Advertisement
rasheed_ka

call_foreground_withoutpush

Jan 27th, 2022
75
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 91.86 KB | None | 0 0
  1.  
  2. +OK log level [7]
  3. recv 633 bytes from tls/[117.213.29.4]:38515 at 18:39:37.883467:
  4. ------------------------------------------------------------------------
  5. OPTIONS sip:34.93.139.28 SIP/2.0
  6. Via: SIP/2.0/TLS 192.168.1.2;branch=z9hG4bK-524287-1---f6e7c701b41f89c1;rport
  7. Max-Forwards: 0
  8. Contact: <sip:4002@192.168.1.2;ob;transport=tls>;+sip.instance="<urn:uuid:4b3a26e9-5a70-5d1a-a2df-278ebf2023c0>"
  9. To: <sip:34.93.139.28>
  10. From: "FSTest2"<sip:4002@34.93.139.28>;tag=47a6c68d
  11. Call-ID: 198259_mobile-rel153YWMzZDMyOTZlYTYxNjNhYmJkZTdiZjYzNjI3OGE2MDc
  12. CSeq: 1 OPTIONS
  13. Allow: OPTIONS, INVITE, ACK, CANCEL, BYE, REFER, INFO, NOTIFY, UPDATE, PRACK, SUBSCRIBE, MESSAGE
  14. Supported: outbound, path
  15. User-Agent: XLogix Android 6.6.1 build 129231
  16. X-Connectivity-Probe-V4: 1
  17. Content-Length: 0
  18.  
  19. send 786 bytes to tls/[117.213.29.4]:38515 at 18:39:37.883808:
  20. ------------------------------------------------------------------------
  21. SIP/2.0 200 OK
  22. Via: SIP/2.0/TLS 192.168.1.2;branch=z9hG4bK-524287-1---f6e7c701b41f89c1;rport=38515;received=117.213.29.4
  23. From: "FSTest2"<sip:4002@34.93.139.28>;tag=47a6c68d
  24. To: <sip:34.93.139.28>;tag=9ec2906pBKUgN
  25. Call-ID: 198259_mobile-rel153YWMzZDMyOTZlYTYxNjNhYmJkZTdiZjYzNjI3OGE2MDc
  26. CSeq: 1 OPTIONS
  27. Contact: <sip:34.93.139.28>
  28. User-Agent: FreeSWITCH-mod_sofia/1.10.7-release+git~20211024T163933Z~883d2cb662~64bit
  29. Accept: application/sdp
  30. Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, SUBSCRIBE
  31. Supported: timer, path, replaces
  32. Allow-Events: talk, hold, conference, presence, as-feature-event, dialog, line-seize, call-info, sla, include-session-description, presence.winfo, message-summary, refer
  33. Content-Length: 0
  34.  
  35. recv 669 bytes from tls/[117.213.29.4]:38515 at 18:39:37.925346:
  36. ------------------------------------------------------------------------
  37. REGISTER sip:34.93.139.28 SIP/2.0
  38. Via: SIP/2.0/TLS 192.168.1.2;branch=z9hG4bK-524287-1---54a60e415e7af17a;rport
  39. Max-Forwards: 70
  40. Contact: <sip:4002@192.168.1.2;rinstance=0d42d034c69aa9ca;transport=tls>;+sip.instance="<urn:uuid:4b3a26e9-5a70-5d1a-a2df-278ebf2023c0>";reg-id=1
  41. To: "FSTest2"<sip:4002@34.93.139.28>
  42. From: "FSTest2"<sip:4002@34.93.139.28>;tag=7687b8cf
  43. Call-ID: 198259_mobile-rel153YWY2ZDQyYmU2YjQ2MDc0ZjM3Nzc2ZTA4N2JjZGI0ODY
  44. CSeq: 1 REGISTER
  45. Expires: 900
  46. Allow: OPTIONS, INVITE, ACK, CANCEL, BYE, REFER, INFO, NOTIFY, UPDATE, PRACK, SUBSCRIBE, MESSAGE
  47. Supported: outbound, path
  48. User-Agent: XLogix Android 6.6.1 build 129231
  49. Content-Length: 0
  50.  
  51. send 707 bytes to tls/[117.213.29.4]:38515 at 18:39:37.925922:
  52. ------------------------------------------------------------------------
  53. SIP/2.0 401 Unauthorized
  54. Via: SIP/2.0/TLS 192.168.1.2;branch=z9hG4bK-524287-1---54a60e415e7af17a;rport=38515;received=117.213.29.4
  55. From: "FSTest2"<sip:4002@34.93.139.28>;tag=7687b8cf
  56. To: "FSTest2" <sip:4002@34.93.139.28>;tag=ar5tBvQt8UH3g
  57. Call-ID: 198259_mobile-rel153YWY2ZDQyYmU2YjQ2MDc0ZjM3Nzc2ZTA4N2JjZGI0ODY
  58. CSeq: 1 REGISTER
  59. User-Agent: FreeSWITCH-mod_sofia/1.10.7-release+git~20211024T163933Z~883d2cb662~64bit
  60. Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, SUBSCRIBE
  61. Supported: timer, path, replaces
  62. WWW-Authenticate: Digest realm="34.93.139.28", nonce="b3999bf7-2893-4a1a-8f45-8f7f3f730ba6", algorithm=MD5, qop="auth"
  63. Content-Length: 0
  64.  
  65. recv 918 bytes from tls/[117.213.29.4]:38515 at 18:39:37.966392:
  66. ------------------------------------------------------------------------
  67. REGISTER sip:34.93.139.28 SIP/2.0
  68. Via: SIP/2.0/TLS 192.168.1.2;branch=z9hG4bK-524287-1---6ea1d069eadb7245;rport
  69. Max-Forwards: 70
  70. Contact: <sip:4002@192.168.1.2;rinstance=0d42d034c69aa9ca;transport=tls>;+sip.instance="<urn:uuid:4b3a26e9-5a70-5d1a-a2df-278ebf2023c0>";reg-id=1
  71. To: "FSTest2"<sip:4002@34.93.139.28>
  72. From: "FSTest2"<sip:4002@34.93.139.28>;tag=7687b8cf
  73. Call-ID: 198259_mobile-rel153YWY2ZDQyYmU2YjQ2MDc0ZjM3Nzc2ZTA4N2JjZGI0ODY
  74. CSeq: 2 REGISTER
  75. Expires: 900
  76. Allow: OPTIONS, INVITE, ACK, CANCEL, BYE, REFER, INFO, NOTIFY, UPDATE, PRACK, SUBSCRIBE, MESSAGE
  77. Supported: outbound, path
  78. User-Agent: XLogix Android 6.6.1 build 129231
  79. Authorization: Digest username="4002",realm="34.93.139.28",nonce="b3999bf7-2893-4a1a-8f45-8f7f3f730ba6",uri="sip:34.93.139.28",response="1ed22857e8dec6da2fd6782fa84a2bf7",cnonce="211ac7ed3427bba8edf62768f594d370",nc=00000001,qop=auth,algorithm=MD5
  80. Content-Length: 0
  81.  
  82. send 700 bytes to tls/[117.213.29.4]:38515 at 18:39:37.968205:
  83. ------------------------------------------------------------------------
  84. SIP/2.0 200 OK
  85. Via: SIP/2.0/TLS 192.168.1.2;branch=z9hG4bK-524287-1---6ea1d069eadb7245;rport=38515;received=117.213.29.4
  86. From: "FSTest2"<sip:4002@34.93.139.28>;tag=7687b8cf
  87. To: "FSTest2" <sip:4002@34.93.139.28>;tag=B1yKDQ8X547Nc
  88. Call-ID: 198259_mobile-rel153YWY2ZDQyYmU2YjQ2MDc0ZjM3Nzc2ZTA4N2JjZGI0ODY
  89. CSeq: 2 REGISTER
  90. Contact: <sip:4002@192.168.1.2;rinstance=0d42d034c69aa9ca;transport=tls>;expires=900
  91. Date: Thu, 27 Jan 2022 18:39:37 GMT
  92. User-Agent: FreeSWITCH-mod_sofia/1.10.7-release+git~20211024T163933Z~883d2cb662~64bit
  93. Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, SUBSCRIBE
  94. Supported: timer, path, replaces
  95. Content-Length: 0
  96.  
  97. recv 888 bytes from tls/[35.185.177.49]:29411 at 18:39:37.986367:
  98. ------------------------------------------------------------------------
  99. REGISTER sip:34.93.139.28:5061 SIP/2.0
  100. Via: SIP/2.0/TLS 10.15.172.158:29411;branch=z9hG4bK-524287-1---bb8f9a33a9178f4c;rport
  101. Max-Forwards: 70
  102. Contact: <sip:4002-b21e802797624998b77337fd55142ab7@10.15.172.158:29411;transport=TLS>;+sip.instance="<urn:uuid:4b3a26e9-5a70-5d1a-a2df-278ebf2023c1>";reg-id=1;expires=0
  103. To: <sip:4002@34.93.139.28:5061>
  104. From: <sip:4002@34.93.139.28:5061>;tag=b267e750
  105. Call-ID: W--4z682mcYcPDXv5-f5zw..@10.148.0.4
  106. CSeq: 3 REGISTER
  107. Allow: ACK, BYE, CANCEL, INVITE, NOTIFY, MESSAGE, OPTIONS, PRACK, REGISTER, UPDATE
  108. Supported: outbound, path
  109. User-Agent: Push Server 3.1.0 (23616)
  110. Authorization: Digest username="4002",realm="34.93.139.28",nonce="053d2f5a-dbba-447b-ac93-0ac5abf13d30",uri="sip:34.93.139.28:5061",response="9a08870c1ed3a34501bca4d2eee798e4",cnonce="a84f916483e7453eb8624c4029766d1c",nc=00000002,qop=auth,algorithm=MD5
  111. Content-Length: 0
  112.  
  113. send 691 bytes to tls/[35.185.177.49]:29411 at 18:39:37.987172:
  114. ------------------------------------------------------------------------
  115. SIP/2.0 401 Unauthorized
  116. Via: SIP/2.0/TLS 10.15.172.158:29411;branch=z9hG4bK-524287-1---bb8f9a33a9178f4c;rport=29411;received=35.185.177.49
  117. From: <sip:4002@34.93.139.28:5061>;tag=b267e750
  118. To: <sip:4002@34.93.139.28:5061>;tag=carcFjS12Dy8Q
  119. Call-ID: W--4z682mcYcPDXv5-f5zw..@10.148.0.4
  120. CSeq: 3 REGISTER
  121. User-Agent: FreeSWITCH-mod_sofia/1.10.7-release+git~20211024T163933Z~883d2cb662~64bit
  122. Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, SUBSCRIBE
  123. Supported: timer, path, replaces
  124. WWW-Authenticate: Digest realm="34.93.139.28", nonce="5070676c-7a7f-403b-8f3c-0d79033aa0f7", stale=true, algorithm=MD5, qop="auth"
  125. Content-Length: 0
  126.  
  127. send 1062 bytes to tls/[117.213.29.4]:38515 at 18:39:38.008971:
  128. ------------------------------------------------------------------------
  129. NOTIFY sip:4002@192.168.1.2;rinstance=0d42d034c69aa9ca;transport=tls SIP/2.0
  130. Via: SIP/2.0/TLS 34.93.139.28:5061;rport;branch=z9hG4bKZXjZNQm3S0BUe
  131. Route: <sip:4002@117.213.29.4:38515>;rinstance=0d42d034c69aa9ca;transport=tls
  132. Max-Forwards: 70
  133. From: <sip:4002@34.93.139.28>;tag=DKH5gDa5ZpmUK
  134. To: <sip:4002@34.93.139.28>
  135. Call-ID: 52916cce-fa43-123a-fda6-42010aa00021
  136. CSeq: 47100597 NOTIFY
  137. Contact: <sip:mod_sofia@34.93.139.28:5061;transport=tls>
  138. User-Agent: FreeSWITCH-mod_sofia/1.10.7-release+git~20211024T163933Z~883d2cb662~64bit
  139. Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, SUBSCRIBE
  140. Supported: timer, path, replaces
  141. Event: message-summary
  142. Allow-Events: talk, hold, conference, presence, as-feature-event, dialog, line-seize, call-info, sla, include-session-description, presence.winfo, message-summary, refer
  143. Subscription-State: terminated;reason=noresource
  144. Content-Type: application/simple-message-summary
  145. Content-Length: 63
  146.  
  147. Messages-Waiting: no
  148. Message-Account: sip:4002@10.160.0.33
  149.  
  150. recv 914 bytes from tls/[117.213.29.4]:38515 at 18:39:38.009377:
  151. ------------------------------------------------------------------------
  152. REGISTER sip:34.93.139.28 SIP/2.0
  153. Via: SIP/2.0/TLS 192.168.1.2;branch=z9hG4bK-524287-1---5775dd52910f7589;rport
  154. Max-Forwards: 70
  155. Contact: <sip:4002@192.168.1.2;rinstance=0d42d034c69aa9ca;transport=tls>;+sip.instance="<urn:uuid:4b3a26e9-5a70-5d1a-a2df-278ebf2023c0>";reg-id=1;expires=0
  156. To: "FSTest2"<sip:4002@34.93.139.28>
  157. From: "FSTest2"<sip:4002@34.93.139.28>;tag=7687b8cf
  158. Call-ID: 198259_mobile-rel153YWY2ZDQyYmU2YjQ2MDc0ZjM3Nzc2ZTA4N2JjZGI0ODY
  159. CSeq: 3 REGISTER
  160. Allow: OPTIONS, INVITE, ACK, CANCEL, BYE, REFER, INFO, NOTIFY, UPDATE, PRACK, SUBSCRIBE, MESSAGE
  161. Supported: outbound, path
  162. User-Agent: XLogix Android 6.6.1 build 129231
  163. Authorization: Digest username="4002",realm="34.93.139.28",nonce="b3999bf7-2893-4a1a-8f45-8f7f3f730ba6",uri="sip:34.93.139.28",response="3e10550fa4492ac6ebec9ad6246d89e6",cnonce="0a154299e506c393347747734b6e271e",nc=00000002,qop=auth,algorithm=MD5
  164. Content-Length: 0
  165.  
  166. send 614 bytes to tls/[117.213.29.4]:38515 at 18:39:38.010559:
  167. ------------------------------------------------------------------------
  168. SIP/2.0 200 OK
  169. Via: SIP/2.0/TLS 192.168.1.2;branch=z9hG4bK-524287-1---5775dd52910f7589;rport=38515;received=117.213.29.4
  170. From: "FSTest2"<sip:4002@34.93.139.28>;tag=7687b8cf
  171. To: "FSTest2" <sip:4002@34.93.139.28>;tag=evayj8t8vZaeF
  172. Call-ID: 198259_mobile-rel153YWY2ZDQyYmU2YjQ2MDc0ZjM3Nzc2ZTA4N2JjZGI0ODY
  173. CSeq: 3 REGISTER
  174. Date: Thu, 27 Jan 2022 18:39:37 GMT
  175. User-Agent: FreeSWITCH-mod_sofia/1.10.7-release+git~20211024T163933Z~883d2cb662~64bit
  176. Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, SUBSCRIBE
  177. Supported: timer, path, replaces
  178. Content-Length: 0
  179.  
  180. recv 888 bytes from tls/[35.185.177.49]:29411 at 18:39:38.048018:
  181. ------------------------------------------------------------------------
  182. REGISTER sip:34.93.139.28:5061 SIP/2.0
  183. Via: SIP/2.0/TLS 10.15.172.158:29411;branch=z9hG4bK-524287-1---cdbb5c26ffa1a465;rport
  184. Max-Forwards: 70
  185. Contact: <sip:4002-b21e802797624998b77337fd55142ab7@10.15.172.158:29411;transport=TLS>;+sip.instance="<urn:uuid:4b3a26e9-5a70-5d1a-a2df-278ebf2023c1>";reg-id=1;expires=0
  186. To: <sip:4002@34.93.139.28:5061>
  187. From: <sip:4002@34.93.139.28:5061>;tag=b267e750
  188. Call-ID: W--4z682mcYcPDXv5-f5zw..@10.148.0.4
  189. CSeq: 4 REGISTER
  190. Allow: ACK, BYE, CANCEL, INVITE, NOTIFY, MESSAGE, OPTIONS, PRACK, REGISTER, UPDATE
  191. Supported: outbound, path
  192. User-Agent: Push Server 3.1.0 (23616)
  193. Authorization: Digest username="4002",realm="34.93.139.28",nonce="5070676c-7a7f-403b-8f3c-0d79033aa0f7",uri="sip:34.93.139.28:5061",response="1ae6df005b2c5c7a94181986322638b5",cnonce="aca422d8582e0819d4910cf40ebe2f1e",nc=00000002,qop=auth,algorithm=MD5
  194. Content-Length: 0
  195.  
  196. send 586 bytes to tls/[35.185.177.49]:29411 at 18:39:38.049186:
  197. ------------------------------------------------------------------------
  198. SIP/2.0 200 OK
  199. Via: SIP/2.0/TLS 10.15.172.158:29411;branch=z9hG4bK-524287-1---cdbb5c26ffa1a465;rport=29411;received=35.185.177.49
  200. From: <sip:4002@34.93.139.28:5061>;tag=b267e750
  201. To: <sip:4002@34.93.139.28:5061>;tag=F53pm3Bct800a
  202. Call-ID: W--4z682mcYcPDXv5-f5zw..@10.148.0.4
  203. CSeq: 4 REGISTER
  204. Date: Thu, 27 Jan 2022 18:39:38 GMT
  205. User-Agent: FreeSWITCH-mod_sofia/1.10.7-release+git~20211024T163933Z~883d2cb662~64bit
  206. Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, SUBSCRIBE
  207. Supported: timer, path, replaces
  208. Content-Length: 0
  209.  
  210. recv 362 bytes from tls/[117.213.29.4]:38515 at 18:39:38.069035:
  211. ------------------------------------------------------------------------
  212. SIP/2.0 200 OK
  213. Via: SIP/2.0/TLS 34.93.139.28:5061;rport=5061;branch=z9hG4bKZXjZNQm3S0BUe
  214. Contact: <sip:192.168.1.2;transport=tls>
  215. To: <sip:4002@34.93.139.28>;tag=3dd7623c
  216. From: <sip:4002@34.93.139.28>;tag=DKH5gDa5ZpmUK
  217. Call-ID: 52916cce-fa43-123a-fda6-42010aa00021
  218. CSeq: 47100597 NOTIFY
  219. User-Agent: XLogix Android 6.6.1 build 129231
  220. Content-Length: 0
  221.  
  222. recv 909 bytes from tls/[117.213.29.4]:38515 at 18:39:38.146376:
  223. ------------------------------------------------------------------------
  224. REGISTER sip:34.93.139.28 SIP/2.0
  225. Via: SIP/2.0/TLS 192.168.1.2;branch=z9hG4bK-524287-1---2a5ca286b23b84ae;rport
  226. Max-Forwards: 70
  227. Contact: <sip:4002@192.168.1.2;rinstance=0d42d034c69aa9ca;transport=tls>;+sip.instance="<urn:uuid:4b3a26e9-5a70-5d1a-a2df-278ebf2023c0>"
  228. To: "FSTest2"<sip:4002@34.93.139.28>
  229. From: "FSTest2"<sip:4002@34.93.139.28>;tag=7687b8cf
  230. Call-ID: 198259_mobile-rel153YWY2ZDQyYmU2YjQ2MDc0ZjM3Nzc2ZTA4N2JjZGI0ODY
  231. CSeq: 4 REGISTER
  232. Expires: 900
  233. Allow: OPTIONS, INVITE, ACK, CANCEL, BYE, REFER, INFO, NOTIFY, UPDATE, PRACK, SUBSCRIBE, MESSAGE
  234. Supported: outbound, path
  235. User-Agent: XLogix Android 6.6.1 build 129231
  236. Authorization: Digest username="4002",realm="34.93.139.28",nonce="b3999bf7-2893-4a1a-8f45-8f7f3f730ba6",uri="sip:34.93.139.28",response="8b30fb9e66e9c008aa5cfe35bb4c16b7",cnonce="2866d81d16970571af775a2a59424b4a",nc=00000003,qop=auth,algorithm=MD5
  237. Content-Length: 0
  238.  
  239. send 700 bytes to tls/[117.213.29.4]:38515 at 18:39:38.147687:
  240. ------------------------------------------------------------------------
  241. SIP/2.0 200 OK
  242. Via: SIP/2.0/TLS 192.168.1.2;branch=z9hG4bK-524287-1---2a5ca286b23b84ae;rport=38515;received=117.213.29.4
  243. From: "FSTest2"<sip:4002@34.93.139.28>;tag=7687b8cf
  244. To: "FSTest2" <sip:4002@34.93.139.28>;tag=geXFpyvFQHQKp
  245. Call-ID: 198259_mobile-rel153YWY2ZDQyYmU2YjQ2MDc0ZjM3Nzc2ZTA4N2JjZGI0ODY
  246. CSeq: 4 REGISTER
  247. Contact: <sip:4002@192.168.1.2;rinstance=0d42d034c69aa9ca;transport=tls>;expires=900
  248. Date: Thu, 27 Jan 2022 18:39:38 GMT
  249. User-Agent: FreeSWITCH-mod_sofia/1.10.7-release+git~20211024T163933Z~883d2cb662~64bit
  250. Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, SUBSCRIBE
  251. Supported: timer, path, replaces
  252. Content-Length: 0
  253.  
  254. recv 905 bytes from tls/[117.213.29.4]:38515 at 18:39:38.191429:
  255. ------------------------------------------------------------------------
  256. REGISTER sip:34.93.139.28 SIP/2.0
  257. Via: SIP/2.0/TLS 192.168.1.2;branch=z9hG4bK-524287-1---908a840c4ccc32cd;rport
  258. Max-Forwards: 70
  259. Contact: <sip:4002@192.168.1.2;rinstance=0d42d034c69aa9ca;transport=tls>;+sip.instance="<urn:uuid:4b3a26e9-5a70-5d1a-a2df-278ebf2023c0>";expires=0
  260. To: "FSTest2"<sip:4002@34.93.139.28>
  261. From: "FSTest2"<sip:4002@34.93.139.28>;tag=7687b8cf
  262. Call-ID: 198259_mobile-rel153YWY2ZDQyYmU2YjQ2MDc0ZjM3Nzc2ZTA4N2JjZGI0ODY
  263. CSeq: 5 REGISTER
  264. Allow: OPTIONS, INVITE, ACK, CANCEL, BYE, REFER, INFO, NOTIFY, UPDATE, PRACK, SUBSCRIBE, MESSAGE
  265. Supported: outbound, path
  266. User-Agent: XLogix Android 6.6.1 build 129231
  267. Authorization: Digest username="4002",realm="34.93.139.28",nonce="b3999bf7-2893-4a1a-8f45-8f7f3f730ba6",uri="sip:34.93.139.28",response="4252445d3c138b30c4425506626393b6",cnonce="41a53931a005825be973afbef41e90b1",nc=00000004,qop=auth,algorithm=MD5
  268. Content-Length: 0
  269.  
  270. send 614 bytes to tls/[117.213.29.4]:38515 at 18:39:38.192859:
  271. ------------------------------------------------------------------------
  272. SIP/2.0 200 OK
  273. Via: SIP/2.0/TLS 192.168.1.2;branch=z9hG4bK-524287-1---908a840c4ccc32cd;rport=38515;received=117.213.29.4
  274. From: "FSTest2"<sip:4002@34.93.139.28>;tag=7687b8cf
  275. To: "FSTest2" <sip:4002@34.93.139.28>;tag=HQp8QSDKmtD6H
  276. Call-ID: 198259_mobile-rel153YWY2ZDQyYmU2YjQ2MDc0ZjM3Nzc2ZTA4N2JjZGI0ODY
  277. CSeq: 5 REGISTER
  278. Date: Thu, 27 Jan 2022 18:39:38 GMT
  279. User-Agent: FreeSWITCH-mod_sofia/1.10.7-release+git~20211024T163933Z~883d2cb662~64bit
  280. Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, SUBSCRIBE
  281. Supported: timer, path, replaces
  282. Content-Length: 0
  283.  
  284. recv 916 bytes from tls/[117.213.29.4]:38515 at 18:39:38.297070:
  285. ------------------------------------------------------------------------
  286. REGISTER sip:34.93.139.28 SIP/2.0
  287. Via: SIP/2.0/TLS 192.168.1.2;branch=z9hG4bK-524287-1---ee567ee35579b52a;rport
  288. Max-Forwards: 70
  289. Contact: <sip:4002@117.213.29.4:38515;rinstance=0d42d034c69aa9ca;transport=tls>;+sip.instance="<urn:uuid:4b3a26e9-5a70-5d1a-a2df-278ebf2023c0>"
  290. To: "FSTest2"<sip:4002@34.93.139.28>
  291. From: "FSTest2"<sip:4002@34.93.139.28>;tag=7687b8cf
  292. Call-ID: 198259_mobile-rel153YWY2ZDQyYmU2YjQ2MDc0ZjM3Nzc2ZTA4N2JjZGI0ODY
  293. CSeq: 6 REGISTER
  294. Expires: 900
  295. Allow: OPTIONS, INVITE, ACK, CANCEL, BYE, REFER, INFO, NOTIFY, UPDATE, PRACK, SUBSCRIBE, MESSAGE
  296. Supported: outbound, path
  297. User-Agent: XLogix Android 6.6.1 build 129231
  298. Authorization: Digest username="4002",realm="34.93.139.28",nonce="b3999bf7-2893-4a1a-8f45-8f7f3f730ba6",uri="sip:34.93.139.28",response="80ddff82c2228d3ff23f3dd494bd8f5f",cnonce="a62b699a4483e8bd648fdb4e80f5d632",nc=00000005,qop=auth,algorithm=MD5
  299. Content-Length: 0
  300.  
  301. send 707 bytes to tls/[117.213.29.4]:38515 at 18:39:38.298448:
  302. ------------------------------------------------------------------------
  303. SIP/2.0 200 OK
  304. Via: SIP/2.0/TLS 192.168.1.2;branch=z9hG4bK-524287-1---ee567ee35579b52a;rport=38515;received=117.213.29.4
  305. From: "FSTest2"<sip:4002@34.93.139.28>;tag=7687b8cf
  306. To: "FSTest2" <sip:4002@34.93.139.28>;tag=j0F1SmypH33rD
  307. Call-ID: 198259_mobile-rel153YWY2ZDQyYmU2YjQ2MDc0ZjM3Nzc2ZTA4N2JjZGI0ODY
  308. CSeq: 6 REGISTER
  309. Contact: <sip:4002@117.213.29.4:38515;rinstance=0d42d034c69aa9ca;transport=tls>;expires=900
  310. Date: Thu, 27 Jan 2022 18:39:38 GMT
  311. User-Agent: FreeSWITCH-mod_sofia/1.10.7-release+git~20211024T163933Z~883d2cb662~64bit
  312. Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, SUBSCRIBE
  313. Supported: timer, path, replaces
  314. Content-Length: 0
  315.  
  316. recv 707 bytes from tls/[117.213.29.4]:38515 at 18:39:38.579063:
  317. ------------------------------------------------------------------------
  318. SUBSCRIBE sip:4002@34.93.139.28 SIP/2.0
  319. Via: SIP/2.0/TLS 192.168.1.2;branch=z9hG4bK-524287-1---c4540e906dc987dc;rport
  320. Max-Forwards: 70
  321. Contact: <sip:4002@117.213.29.4:38515;rinstance=0d42d034c69aa9ca;transport=tls>;+sip.instance="<urn:uuid:4b3a26e9-5a70-5d1a-a2df-278ebf2023c0>"
  322. To: <sip:4002@34.93.139.28>
  323. From: "FSTest2"<sip:4002@34.93.139.28>;tag=56d02f2b
  324. Call-ID: 198259_mobile-rel153NTA5OTVlMjY5NzJmY2QxZDIyMzA2YWI3MjM1OTM5ZTU
  325. CSeq: 1 SUBSCRIBE
  326. Expires: 3600
  327. Accept: application/simple-message-summary
  328. Allow: OPTIONS, INVITE, ACK, CANCEL, BYE, REFER, INFO, NOTIFY, UPDATE, PRACK, SUBSCRIBE, MESSAGE
  329. User-Agent: XLogix Android 6.6.1 build 129231
  330. Event: message-summary
  331. Content-Length: 0
  332.  
  333. send 888 bytes to tls/[117.213.29.4]:38515 at 18:39:38.579771:
  334. ------------------------------------------------------------------------
  335. SIP/2.0 407 Proxy Authentication Required
  336. Via: SIP/2.0/TLS 192.168.1.2;branch=z9hG4bK-524287-1---c4540e906dc987dc;rport=38515;received=117.213.29.4
  337. From: "FSTest2"<sip:4002@34.93.139.28>;tag=56d02f2b
  338. To: <sip:4002@34.93.139.28>;tag=K98SUFFtectBS
  339. Call-ID: 198259_mobile-rel153NTA5OTVlMjY5NzJmY2QxZDIyMzA2YWI3MjM1OTM5ZTU
  340. CSeq: 1 SUBSCRIBE
  341. User-Agent: FreeSWITCH-mod_sofia/1.10.7-release+git~20211024T163933Z~883d2cb662~64bit
  342. Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, SUBSCRIBE
  343. Supported: timer, path, replaces
  344. Allow-Events: talk, hold, conference, presence, as-feature-event, dialog, line-seize, call-info, sla, include-session-description, presence.winfo, message-summary, refer
  345. Proxy-Authenticate: Digest realm="34.93.139.28", nonce="5d7aa59e-110c-4636-a22d-89b28b3cba03", algorithm=MD5, qop="auth"
  346. Content-Length: 0
  347.  
  348. recv 967 bytes from tls/[117.213.29.4]:38515 at 18:39:38.623350:
  349. ------------------------------------------------------------------------
  350. SUBSCRIBE sip:4002@34.93.139.28 SIP/2.0
  351. Via: SIP/2.0/TLS 192.168.1.2;branch=z9hG4bK-524287-1---01ba8ea9135d4907;rport
  352. Max-Forwards: 70
  353. Contact: <sip:4002@117.213.29.4:38515;rinstance=0d42d034c69aa9ca;transport=tls>;+sip.instance="<urn:uuid:4b3a26e9-5a70-5d1a-a2df-278ebf2023c0>"
  354. To: <sip:4002@34.93.139.28>
  355. From: "FSTest2"<sip:4002@34.93.139.28>;tag=56d02f2b
  356. Call-ID: 198259_mobile-rel153NTA5OTVlMjY5NzJmY2QxZDIyMzA2YWI3MjM1OTM5ZTU
  357. CSeq: 2 SUBSCRIBE
  358. Expires: 3600
  359. Accept: application/simple-message-summary
  360. Allow: OPTIONS, INVITE, ACK, CANCEL, BYE, REFER, INFO, NOTIFY, UPDATE, PRACK, SUBSCRIBE, MESSAGE
  361. Proxy-Authorization: Digest username="4002",realm="34.93.139.28",nonce="5d7aa59e-110c-4636-a22d-89b28b3cba03",uri="sip:4002@34.93.139.28",response="fb575a8a9ab2c4d18a29f7deeb89a3a7",cnonce="e752d81fd5017f5d09f2053559937ba5",nc=00000001,qop=auth,algorithm=MD5
  362. User-Agent: XLogix Android 6.6.1 build 129231
  363. Event: message-summary
  364. Content-Length: 0
  365.  
  366. send 853 bytes to tls/[117.213.29.4]:38515 at 18:39:38.624455:
  367. ------------------------------------------------------------------------
  368. SIP/2.0 202 Accepted
  369. Via: SIP/2.0/TLS 192.168.1.2;branch=z9hG4bK-524287-1---01ba8ea9135d4907;rport=38515;received=117.213.29.4
  370. From: "FSTest2"<sip:4002@34.93.139.28>;tag=56d02f2b
  371. To: <sip:4002@34.93.139.28>;tag=2WrxgFHCFE0V
  372. Call-ID: 198259_mobile-rel153NTA5OTVlMjY5NzJmY2QxZDIyMzA2YWI3MjM1OTM5ZTU
  373. CSeq: 2 SUBSCRIBE
  374. Contact: <sip:4002@34.93.139.28:5061;transport=tls>
  375. Expires: 3600
  376. User-Agent: FreeSWITCH-mod_sofia/1.10.7-release+git~20211024T163933Z~883d2cb662~64bit
  377. Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, SUBSCRIBE
  378. Supported: timer, path, replaces
  379. Allow-Events: talk, hold, conference, presence, as-feature-event, dialog, line-seize, call-info, sla, include-session-description, presence.winfo, message-summary, refer
  380. Subscription-State: active;expires=3600
  381. Content-Length: 0
  382.  
  383. send 1026 bytes to tls/[117.213.29.4]:38515 at 18:39:38.709609:
  384. ------------------------------------------------------------------------
  385. NOTIFY sip:4002@117.213.29.4:38515;rinstance=0d42d034c69aa9ca;transport=tls SIP/2.0
  386. Via: SIP/2.0/TLS 34.93.139.28:5061;rport;branch=z9hG4bK06BrQj56p91Da
  387. Max-Forwards: 70
  388. From: <sip:4002@34.93.139.28>;tag=2WrxgFHCFE0V
  389. To: "FSTest2" <sip:4002@34.93.139.28>;tag=56d02f2b
  390. Call-ID: 198259_mobile-rel153NTA5OTVlMjY5NzJmY2QxZDIyMzA2YWI3MjM1OTM5ZTU
  391. CSeq: 115678901 NOTIFY
  392. Contact: <sip:4002@34.93.139.28:5061;transport=tls>
  393. User-Agent: FreeSWITCH-mod_sofia/1.10.7-release+git~20211024T163933Z~883d2cb662~64bit
  394. Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, SUBSCRIBE
  395. Supported: timer, path, replaces
  396. Event: message-summary
  397. Allow-Events: talk, hold, conference, presence, as-feature-event, dialog, line-seize, call-info, sla, include-session-description, presence.winfo, message-summary, refer
  398. Subscription-State: active;expires=3600
  399. Content-Type: application/simple-message-summary
  400. Content-Length: 63
  401.  
  402. Messages-Waiting: no
  403. Message-Account: sip:4002@10.160.0.33
  404.  
  405. recv 501 bytes from tls/[117.213.29.4]:38515 at 18:39:38.754082:
  406. ------------------------------------------------------------------------
  407. SIP/2.0 200 OK
  408. Via: SIP/2.0/TLS 34.93.139.28:5061;rport=5061;branch=z9hG4bK06BrQj56p91Da
  409. Contact: <sip:4002@117.213.29.4:38515;rinstance=0d42d034c69aa9ca;transport=tls>;+sip.instance="<urn:uuid:4b3a26e9-5a70-5d1a-a2df-278ebf2023c0>"
  410. To: "FSTest2"<sip:4002@34.93.139.28>;tag=56d02f2b
  411. From: <sip:4002@34.93.139.28>;tag=2WrxgFHCFE0V
  412. Call-ID: 198259_mobile-rel153NTA5OTVlMjY5NzJmY2QxZDIyMzA2YWI3MjM1OTM5ZTU
  413. CSeq: 115678901 NOTIFY
  414. User-Agent: XLogix Android 6.6.1 build 129231
  415. Content-Length: 0
  416.  
  417. recv 1647 bytes from tls/[103.165.21.34]:14403 at 18:39:45.357726:
  418. ------------------------------------------------------------------------
  419. INVITE sip:4002@34.93.139.28 SIP/2.0
  420. Via: SIP/2.0/TLS 192.168.0.107;branch=z9hG4bK-524287-1---6e90c683e3f41495;rport
  421. Max-Forwards: 70
  422. Contact: <sip:4001@103.165.21.34:14403;rinstance=8a9bd45d4ac81129;transport=tls>
  423. To: <sip:4002@34.93.139.28>
  424. From: "FSTest1"<sip:4001@34.93.139.28>;tag=30b6da5a
  425. Call-ID: 106969OTk4MTEwNDc3NTY3Y2I5ZjUzNGZkMDI0OGI3ZjA1MWE
  426. CSeq: 1 INVITE
  427. Allow: OPTIONS, SUBSCRIBE, NOTIFY, INVITE, ACK, CANCEL, BYE, REFER, INFO, MESSAGE
  428. Content-Type: application/sdp
  429. Supported: replaces
  430. User-Agent: XLogix release 6.4.0.1 stamp 106969
  431. Content-Length: 1062
  432.  
  433. v=0
  434. o=- 13287782386201190 1 IN IP4 192.168.0.107
  435. s=XLogix release 6.4.0.1 stamp 106969
  436. c=IN IP4 192.168.0.107
  437. t=0 0
  438. m=audio 59974 RTP/SAVP 120 0 8 3 101
  439. a=rtpmap:120 opus/48000/2
  440. a=fmtp:120 useinbandfec=1; usedtx=1; maxaveragebitrate=64000
  441. a=rtpmap:101 telephone-event/8000
  442. a=fmtp:101 0-15
  443. a=crypto:1 AEAD_AES_128_GCM inline:SnX1qXEyg8iKch5ehpp9164vGtB3DVe89+NxvA==
  444. a=crypto:2 AEAD_AES_256_GCM inline:m4jsjV2JSbKb8gh4G1s+tKtThv/0Cg5Gk5JzkJ8v78MyMyAI6XqiBZhFKo4=
  445. a=crypto:3 AES_CM_128_HMAC_SHA1_80 inline:8gDyt/jD2PWCAdHZNRyZSMGxFugWSb19NnhvBOHG
  446. a=crypto:4 AES_192_CM_HMAC_SHA1_80 inline:Z6gomJ3LyK5BG6lZVy/Bgv/+R9SqffM36oa0J7YRzB3u5jS+j2M=
  447. a=crypto:5 AES_256_CM_HMAC_SHA1_80 inline:Yeb+hr8UDmto1oiz4liggg2ASFNGL6g2CaQp9ehNVCqm3eqZE+PI+owT2AXfag==
  448. a=crypto:6 AES_CM_128_HMAC_SHA1_32 inline:cSqoFSBbs36I50A9ExNvksh4LQPO+9uKkfFzB8yu
  449. a=crypto:7 AES_192_CM_HMAC_SHA1_32 inline:ImfcTrGS72TuD640dmZvqphYnLjaI2Aal3GDWxAd0WlrrRhuzT4=
  450. a=crypto:8 AES_256_CM_HMAC_SHA1_32 inline:JlmkW9D1BTFHvGtugR0/qo2dTB1TFu078AfDQ/9CtPeP2ZKHDcX7EvOm0I0wBg==
  451. a=sendrecv
  452. 2022-01-27 18:39:45.352181 99.47% [NOTICE] switch_channel.c:1123 New Channel sofia/internal/4001@34.93.139.28 [aaf65cee-bddc-44e0-90f7-0e523ff91d0d]
  453. 2022-01-27 18:39:45.352181 99.47% [DEBUG] switch_core_state_machine.c:581 (sofia/internal/4001@34.93.139.28) Running State Change CS_NEW (Cur 1 Tot 113)
  454. 2022-01-27 18:39:45.352181 99.47% [INFO] sofia.c:10462 sofia/internal/4001@34.93.139.28 receiving invite from 103.165.21.34:14403 version: 1.10.7-release git 883d2cb 2021-10-24 16:39:33Z 64bit call-id: 106969OTk4MTEwNDc3NTY3Y2I5ZjUzNGZkMDI0OGI3ZjA1MWE
  455. 2022-01-27 18:39:45.352181 99.47% [DEBUG] sofia.c:10556 verifying acl "domains" for ip/port 103.165.21.34:0.
  456. 2022-01-27 18:39:45.352181 99.47% [DEBUG] switch_core_state_machine.c:600 (sofia/internal/4001@34.93.139.28) State NEW
  457. send 899 bytes to tls/[103.165.21.34]:14403 at 18:39:45.358884:
  458. ------------------------------------------------------------------------
  459. SIP/2.0 407 Proxy Authentication Required
  460. Via: SIP/2.0/TLS 192.168.0.107;branch=z9hG4bK-524287-1---6e90c683e3f41495;rport=14403;received=103.165.21.34
  461. From: "FSTest1"<sip:4001@34.93.139.28>;tag=30b6da5a
  462. To: <sip:4002@34.93.139.28>;tag=NUUBZ5g18X6gg
  463. Call-ID: 106969OTk4MTEwNDc3NTY3Y2I5ZjUzNGZkMDI0OGI3ZjA1MWE
  464. CSeq: 1 INVITE
  465. User-Agent: FreeSWITCH-mod_sofia/1.10.7-release+git~20211024T163933Z~883d2cb662~64bit
  466. Accept: application/sdp
  467. Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, SUBSCRIBE
  468. Supported: timer, path, replaces
  469. Allow-Events: talk, hold, conference, presence, as-feature-event, dialog, line-seize, call-info, sla, include-session-description, presence.winfo, message-summary, refer
  470. Proxy-Authenticate: Digest realm="34.93.139.28", nonce="a83b6799-599a-4838-826e-dc70dcd3033b", algorithm=MD5, qop="auth"
  471. Content-Length: 0
  472.  
  473. 2022-01-27 18:39:45.352181 99.47% [DEBUG] sofia.c:2419 detaching session aaf65cee-bddc-44e0-90f7-0e523ff91d0d
  474. recv 328 bytes from tls/[103.165.21.34]:14403 at 18:39:45.412206:
  475. ------------------------------------------------------------------------
  476. ACK sip:4002@34.93.139.28 SIP/2.0
  477. Via: SIP/2.0/TLS 192.168.0.107;branch=z9hG4bK-524287-1---6e90c683e3f41495;rport
  478. Max-Forwards: 70
  479. To: <sip:4002@34.93.139.28>;tag=NUUBZ5g18X6gg
  480. From: "FSTest1"<sip:4001@34.93.139.28>;tag=30b6da5a
  481. Call-ID: 106969OTk4MTEwNDc3NTY3Y2I5ZjUzNGZkMDI0OGI3ZjA1MWE
  482. CSeq: 1 ACK
  483. Content-Length: 0
  484.  
  485. recv 1907 bytes from tls/[103.165.21.34]:14403 at 18:39:45.422080:
  486. ------------------------------------------------------------------------
  487. INVITE sip:4002@34.93.139.28 SIP/2.0
  488. Via: SIP/2.0/TLS 192.168.0.107;branch=z9hG4bK-524287-1---849dfed928076c18;rport
  489. Max-Forwards: 70
  490. Contact: <sip:4001@103.165.21.34:14403;rinstance=8a9bd45d4ac81129;transport=tls>
  491. To: <sip:4002@34.93.139.28>
  492. From: "FSTest1"<sip:4001@34.93.139.28>;tag=30b6da5a
  493. Call-ID: 106969OTk4MTEwNDc3NTY3Y2I5ZjUzNGZkMDI0OGI3ZjA1MWE
  494. CSeq: 2 INVITE
  495. Allow: OPTIONS, SUBSCRIBE, NOTIFY, INVITE, ACK, CANCEL, BYE, REFER, INFO, MESSAGE
  496. Content-Type: application/sdp
  497. Proxy-Authorization: Digest username="4001",realm="34.93.139.28",nonce="a83b6799-599a-4838-826e-dc70dcd3033b",uri="sip:4002@34.93.139.28",response="ae75d9f2883e7260feacee805d5cc6a4",cnonce="7d7e54082e6abddd9046fc1bb8d94d2b",nc=00000001,qop=auth,algorithm=MD5
  498. Supported: replaces
  499. User-Agent: XLogix release 6.4.0.1 stamp 106969
  500. Content-Length: 1062
  501.  
  502. v=0
  503. o=- 13287782386201190 1 IN IP4 192.168.0.107
  504. s=XLogix release 6.4.0.1 stamp 106969
  505. c=IN IP4 192.168.0.107
  506. t=0 0
  507. m=audio 59974 RTP/SAVP 120 0 8 3 101
  508. a=rtpmap:120 opus/48000/2
  509. a=fmtp:120 useinbandfec=1; usedtx=1; maxaveragebitrate=64000
  510. a=rtpmap:101 telephone-event/8000
  511. a=fmtp:101 0-15
  512. a=crypto:1 AEAD_AES_128_GCM inline:SnX1qXEyg8iKch5ehpp9164vGtB3DVe89+NxvA==
  513. a=crypto:2 AEAD_AES_256_GCM inline:m4jsjV2JSbKb8gh4G1s+tKtThv/0Cg5Gk5JzkJ8v78MyMyAI6XqiBZhFKo4=
  514. a=crypto:3 AES_CM_128_HMAC_SHA1_80 inline:8gDyt/jD2PWCAdHZNRyZSMGxFugWSb19NnhvBOHG
  515. a=crypto:4 AES_192_CM_HMAC_SHA1_80 inline:Z6gomJ3LyK5BG6lZVy/Bgv/+R9SqffM36oa0J7YRzB3u5jS+j2M=
  516. a=crypto:5 AES_256_CM_HMAC_SHA1_80 inline:Yeb+hr8UDmto1oiz4liggg2ASFNGL6g2CaQp9ehNVCqm3eqZE+PI+owT2AXfag==
  517. a=crypto:6 AES_CM_128_HMAC_SHA1_32 inline:cSqoFSBbs36I50A9ExNvksh4LQPO+9uKkfFzB8yu
  518. a=crypto:7 AES_192_CM_HMAC_SHA1_32 inline:ImfcTrGS72TuD640dmZvqphYnLjaI2Aal3GDWxAd0WlrrRhuzT4=
  519. a=crypto:8 AES_256_CM_HMAC_SHA1_32 inline:JlmkW9D1BTFHvGtugR0/qo2dTB1TFu078AfDQ/9CtPeP2ZKHDcX7EvOm0I0wBg==
  520. a=sendrecv
  521. 2022-01-27 18:39:45.392184 99.47% [DEBUG] sofia.c:2532 Re-attaching to session aaf65cee-bddc-44e0-90f7-0e523ff91d0d
  522. 2022-01-27 18:39:45.432177 99.47% [INFO] sofia.c:10462 sofia/internal/4001@34.93.139.28 receiving invite from 103.165.21.34:14403 version: 1.10.7-release git 883d2cb 2021-10-24 16:39:33Z 64bit call-id: 106969OTk4MTEwNDc3NTY3Y2I5ZjUzNGZkMDI0OGI3ZjA1MWE
  523. 2022-01-27 18:39:45.432177 99.47% [DEBUG] sofia.c:10556 verifying acl "domains" for ip/port 103.165.21.34:0.
  524. 2022-01-27 18:39:45.432177 99.47% [DEBUG] sofia.c:11672 Setting NAT mode based on nat.auto
  525. 2022-01-27 18:39:45.432177 99.47% [DEBUG] sofia.c:7499 Channel sofia/internal/4001@34.93.139.28 entering state [received][100]
  526. 2022-01-27 18:39:45.432177 99.47% [DEBUG] sofia.c:7509 Remote SDP:
  527. v=0
  528. o=- 13287782386201190 1 IN IP4 192.168.0.107
  529. s=XLogix release 6.4.0.1 stamp 106969
  530. c=IN IP4 192.168.0.107
  531. t=0 0
  532. m=audio 59974 RTP/SAVP 120 0 8 3 101
  533. a=rtpmap:120 opus/48000/2
  534. a=fmtp:120 useinbandfec=1; usedtx=1; maxaveragebitrate=64000
  535. a=rtpmap:101 telephone-event/8000
  536. a=fmtp:101 0-15
  537. a=crypto:1 AEAD_AES_128_GCM inline:SnX1qXEyg8iKch5ehpp9164vGtB3DVe89+NxvA==
  538. a=crypto:2 AEAD_AES_256_GCM inline:m4jsjV2JSbKb8gh4G1s+tKtThv/0Cg5Gk5JzkJ8v78MyMyAI6XqiBZhFKo4=
  539. a=crypto:3 AES_CM_128_HMAC_SHA1_80 inline:8gDyt/jD2PWCAdHZNRyZSMGxFugWSb19NnhvBOHG
  540. a=crypto:4 AES_192_CM_HMAC_SHA1_80 inline:Z6gomJ3LyK5BG6lZVy/Bgv/+R9SqffM36oa0J7YRzB3u5jS+j2M=
  541. a=crypto:5 AES_256_CM_HMAC_SHA1_80 inline:Yeb+hr8UDmto1oiz4liggg2ASFNGL6g2CaQp9ehNVCqm3eqZE+PI+owT2AXfag==
  542. a=crypto:6 AES_CM_128_HMAC_SHA1_32 inline:cSqoFSBbs36I50A9ExNvksh4LQPO+9uKkfFzB8yu
  543. a=crypto:7 AES_192_CM_HMAC_SHA1_32 inline:ImfcTrGS72TuD640dmZvqphYnLjaI2Aal3GDWxAd0WlrrRhuzT4=
  544. a=crypto:8 AES_256_CM_HMAC_SHA1_32 inline:JlmkW9D1BTFHvGtugR0/qo2dTB1TFu078AfDQ/9CtPeP2ZKHDcX7EvOm0I0wBg==
  545.  
  546. 2022-01-27 18:39:45.432177 99.47% [DEBUG] sofia.c:7912 (sofia/internal/4001@34.93.139.28) State Change CS_NEW -> CS_INIT
  547. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_state_machine.c:581 (sofia/internal/4001@34.93.139.28) Running State Change CS_INIT (Cur 1 Tot 113)
  548. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_state_machine.c:624 (sofia/internal/4001@34.93.139.28) State INIT
  549. 2022-01-27 18:39:45.432177 99.47% [DEBUG] mod_sofia.c:97 sofia/internal/4001@34.93.139.28 SOFIA INIT
  550. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_state_machine.c:40 sofia/internal/4001@34.93.139.28 Standard INIT
  551. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_state_machine.c:48 (sofia/internal/4001@34.93.139.28) State Change CS_INIT -> CS_ROUTING
  552. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_state_machine.c:624 (sofia/internal/4001@34.93.139.28) State INIT going to sleep
  553. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_state_machine.c:581 (sofia/internal/4001@34.93.139.28) Running State Change CS_ROUTING (Cur 1 Tot 113)
  554. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_channel.c:2380 (sofia/internal/4001@34.93.139.28) Callstate Change DOWN -> RINGING
  555. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_state_machine.c:640 (sofia/internal/4001@34.93.139.28) State ROUTING
  556. 2022-01-27 18:39:45.432177 99.47% [DEBUG] mod_sofia.c:158 sofia/internal/4001@34.93.139.28 SOFIA ROUTING
  557. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_state_machine.c:230 sofia/internal/4001@34.93.139.28 Standard ROUTING
  558. 2022-01-27 18:39:45.432177 99.47% [INFO] mod_dialplan_xml.c:639 Processing FSTest1 <4001>->4002 in context default
  559. send 396 bytes to tls/[103.165.21.34]:14403 at 18:39:45.441019:
  560. ------------------------------------------------------------------------
  561. SIP/2.0 100 Trying
  562. Via: SIP/2.0/TLS 192.168.0.107;branch=z9hG4bK-524287-1---849dfed928076c18;rport=14403;received=103.165.21.34
  563. From: "FSTest1"<sip:4001@34.93.139.28>;tag=30b6da5a
  564. To: <sip:4002@34.93.139.28>
  565. Call-ID: 106969OTk4MTEwNDc3NTY3Y2I5ZjUzNGZkMDI0OGI3ZjA1MWE
  566. CSeq: 2 INVITE
  567. User-Agent: FreeSWITCH-mod_sofia/1.10.7-release+git~20211024T163933Z~883d2cb662~64bit
  568. Content-Length: 0
  569.  
  570. Dialplan: sofia/internal/4001@34.93.139.28 parsing [default->unloop] continue=false
  571. Dialplan: sofia/internal/4001@34.93.139.28 Regex (PASS) [unloop] ${unroll_loops}(true) =~ /^true$/ break=on-false
  572. Dialplan: sofia/internal/4001@34.93.139.28 Regex (FAIL) [unloop] ${sip_looped_call}() =~ /^true$/ break=on-false
  573. Dialplan: sofia/internal/4001@34.93.139.28 parsing [default->tod_example] continue=true
  574. Dialplan: sofia/internal/4001@34.93.139.28 Date/Time Match (PASS) [tod_example] break=on-false
  575. Dialplan: sofia/internal/4001@34.93.139.28 Action set(open=true)
  576. Dialplan: sofia/internal/4001@34.93.139.28 parsing [default->holiday_example] continue=true
  577. Dialplan: sofia/internal/4001@34.93.139.28 Date/TimeMatch (FAIL) [holiday_example] break=on-false
  578. Dialplan: sofia/internal/4001@34.93.139.28 parsing [default->global-intercept] continue=false
  579. Dialplan: sofia/internal/4001@34.93.139.28 Regex (FAIL) [global-intercept] destination_number(4002) =~ /^886$/ break=on-false
  580. Dialplan: sofia/internal/4001@34.93.139.28 parsing [default->group-intercept] continue=false
  581. Dialplan: sofia/internal/4001@34.93.139.28 Regex (FAIL) [group-intercept] destination_number(4002) =~ /^\*8$/ break=on-false
  582. Dialplan: sofia/internal/4001@34.93.139.28 parsing [default->intercept-ext] continue=false
  583. Dialplan: sofia/internal/4001@34.93.139.28 Regex (FAIL) [intercept-ext] destination_number(4002) =~ /^\*\*(\d+)$/ break=on-false
  584. Dialplan: sofia/internal/4001@34.93.139.28 parsing [default->redial] continue=false
  585. Dialplan: sofia/internal/4001@34.93.139.28 Regex (FAIL) [redial] destination_number(4002) =~ /^(redial|870)$/ break=on-false
  586. Dialplan: sofia/internal/4001@34.93.139.28 parsing [default->global] continue=true
  587. Dialplan: sofia/internal/4001@34.93.139.28 Regex (FAIL) [global] ${call_debug}(false) =~ /^true$/ break=never
  588. Dialplan: sofia/internal/4001@34.93.139.28 Regex (FAIL) [global] ${default_password}(abc123) =~ /^1234$/ break=never
  589. Dialplan: sofia/internal/4001@34.93.139.28 Regex (FAIL) [global] ${rtp_has_crypto}() =~ /^(AEAD_AES_256_GCM_8|AEAD_AES_128_GCM_8|AES_CM_256_HMAC_SHA1_80|AES_CM_192_HMAC_SHA1_80|AES_CM_128_HMAC_SHA1_80|AES_CM_256_HMAC_SHA1_32|AES_CM_192_HMAC_SHA1_32|AES_CM_128_HMAC_SHA1_32|AES_CM_128_NULL_AUTH)$/ break=never
  590. Dialplan: sofia/internal/4001@34.93.139.28 Regex (PASS) [global] ${endpoint_disposition}(DELAYED NEGOTIATION) =~ /^(DELAYED NEGOTIATION)/ break=on-false
  591. Dialplan: sofia/internal/4001@34.93.139.28 Regex (PASS) [global] ${switch_r_sdp}(v=0
  592. o=- 13287782386201190 1 IN IP4 192.168.0.107
  593. s=XLogix release 6.4.0.1 stamp 106969
  594. c=IN IP4 192.168.0.107
  595. t=0 0
  596. m=audio 59974 RTP/SAVP 120 0 8 3 101
  597. a=rtpmap:120 opus/48000/2
  598. a=fmtp:120 useinbandfec=1; usedtx=1; maxaveragebitrate=64000
  599. a=rtpmap:101 telephone-event/8000
  600. a=fmtp:101 0-15
  601. a=crypto:1 AEAD_AES_128_GCM inline:SnX1qXEyg8iKch5ehpp9164vGtB3DVe89+NxvA==
  602. a=crypto:2 AEAD_AES_256_GCM inline:m4jsjV2JSbKb8gh4G1s+tKtThv/0Cg5Gk5JzkJ8v78MyMyAI6XqiBZhFKo4=
  603. a=crypto:3 AES_CM_128_HMAC_SHA1_80 inline:8gDyt/jD2PWCAdHZNRyZSMGxFugWSb19NnhvBOHG
  604. a=crypto:4 AES_192_CM_HMAC_SHA1_80 inline:Z6gomJ3LyK5BG6lZVy/Bgv/+R9SqffM36oa0J7YRzB3u5jS+j2M=
  605. a=crypto:5 AES_256_CM_HMAC_SHA1_80 inline:Yeb+hr8UDmto1oiz4liggg2ASFNGL6g2CaQp9ehNVCqm3eqZE+PI+owT2AXfag==
  606. a=crypto:6 AES_CM_128_HMAC_SHA1_32 inline:cSqoFSBbs36I50A9ExNvksh4LQPO+9uKkfFzB8yu
  607. a=crypto:7 AES_192_CM_HMAC_SHA1_32 inline:ImfcTrGS72TuD640dmZvqphYnLjaI2Aal3GDWxAd0WlrrRhuzT4=
  608. a=crypto:8 AES_256_CM_HMAC_SHA1_32 inline:JlmkW9D1BTFHvGtugR0/qo2dTB1TFu078AfDQ/9CtPeP2ZKHDcX7EvOm0I0wBg==
  609. ) =~ /(AES_CM_128_HMAC_SHA1_32|AES_CM_128_HMAC_SHA1_80)/ break=never
  610. Dialplan: sofia/internal/4001@34.93.139.28 Action set(rtp_secure_media=true)
  611. Dialplan: sofia/internal/4001@34.93.139.28 Action export(rtp_secure_media=true)
  612. Dialplan: sofia/internal/4001@34.93.139.28 Absolute Condition [global]
  613. Dialplan: sofia/internal/4001@34.93.139.28 Action hash(insert/${domain_name}-spymap/${caller_id_number}/${uuid})
  614. Dialplan: sofia/internal/4001@34.93.139.28 Action hash(insert/${domain_name}-last_dial/${caller_id_number}/${destination_number})
  615. Dialplan: sofia/internal/4001@34.93.139.28 Action hash(insert/${domain_name}-last_dial/global/${uuid})
  616. Dialplan: sofia/internal/4001@34.93.139.28 Action export(RFC2822_DATE=${strftime(%a, %d %b %Y %T %z)})
  617. Dialplan: sofia/internal/4001@34.93.139.28 parsing [default->snom-demo-2] continue=false
  618. Dialplan: sofia/internal/4001@34.93.139.28 Regex (FAIL) [snom-demo-2] destination_number(4002) =~ /^9001$/ break=on-false
  619. Dialplan: sofia/internal/4001@34.93.139.28 parsing [default->snom-demo-1] continue=false
  620. Dialplan: sofia/internal/4001@34.93.139.28 Regex (FAIL) [snom-demo-1] destination_number(4002) =~ /^9000$/ break=on-false
  621. Dialplan: sofia/internal/4001@34.93.139.28 parsing [default->eavesdrop] continue=false
  622. Dialplan: sofia/internal/4001@34.93.139.28 Regex (FAIL) [eavesdrop] destination_number(4002) =~ /^88(\d{4})$|^\*0(.*)$/ break=on-false
  623. Dialplan: sofia/internal/4001@34.93.139.28 parsing [default->eavesdrop] continue=false
  624. Dialplan: sofia/internal/4001@34.93.139.28 Regex (FAIL) [eavesdrop] destination_number(4002) =~ /^779$/ break=on-false
  625. Dialplan: sofia/internal/4001@34.93.139.28 parsing [default->call_return] continue=false
  626. Dialplan: sofia/internal/4001@34.93.139.28 Regex (FAIL) [call_return] destination_number(4002) =~ /^\*69$|^869$|^lcr$/ break=on-false
  627. Dialplan: sofia/internal/4001@34.93.139.28 parsing [default->del-group] continue=false
  628. Dialplan: sofia/internal/4001@34.93.139.28 Regex (FAIL) [del-group] destination_number(4002) =~ /^80(\d{2})$/ break=on-false
  629. Dialplan: sofia/internal/4001@34.93.139.28 parsing [default->add-group] continue=false
  630. Dialplan: sofia/internal/4001@34.93.139.28 Regex (FAIL) [add-group] destination_number(4002) =~ /^81(\d{2})$/ break=on-false
  631. Dialplan: sofia/internal/4001@34.93.139.28 parsing [default->call-group-simo] continue=false
  632. Dialplan: sofia/internal/4001@34.93.139.28 Regex (FAIL) [call-group-simo] destination_number(4002) =~ /^82(\d{2})$/ break=on-false
  633. Dialplan: sofia/internal/4001@34.93.139.28 parsing [default->call-group-order] continue=false
  634. Dialplan: sofia/internal/4001@34.93.139.28 Regex (FAIL) [call-group-order] destination_number(4002) =~ /^83(\d{2})$/ break=on-false
  635. Dialplan: sofia/internal/4001@34.93.139.28 parsing [default->extension-intercom] continue=false
  636. Dialplan: sofia/internal/4001@34.93.139.28 Regex (FAIL) [extension-intercom] destination_number(4002) =~ /^8(10[01][0-9])$/ break=on-false
  637. Dialplan: sofia/internal/4001@34.93.139.28 parsing [default->Local_Extension] continue=false
  638. Dialplan: sofia/internal/4001@34.93.139.28 Regex (PASS) [Local_Extension] destination_number(4002) =~ /^([14]0[01][0-9])$/ break=on-false
  639. Dialplan: sofia/internal/4001@34.93.139.28 Action export(dialed_extension=4002)
  640. Dialplan: sofia/internal/4001@34.93.139.28 Action bind_meta_app(1 b s execute_extension::dx XML features)
  641. Dialplan: sofia/internal/4001@34.93.139.28 Action bind_meta_app(2 b s record_session::/usr/local/freeswitch/recordings/${caller_id_number}.${strftime(%Y-%m-%d-%H-%M-%S)}.wav)
  642. Dialplan: sofia/internal/4001@34.93.139.28 Action bind_meta_app(3 b s execute_extension::cf XML features)
  643. Dialplan: sofia/internal/4001@34.93.139.28 Action bind_meta_app(4 b s execute_extension::att_xfer XML features)
  644. Dialplan: sofia/internal/4001@34.93.139.28 Action set(ringback=${us-ring})
  645. Dialplan: sofia/internal/4001@34.93.139.28 Action set(transfer_ringback=local_stream://moh)
  646. Dialplan: sofia/internal/4001@34.93.139.28 Action set(call_timeout=30)
  647. Dialplan: sofia/internal/4001@34.93.139.28 Action set(hangup_after_bridge=true)
  648. Dialplan: sofia/internal/4001@34.93.139.28 Action set(continue_on_fail=true)
  649. Dialplan: sofia/internal/4001@34.93.139.28 Action hash(insert/${domain_name}-call_return/${dialed_extension}/${caller_id_number})
  650. Dialplan: sofia/internal/4001@34.93.139.28 Action hash(insert/${domain_name}-last_dial_ext/${dialed_extension}/${uuid})
  651. Dialplan: sofia/internal/4001@34.93.139.28 Action set(called_party_callgroup=${user_data(${dialed_extension}@${domain_name} var callgroup)})
  652. Dialplan: sofia/internal/4001@34.93.139.28 Action hash(insert/${domain_name}-last_dial_ext/${called_party_callgroup}/${uuid})
  653. Dialplan: sofia/internal/4001@34.93.139.28 Action hash(insert/${domain_name}-last_dial_ext/global/${uuid})
  654. Dialplan: sofia/internal/4001@34.93.139.28 Action hash(insert/${domain_name}-last_dial/${called_party_callgroup}/${uuid})
  655. Dialplan: sofia/internal/4001@34.93.139.28 Action pre_answer()
  656. Dialplan: sofia/internal/4001@34.93.139.28 Action bridge(user/${dialed_extension}@${domain_name})
  657. Dialplan: sofia/internal/4001@34.93.139.28 Action answer()
  658. Dialplan: sofia/internal/4001@34.93.139.28 Action sleep(1000)
  659. Dialplan: sofia/internal/4001@34.93.139.28 Action bridge(loopback/app=voicemail:default ${domain_name} ${dialed_extension})
  660. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_state_machine.c:281 (sofia/internal/4001@34.93.139.28) State Change CS_ROUTING -> CS_EXECUTE
  661. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_state_machine.c:640 (sofia/internal/4001@34.93.139.28) State ROUTING going to sleep
  662. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_state_machine.c:581 (sofia/internal/4001@34.93.139.28) Running State Change CS_EXECUTE (Cur 1 Tot 113)
  663. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_state_machine.c:647 (sofia/internal/4001@34.93.139.28) State EXECUTE
  664. 2022-01-27 18:39:45.432177 99.47% [DEBUG] mod_sofia.c:213 sofia/internal/4001@34.93.139.28 SOFIA EXECUTE
  665. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_state_machine.c:323 sofia/internal/4001@34.93.139.28 Standard EXECUTE
  666. EXECUTE [depth=0] sofia/internal/4001@34.93.139.28 set(open=true)
  667. 2022-01-27 18:39:45.432177 99.47% [DEBUG] mod_dptools.c:1685 SET sofia/internal/4001@34.93.139.28 [open]=[true]
  668. EXECUTE [depth=0] sofia/internal/4001@34.93.139.28 set(rtp_secure_media=true)
  669. 2022-01-27 18:39:45.432177 99.47% [DEBUG] mod_dptools.c:1685 SET sofia/internal/4001@34.93.139.28 [rtp_secure_media]=[true]
  670. EXECUTE [depth=0] sofia/internal/4001@34.93.139.28 export(rtp_secure_media=true)
  671. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_channel.c:1315 EXPORT (export_vars) [rtp_secure_media]=[true]
  672. EXECUTE [depth=0] sofia/internal/4001@34.93.139.28 hash(insert/10.160.0.33-spymap/4001/aaf65cee-bddc-44e0-90f7-0e523ff91d0d)
  673. EXECUTE [depth=0] sofia/internal/4001@34.93.139.28 hash(insert/10.160.0.33-last_dial/4001/4002)
  674. EXECUTE [depth=0] sofia/internal/4001@34.93.139.28 hash(insert/10.160.0.33-last_dial/global/aaf65cee-bddc-44e0-90f7-0e523ff91d0d)
  675. EXECUTE [depth=0] sofia/internal/4001@34.93.139.28 export(RFC2822_DATE=Thu, 27 Jan 2022 18:39:45 +0000)
  676. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_channel.c:1315 EXPORT (export_vars) [RFC2822_DATE]=[Thu, 27 Jan 2022 18:39:45 +0000]
  677. EXECUTE [depth=0] sofia/internal/4001@34.93.139.28 export(dialed_extension=4002)
  678. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_channel.c:1315 EXPORT (export_vars) [dialed_extension]=[4002]
  679. EXECUTE [depth=0] sofia/internal/4001@34.93.139.28 bind_meta_app(1 b s execute_extension::dx XML features)
  680. 2022-01-27 18:39:45.432177 99.47% [INFO] switch_ivr_async.c:4774 Bound B-Leg: *1 execute_extension::dx XML features
  681. EXECUTE [depth=0] sofia/internal/4001@34.93.139.28 bind_meta_app(2 b s record_session::/usr/local/freeswitch/recordings/4001.2022-01-27-18-39-45.wav)
  682. 2022-01-27 18:39:45.432177 99.47% [INFO] switch_ivr_async.c:4774 Bound B-Leg: *2 record_session::/usr/local/freeswitch/recordings/4001.2022-01-27-18-39-45.wav
  683. EXECUTE [depth=0] sofia/internal/4001@34.93.139.28 bind_meta_app(3 b s execute_extension::cf XML features)
  684. 2022-01-27 18:39:45.432177 99.47% [INFO] switch_ivr_async.c:4774 Bound B-Leg: *3 execute_extension::cf XML features
  685. EXECUTE [depth=0] sofia/internal/4001@34.93.139.28 bind_meta_app(4 b s execute_extension::att_xfer XML features)
  686. 2022-01-27 18:39:45.432177 99.47% [INFO] switch_ivr_async.c:4774 Bound B-Leg: *4 execute_extension::att_xfer XML features
  687. EXECUTE [depth=0] sofia/internal/4001@34.93.139.28 set(ringback=%(2000,4000,440,480))
  688. 2022-01-27 18:39:45.432177 99.47% [DEBUG] mod_dptools.c:1685 SET sofia/internal/4001@34.93.139.28 [ringback]=[%(2000,4000,440,480)]
  689. EXECUTE [depth=0] sofia/internal/4001@34.93.139.28 set(transfer_ringback=local_stream://moh)
  690. 2022-01-27 18:39:45.432177 99.47% [DEBUG] mod_dptools.c:1685 SET sofia/internal/4001@34.93.139.28 [transfer_ringback]=[local_stream://moh]
  691. EXECUTE [depth=0] sofia/internal/4001@34.93.139.28 set(call_timeout=30)
  692. 2022-01-27 18:39:45.432177 99.47% [DEBUG] mod_dptools.c:1685 SET sofia/internal/4001@34.93.139.28 [call_timeout]=[30]
  693. EXECUTE [depth=0] sofia/internal/4001@34.93.139.28 set(hangup_after_bridge=true)
  694. 2022-01-27 18:39:45.432177 99.47% [DEBUG] mod_dptools.c:1685 SET sofia/internal/4001@34.93.139.28 [hangup_after_bridge]=[true]
  695. EXECUTE [depth=0] sofia/internal/4001@34.93.139.28 set(continue_on_fail=true)
  696. 2022-01-27 18:39:45.432177 99.47% [DEBUG] mod_dptools.c:1685 SET sofia/internal/4001@34.93.139.28 [continue_on_fail]=[true]
  697. EXECUTE [depth=0] sofia/internal/4001@34.93.139.28 hash(insert/10.160.0.33-call_return/4002/4001)
  698. EXECUTE [depth=0] sofia/internal/4001@34.93.139.28 hash(insert/10.160.0.33-last_dial_ext/4002/aaf65cee-bddc-44e0-90f7-0e523ff91d0d)
  699. EXECUTE [depth=0] sofia/internal/4001@34.93.139.28 set(called_party_callgroup=techsupport)
  700. 2022-01-27 18:39:45.432177 99.47% [DEBUG] mod_dptools.c:1685 SET sofia/internal/4001@34.93.139.28 [called_party_callgroup]=[techsupport]
  701. EXECUTE [depth=0] sofia/internal/4001@34.93.139.28 hash(insert/10.160.0.33-last_dial_ext/techsupport/aaf65cee-bddc-44e0-90f7-0e523ff91d0d)
  702. EXECUTE [depth=0] sofia/internal/4001@34.93.139.28 hash(insert/10.160.0.33-last_dial_ext/global/aaf65cee-bddc-44e0-90f7-0e523ff91d0d)
  703. EXECUTE [depth=0] sofia/internal/4001@34.93.139.28 hash(insert/10.160.0.33-last_dial/techsupport/aaf65cee-bddc-44e0-90f7-0e523ff91d0d)
  704. EXECUTE [depth=0] sofia/internal/4001@34.93.139.28 pre_answer()
  705. 2022-01-27 18:39:45.432177 99.47% [INFO] mod_dptools.c:1490 Sending early media
  706. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1835 looking for crypto suite [AEAD_AES_256_GCM_8]alias=[] in [1 AEAD_AES_128_GCM inline:SnX1qXEyg8iKch5ehpp9164vGtB3DVe89+NxvA==]
  707. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1835 looking for crypto suite [AEAD_AES_256_GCM]alias=[] in [1 AEAD_AES_128_GCM inline:SnX1qXEyg8iKch5ehpp9164vGtB3DVe89+NxvA==]
  708. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1835 looking for crypto suite [AEAD_AES_128_GCM_8]alias=[] in [1 AEAD_AES_128_GCM inline:SnX1qXEyg8iKch5ehpp9164vGtB3DVe89+NxvA==]
  709. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1835 looking for crypto suite [AEAD_AES_128_GCM]alias=[] in [1 AEAD_AES_128_GCM inline:SnX1qXEyg8iKch5ehpp9164vGtB3DVe89+NxvA==]
  710. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1844 Found suite AEAD_AES_128_GCM
  711. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1914 Set Remote Key [1 AEAD_AES_128_GCM inline:SnX1qXEyg8iKch5ehpp9164vGtB3DVe89+NxvA==]
  712. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1230 Set Local audio crypto Key [1 AEAD_AES_128_GCM inline:GGj2tb4erc3M+qc7Ty51BjdA1IhoXML8rH2Vyg==]
  713. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:5650 Audio Codec Compare [opus:120:48000:20:0:1]/[PCMU:0:8000:20:64000:1]
  714. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:5650 Audio Codec Compare [opus:120:48000:20:0:1]/[PCMA:8:8000:20:64000:1]
  715. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:5650 Audio Codec Compare [PCMU:0:8000:20:64000:1]/[PCMU:0:8000:20:64000:1]
  716. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:5705 Audio Codec Compare [PCMU:0:8000:20:64000:1] ++++ is saved as a match
  717. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:5650 Audio Codec Compare [PCMU:0:8000:20:64000:1]/[PCMA:8:8000:20:64000:1]
  718. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:5650 Audio Codec Compare [PCMA:8:8000:20:64000:1]/[PCMU:0:8000:20:64000:1]
  719. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:5650 Audio Codec Compare [PCMA:8:8000:20:64000:1]/[PCMA:8:8000:20:64000:1]
  720. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:5705 Audio Codec Compare [PCMA:8:8000:20:64000:1] ++++ is saved as a match
  721. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:5650 Audio Codec Compare [GSM:3:8000:20:13200:1]/[PCMU:0:8000:20:64000:1]
  722. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:5650 Audio Codec Compare [GSM:3:8000:20:13200:1]/[PCMA:8:8000:20:64000:1]
  723. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:5566 Set telephone-event payload to 101@8000
  724. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:3870 Set Codec sofia/internal/4001@34.93.139.28 PCMU/8000 20 ms 160 samples 64000 bits 1 channels
  725. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_codec.c:111 sofia/internal/4001@34.93.139.28 Original read codec set to PCMU:0
  726. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:5915 Set telephone-event payload to 101@8000
  727. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:5973 sofia/internal/4001@34.93.139.28 Set 2833 dtmf send payload to 101 recv payload to 101
  728. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:8777 AUDIO RTP [sofia/internal/4001@34.93.139.28] 10.160.0.33 port 25280 -> 192.168.0.107 port 59974 codec: 0 ms: 20
  729. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_rtp.c:4619 Starting timer [soft] 160 bytes per 20ms
  730. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:9089 sofia/internal/4001@34.93.139.28 Set 2833 dtmf send payload to 101
  731. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:9096 sofia/internal/4001@34.93.139.28 Set 2833 dtmf receive payload to 101
  732. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:9119 sofia/internal/4001@34.93.139.28 Set rtp dtmf delay to 40
  733. 2022-01-27 18:39:45.432177 99.47% [INFO] switch_rtp.c:4423 Activating audio Secure RTP SEND
  734. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_sqldb.c:2778 Secure Type: srtp:sdes:AEAD_AES_128_GCM
  735. 2022-01-27 18:39:45.432177 99.47% [INFO] switch_rtp.c:4401 Activating audio Secure RTP RECV
  736. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_sqldb.c:2778 Secure Type: srtp:sdes:AEAD_AES_128_GCM
  737. 2022-01-27 18:39:45.432177 99.47% [NOTICE] sofia_media.c:92 Pre-Answer sofia/internal/4001@34.93.139.28!
  738. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_channel.c:3622 (sofia/internal/4001@34.93.139.28) Callstate Change RINGING -> EARLY
  739. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:8759 Audio params are unchanged for sofia/internal/4001@34.93.139.28.
  740. 2022-01-27 18:39:45.432177 99.47% [DEBUG] mod_sofia.c:2610 Ring SDP:
  741. v=0
  742. o=FreeSWITCH 1643283505 1643283506 IN IP4 34.93.139.28
  743. s=FreeSWITCH
  744. c=IN IP4 34.93.139.28
  745. t=0 0
  746. m=audio 25280 RTP/SAVP 0 101
  747. a=rtpmap:0 PCMU/8000
  748. a=rtpmap:101 telephone-event/8000
  749. a=fmtp:101 0-15
  750. a=ptime:20
  751. a=sendrecv
  752. a=crypto:1 AEAD_AES_128_GCM inline:GGj2tb4erc3M+qc7Ty51BjdA1IhoXML8rH2Vyg==
  753.  
  754. EXECUTE [depth=0] sofia/internal/4001@34.93.139.28 bridge(user/4002@10.160.0.33)
  755. send 1263 bytes to tls/[103.165.21.34]:14403 at 18:39:45.452143:
  756. ------------------------------------------------------------------------
  757. SIP/2.0 183 Session Progress
  758. Via: SIP/2.0/TLS 192.168.0.107;branch=z9hG4bK-524287-1---849dfed928076c18;rport=14403;received=103.165.21.34
  759. From: "FSTest1"<sip:4001@34.93.139.28>;tag=30b6da5a
  760. To: <sip:4002@34.93.139.28>;tag=p4m4001456v3B
  761. Call-ID: 106969OTk4MTEwNDc3NTY3Y2I5ZjUzNGZkMDI0OGI3ZjA1MWE
  762. CSeq: 2 INVITE
  763. Contact: <sip:4002@34.93.139.28:5061;transport=tls>
  764. User-Agent: FreeSWITCH-mod_sofia/1.10.7-release+git~20211024T163933Z~883d2cb662~64bit
  765. Accept: application/sdp
  766. Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, SUBSCRIBE
  767. Supported: timer, path, replaces
  768. Allow-Events: talk, hold, conference, presence, as-feature-event, dialog, line-seize, call-info, sla, include-session-description, presence.winfo, message-summary, refer
  769. Content-Type: application/sdp
  770. Content-Disposition: session
  771. Content-Length: 298
  772. Remote-Party-ID: "4002" <sip:4002@34.93.139.28>;party=calling;privacy=off;screen=no
  773.  
  774. v=0
  775. o=FreeSWITCH 1643283505 1643283506 IN IP4 34.93.139.28
  776. s=FreeSWITCH
  777. c=IN IP4 34.93.139.28
  778. t=0 0
  779. m=audio 25280 RTP/SAVP 0 101
  780. a=rtpmap:0 PCMU/8000
  781. a=rtpmap:101 telephone-event/8000
  782. a=fmtp:101 0-15
  783. a=ptime:20
  784. a=crypto:1 AEAD_AES_128_GCM inline:GGj2tb4erc3M+qc7Ty51BjdA1IhoXML8rH2Vyg==
  785. 2022-01-27 18:39:45.432177 99.47% [DEBUG] sofia.c:7499 Channel sofia/internal/4001@34.93.139.28 entering state [early][183]
  786. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_channel.c:1269 sofia/internal/4001@34.93.139.28 EXPORTING[export_vars] [rtp_secure_media]=[true] to event
  787. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_channel.c:1269 sofia/internal/4001@34.93.139.28 EXPORTING[export_vars] [RFC2822_DATE]=[Thu, 27 Jan 2022 18:39:45 +0000] to event
  788. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_channel.c:1269 sofia/internal/4001@34.93.139.28 EXPORTING[export_vars] [dialed_extension]=[4002] to event
  789. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_ivr_originate.c:2281 Parsing global variables
  790. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_channel.c:1269 sofia/internal/4001@34.93.139.28 EXPORTING[export_vars] [rtp_secure_media]=[true] to event
  791. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_channel.c:1269 sofia/internal/4001@34.93.139.28 EXPORTING[export_vars] [RFC2822_DATE]=[Thu, 27 Jan 2022 18:39:45 +0000] to event
  792. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_channel.c:1269 sofia/internal/4001@34.93.139.28 EXPORTING[export_vars] [dialed_extension]=[4002] to event
  793. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_ivr_originate.c:2281 Parsing global variables
  794. 2022-01-27 18:39:45.432177 99.47% [NOTICE] switch_channel.c:1123 New Channel sofia/internal/4002@117.213.29.4:38515 [a91cf0ed-871c-4a57-8a28-5f8f02bdfa3f]
  795. 2022-01-27 18:39:45.432177 99.47% [DEBUG] mod_sofia.c:5121 (sofia/internal/4002@117.213.29.4:38515) State Change CS_NEW -> CS_INIT
  796. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_state_machine.c:581 (sofia/internal/4002@117.213.29.4:38515) Running State Change CS_INIT (Cur 2 Tot 114)
  797. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_state_machine.c:624 (sofia/internal/4002@117.213.29.4:38515) State INIT
  798. 2022-01-27 18:39:45.432177 99.47% [DEBUG] mod_sofia.c:97 sofia/internal/4002@117.213.29.4:38515 SOFIA INIT
  799. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1230 Set Local audio crypto Key [1 AEAD_AES_256_GCM_8 inline:VMuoCAHx5oFQ8xPx/OOeN83p3ti9bdyjirbQEafWLjiyPZfIy4ravdrorHg=]
  800. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1230 Set Local video crypto Key [1 AEAD_AES_256_GCM_8 inline:TGdNvFHbXJ3avTfX31L1AKgAZAvxh4GAGfYGuPwiXrZMRTcC7QNUxGie5c8=]
  801. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1230 Set Local text crypto Key [1 AEAD_AES_256_GCM_8 inline:wwdfoeSTQO5RmSOOjJD6ze9ySRaatAHXPhdPI+vAw4bVHiVsf2G0Z6i4Edw=]
  802. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1230 Set Local audio crypto Key [2 AEAD_AES_256_GCM inline:o7Oz+omibXjz7CSn65+yfF85U1XFM0gFoveNCrn6CHPT3dSE4z8qW1CBSBI=]
  803. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1230 Set Local video crypto Key [2 AEAD_AES_256_GCM inline:h1vt/ljMGukEjg1V0G2HJbs7yIxcslQA+tr9TJ1zR+wL+VuYbws43FzYRU0=]
  804. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1230 Set Local text crypto Key [2 AEAD_AES_256_GCM inline:+NdGyFkhTtPddz5BOHjxnH2dm8nxQOvY8TYovpU3AB477NoxnI1AiNSNwpQ=]
  805. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1230 Set Local audio crypto Key [3 AEAD_AES_128_GCM_8 inline:c9/B7Fjs+j5r0u7SM54nlmObZXVK5KL013FHHA==]
  806. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1230 Set Local video crypto Key [3 AEAD_AES_128_GCM_8 inline:LUBMUWxc2q742SjIUFCLf9PHLEyThmBtwIc9zg==]
  807. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1230 Set Local text crypto Key [3 AEAD_AES_128_GCM_8 inline:7mfAPKEajjfoxA3d2EyUVQ/gWHhMrRZwhIVk/g==]
  808. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1230 Set Local audio crypto Key [4 AEAD_AES_128_GCM inline:WkzfGTO0/ZiMV3MmS9qNhqxJVzRMxeYkQk18WQ==]
  809. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1230 Set Local video crypto Key [4 AEAD_AES_128_GCM inline:83dRCKOUDvsM4z3FK01PruDDxhTIzFX3HzJvjw==]
  810. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1230 Set Local text crypto Key [4 AEAD_AES_128_GCM inline:Qnx3omkFm6+cNukwd+OX5Za0k8sByXa3pfybUQ==]
  811. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1230 Set Local audio crypto Key [5 AES_256_CM_HMAC_SHA1_80 inline:aQQ2LV2RZeQW3IE/nQYOP+bYFqjJ7FBy2QerdSAsCwy3i3iK/ZFU21Wr3pW5Hg==]
  812. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1230 Set Local video crypto Key [5 AES_256_CM_HMAC_SHA1_80 inline:y6h80fjkwhbot7rg98v50wmSeEUqguK4SlmpDkTU0NN7gLB+vS9yWUTsK04vfw==]
  813. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1230 Set Local text crypto Key [5 AES_256_CM_HMAC_SHA1_80 inline:XnWBUbb6HQ+0dfS2rESkAgDD8VbODeFfp9tE4cQJhbTLuE1JEKuKdijkx7P9QA==]
  814. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1230 Set Local audio crypto Key [6 AES_192_CM_HMAC_SHA1_80 inline:1JwJg0G3tl89cFjITKr5WyC1/NGbRcJhFJszRlR26rNEUxqz9kU=]
  815. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1230 Set Local video crypto Key [6 AES_192_CM_HMAC_SHA1_80 inline:zA2x7ZnQcy2Zq+WhymGlPLrumHKVcFxEC/l0Jb7Rv+e+KEyfbRI=]
  816. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1230 Set Local text crypto Key [6 AES_192_CM_HMAC_SHA1_80 inline:6T2eH62GtEVmYX62p3B0y5ylrCX5Uqfo0zjLIifTV3mQBOxThU8=]
  817. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1230 Set Local audio crypto Key [7 AES_CM_128_HMAC_SHA1_80 inline:yhNzJ/CUTLEOJUsrhwlVFxY7V7No0VynFSbrR4Yl]
  818. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1230 Set Local video crypto Key [7 AES_CM_128_HMAC_SHA1_80 inline:GQOgu3rcpUyhOlwVAhRTcYzEX7A+H08QhTqj86/6]
  819. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1230 Set Local text crypto Key [7 AES_CM_128_HMAC_SHA1_80 inline:XQ+LVSZuWe6ojb2Dp7tIM707CkrkThPKpB/F/7OX]
  820. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1230 Set Local audio crypto Key [8 AES_256_CM_HMAC_SHA1_32 inline:ZfBzMmUuj8T52mVbff44ooyRNckm2xbbVxU9/cU0tYyPcTAjtG00XoFaBn16Aw==]
  821. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1230 Set Local video crypto Key [8 AES_256_CM_HMAC_SHA1_32 inline:fu1xaEI20L+T5LN3T36SQAsakquRsvV34d7Qwjlk2HipOdosVAtg9EwYj5h6ig==]
  822. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1230 Set Local text crypto Key [8 AES_256_CM_HMAC_SHA1_32 inline:zcQbzZWAAzIsm/Vbu8yymAslOFvVFyZq5srW6X/FJJ2ASJEGrnAYY5LnDLq5QA==]
  823. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1230 Set Local audio crypto Key [9 AES_192_CM_HMAC_SHA1_32 inline:G691SSLC1riEdvB9Mj9FqR98JQTPRi5p6EZPEySohBjWm6cko5s=]
  824. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1230 Set Local video crypto Key [9 AES_192_CM_HMAC_SHA1_32 inline:9FhQHxdFL2JadwSBg7ErWGsZv5bMmAMxrbPvecMRVk0oYpyv1y4=]
  825. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1230 Set Local text crypto Key [9 AES_192_CM_HMAC_SHA1_32 inline:2JfvzIb3KNV4IT5OF1aFJ85OA7QhmRCJkwXOHYIWK/qhkz3A6XU=]
  826. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1230 Set Local audio crypto Key [10 AES_CM_128_HMAC_SHA1_32 inline:hTQAwGZ4CIHczlzJtGStoAs0d+gwwekc6hCPURGq]
  827. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1230 Set Local video crypto Key [10 AES_CM_128_HMAC_SHA1_32 inline:99y+GexgGJ/YefY/VnGq3fzonuFDjgG5AHGJTuzv]
  828. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1230 Set Local text crypto Key [10 AES_CM_128_HMAC_SHA1_32 inline:n02hKgluMGLFMCdDYSZ6idARDe0MvuT0dhTPGBou]
  829. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1230 Set Local audio crypto Key [11 AES_CM_128_NULL_AUTH inline:76Dx3RB0bt/n3ps309aEaLL1zlbQj25DfoHRXsR9]
  830. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1230 Set Local video crypto Key [11 AES_CM_128_NULL_AUTH inline:YQgJiJu8k76ZPoaMMSX/c5zedIerqpHrsrY8XR/R]
  831. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_media.c:1230 Set Local text crypto Key [11 AES_CM_128_NULL_AUTH inline:L57plKVw2tU8mkHw6cI2aMF5Nl75JJVR4FktYr8a]
  832. 2022-01-27 18:39:45.432177 99.47% [INFO] sofia_glue.c:1651 sofia/internal/4002@117.213.29.4:38515 sending invite call-id: (null)
  833. 2022-01-27 18:39:45.432177 99.47% [DEBUG] sofia_glue.c:1654 sofia/internal/4002@117.213.29.4:38515 sending invite version: 1.10.7-release git 883d2cb 2021-10-24 16:39:33Z 64bit
  834. Local SDP:
  835. v=0
  836. o=FreeSWITCH 1643278049 1643278050 IN IP4 34.93.139.28
  837. s=FreeSWITCH
  838. c=IN IP4 34.93.139.28
  839. t=0 0
  840. m=audio 30736 RTP/SAVP 0 101
  841. a=rtpmap:0 PCMU/8000
  842. a=rtpmap:101 telephone-event/8000
  843. a=fmtp:101 0-15
  844. a=crypto:1 AEAD_AES_256_GCM_8 inline:VMuoCAHx5oFQ8xPx/OOeN83p3ti9bdyjirbQEafWLjiyPZfIy4ravdrorHg=
  845. a=crypto:2 AEAD_AES_256_GCM inline:o7Oz+omibXjz7CSn65+yfF85U1XFM0gFoveNCrn6CHPT3dSE4z8qW1CBSBI=
  846. a=crypto:3 AEAD_AES_128_GCM_8 inline:c9/B7Fjs+j5r0u7SM54nlmObZXVK5KL013FHHA==
  847. a=crypto:4 AEAD_AES_128_GCM inline:WkzfGTO0/ZiMV3MmS9qNhqxJVzRMxeYkQk18WQ==
  848. a=crypto:5 AES_256_CM_HMAC_SHA1_80 inline:aQQ2LV2RZeQW3IE/nQYOP+bYFqjJ7FBy2QerdSAsCwy3i3iK/ZFU21Wr3pW5Hg==
  849. a=crypto:6 AES_192_CM_HMAC_SHA1_80 inline:1JwJg0G3tl89cFjITKr5WyC1/NGbRcJhFJszRlR26rNEUxqz9kU=
  850. a=crypto:7 AES_CM_128_HMAC_SHA1_80 inline:yhNzJ/CUTLEOJUsrhwlVFxY7V7No0VynFSbrR4Yl
  851. a=crypto:8 AES_256_CM_HMAC_SHA1_32 inline:ZfBzMmUuj8T52mVbff44ooyRNckm2xbbVxU9/cU0tYyPcTAjtG00XoFaBn16Aw==
  852. a=crypto:9 AES_192_CM_HMAC_SHA1_32 inline:G691SSLC1riEdvB9Mj9FqR98JQTPRi5p6EZPEySohBjWm6cko5s=
  853. a=crypto:10 AES_CM_128_HMAC_SHA1_32 inline:hTQAwGZ4CIHczlzJtGStoAs0d+gwwekc6hCPURGq
  854. a=crypto:11 AES_CM_128_NULL_AUTH inline:76Dx3RB0bt/n3ps309aEaLL1zlbQj25DfoHRXsR9
  855. a=ptime:20
  856. a=sendrecv
  857.  
  858. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_state_machine.c:40 sofia/internal/4002@117.213.29.4:38515 Standard INIT
  859. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_state_machine.c:48 (sofia/internal/4002@117.213.29.4:38515) State Change CS_INIT -> CS_ROUTING
  860. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_state_machine.c:624 (sofia/internal/4002@117.213.29.4:38515) State INIT going to sleep
  861. send 2284 bytes to tls/[117.213.29.4]:38515 at 18:39:45.455909:
  862. ------------------------------------------------------------------------
  863. INVITE sip:4002@117.213.29.4:38515;rinstance=0d42d034c69aa9ca;transport=tls SIP/2.0
  864. Via: SIP/2.0/TLS 34.93.139.28:5061;rport;branch=z9hG4bK1F5gSDpamjr0N
  865. Max-Forwards: 69
  866. From: "FSTest1" <sip:4001@34.93.139.28>;tag=QDeX2Uj82FKpQ
  867. To: <sip:4002@117.213.29.4:38515;rinstance=0d42d034c69aa9ca;transport=tls>
  868. Call-ID: 5701bbb8-fa43-123a-fda6-42010aa00021
  869. CSeq: 47100600 INVITE
  870. Contact: <sip:mod_sofia@34.93.139.28:5061;transport=tls>
  871. User-Agent: FreeSWITCH-mod_sofia/1.10.7-release+git~20211024T163933Z~883d2cb662~64bit
  872. Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, SUBSCRIBE
  873. Supported: timer, path, replaces
  874. Allow-Events: talk, hold, conference, presence, as-feature-event, dialog, line-seize, call-info, sla, include-session-description, presence.winfo, message-summary, refer
  875. Content-Type: application/sdp
  876. Content-Disposition: session
  877. Content-Length: 1232
  878. X-FS-Support: update_display,send_info
  879. Remote-Party-ID: "FSTest1" <sip:4001@34.93.139.28>;party=calling;screen=yes;privacy=off
  880.  
  881. v=0
  882. o=FreeSWITCH 1643278049 1643278050 IN IP4 34.93.139.28
  883. s=FreeSWITCH
  884. c=IN IP4 34.93.139.28
  885. t=0 0
  886. m=audio 30736 RTP/SAVP 0 101
  887. a=rtpmap:0 PCMU/8000
  888. a=rtpmap:101 telephone-event/8000
  889. a=fmtp:101 0-15
  890. a=crypto:1 AEAD_AES_256_GCM_8 inline:VMuoCAHx5oFQ8xPx/OOeN83p3ti9bdyjirbQEafWLjiyPZfIy4ravdrorHg=
  891. a=crypto:2 AEAD_AES_256_GCM inline:o7Oz+omibXjz7CSn65+yfF85U1XFM0gFoveNCrn6CHPT3dSE4z8qW1CBSBI=
  892. a=crypto:3 AEAD_AES_128_GCM_8 inline:c9/B7Fjs+j5r0u7SM54nlmObZXVK5KL013FHHA==
  893. a=crypto:4 AEAD_AES_128_GCM inline:WkzfGTO0/ZiMV3MmS9qNhqxJVzRMxeYkQk18WQ==
  894. a=crypto:5 AES_256_CM_HMAC_SHA1_80 inline:aQQ2LV2RZeQW3IE/nQYOP+bYFqjJ7FBy2QerdSAsCwy3i3iK/ZFU21Wr3pW5Hg==
  895. a=crypto:6 AES_192_CM_HMAC_SHA1_80 inline:1JwJg0G3tl89cFjITKr5WyC1/NGbRcJhFJszRlR26rNEUxqz9kU=
  896. a=crypto:7 AES_CM_128_HMAC_SHA1_80 inline:yhNzJ/CUTLEOJUsrhwlVFxY7V7No0VynFSbrR4Yl
  897. a=crypto:8 AES_256_CM_HMAC_SHA1_32 inline:ZfBzMmUuj8T52mVbff44ooyRNckm2xbbVxU9/cU0tYyPcTAjtG00XoFaBn16Aw==
  898. a=crypto:9 AES_192_CM_HMAC_SHA1_32 inline:G691SSLC1riEdvB9Mj9FqR98JQTPRi5p6EZPEySohBjWm6cko5s=
  899. a=crypto:10 AES_CM_128_HMAC_SHA1_32 inline:hTQAwGZ4CIHczlzJtGStoAs0d+gwwekc6hCPURGq
  900. a=crypto:11 AES_CM_128_NULL_AUTH inline:76Dx3RB0bt/n3ps309aEaLL1zlbQj25DfoHRXsR9
  901. a=ptime:20
  902. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_state_machine.c:581 (sofia/internal/4002@117.213.29.4:38515) Running State Change CS_ROUTING (Cur 2 Tot 114)
  903. 2022-01-27 18:39:45.432177 99.47% [DEBUG] sofia.c:7499 Channel sofia/internal/4002@117.213.29.4:38515 entering state [calling][0]
  904. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_state_machine.c:640 (sofia/internal/4002@117.213.29.4:38515) State ROUTING
  905. 2022-01-27 18:39:45.432177 99.47% [DEBUG] mod_sofia.c:158 sofia/internal/4002@117.213.29.4:38515 SOFIA ROUTING
  906. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_ivr_originate.c:67 (sofia/internal/4002@117.213.29.4:38515) State Change CS_ROUTING -> CS_CONSUME_MEDIA
  907. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_state_machine.c:640 (sofia/internal/4002@117.213.29.4:38515) State ROUTING going to sleep
  908. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_state_machine.c:581 (sofia/internal/4002@117.213.29.4:38515) Running State Change CS_CONSUME_MEDIA (Cur 2 Tot 114)
  909. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_state_machine.c:659 (sofia/internal/4002@117.213.29.4:38515) State CONSUME_MEDIA
  910. 2022-01-27 18:39:45.432177 99.47% [DEBUG] switch_core_state_machine.c:659 (sofia/internal/4002@117.213.29.4:38515) State CONSUME_MEDIA going to sleep
  911. recv 321 bytes from tls/[117.213.29.4]:38515 at 18:39:45.587111:
  912. ------------------------------------------------------------------------
  913. SIP/2.0 100 Trying
  914. Via: SIP/2.0/TLS 34.93.139.28:5061;rport=5061;branch=z9hG4bK1F5gSDpamjr0N
  915. To: <sip:4002@117.213.29.4:38515;rinstance=0d42d034c69aa9ca;transport=tls>
  916. From: "FSTest1" <sip:4001@34.93.139.28>;tag=QDeX2Uj82FKpQ
  917. Call-ID: 5701bbb8-fa43-123a-fda6-42010aa00021
  918. CSeq: 47100600 INVITE
  919. Content-Length: 0
  920.  
  921. recv 562 bytes from tls/[117.213.29.4]:38515 at 18:39:45.821449:
  922. ------------------------------------------------------------------------
  923. SIP/2.0 180 Ringing
  924. Via: SIP/2.0/TLS 34.93.139.28:5061;rport=5061;branch=z9hG4bK1F5gSDpamjr0N
  925. Contact: <sip:4002@117.213.29.4:38515;rinstance=0d42d034c69aa9ca;transport=tls>;+sip.instance="<urn:uuid:4b3a26e9-5a70-5d1a-a2df-278ebf2023c0>"
  926. To: "FSTest2"<sip:4002@117.213.29.4:38515;rinstance=0d42d034c69aa9ca;transport=tls>;tag=223c4183
  927. From: "FSTest1" <sip:4001@34.93.139.28>;tag=QDeX2Uj82FKpQ
  928. Call-ID: 5701bbb8-fa43-123a-fda6-42010aa00021
  929. CSeq: 47100600 INVITE
  930. User-Agent: XLogix Android 6.6.1 build 129231
  931. Allow-Events: talk, hold
  932. Content-Length: 0
  933.  
  934. 2022-01-27 18:39:45.812175 99.47% [DEBUG] sofia.c:7499 Channel sofia/internal/4002@117.213.29.4:38515 entering state [proceeding][180]
  935. 2022-01-27 18:39:45.812175 99.47% [NOTICE] sofia.c:7610 Ring-Ready sofia/internal/4002@117.213.29.4:38515!
  936. 2022-01-27 18:39:45.812175 99.47% [DEBUG] switch_channel.c:3494 (sofia/internal/4002@117.213.29.4:38515) Callstate Change DOWN -> RINGING
  937. 2022-01-27 18:39:45.832197 99.47% [DEBUG] switch_ivr_originate.c:1353 Raw Codec Activation Success L16@8000hz 1 channel 20ms
  938. 2022-01-27 18:39:45.832197 99.47% [DEBUG] switch_core_codec.c:223 sofia/internal/4001@34.93.139.28 Push codec L16:100
  939. 2022-01-27 18:39:45.832197 99.47% [DEBUG] switch_ivr_originate.c:1427 Play Ringback Tone [%(2000,4000,440,480)]
  940. 2022-01-27 18:39:45.872173 99.47% [INFO] switch_rtp.c:7894 Auto Changing audio port from 192.168.0.107:59974 to 103.165.21.34:14630
  941. recv 952 bytes from tls/[117.213.29.4]:38515 at 18:39:48.061121:
  942. ------------------------------------------------------------------------
  943. SIP/2.0 200 OK
  944. Via: SIP/2.0/TLS 34.93.139.28:5061;rport=5061;branch=z9hG4bK1F5gSDpamjr0N
  945. Contact: <sip:4002@117.213.29.4:38515;rinstance=0d42d034c69aa9ca;transport=tls>;+sip.instance="<urn:uuid:4b3a26e9-5a70-5d1a-a2df-278ebf2023c0>"
  946. To: <sip:4002@117.213.29.4:38515;rinstance=0d42d034c69aa9ca;transport=tls>;tag=223c4183
  947. From: "FSTest1" <sip:4001@34.93.139.28>;tag=QDeX2Uj82FKpQ
  948. Call-ID: 5701bbb8-fa43-123a-fda6-42010aa00021
  949. CSeq: 47100600 INVITE
  950. Allow: OPTIONS, INVITE, ACK, CANCEL, BYE, REFER, INFO, NOTIFY, UPDATE, PRACK, SUBSCRIBE, MESSAGE
  951. Content-Type: application/sdp
  952. Supported: replaces
  953. User-Agent: XLogix Android 6.6.1 build 129231
  954. Content-Length: 278
  955.  
  956. v=0
  957. o=- 1140213893 3 IN IP4 192.168.1.2
  958. s=Cpc session
  959. c=IN IP4 117.213.29.4
  960. t=0 0
  961. m=audio 63712 RTP/SAVP 0 101
  962. a=rtpmap:101 telephone-event/8000
  963. a=fmtp:101 0-15
  964. a=crypto:2 AEAD_AES_256_GCM inline:e5CIYLBfxStMsM5oWdGIH66hkBPTJsuUFEa5ZlG81t5t4ghZIKXD+8bJSX0=
  965. a=sendrecv
  966. 2022-01-27 18:39:48.032179 99.37% [DEBUG] sofia.c:7499 Channel sofia/internal/4002@117.213.29.4:38515 entering state [completing][200]
  967. 2022-01-27 18:39:48.032179 99.37% [DEBUG] sofia.c:7509 Remote SDP:
  968. v=0
  969. o=- 1140213893 3 IN IP4 192.168.1.2
  970. s=Cpc session
  971. c=IN IP4 117.213.29.4
  972. t=0 0
  973. m=audio 63712 RTP/SAVP 0 101
  974. a=rtpmap:101 telephone-event/8000
  975. a=fmtp:101 0-15
  976. a=crypto:2 AEAD_AES_256_GCM inline:e5CIYLBfxStMsM5oWdGIH66hkBPTJsuUFEa5ZlG81t5t4ghZIKXD+8bJSX0=
  977.  
  978. send 464 bytes to tls/[117.213.29.4]:38515 at 18:39:48.062441:
  979. ------------------------------------------------------------------------
  980. ACK sip:4002@117.213.29.4:38515;rinstance=0d42d034c69aa9ca;transport=tls SIP/2.0
  981. Via: SIP/2.0/TLS 34.93.139.28:5061;rport;branch=z9hG4bK2ry9t86DHUeKH
  982. Max-Forwards: 70
  983. From: "FSTest1" <sip:4001@34.93.139.28>;tag=QDeX2Uj82FKpQ
  984. To: <sip:4002@117.213.29.4:38515;rinstance=0d42d034c69aa9ca;transport=tls>;tag=223c4183
  985. Call-ID: 5701bbb8-fa43-123a-fda6-42010aa00021
  986. CSeq: 47100600 ACK
  987. Contact: <sip:mod_sofia@34.93.139.28:5061;transport=tls>
  988. Content-Length: 0
  989.  
  990. 2022-01-27 18:39:48.032179 99.37% [DEBUG] sofia.c:7499 Channel sofia/internal/4002@117.213.29.4:38515 entering state [ready][200]
  991. 2022-01-27 18:39:48.032179 99.37% [DEBUG] switch_core_media.c:1835 looking for crypto suite [AEAD_AES_256_GCM_8]alias=[] in [2 AEAD_AES_256_GCM inline:e5CIYLBfxStMsM5oWdGIH66hkBPTJsuUFEa5ZlG81t5t4ghZIKXD+8bJSX0=]
  992. 2022-01-27 18:39:48.032179 99.37% [DEBUG] switch_core_media.c:1835 looking for crypto suite [AEAD_AES_256_GCM]alias=[] in [2 AEAD_AES_256_GCM inline:e5CIYLBfxStMsM5oWdGIH66hkBPTJsuUFEa5ZlG81t5t4ghZIKXD+8bJSX0=]
  993. 2022-01-27 18:39:48.032179 99.37% [DEBUG] switch_core_media.c:1844 Found suite AEAD_AES_256_GCM
  994. 2022-01-27 18:39:48.032179 99.37% [DEBUG] switch_core_media.c:1914 Set Remote Key [2 AEAD_AES_256_GCM inline:e5CIYLBfxStMsM5oWdGIH66hkBPTJsuUFEa5ZlG81t5t4ghZIKXD+8bJSX0=]
  995. 2022-01-27 18:39:48.032179 99.37% [DEBUG] switch_core_media.c:5650 Audio Codec Compare [PCMU:0:8000:20:64000:1]/[PCMU:0:8000:20:64000:1]
  996. 2022-01-27 18:39:48.032179 99.37% [DEBUG] switch_core_media.c:5705 Audio Codec Compare [PCMU:0:8000:20:64000:1] ++++ is saved as a match
  997. 2022-01-27 18:39:48.032179 99.37% [DEBUG] switch_core_media.c:5566 Set telephone-event payload to 101@8000
  998. 2022-01-27 18:39:48.032179 99.37% [DEBUG] switch_core_media.c:3870 Set Codec sofia/internal/4002@117.213.29.4:38515 PCMU/8000 20 ms 160 samples 64000 bits 1 channels
  999. 2022-01-27 18:39:48.032179 99.37% [DEBUG] switch_core_codec.c:111 sofia/internal/4002@117.213.29.4:38515 Original read codec set to PCMU:0
  1000. 2022-01-27 18:39:48.032179 99.37% [DEBUG] switch_core_media.c:5915 Set telephone-event payload to 101@8000
  1001. 2022-01-27 18:39:48.032179 99.37% [DEBUG] switch_core_media.c:5973 sofia/internal/4002@117.213.29.4:38515 Set 2833 dtmf send payload to 101 recv payload to 101
  1002. 2022-01-27 18:39:48.032179 99.37% [DEBUG] switch_core_media.c:8777 AUDIO RTP [sofia/internal/4002@117.213.29.4:38515] 10.160.0.33 port 30736 -> 117.213.29.4 port 63712 codec: 0 ms: 20
  1003. 2022-01-27 18:39:48.032179 99.37% [DEBUG] switch_rtp.c:4619 Starting timer [soft] 160 bytes per 20ms
  1004. 2022-01-27 18:39:48.032179 99.37% [DEBUG] switch_core_media.c:9089 sofia/internal/4002@117.213.29.4:38515 Set 2833 dtmf send payload to 101
  1005. 2022-01-27 18:39:48.032179 99.37% [DEBUG] switch_core_media.c:9096 sofia/internal/4002@117.213.29.4:38515 Set 2833 dtmf receive payload to 101
  1006. 2022-01-27 18:39:48.032179 99.37% [DEBUG] switch_core_media.c:9119 sofia/internal/4002@117.213.29.4:38515 Set rtp dtmf delay to 40
  1007. 2022-01-27 18:39:48.032179 99.37% [INFO] switch_rtp.c:4423 Activating audio Secure RTP SEND
  1008. 2022-01-27 18:39:48.032179 99.37% [DEBUG] switch_core_sqldb.c:2778 Secure Type: srtp:sdes:AEAD_AES_256_GCM
  1009. 2022-01-27 18:39:48.032179 99.37% [INFO] switch_rtp.c:4401 Activating audio Secure RTP RECV
  1010. 2022-01-27 18:39:48.032179 99.37% [DEBUG] switch_core_sqldb.c:2778 Secure Type: srtp:sdes:AEAD_AES_256_GCM
  1011. 2022-01-27 18:39:48.032179 99.37% [NOTICE] sofia.c:8683 Channel [sofia/internal/4002@117.213.29.4:38515] has been answered
  1012. 2022-01-27 18:39:48.032179 99.37% [DEBUG] switch_channel.c:3950 (sofia/internal/4002@117.213.29.4:38515) Callstate Change RINGING -> ACTIVE
  1013. 2022-01-27 18:39:48.032179 99.37% [DEBUG] switch_core_codec.c:248 sofia/internal/4001@34.93.139.28 Restore previous codec PCMU:0.
  1014. 2022-01-27 18:39:48.032179 99.37% [DEBUG] switch_core_media.c:8759 Audio params are unchanged for sofia/internal/4001@34.93.139.28.
  1015. 2022-01-27 18:39:48.032179 99.37% [DEBUG] mod_sofia.c:913 Local SDP sofia/internal/4001@34.93.139.28:
  1016. v=0
  1017. o=FreeSWITCH 1643283505 1643283507 IN IP4 34.93.139.28
  1018. s=FreeSWITCH
  1019. c=IN IP4 34.93.139.28
  1020. t=0 0
  1021. m=audio 25280 RTP/SAVP 0 101
  1022. a=rtpmap:0 PCMU/8000
  1023. a=rtpmap:101 telephone-event/8000
  1024. a=fmtp:101 0-15
  1025. a=ptime:20
  1026. a=sendrecv
  1027. a=crypto:1 AEAD_AES_128_GCM inline:GGj2tb4erc3M+qc7Ty51BjdA1IhoXML8rH2Vyg==
  1028.  
  1029. 2022-01-27 18:39:48.032179 99.37% [NOTICE] switch_ivr_originate.c:3834 Channel [sofia/internal/4001@34.93.139.28] has been answered
  1030. send 1269 bytes to tls/[103.165.21.34]:14403 at 18:39:48.070283:
  1031. ------------------------------------------------------------------------
  1032. SIP/2.0 200 OK
  1033. Via: SIP/2.0/TLS 192.168.0.107;branch=z9hG4bK-524287-1---849dfed928076c18;rport=14403;received=103.165.21.34
  1034. From: "FSTest1"<sip:4001@34.93.139.28>;tag=30b6da5a
  1035. To: <sip:4002@34.93.139.28>;tag=p4m4001456v3B
  1036. Call-ID: 106969OTk4MTEwNDc3NTY3Y2I5ZjUzNGZkMDI0OGI3ZjA1MWE
  1037. CSeq: 2 INVITE
  1038. Contact: <sip:4002@34.93.139.28:5061;transport=tls>
  1039. User-Agent: FreeSWITCH-mod_sofia/1.10.7-release+git~20211024T163933Z~883d2cb662~64bit
  1040. Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, SUBSCRIBE
  1041. Supported: timer, path, replaces
  1042. Allow-Events: talk, hold, conference, presence, as-feature-event, dialog, line-seize, call-info, sla, include-session-description, presence.winfo, message-summary, refer
  1043. Session-Expires: 120;refresher=uas
  1044. Content-Type: application/sdp
  1045. Content-Disposition: session
  1046. Content-Length: 298
  1047. Remote-Party-ID: "Outbound Call" <sip:4002@34.93.139.28>;party=calling;privacy=off;screen=no
  1048.  
  1049. v=0
  1050. o=FreeSWITCH 1643283505 1643283506 IN IP4 34.93.139.28
  1051. s=FreeSWITCH
  1052. c=IN IP4 34.93.139.28
  1053. t=0 0
  1054. m=audio 25280 RTP/SAVP 0 101
  1055. a=rtpmap:0 PCMU/8000
  1056. a=rtpmap:101 telephone-event/8000
  1057. a=fmtp:101 0-15
  1058. a=ptime:20
  1059. a=crypto:1 AEAD_AES_128_GCM inline:GGj2tb4erc3M+qc7Ty51BjdA1IhoXML8rH2Vyg==
  1060. 2022-01-27 18:39:48.032179 99.37% [DEBUG] switch_channel.c:3950 (sofia/internal/4001@34.93.139.28) Callstate Change EARLY -> ACTIVE
  1061. 2022-01-27 18:39:48.032179 99.37% [DEBUG] sofia.c:7499 Channel sofia/internal/4001@34.93.139.28 entering state [completed][200]
  1062. 2022-01-27 18:39:48.032179 99.37% [DEBUG] switch_ivr_originate.c:3892 Originate Resulted in Success: [sofia/internal/4002@117.213.29.4:38515] Peer UUID: a91cf0ed-871c-4a57-8a28-5f8f02bdfa3f
  1063. 2022-01-27 18:39:48.072146 99.37% [DEBUG] switch_ivr_originate.c:3892 Originate Resulted in Success: [sofia/internal/4002@117.213.29.4:38515] Peer UUID: a91cf0ed-871c-4a57-8a28-5f8f02bdfa3f
  1064. 2022-01-27 18:39:48.072146 99.37% [DEBUG] switch_ivr_bridge.c:1793 (sofia/internal/4002@117.213.29.4:38515) State Change CS_CONSUME_MEDIA -> CS_EXCHANGE_MEDIA
  1065. 2022-01-27 18:39:48.072146 99.37% [DEBUG] switch_core_state_machine.c:581 (sofia/internal/4002@117.213.29.4:38515) Running State Change CS_EXCHANGE_MEDIA (Cur 2 Tot 114)
  1066. 2022-01-27 18:39:48.072146 99.37% [DEBUG] switch_core_state_machine.c:650 (sofia/internal/4002@117.213.29.4:38515) State EXCHANGE_MEDIA
  1067. 2022-01-27 18:39:48.072146 99.37% [DEBUG] mod_sofia.c:671 SOFIA EXCHANGE_MEDIA
  1068. 2022-01-27 18:39:48.092171 99.37% [DEBUG] switch_rtp.c:7934 Correct audio ip/port confirmed.
  1069. 2022-01-27 18:39:48.112181 99.37% [DEBUG] switch_rtp.c:7934 Correct audio ip/port confirmed.
  1070. recv 478 bytes from tls/[103.165.21.34]:14403 at 18:39:48.125211:
  1071. ------------------------------------------------------------------------
  1072. ACK sip:4002@34.93.139.28:5061;transport=tls SIP/2.0
  1073. Via: SIP/2.0/TLS 192.168.0.107;branch=z9hG4bK-524287-1---e886b4e2ffbb5790;rport
  1074. Max-Forwards: 70
  1075. Contact: <sip:4001@103.165.21.34:14403;rinstance=8a9bd45d4ac81129;transport=tls>
  1076. To: <sip:4002@34.93.139.28>;tag=p4m4001456v3B
  1077. From: "FSTest1"<sip:4001@34.93.139.28>;tag=30b6da5a
  1078. Call-ID: 106969OTk4MTEwNDc3NTY3Y2I5ZjUzNGZkMDI0OGI3ZjA1MWE
  1079. CSeq: 2 ACK
  1080. User-Agent: XLogix release 6.4.0.1 stamp 106969
  1081. Content-Length: 0
  1082.  
  1083. 2022-01-27 18:39:48.112181 99.37% [DEBUG] sofia.c:7499 Channel sofia/internal/4001@34.93.139.28 entering state [ready][200]
  1084. recv 757 bytes from tls/[103.165.21.34]:14403 at 18:39:53.492806:
  1085. ------------------------------------------------------------------------
  1086. BYE sip:4002@34.93.139.28:5061;transport=tls SIP/2.0
  1087. Via: SIP/2.0/TLS 192.168.0.107;branch=z9hG4bK-524287-1---3ae2bd746ed91263;rport
  1088. Max-Forwards: 70
  1089. Contact: <sip:4001@103.165.21.34:14403;rinstance=8a9bd45d4ac81129;transport=tls>
  1090. To: <sip:4002@34.93.139.28>;tag=p4m4001456v3B
  1091. From: "FSTest1"<sip:4001@34.93.139.28>;tag=30b6da5a
  1092. Call-ID: 106969OTk4MTEwNDc3NTY3Y2I5ZjUzNGZkMDI0OGI3ZjA1MWE
  1093. CSeq: 3 BYE
  1094. Proxy-Authorization: Digest username="4001",realm="34.93.139.28",nonce="a83b6799-599a-4838-826e-dc70dcd3033b",uri="sip:4002@34.93.139.28:5061;transport=tls",response="0b4c17389b91e80778764353d5c228c8",cnonce="757bd8ab34d81a47b97c2bb14484916e",nc=00000002,qop=auth,algorithm=MD5
  1095. User-Agent: XLogix release 6.4.0.1 stamp 106969
  1096. Content-Length: 0
  1097.  
  1098. 2022-01-27 18:39:53.492186 99.30% [NOTICE] sofia.c:1065 Hangup sofia/internal/4001@34.93.139.28 [CS_EXECUTE] [NORMAL_CLEARING]
  1099. send 551 bytes to tls/[103.165.21.34]:14403 at 18:39:53.510731:
  1100. ------------------------------------------------------------------------
  1101. SIP/2.0 200 OK
  1102. Via: SIP/2.0/TLS 192.168.0.107;branch=z9hG4bK-524287-1---3ae2bd746ed91263;rport=14403;received=103.165.21.34
  1103. From: "FSTest1"<sip:4001@34.93.139.28>;tag=30b6da5a
  1104. To: <sip:4002@34.93.139.28>;tag=p4m4001456v3B
  1105. Call-ID: 106969OTk4MTEwNDc3NTY3Y2I5ZjUzNGZkMDI0OGI3ZjA1MWE
  1106. CSeq: 3 BYE
  1107. User-Agent: FreeSWITCH-mod_sofia/1.10.7-release+git~20211024T163933Z~883d2cb662~64bit
  1108. Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, SUBSCRIBE
  1109. Supported: timer, path, replaces
  1110. Content-Length: 0
  1111.  
  1112. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_ivr_bridge.c:912 BRIDGE THREAD DONE [sofia/internal/4001@34.93.139.28]
  1113. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_ivr_bridge.c:820 sofia/internal/4001@34.93.139.28 ending bridge by request from write function
  1114. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_ivr_bridge.c:912 BRIDGE THREAD DONE [sofia/internal/4002@117.213.29.4:38515]
  1115. 2022-01-27 18:39:53.492186 99.30% [NOTICE] switch_ivr_bridge.c:1029 Hangup sofia/internal/4002@117.213.29.4:38515 [CS_EXCHANGE_MEDIA] [NORMAL_CLEARING]
  1116. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_core_state_machine.c:650 (sofia/internal/4002@117.213.29.4:38515) State EXCHANGE_MEDIA going to sleep
  1117. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_core_state_machine.c:581 (sofia/internal/4002@117.213.29.4:38515) Running State Change CS_HANGUP (Cur 2 Tot 114)
  1118. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_core_state_machine.c:844 (sofia/internal/4002@117.213.29.4:38515) Callstate Change ACTIVE -> HANGUP
  1119. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_core_state_machine.c:846 (sofia/internal/4002@117.213.29.4:38515) State HANGUP
  1120. 2022-01-27 18:39:53.492186 99.30% [DEBUG] mod_sofia.c:462 sofia/internal/4002@117.213.29.4:38515 Overriding SIP cause 480 with 200 from the other leg
  1121. 2022-01-27 18:39:53.492186 99.30% [DEBUG] mod_sofia.c:468 Channel sofia/internal/4002@117.213.29.4:38515 hanging up, cause: NORMAL_CLEARING
  1122. 2022-01-27 18:39:53.492186 99.30% [DEBUG] mod_sofia.c:522 Sending BYE to sofia/internal/4002@117.213.29.4:38515
  1123. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_core_state_machine.c:59 sofia/internal/4002@117.213.29.4:38515 Standard HANGUP, cause: NORMAL_CLEARING
  1124. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_core_state_machine.c:846 (sofia/internal/4002@117.213.29.4:38515) State HANGUP going to sleep
  1125. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_core_state_machine.c:616 (sofia/internal/4002@117.213.29.4:38515) State Change CS_HANGUP -> CS_REPORTING
  1126. send 684 bytes to tls/[117.213.29.4]:38515 at 18:39:53.524583:
  1127. ------------------------------------------------------------------------
  1128. BYE sip:4002@117.213.29.4:38515;rinstance=0d42d034c69aa9ca;transport=tls SIP/2.0
  1129. Via: SIP/2.0/TLS 34.93.139.28:5061;rport;branch=z9hG4bK31Q2v3QHe445c
  1130. Max-Forwards: 70
  1131. From: "FSTest1" <sip:4001@34.93.139.28>;tag=QDeX2Uj82FKpQ
  1132. To: <sip:4002@117.213.29.4:38515;rinstance=0d42d034c69aa9ca;transport=tls>;tag=223c4183
  1133. Call-ID: 5701bbb8-fa43-123a-fda6-42010aa00021
  1134. CSeq: 47100601 BYE
  1135. User-Agent: FreeSWITCH-mod_sofia/1.10.7-release+git~20211024T163933Z~883d2cb662~64bit
  1136. Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, SUBSCRIBE
  1137. Supported: timer, path, replaces
  1138. Reason: Q.850;cause=16;text="NORMAL_CLEARING"
  1139. Content-Length: 0
  1140.  
  1141. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_core_state_machine.c:581 (sofia/internal/4002@117.213.29.4:38515) Running State Change CS_REPORTING (Cur 2 Tot 114)
  1142. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_core_state_machine.c:932 (sofia/internal/4002@117.213.29.4:38515) State REPORTING
  1143. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_core_state_machine.c:168 sofia/internal/4002@117.213.29.4:38515 Standard REPORTING, cause: NORMAL_CLEARING
  1144. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_core_state_machine.c:932 (sofia/internal/4002@117.213.29.4:38515) State REPORTING going to sleep
  1145. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_core_state_machine.c:607 (sofia/internal/4002@117.213.29.4:38515) State Change CS_REPORTING -> CS_DESTROY
  1146. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_core_session.c:1753 Session 114 (sofia/internal/4002@117.213.29.4:38515) Locked, Waiting on external entities
  1147. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_ivr_bridge.c:1895 sofia/internal/4001@34.93.139.28 skip receive message [UNBRIDGE] (channel is hungup already)
  1148. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_core_session.c:2983 sofia/internal/4001@34.93.139.28 skip receive message [PHONE_EVENT] (channel is hungup already)
  1149. 2022-01-27 18:39:53.492186 99.30% [NOTICE] switch_core_session.c:1771 Session 114 (sofia/internal/4002@117.213.29.4:38515) Ended
  1150. 2022-01-27 18:39:53.492186 99.30% [NOTICE] switch_core_session.c:1775 Close Channel sofia/internal/4002@117.213.29.4:38515 [CS_DESTROY]
  1151. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_core_state_machine.c:735 (sofia/internal/4002@117.213.29.4:38515) Running State Change CS_DESTROY (Cur 1 Tot 114)
  1152. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_core_state_machine.c:745 (sofia/internal/4002@117.213.29.4:38515) State DESTROY
  1153. 2022-01-27 18:39:53.492186 99.30% [DEBUG] mod_sofia.c:379 sofia/internal/4002@117.213.29.4:38515 SOFIA DESTROY
  1154. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_core_state_machine.c:175 sofia/internal/4002@117.213.29.4:38515 Standard DESTROY
  1155. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_core_state_machine.c:745 (sofia/internal/4002@117.213.29.4:38515) State DESTROY going to sleep
  1156. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_core_state_machine.c:647 (sofia/internal/4001@34.93.139.28) State EXECUTE going to sleep
  1157. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_core_state_machine.c:581 (sofia/internal/4001@34.93.139.28) Running State Change CS_HANGUP (Cur 1 Tot 114)
  1158. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_core_state_machine.c:844 (sofia/internal/4001@34.93.139.28) Callstate Change ACTIVE -> HANGUP
  1159. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_core_state_machine.c:846 (sofia/internal/4001@34.93.139.28) State HANGUP
  1160. 2022-01-27 18:39:53.492186 99.30% [DEBUG] mod_sofia.c:468 Channel sofia/internal/4001@34.93.139.28 hanging up, cause: NORMAL_CLEARING
  1161. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_core_state_machine.c:59 sofia/internal/4001@34.93.139.28 Standard HANGUP, cause: NORMAL_CLEARING
  1162. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_core_state_machine.c:846 (sofia/internal/4001@34.93.139.28) State HANGUP going to sleep
  1163. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_core_state_machine.c:616 (sofia/internal/4001@34.93.139.28) State Change CS_HANGUP -> CS_REPORTING
  1164. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_core_state_machine.c:581 (sofia/internal/4001@34.93.139.28) Running State Change CS_REPORTING (Cur 1 Tot 114)
  1165. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_core_state_machine.c:932 (sofia/internal/4001@34.93.139.28) State REPORTING
  1166. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_core_state_machine.c:168 sofia/internal/4001@34.93.139.28 Standard REPORTING, cause: NORMAL_CLEARING
  1167. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_core_state_machine.c:932 (sofia/internal/4001@34.93.139.28) State REPORTING going to sleep
  1168. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_core_state_machine.c:607 (sofia/internal/4001@34.93.139.28) State Change CS_REPORTING -> CS_DESTROY
  1169. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_core_session.c:1753 Session 113 (sofia/internal/4001@34.93.139.28) Locked, Waiting on external entities
  1170. 2022-01-27 18:39:53.492186 99.30% [NOTICE] switch_core_session.c:1771 Session 113 (sofia/internal/4001@34.93.139.28) Ended
  1171. 2022-01-27 18:39:53.492186 99.30% [NOTICE] switch_core_session.c:1775 Close Channel sofia/internal/4001@34.93.139.28 [CS_DESTROY]
  1172. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_core_state_machine.c:735 (sofia/internal/4001@34.93.139.28) Running State Change CS_DESTROY (Cur 0 Tot 114)
  1173. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_core_state_machine.c:745 (sofia/internal/4001@34.93.139.28) State DESTROY
  1174. 2022-01-27 18:39:53.492186 99.30% [DEBUG] mod_sofia.c:379 sofia/internal/4001@34.93.139.28 SOFIA DESTROY
  1175. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_core_state_machine.c:175 sofia/internal/4001@34.93.139.28 Standard DESTROY
  1176. 2022-01-27 18:39:53.492186 99.30% [DEBUG] switch_core_state_machine.c:745 (sofia/internal/4001@34.93.139.28) State DESTROY going to sleep
  1177. recv 519 bytes from tls/[117.213.29.4]:38515 at 18:39:54.038480:
  1178. ------------------------------------------------------------------------
  1179. SIP/2.0 200 OK
  1180. Via: SIP/2.0/TLS 34.93.139.28:5061;rport=5061;branch=z9hG4bK31Q2v3QHe445c
  1181. Contact: <sip:4002@117.213.29.4:38515;rinstance=0d42d034c69aa9ca;transport=tls>;+sip.instance="<urn:uuid:4b3a26e9-5a70-5d1a-a2df-278ebf2023c0>"
  1182. To: <sip:4002@117.213.29.4:38515;rinstance=0d42d034c69aa9ca;transport=tls>;tag=223c4183
  1183. From: "FSTest1" <sip:4001@34.93.139.28>;tag=QDeX2Uj82FKpQ
  1184. Call-ID: 5701bbb8-fa43-123a-fda6-42010aa00021
  1185. CSeq: 47100601 BYE
  1186. User-Agent: XLogix Android 6.6.1 build 129231
  1187. Content-Length: 0
  1188.  
  1189. recv 934 bytes from tls/[103.165.21.34]:14403 at 18:39:55.243059:
  1190. ------------------------------------------------------------------------
  1191. SUBSCRIBE sip:4001@34.93.139.28:5061;transport=tls SIP/2.0
  1192. Via: SIP/2.0/TLS 192.168.0.107;branch=z9hG4bK-524287-1---e30301a3c532226d;rport
  1193. Max-Forwards: 70
  1194. Contact: <sip:4001@103.165.21.34:14403;rinstance=8a9bd45d4ac81129;transport=tls>
  1195. To: <sip:4001@34.93.139.28>;tag=aFbZgKgHvbJ8
  1196. From: "FSTest1" <sip:4001@34.93.139.28>;tag=4d3fc094
  1197. Call-ID: 106969MGExYzIwYjI5MDY4NTg3YmU4NGZhMmYxZjczNjgzYjI
  1198. CSeq: 19 SUBSCRIBE
  1199. Expires: 60
  1200. Accept: application/simple-message-summary
  1201. Allow: OPTIONS, SUBSCRIBE, NOTIFY, INVITE, ACK, CANCEL, BYE, REFER, INFO, MESSAGE
  1202. Proxy-Authorization: Digest username="4001",realm="34.93.139.28",nonce="ff93ce2a-3bb1-42fb-8320-71b7c6e7313b",uri="sip:4001@34.93.139.28:5061;transport=tls",response="4eaf010ad82dd514466463ab3907259a",cnonce="c25aa24bbd51896682d16423bc4b7226",nc=00000012,qop=auth,algorithm=MD5
  1203. User-Agent: XLogix release 6.4.0.1 stamp 106969
  1204. Event: message-summary
  1205. Content-Length: 0
  1206.  
  1207. send 840 bytes to tls/[103.165.21.34]:14403 at 18:39:55.244018:
  1208. ------------------------------------------------------------------------
  1209. SIP/2.0 202 Accepted
  1210. Via: SIP/2.0/TLS 192.168.0.107;branch=z9hG4bK-524287-1---e30301a3c532226d;rport=14403;received=103.165.21.34
  1211. From: "FSTest1" <sip:4001@34.93.139.28>;tag=4d3fc094
  1212. To: <sip:4001@34.93.139.28>;tag=aFbZgKgHvbJ8
  1213. Call-ID: 106969MGExYzIwYjI5MDY4NTg3YmU4NGZhMmYxZjczNjgzYjI
  1214. CSeq: 19 SUBSCRIBE
  1215. Contact: <sip:4001@34.93.139.28:5061;transport=tls>
  1216. Expires: 60
  1217. User-Agent: FreeSWITCH-mod_sofia/1.10.7-release+git~20211024T163933Z~883d2cb662~64bit
  1218. Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, SUBSCRIBE
  1219. Supported: timer, path, replaces
  1220. Allow-Events: talk, hold, conference, presence, as-feature-event, dialog, line-seize, call-info, sla, include-session-description, presence.winfo, message-summary, refer
  1221. Subscription-State: active;expires=60
  1222. Content-Length: 0
  1223.  
  1224. send 1011 bytes to tls/[103.165.21.34]:14403 at 18:39:55.319491:
  1225. ------------------------------------------------------------------------
  1226. NOTIFY sip:4001@103.165.21.34:14403;rinstance=8a9bd45d4ac81129;transport=tls SIP/2.0
  1227. Via: SIP/2.0/TLS 34.93.139.28:5061;rport;branch=z9hG4bK4aHUyy8mBDUrr
  1228. Max-Forwards: 70
  1229. From: <sip:4001@34.93.139.28>;tag=aFbZgKgHvbJ8
  1230. To: "FSTest1" <sip:4001@34.93.139.28>;tag=4d3fc094
  1231. Call-ID: 106969MGExYzIwYjI5MDY4NTg3YmU4NGZhMmYxZjczNjgzYjI
  1232. CSeq: 115679751 NOTIFY
  1233. Contact: <sip:4001@34.93.139.28:5061;transport=tls>
  1234. User-Agent: FreeSWITCH-mod_sofia/1.10.7-release+git~20211024T163933Z~883d2cb662~64bit
  1235. Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, SUBSCRIBE
  1236. Supported: timer, path, replaces
  1237. Event: message-summary
  1238. Allow-Events: talk, hold, conference, presence, as-feature-event, dialog, line-seize, call-info, sla, include-session-description, presence.winfo, message-summary, refer
  1239. Subscription-State: active;expires=60
  1240. Content-Type: application/simple-message-summary
  1241. Content-Length: 63
  1242.  
  1243. Messages-Waiting: no
  1244. Message-Account: sip:4001@10.160.0.33
  1245.  
  1246. recv 426 bytes from tls/[103.165.21.34]:14403 at 18:39:55.370965:
  1247. ------------------------------------------------------------------------
  1248. SIP/2.0 200 OK
  1249. Via: SIP/2.0/TLS 34.93.139.28:5061;rport=5061;branch=z9hG4bK4aHUyy8mBDUrr
  1250. Contact: <sip:4001@103.165.21.34:14403;rinstance=8a9bd45d4ac81129;transport=tls>
  1251. To: "FSTest1"<sip:4001@34.93.139.28>;tag=4d3fc094
  1252. From: <sip:4001@34.93.139.28>;tag=aFbZgKgHvbJ8
  1253. Call-ID: 106969MGExYzIwYjI5MDY4NTg3YmU4NGZhMmYxZjczNjgzYjI
  1254. CSeq: 115679751 NOTIFY
  1255. User-Agent: XLogix release 6.4.0.1 stamp 106969
  1256. Content-Length: 0
  1257.  
  1258. freeswitch@xlogixfs>
  1259.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement