. P-Associated-Uri: <tel:+4922528301471>
  204. User-Agent: LasRamblas
  205. Content-Length: 0
  206. Allow: OPTIONS, SUBSCRIBE, NOTIFY, PUBLISH, INVITE, ACK, BYE, CANCEL, UPDATE, PRACK, REGISTER, MESSAGE, REFER
  207.  
  208.  
  209. [Feb 6 12:19:34] DEBUG[26738] netsock2.c: Splitting '217.0.23.100:5060' into...
  210. [Feb 6 12:19:34] DEBUG[26738] netsock2.c: ...host '217.0.23.100' and port '5060'.
  211. [Feb 6 12:19:34] DEBUG[26738] netsock2.c: Splitting '192.168.178.207:5060' into...
  212. [Feb 6 12:19:34] DEBUG[26738] netsock2.c: ...host '192.168.178.207' and port '5060'.
  213. [Feb 6 12:19:34] DEBUG[26738] res_pjsip/pjsip_distributor.c: No dialog serializer for response Response msg 200/REGISTER/cseq=1309 (rdata0x71c45104). Using request transaction as basis
  214. [Feb 6 12:19:34] DEBUG[26738] res_pjsip/pjsip_distributor.c: Found serializer pjsip/outreg/03_Telekom_022528301471-0000005b on transaction tsx0x7600898c
  215. [Feb 6 12:19:34] DEBUG[26821] res_pjsip_outbound_registration.c: Received REGISTER response 200(OK)
  216. [Feb 6 12:19:34] DEBUG[26821] res_pjsip_outbound_registration.c: Processing REGISTER response 200 from server 'sip:tel.t-online.de' for client 'sip:+4922528301471@tel.t-online.de'
  217. [Feb 6 12:19:34] DEBUG[26821] res_pjsip_outbound_registration.c: Outbound registration to 'sip:tel.t-online.de' with client 'sip:+4922528301471@tel.t-online.de' successful
  218. [Feb 6 12:19:34] DEBUG[26821] res_pjsip_outbound_registration.c: Scheduling outbound registration to server 'sip:tel.t-online.de' from client 'sip:+4922528301471@tel.t-online.de' in 470 seconds
  219. [Feb 6 12:19:37] DEBUG[26821] res_pjsip_outbound_registration.c: Outbound REGISTER attempt 1 to 'sip:tel.t-online.de' with client 'sip:+4922528301470@tel.t-online.de'
  220. [Feb 6 12:19:37] DEBUG[26821] res_pjsip/pjsip_resolver.c: Performing SIP DNS resolution of target 'tel.t-online.de'
  221. [Feb 6 12:19:37] DEBUG[26821] res_pjsip/pjsip_resolver.c: Transport type for target 'tel.t-online.de' is 'UDP'
  222. [Feb 6 12:19:37] DEBUG[26821] res_pjsip/pjsip_resolver.c: [0x7600b294] Created resolution tracking for target 'tel.t-online.de'
  223. [Feb 6 12:19:37] DEBUG[26821] res_pjsip/pjsip_resolver.c: [0x7600b294] Added target 'tel.t-online.de' with record type '35', transport 'UDP', and port '5060'
  224. [Feb 6 12:19:37] DEBUG[26821] res_pjsip/pjsip_resolver.c: [0x7600b294] Added target '_sip._udp.tel.t-online.de' with record type '33', transport 'UDP', and port '5060'
  225. [Feb 6 12:19:37] DEBUG[26821] res_pjsip/pjsip_resolver.c: [0x7600b294] Added target 'tel.t-online.de' with record type '1', transport 'UDP', and port '5060'
  226. [Feb 6 12:19:37] DEBUG[26821] res_pjsip/pjsip_resolver.c: [0x7600b294] Starting initial resolution using parallel queries for target 'tel.t-online.de'
  227. [Feb 6 12:19:37] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x7600b294] All parallel queries completed
  228. [Feb 6 12:19:37] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x7600b294] NAPTR record received on target 'tel.t-online.de'
  229. [Feb 6 12:19:37] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x7600b294] Added target '_sip._udp.tel.t-online.de' with record type '33', transport 'UDP', and port '5060'
  230. [Feb 6 12:19:37] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x7600b294] SRV record being skipped on target '_sip._udp.tel.t-online.de' because NAPTR record exists
  231. [Feb 6 12:19:37] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x7600b294] SRV record being skipped on target '_sip._udp.tel.t-online.de' because NAPTR record exists
  232. [Feb 6 12:19:37] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x7600b294] A record being skipped on target 'tel.t-online.de' because NAPTR or SRV record exists
  233. [Feb 6 12:19:37] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x7600b294] New queries added, performing parallel resolution again
  234. [Feb 6 12:19:37] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x7600b294] All parallel queries completed
  235. [Feb 6 12:19:37] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x7600b294] SRV record received on target '_sip._udp.tel.t-online.de'
  236. [Feb 6 12:19:37] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x7600b294] Added target 'ims001.voip.t-ipnet.de' with record type '1', transport 'UDP', and port '5060'
  237. [Feb 6 12:19:37] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x7600b294] SRV record received on target '_sip._udp.tel.t-online.de'
  238. [Feb 6 12:19:37] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x7600b294] Added target 'ims002.voip.t-ipnet.de' with record type '1', transport 'UDP', and port '5060'
  239. [Feb 6 12:19:37] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x7600b294] New queries added, performing parallel resolution again
  240. [Feb 6 12:19:37] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x7600b294] All parallel queries completed
  241. [Feb 6 12:19:37] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x7600b294] A record received on target 'ims001.voip.t-ipnet.de'
  242. [Feb 6 12:19:37] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x7600b294] A record received on target 'ims002.voip.t-ipnet.de'
  243. [Feb 6 12:19:37] DEBUG[26724] res_pjsip/pjsip_resolver.c: [0x7600b294] Resolution completed - 2 viable targets
  244. [Feb 6 12:19:37] DEBUG[26821] res_pjsip/pjsip_resolver.c: [0x7600b294] Address '0' is 217.0.23.100:5060 with transport 'UDP'
  245. [Feb 6 12:19:37] DEBUG[26821] res_pjsip/pjsip_resolver.c: [0x7600b294] Address '1' is 217.0.23.36:5060 with transport 'UDP'
  246. [Feb 6 12:19:37] DEBUG[26821] res_pjsip/pjsip_resolver.c: [0x7600b294] Invoking user callback with '2' addresses
  247. [Feb 6 12:19:37] DEBUG[26821] res_pjsip/pjsip_message_ip_updater.c: Re-wrote Contact URI host/port to 192.168.178.207:5060
  248. [Feb 6 12:19:37] DEBUG[26821] netsock2.c: Splitting '217.0.23.100' into...
  249. [Feb 6 12:19:37] DEBUG[26821] netsock2.c: ...host '217.0.23.100' and port ''.
  250. [Feb 6 12:19:37] DEBUG[26821] netsock2.c: Splitting '192.168.178.207:5060' into...
  251. [Feb 6 12:19:37] DEBUG[26821] netsock2.c: ...host '192.168.178.207' and port '5060'.
  252. [Feb 6 12:19:37] DEBUG[26821] netsock2.c: Splitting '217.0.23.100:5060' into...
  253. [Feb 6 12:19:37] DEBUG[26821] netsock2.c: ...host '217.0.23.100' and port '5060'.
  254. [Feb 6 12:19:37] VERBOSE[26821] res_pjsip_logger.c: <--- Transmitting SIP request (565 bytes) to UDP:217.0.23.100:5060 --->
  255. REGISTER sip:tel.t-online.de SIP/2.0
  256. Via: SIP/2.0/UDP 217.89.10.41:5060;rport;branch=z9hG4bKPj76f6f4f8-8f68-409c-b207-29e5447b6798
  257. From: <sip:+4922528301470@tel.t-online.de>;tag=3c8c3a66-5ab9-4cf9-afaa-84c9203425e3
  258. To: <sip:+4922528301470@tel.t-online.de>
  259. Call-ID: 353266b4-9d2b-4bdb-987f-2580b04fd83d
  260. CSeq: 43621 REGISTER
  261. Contact: <sip:022528301470@217.89.10.41:5060>
  262. Expires: 480
  263. Allow: OPTIONS, SUBSCRIBE, NOTIFY, PUBLISH, INVITE, ACK, BYE, CANCEL, UPDATE, PRACK, REGISTER, MESSAGE, REFER
  264. Max-Forwards: 70
  265. User-Agent: LasRamblas
  266. Content-Length: 0
  267.  
  268.  
  269. [Feb 6 12:19:37] VERBOSE[26738] res_pjsip_logger.c: <--- Received SIP response (691 bytes) from UDP:217.0.23.100:5060 --->
  270. SIP/2.0 200 OK
  271. Via: SIP/2.0/UDP 192.168.178.207:5060;received=192.168.178.207;rport=5060;branch=z9hG4bKPj76f6f4f8-8f68-409c-b207-29e5447b6798
  272. To: <sip:+4922528301470@tel.t-online.de>;tag=cq5gzvw434r99h53ivsmnmw6er86sxes
  273. From: <sip:+4922528301470@tel.t-online.de>;tag=3c8c3a66-5ab9-4cf9-afaa-84c9203425e3
  274. Call-ID: 353266b4-9d2b-4bdb-987f-2580b04fd83d
  275. CSeq: 43621 REGISTER
  276. Contact: <sip:022528301470@192.168.178.207:5060>;expires=480
  277. P-Associated-Uri: <sip:+4922528301470@tel.t-online.de>
  278. P-Associated-Uri: <tel:+4922528301470>
  279. User-Agent: LasRamblas
  280. Content-Length: 0
  281. Allow: OPTIONS, SUBSCRIBE, NOTIFY, PUBLISH, INVITE, ACK, BYE, CANCEL, UPDATE, PRACK, REGISTER, MESSAGE, REFER
  282.  
  283.  
  284. [Feb 6 12:19:37] DEBUG[26738] netsock2.c: Splitting '217.0.23.100:5060' into...
  285. [Feb 6 12:19:37] DEBUG[26738] netsock2.c: ...host '217.0.23.100' and port '5060'.
  286. [Feb 6 12:19:37] DEBUG[26738] netsock2.c: Splitting '192.168.178.207:5060' into...
  287. [Feb 6 12:19:37] DEBUG[26738] netsock2.c: ...host '192.168.178.207' and port '5060'.
  288. [Feb 6 12:19:37] DEBUG[26738] res_pjsip/pjsip_distributor.c: No dialog serializer for response Response msg 200/REGISTER/cseq=43621 (rdata0x71c45104). Using request transaction as basis
  289. [Feb 6 12:19:37] DEBUG[26738] res_pjsip/pjsip_distributor.c: Found serializer pjsip/outreg/02_Telekom_022528301470-0000005a on transaction tsx0x760195e4
  290. [Feb 6 12:19:37] DEBUG[26821] res_pjsip_outbound_registration.c: Received REGISTER response 200(OK)
  291. [Feb 6 12:19:37] DEBUG[26821] res_pjsip_outbound_registration.c: Processing REGISTER response 200 from server 'sip:tel.t-online.de' for client 'sip:+4922528301470@tel.t-online.de'
  292. [Feb 6 12:19:37] DEBUG[26821] res_pjsip_outbound_registration.c: Outbound registration to 'sip:tel.t-online.de' with client 'sip:+4922528301470@tel.t-online.de' successful
  293. [Feb 6 12:19:37] DEBUG[26821] res_pjsip_outbound_registration.c: Scheduling outbound registration to server 'sip:tel.t-online.de' from client 'sip:+4922528301470@tel.t-online.de' in 470 seconds
  294. [Feb 6 12:19:38] DEBUG[26772] res_pjsip_registrar_expire.c: Woke up at 1486379978 Interval: 30
  295. [Feb 6 12:19:38] DEBUG[26772] res_pjsip_registrar_expire.c: Expiring 0 contacts
  296. [Feb 6 12:19:39] VERBOSE[26738] res_pjsip_logger.c: <--- Received SIP request (501 bytes) from UDP:192.168.178.57:5060 --->
  297. REGISTER sip:nieder.elvenich SIP/2.0
  298. Via: SIP/2.0/UDP 192.168.178.57:5060;branch=z9hG4bKca1ffb865f991889299fef9e18a6b9;rport
  299. From: "Wohnzimmer" <sip:20@nieder.elvenich>;tag=876174417
  300. To: "Wohnzimmer" <sip:20@nieder.elvenich>
  301. Call-ID: 3931581209@192_168_178_57
  302. CSeq: 1919 REGISTER
  303. Contact: <sip:20@192.168.178.57:5060>
  304. Max-Forwards: 70
  305. User-Agent: SL400A GO/42.240.00.000.000
  306. Expires: 180
  307. Allow: INVITE, ACK, CANCEL, BYE, OPTIONS, INFO, SUBSCRIBE, NOTIFY, REFER, UPDATE
  308. Content-Length: 0
  309.  
  310.  
  311. [Feb 6 12:19:39] DEBUG[26738] netsock2.c: Splitting '192.168.178.57:5060' into...
  312. [Feb 6 12:19:39] DEBUG[26738] netsock2.c: ...host '192.168.178.57' and port '5060'.
  313. [Feb 6 12:19:39] DEBUG[26738] netsock2.c: Splitting '192.168.178.207:5060' into...
  314. [Feb 6 12:19:39] DEBUG[26738] netsock2.c: ...host '192.168.178.207' and port '5060'.
  315. [Feb 6 12:19:39] DEBUG[26738] netsock2.c: Splitting '192.168.178.57' into...
  316. [Feb 6 12:19:39] DEBUG[26738] netsock2.c: ...host '192.168.178.57' and port ''.
  317. [Feb 6 12:19:39] DEBUG[26738] res_pjsip/pjsip_distributor.c: Could not find matching transaction for Request msg REGISTER/cseq=1919 (rdata0x71c45104)
  318. [Feb 6 12:19:39] DEBUG[26738] res_pjsip/pjsip_distributor.c: Calculated serializer pjsip/distributor-00000024 to use for Request msg REGISTER/cseq=1919 (rdata0x71c45104)
  319. [Feb 6 12:19:39] DEBUG[26821] netsock2.c: Splitting '192.168.178.57' into...
  320. [Feb 6 12:19:39] DEBUG[26821] netsock2.c: ...host '192.168.178.57' and port ''.
  321. [Feb 6 12:19:39] DEBUG[26821] res_pjsip_endpoint_identifier_ip.c: Source address 192.168.178.57:5060 does not match identify '04_sipgate_Joerg_identity'
  322. [Feb 6 12:19:39] DEBUG[26821] res_pjsip_endpoint_identifier_ip.c: Source address 192.168.178.57:5060 does not match identify '98'
  323. [Feb 6 12:19:39] DEBUG[26821] res_pjsip_endpoint_identifier_ip.c: Source address 192.168.178.57:5060 does not match identify '23'
  324. [Feb 6 12:19:39] DEBUG[26821] res_pjsip_endpoint_identifier_ip.c: Source address 192.168.178.57:5060 does not match identify '21'
  325. [Feb 6 12:19:39] DEBUG[26821] res_pjsip_endpoint_identifier_ip.c: Source address 192.168.178.57:5060 does not match identify 'Telekom_in'
  326. [Feb 6 12:19:39] DEBUG[26821] res_pjsip_endpoint_identifier_ip.c: Source address 192.168.178.57:5060 does not match identify '20'
  327. [Feb 6 12:19:39] DEBUG[26821] res_pjsip_endpoint_identifier_ip.c: '192.168.178.57:5060' did not match any identify section rules
  328. [Feb 6 12:19:39] DEBUG[26821] res_pjsip_endpoint_identifier_user.c: Attempting identify by From username '20' domain 'nieder.elvenich'
  329. [Feb 6 12:19:39] DEBUG[26821] res_pjsip_endpoint_identifier_user.c: Identified by From username '20' domain 'nieder.elvenich'
  330. [Feb 6 12:19:39] DEBUG[26821] netsock2.c: Splitting '192.168.178.207' into...
  331. [Feb 6 12:19:39] DEBUG[26821] netsock2.c: ...host '192.168.178.207' and port ''.
  332. [Feb 6 12:19:39] DEBUG[26821] netsock2.c: Splitting '192.168.178.57' into...
  333. [Feb 6 12:19:39] DEBUG[26821] netsock2.c: ...host '192.168.178.57' and port ''.
  334. [Feb 6 12:19:39] DEBUG[26821] netsock2.c: Splitting '192.168.178.57' into...
  335. [Feb 6 12:19:39] DEBUG[26821] netsock2.c: ...host '192.168.178.57' and port ''.
  336. [Feb 6 12:19:39] DEBUG[26821] netsock2.c: Splitting '192.168.178.207:5060' into...
  337. [Feb 6 12:19:39] DEBUG[26821] netsock2.c: ...host '192.168.178.207' and port '5060'.
  338. [Feb 6 12:19:39] DEBUG[26821] netsock2.c: Splitting '192.168.178.57:5060' into...
  339. [Feb 6 12:19:39] DEBUG[26821] netsock2.c: ...host '192.168.178.57' and port '5060'.
  340. [Feb 6 12:19:39] VERBOSE[26821] res_pjsip_logger.c: <--- Transmitting SIP response (541 bytes) to UDP:192.168.178.57:5060 --->
  341. SIP/2.0 401 Unauthorized
  342. Via: SIP/2.0/UDP 192.168.178.57:5060;rport=5060;received=192.168.178.57;branch=z9hG4bKca1ffb865f991889299fef9e18a6b9
  343. Call-ID: 3931581209@192_168_178_57
  344. From: "Wohnzimmer" <sip:20@nieder.elvenich>;tag=876174417
  345. To: "Wohnzimmer" <sip:20@nieder.elvenich>;tag=z9hG4bKca1ffb865f991889299fef9e18a6b9
  346. CSeq: 1919 REGISTER
  347. WWW-Authenticate: Digest realm="nieder.elvenich",nonce="1486379979/7c831e046f2d35347f11789996981153",opaque="2b4f8b886f4ecb9e",algorithm=md5,qop="auth"
  348. Server: LasRamblas
  349. Content-Length: 0
  350.  
  351.  
  352. [Feb 6 12:19:39] VERBOSE[26738] res_pjsip_logger.c: <--- Received SIP request (798 bytes) from UDP:192.168.178.57:5060 --->
  353. REGISTER sip:nieder.elvenich SIP/2.0
  354. Via: SIP/2.0/UDP 192.168.178.57:5060;branch=z9hG4bKf81bfcda85f491c97bb1cf38ac16f9b3;rport
  355. From: "Wohnzimmer" <sip:20@nieder.elvenich>;tag=876174417
  356. To: "Wohnzimmer" <sip:20@nieder.elvenich>
  357. Call-ID: 3931581209@192_168_178_57
  358. CSeq: 1920 REGISTER
  359. Contact: <sip:20@192.168.178.57:5060>
  360. Authorization: Digest username="20", realm="nieder.elvenich", qop=auth, algorithm=md5, uri="sip:nieder.elvenich", nonce="1486379979/7c831e046f2d35347f11789996981153", nc=00000001, cnonce="a9d572e0f108b9d44e7ee43af1d56a52", opaque="2b4f8b886f4ecb9e", response="de7607e998929fa4430c3c1edf8b754b"
  361. Max-Forwards: 70
  362. User-Agent: SL400A GO/42.240.00.000.000
  363. Expires: 180
  364. Allow: INVITE, ACK, CANCEL, BYE, OPTIONS, INFO, SUBSCRIBE, NOTIFY, REFER, UPDATE
  365. Content-Length: 0
  366.  
  367.  
  368. [Feb 6 12:19:39] DEBUG[26738] netsock2.c: Splitting '192.168.178.57:5060' into...
  369. [Feb 6 12:19:39] DEBUG[26738] netsock2.c: ...host '192.168.178.57' and port '5060'.
  370. [Feb 6 12:19:39] DEBUG[26738] netsock2.c: Splitting '192.168.178.207:5060' into...
  371. [Feb 6 12:19:39] DEBUG[26738] netsock2.c: ...host '192.168.178.207' and port '5060'.
  372. [Feb 6 12:19:39] DEBUG[26738] netsock2.c: Splitting '192.168.178.57' into...
  373. [Feb 6 12:19:39] DEBUG[26738] netsock2.c: ...host '192.168.178.57' and port ''.
  374. [Feb 6 12:19:39] DEBUG[26738] res_pjsip/pjsip_distributor.c: Could not find matching transaction for Request msg REGISTER/cseq=1920 (rdata0x71c45104)
  375. [Feb 6 12:19:39] DEBUG[26738] res_pjsip/pjsip_distributor.c: Calculated serializer pjsip/distributor-00000024 to use for Request msg REGISTER/cseq=1920 (rdata0x71c45104)
  376. [Feb 6 12:19:39] DEBUG[26821] netsock2.c: Splitting '192.168.178.57' into...
  377. [Feb 6 12:19:39] DEBUG[26821] netsock2.c: ...host '192.168.178.57' and port ''.
  378. [Feb 6 12:19:39] DEBUG[26821] res_pjsip_endpoint_identifier_ip.c: Source address 192.168.178.57:5060 does not match identify '04_sipgate_Joerg_identity'
  379. [Feb 6 12:19:39] DEBUG[26821] res_pjsip_endpoint_identifier_ip.c: Source address 192.168.178.57:5060 does not match identify '98'
  380. [Feb 6 12:19:39] DEBUG[26821] res_pjsip_endpoint_identifier_ip.c: Source address 192.168.178.57:5060 does not match identify '23'
  381. [Feb 6 12:19:39] DEBUG[26821] res_pjsip_endpoint_identifier_ip.c: Source address 192.168.178.57:5060 does not match identify '21'
  382. [Feb 6 12:19:39] DEBUG[26821] res_pjsip_endpoint_identifier_ip.c: Source address 192.168.178.57:5060 does not match identify 'Telekom_in'
  383. [Feb 6 12:19:39] DEBUG[26821] res_pjsip_endpoint_identifier_ip.c: Source address 192.168.178.57:5060 does not match identify '20'
  384. [Feb 6 12:19:39] DEBUG[26821] res_pjsip_endpoint_identifier_ip.c: '192.168.178.57:5060' did not match any identify section rules
  385. [Feb 6 12:19:39] DEBUG[26821] res_pjsip_endpoint_identifier_user.c: Attempting identify by From username '20' domain 'nieder.elvenich'
  386. [Feb 6 12:19:39] DEBUG[26821] res_pjsip_endpoint_identifier_user.c: Identified by From username '20' domain 'nieder.elvenich'
  387. [Feb 6 12:19:39] DEBUG[26821] res_pjsip_authenticator_digest.c: Calculated nonce 1486379979/7c831e046f2d35347f11789996981153. Actual nonce is 1486379979/7c831e046f2d35347f11789996981153
  388. [Feb 6 12:19:39] DEBUG[26821] netsock2.c: Splitting '192.168.178.207' into...
  389. [Feb 6 12:19:39] DEBUG[26821] netsock2.c: ...host '192.168.178.207' and port ''.
  390. [Feb 6 12:19:39] DEBUG[26821] netsock2.c: Splitting '192.168.178.57' into...
  391. [Feb 6 12:19:39] DEBUG[26821] netsock2.c: ...host '192.168.178.57' and port ''.
  392. [Feb 6 12:19:39] DEBUG[26821] res_pjsip_registrar.c: Matched id '20' to aor '20'
  393. [Feb 6 12:19:39] DEBUG[26821] res_pjsip_registrar.c: Matched aor '20' by To username
  394. [Feb 6 12:19:39] DEBUG[26821] config.c: extract double from [3.0] in [-inf, inf] gives [3.000000](0)
  395. [Feb 6 12:19:39] DEBUG[26821] config.c: extract uint from [0] in [0, 4294967295] gives [0](0)
  396. [Feb 6 12:19:39] DEBUG[26821] config.c: extract double from [3.000000] in [-inf, inf] gives [3.000000](0)
  397. [Feb 6 12:19:39] DEBUG[26821] config.c: extract uint from [0] in [0, 86400] gives [0](0)
  398. [Feb 6 12:19:39] DEBUG[26821] config.c: extract uint from [5060] in [0, 4294967295] gives [5060](0)
  399. [Feb 6 12:19:39] DEBUG[26821] config.c: extract double from [3.0] in [-inf, inf] gives [3.000000](0)
  400. [Feb 6 12:19:39] DEBUG[26821] config.c: extract uint from [0] in [0, 4294967295] gives [0](0)
  401. [Feb 6 12:19:39] DEBUG[26821] config.c: extract double from [3.000000] in [-inf, inf] gives [3.000000](0)
  402. [Feb 6 12:19:39] DEBUG[26821] config.c: extract uint from [0] in [0, 86400] gives [0](0)
  403. [Feb 6 12:19:39] DEBUG[26821] config.c: extract uint from [5060] in [0, 4294967295] gives [5060](0)
  404. [Feb 6 12:19:39] DEBUG[26710] threadpool.c: Increasing threadpool Sorcery's size by 1
  405. [Feb 6 12:19:39] DEBUG[26821] res_pjsip_registrar.c: Refreshed contact 'sip:20@192.168.178.57:5060' on AOR '20' with new expiration of 180 seconds
  406. [Feb 6 12:19:39] DEBUG[26867] config.c: extract uint from [3] in [0, 4294967295] gives [3](0)
  407. [Feb 6 12:19:39] DEBUG[26867] config.c: extract uint from [0] in [0, 4294967295] gives [0](0)
  408. [Feb 6 12:19:39] DEBUG[26867] config.c: extract uint from [2] in [0, 4294967295] gives [2](0)
  409. [Feb 6 12:19:39] DEBUG[26710] threadpool.c: Increasing threadpool Sorcery's size by 1
  410. [Feb 6 12:19:39] DEBUG[26736] threadpool.c: Increasing threadpool SIP's size by 5
  411. [Feb 6 12:19:39] DEBUG[26869] res_pjsip_mwi.c: Sending unsolicited MWI NOTIFY to endpoint 20, new messages: 0, old messages: 0
  412. [Feb 6 12:19:39] DEBUG[26711] threadpool.c: Increasing threadpool stasis-core's size by 1
  413. [Feb 6 12:19:39] DEBUG[26711] threadpool.c: Increasing threadpool stasis-core's size by 1
  414. [Feb 6 12:19:39] DEBUG[26821] config.c: extract double from [3.0] in [-inf, inf] gives [3.000000](0)
  415. [Feb 6 12:19:39] DEBUG[26821] config.c: extract uint from [0] in [0, 4294967295] gives [0](0)
  416. [Feb 6 12:19:39] DEBUG[26821] config.c: extract double from [3.000000] in [-inf, inf] gives [3.000000](0)
  417. [Feb 6 12:19:39] DEBUG[26821] config.c: extract uint from [0] in [0, 86400] gives [0](0)
  418. [Feb 6 12:19:39] DEBUG[26821] config.c: extract uint from [5060] in [0, 4294967295] gives [5060](0)
  419. [Feb 6 12:19:39] DEBUG[26821] netsock2.c: Splitting '192.168.178.57' into...
  420. [Feb 6 12:19:39] DEBUG[26821] netsock2.c: ...host '192.168.178.57' and port ''.
  421. [Feb 6 12:19:39] DEBUG[26821] netsock2.c: Splitting '192.168.178.207:5060' into...
  422. [Feb 6 12:19:39] DEBUG[26821] netsock2.c: ...host '192.168.178.207' and port '5060'.
  423. [Feb 6 12:19:39] DEBUG[26821] netsock2.c: Splitting '192.168.178.57:5060' into...
  424. [Feb 6 12:19:39] DEBUG[26821] netsock2.c: ...host '192.168.178.57' and port '5060'.
  425. [Feb 6 12:19:39] VERBOSE[26821] res_pjsip_logger.c: <--- Transmitting SIP response (483 bytes) to UDP:192.168.178.57:5060 --->
  426. SIP/2.0 200 OK
  427. Via: SIP/2.0/UDP 192.168.178.57:5060;rport=5060;received=192.168.178.57;branch=z9hG4bKf81bfcda85f491c97bb1cf38ac16f9b3
  428. Call-ID: 3931581209@192_168_178_57
  429. From: "Wohnzimmer" <sip:20@nieder.elvenich>;tag=876174417
  430. To: "Wohnzimmer" <sip:20@nieder.elvenich>;tag=z9hG4bKf81bfcda85f491c97bb1cf38ac16f9b3
  431. CSeq: 1920 REGISTER
  432. Date: Mon, 06 Feb 2017 11:19:39 GMT
  433. Contact: <sip:20@192.168.178.57:5060>;expires=179
  434. Expires: 180
  435. Server: LasRamblas
  436. Content-Length: 0
  437.  
  438.  
  439. [Feb 6 12:19:39] DEBUG[26869] config.c: extract double from [3.0] in [-inf, inf] gives [3.000000](0)
  440. [Feb 6 12:19:39] DEBUG[26869] config.c: extract uint from [0] in [0, 4294967295] gives [0](0)
  441. [Feb 6 12:19:39] DEBUG[26869] config.c: extract double from [3.000000] in [-inf, inf] gives [3.000000](0)
  442. [Feb 6 12:19:39] DEBUG[26869] config.c: extract uint from [0] in [0, 86400] gives [0](0)
  443. [Feb 6 12:19:39] DEBUG[26869] config.c: extract uint from [5060] in [0, 4294967295] gives [5060](0)
  444. [Feb 6 12:19:39] DEBUG[26869] res_pjsip.c: 0x28643dc: Wrapper created
  445. [Feb 6 12:19:39] DEBUG[26869] res_pjsip/pjsip_resolver.c: Performing SIP DNS resolution of target '192.168.178.57'
  446. [Feb 6 12:19:39] DEBUG[26869] res_pjsip/pjsip_resolver.c: Transport type for target '192.168.178.57' is 'UDP'
  447. [Feb 6 12:19:39] DEBUG[26869] res_pjsip/pjsip_resolver.c: Target '192.168.178.57' is an IP address, skipping resolution
  448. [Feb 6 12:19:39] DEBUG[26869] res_pjsip/pjsip_message_ip_updater.c: Re-wrote Contact URI host/port to 192.168.178.207:5060
  449. [Feb 6 12:19:39] DEBUG[26869] netsock2.c: Splitting '192.168.178.57' into...
  450. [Feb 6 12:19:39] DEBUG[26869] netsock2.c: ...host '192.168.178.57' and port ''.
  451. [Feb 6 12:19:39] DEBUG[26869] netsock2.c: Splitting '192.168.178.207:5060' into...
  452. [Feb 6 12:19:39] DEBUG[26869] netsock2.c: ...host '192.168.178.207' and port '5060'.
  453. [Feb 6 12:19:39] DEBUG[26869] netsock2.c: Splitting '192.168.178.57:5060' into...
  454. [Feb 6 12:19:39] DEBUG[26869] netsock2.c: ...host '192.168.178.57' and port '5060'.
  455. [Feb 6 12:19:39] VERBOSE[26869] res_pjsip_logger.c: <--- Transmitting SIP request (627 bytes) to UDP:192.168.178.57:5060 --->
  456. NOTIFY sip:20@192.168.178.57:5060 SIP/2.0
  457. Via: SIP/2.0/UDP 192.168.178.207:5060;rport;branch=z9hG4bKPj186c7a3b-ef21-4799-8193-e9cc8c31aa88
  458. From: <sip:20@192.168.178.207>;tag=474939cc-5288-4bf4-bfd6-4eb8058ae587
  459. To: <sip:20@192.168.178.57>
  460. Contact: <sip:20@192.168.178.207:5060>
  461. Call-ID: 7090dcc4-4ea5-46d6-bc3e-d161f3a54917
  462. CSeq: 63173 NOTIFY
  463. Subscription-State: terminated
  464. Event: message-summary
  465. Allow-Events: presence, dialog, message-summary, refer
  466. Max-Forwards: 70
  467. User-Agent: LasRamblas
  468. Content-Type: application/simple-message-summary
  469. Content-Length: 48
  470.  
  471. Messages-Waiting: no
  472. Voice-Message: 0/0 (0/0)
  473.  
  474. [Feb 6 12:19:39] VERBOSE[26738] res_pjsip_logger.c: <--- Received SIP response (391 bytes) from UDP:192.168.178.57:5060 --->
  475. SIP/2.0 200 OK
  476. Via: SIP/2.0/UDP 192.168.178.207:5060;rport=5060;branch=z9hG4bKPj186c7a3b-ef21-4799-8193-e9cc8c31aa88
  477. From: <sip:20@192.168.178.207>;tag=474939cc-5288-4bf4-bfd6-4eb8058ae587
  478. To: <sip:20@192.168.178.57>;tag=565828bb-4399-5cg5-cge7-5dc9149ad496
  479. Call-ID: 7090dcc4-4ea5-46d6-bc3e-d161f3a54917
  480. CSeq: 63173 NOTIFY
  481. User-Agent: SL400A GO/42.240.00.000.000
  482. Content-Length: 0
  483.  
  484.  
  485. [Feb 6 12:19:39] DEBUG[26738] netsock2.c: Splitting '192.168.178.57:5060' into...
  486. [Feb 6 12:19:39] DEBUG[26738] netsock2.c: ...host '192.168.178.57' and port '5060'.
  487. [Feb 6 12:19:39] DEBUG[26738] netsock2.c: Splitting '192.168.178.207:5060' into...
  488. [Feb 6 12:19:39] DEBUG[26738] netsock2.c: ...host '192.168.178.207' and port '5060'.
  489. [Feb 6 12:19:39] DEBUG[26738] res_pjsip/pjsip_distributor.c: No dialog serializer for response Response msg 200/NOTIFY/cseq=63173 (rdata0x71c45104). Using request transaction as basis
  490. [Feb 6 12:19:39] DEBUG[26738] res_pjsip/pjsip_distributor.c: Found serializer pjsip/mwi-00000049 on transaction tsx0x760110cc
  491. [Feb 6 12:19:39] DEBUG[26821] res_pjsip.c: 0x28643dc: PJSIP tsx response received
  492. [Feb 6 12:19:39] DEBUG[26821] res_pjsip.c: 0x28643dc: Callbacks executed
  493. [Feb 6 12:19:39] DEBUG[26821] res_pjsip.c: 0x28643dc: wrapper destroyed
  494. [Feb 6 12:19:41] VERBOSE[26738] res_pjsip_logger.c: <--- Received SIP request (1248 bytes) from UDP:217.0.23.100:5060 --->
  495. INVITE sip:022528301470@192.168.178.207:5060 SIP/2.0
  496. Max-Forwards: 51
  497. Via: SIP/2.0/UDP 217.0.23.100:5060;branch=z9hG4bKg3Zqkv7ijkbxxbc692yfufbk4mtrmvrod
  498. To: <sip:+4922528301470@tel.t-online.de;user=phone>
  499. From: <sip:+491733538874@tmobile.de;user=phone>;tag=h7g4Esbg_p65557t1486379981m82206c1466138592s1_3469095225-1307338939
  500. Call-ID: p65557t1486379981m82206c1466138592s2
  501. CSeq: 1 INVITE
  502. Contact: <sip:sgc_c@217.0.23.100;transport=udp>;+g.3gpp.icsi-ref="urn%3Aurn-7%3A3gpp-service.ims.icsi.mmtel"
  503. Record-Route: <sip:217.0.23.100;transport=udp;lr>
  504. Accept-Contact: *;+g.3gpp.icsi-ref="urn%3Aurn-7%3A3gpp-service.ims.icsi.mmtel"
  505. Min-Se: 900
  506. P-Asserted-Identity: <sip:+491733538874@tmobile.de;user=phone>
  507. Session-Expires: 1800
  508. Supported: timer
  509. Supported: histinfo
  510. Supported: norefersub
  511. Content-Type: application/sdp
  512. Content-Length: 223
  513. Session-ID: 7f0d3c293ac9def71f72b5c8619cac96
  514. Request-Disposition: no-fork
  515. Allow: REGISTER, REFER, NOTIFY, SUBSCRIBE, INFO, PRACK, UPDATE, INVITE, ACK, OPTIONS, CANCEL, BYE
  516.  
  517. v=0
  518. o=- 1842643782 3469094969 IN IP4 217.0.23.100
  519. s=-
  520. c=IN IP4 217.0.4.199
  521. t=0 0
  522. m=audio 19736 RTP/AVP 9 8 101
  523. a=rtpmap:9 G722/8000
  524. a=rtpmap:8 PCMA/8000
  525. a=rtpmap:101 telephone-event/8000
  526. a=maxptime:20
  527. a=ptime:20
  528.  
  529. [Feb 6 12:19:41] DEBUG[26738] netsock2.c: Splitting '217.0.23.100:5060' into...
  530. [Feb 6 12:19:41] DEBUG[26738] netsock2.c: ...host '217.0.23.100' and port '5060'.
  531. [Feb 6 12:19:41] DEBUG[26738] netsock2.c: Splitting '192.168.178.207:5060' into...
  532. [Feb 6 12:19:41] DEBUG[26738] netsock2.c: ...host '192.168.178.207' and port '5060'.
  533. [Feb 6 12:19:41] DEBUG[26738] netsock2.c: Splitting '217.0.23.100' into...
  534. [Feb 6 12:19:41] DEBUG[26738] netsock2.c: ...host '217.0.23.100' and port ''.
  535. [Feb 6 12:19:41] DEBUG[26738] res_pjsip/pjsip_distributor.c: Could not find matching transaction for Request msg INVITE/cseq=1 (rdata0x71c45104)
  536. [Feb 6 12:19:41] DEBUG[26738] res_pjsip/pjsip_distributor.c: Calculated serializer pjsip/distributor-00000025 to use for Request msg INVITE/cseq=1 (rdata0x71c45104)
  537. [Feb 6 12:19:41] DEBUG[26821] netsock2.c: Splitting '217.0.23.100' into...
  538. [Feb 6 12:19:41] DEBUG[26821] netsock2.c: ...host '217.0.23.100' and port ''.
  539. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_endpoint_identifier_ip.c: Source address 217.0.23.100:5060 does not match identify '04_sipgate_Joerg_identity'
  540. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_endpoint_identifier_ip.c: Source address 217.0.23.100:5060 does not match identify '98'
  541. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_endpoint_identifier_ip.c: Source address 217.0.23.100:5060 does not match identify '23'
  542. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_endpoint_identifier_ip.c: Source address 217.0.23.100:5060 does not match identify '21'
  543. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_endpoint_identifier_ip.c: Source address 217.0.23.100:5060 matches identify 'Telekom_in'
  544. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_endpoint_identifier_ip.c: Retrieved endpoint Telekom_in
  545. [Feb 6 12:19:41] DEBUG[26821] res_pjsip/pjsip_distributor.c: Calculated serializer pjsip/distributor-00000025 to use for Request msg INVITE/cseq=1 (rdata0x716080a4)
  546. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_session.c: Negotiating incoming SDP media stream 'audio' using audio SDP handler
  547. [Feb 6 12:19:41] DEBUG[26821] netsock2.c: Splitting '217.0.4.199' into...
  548. [Feb 6 12:19:41] DEBUG[26821] netsock2.c: ...host '217.0.4.199' and port ''.
  549. [Feb 6 12:19:41] DEBUG[26821] rtp_engine.c: Using engine 'asterisk' for RTP instance '0x760191ec'
  550. [Feb 6 12:19:41] DEBUG[26821] res_rtp_asterisk.c: Allocated port 30184 for RTP instance '0x760191ec'
  551. [Feb 6 12:19:41] DEBUG[26821] res_rtp_asterisk.c: Creating ICE session [::]:30184 (30184) for RTP instance '0x760191ec'
  552. [Feb 6 12:19:41] DEBUG[26821] netsock2.c: Splitting '192.168.178.207' into...
  553. [Feb 6 12:19:41] DEBUG[26821] netsock2.c: ...host '192.168.178.207' and port ''.
  554. [Feb 6 12:19:41] DEBUG[26821] netsock2.c: Splitting '192.168.178.207' into...
  555. [Feb 6 12:19:41] DEBUG[26821] netsock2.c: ...host '192.168.178.207' and port ''.
  556. [Feb 6 12:19:41] DEBUG[26821] rtp_engine.c: RTP instance '0x760191ec' is setup and ready to go
  557. [Feb 6 12:19:41] DEBUG[26821] netsock2.c: Splitting 'AsteriskPi' into...
  558. [Feb 6 12:19:41] DEBUG[26821] netsock2.c: ...host 'AsteriskPi' and port ''.
  559. [Feb 6 12:19:41] DEBUG[26821] res_rtp_asterisk.c: Setup RTCP on RTP instance '0x760191ec'
  560. [Feb 6 12:19:41] DEBUG[26821] netsock2.c: Splitting '192.168.178.207' into...
  561. [Feb 6 12:19:41] DEBUG[26821] netsock2.c: ...host '192.168.178.207' and port ''.
  562. [Feb 6 12:19:41] DEBUG[26821] netsock2.c: Splitting '192.168.178.207' into...
  563. [Feb 6 12:19:41] DEBUG[26821] netsock2.c: ...host '192.168.178.207' and port ''.
  564. [Feb 6 12:19:41] DEBUG[26821] rtp_engine.c: Setting tx payload type 9 based on m type on 0x746544f4
  565. [Feb 6 12:19:41] DEBUG[26821] rtp_engine.c: Setting tx payload type 8 based on m type on 0x746544f4
  566. [Feb 6 12:19:41] DEBUG[26821] rtp_engine.c: Setting tx payload type 101 based on m type on 0x746544f4
  567. [Feb 6 12:19:41] DEBUG[26821] rtp_engine.c: Crossover copying tx to rx payload mapping 8 (0x760212fc) from 0x746544f4 to 0x746544f4
  568. [Feb 6 12:19:41] DEBUG[26821] rtp_engine.c: Crossover copying tx to rx payload mapping 9 (0x7601b584) from 0x746544f4 to 0x746544f4
  569. [Feb 6 12:19:41] DEBUG[26821] rtp_engine.c: Crossover copying tx to rx payload mapping 101 (0x2204fc4) from 0x746544f4 to 0x746544f4
  570. [Feb 6 12:19:41] DEBUG[26821] rtp_engine.c: Copying rx payload mapping 8 (0x760212fc) from 0x746544f4 to 0x76019398
  571. [Feb 6 12:19:41] DEBUG[26821] rtp_engine.c: Copying rx payload mapping 9 (0x7601b584) from 0x746544f4 to 0x76019398
  572. [Feb 6 12:19:41] DEBUG[26821] rtp_engine.c: Copying rx payload mapping 101 (0x2204fc4) from 0x746544f4 to 0x76019398
  573. [Feb 6 12:19:41] DEBUG[26821] rtp_engine.c: Copying tx payload mapping 8 (0x760212fc) from 0x746544f4 to 0x76019398
  574. [Feb 6 12:19:41] DEBUG[26821] rtp_engine.c: Copying tx payload mapping 9 (0x7601b584) from 0x746544f4 to 0x76019398
  575. [Feb 6 12:19:41] DEBUG[26821] rtp_engine.c: Copying tx payload mapping 101 (0x2204fc4) from 0x746544f4 to 0x76019398
  576. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_session.c: Media stream 'audio' handled by audio
  577. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_t38.c: Not creating outgoing SDP stream: T.38 not enabled
  578. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_session.c: Method is INVITE, Response is 100 Trying
  579. [Feb 6 12:19:41] DEBUG[26821] netsock2.c: Splitting '217.0.23.100' into...
  580. [Feb 6 12:19:41] DEBUG[26821] netsock2.c: ...host '217.0.23.100' and port ''.
  581. [Feb 6 12:19:41] DEBUG[26821] netsock2.c: Splitting '192.168.178.207:5060' into...
  582. [Feb 6 12:19:41] DEBUG[26821] netsock2.c: ...host '192.168.178.207' and port '5060'.
  583. [Feb 6 12:19:41] DEBUG[26821] netsock2.c: Splitting '217.0.23.100:5060' into...
  584. [Feb 6 12:19:41] DEBUG[26821] netsock2.c: ...host '217.0.23.100' and port '5060'.
  585. [Feb 6 12:19:41] VERBOSE[26821] res_pjsip_logger.c: <--- Transmitting SIP response (467 bytes) to UDP:217.0.23.100:5060 --->
  586. SIP/2.0 100 Trying
  587. Via: SIP/2.0/UDP 217.0.23.100:5060;rport=5060;received=217.0.23.100;branch=z9hG4bKg3Zqkv7ijkbxxbc692yfufbk4mtrmvrod
  588. Record-Route: <sip:217.0.23.100;transport=udp;lr>
  589. Call-ID: p65557t1486379981m82206c1466138592s2
  590. From: <sip:+491733538874@tmobile.de;user=phone>;tag=h7g4Esbg_p65557t1486379981m82206c1466138592s1_3469095225-1307338939
  591. To: <sip:+4922528301470@tel.t-online.de;user=phone>
  592. CSeq: 1 INVITE
  593. Server: LasRamblas
  594. Content-Length: 0
  595.  
  596.  
  597. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_session.c: Function session_inv_on_state_changed called on event TSX_STATE
  598. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_session.c: The state change pertains to the endpoint 'Telekom_in()'
  599. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_session.c: The inv session still has an invite_tsx (0x7601860c)
  600. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_session.c: There is no transaction involved in this state change
  601. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_session.c: The current inv state is INCOMING
  602. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_session.c: Source of transaction state change is TX_MSG
  603. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_session.c: Function session_inv_on_tsx_state_changed called on event TSX_STATE
  604. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_session.c: The state change pertains to the endpoint 'Telekom_in()'
  605. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_session.c: The inv session still has an invite_tsx (0x7601860c)
  606. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_session.c: The UAS INVITE transaction involved in this state change is 0x7601860c
  607. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_session.c: The current transaction state is Proceeding
  608. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_session.c: The transaction state change event is TX_MSG
  609. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_session.c: The current inv state is INCOMING
  610. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_session.c: Method is INVITE
  611. [Feb 6 12:19:41] DEBUG[26821] chan_pjsip.c: Started PBX on new PJSIP channel PJSIP/Telekom_in-00000004
  612. [Feb 6 12:19:41] DEBUG[26876][C-00000004] pbx.c: Launching 'Dial'
  613. [Feb 6 12:19:41] VERBOSE[26876][C-00000004] pbx.c: Executing [022528301470@Telekom_in:1] Dial("PJSIP/Telekom_in-00000004", "SCCP/29,30") in new stack
  614. [Feb 6 12:19:41] VERBOSE[26876][C-00000004] : > SCCP: sccp_requestChannel returned Line 29 not currently registered -> Try again later
  615. [Feb 6 12:19:41] WARNING[26876][C-00000004] app_dial.c: Unable to create channel of type 'SCCP' (cause 44 - Requested channel not available)
  616. [Feb 6 12:19:41] VERBOSE[26876][C-00000004] app_dial.c: Everyone is busy/congested at this time (1:0/0/1)
  617. [Feb 6 12:19:41] DEBUG[26876][C-00000004] app_dial.c: Exiting with DIALSTATUS=CHANUNAVAIL.
  618. [Feb 6 12:19:41] DEBUG[26876][C-00000004] pbx.c: Launching 'VoiceMail'
  619. [Feb 6 12:19:41] VERBOSE[26876][C-00000004] pbx.c: Executing [022528301470@Telekom_in:2] VoiceMail("PJSIP/Telekom_in-00000004", "29@voicemail") in new stack
  620. [Feb 6 12:19:41] DEBUG[26722] devicestate.c: No provider found, checking channel drivers for PJSIP - Telekom_in
  621. [Feb 6 12:19:41] DEBUG[26722] devicestate.c: Changing state for PJSIP/Telekom_in - state 2 (In use)
  622. [Feb 6 12:19:41] DEBUG[26794] app_queue.c: Device 'PJSIP/Telekom_in' changed to state '2' (In use) but we don't care because they're not a member of any queue.
  623. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_session.c: Applying negotiated SDP media stream 'audio' using audio SDP handler
  624. [Feb 6 12:19:41] DEBUG[26821] netsock2.c: Splitting '217.0.4.199' into...
  625. [Feb 6 12:19:41] DEBUG[26821] netsock2.c: ...host '217.0.4.199' and port ''.
  626. [Feb 6 12:19:41] DEBUG[26821] acl.c: Not an IPv4 nor IPv6 address, cannot get port.
  627. [Feb 6 12:19:41] DEBUG[26821] acl.c: For destination '217.0.4.199', our source address is '192.168.178.207'.
  628. [Feb 6 12:19:41] DEBUG[26821] res_rtp_asterisk.c: Setting RTCP address on RTP instance '0x760191ec'
  629. [Feb 6 12:19:41] DEBUG[26821] rtp_engine.c: Setting tx payload type 9 based on m type on 0x7465401c
  630. [Feb 6 12:19:41] DEBUG[26821] rtp_engine.c: Setting tx payload type 8 based on m type on 0x7465401c
  631. [Feb 6 12:19:41] DEBUG[26821] rtp_engine.c: Setting tx payload type 101 based on m type on 0x7465401c
  632. [Feb 6 12:19:41] DEBUG[26821] rtp_engine.c: Copying tx payload mapping 8 (0x7601e8a4) from 0x7465401c to 0x76019398
  633. [Feb 6 12:19:41] DEBUG[26821] rtp_engine.c: Copying tx payload mapping 9 (0x7600e2dc) from 0x7465401c to 0x76019398
  634. [Feb 6 12:19:41] DEBUG[26821] rtp_engine.c: Copying tx payload mapping 101 (0x2204fc4) from 0x7465401c to 0x76019398
  635. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_session.c: Applied negotiated SDP media stream 'audio' using audio SDP handler
  636. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_session.c: Method is INVITE, Response is 200 OK
  637. [Feb 6 12:19:41] DEBUG[26821] res_pjsip/pjsip_message_ip_updater.c: Re-wrote Contact URI host/port to 192.168.178.207:5060
  638. [Feb 6 12:19:41] DEBUG[26821] netsock2.c: Splitting '217.0.23.100' into...
  639. [Feb 6 12:19:41] DEBUG[26821] netsock2.c: ...host '217.0.23.100' and port ''.
  640. [Feb 6 12:19:41] DEBUG[26821] netsock2.c: Splitting '192.168.178.207' into...
  641. [Feb 6 12:19:41] DEBUG[26821] netsock2.c: ...host '192.168.178.207' and port ''.
  642. [Feb 6 12:19:41] DEBUG[26821] netsock2.c: Splitting '192.168.178.207:5060' into...
  643. [Feb 6 12:19:41] DEBUG[26821] netsock2.c: ...host '192.168.178.207' and port '5060'.
  644. [Feb 6 12:19:41] DEBUG[26821] netsock2.c: Splitting '217.0.23.100:5060' into...
  645. [Feb 6 12:19:41] DEBUG[26821] netsock2.c: ...host '217.0.23.100' and port '5060'.
  646. [Feb 6 12:19:41] VERBOSE[26821] res_pjsip_logger.c: <--- Transmitting SIP response (1052 bytes) to UDP:217.0.23.100:5060 --->
  647. SIP/2.0 200 OK
  648. Via: SIP/2.0/UDP 217.0.23.100:5060;rport=5060;received=217.0.23.100;branch=z9hG4bKg3Zqkv7ijkbxxbc692yfufbk4mtrmvrod
  649. Record-Route: <sip:217.0.23.100;transport=udp;lr>
  650. Call-ID: p65557t1486379981m82206c1466138592s2
  651. From: <sip:+491733538874@tmobile.de;user=phone>;tag=h7g4Esbg_p65557t1486379981m82206c1466138592s1_3469095225-1307338939
  652. To: <sip:+4922528301470@tel.t-online.de;user=phone>;tag=c65cd906-bd67-4407-985e-c9b4fe152638
  653. CSeq: 1 INVITE
  654. Server: LasRamblas
  655. Contact: <sip:217.89.10.41:5060>
  656. Allow: OPTIONS, SUBSCRIBE, NOTIFY, PUBLISH, INVITE, ACK, BYE, CANCEL, UPDATE, PRACK, REGISTER, MESSAGE, REFER
  657. Supported: 100rel, timer, replaces, norefersub
  658. Session-Expires: 1800;refresher=uac
  659. Require: timer
  660. Content-Type: application/sdp
  661. Content-Length: 268
  662.  
  663. v=0
  664. o=- 1842643782 3469094971 IN IP4 192.168.178.207
  665. s=Asterisk
  666. c=IN IP4 vpn.bucholzki.de
  667. t=0 0
  668. m=audio 30184 RTP/AVP 9 8 101
  669. a=rtpmap:9 G722/8000
  670. a=rtpmap:8 PCMA/8000
  671. a=rtpmap:101 telephone-event/8000
  672. a=fmtp:101 0-16
  673. a=ptime:20
  674. a=maxptime:150
  675. a=sendrecv
  676.  
  677. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_session.c: Function session_inv_on_state_changed called on event TSX_STATE
  678. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_session.c: The state change pertains to the endpoint 'Telekom_in(PJSIP/Telekom_in-00000004)'
  679. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_session.c: The inv session still has an invite_tsx (0x7601860c)
  680. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_session.c: There is no transaction involved in this state change
  681. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_session.c: The current inv state is CONNECTING
  682. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_session.c: Source of transaction state change is TX_MSG
  683. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_session.c: Function session_inv_on_tsx_state_changed called on event TSX_STATE
  684. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_session.c: The state change pertains to the endpoint 'Telekom_in(PJSIP/Telekom_in-00000004)'
  685. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_session.c: The inv session still has an invite_tsx (0x7601860c)
  686. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_session.c: The UAS INVITE transaction involved in this state change is 0x7601860c
  687. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_session.c: The current transaction state is Completed
  688. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_session.c: The transaction state change event is TX_MSG
  689. [Feb 6 12:19:41] DEBUG[26821] res_pjsip_session.c: The current inv state is CONNECTING
  690. [Feb 6 12:19:41] DEBUG[26738] res_pjsip/pjsip_message_ip_updater.c: Re-wrote Contact URI host/port to 192.168.178.207:5060
  691. [Feb 6 12:19:41] DEBUG[26738] netsock2.c: Splitting '217.0.23.100' into...
  692. [Feb 6 12:19:41] DEBUG[26738] netsock2.c: ...host '217.0.23.100' and port ''.
  693. [Feb 6 12:19:41] DEBUG[26876][C-00000004] channel.c: Didn't receive a media frame from PJSIP/Telekom_in-00000004 within 500 ms of answering. Continuing anyway
  694. [Feb 6 12:19:41] DEBUG[26876][C-00000004] app_voicemail.c: Before find_user
  695. [Feb 6 12:19:41] DEBUG[26738] netsock2.c: Splitting '192.168.178.207:5060' into...
  696. [Feb 6 12:19:41] DEBUG[26876][C-00000004] media_cache.c: Failed to obtain media at '/var/spool/asterisk/voicemail/voicemail/29/temp'
  697. [Feb 6 12:19:41] DEBUG[26738] netsock2.c: ...host '192.168.178.207' and port '5060'.
  698. [Feb 6 12:19:41] DEBUG[26738] netsock2.c: Splitting '217.0.23.100:5060' into...
  699. [Feb 6 12:19:41] DEBUG[26738] netsock2.c: ...host '217.0.23.100' and port '5060'.
  700. [Feb 6 12:19:41] VERBOSE[26738] res_pjsip_logger.c: <--- Transmitting SIP response (1052 bytes) to UDP:217.0.23.100:5060 --->
  701. SIP/2.0 200 OK
  702. Via: SIP/2.0/UDP 217.0.23.100:5060;rport=5060;received=217.0.23.100;branch=z9hG4bKg3Zqkv7ijkbxxbc692yfufbk4mtrmvrod
  703. Record-Route: <sip:217.0.23.100;transport=udp;lr>
  704. Call-ID: p65557t1486379981m82206c1466138592s2
  705. From: <sip:+491733538874@tmobile.de;user=phone>;tag=h7g4Esbg_p65557t1486379981m82206c1466138592s1_3469095225-1307338939
  706. To: <sip:+4922528301470@tel.t-online.de;user=phone>;tag=c65cd906-bd67-4407-985e-c9b4fe152638
  707. CSeq: 1 INVITE
  708. Server: LasRamblas
  709. Contact: <sip:217.89.10.41:5060>
  710. Allow: OPTIONS, SUBSCRIBE, NOTIFY, PUBLISH, INVITE, ACK, BYE, CANCEL, UPDATE, PRACK, REGISTER, MESSAGE, REFER
  711. Supported: 100rel, timer, replaces, norefersub
  712. Session-Expires: 1800;refresher=uac
  713. Require: timer
  714. Content-Type: application/sdp
  715. Content-Length: 268
  716.  
  717. v=0
  718. o=- 1842643782 3469094971 IN IP4 192.168.178.207
  719. s=Asterisk
  720. c=IN IP4 vpn.bucholzki.de
  721. t=0 0
  722. m=audio 30184 RTP/AVP 9 8 101
  723. a=rtpmap:9 G722/8000
  724. a=rtpmap:8 PCMA/8000
  725. a=rtpmap:101 telephone-event/8000
  726. a=fmtp:101 0-16
  727. a=ptime:20
  728. a=maxptime:150
  729. a=sendrecv
  730.  
  731. [Feb 6 12:19:41] DEBUG[26876][C-00000004] media_cache.c: Failed to obtain media at '/var/spool/asterisk/voicemail/voicemail/29/temp'
  732. [Feb 6 12:19:41] DEBUG[26876][C-00000004] media_cache.c: Failed to obtain media at 'vm-intro'
  733. [Feb 6 12:19:41] DEBUG[26876][C-00000004] res_rtp_asterisk.c: Ooh, format changed from none to g722
  734. [Feb 6 12:19:41] DEBUG[26876][C-00000004] res_rtp_asterisk.c: Starting RTCP transmission on RTP instance '0x760191ec'
  735. [Feb 6 12:19:41] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016724, ts 000160, len 000160)
  736. [Feb 6 12:19:41] DEBUG[26876][C-00000004] channel.c: Scheduling timer at (50 requested / 50 actual) timer ticks per second
  737. [Feb 6 12:19:41] VERBOSE[26876][C-00000004] file.c: <PJSIP/Telekom_in-00000004> Playing 'vm-intro.g722' (language 'en')
  738. [Feb 6 12:19:41] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016725, ts 000320, len 000160)
  739. [Feb 6 12:19:41] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016726, ts 000480, len 000160)
  740. [Feb 6 12:19:41] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016727, ts 000640, len 000160)
  741. [Feb 6 12:19:41] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016728, ts 000800, len 000160)
  742. [Feb 6 12:19:41] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016729, ts 000960, len 000160)
  743. [Feb 6 12:19:41] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016730, ts 001120, len 000160)
  744. [Feb 6 12:19:41] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016731, ts 001280, len 000160)
  745. [Feb 6 12:19:41] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016732, ts 001440, len 000160)
  746. [Feb 6 12:19:41] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016733, ts 001600, len 000160)
  747. [Feb 6 12:19:41] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016734, ts 001760, len 000160)
  748. [Feb 6 12:19:41] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016735, ts 001920, len 000160)
  749. [Feb 6 12:19:41] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016736, ts 002080, len 000160)
  750. [Feb 6 12:19:41] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016737, ts 002240, len 000160)
  751. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016738, ts 002400, len 000160)
  752. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016739, ts 002560, len 000160)
  753. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016740, ts 002720, len 000160)
  754. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016741, ts 002880, len 000160)
  755. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016742, ts 003040, len 000160)
  756. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016743, ts 003200, len 000160)
  757. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016744, ts 003360, len 000160)
  758. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016745, ts 003520, len 000160)
  759. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016746, ts 003680, len 000160)
  760. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016747, ts 003840, len 000160)
  761. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016748, ts 004000, len 000160)
  762. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016749, ts 004160, len 000160)
  763. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016750, ts 004320, len 000160)
  764. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016751, ts 004480, len 000160)
  765. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016752, ts 004640, len 000160)
  766. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016753, ts 004800, len 000160)
  767. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016754, ts 004960, len 000160)
  768. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016755, ts 005120, len 000160)
  769. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016756, ts 005280, len 000160)
  770. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016757, ts 005440, len 000160)
  771. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016758, ts 005600, len 000160)
  772. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016759, ts 005760, len 000160)
  773. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016760, ts 005920, len 000160)
  774. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016761, ts 006080, len 000160)
  775. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016762, ts 006240, len 000160)
  776. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016763, ts 006400, len 000160)
  777. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016764, ts 006560, len 000160)
  778. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016765, ts 006720, len 000160)
  779. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016766, ts 006880, len 000160)
  780. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016767, ts 007040, len 000160)
  781. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016768, ts 007200, len 000160)
  782. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016769, ts 007360, len 000160)
  783. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016770, ts 007520, len 000160)
  784. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016771, ts 007680, len 000160)
  785. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016772, ts 007840, len 000160)
  786. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016773, ts 008000, len 000160)
  787. [Feb 6 12:19:42] DEBUG[26738] res_pjsip/pjsip_message_ip_updater.c: Re-wrote Contact URI host/port to 192.168.178.207:5060
  788. [Feb 6 12:19:42] DEBUG[26738] netsock2.c: Splitting '217.0.23.100' into...
  789. [Feb 6 12:19:42] DEBUG[26738] netsock2.c: ...host '217.0.23.100' and port ''.
  790. [Feb 6 12:19:42] DEBUG[26738] netsock2.c: Splitting '192.168.178.207:5060' into...
  791. [Feb 6 12:19:42] DEBUG[26738] netsock2.c: ...host '192.168.178.207' and port '5060'.
  792. [Feb 6 12:19:42] DEBUG[26738] netsock2.c: Splitting '217.0.23.100:5060' into...
  793. [Feb 6 12:19:42] DEBUG[26738] netsock2.c: ...host '217.0.23.100' and port '5060'.
  794. [Feb 6 12:19:42] VERBOSE[26738] res_pjsip_logger.c: <--- Transmitting SIP response (1052 bytes) to UDP:217.0.23.100:5060 --->
  795. SIP/2.0 200 OK
  796. Via: SIP/2.0/UDP 217.0.23.100:5060;rport=5060;received=217.0.23.100;branch=z9hG4bKg3Zqkv7ijkbxxbc692yfufbk4mtrmvrod
  797. Record-Route: <sip:217.0.23.100;transport=udp;lr>
  798. Call-ID: p65557t1486379981m82206c1466138592s2
  799. From: <sip:+491733538874@tmobile.de;user=phone>;tag=h7g4Esbg_p65557t1486379981m82206c1466138592s1_3469095225-1307338939
  800. To: <sip:+4922528301470@tel.t-online.de;user=phone>;tag=c65cd906-bd67-4407-985e-c9b4fe152638
  801. CSeq: 1 INVITE
  802. Server: LasRamblas
  803. Contact: <sip:217.89.10.41:5060>
  804. Allow: OPTIONS, SUBSCRIBE, NOTIFY, PUBLISH, INVITE, ACK, BYE, CANCEL, UPDATE, PRACK, REGISTER, MESSAGE, REFER
  805. Supported: 100rel, timer, replaces, norefersub
  806. Session-Expires: 1800;refresher=uac
  807. Require: timer
  808. Content-Type: application/sdp
  809. Content-Length: 268
  810.  
  811. v=0
  812. o=- 1842643782 3469094971 IN IP4 192.168.178.207
  813. s=Asterisk
  814. c=IN IP4 vpn.bucholzki.de
  815. t=0 0
  816. m=audio 30184 RTP/AVP 9 8 101
  817. a=rtpmap:9 G722/8000
  818. a=rtpmap:8 PCMA/8000
  819. a=rtpmap:101 telephone-event/8000
  820. a=fmtp:101 0-16
  821. a=ptime:20
  822. a=maxptime:150
  823. a=sendrecv
  824.  
  825. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016774, ts 008160, len 000160)
  826. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016775, ts 008320, len 000160)
  827. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016776, ts 008480, len 000160)
  828. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016777, ts 008640, len 000160)
  829. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016778, ts 008800, len 000160)
  830. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016779, ts 008960, len 000160)
  831. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016780, ts 009120, len 000160)
  832. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016781, ts 009280, len 000160)
  833. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016782, ts 009440, len 000160)
  834. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016783, ts 009600, len 000160)
  835. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016784, ts 009760, len 000160)
  836. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016785, ts 009920, len 000160)
  837. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016786, ts 010080, len 000160)
  838. [Feb 6 12:19:42] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016787, ts 010240, len 000160)
  839. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016788, ts 010400, len 000160)
  840. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016789, ts 010560, len 000160)
  841. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016790, ts 010720, len 000160)
  842. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016791, ts 010880, len 000160)
  843. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016792, ts 011040, len 000160)
  844. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016793, ts 011200, len 000160)
  845. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016794, ts 011360, len 000160)
  846. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016795, ts 011520, len 000160)
  847. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016796, ts 011680, len 000160)
  848. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016797, ts 011840, len 000160)
  849. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016798, ts 012000, len 000160)
  850. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016799, ts 012160, len 000160)
  851. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016800, ts 012320, len 000160)
  852. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016801, ts 012480, len 000160)
  853. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016802, ts 012640, len 000160)
  854. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016803, ts 012800, len 000160)
  855. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016804, ts 012960, len 000160)
  856. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016805, ts 013120, len 000160)
  857. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016806, ts 013280, len 000160)
  858. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016807, ts 013440, len 000160)
  859. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016808, ts 013600, len 000160)
  860. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016809, ts 013760, len 000160)
  861. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016810, ts 013920, len 000160)
  862. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016811, ts 014080, len 000160)
  863. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016812, ts 014240, len 000160)
  864. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016813, ts 014400, len 000160)
  865. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016814, ts 014560, len 000160)
  866. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016815, ts 014720, len 000160)
  867. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016816, ts 014880, len 000160)
  868. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016817, ts 015040, len 000160)
  869. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016818, ts 015200, len 000160)
  870. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016819, ts 015360, len 000160)
  871. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016820, ts 015520, len 000160)
  872. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016821, ts 015680, len 000160)
  873. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016822, ts 015840, len 000160)
  874. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016823, ts 016000, len 000160)
  875. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016824, ts 016160, len 000160)
  876. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016825, ts 016320, len 000160)
  877. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016826, ts 016480, len 000160)
  878. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016827, ts 016640, len 000160)
  879. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016828, ts 016800, len 000160)
  880. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016829, ts 016960, len 000160)
  881. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016830, ts 017120, len 000160)
  882. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016831, ts 017280, len 000160)
  883. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016832, ts 017440, len 000160)
  884. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016833, ts 017600, len 000160)
  885. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016834, ts 017760, len 000160)
  886. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016835, ts 017920, len 000160)
  887. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016836, ts 018080, len 000160)
  888. [Feb 6 12:19:43] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016837, ts 018240, len 000160)
  889. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016838, ts 018400, len 000160)
  890. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016839, ts 018560, len 000160)
  891. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016840, ts 018720, len 000160)
  892. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016841, ts 018880, len 000160)
  893. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016842, ts 019040, len 000160)
  894. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016843, ts 019200, len 000160)
  895. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016844, ts 019360, len 000160)
  896. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016845, ts 019520, len 000160)
  897. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016846, ts 019680, len 000160)
  898. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016847, ts 019840, len 000160)
  899. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016848, ts 020000, len 000160)
  900. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016849, ts 020160, len 000160)
  901. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016850, ts 020320, len 000160)
  902. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016851, ts 020480, len 000160)
  903. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016852, ts 020640, len 000160)
  904. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016853, ts 020800, len 000160)
  905. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016854, ts 020960, len 000160)
  906. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016855, ts 021120, len 000160)
  907. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016856, ts 021280, len 000160)
  908. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016857, ts 021440, len 000160)
  909. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016858, ts 021600, len 000160)
  910. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016859, ts 021760, len 000160)
  911. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016860, ts 021920, len 000160)
  912. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016861, ts 022080, len 000160)
  913. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016862, ts 022240, len 000160)
  914. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016863, ts 022400, len 000160)
  915. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016864, ts 022560, len 000160)
  916. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016865, ts 022720, len 000160)
  917. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016866, ts 022880, len 000160)
  918. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016867, ts 023040, len 000160)
  919. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016868, ts 023200, len 000160)
  920. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016869, ts 023360, len 000160)
  921. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016870, ts 023520, len 000160)
  922. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016871, ts 023680, len 000160)
  923. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016872, ts 023840, len 000160)
  924. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016873, ts 024000, len 000160)
  925. [Feb 6 12:19:44] DEBUG[26738] res_pjsip/pjsip_message_ip_updater.c: Re-wrote Contact URI host/port to 192.168.178.207:5060
  926. [Feb 6 12:19:44] DEBUG[26738] netsock2.c: Splitting '217.0.23.100' into...
  927. [Feb 6 12:19:44] DEBUG[26738] netsock2.c: ...host '217.0.23.100' and port ''.
  928. [Feb 6 12:19:44] DEBUG[26738] netsock2.c: Splitting '192.168.178.207:5060' into...
  929. [Feb 6 12:19:44] DEBUG[26738] netsock2.c: ...host '192.168.178.207' and port '5060'.
  930. [Feb 6 12:19:44] DEBUG[26738] netsock2.c: Splitting '217.0.23.100:5060' into...
  931. [Feb 6 12:19:44] DEBUG[26738] netsock2.c: ...host '217.0.23.100' and port '5060'.
  932. [Feb 6 12:19:44] VERBOSE[26738] res_pjsip_logger.c: <--- Transmitting SIP response (1052 bytes) to UDP:217.0.23.100:5060 --->
  933. SIP/2.0 200 OK
  934. Via: SIP/2.0/UDP 217.0.23.100:5060;rport=5060;received=217.0.23.100;branch=z9hG4bKg3Zqkv7ijkbxxbc692yfufbk4mtrmvrod
  935. Record-Route: <sip:217.0.23.100;transport=udp;lr>
  936. Call-ID: p65557t1486379981m82206c1466138592s2
  937. From: <sip:+491733538874@tmobile.de;user=phone>;tag=h7g4Esbg_p65557t1486379981m82206c1466138592s1_3469095225-1307338939
  938. To: <sip:+4922528301470@tel.t-online.de;user=phone>;tag=c65cd906-bd67-4407-985e-c9b4fe152638
  939. CSeq: 1 INVITE
  940. Server: LasRamblas
  941. Contact: <sip:217.89.10.41:5060>
  942. Allow: OPTIONS, SUBSCRIBE, NOTIFY, PUBLISH, INVITE, ACK, BYE, CANCEL, UPDATE, PRACK, REGISTER, MESSAGE, REFER
  943. Supported: 100rel, timer, replaces, norefersub
  944. Session-Expires: 1800;refresher=uac
  945. Require: timer
  946. Content-Type: application/sdp
  947. Content-Length: 268
  948.  
  949. v=0
  950. o=- 1842643782 3469094971 IN IP4 192.168.178.207
  951. s=Asterisk
  952. c=IN IP4 vpn.bucholzki.de
  953. t=0 0
  954. m=audio 30184 RTP/AVP 9 8 101
  955. a=rtpmap:9 G722/8000
  956. a=rtpmap:8 PCMA/8000
  957. a=rtpmap:101 telephone-event/8000
  958. a=fmtp:101 0-16
  959. a=ptime:20
  960. a=maxptime:150
  961. a=sendrecv
  962.  
  963. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016874, ts 024160, len 000160)
  964. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016875, ts 024320, len 000160)
  965. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016876, ts 024480, len 000160)
  966. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016877, ts 024640, len 000160)
  967. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016878, ts 024800, len 000160)
  968. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016879, ts 024960, len 000160)
  969. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016880, ts 025120, len 000160)
  970. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016881, ts 025280, len 000160)
  971. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016882, ts 025440, len 000160)
  972. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016883, ts 025600, len 000160)
  973. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016884, ts 025760, len 000160)
  974. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016885, ts 025920, len 000160)
  975. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016886, ts 026080, len 000160)
  976. [Feb 6 12:19:44] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016887, ts 026240, len 000160)
  977. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016888, ts 026400, len 000160)
  978. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016889, ts 026560, len 000160)
  979. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016890, ts 026720, len 000160)
  980. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016891, ts 026880, len 000160)
  981. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016892, ts 027040, len 000160)
  982. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016893, ts 027200, len 000160)
  983. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016894, ts 027360, len 000160)
  984. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016895, ts 027520, len 000160)
  985. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016896, ts 027680, len 000160)
  986. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016897, ts 027840, len 000160)
  987. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016898, ts 028000, len 000160)
  988. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016899, ts 028160, len 000160)
  989. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016900, ts 028320, len 000160)
  990. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016901, ts 028480, len 000160)
  991. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016902, ts 028640, len 000160)
  992. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016903, ts 028800, len 000160)
  993. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016904, ts 028960, len 000160)
  994. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016905, ts 029120, len 000160)
  995. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016906, ts 029280, len 000160)
  996. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016907, ts 029440, len 000160)
  997. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016908, ts 029600, len 000160)
  998. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016909, ts 029760, len 000160)
  999. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016910, ts 029920, len 000160)
  1000. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016911, ts 030080, len 000160)
  1001. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016912, ts 030240, len 000160)
  1002. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016913, ts 030400, len 000160)
  1003. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016914, ts 030560, len 000160)
  1004. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016915, ts 030720, len 000160)
  1005. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016916, ts 030880, len 000160)
  1006. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016917, ts 031040, len 000160)
  1007. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016918, ts 031200, len 000160)
  1008. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016919, ts 031360, len 000160)
  1009. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016920, ts 031520, len 000160)
  1010. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016921, ts 031680, len 000160)
  1011. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016922, ts 031840, len 000160)
  1012. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016923, ts 032000, len 000160)
  1013. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016924, ts 032160, len 000160)
  1014. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016925, ts 032320, len 000160)
  1015. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016926, ts 032480, len 000160)
  1016. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016927, ts 032640, len 000160)
  1017. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016928, ts 032800, len 000160)
  1018. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016929, ts 032960, len 000160)
  1019. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016930, ts 033120, len 000160)
  1020. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016931, ts 033280, len 000160)
  1021. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016932, ts 033440, len 000160)
  1022. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016933, ts 033600, len 000160)
  1023. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016934, ts 033760, len 000160)
  1024. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016935, ts 033920, len 000160)
  1025. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016936, ts 034080, len 000160)
  1026. [Feb 6 12:19:45] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016937, ts 034240, len 000160)
  1027. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016938, ts 034400, len 000160)
  1028. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016939, ts 034560, len 000160)
  1029. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016940, ts 034720, len 000160)
  1030. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016941, ts 034880, len 000160)
  1031. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016942, ts 035040, len 000160)
  1032. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016943, ts 035200, len 000160)
  1033. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016944, ts 035360, len 000160)
  1034. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016945, ts 035520, len 000160)
  1035. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016946, ts 035680, len 000160)
  1036. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016947, ts 035840, len 000160)
  1037. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016948, ts 036000, len 000160)
  1038. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016949, ts 036160, len 000160)
  1039. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016950, ts 036320, len 000160)
  1040. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016951, ts 036480, len 000160)
  1041. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016952, ts 036640, len 000160)
  1042. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016953, ts 036800, len 000160)
  1043. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016954, ts 036960, len 000160)
  1044. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016955, ts 037120, len 000160)
  1045. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016956, ts 037280, len 000160)
  1046. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016957, ts 037440, len 000160)
  1047. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016958, ts 037600, len 000160)
  1048. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016959, ts 037760, len 000160)
  1049. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016960, ts 037920, len 000160)
  1050. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016961, ts 038080, len 000160)
  1051. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016962, ts 038240, len 000160)
  1052. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016963, ts 038400, len 000160)
  1053. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016964, ts 038560, len 000160)
  1054. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016965, ts 038720, len 000160)
  1055. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016966, ts 038880, len 000160)
  1056. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016967, ts 039040, len 000160)
  1057. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016968, ts 039200, len 000160)
  1058. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016969, ts 039360, len 000160)
  1059. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016970, ts 039520, len 000160)
  1060. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016971, ts 039680, len 000160)
  1061. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016972, ts 039840, len 000160)
  1062. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016973, ts 040000, len 000160)
  1063. [Feb 6 12:19:46] DEBUG[26780] netsock2.c: Splitting '192.168.178.207:30185' into...
  1064. [Feb 6 12:19:46] DEBUG[26780] netsock2.c: ...host '192.168.178.207' and port '30185'.
  1065. [Feb 6 12:19:46] DEBUG[26780] netsock2.c: Splitting '217.0.4.199:19737' into...
  1066. [Feb 6 12:19:46] DEBUG[26780] netsock2.c: ...host '217.0.4.199' and port '19737'.
  1067. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016974, ts 040160, len 000160)
  1068. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016975, ts 040320, len 000160)
  1069. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016976, ts 040480, len 000160)
  1070. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016977, ts 040640, len 000160)
  1071. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016978, ts 040800, len 000160)
  1072. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016979, ts 040960, len 000160)
  1073. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016980, ts 041120, len 000160)
  1074. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016981, ts 041280, len 000160)
  1075. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016982, ts 041440, len 000160)
  1076. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016983, ts 041600, len 000160)
  1077. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016984, ts 041760, len 000160)
  1078. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016985, ts 041920, len 000160)
  1079. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016986, ts 042080, len 000160)
  1080. [Feb 6 12:19:46] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016987, ts 042240, len 000160)
  1081. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016988, ts 042400, len 000160)
  1082. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016989, ts 042560, len 000160)
  1083. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016990, ts 042720, len 000160)
  1084. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016991, ts 042880, len 000160)
  1085. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016992, ts 043040, len 000160)
  1086. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016993, ts 043200, len 000160)
  1087. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016994, ts 043360, len 000160)
  1088. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016995, ts 043520, len 000160)
  1089. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016996, ts 043680, len 000160)
  1090. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016997, ts 043840, len 000160)
  1091. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016998, ts 044000, len 000160)
  1092. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 016999, ts 044160, len 000160)
  1093. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 017000, ts 044320, len 000160)
  1094. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 017001, ts 044480, len 000160)
  1095. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 017002, ts 044640, len 000160)
  1096. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 017003, ts 044800, len 000160)
  1097. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 017004, ts 044960, len 000160)
  1098. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 017005, ts 045120, len 000160)
  1099. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 017006, ts 045235, len 000115)
  1100. [Feb 6 12:19:47] DEBUG[26876][C-00000004] channel.c: Scheduling timer at (70 requested / 70 actual) timer ticks per second
  1101. [Feb 6 12:19:47] DEBUG[26876][C-00000004] channel.c: Scheduling timer at (0 requested / 0 actual) timer ticks per second
  1102. [Feb 6 12:19:47] DEBUG[26876][C-00000004] channel.c: Scheduling timer at (0 requested / 0 actual) timer ticks per second
  1103. [Feb 6 12:19:47] DEBUG[26876][C-00000004] channel.c: Scheduling timer at (0 requested / 0 actual) timer ticks per second
  1104. [Feb 6 12:19:47] DEBUG[26876][C-00000004] app.c: Locked path '/var/spool/asterisk/voicemail/voicemail/29/INBOX'
  1105. [Feb 6 12:19:47] DEBUG[26876][C-00000004] app.c: Unlocked path '/var/spool/asterisk/voicemail/voicemail/29/INBOX'
  1106. [Feb 6 12:19:47] DEBUG[26876][C-00000004] media_cache.c: Failed to obtain media at 'beep'
  1107. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 017007, ts 045395, len 000160)
  1108. [Feb 6 12:19:47] DEBUG[26876][C-00000004] channel.c: Scheduling timer at (50 requested / 50 actual) timer ticks per second
  1109. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] file.c: <PJSIP/Telekom_in-00000004> Playing 'beep.g722' (language 'en')
  1110. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 017008, ts 045555, len 000160)
  1111. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 017009, ts 045715, len 000160)
  1112. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 017010, ts 045875, len 000160)
  1113. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 017011, ts 046035, len 000160)
  1114. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 017012, ts 046195, len 000160)
  1115. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 017013, ts 046355, len 000160)
  1116. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 017014, ts 046515, len 000160)
  1117. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 017015, ts 046675, len 000160)
  1118. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 017016, ts 046835, len 000160)
  1119. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 017017, ts 046995, len 000160)
  1120. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 017018, ts 047155, len 000160)
  1121. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 017019, ts 047315, len 000160)
  1122. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 017020, ts 047475, len 000160)
  1123. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 017021, ts 047635, len 000160)
  1124. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 017022, ts 047795, len 000160)
  1125. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 017023, ts 047955, len 000160)
  1126. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 017024, ts 048115, len 000160)
  1127. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 017025, ts 048275, len 000160)
  1128. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 017026, ts 048435, len 000160)
  1129. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 017027, ts 048595, len 000160)
  1130. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] res_rtp_asterisk.c: Sent RTP packet to 217.0.4.199:19736 (type 09, seq 017028, ts 048639, len 000044)
  1131. [Feb 6 12:19:47] DEBUG[26876][C-00000004] channel.c: Scheduling timer at (182 requested / 182 actual) timer ticks per second
  1132. [Feb 6 12:19:47] DEBUG[26876][C-00000004] channel.c: Scheduling timer at (0 requested / 0 actual) timer ticks per second
  1133. [Feb 6 12:19:47] DEBUG[26876][C-00000004] channel.c: Scheduling timer at (0 requested / 0 actual) timer ticks per second
  1134. [Feb 6 12:19:47] DEBUG[26876][C-00000004] channel.c: Scheduling timer at (0 requested / 0 actual) timer ticks per second
  1135. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] app_voicemail.c: Recording the message
  1136. [Feb 6 12:19:47] DEBUG[26876][C-00000004] app.c: play_and_record: <None>, /var/spool/asterisk/voicemail/voicemail/29/tmp/h7nfIA, 'wav'
  1137. [Feb 6 12:19:47] DEBUG[26876][C-00000004] app.c: Recording Formats: sfmts=wav
  1138. [Feb 6 12:19:47] VERBOSE[26876][C-00000004] app.c: x=0, open writing: /var/spool/asterisk/voicemail/voicemail/29/tmp/h7nfIA format: wav, 0x292672c
  1139. [Feb 6 12:19:47] DEBUG[26876][C-00000004] dsp.c: Setup tone 1100 Hz, 500 ms, block_size=160, hits_required=21
  1140. [Feb 6 12:19:47] DEBUG[26876][C-00000004] dsp.c: Setup tone 2100 Hz, 2600 ms, block_size=160, hits_required=116
  1141. [Feb 6 12:19:47] DEBUG[26876][C-00000004] channel.c: Channel PJSIP/Telekom_in-00000004 setting read format path: alaw -> slin
  1142. [Feb 6 12:19:48] DEBUG[26738] res_pjsip/pjsip_message_ip_updater.c: Re-wrote Contact URI host/port to 192.168.178.207:5060
  1143. [Feb 6 12:19:48] DEBUG[26738] netsock2.c: Splitting '217.0.23.100' into...
  1144. [Feb 6 12:19:48] DEBUG[26738] netsock2.c: ...host '217.0.23.100' and port ''.
  1145. [Feb 6 12:19:48] DEBUG[26738] netsock2.c: Splitting '192.168.178.207:5060' into...
  1146. [Feb 6 12:19:48] DEBUG[26738] netsock2.c: ...host '192.168.178.207' and port '5060'.
  1147. [Feb 6 12:19:48] DEBUG[26738] netsock2.c: Splitting '217.0.23.100:5060' into...
  1148. [Feb 6 12:19:48] DEBUG[26738] netsock2.c: ...host '217.0.23.100' and port '5060'.
  1149. [Feb 6 12:19:48] VERBOSE[26738] res_pjsip_logger.c: <--- Transmitting SIP response (1052 bytes) to UDP:217.0.23.100:5060 --->
  1150. SIP/2.0 200 OK
  1151. Via: SIP/2.0/UDP 217.0.23.100:5060;rport=5060;received=217.0.23.100;branch=z9hG4bKg3Zqkv7ijkbxxbc692yfufbk4mtrmvrod
  1152. Record-Route: <sip:217.0.23.100;transport=udp;lr>
  1153. Call-ID: p65557t1486379981m82206c1466138592s2
  1154. From: <sip:+491733538874@tmobile.de;user=phone>;tag=h7g4Esbg_p65557t1486379981m82206c1466138592s1_3469095225-1307338939
  1155. To: <sip:+4922528301470@tel.t-online.de;user=phone>;tag=c65cd906-bd67-4407-985e-c9b4fe152638
  1156. CSeq: 1 INVITE
  1157. Server: LasRamblas
  1158. Contact: <sip:217.89.10.41:5060>
  1159. Allow: OPTIONS, SUBSCRIBE, NOTIFY, PUBLISH, INVITE, ACK, BYE, CANCEL, UPDATE, PRACK, REGISTER, MESSAGE, REFER
  1160. Supported: 100rel, timer, replaces, norefersub
  1161. Session-Expires: 1800;refresher=uac
  1162. Require: timer
  1163. Content-Type: application/sdp
  1164. Content-Length: 268
  1165.  
  1166. v=0
  1167. o=- 1842643782 3469094971 IN IP4 192.168.178.207
  1168. s=Asterisk
  1169. c=IN IP4 vpn.bucholzki.de
  1170. t=0 0
  1171. m=audio 30184 RTP/AVP 9 8 101
  1172. a=rtpmap:9 G722/8000
  1173. a=rtpmap:8 PCMA/8000
  1174. a=rtpmap:101 telephone-event/8000
  1175. a=fmtp:101 0-16
  1176. a=ptime:20
  1177. a=maxptime:150
  1178. a=sendrecv
  1179.  
  1180. [Feb 6 12:19:49] DEBUG[26876][C-00000004] app.c: One waitfor failed, trying another
  1181. [Feb 6 12:19:51] DEBUG[26780] netsock2.c: Splitting '192.168.178.207:30185' into...
  1182. [Feb 6 12:19:51] DEBUG[26780] netsock2.c: ...host '192.168.178.207' and port '30185'.
  1183. [Feb 6 12:19:51] DEBUG[26780] netsock2.c: Splitting '217.0.4.199:19737' into...
  1184. [Feb 6 12:19:51] DEBUG[26780] netsock2.c: ...host '217.0.4.199' and port '19737'.
  1185. [Feb 6 12:19:51] WARNING[26876][C-00000004] app.c: No audio available on PJSIP/Telekom_in-00000004??
  1186. [Feb 6 12:19:51] VERBOSE[26876][C-00000004] app.c: User hung up
  1187. [Feb 6 12:19:51] DEBUG[26876][C-00000004] channel.c: Channel PJSIP/Telekom_in-00000004 setting read format path: g722 -> g722
  1188. [Feb 6 12:19:51] DEBUG[26876][C-00000004] app.c: Locked path '/var/spool/asterisk/voicemail/voicemail/29/INBOX'
  1189. [Feb 6 12:19:51] DEBUG[26876][C-00000004] media_cache.c: Failed to obtain media at '/var/spool/asterisk/voicemail/voicemail/29/tmp/h7nfIA'
  1190. [Feb 6 12:19:51] DEBUG[26876][C-00000004] app_voicemail.c: /var/spool/asterisk/voicemail/voicemail/29/INBOX map[2] = 1, count = 1
  1191. [Feb 6 12:19:51] DEBUG[26876][C-00000004] app_voicemail.c: /var/spool/asterisk/voicemail/voicemail/29/INBOX map[9] = 1, count = 2
  1192. [Feb 6 12:19:51] DEBUG[26876][C-00000004] app_voicemail.c: /var/spool/asterisk/voicemail/voicemail/29/INBOX map[3] = 1, count = 3
  1193. [Feb 6 12:19:51] DEBUG[26876][C-00000004] app_voicemail.c: /var/spool/asterisk/voicemail/voicemail/29/INBOX map[0] = 1, count = 4
  1194. [Feb 6 12:19:51] DEBUG[26876][C-00000004] app_voicemail.c: /var/spool/asterisk/voicemail/voicemail/29/INBOX map[1] = 1, count = 5
  1195. [Feb 6 12:19:51] DEBUG[26876][C-00000004] app_voicemail.c: /var/spool/asterisk/voicemail/voicemail/29/INBOX map[6] = 1, count = 6
  1196. [Feb 6 12:19:51] DEBUG[26876][C-00000004] app_voicemail.c: /var/spool/asterisk/voicemail/voicemail/29/INBOX map[5] = 1, count = 7
  1197. [Feb 6 12:19:51] DEBUG[26876][C-00000004] app_voicemail.c: /var/spool/asterisk/voicemail/voicemail/29/INBOX map[8] = 1, count = 8
  1198. [Feb 6 12:19:51] DEBUG[26876][C-00000004] app_voicemail.c: /var/spool/asterisk/voicemail/voicemail/29/INBOX map[7] = 1, count = 9
  1199. [Feb 6 12:19:51] DEBUG[26876][C-00000004] app_voicemail.c: /var/spool/asterisk/voicemail/voicemail/29/INBOX map[4] = 1, count = 10
  1200. [Feb 6 12:19:51] DEBUG[26876][C-00000004] app.c: Unlocked path '/var/spool/asterisk/voicemail/voicemail/29/INBOX'
  1201. [Feb 6 12:19:51] DEBUG[26876][C-00000004] media_cache.c: Failed to obtain media at '/var/spool/asterisk/voicemail/voicemail/29/INBOX/msg0010'
  1202. [Feb 6 12:19:51] DEBUG[26876][C-00000004] media_cache.c: Failed to obtain media at '/var/spool/asterisk/voicemail/voicemail/29/INBOX/msg0010'
  1203. [Feb 6 12:19:51] DEBUG[26876][C-00000004] app_voicemail.c: Attaching file '/var/spool/asterisk/voicemail/voicemail/29/INBOX/msg0010', format 'wav', uservm is '2048', global is 2048
  1204. [Feb 6 12:19:51] DEBUG[26876][C-00000004] config.c: Parsing /var/spool/asterisk/voicemail/voicemail/29/INBOX/msg0010.txt
  1205. [Feb 6 12:19:51] VERBOSE[26876][C-00000004] config.c: Parsing '/var/spool/asterisk/voicemail/voicemail/29/INBOX/msg0010.txt': Found
  1206. [Feb 6 12:19:51] DEBUG[26876][C-00000004] app_voicemail.c: creating attachment filename msg0010.wav, no second attachment.
  1207. [Feb 6 12:19:51] DEBUG[26876][C-00000004] app_voicemail.c: Sent mail to janzen.wiebke@googlemail.com with command '/usr/sbin/sendmail -t'
  1208. [Feb 6 12:19:51] DEBUG[26876][C-00000004] app_voicemail.c: Sent page to janzen.wiebke@googlemail.com with command '/usr/sbin/sendmail -t'
  1209. [Feb 6 12:19:51] DEBUG[26876][C-00000004] media_cache.c: Failed to obtain media at '/var/spool/asterisk/voicemail/voicemail/29/INBOX/msg0010'
  1210. [Feb 6 12:19:51] DEBUG[26876][C-00000004] pbx.c: Spawn extension (Telekom_in,022528301470,2) exited non-zero on 'PJSIP/Telekom_in-00000004'
  1211. [Feb 6 12:19:51] VERBOSE[26876][C-00000004] pbx.c: Spawn extension (Telekom_in, 022528301470, 2) exited non-zero on 'PJSIP/Telekom_in-00000004'
  1212. [Feb 6 12:19:51] DEBUG[26876][C-00000004] channel.c: Soft-Hanging (0x10) up channel 'PJSIP/Telekom_in-00000004'
  1213. [Feb 6 12:19:51] DEBUG[26876][C-00000004] channel.c: Hanging up channel 'PJSIP/Telekom_in-00000004'
  1214. [Feb 6 12:19:51] DEBUG[26876][C-00000004] chan_pjsip.c: AST hangup cause 44 (no match found in PJSIP)
  1215. [Feb 6 12:19:51] DEBUG[26821] res_pjsip_session.c: Method is BYE
  1216. [Feb 6 12:19:51] DEBUG[26728] cdr.c: Finalized CDR for PJSIP/Telekom_in-00000004 - start 1486379981.208926 answer 1486379981.213566 end 1486379991.901319 dispo ANSWERED
  1217. [Feb 6 12:19:51] DEBUG[26722] devicestate.c: No provider found, checking channel drivers for PJSIP - Telekom_in
  1218. [Feb 6 12:19:51] DEBUG[26722] devicestate.c: Changing state for PJSIP/Telekom_in - state 5 (Unavailable)
  1219. [Feb 6 12:19:51] DEBUG[26794] app_queue.c: Device 'PJSIP/Telekom_in' changed to state '5' (Unavailable) but we don't care because they're not a member of any queue.
  1220. [Feb 6 12:19:52] DEBUG[26738] res_pjsip/pjsip_message_ip_updater.c: Re-wrote Contact URI host/port to 192.168.178.207:5060
  1221. [Feb 6 12:19:52] DEBUG[26738] netsock2.c: Splitting '217.0.23.100' into...
  1222. [Feb 6 12:19:52] DEBUG[26738] netsock2.c: ...host '217.0.23.100' and port ''.
  1223. [Feb 6 12:19:52] DEBUG[26738] netsock2.c: Splitting '192.168.178.207:5060' into...
  1224. [Feb 6 12:19:52] DEBUG[26738] netsock2.c: ...host '192.168.178.207' and port '5060'.
  1225. [Feb 6 12:19:52] DEBUG[26738] netsock2.c: Splitting '217.0.23.100:5060' into...
  1226. [Feb 6 12:19:52] DEBUG[26738] netsock2.c: ...host '217.0.23.100' and port '5060'.
  1227. [Feb 6 12:19:52] VERBOSE[26738] res_pjsip_logger.c: <--- Transmitting SIP response (1052 bytes) to UDP:217.0.23.100:5060 --->
  1228. SIP/2.0 200 OK
  1229. Via: SIP/2.0/UDP 217.0.23.100:5060;rport=5060;received=217.0.23.100;branch=z9hG4bKg3Zqkv7ijkbxxbc692yfufbk4mtrmvrod
  1230. Record-Route: <sip:217.0.23.100;transport=udp;lr>
  1231. Call-ID: p65557t1486379981m82206c1466138592s2
  1232. From: <sip:+491733538874@tmobile.de;user=phone>;tag=h7g4Esbg_p65557t1486379981m82206c1466138592s1_3469095225-1307338939
  1233. To: <sip:+4922528301470@tel.t-online.de;user=phone>;tag=c65cd906-bd67-4407-985e-c9b4fe152638
  1234. CSeq: 1 INVITE
  1235. Server: LasRamblas
  1236. Contact: <sip:217.89.10.41:5060>
  1237. Allow: OPTIONS, SUBSCRIBE, NOTIFY, PUBLISH, INVITE, ACK, BYE, CANCEL, UPDATE, PRACK, REGISTER, MESSAGE, REFER
  1238. Supported: 100rel, timer, replaces, norefersub
  1239. Session-Expires: 1800;refresher=uac
  1240. Require: timer
  1241. Content-Type: application/sdp
  1242. Content-Length: 268
  1243.  
  1244. v=0
  1245. o=- 1842643782 3469094971 IN IP4 192.168.178.207
  1246. s=Asterisk
  1247. c=IN IP4 vpn.bucholzki.de
  1248. t=0 0
  1249. m=audio 30184 RTP/AVP 9 8 101
  1250. a=rtpmap:9 G722/8000
  1251. a=rtpmap:8 PCMA/8000
  1252. a=rtpmap:101 telephone-event/8000
  1253. a=fmtp:101 0-16
  1254. a=ptime:20
  1255. a=maxptime:150
  1256. a=sendrecv
  1257.  
  1258. [Feb 6 12:19:56] DEBUG[26738] res_pjsip/pjsip_message_ip_updater.c: Re-wrote Contact URI host/port to 192.168.178.207:5060
  1259. [Feb 6 12:19:56] DEBUG[26738] netsock2.c: Splitting '217.0.23.100' into...
  1260. [Feb 6 12:19:56] DEBUG[26738] netsock2.c: ...host '217.0.23.100' and port ''.
  1261. [Feb 6 12:19:56] DEBUG[26738] netsock2.c: Splitting '192.168.178.207:5060' into...
  1262. [Feb 6 12:19:56] DEBUG[26738] netsock2.c: ...host '192.168.178.207' and port '5060'.
  1263. [Feb 6 12:19:56] DEBUG[26738] netsock2.c: Splitting '217.0.23.100:5060' into...
  1264. [Feb 6 12:19:56] DEBUG[26738] netsock2.c: ...host '217.0.23.100' and port '5060'.
  1265. [Feb 6 12:19:56] VERBOSE[26738] res_pjsip_logger.c: <--- Transmitting SIP response (1052 bytes) to UDP:217.0.23.100:5060 --->
  1266. SIP/2.0 200 OK
  1267. Via: SIP/2.0/UDP 217.0.23.100:5060;rport=5060;received=217.0.23.100;branch=z9hG4bKg3Zqkv7ijkbxxbc692yfufbk4mtrmvrod
  1268. Record-Route: <sip:217.0.23.100;transport=udp;lr>
  1269. Call-ID: p65557t1486379981m82206c1466138592s2
  1270. From: <sip:+491733538874@tmobile.de;user=phone>;tag=h7g4Esbg_p65557t1486379981m82206c1466138592s1_3469095225-1307338939
  1271. To: <sip:+4922528301470@tel.t-online.de;user=phone>;tag=c65cd906-bd67-4407-985e-c9b4fe152638
  1272. CSeq: 1 INVITE
  1273. Server: LasRamblas
  1274. Contact: <sip:217.89.10.41:5060>
  1275. Allow: OPTIONS, SUBSCRIBE, NOTIFY, PUBLISH, INVITE, ACK, BYE, CANCEL, UPDATE, PRACK, REGISTER, MESSAGE, REFER
  1276. Supported: 100rel, timer, replaces, norefersub
  1277. Session-Expires: 1800;refresher=uac
  1278. Require: timer
  1279. Content-Type: application/sdp
  1280. Content-Length: 268
  1281.  
  1282. v=0
  1283. o=- 1842643782 3469094971 IN IP4 192.168.178.207
  1284. s=Asterisk
  1285. c=IN IP4 vpn.bucholzki.de
  1286. t=0 0
  1287. m=audio 30184 RTP/AVP 9 8 101
  1288. a=rtpmap:9 G722/8000
  1289. a=rtpmap:8 PCMA/8000
  1290. a=rtpmap:101 telephone-event/8000
  1291. a=fmtp:101 0-16
  1292. a=ptime:20
  1293. a=maxptime:150
  1294. a=sendrecv
  1295.  
  1296. [Feb 6 12:19:56] DEBUG[26780] netsock2.c: Splitting '192.168.178.207:30185' into...
  1297. [Feb 6 12:19:56] DEBUG[26780] netsock2.c: ...host '192.168.178.207' and port '30185'.
  1298. [Feb 6 12:19:56] DEBUG[26780] netsock2.c: Splitting '217.0.4.199:19737' into...
  1299. [Feb 6 12:19:56] DEBUG[26780] netsock2.c: ...host '217.0.4.199' and port '19737'.
  1300. [Feb 6 12:19:57] VERBOSE[26738] res_pjsip_logger.c: <--- Received SIP request (527 bytes) from UDP:217.0.23.100:5060 --->
  1301. CANCEL sip:022528301470@192.168.178.207:5060 SIP/2.0
  1302. Max-Forwards: 51
  1303. Via: SIP/2.0/UDP 217.0.23.100:5060;branch=z9hG4bKg3Zqkv7ijkbxxbc692yfufbk4mtrmvrod
  1304. To: <sip:+4922528301470@tel.t-online.de;user=phone>
  1305. From: <sip:+491733538874@tmobile.de;user=phone>;tag=h7g4Esbg_p65557t1486379981m82206c1466138592s1_3469095225-1307338939
  1306. Call-ID: p65557t1486379981m82206c1466138592s2
  1307. CSeq: 1 CANCEL
  1308. Record-Route: <sip:217.0.23.100;transport=udp;lr>
  1309. Supported: timer
  1310. Supported: histinfo
  1311. Supported: norefersub
  1312. Content-Length: 0
  1313.  
  1314.  
  1315. [Feb 6 12:19:57] DEBUG[26738] netsock2.c: Splitting '217.0.23.100:5060' into...
  1316. [Feb 6 12:19:57] DEBUG[26738] netsock2.c: ...host '217.0.23.100' and port '5060'.
  1317. [Feb 6 12:19:57] DEBUG[26738] netsock2.c: Splitting '192.168.178.207:5060' into...
  1318. [Feb 6 12:19:57] DEBUG[26738] netsock2.c: ...host '192.168.178.207' and port '5060'.
  1319. [Feb 6 12:19:57] DEBUG[26738] netsock2.c: Splitting '217.0.23.100' into...
  1320. [Feb 6 12:19:57] DEBUG[26738] netsock2.c: ...host '217.0.23.100' and port ''.
  1321. [Feb 6 12:19:57] DEBUG[26738] res_pjsip/pjsip_distributor.c: Searching for serializer on dialog dlg0x7600898c for Request msg CANCEL/cseq=1 (rdata0x71c45104)
  1322. [Feb 6 12:19:57] DEBUG[26738] res_pjsip/pjsip_distributor.c: Found serializer pjsip/distributor-00000025 on dialog dlg0x7600898c
  1323. [Feb 6 12:19:57] DEBUG[26821] res_pjsip_session.c: Function session_inv_on_tsx_state_changed called on event TSX_STATE
  1324. [Feb 6 12:19:57] DEBUG[26821] res_pjsip_session.c: The state change pertains to the endpoint 'Telekom_in()'
  1325. [Feb 6 12:19:57] DEBUG[26821] res_pjsip_session.c: The inv session still has an invite_tsx (0x7601860c)
  1326. [Feb 6 12:19:57] DEBUG[26821] res_pjsip_session.c: The UAS CANCEL transaction involved in this state change is 0x760110cc
  1327. [Feb 6 12:19:57] DEBUG[26821] res_pjsip_session.c: The current transaction state is Trying
  1328. [Feb 6 12:19:57] DEBUG[26821] res_pjsip_session.c: The transaction state change event is RX_MSG
  1329. [Feb 6 12:19:57] DEBUG[26821] res_pjsip_session.c: The current inv state is CONNECTING
  1330. [Feb 6 12:19:57] DEBUG[26821] res_pjsip_session.c: Received request
  1331. [Feb 6 12:19:57] DEBUG[26821] res_pjsip_session.c: Method is CANCEL
  1332. [Feb 6 12:19:57] DEBUG[26821] netsock2.c: Splitting '217.0.23.100' into...
  1333. [Feb 6 12:19:57] DEBUG[26821] netsock2.c: ...host '217.0.23.100' and port ''.
  1334. [Feb 6 12:19:57] DEBUG[26821] netsock2.c: Splitting '192.168.178.207:5060' into...
  1335. [Feb 6 12:19:57] DEBUG[26821] netsock2.c: ...host '192.168.178.207' and port '5060'.
  1336. [Feb 6 12:19:57] DEBUG[26821] netsock2.c: Splitting '217.0.23.100:5060' into...
  1337. [Feb 6 12:19:57] DEBUG[26821] netsock2.c: ...host '217.0.23.100' and port '5060'.
  1338. [Feb 6 12:19:57] VERBOSE[26821] res_pjsip_logger.c: <--- Transmitting SIP response (504 bytes) to UDP:217.0.23.100:5060 --->
  1339. SIP/2.0 200 OK
  1340. Via: SIP/2.0/UDP 217.0.23.100:5060;rport=5060;received=217.0.23.100;branch=z9hG4bKg3Zqkv7ijkbxxbc692yfufbk4mtrmvrod
  1341. Record-Route: <sip:217.0.23.100;transport=udp;lr>
  1342. Call-ID: p65557t1486379981m82206c1466138592s2
  1343. From: <sip:+491733538874@tmobile.de;user=phone>;tag=h7g4Esbg_p65557t1486379981m82206c1466138592s1_3469095225-1307338939
  1344. To: <sip:+4922528301470@tel.t-online.de;user=phone>;tag=c65cd906-bd67-4407-985e-c9b4fe152638
  1345. CSeq: 1 CANCEL
  1346. Server: LasRamblas
  1347. Content-Length: 0
  1348.  
  1349.  
  1350. [Feb 6 12:19:57] DEBUG[26821] res_pjsip_session.c: Function session_inv_on_tsx_state_changed called on event TSX_STATE
  1351. [Feb 6 12:19:57] DEBUG[26821] res_pjsip_session.c: The state change pertains to the endpoint 'Telekom_in()'
  1352. [Feb 6 12:19:57] DEBUG[26821] res_pjsip_session.c: The inv session still has an invite_tsx (0x7601860c)
  1353. [Feb 6 12:19:57] DEBUG[26821] res_pjsip_session.c: The UAS CANCEL transaction involved in this state change is 0x760110cc
  1354. [Feb 6 12:19:57] DEBUG[26821] res_pjsip_session.c: The current transaction state is Completed
  1355. [Feb 6 12:19:57] DEBUG[26821] res_pjsip_session.c: The transaction state change event is TX_MSG
  1356. [Feb 6 12:19:57] DEBUG[26821] res_pjsip_session.c: The current inv state is CONNECTING
  1357. [Feb 6 12:19:59] DEBUG[26875] threadpool.c: Worker thread idle timeout reached. Dying.
  1358. [Feb 6 12:19:59] DEBUG[26711] threadpool.c: Destroying worker thread 54
  1359. [Feb 6 12:20:00] DEBUG[26738] res_pjsip/pjsip_message_ip_updater.c: Re-wrote Contact URI host/port to 192.168.178.207:5060
  1360. [Feb 6 12:20:00] DEBUG[26738] netsock2.c: Splitting '217.0.23.100' into...
  1361. [Feb 6 12:20:00] DEBUG[26738] netsock2.c: ...host '217.0.23.100' and port ''.
  1362. [Feb 6 12:20:00] DEBUG[26738] netsock2.c: Splitting '192.168.178.207:5060' into...
  1363. [Feb 6 12:20:00] DEBUG[26738] netsock2.c: ...host '192.168.178.207' and port '5060'.
  1364. [Feb 6 12:20:00] DEBUG[26738] netsock2.c: Splitting '217.0.23.100:5060' into...
  1365. [Feb 6 12:20:00] DEBUG[26738] netsock2.c: ...host '217.0.23.100' and port '5060'.
  1366. [Feb 6 12:20:00] VERBOSE[26738] res_pjsip_logger.c: <--- Transmitting SIP response (1052 bytes) to UDP:217.0.23.100:5060 --->
  1367. SIP/2.0 200 OK
  1368. Via: SIP/2.0/UDP 217.0.23.100:5060;rport=5060;received=217.0.23.100;branch=z9hG4bKg3Zqkv7ijkbxxbc692yfufbk4mtrmvrod
  1369. Record-Route: <sip:217.0.23.100;transport=udp;lr>
  1370. Call-ID: p65557t1486379981m82206c1466138592s2
  1371. From: <sip:+491733538874@tmobile.de;user=phone>;tag=h7g4Esbg_p65557t1486379981m82206c1466138592s1_3469095225-1307338939
  1372. To: <sip:+4922528301470@tel.t-online.de;user=phone>;tag=c65cd906-bd67-4407-985e-c9b4fe152638
  1373. CSeq: 1 INVITE
  1374. Server: LasRamblas
  1375. Contact: <sip:217.89.10.41:5060>
  1376. Allow: OPTIONS, SUBSCRIBE, NOTIFY, PUBLISH, INVITE, ACK, BYE, CANCEL, UPDATE, PRACK, REGISTER, MESSAGE, REFER
  1377. Supported: 100rel, timer, replaces, norefersub
  1378. Session-Expires: 1800;refresher=uac
  1379. Require: timer
  1380. Content-Type: application/sdp
  1381. Content-Length: 268
  1382.  
  1383. v=0
  1384. o=- 1842643782 3469094971 IN IP4 192.168.178.207
  1385. s=Asterisk
  1386. c=IN IP4 vpn.bucholzki.de
  1387. t=0 0
  1388. m=audio 30184 RTP/AVP 9 8 101
  1389. a=rtpmap:9 G722/8000
  1390. a=rtpmap:8 PCMA/8000
  1391. a=rtpmap:101 telephone-event/8000
  1392. a=fmtp:101 0-16
  1393. a=ptime:20
  1394. a=maxptime:150
  1395. a=sendrecv
  1396.  
  1397. [Feb 6 12:20:01] DEBUG[26780] netsock2.c: Splitting '192.168.178.207:30185' into...
  1398. [Feb 6 12:20:01] DEBUG[26780] netsock2.c: ...host '192.168.178.207' and port '30185'.
  1399. [Feb 6 12:20:01] DEBUG[26780] netsock2.c: Splitting '217.0.4.199:19737' into...
  1400. [Feb 6 12:20:01] DEBUG[26780] netsock2.c: ...host '217.0.4.199' and port '19737'.
  1401. [Feb 6 12:20:04] VERBOSE[26738] res_pjsip_logger.c: <--- Transmitting SIP response (1052 bytes) to UDP:217.0.23.100:5060 --->
  1402. SIP/2.0 200 OK
  1403. Via: SIP/2.0/UDP 217.0.23.100:5060;rport=5060;received=217.0.23.100;branch=z9hG4bKg3Zqkv7ijkbxxbc692yfufbk4mtrmvrod
  1404. Record-Route: <sip:217.0.23.100;transport=udp;lr>
  1405. Call-ID: p65557t1486379981m82206c1466138592s2
  1406. From: <sip:+491733538874@tmobile.de;user=phone>;tag=h7g4Esbg_p65557t1486379981m82206c1466138592s1_3469095225-1307338939
  1407. To: <sip:+4922528301470@tel.t-online.de;user=phone>;tag=c65cd906-bd67-4407-985e-c9b4fe152638
  1408. CSeq: 1 INVITE
  1409. Server: LasRamblas
  1410. Contact: <sip:217.89.10.41:5060>
  1411. Allow: OPTIONS, SUBSCRIBE, NOTIFY, PUBLISH, INVITE, ACK, BYE, CANCEL, UPDATE, PRACK, REGISTER, MESSAGE, REFER
  1412. Supported: 100rel, timer, replaces, norefersub
  1413. Session-Expires: 1800;refresher=uac
  1414. Require: timer
  1415. Content-Type: application/sdp
  1416. Content-Length: 268
  1417.  
  1418. v=0
  1419. o=- 1842643782 3469094971 IN IP4 192.168.178.207
  1420. s=Asterisk
  1421. c=IN IP4 vpn.bucholzki.de
  1422. t=0 0
  1423. m=audio 30184 RTP/AVP 9 8 101
  1424. a=rtpmap:9 G722/8000
  1425. a=rtpmap:8 PCMA/8000
  1426. a=rtpmap:101 telephone-event/8000
  1427. a=fmtp:101 0-16
  1428. a=ptime:20
  1429. a=maxptime:150
  1430. a=sendrecv
  1431.  
  1432. [Feb 6 12:20:08] VERBOSE[26738] res_pjsip_logger.c: <--- Transmitting SIP response (1052 bytes) to UDP:217.0.23.100:5060 --->
  1433. SIP/2.0 200 OK
  1434. Via: SIP/2.0/UDP 217.0.23.100:5060;rport=5060;received=217.0.23.100;branch=z9hG4bKg3Zqkv7ijkbxxbc692yfufbk4mtrmvrod
  1435. Record-Route: <sip:217.0.23.100;transport=udp;lr>
  1436. Call-ID: p65557t1486379981m82206c1466138592s2
  1437. From: <sip:+491733538874@tmobile.de;user=phone>;tag=h7g4Esbg_p65557t1486379981m82206c1466138592s1_3469095225-1307338939
  1438. To: <sip:+4922528301470@tel.t-online.de;user=phone>;tag=c65cd906-bd67-4407-985e-c9b4fe152638
  1439. CSeq: 1 INVITE
  1440. Server: LasRamblas
  1441. Contact: <sip:217.89.10.41:5060>
  1442. Allow: OPTIONS, SUBSCRIBE, NOTIFY, PUBLISH, INVITE, ACK, BYE, CANCEL, UPDATE, PRACK, REGISTER, MESSAGE, REFER
  1443. Supported: 100rel, timer, replaces, norefersub
  1444. Session-Expires: 1800;refresher=uac
  1445. Require: timer
  1446. Content-Type: application/sdp
  1447. Content-Length: 268
  1448.  
  1449. v=0
  1450. o=- 1842643782 3469094971 IN IP4 192.168.178.207
  1451. s=Asterisk
  1452. c=IN IP4 vpn.bucholzki.de
  1453. t=0 0
  1454. m=audio 30184 RTP/AVP 9 8 101
  1455. a=rtpmap:9 G722/8000
  1456. a=rtpmap:8 PCMA/8000
  1457. a=rtpmap:101 telephone-event/8000
  1458. a=fmtp:101 0-16
  1459. a=ptime:20
  1460. a=maxptime:150
  1461. a=sendrecv
  1462.  
  1463. [Feb 6 12:20:12] VERBOSE[26738] res_pjsip_logger.c: <--- Transmitting SIP response (1052 bytes) to UDP:217.0.23.100:5060 --->
  1464. SIP/2.0 200 OK
  1465. Via: SIP/2.0/UDP 217.0.23.100:5060;rport=5060;received=217.0.23.100;branch=z9hG4bKg3Zqkv7ijkbxxbc692yfufbk4mtrmvrod
  1466. Record-Route: <sip:217.0.23.100;transport=udp;lr>
  1467. Call-ID: p65557t1486379981m82206c1466138592s2
  1468. From: <sip:+491733538874@tmobile.de;user=phone>;tag=h7g4Esbg_p65557t1486379981m82206c1466138592s1_3469095225-1307338939
  1469. To: <sip:+4922528301470@tel.t-online.de;user=phone>;tag=c65cd906-bd67-4407-985e-c9b4fe152638
  1470. CSeq: 1 INVITE
  1471. Server: LasRamblas
  1472. Contact: <sip:217.89.10.41:5060>
  1473. Allow: OPTIONS, SUBSCRIBE, NOTIFY, PUBLISH, INVITE, ACK, BYE, CANCEL, UPDATE, PRACK, REGISTER, MESSAGE, REFER
  1474. Supported: 100rel, timer, replaces, norefersub
  1475. Session-Expires: 1800;refresher=uac
  1476. Require: timer
  1477. Content-Type: application/sdp
  1478. Content-Length: 268
  1479.  
  1480. v=0
  1481. o=- 1842643782 3469094971 IN IP4 192.168.178.207
  1482. s=Asterisk
  1483. c=IN IP4 vpn.bucholzki.de
  1484. t=0 0
  1485. m=audio 30184 RTP/AVP 9 8 101
  1486. a=rtpmap:9 G722/8000
  1487. a=rtpmap:8 PCMA/8000
  1488. a=rtpmap:101 telephone-event/8000
  1489. a=fmtp:101 0-16
  1490. a=ptime:20
  1491. a=maxptime:150
  1492. a=sendrecv
  1493.  
  1494. [Feb 6 12:20:13] VERBOSE[26738] res_pjsip_logger.c: <--- Transmitting SIP request (532 bytes) to UDP:217.0.23.100:5060 --->
  1495. BYE sip:sgc_c@217.0.23.100;transport=udp SIP/2.0
  1496. Via: SIP/2.0/UDP 217.89.10.41:5060;rport;branch=z9hG4bKPj9e8e7ec1-d3f8-4325-96de-97940b889c00
  1497. From: <sip:+4922528301470@tel.t-online.de;user=phone>;tag=c65cd906-bd67-4407-985e-c9b4fe152638
  1498. To: <sip:+491733538874@tmobile.de;user=phone>;tag=h7g4Esbg_p65557t1486379981m82206c1466138592s1_3469095225-1307338939
  1499. Call-ID: p65557t1486379981m82206c1466138592s2
  1500. CSeq: 17785 BYE
  1501. Route: <sip:217.0.23.100;transport=udp;lr>
  1502. Max-Forwards: 70
  1503. User-Agent: LasRamblas
  1504. Content-Length: 0
  1505.  
  1506.  
  1507. [Feb 6 12:20:13] VERBOSE[26738] res_pjsip_logger.c: <--- Transmitting SIP request (532 bytes) to UDP:217.0.23.100:5060 --->
  1508. BYE sip:sgc_c@217.0.23.100;transport=udp SIP/2.0
  1509. Via: SIP/2.0/UDP 217.89.10.41:5060;rport;branch=z9hG4bKPj9e8e7ec1-d3f8-4325-96de-97940b889c00
  1510. From: <sip:+4922528301470@tel.t-online.de;user=phone>;tag=c65cd906-bd67-4407-985e-c9b4fe152638
  1511. To: <sip:+491733538874@tmobile.de;user=phone>;tag=h7g4Esbg_p65557t1486379981m82206c1466138592s1_3469095225-1307338939
  1512. Call-ID: p65557t1486379981m82206c1466138592s2
  1513. CSeq: 17785 BYE
  1514. Route: <sip:217.0.23.100;transport=udp;lr>
  1515. Max-Forwards: 70
  1516. User-Agent: LasRamblas
  1517. Content-Length: 0
  1518.  
  1519.  
  1520. [Feb 6 12:20:14] VERBOSE[26738] res_pjsip_logger.c: <--- Transmitting SIP request (532 bytes) to UDP:217.0.23.100:5060 --->
  1521. BYE sip:sgc_c@217.0.23.100;transport=udp SIP/2.0
  1522. Via: SIP/2.0/UDP 217.89.10.41:5060;rport;branch=z9hG4bKPj9e8e7ec1-d3f8-4325-96de-97940b889c00
  1523. From: <sip:+4922528301470@tel.t-online.de;user=phone>;tag=c65cd906-bd67-4407-985e-c9b4fe152638
  1524. To: <sip:+491733538874@tmobile.de;user=phone>;tag=h7g4Esbg_p65557t1486379981m82206c1466138592s1_3469095225-1307338939
  1525. Call-ID: p65557t1486379981m82206c1466138592s2
  1526. CSeq: 17785 BYE
  1527. Route: <sip:217.0.23.100;transport=udp;lr>
  1528. Max-Forwards: 70
  1529. User-Agent: LasRamblas
  1530. Content-Length: 0
  1531.  
  1532.  
  1533. [Feb 6 12:20:16] VERBOSE[26738] res_pjsip_logger.c: <--- Transmitting SIP request (532 bytes) to UDP:217.0.23.100:5060 --->
  1534. BYE sip:sgc_c@217.0.23.100;transport=udp SIP/2.0
  1535. Via: SIP/2.0/UDP 217.89.10.41:5060;rport;branch=z9hG4bKPj9e8e7ec1-d3f8-4325-96de-97940b889c00
  1536. From: <sip:+4922528301470@tel.t-online.de;user=phone>;tag=c65cd906-bd67-4407-985e-c9b4fe152638
  1537. To: <sip:+491733538874@tmobile.de;user=phone>;tag=h7g4Esbg_p65557t1486379981m82206c1466138592s1_3469095225-1307338939
  1538. Call-ID: p65557t1486379981m82206c1466138592s2
  1539. CSeq: 17785 BYE
  1540. Route: <sip:217.0.23.100;transport=udp;lr>
  1541. Max-Forwards: 70
  1542. User-Agent: LasRamblas
  1543. Content-Length: 0
  1544.  
  1545.  
  1546. [Feb 6 12:20:20] VERBOSE[26738] res_pjsip_logger.c: <--- Transmitting SIP request (532 bytes) to UDP:217.0.23.100:5060 --->
  1547. BYE sip:sgc_c@217.0.23.100;transport=udp SIP/2.0
  1548. Via: SIP/2.0/UDP 217.89.10.41:5060;rport;branch=z9hG4bKPj9e8e7ec1-d3f8-4325-96de-97940b889c00
  1549. From: <sip:+4922528301470@tel.t-online.de;user=phone>;tag=c65cd906-bd67-4407-985e-c9b4fe152638
  1550. To: <sip:+491733538874@tmobile.de;user=phone>;tag=h7g4Esbg_p65557t1486379981m82206c1466138592s1_3469095225-1307338939
  1551. Call-ID: p65557t1486379981m82206c1466138592s2
  1552. CSeq: 17785 BYE
  1553. Route: <sip:217.0.23.100;transport=udp;lr>
  1554. Max-Forwards: 70
  1555. User-Agent: LasRamblas
  1556. Content-Length: 0
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement