-- Remote UNIX connection [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 0 [ 52]: INVITE sip:600@10.11.106.201:5061;user=phone SIP/2.0 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 1 [ 68]: Via: SIP/2.0/TLS 10.11.106.18:2151;branch=z9hG4bK-26fp97cj7eim;rport [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 2 [ 49]: From: ;tag=hh7ekzcvct [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 3 [ 43]: To: [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 4 [ 34]: Call-ID: 3c26739215d7-2fvmwrdya91s [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 5 [ 14]: CSeq: 1 INVITE [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 6 [ 16]: Max-Forwards: 70 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 7 [ 73]: Contact: ;reg-id=1 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 8 [ 28]: X-Serialnumber: 000413261D97 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 9 [ 41]: P-Key-Flags: resolution="31x13", keys="4" [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 10 [ 25]: User-Agent: snom370/8.5.4 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 11 [ 23]: Accept: application/sdp [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 12 [ 96]: Allow: INVITE, ACK, CANCEL, BYE, REFER, OPTIONS, NOTIFY, SUBSCRIBE, PRACK, MESSAGE, INFO, UPDATE [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 13 [ 42]: Allow-Events: talk, hold, refer, call-info [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 14 [ 47]: Supported: timer, 100rel, replaces, from-change [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 15 [ 35]: Session-Expires: 3600;refresher=uas [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 16 [ 10]: Min-SE: 90 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 17 [ 29]: Content-Type: application/sdp [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 18 [ 19]: Content-Length: 398 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 19 [ 0]: <--- SIP read from TLS:10.11.106.18:2151 ---> INVITE sip:600@10.11.106.201:5061;user=phone SIP/2.0 Via: SIP/2.0/TLS 10.11.106.18:2151;branch=z9hG4bK-26fp97cj7eim;rport From: ;tag=hh7ekzcvct To: Call-ID: 3c26739215d7-2fvmwrdya91s CSeq: 1 INVITE Max-Forwards: 70 Contact: ;reg-id=1 X-Serialnumber: 000413261D97 P-Key-Flags: resolution="31x13", keys="4" User-Agent: snom370/8.5.4 Accept: application/sdp Allow: INVITE, ACK, CANCEL, BYE, REFER, OPTIONS, NOTIFY, SUBSCRIBE, PRACK, MESSAGE, INFO, UPDATE Allow-Events: talk, hold, refer, call-info Supported: timer, 100rel, replaces, from-change Session-Expires: 3600;refresher=uas Min-SE: 90 Content-Type: application/sdp Content-Length: 398 v=0 o=root 279734252 279734252 IN IP4 10.11.106.18 s=call c=IN IP4 10.11.106.18 t=0 0 m=audio 58000 RTP/AVP 0 8 106 107 18 9 101 a=direction:both a=rtpmap:0 pcmu/8000 a=rtpmap:8 pcma/8000 a=rtpmap:106 g726-32/8000 a=rtpmap:107 aal2-g726-32/8000 a=rtpmap:18 g729/8000 a=fmtp:18 annexb=no a=rtpmap:9 g722/8000 a=rtpmap:101 telephone-event/8000 a=fmtp:101 0-15 a=ptime:20 a=sendrecv <-------------> [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 0 [ 52]: INVITE sip:600@10.11.106.201:5061;user=phone SIP/2.0 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 1 [ 68]: Via: SIP/2.0/TLS 10.11.106.18:2151;branch=z9hG4bK-26fp97cj7eim;rport [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 2 [ 49]: From: ;tag=hh7ekzcvct [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 3 [ 43]: To: [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 4 [ 34]: Call-ID: 3c26739215d7-2fvmwrdya91s [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 5 [ 14]: CSeq: 1 INVITE [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 6 [ 16]: Max-Forwards: 70 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 7 [ 73]: Contact: ;reg-id=1 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 8 [ 28]: X-Serialnumber: 000413261D97 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 9 [ 41]: P-Key-Flags: resolution="31x13", keys="4" [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 10 [ 25]: User-Agent: snom370/8.5.4 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 11 [ 23]: Accept: application/sdp [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 12 [ 96]: Allow: INVITE, ACK, CANCEL, BYE, REFER, OPTIONS, NOTIFY, SUBSCRIBE, PRACK, MESSAGE, INFO, UPDATE [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 13 [ 42]: Allow-Events: talk, hold, refer, call-info [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 14 [ 47]: Supported: timer, 100rel, replaces, from-change [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 15 [ 35]: Session-Expires: 3600;refresher=uas [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 16 [ 10]: Min-SE: 90 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 17 [ 29]: Content-Type: application/sdp [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 18 [ 19]: Content-Length: 398 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 19 [ 0]: [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Body 0 [ 3]: v=0 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Body 1 [ 46]: o=root 279734252 279734252 IN IP4 10.11.106.18 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Body 2 [ 6]: s=call [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Body 3 [ 21]: c=IN IP4 10.11.106.18 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Body 4 [ 5]: t=0 0 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Body 5 [ 42]: m=audio 58000 RTP/AVP 0 8 106 107 18 9 101 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Body 6 [ 16]: a=direction:both [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Body 7 [ 20]: a=rtpmap:0 pcmu/8000 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Body 8 [ 20]: a=rtpmap:8 pcma/8000 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Body 9 [ 25]: a=rtpmap:106 g726-32/8000 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Body 10 [ 30]: a=rtpmap:107 aal2-g726-32/8000 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Body 11 [ 21]: a=rtpmap:18 g729/8000 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Body 12 [ 19]: a=fmtp:18 annexb=no [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Body 13 [ 20]: a=rtpmap:9 g722/8000 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Body 14 [ 33]: a=rtpmap:101 telephone-event/8000 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Body 15 [ 15]: a=fmtp:101 0-15 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Body 16 [ 10]: a=ptime:20 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7808 parse_request: Body 17 [ 10]: a=sendrecv --- (19 headers 18 lines) --- [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7374 find_call: = Looking for Call ID: 3c26739215d7-2fvmwrdya91s (Checking From) --From tag hh7ekzcvct --To-tag [Sep 28 06:05:43] DEBUG[13966]: acl.c:715 ast_ouraddrfor: For destination '10.11.106.18', our source address is '10.11.106.201'. [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:3240 ast_sip_ouraddrfor: Setting SIP_TRANSPORT_TLS with address 10.11.106.201:5061 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7174 sip_alloc: Allocating new SIP dialog for 3c26739215d7-2fvmwrdya91s - INVITE (No RTP) [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:23492 handle_incoming: **** Received INVITE (5) - Command in SIP INVITE [Sep 28 06:05:43] DEBUG[13966]: sip/reqresp_parser.c:1584 parse_sip_options: Begin: parsing SIP "Supported: timer, 100rel, replaces, from-change" [Sep 28 06:05:43] DEBUG[13966]: sip/reqresp_parser.c:1600 parse_sip_options: Found SIP option: -timer- [Sep 28 06:05:43] DEBUG[13966]: sip/reqresp_parser.c:1608 parse_sip_options: Matched SIP option: timer [Sep 28 06:05:43] DEBUG[13966]: sip/reqresp_parser.c:1600 parse_sip_options: Found SIP option: -100rel- [Sep 28 06:05:43] DEBUG[13966]: sip/reqresp_parser.c:1608 parse_sip_options: Matched SIP option: 100rel [Sep 28 06:05:43] DEBUG[13966]: sip/reqresp_parser.c:1600 parse_sip_options: Found SIP option: -replaces- [Sep 28 06:05:43] DEBUG[13966]: sip/reqresp_parser.c:1608 parse_sip_options: Matched SIP option: replaces [Sep 28 06:05:43] DEBUG[13966]: sip/reqresp_parser.c:1600 parse_sip_options: Found SIP option: -from-change- [Sep 28 06:05:43] DEBUG[13966]: sip/reqresp_parser.c:1608 parse_sip_options: Matched SIP option: from-change [Sep 28 06:05:43] DEBUG[13966]: netsock2.c:125 ast_sockaddr_split_hostport: Splitting '10.11.106.18:2151' gives... [Sep 28 06:05:43] DEBUG[13966]: netsock2.c:155 ast_sockaddr_split_hostport: ...host '10.11.106.18' and port '2151'. Sending to 10.11.106.18:2151 (no NAT) [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:21077 handle_request_invite: Initializing initreq for method INVITE - callid 3c26739215d7-2fvmwrdya91s Using INVITE request as basis request - 3c26739215d7-2fvmwrdya91s Found peer '432' for '432' from 10.11.106.18:2151 <--- Reliably Transmitting (no NAT) to 10.11.106.18:2151 ---> SIP/2.0 401 Unauthorized Via: SIP/2.0/TLS 10.11.106.18:2151;branch=z9hG4bK-26fp97cj7eim;received=10.11.106.18;rport=2151 From: ;tag=hh7ekzcvct To: ;tag=as79de52c8 Call-ID: 3c26739215d7-2fvmwrdya91s CSeq: 1 INVITE Server: Asterisk PBX SVN-branch-1.8-r288640 Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH Supported: replaces, timer WWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="005bca01" Content-Length: 0 <------------> [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:3086 __sip_xmit: Trying to put 'SIP/2.0 401' onto TLS socket destined for 10.11.106.18:2151 Scheduling destruction of SIP dialog '3c26739215d7-2fvmwrdya91s' in 32000 ms (Method: INVITE) [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 0 [ 49]: ACK sip:600@10.11.106.201:5061;user=phone SIP/2.0 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 1 [ 68]: Via: SIP/2.0/TLS 10.11.106.18:2151;branch=z9hG4bK-26fp97cj7eim;rport [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 2 [ 49]: From: ;tag=hh7ekzcvct [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 3 [ 58]: To: ;tag=as79de52c8 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 4 [ 34]: Call-ID: 3c26739215d7-2fvmwrdya91s [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 5 [ 11]: CSeq: 1 ACK [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 6 [ 16]: Max-Forwards: 70 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 7 [ 73]: Contact: ;reg-id=1 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 8 [ 17]: Content-Length: 0 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 9 [ 0]: <--- SIP read from TLS:10.11.106.18:2151 ---> ACK sip:600@10.11.106.201:5061;user=phone SIP/2.0 Via: SIP/2.0/TLS 10.11.106.18:2151;branch=z9hG4bK-26fp97cj7eim;rport From: ;tag=hh7ekzcvct To: ;tag=as79de52c8 Call-ID: 3c26739215d7-2fvmwrdya91s CSeq: 1 ACK Max-Forwards: 70 Contact: ;reg-id=1 Content-Length: 0 <-------------> [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 0 [ 49]: ACK sip:600@10.11.106.201:5061;user=phone SIP/2.0 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 1 [ 68]: Via: SIP/2.0/TLS 10.11.106.18:2151;branch=z9hG4bK-26fp97cj7eim;rport [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 2 [ 49]: From: ;tag=hh7ekzcvct [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 3 [ 58]: To: ;tag=as79de52c8 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 4 [ 34]: Call-ID: 3c26739215d7-2fvmwrdya91s [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 5 [ 11]: CSeq: 1 ACK [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 6 [ 16]: Max-Forwards: 70 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 7 [ 73]: Contact: ;reg-id=1 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 8 [ 17]: Content-Length: 0 --- (9 headers 0 lines) --- [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7374 find_call: = Looking for Call ID: 3c26739215d7-2fvmwrdya91s (Checking From) --From tag hh7ekzcvct --To-tag as79de52c8 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:23492 handle_incoming: **** Received ACK (6) - Command in SIP ACK [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:3761 __sip_ack: Stopping retransmission on '3c26739215d7-2fvmwrdya91s' of Response 1: Match Not Found [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 0 [ 52]: INVITE sip:600@10.11.106.201:5061;user=phone SIP/2.0 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 1 [ 68]: Via: SIP/2.0/TLS 10.11.106.18:2151;branch=z9hG4bK-zeyxory1178r;rport [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 2 [ 49]: From: ;tag=hh7ekzcvct [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 3 [ 43]: To: [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 4 [ 34]: Call-ID: 3c26739215d7-2fvmwrdya91s [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 5 [ 14]: CSeq: 2 INVITE [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 6 [ 16]: Max-Forwards: 70 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 7 [ 73]: Contact: ;reg-id=1 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 8 [ 28]: X-Serialnumber: 000413261D97 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 9 [ 41]: P-Key-Flags: resolution="31x13", keys="4" [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 10 [ 25]: User-Agent: snom370/8.5.4 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 11 [ 23]: Accept: application/sdp [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 12 [ 96]: Allow: INVITE, ACK, CANCEL, BYE, REFER, OPTIONS, NOTIFY, SUBSCRIBE, PRACK, MESSAGE, INFO, UPDATE [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 13 [ 42]: Allow-Events: talk, hold, refer, call-info [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 14 [ 47]: Supported: timer, 100rel, replaces, from-change [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 15 [ 35]: Session-Expires: 3600;refresher=uas [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 16 [ 10]: Min-SE: 90 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 17 [172]: Authorization: Digest username="432",realm="asterisk",nonce="005bca01",uri="sip:600@10.11.106.201:5061;user=phone",response="07d0ecc901bc013310cd0029a92d437f",algorithm=MD5 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 18 [ 29]: Content-Type: application/sdp [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 19 [ 19]: Content-Length: 398 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 20 [ 0]: <--- SIP read from TLS:10.11.106.18:2151 ---> INVITE sip:600@10.11.106.201:5061;user=phone SIP/2.0 Via: SIP/2.0/TLS 10.11.106.18:2151;branch=z9hG4bK-zeyxory1178r;rport From: ;tag=hh7ekzcvct To: Call-ID: 3c26739215d7-2fvmwrdya91s CSeq: 2 INVITE Max-Forwards: 70 Contact: ;reg-id=1 X-Serialnumber: 000413261D97 P-Key-Flags: resolution="31x13", keys="4" User-Agent: snom370/8.5.4 Accept: application/sdp Allow: INVITE, ACK, CANCEL, BYE, REFER, OPTIONS, NOTIFY, SUBSCRIBE, PRACK, MESSAGE, INFO, UPDATE Allow-Events: talk, hold, refer, call-info Supported: timer, 100rel, replaces, from-change Session-Expires: 3600;refresher=uas Min-SE: 90 Authorization: Digest username="432",realm="asterisk",nonce="005bca01",uri="sip:600@10.11.106.201:5061;user=phone",response="07d0ecc901bc013310cd0029a92d437f",algorithm=MD5 Content-Type: application/sdp Content-Length: 398 v=0 o=root 279734252 279734252 IN IP4 10.11.106.18 s=call c=IN IP4 10.11.106.18 t=0 0 m=audio 58000 RTP/AVP 0 8 106 107 18 9 101 a=direction:both a=rtpmap:0 pcmu/8000 a=rtpmap:8 pcma/8000 a=rtpmap:106 g726-32/8000 a=rtpmap:107 aal2-g726-32/8000 a=rtpmap:18 g729/8000 a=fmtp:18 annexb=no a=rtpmap:9 g722/8000 a=rtpmap:101 telephone-event/8000 a=fmtp:101 0-15 a=ptime:20 a=sendrecv <-------------> [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 0 [ 52]: INVITE sip:600@10.11.106.201:5061;user=phone SIP/2.0 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 1 [ 68]: Via: SIP/2.0/TLS 10.11.106.18:2151;branch=z9hG4bK-zeyxory1178r;rport [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 2 [ 49]: From: ;tag=hh7ekzcvct [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 3 [ 43]: To: [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 4 [ 34]: Call-ID: 3c26739215d7-2fvmwrdya91s [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 5 [ 14]: CSeq: 2 INVITE [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 6 [ 16]: Max-Forwards: 70 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 7 [ 73]: Contact: ;reg-id=1 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 8 [ 28]: X-Serialnumber: 000413261D97 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 9 [ 41]: P-Key-Flags: resolution="31x13", keys="4" [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 10 [ 25]: User-Agent: snom370/8.5.4 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 11 [ 23]: Accept: application/sdp [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 12 [ 96]: Allow: INVITE, ACK, CANCEL, BYE, REFER, OPTIONS, NOTIFY, SUBSCRIBE, PRACK, MESSAGE, INFO, UPDATE [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 13 [ 42]: Allow-Events: talk, hold, refer, call-info [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 14 [ 47]: Supported: timer, 100rel, replaces, from-change [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 15 [ 35]: Session-Expires: 3600;refresher=uas [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 16 [ 10]: Min-SE: 90 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 17 [172]: Authorization: Digest username="432",realm="asterisk",nonce="005bca01",uri="sip:600@10.11.106.201:5061;user=phone",response="07d0ecc901bc013310cd0029a92d437f",algorithm=MD5 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 18 [ 29]: Content-Type: application/sdp [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 19 [ 19]: Content-Length: 398 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 20 [ 0]: [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Body 0 [ 3]: v=0 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Body 1 [ 46]: o=root 279734252 279734252 IN IP4 10.11.106.18 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Body 2 [ 6]: s=call [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Body 3 [ 21]: c=IN IP4 10.11.106.18 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Body 4 [ 5]: t=0 0 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Body 5 [ 42]: m=audio 58000 RTP/AVP 0 8 106 107 18 9 101 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Body 6 [ 16]: a=direction:both [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Body 7 [ 20]: a=rtpmap:0 pcmu/8000 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Body 8 [ 20]: a=rtpmap:8 pcma/8000 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Body 9 [ 25]: a=rtpmap:106 g726-32/8000 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Body 10 [ 30]: a=rtpmap:107 aal2-g726-32/8000 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Body 11 [ 21]: a=rtpmap:18 g729/8000 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Body 12 [ 19]: a=fmtp:18 annexb=no [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Body 13 [ 20]: a=rtpmap:9 g722/8000 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Body 14 [ 33]: a=rtpmap:101 telephone-event/8000 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Body 15 [ 15]: a=fmtp:101 0-15 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Body 16 [ 10]: a=ptime:20 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7808 parse_request: Body 17 [ 10]: a=sendrecv --- (20 headers 18 lines) --- [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7374 find_call: = Looking for Call ID: 3c26739215d7-2fvmwrdya91s (Checking From) --From tag hh7ekzcvct --To-tag [Sep 28 06:05:43] DEBUG[13966]: netsock2.c:125 ast_sockaddr_split_hostport: Splitting '10.11.106.201:5061' gives... [Sep 28 06:05:43] DEBUG[13966]: netsock2.c:155 ast_sockaddr_split_hostport: ...host '10.11.106.201' and port '5061'. [Sep 28 06:05:43] DEBUG[13966]: netsock2.c:125 ast_sockaddr_split_hostport: Splitting '10.11.106.201:5061' gives... [Sep 28 06:05:43] DEBUG[13966]: netsock2.c:155 ast_sockaddr_split_hostport: ...host '10.11.106.201' and port '5061'. [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:23492 handle_incoming: **** Received INVITE (5) - Command in SIP INVITE [Sep 28 06:05:43] DEBUG[13966]: netsock2.c:125 ast_sockaddr_split_hostport: Splitting '10.11.106.18:2151' gives... [Sep 28 06:05:43] DEBUG[13966]: netsock2.c:155 ast_sockaddr_split_hostport: ...host '10.11.106.18' and port '2151'. Sending to 10.11.106.18:2151 (no NAT) [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:21077 handle_request_invite: Initializing initreq for method INVITE - callid 3c26739215d7-2fvmwrdya91s Using INVITE request as basis request - 3c26739215d7-2fvmwrdya91s Found peer '432' for '432' from 10.11.106.18:2151 [Sep 28 06:05:43] DEBUG[13966]: rtp_engine.c:344 ast_rtp_instance_new: Using engine 'asterisk' for RTP instance '0xbd83ea0' [Sep 28 06:05:43] DEBUG[13966]: res_rtp_asterisk.c:470 ast_rtp_new: Allocated port 19146 for RTP instance '0xbd83ea0' [Sep 28 06:05:43] DEBUG[13966]: rtp_engine.c:353 ast_rtp_instance_new: RTP instance '0xbd83ea0' is setup and ready to go [Sep 28 06:05:43] DEBUG[13966]: res_rtp_asterisk.c:2352 ast_rtp_prop_set: Setup RTCP on RTP instance '0xbd83ea0' == Using SIP RTP CoS mark 5 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:4651 do_setnat: Setting NAT on RTP to Off [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:8126 process_sdp: Processing session-level SDP v=0... UNSUPPORTED. [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:8126 process_sdp: Processing session-level SDP o=root 279734252 279734252 IN IP4 10.11.106.18... UNSUPPORTED. [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:8126 process_sdp: Processing session-level SDP s=call... UNSUPPORTED. [Sep 28 06:05:43] DEBUG[13966]: netsock2.c:125 ast_sockaddr_split_hostport: Splitting '10.11.106.18' gives... [Sep 28 06:05:43] DEBUG[13966]: netsock2.c:155 ast_sockaddr_split_hostport: ...host '10.11.106.18' and port '(null)'. [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:8126 process_sdp: Processing session-level SDP c=IN IP4 10.11.106.18... OK. [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:8126 process_sdp: Processing session-level SDP t=0 0... UNSUPPORTED. Found RTP audio format 0 [Sep 28 06:05:43] DEBUG[13966]: rtp_engine.c:523 ast_rtp_codecs_payloads_set_m_type: Setting payload 0 based on m type on 0xb2c282a0 Found RTP audio format 8 [Sep 28 06:05:43] DEBUG[13966]: rtp_engine.c:523 ast_rtp_codecs_payloads_set_m_type: Setting payload 8 based on m type on 0xb2c282a0 Found RTP audio format 106 [Sep 28 06:05:43] DEBUG[13966]: rtp_engine.c:523 ast_rtp_codecs_payloads_set_m_type: Setting payload 106 based on m type on 0xb2c282a0 Found RTP audio format 107 Found RTP audio format 18 [Sep 28 06:05:43] DEBUG[13966]: rtp_engine.c:523 ast_rtp_codecs_payloads_set_m_type: Setting payload 18 based on m type on 0xb2c282a0 Found RTP audio format 9 [Sep 28 06:05:43] DEBUG[13966]: rtp_engine.c:523 ast_rtp_codecs_payloads_set_m_type: Setting payload 9 based on m type on 0xb2c282a0 Found RTP audio format 101 [Sep 28 06:05:43] DEBUG[13966]: rtp_engine.c:523 ast_rtp_codecs_payloads_set_m_type: Setting payload 101 based on m type on 0xb2c282a0 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:8313 process_sdp: Processing media-level (audio) SDP a=direction:both... UNSUPPORTED. Found audio description format pcmu for ID 0 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:8313 process_sdp: Processing media-level (audio) SDP a=rtpmap:0 pcmu/8000... OK. Found audio description format pcma for ID 8 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:8313 process_sdp: Processing media-level (audio) SDP a=rtpmap:8 pcma/8000... OK. Found audio description format g726-32 for ID 106 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:8313 process_sdp: Processing media-level (audio) SDP a=rtpmap:106 g726-32/8000... OK. Found audio description format aal2-g726-32 for ID 107 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:8313 process_sdp: Processing media-level (audio) SDP a=rtpmap:107 aal2-g726-32/8000... OK. Found audio description format g729 for ID 18 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:8313 process_sdp: Processing media-level (audio) SDP a=rtpmap:18 g729/8000... OK. [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:8313 process_sdp: Processing media-level (audio) SDP a=fmtp:18 annexb=no... UNSUPPORTED. Found audio description format g722 for ID 9 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:8313 process_sdp: Processing media-level (audio) SDP a=rtpmap:9 g722/8000... OK. Found audio description format telephone-event for ID 101 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:8313 process_sdp: Processing media-level (audio) SDP a=rtpmap:101 telephone-event/8000... OK. [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:8313 process_sdp: Processing media-level (audio) SDP a=fmtp:101 0-15... UNSUPPORTED. [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:8313 process_sdp: Processing media-level (audio) SDP a=ptime:20... OK. [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:8313 process_sdp: Processing media-level (audio) SDP a=sendrecv... OK. [Sep 28 06:05:43] DEBUG[13966]: rtp_engine.c:626 ast_rtp_codecs_payload_formats: Incorporating payload 0 on 0xb2c282a0 [Sep 28 06:05:43] DEBUG[13966]: rtp_engine.c:626 ast_rtp_codecs_payload_formats: Incorporating payload 8 on 0xb2c282a0 [Sep 28 06:05:43] DEBUG[13966]: rtp_engine.c:626 ast_rtp_codecs_payload_formats: Incorporating payload 9 on 0xb2c282a0 [Sep 28 06:05:43] DEBUG[13966]: rtp_engine.c:626 ast_rtp_codecs_payload_formats: Incorporating payload 18 on 0xb2c282a0 [Sep 28 06:05:43] DEBUG[13966]: rtp_engine.c:626 ast_rtp_codecs_payload_formats: Incorporating payload 101 on 0xb2c282a0 [Sep 28 06:05:43] DEBUG[13966]: rtp_engine.c:626 ast_rtp_codecs_payload_formats: Incorporating payload 106 on 0xb2c282a0 [Sep 28 06:05:43] DEBUG[13966]: rtp_engine.c:626 ast_rtp_codecs_payload_formats: Incorporating payload 107 on 0xb2c282a0 Capabilities: us - 0x80000008000e (gsm|ulaw|alaw|h263|testlaw), peer - audio=0x191c (ulaw|alaw|g726|g729|g726aal2|g722)/video=0x0 (nothing)/text=0x0 (nothing), combined - 0xc (ulaw|alaw) Non-codec capabilities (dtmf): us - 0x1 (telephone-event|), peer - 0x1 (telephone-event|), combined - 0x1 (telephone-event|) [Sep 28 06:05:43] DEBUG[13966]: res_rtp_asterisk.c:2373 ast_rtp_remote_address_set: Setting RTCP address on RTP instance '0xbd83ea0' Peer audio RTP is at port 10.11.106.18:58000 [Sep 28 06:05:43] DEBUG[13966]: rtp_engine.c:504 ast_rtp_codecs_payloads_copy: Copying payload 0 from 0xb2c282a0 to 0xbd8404c [Sep 28 06:05:43] DEBUG[13966]: rtp_engine.c:504 ast_rtp_codecs_payloads_copy: Copying payload 8 from 0xb2c282a0 to 0xbd8404c [Sep 28 06:05:43] DEBUG[13966]: rtp_engine.c:504 ast_rtp_codecs_payloads_copy: Copying payload 9 from 0xb2c282a0 to 0xbd8404c [Sep 28 06:05:43] DEBUG[13966]: rtp_engine.c:504 ast_rtp_codecs_payloads_copy: Copying payload 18 from 0xb2c282a0 to 0xbd8404c [Sep 28 06:05:43] DEBUG[13966]: rtp_engine.c:504 ast_rtp_codecs_payloads_copy: Copying payload 101 from 0xb2c282a0 to 0xbd8404c [Sep 28 06:05:43] DEBUG[13966]: rtp_engine.c:504 ast_rtp_codecs_payloads_copy: Copying payload 106 from 0xb2c282a0 to 0xbd8404c [Sep 28 06:05:43] DEBUG[13966]: rtp_engine.c:504 ast_rtp_codecs_payloads_copy: Copying payload 107 from 0xb2c282a0 to 0xbd8404c [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:8545 process_sdp: We're settling with these formats: 0xc (ulaw|alaw) [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:21216 handle_request_invite: Checking SIP call limits for device 432 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:5418 update_call_counter: Updating call counter for incoming call [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:5523 update_call_counter: Call from peer '432' is 1 out of 20 [Sep 28 06:05:43] DEBUG[13828]: devicestate.c:340 _ast_device_state: No provider found, checking channel drivers for SIP - 432 [Sep 28 06:05:43] DEBUG[13828]: chan_sip.c:24806 sip_devicestate: Checking device state for peer 432 [Sep 28 06:05:43] DEBUG[13828]: devicestate.c:458 do_state_change: Changing state for SIP/432 - state 2 (In use) [Sep 28 06:05:43] DEBUG[13828]: devicestate.c:438 devstate_event: device 'SIP/432' state '2' [Sep 28 06:05:43] DEBUG[13863]: app_queue.c:1324 handle_statechange: Device 'SIP/432' changed to state '2' (In use) but we don't care because they're not a member of any queue. Looking for 600 in telefone (domain 10.11.106.201:5061) [Sep 28 06:05:43] DEBUG[13966]: frame.c:1242 ast_codec_choose: Could not find preferred codec - Going for the best codec [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:6521 sip_new: *** Our native formats are 0x4 (ulaw) [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:6522 sip_new: *** Joint capabilities are 0xc (ulaw|alaw) [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:6523 sip_new: *** Our capabilities are 0x80000008000e (gsm|ulaw|alaw|h263|testlaw) [Sep 28 06:05:43] DEBUG[13966]: frame.c:1242 ast_codec_choose: Could not find preferred codec - Going for the best codec [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:6524 sip_new: *** AST_CODEC_CHOOSE formats are 0x4 (ulaw) [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:6554 sip_new: This channel will not be able to handle video. [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:13198 build_route: build_route: Contact hop: ;reg-id=1 list_route: hop: [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:21319 handle_request_invite: Incoming INVITE with 'timer' option supported and "Session-Expires" header. [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:24508 parse_session_expires: Session-Expires: 3600 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:24524 parse_session_expires: Refresher: UAS [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:24478 parse_minse: Received Min-SE: 90 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:24378 start_session_timer: Session timer started: 155 - 3c26739215d7-2fvmwrdya91s [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:21507 handle_request_invite: SIP/432-0000000d: New call is still down.... Trying... <--- Transmitting (no NAT) to 10.11.106.18:2151 ---> SIP/2.0 100 Trying Via: SIP/2.0/TLS 10.11.106.18:2151;branch=z9hG4bK-zeyxory1178r;received=10.11.106.18;rport=2151 From: ;tag=hh7ekzcvct To: Call-ID: 3c26739215d7-2fvmwrdya91s CSeq: 2 INVITE Server: Asterisk PBX SVN-branch-1.8-r288640 Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH Supported: replaces, timer Session-Expires: 1800;refresher=uas Contact: Content-Length: 0 <------------> [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:3086 __sip_xmit: Trying to put 'SIP/2.0 100' onto TLS socket destined for 10.11.106.18:2151 [Sep 28 06:05:43] DEBUG[13828]: devicestate.c:340 _ast_device_state: No provider found, checking channel drivers for SIP - 432 [Sep 28 06:05:43] DEBUG[13828]: chan_sip.c:24806 sip_devicestate: Checking device state for peer 432 [Sep 28 06:05:43] DEBUG[13828]: devicestate.c:458 do_state_change: Changing state for SIP/432 - state 2 (In use) [Sep 28 06:05:43] DEBUG[13828]: devicestate.c:438 devstate_event: device 'SIP/432' state '2' [Sep 28 06:05:43] DEBUG[13863]: app_queue.c:1324 handle_statechange: Device 'SIP/432' changed to state '2' (In use) but we don't care because they're not a member of any queue. [Sep 28 06:05:43] DEBUG[13971]: pbx.c:4055 pbx_extension_helper: Launching 'Set' -- Executing [600@telefone:1] Set("SIP/432-0000000d", "_SIP_SRTP_SDES=1") in new stack [Sep 28 06:05:43] DEBUG[13971]: pbx.c:4055 pbx_extension_helper: Launching 'Set' -- Executing [600@telefone:2] Set("SIP/432-0000000d", "_SIPSRTP=enable") in new stack [Sep 28 06:05:43] DEBUG[13971]: pbx.c:4055 pbx_extension_helper: Launching 'Set' -- Executing [600@telefone:3] Set("SIP/432-0000000d", "_SIPSRTP_CRYPTO=enable") in new stack [Sep 28 06:05:43] DEBUG[13971]: pbx.c:4055 pbx_extension_helper: Launching 'Playback' -- Executing [600@telefone:4] Playback("SIP/432-0000000d", "demo-echotest") in new stack [Sep 28 06:05:43] DEBUG[13828]: devicestate.c:340 _ast_device_state: No provider found, checking channel drivers for SIP - 432 [Sep 28 06:05:43] DEBUG[13828]: chan_sip.c:24806 sip_devicestate: Checking device state for peer 432 [Sep 28 06:05:43] DEBUG[13828]: devicestate.c:458 do_state_change: Changing state for SIP/432 - state 2 (In use) [Sep 28 06:05:43] DEBUG[13828]: devicestate.c:438 devstate_event: device 'SIP/432' state '2' [Sep 28 06:05:43] DEBUG[13863]: app_queue.c:1324 handle_statechange: Device 'SIP/432' changed to state '2' (In use) but we don't care because they're not a member of any queue. [Sep 28 06:05:43] DEBUG[13971]: chan_sip.c:5992 sip_answer: SIP answering channel: SIP/432-0000000d [Sep 28 06:05:43] DEBUG[13971]: res_rtp_asterisk.c:712 ast_rtp_update_source: Setting the marker bit due to a source update [Sep 28 06:05:43] DEBUG[13971]: chan_sip.c:10872 transmit_response_with_sdp: Setting framing from config on incoming call [Sep 28 06:05:43] DEBUG[13971]: chan_sip.c:10516 add_sdp: ** Our capability: 0xc (ulaw|alaw) Video flag: True Text flag: True [Sep 28 06:05:43] DEBUG[13971]: chan_sip.c:10517 add_sdp: ** Our prefcodec: 0x0 (nothing) Audio is at 5061 Adding codec 0x4 (ulaw) to SDP Adding codec 0x8 (alaw) to SDP Adding non-codec 0x1 (telephone-event) to SDP [Sep 28 06:05:43] DEBUG[13971]: chan_sip.c:10628 add_sdp: -- Done with adding codecs to SDP [Sep 28 06:05:43] DEBUG[13971]: chan_sip.c:10767 add_sdp: Done building SDP. Settling with this capability: 0xc (ulaw|alaw) <--- Reliably Transmitting (no NAT) to 10.11.106.18:2151 ---> SIP/2.0 200 OK Via: SIP/2.0/TLS 10.11.106.18:2151;branch=z9hG4bK-zeyxory1178r;received=10.11.106.18;rport=2151 From: ;tag=hh7ekzcvct To: ;tag=as2fa10baa Call-ID: 3c26739215d7-2fvmwrdya91s CSeq: 2 INVITE Server: Asterisk PBX SVN-branch-1.8-r288640 Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH Supported: replaces, timer Session-Expires: 1800;refresher=uas Contact: Content-Type: application/sdp Content-Length: 304 v=0 o=root 2068086415 2068086415 IN IP4 10.11.106.201 s=Asterisk PBX SVN-branch-1.8-r288640 c=IN IP4 10.11.106.201 t=0 0 m=audio 19146 RTP/AVP 0 8 101 a=rtpmap:0 PCMU/8000 a=rtpmap:8 PCMA/8000 a=rtpmap:101 telephone-event/8000 a=fmtp:101 0-16 a=silenceSupp:off - - - - a=ptime:20 a=sendrecv <------------> [Sep 28 06:05:43] DEBUG[13971]: chan_sip.c:3086 __sip_xmit: Trying to put 'SIP/2.0 200' onto TLS socket destined for 10.11.106.18:2151 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 0 [ 52]: ACK sip:600@10.11.106.201:5061;transport=TLS SIP/2.0 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 1 [ 68]: Via: SIP/2.0/TLS 10.11.106.18:2151;branch=z9hG4bK-vbb3j85aoejv;rport [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 2 [ 49]: From: ;tag=hh7ekzcvct [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 3 [ 58]: To: ;tag=as2fa10baa [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 4 [ 34]: Call-ID: 3c26739215d7-2fvmwrdya91s [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 5 [ 11]: CSeq: 2 ACK [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 6 [ 16]: Max-Forwards: 70 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 7 [ 73]: Contact: ;reg-id=1 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 8 [ 17]: Content-Length: 0 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 9 [ 0]: <--- SIP read from TLS:10.11.106.18:2151 ---> ACK sip:600@10.11.106.201:5061;transport=TLS SIP/2.0 Via: SIP/2.0/TLS 10.11.106.18:2151;branch=z9hG4bK-vbb3j85aoejv;rport From: ;tag=hh7ekzcvct To: ;tag=as2fa10baa Call-ID: 3c26739215d7-2fvmwrdya91s CSeq: 2 ACK Max-Forwards: 70 Contact: ;reg-id=1 Content-Length: 0 <-------------> [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 0 [ 52]: ACK sip:600@10.11.106.201:5061;transport=TLS SIP/2.0 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 1 [ 68]: Via: SIP/2.0/TLS 10.11.106.18:2151;branch=z9hG4bK-vbb3j85aoejv;rport [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 2 [ 49]: From: ;tag=hh7ekzcvct [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 3 [ 58]: To: ;tag=as2fa10baa [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 4 [ 34]: Call-ID: 3c26739215d7-2fvmwrdya91s [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 5 [ 11]: CSeq: 2 ACK [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 6 [ 16]: Max-Forwards: 70 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 7 [ 73]: Contact: ;reg-id=1 [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 8 [ 17]: Content-Length: 0 --- (9 headers 0 lines) --- [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:7374 find_call: = Looking for Call ID: 3c26739215d7-2fvmwrdya91s (Checking From) --From tag hh7ekzcvct --To-tag as2fa10baa [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:23492 handle_incoming: **** Received ACK (6) - Command in SIP ACK [Sep 28 06:05:43] DEBUG[13966]: chan_sip.c:3761 __sip_ack: Stopping retransmission on '3c26739215d7-2fvmwrdya91s' of Response 2: Match Not Found [Sep 28 06:05:43] DEBUG[13971]: res_rtp_asterisk.c:1660 ast_rtcp_read: Got RTCP report of 68 bytes [Sep 28 06:05:43] DEBUG[13971]: channel.c:2825 __ast_answer: Didn't receive a media frame from SIP/432-0000000d within 500 ms of answering. Continuing anyway [Sep 28 06:05:43] DEBUG[13971]: channel.c:4940 set_format: Set channel SIP/432-0000000d to write format gsm [Sep 28 06:05:43] DEBUG[13971]: res_rtp_asterisk.c:1226 ast_rtp_write: Ooh, format changed from unknown to ulaw [Sep 28 06:05:43] DEBUG[13971]: res_rtp_asterisk.c:1257 ast_rtp_write: Created smoother: format: ulaw ms: 20 len: 160 [Sep 28 06:05:43] DEBUG[13971]: res_rtp_asterisk.c:1127 ast_rtp_raw_write: Starting RTCP transmission on RTP instance '0xbd83ea0' Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033090, ts 000160, len 000160) [Sep 28 06:05:43] DEBUG[13971]: channel.c:3370 ast_settimeout: Scheduling timer at (50 requested / 50 actual) timer ticks per second -- Playing 'demo-echotest.gsm' (language 'en') Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033091, ts 000320, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033092, ts 000480, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022103, ts 7273128, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022104, ts 7273688, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033093, ts 000640, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022105, ts 7273848, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033094, ts 000800, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033095, ts 000960, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022106, ts 7274008, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022107, ts 7274168, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033096, ts 001120, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022108, ts 7274328, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033097, ts 001280, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022109, ts 7274488, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033098, ts 001440, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022110, ts 7274648, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033099, ts 001600, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022111, ts 7274808, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033100, ts 001760, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022112, ts 7274968, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033101, ts 001920, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022113, ts 7275128, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033102, ts 002080, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022114, ts 7275288, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033103, ts 002240, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022115, ts 7275448, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033104, ts 002400, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022116, ts 7275608, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033105, ts 002560, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022117, ts 7275768, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033106, ts 002720, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022118, ts 7275928, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033107, ts 002880, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022119, ts 7276088, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033108, ts 003040, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022120, ts 7276248, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033109, ts 003200, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022121, ts 7276408, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033110, ts 003360, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022122, ts 7276568, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033111, ts 003520, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022123, ts 7276728, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033112, ts 003680, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022124, ts 7276888, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033113, ts 003840, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022125, ts 7277048, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033114, ts 004000, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022126, ts 7277208, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033115, ts 004160, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022127, ts 7277368, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033116, ts 004320, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022128, ts 7277528, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033117, ts 004480, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022129, ts 7277688, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033118, ts 004640, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022130, ts 7277848, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033119, ts 004800, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022131, ts 7278008, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033120, ts 004960, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022132, ts 7278168, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033121, ts 005120, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022133, ts 7278328, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033122, ts 005280, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022134, ts 7278488, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033123, ts 005440, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022135, ts 7278648, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033124, ts 005600, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022136, ts 7278808, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033125, ts 005760, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022137, ts 7278968, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033126, ts 005920, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022138, ts 7279128, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033127, ts 006080, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022139, ts 7279288, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033128, ts 006240, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022140, ts 7279448, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033129, ts 006400, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022141, ts 7279608, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033130, ts 006560, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022142, ts 7279768, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033131, ts 006720, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022143, ts 7279928, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033132, ts 006880, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022144, ts 7280088, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033133, ts 007040, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022145, ts 7280248, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033134, ts 007200, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022146, ts 7280408, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033135, ts 007360, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022147, ts 7280568, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033136, ts 007520, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022148, ts 7280728, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033137, ts 007680, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022149, ts 7280888, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033138, ts 007840, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022150, ts 7281048, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033139, ts 008000, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022151, ts 7281208, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033140, ts 008160, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022152, ts 7281368, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033141, ts 008320, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022153, ts 7281528, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033142, ts 008480, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022154, ts 7281688, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033143, ts 008640, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022155, ts 7281848, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033144, ts 008800, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022156, ts 7282008, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033145, ts 008960, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022157, ts 7282168, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033146, ts 009120, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022158, ts 7282328, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033147, ts 009280, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022159, ts 7282488, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033148, ts 009440, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022160, ts 7282648, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033149, ts 009600, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022161, ts 7282808, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033150, ts 009760, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022162, ts 7282968, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033151, ts 009920, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022163, ts 7283128, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033152, ts 010080, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022164, ts 7283288, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033153, ts 010240, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022165, ts 7283448, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033154, ts 010400, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022166, ts 7283608, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033155, ts 010560, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022167, ts 7283768, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033156, ts 010720, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022168, ts 7283928, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033157, ts 010880, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022169, ts 7284088, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033158, ts 011040, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022170, ts 7284248, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033159, ts 011200, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022171, ts 7284408, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033160, ts 011360, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022172, ts 7284568, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033161, ts 011520, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022173, ts 7284728, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033162, ts 011680, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022174, ts 7284888, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033163, ts 011840, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022175, ts 7285048, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033164, ts 012000, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022176, ts 7285208, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033165, ts 012160, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022177, ts 7285368, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033166, ts 012320, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022178, ts 7285528, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033167, ts 012480, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022179, ts 7285688, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033168, ts 012640, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022180, ts 7285848, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033169, ts 012800, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022181, ts 7286008, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033170, ts 012960, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022182, ts 7286168, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033171, ts 013120, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022183, ts 7286328, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033172, ts 013280, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022184, ts 7286488, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033173, ts 013440, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022185, ts 7286648, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033174, ts 013600, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022186, ts 7286808, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033175, ts 013760, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022187, ts 7286968, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033176, ts 013920, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022188, ts 7287128, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033177, ts 014080, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022189, ts 7287288, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033178, ts 014240, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022190, ts 7287448, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033179, ts 014400, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022191, ts 7287608, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033180, ts 014560, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022192, ts 7287768, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033181, ts 014720, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022193, ts 7287928, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033182, ts 014880, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022194, ts 7288088, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033183, ts 015040, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022195, ts 7288248, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033184, ts 015200, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022196, ts 7288408, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033185, ts 015360, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022197, ts 7288568, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033186, ts 015520, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022198, ts 7288728, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033187, ts 015680, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022199, ts 7288888, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033188, ts 015840, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022200, ts 7289048, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033189, ts 016000, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022201, ts 7289208, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033190, ts 016160, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022202, ts 7289368, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033191, ts 016320, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022203, ts 7289528, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033192, ts 016480, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022204, ts 7289688, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033193, ts 016640, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022205, ts 7289848, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033194, ts 016800, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022206, ts 7290008, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033195, ts 016960, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022207, ts 7290168, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033196, ts 017120, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022208, ts 7290328, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033197, ts 017280, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022209, ts 7290488, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033198, ts 017440, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022210, ts 7290648, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033199, ts 017600, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022211, ts 7290808, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033200, ts 017760, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022212, ts 7290968, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033201, ts 017920, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022213, ts 7291128, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033202, ts 018080, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022214, ts 7291288, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033203, ts 018240, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022215, ts 7291448, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033204, ts 018400, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022216, ts 7291608, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033205, ts 018560, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022217, ts 7291768, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033206, ts 018720, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022218, ts 7291928, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033207, ts 018880, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022219, ts 7292088, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033208, ts 019040, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022220, ts 7292248, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033209, ts 019200, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022221, ts 7292408, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033210, ts 019360, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022222, ts 7292568, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033211, ts 019520, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022223, ts 7292728, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033212, ts 019680, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022224, ts 7292888, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033213, ts 019840, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022225, ts 7293048, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033214, ts 020000, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022226, ts 7293208, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033215, ts 020160, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022227, ts 7293368, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033216, ts 020320, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022228, ts 7293528, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033217, ts 020480, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022229, ts 7293688, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033218, ts 020640, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022230, ts 7293848, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033219, ts 020800, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022231, ts 7294008, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033220, ts 020960, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022232, ts 7294168, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033221, ts 021120, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022233, ts 7294328, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033222, ts 021280, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022234, ts 7294488, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033223, ts 021440, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022235, ts 7294648, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033224, ts 021600, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022236, ts 7294808, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033225, ts 021760, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022237, ts 7294968, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033226, ts 021920, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022238, ts 7295128, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033227, ts 022080, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022239, ts 7295288, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033228, ts 022240, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022240, ts 7295448, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033229, ts 022400, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022241, ts 7295608, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033230, ts 022560, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022242, ts 7295768, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033231, ts 022720, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022243, ts 7295928, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033232, ts 022880, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022244, ts 7296088, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033233, ts 023040, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022245, ts 7296248, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033234, ts 023200, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022246, ts 7296408, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033235, ts 023360, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022247, ts 7296568, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033236, ts 023520, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022248, ts 7296728, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033237, ts 023680, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022249, ts 7296888, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033238, ts 023840, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022250, ts 7297048, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033239, ts 024000, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022251, ts 7297208, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033240, ts 024160, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022252, ts 7297368, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033241, ts 024320, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022253, ts 7297528, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033242, ts 024480, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022254, ts 7297688, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033243, ts 024640, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022255, ts 7297848, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033244, ts 024800, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022256, ts 7298008, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033245, ts 024960, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022257, ts 7298168, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033246, ts 025120, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022258, ts 7298328, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033247, ts 025280, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022259, ts 7298488, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033248, ts 025440, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022260, ts 7298648, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033249, ts 025600, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022261, ts 7298808, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033250, ts 025760, len 000160) Got RTP packet from 10.11.106.18:58000 (type 00, seq 022262, ts 7298968, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033251, ts 025920, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033252, ts 026080, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033253, ts 026240, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033254, ts 026400, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033255, ts 026560, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033256, ts 026720, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033257, ts 026880, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033258, ts 027040, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033259, ts 027200, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033260, ts 027360, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033261, ts 027520, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033262, ts 027680, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033263, ts 027840, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033264, ts 028000, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033265, ts 028160, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033266, ts 028320, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033267, ts 028480, len 000160) Sent RTP packet to 10.11.106.18:58000 (type 00, seq 033268, ts 028640, len 000160) [Sep 28 06:05:47] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 0 [ 52]: BYE sip:600@10.11.106.201:5061;transport=TLS SIP/2.0 [Sep 28 06:05:47] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 1 [ 68]: Via: SIP/2.0/TLS 10.11.106.18:2151;branch=z9hG4bK-qnnp59a4nslw;rport [Sep 28 06:05:47] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 2 [ 49]: From: ;tag=hh7ekzcvct [Sep 28 06:05:47] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 3 [ 58]: To: ;tag=as2fa10baa [Sep 28 06:05:47] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 4 [ 34]: Call-ID: 3c26739215d7-2fvmwrdya91s [Sep 28 06:05:47] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 5 [ 11]: CSeq: 3 BYE [Sep 28 06:05:47] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 6 [ 16]: Max-Forwards: 70 [Sep 28 06:05:47] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 7 [ 73]: Contact: ;reg-id=1 [Sep 28 06:05:47] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 8 [ 25]: User-Agent: snom370/8.5.4 [Sep 28 06:05:47] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 9 [ 76]: RTP-RxStat: Total_Rx_Pkts=162,Rx_Pkts=0,Rx_Pkts_Lost=1,Remote_Rx_Pkts_Lost=0 [Sep 28 06:05:47] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 10 [ 58]: RTP-TxStat: Total_Tx_Pkts=160,Tx_Pkts=167,Remote_Tx_Pkts=0 [Sep 28 06:05:47] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 11 [ 17]: Content-Length: 0 [Sep 28 06:05:47] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 12 [ 0]: <--- SIP read from TLS:10.11.106.18:2151 ---> BYE sip:600@10.11.106.201:5061;transport=TLS SIP/2.0 Via: SIP/2.0/TLS 10.11.106.18:2151;branch=z9hG4bK-qnnp59a4nslw;rport From: ;tag=hh7ekzcvct To: ;tag=as2fa10baa Call-ID: 3c26739215d7-2fvmwrdya91s CSeq: 3 BYE Max-Forwards: 70 Contact: ;reg-id=1 User-Agent: snom370/8.5.4 RTP-RxStat: Total_Rx_Pkts=162,Rx_Pkts=0,Rx_Pkts_Lost=1,Remote_Rx_Pkts_Lost=0 RTP-TxStat: Total_Tx_Pkts=160,Tx_Pkts=167,Remote_Tx_Pkts=0 Content-Length: 0 <-------------> [Sep 28 06:05:47] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 0 [ 52]: BYE sip:600@10.11.106.201:5061;transport=TLS SIP/2.0 [Sep 28 06:05:47] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 1 [ 68]: Via: SIP/2.0/TLS 10.11.106.18:2151;branch=z9hG4bK-qnnp59a4nslw;rport [Sep 28 06:05:47] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 2 [ 49]: From: ;tag=hh7ekzcvct [Sep 28 06:05:47] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 3 [ 58]: To: ;tag=as2fa10baa [Sep 28 06:05:47] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 4 [ 34]: Call-ID: 3c26739215d7-2fvmwrdya91s [Sep 28 06:05:47] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 5 [ 11]: CSeq: 3 BYE [Sep 28 06:05:47] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 6 [ 16]: Max-Forwards: 70 [Sep 28 06:05:47] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 7 [ 73]: Contact: ;reg-id=1 [Sep 28 06:05:47] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 8 [ 25]: User-Agent: snom370/8.5.4 [Sep 28 06:05:47] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 9 [ 76]: RTP-RxStat: Total_Rx_Pkts=162,Rx_Pkts=0,Rx_Pkts_Lost=1,Remote_Rx_Pkts_Lost=0 [Sep 28 06:05:47] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 10 [ 58]: RTP-TxStat: Total_Tx_Pkts=160,Tx_Pkts=167,Remote_Tx_Pkts=0 [Sep 28 06:05:47] DEBUG[13966]: chan_sip.c:7771 parse_request: Header 11 [ 17]: Content-Length: 0 --- (12 headers 0 lines) --- [Sep 28 06:05:47] DEBUG[13966]: chan_sip.c:7374 find_call: = Looking for Call ID: 3c26739215d7-2fvmwrdya91s (Checking From) --From tag hh7ekzcvct --To-tag as2fa10baa [Sep 28 06:05:47] DEBUG[13966]: chan_sip.c:23492 handle_incoming: **** Received BYE (8) - Command in SIP BYE [Sep 28 06:05:47] DEBUG[13966]: chan_sip.c:22267 handle_request_bye: Initializing initreq for method BYE - callid 3c26739215d7-2fvmwrdya91s [Sep 28 06:05:47] DEBUG[13966]: netsock2.c:125 ast_sockaddr_split_hostport: Splitting '10.11.106.18:2151' gives... [Sep 28 06:05:47] DEBUG[13966]: netsock2.c:155 ast_sockaddr_split_hostport: ...host '10.11.106.18' and port '2151'. Sending to 10.11.106.18:2151 (no NAT) [Sep 28 06:05:47] DEBUG[13966]: chan_sip.c:2833 sip_alreadygone: Setting SIP_ALREADYGONE on dialog 3c26739215d7-2fvmwrdya91s [Sep 28 06:05:47] DEBUG[13966]: res_rtp_asterisk.c:2373 ast_rtp_remote_address_set: Setting RTCP address on RTP instance '0xbd83ea0' [Sep 28 06:05:47] DEBUG[13966]: chan_sip.c:24359 stop_session_timer: Session timer stopped: -1 - 3c26739215d7-2fvmwrdya91s Scheduling destruction of SIP dialog '3c26739215d7-2fvmwrdya91s' in 32000 ms (Method: BYE) [Sep 28 06:05:47] DEBUG[13966]: chan_sip.c:22370 handle_request_bye: Received bye, issuing owner hangup <--- Transmitting (no NAT) to 10.11.106.18:2151 ---> SIP/2.0 200 OK Via: SIP/2.0/TLS 10.11.106.18:2151;branch=z9hG4bK-qnnp59a4nslw;received=10.11.106.18;rport=2151 From: ;tag=hh7ekzcvct To: ;tag=as2fa10baa Call-ID: 3c26739215d7-2fvmwrdya91s CSeq: 3 BYE Server: Asterisk PBX SVN-branch-1.8-r288640 Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH Supported: replaces, timer Content-Length: 0 <------------> [Sep 28 06:05:47] DEBUG[13966]: chan_sip.c:3086 __sip_xmit: Trying to put 'SIP/2.0 200' onto TLS socket destined for 10.11.106.18:2151 [Sep 28 06:05:47] DEBUG[13971]: channel.c:3370 ast_settimeout: Scheduling timer at (0 requested / 0 actual) timer ticks per second [Sep 28 06:05:47] DEBUG[13971]: channel.c:3370 ast_settimeout: Scheduling timer at (0 requested / 0 actual) timer ticks per second [Sep 28 06:05:47] DEBUG[13971]: channel.c:4940 set_format: Set channel SIP/432-0000000d to write format ulaw [Sep 28 06:05:47] DEBUG[13971]: pbx.c:4720 __ast_pbx_run: Spawn extension (telefone,600,4) exited non-zero on 'SIP/432-0000000d' == Spawn extension (telefone, 600, 4) exited non-zero on 'SIP/432-0000000d' [Sep 28 06:05:47] DEBUG[13971]: channel.c:2572 ast_softhangup_nolock: Soft-Hanging up channel 'SIP/432-0000000d' [Sep 28 06:05:47] DEBUG[13971]: channel.c:2700 ast_hangup: Hanging up channel 'SIP/432-0000000d' [Sep 28 06:05:47] DEBUG[13971]: chan_sip.c:5791 sip_hangup: Hangup call SIP/432-0000000d, SIP callid 3c26739215d7-2fvmwrdya91s [Sep 28 06:05:47] DEBUG[13971]: chan_sip.c:5796 sip_hangup: update_call_counter(432) - decrement call limit counter on hangup [Sep 28 06:05:47] DEBUG[13971]: chan_sip.c:5418 update_call_counter: Updating call counter for incoming call [Sep 28 06:05:47] DEBUG[13971]: chan_sip.c:5489 update_call_counter: Call from peer '432' removed from call limit 20 [Sep 28 06:05:47] DEBUG[13828]: devicestate.c:340 _ast_device_state: No provider found, checking channel drivers for SIP - 432 [Sep 28 06:05:47] DEBUG[13828]: chan_sip.c:24806 sip_devicestate: Checking device state for peer 432 [Sep 28 06:05:47] DEBUG[13828]: devicestate.c:458 do_state_change: Changing state for SIP/432 - state 1 (Not in use) [Sep 28 06:05:47] DEBUG[13828]: devicestate.c:438 devstate_event: device 'SIP/432' state '1' [Sep 28 06:05:47] DEBUG[13863]: app_queue.c:1324 handle_statechange: Device 'SIP/432' changed to state '1' (Not in use) but we don't care because they're not a member of any queue. [Sep 28 06:05:47] DEBUG[13971]: res_rtp_asterisk.c:2373 ast_rtp_remote_address_set: Setting RTCP address on RTP instance '0xbd83ea0' [Sep 28 06:05:47] DEBUG[13828]: devicestate.c:340 _ast_device_state: No provider found, checking channel drivers for SIP - 432 [Sep 28 06:05:47] DEBUG[13828]: chan_sip.c:24806 sip_devicestate: Checking device state for peer 432 [Sep 28 06:05:47] DEBUG[13828]: devicestate.c:458 do_state_change: Changing state for SIP/432 - state 1 (Not in use) [Sep 28 06:05:47] DEBUG[13828]: devicestate.c:438 devstate_event: device 'SIP/432' state '1' [Sep 28 06:05:47] DEBUG[13863]: app_queue.c:1324 handle_statechange: Device 'SIP/432' changed to state '1' (Not in use) but we don't care because they're not a member of any queue. asterisk18*CLI> Disconnected from Asterisk server Asterisk ending (0).