<------------> [Jan 28 19:30:36] DEBUG[12398] chan_sip.c: Trying to put 'SIP/2.0 200' onto WS socket destined for 186.XX.XX.XX:60753 [Jan 28 19:30:36] DEBUG[12125] devicestate.c: No provider found, checking channel drivers for SIP - 102 [Jan 28 19:30:36] DEBUG[12125] chan_sip.c: Checking device state for peer 102 [Jan 28 19:30:36] DEBUG[12125] devicestate.c: Changing state for SIP/102 - state 1 (Not in use) [Jan 28 19:30:36] VERBOSE[12398] chan_sip.c: Scheduling destruction of SIP dialog 'tneuhruf1l6596af282bdr' in 32000 ms (Method: REGISTER) [Jan 28 19:30:56] DEBUG[12399] threadpool.c: Worker thread idle timeout reached. Dying. [Jan 28 19:30:56] DEBUG[12113] threadpool.c: Destroying worker thread 22 [Jan 28 19:30:57] VERBOSE[12398] chan_sip.c: <--- SIP read from WS:186.XX.XX.XX:60753 ---> INVITE sip:101@59.XX.XX.XX SIP/2.0 Via: SIP/2.0/WS ksdmllpbgsdf.invalid;branch=z9hG4bK4083279 Max-Forwards: 69 To: From: "102" ;tag=sa54urm37e Call-ID: hqaqv9bdm2s5u92le2rn CSeq: 9778 INVITE X-Can-Renegotiate: false Contact: Content-Type: application/sdp Allow: INVITE,ACK,CANCEL,BYE,UPDATE,MESSAGE,OPTIONS Supported: ice,outbound User-Agent: JsSIP 0.6.12 Content-Length: 982 v=0 o=Mozilla-SIPUA-34.0.1 26605 0 IN IP4 0.0.0.0 s=SIP Call t=0 0 a=ice-ufrag:97fd037e a=ice-pwd:a6822dc433d2cee279c9ea59b1945cb0 a=fingerprint:sha-256 D2:B2:93:C3:22:55:17:DB:FD:F6:62:39:73:B9:59:29:01:5C:62:8C:7C:76:49:92:A0:FD:3C:11:DA:6B:3A:56 m=audio 9 RTP/SAVPF 109 9 0 8 101 c=IN IP4 0.0.0.0 a=rtpmap:109 opus/48000/2 a=ptime:20 a=rtpmap:9 G722/8000 a=rtpmap:0 PCMU/8000 a=rtpmap:8 PCMA/8000 a=rtpmap:101 telephone-event/8000 a=fmtp:101 0-15 a=sendrecv a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level a=setup:actpass a=rtcp-mux a=candidate:0 1 UDP 2129133823 192.168.2.103 58090 typ host a=candidate:0 2 UDP 2129133822 192.168.2.103 58631 typ host m=video 9 RTP/SAVPF 120 c=IN IP4 0.0.0.0 a=rtpmap:120 VP8/90000 a=sendrecv a=rtcp-fb:120 nack a=rtcp-fb:120 nack pli a=rtcp-fb:120 ccm fir a=setup:actpass a=rtcp-mux a=candidate:0 1 UDP 2129133823 192.168.2.103 42932 typ host a=candidate:0 2 UDP 2129133822 192.168.2.103 39849 typ host <-------------> [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 0 [ 37]: INVITE sip:101@59.XX.XX.XX SIP/2.0 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 1 [ 58]: Via: SIP/2.0/WS ksdmllpbgsdf.invalid;branch=z9hG4bK4083279 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 2 [ 16]: Max-Forwards: 69 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 3 [ 28]: To: [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 4 [ 51]: From: "102" ;tag=sa54urm37e [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 5 [ 29]: Call-ID: hqaqv9bdm2s5u92le2rn [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 6 [ 17]: CSeq: 9778 INVITE [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 7 [ 24]: X-Can-Renegotiate: false [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 8 [ 60]: Contact: [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 9 [ 29]: Content-Type: application/sdp [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 10 [ 51]: Allow: INVITE,ACK,CANCEL,BYE,UPDATE,MESSAGE,OPTIONS [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 11 [ 23]: Supported: ice,outbound [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 12 [ 24]: User-Agent: JsSIP 0.6.12 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 13 [ 19]: Content-Length: 982 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 14 [ 0]: [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 0 [ 3]: v=0 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 1 [ 45]: o=Mozilla-SIPUA-34.0.1 26605 0 IN IP4 0.0.0.0 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 2 [ 10]: s=SIP Call [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 3 [ 5]: t=0 0 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 4 [ 20]: a=ice-ufrag:97fd037e [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 5 [ 42]: a=ice-pwd:a6822dc433d2cee279c9ea59b1945cb0 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 6 [117]: a=fingerprint:sha-256 D2:B2:93:C3:22:55:17:DB:FD:F6:62:39:73:B9:59:29:01:5C:62:8C:7C:76:49:92:A0:FD:3C:11:DA:6B:3A:56 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 7 [ 33]: m=audio 9 RTP/SAVPF 109 9 0 8 101 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 8 [ 16]: c=IN IP4 0.0.0.0 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 9 [ 25]: a=rtpmap:109 opus/48000/2 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 10 [ 10]: a=ptime:20 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 11 [ 20]: a=rtpmap:9 G722/8000 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 12 [ 20]: a=rtpmap:0 PCMU/8000 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 13 [ 20]: a=rtpmap:8 PCMA/8000 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 14 [ 33]: a=rtpmap:101 telephone-event/8000 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 15 [ 15]: a=fmtp:101 0-15 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 16 [ 10]: a=sendrecv [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 17 [ 54]: a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 18 [ 15]: a=setup:actpass [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 19 [ 10]: a=rtcp-mux [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 20 [ 59]: a=candidate:0 1 UDP 2129133823 192.168.2.103 58090 typ host [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 21 [ 59]: a=candidate:0 2 UDP 2129133822 192.168.2.103 58631 typ host [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 22 [ 23]: m=video 9 RTP/SAVPF 120 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 23 [ 16]: c=IN IP4 0.0.0.0 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 24 [ 22]: a=rtpmap:120 VP8/90000 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 25 [ 10]: a=sendrecv [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 26 [ 18]: a=rtcp-fb:120 nack [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 27 [ 22]: a=rtcp-fb:120 nack pli [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 28 [ 21]: a=rtcp-fb:120 ccm fir [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 29 [ 15]: a=setup:actpass [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 30 [ 10]: a=rtcp-mux [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 31 [ 59]: a=candidate:0 1 UDP 2129133823 192.168.2.103 42932 typ host [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 32 [ 59]: a=candidate:0 2 UDP 2129133822 192.168.2.103 39849 typ host [Jan 28 19:30:57] VERBOSE[12398] chan_sip.c: --- (14 headers 33 lines) --- [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: = Looking for Call ID: hqaqv9bdm2s5u92le2rn (Checking From) --From tag sa54urm37e --To-tag [Jan 28 19:30:57] DEBUG[12398] acl.c: For destination '186.XX.XX.XX', our source address is '10.37.172.89'. [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Setting AST_TRANSPORT_WS with address 10.37.172.89:5060 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Allocating new SIP dialog for hqaqv9bdm2s5u92le2rn - INVITE (No RTP) [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: **** Received INVITE (5) - Command in SIP INVITE [Jan 28 19:30:57] DEBUG[12398][C-00000003] sip/reqresp_parser.c: Begin: parsing SIP "Supported: ice,outbound" [Jan 28 19:30:57] DEBUG[12398][C-00000003] sip/reqresp_parser.c: Found SIP option: -ice- [Jan 28 19:30:57] DEBUG[12398][C-00000003] sip/reqresp_parser.c: Found no match for SIP option: ice (Please file bug report!) [Jan 28 19:30:57] DEBUG[12398][C-00000003] sip/reqresp_parser.c: Found SIP option: -outbound- [Jan 28 19:30:57] DEBUG[12398][C-00000003] sip/reqresp_parser.c: Matched SIP option: outbound [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Initializing initreq for method INVITE - callid hqaqv9bdm2s5u92le2rn [Jan 28 19:30:57] VERBOSE[12398][C-00000003] chan_sip.c: Using INVITE request as basis request - hqaqv9bdm2s5u92le2rn [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: Splitting '59.XX.XX.XX' into... [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: ...host '59.XX.XX.XX' and port ''. [Jan 28 19:30:57] VERBOSE[12398][C-00000003] chan_sip.c: Found peer '102' for '102' from 186.XX.XX.XX:60753 [Jan 28 19:30:57] VERBOSE[12398][C-00000003] chan_sip.c: <--- Reliably Transmitting (NAT) to 186.XX.XX.XX:60753 ---> SIP/2.0 401 Unauthorized Via: SIP/2.0/WS ksdmllpbgsdf.invalid;branch=z9hG4bK4083279;received=186.XX.XX.XX;rport=60753 From: "102" ;tag=sa54urm37e To: ;tag=as2f2f52a5 Call-ID: hqaqv9bdm2s5u92le2rn CSeq: 9778 INVITE Server: Asterisk PBX 13.1.0 Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE Supported: replaces, timer WWW-Authenticate: Digest algorithm=MD5, realm="59.XX.XX.XX", nonce="7eb08087" Content-Length: 0 <------------> [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Trying to put 'SIP/2.0 401' onto WS socket destined for 186.XX.XX.XX:60753 [Jan 28 19:30:57] VERBOSE[12398][C-00000003] chan_sip.c: Scheduling destruction of SIP dialog 'hqaqv9bdm2s5u92le2rn' in 32000 ms (Method: INVITE) [Jan 28 19:30:57] VERBOSE[12398] chan_sip.c: <--- SIP read from WS:186.XX.XX.XX:60753 ---> ACK sip:101@59.XX.XX.XX SIP/2.0 Via: SIP/2.0/WS ksdmllpbgsdf.invalid;branch=z9hG4bK4083279 To: ;tag=as2f2f52a5 From: "102" ;tag=sa54urm37e Call-ID: hqaqv9bdm2s5u92le2rn CSeq: 9778 ACK Content-Length: 0 <-------------> [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 0 [ 34]: ACK sip:101@59.XX.XX.XX SIP/2.0 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 1 [ 58]: Via: SIP/2.0/WS ksdmllpbgsdf.invalid;branch=z9hG4bK4083279 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 2 [ 43]: To: ;tag=as2f2f52a5 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 3 [ 51]: From: "102" ;tag=sa54urm37e [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 4 [ 29]: Call-ID: hqaqv9bdm2s5u92le2rn [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 5 [ 14]: CSeq: 9778 ACK [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 6 [ 17]: Content-Length: 0 [Jan 28 19:30:57] VERBOSE[12398] chan_sip.c: --- (7 headers 0 lines) --- [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: = Looking for Call ID: hqaqv9bdm2s5u92le2rn (Checking From) --From tag sa54urm37e --To-tag as2f2f52a5 [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: **** Received ACK (6) - Command in SIP ACK [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Stopping retransmission on 'hqaqv9bdm2s5u92le2rn' of Response 9778: Match Not Found [Jan 28 19:30:57] VERBOSE[12398] chan_sip.c: <--- SIP read from WS:186.XX.XX.XX:60753 ---> INVITE sip:101@59.XX.XX.XX SIP/2.0 Via: SIP/2.0/WS ksdmllpbgsdf.invalid;branch=z9hG4bK3762205 Max-Forwards: 69 To: From: "102" ;tag=sa54urm37e Call-ID: hqaqv9bdm2s5u92le2rn CSeq: 9779 INVITE Authorization: Digest algorithm=MD5, username="102", realm="59.XX.XX.XX", nonce="7eb08087", uri="sip:101@59.XX.XX.XX", response="5f1068553c36adfcb42bd3527c0ee97c" X-Can-Renegotiate: false Contact: Content-Type: application/sdp Allow: INVITE,ACK,CANCEL,BYE,UPDATE,MESSAGE,OPTIONS Supported: ice,outbound User-Agent: JsSIP 0.6.12 Content-Length: 982 v=0 o=Mozilla-SIPUA-34.0.1 26605 0 IN IP4 0.0.0.0 s=SIP Call t=0 0 a=ice-ufrag:97fd037e a=ice-pwd:a6822dc433d2cee279c9ea59b1945cb0 a=fingerprint:sha-256 D2:B2:93:C3:22:55:17:DB:FD:F6:62:39:73:B9:59:29:01:5C:62:8C:7C:76:49:92:A0:FD:3C:11:DA:6B:3A:56 m=audio 9 RTP/SAVPF 109 9 0 8 101 c=IN IP4 0.0.0.0 a=rtpmap:109 opus/48000/2 a=ptime:20 a=rtpmap:9 G722/8000 a=rtpmap:0 PCMU/8000 a=rtpmap:8 PCMA/8000 a=rtpmap:101 telephone-event/8000 a=fmtp:101 0-15 a=sendrecv a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level a=setup:actpass a=rtcp-mux a=candidate:0 1 UDP 2129133823 192.168.2.103 58090 typ host a=candidate:0 2 UDP 2129133822 192.168.2.103 58631 typ host m=video 9 RTP/SAVPF 120 c=IN IP4 0.0.0.0 a=rtpmap:120 VP8/90000 a=sendrecv a=rtcp-fb:120 nack a=rtcp-fb:120 nack pli a=rtcp-fb:120 ccm fir a=setup:actpass a=rtcp-mux a=candidate:0 1 UDP 2129133823 192.168.2.103 42932 typ host a=candidate:0 2 UDP 2129133822 192.168.2.103 39849 typ host <-------------> [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 0 [ 37]: INVITE sip:101@59.XX.XX.XX SIP/2.0 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 1 [ 58]: Via: SIP/2.0/WS ksdmllpbgsdf.invalid;branch=z9hG4bK3762205 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 2 [ 16]: Max-Forwards: 69 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 3 [ 28]: To: [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 4 [ 51]: From: "102" ;tag=sa54urm37e [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 5 [ 29]: Call-ID: hqaqv9bdm2s5u92le2rn [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 6 [ 17]: CSeq: 9779 INVITE [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 7 [168]: Authorization: Digest algorithm=MD5, username="102", realm="59.XX.XX.XX", nonce="7eb08087", uri="sip:101@59.XX.XX.XX", response="5f1068553c36adfcb42bd3527c0ee97c" [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 8 [ 24]: X-Can-Renegotiate: false [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 9 [ 60]: Contact: [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 10 [ 29]: Content-Type: application/sdp [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 11 [ 51]: Allow: INVITE,ACK,CANCEL,BYE,UPDATE,MESSAGE,OPTIONS [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 12 [ 23]: Supported: ice,outbound [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 13 [ 24]: User-Agent: JsSIP 0.6.12 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 14 [ 19]: Content-Length: 982 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Header 15 [ 0]: [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 0 [ 3]: v=0 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 1 [ 45]: o=Mozilla-SIPUA-34.0.1 26605 0 IN IP4 0.0.0.0 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 2 [ 10]: s=SIP Call [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 3 [ 5]: t=0 0 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 4 [ 20]: a=ice-ufrag:97fd037e [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 5 [ 42]: a=ice-pwd:a6822dc433d2cee279c9ea59b1945cb0 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 6 [117]: a=fingerprint:sha-256 D2:B2:93:C3:22:55:17:DB:FD:F6:62:39:73:B9:59:29:01:5C:62:8C:7C:76:49:92:A0:FD:3C:11:DA:6B:3A:56 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 7 [ 33]: m=audio 9 RTP/SAVPF 109 9 0 8 101 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 8 [ 16]: c=IN IP4 0.0.0.0 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 9 [ 25]: a=rtpmap:109 opus/48000/2 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 10 [ 10]: a=ptime:20 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 11 [ 20]: a=rtpmap:9 G722/8000 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 12 [ 20]: a=rtpmap:0 PCMU/8000 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 13 [ 20]: a=rtpmap:8 PCMA/8000 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 14 [ 33]: a=rtpmap:101 telephone-event/8000 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 15 [ 15]: a=fmtp:101 0-15 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 16 [ 10]: a=sendrecv [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 17 [ 54]: a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 18 [ 15]: a=setup:actpass [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 19 [ 10]: a=rtcp-mux [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 20 [ 59]: a=candidate:0 1 UDP 2129133823 192.168.2.103 58090 typ host [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 21 [ 59]: a=candidate:0 2 UDP 2129133822 192.168.2.103 58631 typ host [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 22 [ 23]: m=video 9 RTP/SAVPF 120 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 23 [ 16]: c=IN IP4 0.0.0.0 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 24 [ 22]: a=rtpmap:120 VP8/90000 [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 25 [ 10]: a=sendrecv [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 26 [ 18]: a=rtcp-fb:120 nack [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 27 [ 22]: a=rtcp-fb:120 nack pli [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 28 [ 21]: a=rtcp-fb:120 ccm fir [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 29 [ 15]: a=setup:actpass [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 30 [ 10]: a=rtcp-mux [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 31 [ 59]: a=candidate:0 1 UDP 2129133823 192.168.2.103 42932 typ host [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: Body 32 [ 59]: a=candidate:0 2 UDP 2129133822 192.168.2.103 39849 typ host [Jan 28 19:30:57] VERBOSE[12398] chan_sip.c: --- (15 headers 33 lines) --- [Jan 28 19:30:57] DEBUG[12398] chan_sip.c: = Looking for Call ID: hqaqv9bdm2s5u92le2rn (Checking From) --From tag sa54urm37e --To-tag [Jan 28 19:30:57] DEBUG[12398] netsock2.c: Splitting '59.XX.XX.XX' into... [Jan 28 19:30:57] DEBUG[12398] netsock2.c: ...host '59.XX.XX.XX' and port ''. [Jan 28 19:30:57] DEBUG[12398] netsock2.c: Splitting '59.XX.XX.XX' into... [Jan 28 19:30:57] DEBUG[12398] netsock2.c: ...host '59.XX.XX.XX' and port ''. [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: **** Received INVITE (5) - Command in SIP INVITE [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Initializing initreq for method INVITE - callid hqaqv9bdm2s5u92le2rn [Jan 28 19:30:57] VERBOSE[12398][C-00000003] chan_sip.c: Using INVITE request as basis request - hqaqv9bdm2s5u92le2rn [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: Splitting '59.XX.XX.XX' into... [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: ...host '59.XX.XX.XX' and port ''. [Jan 28 19:30:57] VERBOSE[12398][C-00000003] chan_sip.c: Found peer '102' for '102' from 186.XX.XX.XX:60753 [Jan 28 19:30:57] DEBUG[12398][C-00000003] rtp_engine.c: Using engine 'asterisk' for RTP instance '0x7fc388001d68' [Jan 28 19:30:57] DEBUG[12398][C-00000003] res_rtp_asterisk.c: Allocated port 12956 for RTP instance '0x7fc388001d68' [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: icess0x7fc3880 ICE session created, comp_cnt=2, role is Unknown agent [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: Splitting '10.37.172.89' into... [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: ...host '10.37.172.89' and port ''. [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: icess0x7fc3880 Candidate 0 added: comp_id=1, type=host, foundation=Ha25ac59, addr=10.37.172.89:12956, base=10.37.172.89:12956, prio=0x7effffff (2130706431) [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: Splitting '59.XX.XX.XX' into... [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: ...host '59.XX.XX.XX' and port ''. [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: Splitting '10.37.172.89' into... [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: ...host '10.37.172.89' and port ''. [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: icess0x7fc3880 Candidate 1 added: comp_id=1, type=srflx, foundation=S369fc99e, addr=59.XX.XX.XX:12956, base=10.37.172.89:12956, prio=0x64ffffff (1694498815) [Jan 28 19:30:57] DEBUG[12398][C-00000003] rtp_engine.c: RTP instance '0x7fc388001d68' is setup and ready to go [Jan 28 19:30:57] DEBUG[12398][C-00000003] rtp_engine.c: Using engine 'asterisk' for RTP instance '0x7fc388003228' [Jan 28 19:30:57] DEBUG[12398][C-00000003] res_rtp_asterisk.c: Allocated port 14270 for RTP instance '0x7fc388003228' [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: icess0x7fc3880 ICE session created, comp_cnt=2, role is Unknown agent [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: Splitting '10.37.172.89' into... [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: ...host '10.37.172.89' and port ''. [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: icess0x7fc3880 Candidate 0 added: comp_id=1, type=host, foundation=Ha25ac59, addr=10.37.172.89:14270, base=10.37.172.89:14270, prio=0x7effffff (2130706431) [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: Splitting '59.XX.XX.XX' into... [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: ...host '59.XX.XX.XX' and port ''. [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: Splitting '10.37.172.89' into... [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: ...host '10.37.172.89' and port ''. [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: icess0x7fc3880 Candidate 1 added: comp_id=1, type=srflx, foundation=S369fc99e, addr=59.XX.XX.XX:14270, base=10.37.172.89:14270, prio=0x64ffffff (1694498815) [Jan 28 19:30:57] DEBUG[12398][C-00000003] rtp_engine.c: RTP instance '0x7fc388003228' is setup and ready to go [Jan 28 19:30:57] DEBUG[12398][C-00000003] res_rtp_asterisk.c: Setup RTCP on RTP instance '0x7fc388003228' [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: Splitting '10.37.172.89' into... [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: ...host '10.37.172.89' and port ''. [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: icess0x7fc3880 Candidate 2 added: comp_id=2, type=host, foundation=Ha25ac59, addr=10.37.172.89:14271, base=10.37.172.89:14271, prio=0x7efffffe (2130706430) [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: Splitting '59.XX.XX.XX' into... [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: ...host '59.XX.XX.XX' and port ''. [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: Splitting '10.37.172.89' into... [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: ...host '10.37.172.89' and port ''. [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: icess0x7fc3880 Candidate 3 added: comp_id=2, type=srflx, foundation=S369fc99e, addr=59.XX.XX.XX:14271, base=10.37.172.89:14271, prio=0x64fffffe (1694498814) [Jan 28 19:30:57] DEBUG[12398][C-00000003] res_rtp_asterisk.c: Setup RTCP on RTP instance '0x7fc388001d68' [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: Splitting '10.37.172.89' into... [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: ...host '10.37.172.89' and port ''. [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: icess0x7fc3880 Candidate 2 added: comp_id=2, type=host, foundation=Ha25ac59, addr=10.37.172.89:12957, base=10.37.172.89:12957, prio=0x7efffffe (2130706430) [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: Splitting '59.XX.XX.XX' into... [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: ...host '59.XX.XX.XX' and port ''. [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: Splitting '10.37.172.89' into... [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: ...host '10.37.172.89' and port ''. [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: icess0x7fc3880 Candidate 3 added: comp_id=2, type=srflx, foundation=S369fc99e, addr=59.XX.XX.XX:12957, base=10.37.172.89:12957, prio=0x64fffffe (1694498814) [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Setting NAT on RTP to On [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Setting NAT on VRTP to On [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Processing session-level SDP v=0... UNSUPPORTED OR FAILED. [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Processing session-level SDP o=Mozilla-SIPUA-34.0.1 26605 0 IN IP4 0.0.0.0... OK. [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Processing session-level SDP s=SIP Call... UNSUPPORTED OR FAILED. [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Processing session-level SDP t=0 0... UNSUPPORTED OR FAILED. [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Processing session-level SDP a=ice-ufrag:97fd037e... OK. [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Processing session-level SDP a=ice-pwd:a6822dc433d2cee279c9ea59b1945cb0... OK. [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Processing session-level SDP a=fingerprint:sha-256 D2:B2:93:C3:22:55:17:DB:FD:F6:62:39:73:B9:59:29:01:5C:62:8C:7C:76:49:92:A0:FD:3C:11:DA:6B:3A:56... OK. [Jan 28 19:30:57] VERBOSE[12398][C-00000003] chan_sip.c: Found RTP audio format 109 [Jan 28 19:30:57] DEBUG[12398][C-00000003] rtp_engine.c: Setting payload 109 (0x7fc38801c238) based on m type on 0x7fc340ffd700 [Jan 28 19:30:57] VERBOSE[12398][C-00000003] chan_sip.c: Found RTP audio format 9 [Jan 28 19:30:57] DEBUG[12398][C-00000003] rtp_engine.c: Setting payload 9 (0x7fc38801ca78) based on m type on 0x7fc340ffd700 [Jan 28 19:30:57] VERBOSE[12398][C-00000003] chan_sip.c: Found RTP audio format 0 [Jan 28 19:30:57] DEBUG[12398][C-00000003] rtp_engine.c: Setting payload 0 (0x7fc38801d2b8) based on m type on 0x7fc340ffd700 [Jan 28 19:30:57] VERBOSE[12398][C-00000003] chan_sip.c: Found RTP audio format 8 [Jan 28 19:30:57] DEBUG[12398][C-00000003] rtp_engine.c: Setting payload 8 (0x7fc38801daf8) based on m type on 0x7fc340ffd700 [Jan 28 19:30:57] VERBOSE[12398][C-00000003] chan_sip.c: Found RTP audio format 101 [Jan 28 19:30:57] DEBUG[12398][C-00000003] rtp_engine.c: Setting payload 101 (0x7fc38801e338) based on m type on 0x7fc340ffd700 [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: Splitting '0.0.0.0' into... [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: ...host '0.0.0.0' and port ''. [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Processing media-level (audio) SDP c=IN IP4 0.0.0.0... OK. [Jan 28 19:30:57] VERBOSE[12398][C-00000003] chan_sip.c: Found audio description format opus for ID 109 [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Processing media-level (audio) SDP a=rtpmap:109 opus/48000/2... OK. [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Processing media-level (audio) SDP a=ptime:20... OK. [Jan 28 19:30:57] VERBOSE[12398][C-00000003] chan_sip.c: Found audio description format G722 for ID 9 [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Processing media-level (audio) SDP a=rtpmap:9 G722/8000... OK. [Jan 28 19:30:57] VERBOSE[12398][C-00000003] chan_sip.c: Found audio description format PCMU for ID 0 [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Processing media-level (audio) SDP a=rtpmap:0 PCMU/8000... OK. [Jan 28 19:30:57] VERBOSE[12398][C-00000003] chan_sip.c: Found audio description format PCMA for ID 8 [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Processing media-level (audio) SDP a=rtpmap:8 PCMA/8000... OK. [Jan 28 19:30:57] VERBOSE[12398][C-00000003] chan_sip.c: Found audio description format telephone-event for ID 101 [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Processing media-level (audio) SDP a=rtpmap:101 telephone-event/8000... OK. [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Processing media-level (audio) SDP a=fmtp:101 0-15... UNSUPPORTED OR FAILED. [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Processing media-level (audio) SDP a=sendrecv... OK. [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Processing media-level (audio) SDP a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level... UNSUPPORTED OR FAILED. [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Processing media-level (audio) SDP a=setup:actpass... OK. [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Processing media-level (audio) SDP a=rtcp-mux... UNSUPPORTED OR FAILED. [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: Splitting '192.168.2.103' into... [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: ...host '192.168.2.103' and port ''. [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Processing media-level (audio) SDP a=candidate:0 1 UDP 2129133823 192.168.2.103 58090 typ host... OK. [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: Splitting '192.168.2.103' into... [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: ...host '192.168.2.103' and port ''. [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Processing media-level (audio) SDP a=candidate:0 2 UDP 2129133822 192.168.2.103 58631 typ host... OK. [Jan 28 19:30:57] VERBOSE[12398][C-00000003] chan_sip.c: Found RTP video format 120 [Jan 28 19:30:57] DEBUG[12398][C-00000003] rtp_engine.c: Setting payload 120 (0x7fc38801e338) based on m type on 0x7fc340ffd770 [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: Splitting '0.0.0.0' into... [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: ...host '0.0.0.0' and port ''. [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Processing media-level (video) SDP c=IN IP4 0.0.0.0... OK. [Jan 28 19:30:57] VERBOSE[12398][C-00000003] chan_sip.c: Found video description format VP8 for ID 120 [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Processing media-level (video) SDP a=rtpmap:120 VP8/90000... OK. [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Processing media-level (video) SDP a=sendrecv... UNSUPPORTED OR FAILED. [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Processing media-level (video) SDP a=rtcp-fb:120 nack... UNSUPPORTED OR FAILED. [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Processing media-level (video) SDP a=rtcp-fb:120 nack pli... UNSUPPORTED OR FAILED. [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Processing media-level (video) SDP a=rtcp-fb:120 ccm fir... UNSUPPORTED OR FAILED. [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Processing media-level (video) SDP a=setup:actpass... OK. [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Processing media-level (video) SDP a=rtcp-mux... UNSUPPORTED OR FAILED. [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: Splitting '192.168.2.103' into... [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: ...host '192.168.2.103' and port ''. [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Processing media-level (video) SDP a=candidate:0 1 UDP 2129133823 192.168.2.103 42932 typ host... OK. [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: Splitting '192.168.2.103' into... [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: ...host '192.168.2.103' and port ''. [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Processing media-level (video) SDP a=candidate:0 2 UDP 2129133822 192.168.2.103 39849 typ host... OK. [Jan 28 19:30:57] VERBOSE[12398][C-00000003] chan_sip.c: Capabilities: us - (ulaw|vp8), peer - audio=(ulaw|alaw|g722|opus)/video=(vp8)/text=(nothing), combined - (ulaw|vp8) [Jan 28 19:30:57] VERBOSE[12398][C-00000003] chan_sip.c: Non-codec capabilities (dtmf): us - 0x1 (telephone-event|), peer - 0x1 (telephone-event|), combined - 0x1 (telephone-event|) [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: icess0x7fc3880 Role changed to Controlled [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: icess0x7fc3880 Check 2: [1] 10.37.172.89:12956-->192.168.2.103:58090 pruned (duplicate found) [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: icess0x7fc3880 Check 2: [2] 10.37.172.89:12957-->192.168.2.103:58631 pruned (duplicate found) [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: icess0x7fc3880 Checklist created: [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: icess0x7fc3880 0: [1] 10.37.172.89:12956-->192.168.2.103:58090 (not nominated, state=Frozen) [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: icess0x7fc3880 1: [2] 10.37.172.89:12957-->192.168.2.103:58631 (not nominated, state=Frozen) [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: icess0x7fc3880 Starting ICE check.. [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: icess0x7fc3880 .Check 0: [1] 10.37.172.89:12956-->192.168.2.103:58090: state changed from Frozen to Waiting [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: icess0x7fc3880 Checklist: state changed from Idle to Running [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: icess0x7fc3880 Starting checklist periodic check [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: icess0x7fc3880 .Sending connectivity check for check 0: [1] 10.37.172.89:12956-->192.168.2.103:58090 [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: stuse0x7fc3880 ...TX 136 bytes STUN message to 192.168.2.103:58090: --- begin STUN message --- STUN Binding request Hdr: length=116, magic=2112a442, tsx_id=00002f4d71f16d7613cf2ac1 Attributes: PRIORITY: length=4, value=1862270975 (0x6effffff) ICE-CONTROLLED: length=8, data=0a49bfdb0ed96580 SOFTWARE: length=12, value="pjnath-2.3.0" USERNAME: length=41, value="97fd037e:6cc40d140ce4c91742bbef110ab14dc1" MESSAGE-INTEGRITY: length=20, data=a871a2379976175a906156d15a6f831504243768 FINGERPRINT: length=4, value=2582221305 (0x99e991f9) --- end of STUN message --- [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: utsx0x7fc38804 ...STUN client transaction created [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: utsx0x7fc38804 ...STUN sending message (transmit count=1) [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: icess0x7fc3880 ..Check 0: [1] 10.37.172.89:12956-->192.168.2.103:58090: state changed from Waiting to In Progress [Jan 28 19:30:57] DEBUG[12398][C-00000003] res_rtp_asterisk.c: Setting RTCP address on RTP instance '0x7fc388001d68' [Jan 28 19:30:57] VERBOSE[12398][C-00000003] chan_sip.c: Peer audio RTP is at port 0.0.0.0:9 [Jan 28 19:30:57] DEBUG[12398][C-00000003] rtp_engine.c: Copying payload 0 (0x7fc38801ca78) from 0x7fc340ffd700 to 0x7fc388001ea8 [Jan 28 19:30:57] DEBUG[12398][C-00000003] rtp_engine.c: Copying payload 8 (0x7fc38801d2b8) from 0x7fc340ffd700 to 0x7fc388001ea8 [Jan 28 19:30:57] DEBUG[12398][C-00000003] rtp_engine.c: Copying payload 9 (0x7fc38801c238) from 0x7fc340ffd700 to 0x7fc388001ea8 [Jan 28 19:30:57] DEBUG[12398][C-00000003] rtp_engine.c: Copying payload 101 (0x7fc38801daf8) from 0x7fc340ffd700 to 0x7fc388001ea8 [Jan 28 19:30:57] DEBUG[12398][C-00000003] rtp_engine.c: Copying payload 109 (0x7fc38801f338) from 0x7fc340ffd700 to 0x7fc388001ea8 [Jan 28 19:30:57] DEBUG[12398][C-00000003] res_rtp_asterisk.c: Ignoring duplicate RTCP property on RTP instance '0x7fc388001d68' [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: icess0x7fc3880 Role changed to Controlled [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: icess0x7fc3880 Check 2: [1] 10.37.172.89:14270-->192.168.2.103:42932 pruned (duplicate found) [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: icess0x7fc3880 Check 2: [2] 10.37.172.89:14271-->192.168.2.103:39849 pruned (duplicate found) [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: icess0x7fc3880 Checklist created: [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: icess0x7fc3880 0: [1] 10.37.172.89:14270-->192.168.2.103:42932 (not nominated, state=Frozen) [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: icess0x7fc3880 1: [2] 10.37.172.89:14271-->192.168.2.103:39849 (not nominated, state=Frozen) [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: icess0x7fc3880 Starting ICE check.. [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: icess0x7fc3880 .Check 0: [1] 10.37.172.89:14270-->192.168.2.103:42932: state changed from Frozen to Waiting [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: icess0x7fc3880 Checklist: state changed from Idle to Running [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: icess0x7fc3880 Starting checklist periodic check [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: icess0x7fc3880 .Sending connectivity check for check 0: [1] 10.37.172.89:14270-->192.168.2.103:42932 [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: stuse0x7fc3880 ...TX 136 bytes STUN message to 192.168.2.103:42932: --- begin STUN message --- STUN Binding request Hdr: length=116, magic=2112a442, tsx_id=00002f4d4a0bb94313cf2ac2 Attributes: PRIORITY: length=4, value=1862270975 (0x6effffff) ICE-CONTROLLED: length=8, data=6b3e0c9c5012fa28 SOFTWARE: length=12, value="pjnath-2.3.0" USERNAME: length=41, value="97fd037e:30e69b685abdf0de5caa63f31d7a72f9" MESSAGE-INTEGRITY: length=20, data=8d349be3c6e02dc7bbda87b73d34687cc6622d62 FINGERPRINT: length=4, value=2667139769 (0x9ef952b9) --- end of STUN message --- [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: utsx0x7fc38804 ...STUN client transaction created [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: utsx0x7fc38804 ...STUN sending message (transmit count=1) [Jan 28 19:30:57] DEBUG[12398][C-00000003] pjsip: icess0x7fc3880 ..Check 0: [1] 10.37.172.89:14270-->192.168.2.103:42932: state changed from Waiting to In Progress [Jan 28 19:30:57] DEBUG[12398][C-00000003] res_rtp_asterisk.c: Setting RTCP address on RTP instance '0x7fc388003228' [Jan 28 19:30:57] VERBOSE[12398][C-00000003] chan_sip.c: Peer video RTP is at port 0.0.0.0:9 [Jan 28 19:30:57] DEBUG[12398][C-00000003] rtp_engine.c: Copying payload 120 (0x7fc388026038) from 0x7fc340ffd770 to 0x7fc388003368 [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: We're settling with these formats: (ulaw|vp8) [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Checking SIP call limits for device 3g6o6jen [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Updating call counter for incoming call [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: Splitting '59.XX.XX.XX' into... [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: ...host '59.XX.XX.XX' and port ''. [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: Splitting '59.XX.XX.XX' into... [Jan 28 19:30:57] DEBUG[12398][C-00000003] netsock2.c: ...host '59.XX.XX.XX' and port ''. [Jan 28 19:30:57] VERBOSE[12398][C-00000003] chan_sip.c: Looking for 101 in video-test (domain 59.XX.XX.XX) [Jan 28 19:30:57] DEBUG[12113] threadpool.c: Increasing threadpool stasis-core's size by 1 [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: *** Our native formats are (vp8|ulaw) [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: *** Joint capabilities are (ulaw|vp8) [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: *** Our capabilities are (ulaw|vp8) [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: *** AST_CODEC_CHOOSE formats are ulaw [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: This channel can handle video! HOLLYWOOD next! [Jan 28 19:30:57] VERBOSE[12398][C-00000003] sip/route.c: sip_route_dump: route/path hop: [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: SIP/102-00000006: New call is still down.... Trying... [Jan 28 19:30:57] VERBOSE[12398][C-00000003] chan_sip.c: <--- Transmitting (NAT) to 186.XX.XX.XX:60753 ---> SIP/2.0 100 Trying Via: SIP/2.0/WS ksdmllpbgsdf.invalid;branch=z9hG4bK3762205;received=186.XX.XX.XX;rport=60753 From: "102" ;tag=sa54urm37e To: Call-ID: hqaqv9bdm2s5u92le2rn CSeq: 9779 INVITE Server: Asterisk PBX 13.1.0 Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE Supported: replaces, timer Contact: Content-Length: 0 <------------> [Jan 28 19:30:57] DEBUG[12398][C-00000003] chan_sip.c: Trying to put 'SIP/2.0 100' onto WS socket destined for 186.XX.XX.XX:60753 [Jan 28 19:30:57] DEBUG[12125] devicestate.c: No provider found, checking channel drivers for SIP - 102 [Jan 28 19:30:57] DEBUG[12125] chan_sip.c: Checking device state for peer 102 [Jan 28 19:30:57] DEBUG[12125] devicestate.c: Changing state for SIP/102 - state 1 (Not in use) [Jan 28 19:30:57] DEBUG[12401][C-00000003] pbx.c: Launching 'Answer' [Jan 28 19:30:57] DEBUG[12125] devicestate.c: No provider found, checking channel drivers for SIP - 102 [Jan 28 19:30:57] DEBUG[12125] chan_sip.c: Checking device state for peer 102 [Jan 28 19:30:57] DEBUG[12125] devicestate.c: Changing state for SIP/102 - state 1 (Not in use) [Jan 28 19:30:57] DEBUG[12401][C-00000003] chan_sip.c: SIP answering channel: SIP/102-00000006 [Jan 28 19:30:57] DEBUG[12401][C-00000003] res_rtp_asterisk.c: Setting the marker bit due to a source update [Jan 28 19:30:57] DEBUG[12401][C-00000003] chan_sip.c: Setting framing from config on incoming call [Jan 28 19:30:57] DEBUG[12401][C-00000003] chan_sip.c: This call needs video offers! [Jan 28 19:30:57] DEBUG[12401][C-00000003] chan_sip.c: ** Our capability: (ulaw|vp8) Video flag: False Text flag: True [Jan 28 19:30:57] DEBUG[12401][C-00000003] chan_sip.c: ** Our prefcodec: (nothing) [Jan 28 19:30:57] VERBOSE[12401][C-00000003] chan_sip.c: Audio is at 12956 [Jan 28 19:30:57] VERBOSE[12401][C-00000003] chan_sip.c: Video is at 10.37.172.89:14270 [Jan 28 19:30:57] VERBOSE[12401][C-00000003] chan_sip.c: Adding codec ulaw to SDP [Jan 28 19:30:57] VERBOSE[12401][C-00000003] chan_sip.c: Adding video codec vp8 to SDP [Jan 28 19:30:57] VERBOSE[12401][C-00000003] chan_sip.c: Adding non-codec 0x1 (telephone-event) to SDP [Jan 28 19:30:57] DEBUG[12401][C-00000003] chan_sip.c: -- Done with adding codecs to SDP [Jan 28 19:30:57] DEBUG[12401][C-00000003] chan_sip.c: Done building SDP. Settling with this capability: (ulaw|vp8) [Jan 28 19:30:57] VERBOSE[12401][C-00000003] chan_sip.c: <--- Reliably Transmitting (NAT) to 186.XX.XX.XX:60753 ---> SIP/2.0 200 OK Via: SIP/2.0/WS ksdmllpbgsdf.invalid;branch=z9hG4bK3762205;received=186.XX.XX.XX;rport=60753 From: "102" ;tag=sa54urm37e To: ;tag=as0df222f9 Call-ID: hqaqv9bdm2s5u92le2rn CSeq: 9779 INVITE Server: Asterisk PBX 13.1.0 Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE Supported: replaces, timer Contact: Content-Type: application/sdp Content-Length: 1499 v=0 o=root 1055886195 1055886195 IN IP4 10.37.172.89 s=Asterisk PBX 13.1.0 c=IN IP4 10.37.172.89 b=CT:384 t=0 0 m=audio 12956 RTP/SAVPF 0 101 a=rtpmap:0 PCMU/8000 a=rtpmap:101 telephone-event/8000 a=fmtp:101 0-16 a=maxptime:150 a=ice-ufrag:6cc40d140ce4c91742bbef110ab14dc1 a=ice-pwd:2da0f5fd2d62479a5356720b55c04580 a=candidate:Ha25ac59 1 UDP 2130706431 10.37.172.89 12956 typ host a=candidate:S369fc99e 1 UDP 1694498815 59.XX.XX.XX 12956 typ srflx raddr 10.37.172.89 rport 12956 a=candidate:Ha25ac59 2 UDP 2130706430 10.37.172.89 12957 typ host a=candidate:S369fc99e 2 UDP 1694498814 59.XX.XX.XX 12957 typ srflx raddr 10.37.172.89 rport 12957 a=connection:new a=setup:active a=fingerprint:SHA-256 04:9A:2F:12:1F:73:73:20:F5:B3:D9:08:FB:10:6F:86:1D:5F:60:2B:98:D4:71:26:B9:D2:87:36:41:64:FA:A7 a=sendrecv m=video 14270 RTP/SAVPF 120 a=ice-ufrag:30e69b685abdf0de5caa63f31d7a72f9 a=ice-pwd:5dbab6bb24b2bc737bb50c9a2804a623 a=candidate:Ha25ac59 1 UDP 2130706431 10.37.172.89 14270 typ host a=candidate:S369fc99e 1 UDP 1694498815 59.XX.XX.XX 14270 typ srflx raddr 10.37.172.89 rport 14270 a=candidate:Ha25ac59 2 UDP 2130706430 10.37.172.89 14271 typ host a=candidate:S369fc99e 2 UDP 1694498814 59.XX.XX.XX 14271 typ srflx raddr 10.37.172.89 rport 14271 a=connection:new a=setup:active a=fingerprint:SHA-256 04:9A:2F:12:1F:73:73:20:F5:B3:D9:08:FB:10:6F:86:1D:5F:60:2B:98:D4:71:26:B9:D2:87:36:41:64:FA:A7 a=rtpmap:120 VP8/90000 a=rtcp-fb:* ccm fir a=sendrecv <------------> [Jan 28 19:30:57] DEBUG[12401][C-00000003] chan_sip.c: Trying to put 'SIP/2.0 200' onto WS socket destined for 186.XX.XX.XX:60753 [Jan 28 19:30:57] DEBUG[12147] pjsip: icess0x7fc3880 Starting checklist periodic check [Jan 28 19:30:57] DEBUG[12147] pjsip: icess0x7fc3880 .Sending connectivity check for check 1: [2] 10.37.172.89:12957-->192.168.2.103:58631 [Jan 28 19:30:57] DEBUG[12147] pjsip: stuse0x7fc3880 ...TX 136 bytes STUN message to 192.168.2.103:58631: --- begin STUN message --- STUN Binding request Hdr: length=116, magic=2112a442, tsx_id=00002f4d0817e48c13cf2ac3 Attributes: PRIORITY: length=4, value=1862270974 (0x6efffffe) ICE-CONTROLLED: length=8, data=0a49bfdb0ed96580 SOFTWARE: length=12, value="pjnath-2.3.0" USERNAME: length=41, value="97fd037e:6cc40d140ce4c91742bbef110ab14dc1" MESSAGE-INTEGRITY: length=20, data=4f9db7a541cb2b47acd659c58a0e9d9f432fc40e FINGERPRINT: length=4, value=2027365360 (0x78d723f0) --- end of STUN message --- [Jan 28 19:30:57] DEBUG[12147] pjsip: utsx0x7fc38c00 ...STUN client transaction created [Jan 28 19:30:57] DEBUG[12147] pjsip: utsx0x7fc38c00 ...STUN sending message (transmit count=1) [Jan 28 19:30:57] DEBUG[12147] pjsip: icess0x7fc3880 ..Check 1: [2] 10.37.172.89:12957-->192.168.2.103:58631: state changed from Frozen to In Progress [Jan 28 19:30:57] DEBUG[12147] pjsip: icess0x7fc3880 Starting checklist periodic check [Jan 28 19:30:57] DEBUG[12147] pjsip: icess0x7fc3880 .Sending connectivity check for check 1: [2] 10.37.172.89:14271-->192.168.2.103:39849 [Jan 28 19:30:57] DEBUG[12147] pjsip: stuse0x7fc3880 ...TX 136 bytes STUN message to 192.168.2.103:39849: --- begin STUN message --- STUN Binding request Hdr: length=116, magic=2112a442, tsx_id=00002f4d29ff96b013cf2ac4 Attributes: PRIORITY: length=4, value=1862270974 (0x6efffffe) ICE-CONTROLLED: length=8, data=6b3e0c9c5012fa28 SOFTWARE: length=12, value="pjnath-2.3.0" USERNAME: length=41, value="97fd037e:30e69b685abdf0de5caa63f31d7a72f9" MESSAGE-INTEGRITY: length=20, data=c00cd8dbeadd52f2fcf2010b8c9fa76bbeb856bc FINGERPRINT: length=4, value=671195528 (0x2801a188) --- end of STUN message --- [Jan 28 19:30:57] DEBUG[12147] pjsip: utsx0x7fc38c06 ...STUN client transaction created [Jan 28 19:30:57] DEBUG[12147] pjsip: utsx0x7fc38c06 ...STUN sending message (transmit count=1) [Jan 28 19:30:57] DEBUG[12147] pjsip: icess0x7fc3880 ..Check 1: [2] 10.37.172.89:14271-->192.168.2.103:39849: state changed from Frozen to In Progress [Jan 28 19:30:57] DEBUG[12147] pjsip: icess0x7fc3880 Starting checklist periodic check [Jan 28 19:30:57] DEBUG[12147] pjsip: icess0x7fc3880 Starting checklist periodic check [Jan 28 19:30:57] DEBUG[12147] pjsip: utsx0x7fc38804 STUN sending message (transmit count=2) [Jan 28 19:30:57] DEBUG[12147] pjsip: utsx0x7fc38804 STUN sending message (transmit count=2) [Jan 28 19:30:57] DEBUG[12147] pjsip: utsx0x7fc38c06 STUN sending message (transmit count=2) [Jan 28 19:30:57] DEBUG[12147] pjsip: utsx0x7fc38c00 STUN sending message (transmit count=2) [Jan 28 19:30:57] DEBUG[12147] pjsip: utsx0x7fc38804 STUN sending message (transmit count=3) [Jan 28 19:30:57] DEBUG[12147] pjsip: utsx0x7fc38804 STUN sending message (transmit count=3) [Jan 28 19:30:57] DEBUG[12147] pjsip: utsx0x7fc38c06 STUN sending message (transmit count=3) [Jan 28 19:30:57] DEBUG[12147] pjsip: utsx0x7fc38c00 STUN sending message (transmit count=3) [Jan 28 19:30:58] DEBUG[12401][C-00000003] channel.c: Didn't receive a media frame from SIP/102-00000006 within 500 ms of answering. Continuing anyway [Jan 28 19:30:58] DEBUG[12401][C-00000003] pbx.c: Launching 'Wait' [Jan 28 19:30:58] DEBUG[12147] pjsip: utsx0x7fc38804 STUN sending message (transmit count=4) [Jan 28 19:30:58] DEBUG[12147] pjsip: utsx0x7fc38804 STUN sending message (transmit count=4) [Jan 28 19:30:58] DEBUG[12147] pjsip: utsx0x7fc38c06 STUN sending message (transmit count=4) [Jan 28 19:30:58] DEBUG[12147] pjsip: utsx0x7fc38c00 STUN sending message (transmit count=4) [Jan 28 19:30:58] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3880 .RX 124 bytes STUN message from 186.XX.XX.XX:58090: --- begin STUN message --- STUN Binding request Hdr: length=104, magic=2112a442, tsx_id=2461c5b181edebc7c7999d77 Attributes: USERNAME: length=41, value="6cc40d140ce4c91742bbef110ab14dc1:97fd037e" USE-CANDIDATE: length=0 PRIORITY: length=4, value=1860698367 (0x6ee800ff) ICE-CONTROLLING: length=8, data=0000000000000001 MESSAGE-INTEGRITY: length=20, data=b6e5ea53f245570bf82c3b56e3ab4dfc0a120ea8 FINGERPRINT: length=4, value=4227759985 (0xfbfe7f71) --- end of STUN message --- [Jan 28 19:30:58] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3880 ..TX 80 bytes STUN message to 186.XX.XX.XX:58090: --- begin STUN message --- STUN Binding success response Hdr: length=60, magic=2112a442, tsx_id=2461c5b181edebc7c7999d77 Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=186.XX.XX.XX:58090 SOFTWARE: length=12, value="pjnath-2.3.0" MESSAGE-INTEGRITY: length=20, data=69cfdc3a4e704d13196a2173f6b2c655f250a7ca FINGERPRINT: length=4, value=2998435973 (0xb2b88085) --- end of STUN message --- [Jan 28 19:30:58] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 .Added new remote candidate from the request: 186.XX.XX.XX:58090 [Jan 28 19:30:58] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 .New triggered check added: 2 [Jan 28 19:30:58] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 ..Sending connectivity check for check 2: [1] 10.37.172.89:12956-->186.XX.XX.XX:58090 [Jan 28 19:30:58] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3880 ....TX 136 bytes STUN message to 186.XX.XX.XX:58090: --- begin STUN message --- STUN Binding request Hdr: length=116, magic=2112a442, tsx_id=00002f4d12590d4a13cf2ac5 Attributes: PRIORITY: length=4, value=1862270975 (0x6effffff) ICE-CONTROLLED: length=8, data=0a49bfdb0ed96580 SOFTWARE: length=12, value="pjnath-2.3.0" USERNAME: length=41, value="97fd037e:6cc40d140ce4c91742bbef110ab14dc1" MESSAGE-INTEGRITY: length=20, data=cb1fcbd6ed355de7fbb01f3a60b24c164a840beb FINGERPRINT: length=4, value=1921148433 (0x72826611) --- end of STUN message --- [Jan 28 19:30:58] DEBUG[12401][C-00000003] pjsip: utsx0x7fc38000 ....STUN client transaction created [Jan 28 19:30:58] DEBUG[12401][C-00000003] pjsip: utsx0x7fc38000 ....STUN sending message (transmit count=1) [Jan 28 19:30:58] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 ...Check 2: [1] 10.37.172.89:12956-->186.XX.XX.XX:58090: state changed from Waiting to In Progress [Jan 28 19:30:58] DEBUG[12147] pjsip: utsx0x7fc38000 STUN sending message (transmit count=2) [Jan 28 19:30:58] DEBUG[12147] pjsip: utsx0x7fc38000 STUN sending message (transmit count=3) [Jan 28 19:30:58] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3880 .RX 64 bytes STUN message from 186.XX.XX.XX:58090: --- begin STUN message --- STUN Binding success response Hdr: length=44, magic=2112a442, tsx_id=00002f4d12590d4a13cf2ac5 Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=59.XX.XX.XX:12956 MESSAGE-INTEGRITY: length=20, data=fc7b8dc1410cfdeb799fafa2697d557b818427d3 FINGERPRINT: length=4, value=1534885968 (0x5b7c8050) --- end of STUN message --- [Jan 28 19:30:58] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 .Check 2: [1] 10.37.172.89:12956-->186.XX.XX.XX:58090 (nominated): connectivity check SUCCESS [Jan 28 19:30:58] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 .Check 2: [1] 10.37.172.89:12956-->186.XX.XX.XX:58090: state changed from In Progress to Succeeded [Jan 28 19:30:58] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 .Check 2 is successful and nominated [Jan 28 19:30:58] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 .Cancelling check 0: [1] 10.37.172.89:12956-->192.168.2.103:58090 (In Progress) [Jan 28 19:30:58] DEBUG[12401][C-00000003] pjsip: stun_session.c .tdata 0x7fc3880408e8 destroy request, force=0, tsx=0x7fc388040ac8 [Jan 28 19:30:58] DEBUG[12401][C-00000003] pjsip: utsx0x7fc38804 .STUN transaction 0x7fc388040ac8 schedule destroy [Jan 28 19:30:58] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 .Check 0: [1] 10.37.172.89:12956-->192.168.2.103:58090: state changed from In Progress to Failed [Jan 28 19:30:58] DEBUG[12401][C-00000003] pjsip: stun_session.c .tdata 0x7fc3800079d8 destroy request, force=0, tsx=0x7fc380007bb8 [Jan 28 19:30:58] DEBUG[12401][C-00000003] pjsip: utsx0x7fc38000 .STUN transaction 0x7fc380007bb8 schedule destroy [Jan 28 19:30:59] DEBUG[12147] pjsip: utsx0x7fc38804 STUN sending message (transmit count=5) [Jan 28 19:30:59] DEBUG[12147] pjsip: utsx0x7fc38c06 STUN sending message (transmit count=5) [Jan 28 19:30:59] DEBUG[12147] pjsip: utsx0x7fc38c00 STUN sending message (transmit count=5) [Jan 28 19:30:59] DEBUG[12147] pjsip: utsx0x7fc38804 STUN client transaction 0x7fc388040ac8 stopped, ref_cnt=7 [Jan 28 19:30:59] DEBUG[12147] pjsip: stun_session.c STUN transaction 0x7fc388040ac8 destroyed [Jan 28 19:30:59] DEBUG[12147] pjsip: utsx0x7fc38000 STUN client transaction 0x7fc380007bb8 stopped, ref_cnt=6 [Jan 28 19:30:59] DEBUG[12147] pjsip: stun_session.c STUN transaction 0x7fc380007bb8 destroyed [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3880 .RX 64 bytes STUN message from 186.XX.XX.XX:58090: --- begin STUN message --- STUN Binding success response Hdr: length=44, magic=2112a442, tsx_id=00002f4d12590d4a13cf2ac5 Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=59.XX.XX.XX:12956 MESSAGE-INTEGRITY: length=20, data=fc7b8dc1410cfdeb799fafa2697d557b818427d3 FINGERPRINT: length=4, value=1534885968 (0x5b7c8050) --- end of STUN message --- [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3880 .Transaction not found, response silently discarded [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3880 .RX 64 bytes STUN message from 186.XX.XX.XX:58090: --- begin STUN message --- STUN Binding success response Hdr: length=44, magic=2112a442, tsx_id=00002f4d12590d4a13cf2ac5 Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=59.XX.XX.XX:12956 MESSAGE-INTEGRITY: length=20, data=fc7b8dc1410cfdeb799fafa2697d557b818427d3 FINGERPRINT: length=4, value=1534885968 (0x5b7c8050) --- end of STUN message --- [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3880 .Transaction not found, response silently discarded [Jan 28 19:30:59] VERBOSE[12398] chan_sip.c: <--- SIP read from WS:186.XX.XX.XX:60753 ---> ACK sip:101@10.37.172.89:5060;transport=ws SIP/2.0 Via: SIP/2.0/WS ksdmllpbgsdf.invalid;branch=z9hG4bK9533906 Max-Forwards: 69 To: ;tag=as0df222f9 From: "102" ;tag=sa54urm37e Call-ID: hqaqv9bdm2s5u92le2rn CSeq: 9779 ACK Allow: INVITE,ACK,CANCEL,BYE,UPDATE,MESSAGE,OPTIONS Supported: outbound User-Agent: JsSIP 0.6.12 Content-Length: 0 <-------------> [Jan 28 19:30:59] DEBUG[12398] chan_sip.c: Header 0 [ 50]: ACK sip:101@10.37.172.89:5060;transport=ws SIP/2.0 [Jan 28 19:30:59] DEBUG[12398] chan_sip.c: Header 1 [ 58]: Via: SIP/2.0/WS ksdmllpbgsdf.invalid;branch=z9hG4bK9533906 [Jan 28 19:30:59] DEBUG[12398] chan_sip.c: Header 2 [ 16]: Max-Forwards: 69 [Jan 28 19:30:59] DEBUG[12398] chan_sip.c: Header 3 [ 43]: To: ;tag=as0df222f9 [Jan 28 19:30:59] DEBUG[12398] chan_sip.c: Header 4 [ 51]: From: "102" ;tag=sa54urm37e [Jan 28 19:30:59] DEBUG[12398] chan_sip.c: Header 5 [ 29]: Call-ID: hqaqv9bdm2s5u92le2rn [Jan 28 19:30:59] DEBUG[12398] chan_sip.c: Header 6 [ 14]: CSeq: 9779 ACK [Jan 28 19:30:59] DEBUG[12398] chan_sip.c: Header 7 [ 51]: Allow: INVITE,ACK,CANCEL,BYE,UPDATE,MESSAGE,OPTIONS [Jan 28 19:30:59] DEBUG[12398] chan_sip.c: Header 8 [ 19]: Supported: outbound [Jan 28 19:30:59] DEBUG[12398] chan_sip.c: Header 9 [ 24]: User-Agent: JsSIP 0.6.12 [Jan 28 19:30:59] DEBUG[12398] chan_sip.c: Header 10 [ 17]: Content-Length: 0 [Jan 28 19:30:59] VERBOSE[12398] chan_sip.c: --- (11 headers 0 lines) --- [Jan 28 19:30:59] DEBUG[12398] chan_sip.c: = Looking for Call ID: hqaqv9bdm2s5u92le2rn (Checking From) --From tag sa54urm37e --To-tag as0df222f9 [Jan 28 19:30:59] DEBUG[12398][C-00000003] chan_sip.c: **** Received ACK (6) - Command in SIP ACK [Jan 28 19:30:59] DEBUG[12398][C-00000003] chan_sip.c: Stopping retransmission on 'hqaqv9bdm2s5u92le2rn' of Response 9779: Match Not Found [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3880 .RX 124 bytes STUN message from 186.XX.XX.XX:42932: --- begin STUN message --- STUN Binding request Hdr: length=104, magic=2112a442, tsx_id=712c5c96185f675e0d66de4c Attributes: USERNAME: length=41, value="30e69b685abdf0de5caa63f31d7a72f9:97fd037e" USE-CANDIDATE: length=0 PRIORITY: length=4, value=1860698367 (0x6ee800ff) ICE-CONTROLLING: length=8, data=0000000000000001 MESSAGE-INTEGRITY: length=20, data=e7f3bc4ac85ccadf00d770b5cdb032274a7f1c69 FINGERPRINT: length=4, value=222989085 (0xd4a8b1d) --- end of STUN message --- [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3880 ..TX 80 bytes STUN message to 186.XX.XX.XX:42932: --- begin STUN message --- STUN Binding success response Hdr: length=60, magic=2112a442, tsx_id=712c5c96185f675e0d66de4c Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=186.XX.XX.XX:42932 SOFTWARE: length=12, value="pjnath-2.3.0" MESSAGE-INTEGRITY: length=20, data=4f7ba823c885a4e9a371167fe7b10b5bbdceb770 FINGERPRINT: length=4, value=677930808 (0x28686738) --- end of STUN message --- [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 .Added new remote candidate from the request: 186.XX.XX.XX:42932 [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 .New triggered check added: 2 [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 ..Sending connectivity check for check 2: [1] 10.37.172.89:14270-->186.XX.XX.XX:42932 [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3880 ....TX 136 bytes STUN message to 186.XX.XX.XX:42932: --- begin STUN message --- STUN Binding request Hdr: length=116, magic=2112a442, tsx_id=00002f4d1051283313cf2ac6 Attributes: PRIORITY: length=4, value=1862270975 (0x6effffff) ICE-CONTROLLED: length=8, data=6b3e0c9c5012fa28 SOFTWARE: length=12, value="pjnath-2.3.0" USERNAME: length=41, value="97fd037e:30e69b685abdf0de5caa63f31d7a72f9" MESSAGE-INTEGRITY: length=20, data=236cbe7160a513af9433f26418ccdbc37c9f7840 FINGERPRINT: length=4, value=3610550744 (0xd734a1d8) --- end of STUN message --- [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: utsx0x7fc38003 ....STUN client transaction created [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: utsx0x7fc38003 ....STUN sending message (transmit count=1) [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 ...Check 2: [1] 10.37.172.89:14270-->186.XX.XX.XX:42932: state changed from Waiting to In Progress [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3880 .RX 124 bytes STUN message from 186.XX.XX.XX:58631: --- begin STUN message --- STUN Binding request Hdr: length=104, magic=2112a442, tsx_id=4e286861770fd2fa7890fbd2 Attributes: USERNAME: length=41, value="6cc40d140ce4c91742bbef110ab14dc1:97fd037e" USE-CANDIDATE: length=0 PRIORITY: length=4, value=1860698366 (0x6ee800fe) ICE-CONTROLLING: length=8, data=0000000000000001 MESSAGE-INTEGRITY: length=20, data=64ef69281c2cfb7a36e4ffe2de47a25884185860 FINGERPRINT: length=4, value=610271906 (0x246002a2) --- end of STUN message --- [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3880 ..TX 80 bytes STUN message to 186.XX.XX.XX:58631: --- begin STUN message --- STUN Binding success response Hdr: length=60, magic=2112a442, tsx_id=4e286861770fd2fa7890fbd2 Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=186.XX.XX.XX:58631 SOFTWARE: length=12, value="pjnath-2.3.0" MESSAGE-INTEGRITY: length=20, data=f2d6526e83032ac6a09fd4683234f476f3a9eaba FINGERPRINT: length=4, value=2483713525 (0x940a75f5) --- end of STUN message --- [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 .Added new remote candidate from the request: 186.XX.XX.XX:58631 [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 .New triggered check added: 3 [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 ..Sending connectivity check for check 3: [2] 10.37.172.89:12957-->186.XX.XX.XX:58631 [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3880 ....TX 136 bytes STUN message to 186.XX.XX.XX:58631: --- begin STUN message --- STUN Binding request Hdr: length=116, magic=2112a442, tsx_id=00002f4d355f173313cf2ac7 Attributes: PRIORITY: length=4, value=1862270974 (0x6efffffe) ICE-CONTROLLED: length=8, data=0a49bfdb0ed96580 SOFTWARE: length=12, value="pjnath-2.3.0" USERNAME: length=41, value="97fd037e:6cc40d140ce4c91742bbef110ab14dc1" MESSAGE-INTEGRITY: length=20, data=a7dbeb12ac211f7cb2f1c63223d33c8a80e4f9ad FINGERPRINT: length=4, value=3259021360 (0xc240b830) --- end of STUN message --- [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: utsx0x7fc38003 ....STUN client transaction created [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: utsx0x7fc38003 ....STUN sending message (transmit count=1) [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 ...Check 3: [2] 10.37.172.89:12957-->186.XX.XX.XX:58631: state changed from Waiting to In Progress [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3880 .RX 124 bytes STUN message from 186.XX.XX.XX:39849: --- begin STUN message --- STUN Binding request Hdr: length=104, magic=2112a442, tsx_id=2c1e1f74544d9d408e70dd65 Attributes: USERNAME: length=41, value="30e69b685abdf0de5caa63f31d7a72f9:97fd037e" USE-CANDIDATE: length=0 PRIORITY: length=4, value=1860698366 (0x6ee800fe) ICE-CONTROLLING: length=8, data=0000000000000001 MESSAGE-INTEGRITY: length=20, data=e9d0f24c724b54bdad8a116ef8083bf93a2b4568 FINGERPRINT: length=4, value=3262432729 (0xc274c5d9) --- end of STUN message --- [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3880 ..TX 80 bytes STUN message to 186.XX.XX.XX:39849: --- begin STUN message --- STUN Binding success response Hdr: length=60, magic=2112a442, tsx_id=2c1e1f74544d9d408e70dd65 Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=186.XX.XX.XX:39849 SOFTWARE: length=12, value="pjnath-2.3.0" MESSAGE-INTEGRITY: length=20, data=8e54764e9d6d22e84a80d9aba256db6929a9739e FINGERPRINT: length=4, value=2045061023 (0x79e5279f) --- end of STUN message --- [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 .Added new remote candidate from the request: 186.XX.XX.XX:39849 [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 .New triggered check added: 3 [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 ..Sending connectivity check for check 3: [2] 10.37.172.89:14271-->186.XX.XX.XX:39849 [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3880 ....TX 136 bytes STUN message to 186.XX.XX.XX:39849: --- begin STUN message --- STUN Binding request Hdr: length=116, magic=2112a442, tsx_id=00002f4d36269d8d13cf2ac8 Attributes: PRIORITY: length=4, value=1862270974 (0x6efffffe) ICE-CONTROLLED: length=8, data=6b3e0c9c5012fa28 SOFTWARE: length=12, value="pjnath-2.3.0" USERNAME: length=41, value="97fd037e:30e69b685abdf0de5caa63f31d7a72f9" MESSAGE-INTEGRITY: length=20, data=090d2118a758952abc808de6f6d332c1519d64a5 FINGERPRINT: length=4, value=3463955921 (0xce77c5d1) --- end of STUN message --- [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: utsx0x7fc38003 ....STUN client transaction created [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: utsx0x7fc38003 ....STUN sending message (transmit count=1) [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 ...Check 3: [2] 10.37.172.89:14271-->186.XX.XX.XX:39849: state changed from Waiting to In Progress [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3880 .RX 124 bytes STUN message from 186.XX.XX.XX:42932: --- begin STUN message --- STUN Binding request Hdr: length=104, magic=2112a442, tsx_id=712c5c96185f675e0d66de4c Attributes: USERNAME: length=41, value="30e69b685abdf0de5caa63f31d7a72f9:97fd037e" USE-CANDIDATE: length=0 PRIORITY: length=4, value=1860698367 (0x6ee800ff) ICE-CONTROLLING: length=8, data=0000000000000001 MESSAGE-INTEGRITY: length=20, data=e7f3bc4ac85ccadf00d770b5cdb032274a7f1c69 FINGERPRINT: length=4, value=222989085 (0xd4a8b1d) --- end of STUN message --- [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3880 ..TX 80 bytes STUN message to 186.XX.XX.XX:42932: --- begin STUN message --- STUN Binding success response Hdr: length=60, magic=2112a442, tsx_id=712c5c96185f675e0d66de4c Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=186.XX.XX.XX:42932 SOFTWARE: length=12, value="pjnath-2.3.0" MESSAGE-INTEGRITY: length=20, data=4f7ba823c885a4e9a371167fe7b10b5bbdceb770 FINGERPRINT: length=4, value=677930808 (0x28686738) --- end of STUN message --- [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 .Triggered check for check 2 not performed because it's in progress. Retransmitting [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: utsx0x7fc38003 ..STUN sending message (transmit count=1) [Jan 28 19:30:59] DEBUG[12147] pjsip: utsx0x7fc38003 STUN sending message (transmit count=2) [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3880 .RX 64 bytes STUN message from 186.XX.XX.XX:42932: --- begin STUN message --- STUN Binding success response Hdr: length=44, magic=2112a442, tsx_id=00002f4d1051283313cf2ac6 Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=59.XX.XX.XX:14270 MESSAGE-INTEGRITY: length=20, data=a3ca5dd5c4cce3632e5fadb92d08469c2e61e186 FINGERPRINT: length=4, value=2283032880 (0x88145130) --- end of STUN message --- [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 .Check 2: [1] 10.37.172.89:14270-->186.XX.XX.XX:42932 (nominated): connectivity check SUCCESS [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 .Check 2: [1] 10.37.172.89:14270-->186.XX.XX.XX:42932: state changed from In Progress to Succeeded [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 .Check 2 is successful and nominated [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 .Cancelling check 0: [1] 10.37.172.89:14270-->192.168.2.103:42932 (In Progress) [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: stun_session.c .tdata 0x7fc388046e08 destroy request, force=0, tsx=0x7fc388046fe8 [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: utsx0x7fc38804 .STUN transaction 0x7fc388046fe8 schedule destroy [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 .Check 0: [1] 10.37.172.89:14270-->192.168.2.103:42932: state changed from In Progress to Failed [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: stun_session.c .tdata 0x7fc38003f488 destroy request, force=0, tsx=0x7fc38003f668 [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: utsx0x7fc38003 .STUN transaction 0x7fc38003f668 schedule destroy [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3880 .RX 124 bytes STUN message from 186.XX.XX.XX:58631: --- begin STUN message --- STUN Binding request Hdr: length=104, magic=2112a442, tsx_id=4e286861770fd2fa7890fbd2 Attributes: USERNAME: length=41, value="6cc40d140ce4c91742bbef110ab14dc1:97fd037e" USE-CANDIDATE: length=0 PRIORITY: length=4, value=1860698366 (0x6ee800fe) ICE-CONTROLLING: length=8, data=0000000000000001 MESSAGE-INTEGRITY: length=20, data=64ef69281c2cfb7a36e4ffe2de47a25884185860 FINGERPRINT: length=4, value=610271906 (0x246002a2) --- end of STUN message --- [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3880 ..TX 80 bytes STUN message to 186.XX.XX.XX:58631: --- begin STUN message --- STUN Binding success response Hdr: length=60, magic=2112a442, tsx_id=4e286861770fd2fa7890fbd2 Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=186.XX.XX.XX:58631 SOFTWARE: length=12, value="pjnath-2.3.0" MESSAGE-INTEGRITY: length=20, data=f2d6526e83032ac6a09fd4683234f476f3a9eaba FINGERPRINT: length=4, value=2483713525 (0x940a75f5) --- end of STUN message --- [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 .Triggered check for check 3 not performed because it's in progress. Retransmitting [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: utsx0x7fc38003 ..STUN sending message (transmit count=1) [Jan 28 19:30:59] DEBUG[12147] pjsip: utsx0x7fc38003 STUN sending message (transmit count=2) [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3880 .RX 64 bytes STUN message from 186.XX.XX.XX:58631: --- begin STUN message --- STUN Binding success response Hdr: length=44, magic=2112a442, tsx_id=00002f4d355f173313cf2ac7 Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=59.XX.XX.XX:12957 MESSAGE-INTEGRITY: length=20, data=7f0228e49c8b4a97e1cc01f8aa7354cfcb5ebb1e FINGERPRINT: length=4, value=3415316726 (0xcb9198f6) --- end of STUN message --- [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 .Check 3: [2] 10.37.172.89:12957-->186.XX.XX.XX:58631 (nominated): connectivity check SUCCESS [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 .Check 3: [2] 10.37.172.89:12957-->186.XX.XX.XX:58631: state changed from In Progress to Succeeded [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 .Check 3 is successful and nominated [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 .Cancelling check 1: [2] 10.37.172.89:12957-->192.168.2.103:58631 (In Progress) [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: stun_session.c .tdata 0x7fc38c0053d8 destroy request, force=0, tsx=0x7fc38c0055b8 [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: utsx0x7fc38c00 .STUN transaction 0x7fc38c0055b8 schedule destroy [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 .Check 1: [2] 10.37.172.89:12957-->192.168.2.103:58631: state changed from In Progress to Failed [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 .ICE process complete, status=Success [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 .Valid list [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 . 0: [1] 59.XX.XX.XX:12956-->186.XX.XX.XX:58090 (nominated, state=Succeeded) [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 . 1: [2] 59.XX.XX.XX:12957-->186.XX.XX.XX:58631 (nominated, state=Succeeded) [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: stun_session.c .tdata 0x7fc380032758 destroy request, force=0, tsx=0x7fc380032938 [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: utsx0x7fc38003 .STUN transaction 0x7fc380032938 schedule destroy [Jan 28 19:30:59] DEBUG[12147] netsock2.c: Splitting '186.XX.XX.XX' into... [Jan 28 19:30:59] DEBUG[12147] netsock2.c: ...host '186.XX.XX.XX' and port ''. [Jan 28 19:30:59] DEBUG[12147] res_rtp_asterisk.c: Setting RTCP address on RTP instance '0x7fc388001d68' [Jan 28 19:30:59] DEBUG[12147] netsock2.c: Splitting '186.XX.XX.XX' into... [Jan 28 19:30:59] DEBUG[12147] netsock2.c: ...host '186.XX.XX.XX' and port ''. [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3880 .RX 124 bytes STUN message from 186.XX.XX.XX:39849: --- begin STUN message --- STUN Binding request Hdr: length=104, magic=2112a442, tsx_id=2c1e1f74544d9d408e70dd65 Attributes: USERNAME: length=41, value="30e69b685abdf0de5caa63f31d7a72f9:97fd037e" USE-CANDIDATE: length=0 PRIORITY: length=4, value=1860698366 (0x6ee800fe) ICE-CONTROLLING: length=8, data=0000000000000001 MESSAGE-INTEGRITY: length=20, data=e9d0f24c724b54bdad8a116ef8083bf93a2b4568 FINGERPRINT: length=4, value=3262432729 (0xc274c5d9) --- end of STUN message --- [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3880 ..TX 80 bytes STUN message to 186.XX.XX.XX:39849: --- begin STUN message --- STUN Binding success response Hdr: length=60, magic=2112a442, tsx_id=2c1e1f74544d9d408e70dd65 Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=186.XX.XX.XX:39849 SOFTWARE: length=12, value="pjnath-2.3.0" MESSAGE-INTEGRITY: length=20, data=8e54764e9d6d22e84a80d9aba256db6929a9739e FINGERPRINT: length=4, value=2045061023 (0x79e5279f) --- end of STUN message --- [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 .Triggered check for check 3 not performed because it's in progress. Retransmitting [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: utsx0x7fc38003 ..STUN sending message (transmit count=1) [Jan 28 19:30:59] DEBUG[12147] pjsip: utsx0x7fc38003 STUN sending message (transmit count=2) [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3880 .RX 64 bytes STUN message from 186.XX.XX.XX:39849: --- begin STUN message --- STUN Binding success response Hdr: length=44, magic=2112a442, tsx_id=00002f4d36269d8d13cf2ac8 Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=59.XX.XX.XX:14271 MESSAGE-INTEGRITY: length=20, data=0cdf6ee6d13ea2dc81f627241cd3bdcf78380513 FINGERPRINT: length=4, value=1841270867 (0x6dbf9053) --- end of STUN message --- [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 .Check 3: [2] 10.37.172.89:14271-->186.XX.XX.XX:39849 (nominated): connectivity check SUCCESS [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 .Check 3: [2] 10.37.172.89:14271-->186.XX.XX.XX:39849: state changed from In Progress to Succeeded [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 .Check 3 is successful and nominated [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 .Cancelling check 1: [2] 10.37.172.89:14271-->192.168.2.103:39849 (In Progress) [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: stun_session.c .tdata 0x7fc38c06a388 destroy request, force=0, tsx=0x7fc38c06a568 [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: utsx0x7fc38c06 .STUN transaction 0x7fc38c06a568 schedule destroy [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 .Check 1: [2] 10.37.172.89:14271-->192.168.2.103:39849: state changed from In Progress to Failed [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 .ICE process complete, status=Success [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 .Valid list [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 . 0: [1] 59.XX.XX.XX:14270-->186.XX.XX.XX:42932 (nominated, state=Succeeded) [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: icess0x7fc3880 . 1: [2] 59.XX.XX.XX:14271-->186.XX.XX.XX:39849 (nominated, state=Succeeded) [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: stun_session.c .tdata 0x7fc380033348 destroy request, force=0, tsx=0x7fc380033528 [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: utsx0x7fc38003 .STUN transaction 0x7fc380033528 schedule destroy [Jan 28 19:30:59] DEBUG[12147] netsock2.c: Splitting '186.XX.XX.XX' into... [Jan 28 19:30:59] DEBUG[12147] netsock2.c: ...host '186.XX.XX.XX' and port ''. [Jan 28 19:30:59] DEBUG[12147] res_rtp_asterisk.c: Setting RTCP address on RTP instance '0x7fc388003228' [Jan 28 19:30:59] DEBUG[12147] netsock2.c: Splitting '186.XX.XX.XX' into... [Jan 28 19:30:59] DEBUG[12147] netsock2.c: ...host '186.XX.XX.XX' and port ''. [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3880 .RX 64 bytes STUN message from 186.XX.XX.XX:42932: --- begin STUN message --- STUN Binding success response Hdr: length=44, magic=2112a442, tsx_id=00002f4d1051283313cf2ac6 Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=59.XX.XX.XX:14270 MESSAGE-INTEGRITY: length=20, data=a3ca5dd5c4cce3632e5fadb92d08469c2e61e186 FINGERPRINT: length=4, value=2283032880 (0x88145130) --- end of STUN message --- [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3880 .RX 64 bytes STUN message from 186.XX.XX.XX:42932: --- begin STUN message --- STUN Binding success response Hdr: length=44, magic=2112a442, tsx_id=00002f4d1051283313cf2ac6 Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=59.XX.XX.XX:14270 MESSAGE-INTEGRITY: length=20, data=a3ca5dd5c4cce3632e5fadb92d08469c2e61e186 FINGERPRINT: length=4, value=2283032880 (0x88145130) --- end of STUN message --- [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3880 .RX 64 bytes STUN message from 186.XX.XX.XX:58631: --- begin STUN message --- STUN Binding success response Hdr: length=44, magic=2112a442, tsx_id=00002f4d355f173313cf2ac7 Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=59.XX.XX.XX:12957 MESSAGE-INTEGRITY: length=20, data=7f0228e49c8b4a97e1cc01f8aa7354cfcb5ebb1e FINGERPRINT: length=4, value=3415316726 (0xcb9198f6) --- end of STUN message --- [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3880 .RX 64 bytes STUN message from 186.XX.XX.XX:58631: --- begin STUN message --- STUN Binding success response Hdr: length=44, magic=2112a442, tsx_id=00002f4d355f173313cf2ac7 Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=59.XX.XX.XX:12957 MESSAGE-INTEGRITY: length=20, data=7f0228e49c8b4a97e1cc01f8aa7354cfcb5ebb1e FINGERPRINT: length=4, value=3415316726 (0xcb9198f6) --- end of STUN message --- [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3880 .RX 64 bytes STUN message from 186.XX.XX.XX:39849: --- begin STUN message --- STUN Binding success response Hdr: length=44, magic=2112a442, tsx_id=00002f4d36269d8d13cf2ac8 Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=59.XX.XX.XX:14271 MESSAGE-INTEGRITY: length=20, data=0cdf6ee6d13ea2dc81f627241cd3bdcf78380513 FINGERPRINT: length=4, value=1841270867 (0x6dbf9053) --- end of STUN message --- [Jan 28 19:30:59] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3880 .RX 64 bytes STUN message from 186.XX.XX.XX:39849: --- begin STUN message --- STUN Binding success response Hdr: length=44, magic=2112a442, tsx_id=00002f4d36269d8d13cf2ac8 Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=59.XX.XX.XX:14271 MESSAGE-INTEGRITY: length=20, data=0cdf6ee6d13ea2dc81f627241cd3bdcf78380513 FINGERPRINT: length=4, value=1841270867 (0x6dbf9053) --- end of STUN message --- [Jan 28 19:30:59] DEBUG[12147] pjsip: utsx0x7fc38003 STUN client transaction 0x7fc38003f668 stopped, ref_cnt=12 [Jan 28 19:30:59] DEBUG[12147] pjsip: stun_session.c STUN transaction 0x7fc38003f668 destroyed [Jan 28 19:30:59] DEBUG[12147] pjsip: utsx0x7fc38804 STUN client transaction 0x7fc388046fe8 stopped, ref_cnt=11 [Jan 28 19:30:59] DEBUG[12147] pjsip: stun_session.c STUN transaction 0x7fc388046fe8 destroyed [Jan 28 19:30:59] DEBUG[12147] pjsip: utsx0x7fc38c00 STUN client transaction 0x7fc38c0055b8 stopped, ref_cnt=9 [Jan 28 19:30:59] DEBUG[12147] pjsip: stun_session.c STUN transaction 0x7fc38c0055b8 destroyed [Jan 28 19:30:59] DEBUG[12147] pjsip: utsx0x7fc38003 STUN client transaction 0x7fc380032938 stopped, ref_cnt=8 [Jan 28 19:30:59] DEBUG[12147] pjsip: stun_session.c STUN transaction 0x7fc380032938 destroyed [Jan 28 19:30:59] DEBUG[12147] pjsip: utsx0x7fc38c06 STUN client transaction 0x7fc38c06a568 stopped, ref_cnt=10 [Jan 28 19:30:59] DEBUG[12147] pjsip: stun_session.c STUN transaction 0x7fc38c06a568 destroyed [Jan 28 19:30:59] DEBUG[12147] pjsip: utsx0x7fc38003 STUN client transaction 0x7fc380033528 stopped, ref_cnt=9 [Jan 28 19:30:59] DEBUG[12147] pjsip: stun_session.c STUN transaction 0x7fc380033528 destroyed [Jan 28 19:30:59] DEBUG[12401][C-00000003] res_srtp.c: Adding new policy for SSRC 2083768546 [Jan 28 19:30:59] DEBUG[12401][C-00000003] res_rtp_asterisk.c: 0x7fc3880387a0 -- Probation learning mode pass with source address 186.XX.XX.XX:42932 [Jan 28 19:31:00] DEBUG[12401][C-00000003] res_srtp.c: Adding new policy for SSRC 1587710117 [Jan 28 19:31:00] DEBUG[12401][C-00000003] res_rtp_asterisk.c: 0x7fc38800baf0 -- Probation learning mode pass with source address 186.XX.XX.XX:58090 [Jan 28 19:31:01] DEBUG[12401][C-00000003] pbx.c: Launching 'Playback' [Jan 28 19:31:01] DEBUG[12401][C-00000003] res_rtp_asterisk.c: Ooh, format changed from none to ulaw [Jan 28 19:31:01] DEBUG[12401][C-00000003] channel.c: Scheduling timer at (50 requested / 50 actual) timer ticks per second [Jan 28 19:31:01] DEBUG[12167] res_timing_timerfd.c: Expected to acknowledge 1 ticks but got 2 instead [Jan 28 19:31:02] DEBUG[12401][C-00000003] channel.c: Scheduling timer at (107 requested / 107 actual) timer ticks per second [Jan 28 19:31:02] DEBUG[12401][C-00000003] channel.c: Scheduling timer at (0 requested / 0 actual) timer ticks per second [Jan 28 19:31:02] DEBUG[12401][C-00000003] channel.c: Scheduling timer at (0 requested / 0 actual) timer ticks per second [Jan 28 19:31:02] DEBUG[12401][C-00000003] channel.c: Scheduling timer at (0 requested / 0 actual) timer ticks per second [Jan 28 19:31:02] DEBUG[12401][C-00000003] pbx.c: Result of 'EXTEN' is '101' [Jan 28 19:31:02] DEBUG[12401][C-00000003] pbx.c: Launching 'Dial' [Jan 28 19:31:02] DEBUG[12401][C-00000003] chan_sip.c: Asked to create a SIP channel with formats: (vp8|ulaw) [Jan 28 19:31:02] DEBUG[12401][C-00000003] chan_sip.c: Allocating new SIP dialog for 57f7754448397281289893d95a2cdf7c@10.37.172.89:5060 - INVITE (No RTP) [Jan 28 19:31:02] DEBUG[12401][C-00000003] rtp_engine.c: Using engine 'asterisk' for RTP instance '0x7fc380016318' [Jan 28 19:31:02] DEBUG[12401][C-00000003] res_rtp_asterisk.c: Allocated port 14800 for RTP instance '0x7fc380016318' [Jan 28 19:31:02] DEBUG[12401][C-00000003] pjsip: icess0x7fc3800 ICE session created, comp_cnt=2, role is Unknown agent [Jan 28 19:31:02] DEBUG[12401][C-00000003] netsock2.c: Splitting '10.37.172.89' into... [Jan 28 19:31:02] DEBUG[12401][C-00000003] netsock2.c: ...host '10.37.172.89' and port ''. [Jan 28 19:31:02] DEBUG[12401][C-00000003] pjsip: icess0x7fc3800 Candidate 0 added: comp_id=1, type=host, foundation=Ha25ac59, addr=10.37.172.89:14800, base=10.37.172.89:14800, prio=0x7effffff (2130706431) [Jan 28 19:31:02] DEBUG[12401][C-00000003] netsock2.c: Splitting '59.XX.XX.XX' into... [Jan 28 19:31:02] DEBUG[12401][C-00000003] netsock2.c: ...host '59.XX.XX.XX' and port ''. [Jan 28 19:31:02] DEBUG[12401][C-00000003] netsock2.c: Splitting '10.37.172.89' into... [Jan 28 19:31:02] DEBUG[12401][C-00000003] netsock2.c: ...host '10.37.172.89' and port ''. [Jan 28 19:31:02] DEBUG[12401][C-00000003] pjsip: icess0x7fc3800 Candidate 1 added: comp_id=1, type=srflx, foundation=S369fc99e, addr=59.XX.XX.XX:14800, base=10.37.172.89:14800, prio=0x64ffffff (1694498815) [Jan 28 19:31:02] DEBUG[12401][C-00000003] rtp_engine.c: RTP instance '0x7fc380016318' is setup and ready to go [Jan 28 19:31:02] DEBUG[12401][C-00000003] rtp_engine.c: Using engine 'asterisk' for RTP instance '0x7fc380027e18' [Jan 28 19:31:02] DEBUG[12401][C-00000003] res_rtp_asterisk.c: Allocated port 10976 for RTP instance '0x7fc380027e18' [Jan 28 19:31:02] DEBUG[12401][C-00000003] pjsip: icess0x7fc3800 ICE session created, comp_cnt=2, role is Unknown agent [Jan 28 19:31:02] DEBUG[12401][C-00000003] netsock2.c: Splitting '10.37.172.89' into... [Jan 28 19:31:02] DEBUG[12401][C-00000003] netsock2.c: ...host '10.37.172.89' and port ''. [Jan 28 19:31:02] DEBUG[12401][C-00000003] pjsip: icess0x7fc3800 Candidate 0 added: comp_id=1, type=host, foundation=Ha25ac59, addr=10.37.172.89:10976, base=10.37.172.89:10976, prio=0x7effffff (2130706431) [Jan 28 19:31:02] DEBUG[12401][C-00000003] netsock2.c: Splitting '59.XX.XX.XX' into... [Jan 28 19:31:02] DEBUG[12401][C-00000003] netsock2.c: ...host '59.XX.XX.XX' and port ''. [Jan 28 19:31:02] DEBUG[12401][C-00000003] netsock2.c: Splitting '10.37.172.89' into... [Jan 28 19:31:02] DEBUG[12401][C-00000003] netsock2.c: ...host '10.37.172.89' and port ''. [Jan 28 19:31:02] DEBUG[12401][C-00000003] pjsip: icess0x7fc3800 Candidate 1 added: comp_id=1, type=srflx, foundation=S369fc99e, addr=59.XX.XX.XX:10976, base=10.37.172.89:10976, prio=0x64ffffff (1694498815) [Jan 28 19:31:02] DEBUG[12401][C-00000003] rtp_engine.c: RTP instance '0x7fc380027e18' is setup and ready to go [Jan 28 19:31:02] DEBUG[12401][C-00000003] res_rtp_asterisk.c: Setup RTCP on RTP instance '0x7fc380027e18' [Jan 28 19:31:02] DEBUG[12401][C-00000003] netsock2.c: Splitting '10.37.172.89' into... [Jan 28 19:31:02] DEBUG[12401][C-00000003] netsock2.c: ...host '10.37.172.89' and port ''. [Jan 28 19:31:02] DEBUG[12401][C-00000003] pjsip: icess0x7fc3800 Candidate 2 added: comp_id=2, type=host, foundation=Ha25ac59, addr=10.37.172.89:10977, base=10.37.172.89:10977, prio=0x7efffffe (2130706430) [Jan 28 19:31:02] DEBUG[12401][C-00000003] netsock2.c: Splitting '59.XX.XX.XX' into... [Jan 28 19:31:02] DEBUG[12401][C-00000003] netsock2.c: ...host '59.XX.XX.XX' and port ''. [Jan 28 19:31:02] DEBUG[12401][C-00000003] netsock2.c: Splitting '10.37.172.89' into... [Jan 28 19:31:02] DEBUG[12401][C-00000003] netsock2.c: ...host '10.37.172.89' and port ''. [Jan 28 19:31:02] DEBUG[12401][C-00000003] pjsip: icess0x7fc3800 Candidate 3 added: comp_id=2, type=srflx, foundation=S369fc99e, addr=59.XX.XX.XX:10977, base=10.37.172.89:10977, prio=0x64fffffe (1694498814) [Jan 28 19:31:02] DEBUG[12401][C-00000003] res_rtp_asterisk.c: Setup RTCP on RTP instance '0x7fc380016318' [Jan 28 19:31:02] DEBUG[12401][C-00000003] netsock2.c: Splitting '10.37.172.89' into... [Jan 28 19:31:02] DEBUG[12401][C-00000003] netsock2.c: ...host '10.37.172.89' and port ''. [Jan 28 19:31:02] DEBUG[12401][C-00000003] pjsip: icess0x7fc3800 Candidate 2 added: comp_id=2, type=host, foundation=Ha25ac59, addr=10.37.172.89:14801, base=10.37.172.89:14801, prio=0x7efffffe (2130706430) [Jan 28 19:31:02] DEBUG[12401][C-00000003] netsock2.c: Splitting '59.XX.XX.XX' into... [Jan 28 19:31:02] DEBUG[12401][C-00000003] netsock2.c: ...host '59.XX.XX.XX' and port ''. [Jan 28 19:31:02] DEBUG[12401][C-00000003] netsock2.c: Splitting '10.37.172.89' into... [Jan 28 19:31:02] DEBUG[12401][C-00000003] netsock2.c: ...host '10.37.172.89' and port ''. [Jan 28 19:31:02] DEBUG[12401][C-00000003] pjsip: icess0x7fc3800 Candidate 3 added: comp_id=2, type=srflx, foundation=S369fc99e, addr=59.XX.XX.XX:14801, base=10.37.172.89:14801, prio=0x64fffffe (1694498814) [Jan 28 19:31:02] DEBUG[12401][C-00000003] chan_sip.c: Setting NAT on RTP to On [Jan 28 19:31:02] DEBUG[12401][C-00000003] chan_sip.c: Setting NAT on VRTP to On [Jan 28 19:31:02] DEBUG[12401][C-00000003] chan_sip.c: OBPROXY: Not applying OBproxy to this call [Jan 28 19:31:02] DEBUG[12401][C-00000003] acl.c: For destination '186.XX.XX.XX', our source address is '10.37.172.89'. [Jan 28 19:31:02] DEBUG[12401][C-00000003] chan_sip.c: Setting AST_TRANSPORT_WS with address 10.37.172.89:5060 [Jan 28 19:31:02] DEBUG[12401][C-00000003] chan_sip.c: Setting NAT on RTP to On [Jan 28 19:31:02] DEBUG[12401][C-00000003] chan_sip.c: Setting NAT on VRTP to On [Jan 28 19:31:02] DEBUG[12401][C-00000003] chan_sip.c: SIP call-id changed from '57f7754448397281289893d95a2cdf7c@10.37.172.89:5060' to '4ead8d547980693835eed3c5623cac67@10.37.172.89:5060' [Jan 28 19:31:02] DEBUG[12401][C-00000003] chan_sip.c: *** Our native formats are (vp8|ulaw) [Jan 28 19:31:02] DEBUG[12401][C-00000003] chan_sip.c: *** Joint capabilities are (vp8|ulaw) [Jan 28 19:31:02] DEBUG[12401][C-00000003] chan_sip.c: *** Our capabilities are (ulaw|vp8) [Jan 28 19:31:02] DEBUG[12401][C-00000003] chan_sip.c: *** AST_CODEC_CHOOSE formats are ulaw [Jan 28 19:31:02] DEBUG[12401][C-00000003] chan_sip.c: *** Our preferred formats from the incoming channel are (vp8|ulaw) [Jan 28 19:31:02] DEBUG[12401][C-00000003] chan_sip.c: This channel can handle video! HOLLYWOOD next! [Jan 28 19:31:02] DEBUG[12401][C-00000003] channel_internal_api.c: Channel Call ID changing from [C-00000003] to [C-00000003] [Jan 28 19:31:02] DEBUG[12401][C-00000003] chan_sip.c: Outgoing Call for tfrblitj [Jan 28 19:31:02] DEBUG[12401][C-00000003] chan_sip.c: Updating call counter for outgoing call [Jan 28 19:31:02] DEBUG[12401][C-00000003] chan_sip.c: This call needs video offers! [Jan 28 19:31:02] DEBUG[12401][C-00000003] chan_sip.c: ** Our capability: (vp8|ulaw) Video flag: False Text flag: False [Jan 28 19:31:02] DEBUG[12401][C-00000003] chan_sip.c: ** Our prefcodec: (vp8|ulaw) [Jan 28 19:31:02] VERBOSE[12401][C-00000003] chan_sip.c: Audio is at 14800 [Jan 28 19:31:02] VERBOSE[12401][C-00000003] chan_sip.c: Video is at 10.37.172.89:10976 [Jan 28 19:31:02] VERBOSE[12401][C-00000003] chan_sip.c: Adding codec ulaw to SDP [Jan 28 19:31:02] VERBOSE[12401][C-00000003] chan_sip.c: Adding video codec vp8 to SDP [Jan 28 19:31:02] VERBOSE[12401][C-00000003] chan_sip.c: Adding non-codec 0x1 (telephone-event) to SDP [Jan 28 19:31:02] DEBUG[12401][C-00000003] chan_sip.c: -- Done with adding codecs to SDP [Jan 28 19:31:02] DEBUG[12401][C-00000003] chan_sip.c: Done building SDP. Settling with this capability: (vp8|ulaw) [Jan 28 19:31:02] DEBUG[12401][C-00000003] chan_sip.c: Initializing initreq for method INVITE - callid 4ead8d547980693835eed3c5623cac67@10.37.172.89:5060 [Jan 28 19:31:02] DEBUG[12401][C-00000003] chan_sip.c: Header 0 [ 61]: INVITE sip:7dhldjib@jvp15e71m9jt.invalid;transport=ws SIP/2.0 [Jan 28 19:31:02] DEBUG[12401][C-00000003] chan_sip.c: Header 1 [ 62]: Via: SIP/2.0/WS 10.37.172.89:5060;branch=z9hG4bK2d65cf48;rport [Jan 28 19:31:02] DEBUG[12401][C-00000003] chan_sip.c: Header 2 [ 16]: Max-Forwards: 70 [Jan 28 19:31:02] DEBUG[12401][C-00000003] chan_sip.c: Header 3 [ 49]: From: "102" ;tag=as5abd6230 [Jan 28 19:31:02] DEBUG[12401][C-00000003] chan_sip.c: Header 4 [ 52]: To: [Jan 28 19:31:02] DEBUG[12401][C-00000003] chan_sip.c: Header 5 [ 49]: Contact: [Jan 28 19:31:02] DEBUG[12401][C-00000003] chan_sip.c: Header 6 [ 59]: Call-ID: 4ead8d547980693835eed3c5623cac67@10.37.172.89:5060 [Jan 28 19:31:02] DEBUG[12401][C-00000003] chan_sip.c: Header 7 [ 16]: CSeq: 102 INVITE [Jan 28 19:31:02] DEBUG[12401][C-00000003] chan_sip.c: Header 8 [ 31]: User-Agent: Asterisk PBX 13.1.0 [Jan 28 19:31:02] DEBUG[12401][C-00000003] chan_sip.c: Header 9 [ 35]: Date: Wed, 28 Jan 2015 19:31:02 GMT [Jan 28 19:31:02] DEBUG[12401][C-00000003] chan_sip.c: Header 10 [ 90]: Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE [Jan 28 19:31:02] DEBUG[12401][C-00000003] chan_sip.c: Header 11 [ 26]: Supported: replaces, timer [Jan 28 19:31:02] DEBUG[12401][C-00000003] chan_sip.c: Header 12 [ 29]: Content-Type: application/sdp [Jan 28 19:31:02] VERBOSE[12401][C-00000003] chan_sip.c: Reliably Transmitting (NAT) to 186.XX.XX.XX:37687: INVITE sip:7dhldjib@jvp15e71m9jt.invalid;transport=ws SIP/2.0 Via: SIP/2.0/WS 10.37.172.89:5060;branch=z9hG4bK2d65cf48;rport Max-Forwards: 70 From: "102" ;tag=as5abd6230 To: Contact: Call-ID: 4ead8d547980693835eed3c5623cac67@10.37.172.89:5060 CSeq: 102 INVITE User-Agent: Asterisk PBX 13.1.0 Date: Wed, 28 Jan 2015 19:31:02 GMT Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE Supported: replaces, timer Content-Type: application/sdp Content-Length: 1501 v=0 o=root 1867163197 1867163197 IN IP4 10.37.172.89 s=Asterisk PBX 13.1.0 c=IN IP4 10.37.172.89 b=CT:384 t=0 0 m=audio 14800 RTP/SAVPF 0 101 a=rtpmap:0 PCMU/8000 a=rtpmap:101 telephone-event/8000 a=fmtp:101 0-16 a=maxptime:150 a=ice-ufrag:182c7c4f74e73d0624009e24222e9c85 a=ice-pwd:757b0db73bfe1a003b2796660539eb81 a=candidate:Ha25ac59 1 UDP 2130706431 10.37.172.89 14800 typ host a=candidate:S369fc99e 1 UDP 1694498815 59.XX.XX.XX 14800 typ srflx raddr 10.37.172.89 rport 14800 a=candidate:Ha25ac59 2 UDP 2130706430 10.37.172.89 14801 typ host a=candidate:S369fc99e 2 UDP 1694498814 59.XX.XX.XX 14801 typ srflx raddr 10.37.172.89 rport 14801 a=connection:new a=setup:actpass a=fingerprint:SHA-256 04:9A:2F:12:1F:73:73:20:F5:B3:D9:08:FB:10:6F:86:1D:5F:60:2B:98:D4:71:26:B9:D2:87:36:41:64:FA:A7 a=sendrecv m=video 10976 RTP/SAVPF 100 a=ice-ufrag:3010cd2c58ca0d3d4caf0f0905271818 a=ice-pwd:19cff47b4c20adaf42408fb2074ea8a3 a=candidate:Ha25ac59 1 UDP 2130706431 10.37.172.89 10976 typ host a=candidate:S369fc99e 1 UDP 1694498815 59.XX.XX.XX 10976 typ srflx raddr 10.37.172.89 rport 10976 a=candidate:Ha25ac59 2 UDP 2130706430 10.37.172.89 10977 typ host a=candidate:S369fc99e 2 UDP 1694498814 59.XX.XX.XX 10977 typ srflx raddr 10.37.172.89 rport 10977 a=connection:new a=setup:actpass a=fingerprint:SHA-256 04:9A:2F:12:1F:73:73:20:F5:B3:D9:08:FB:10:6F:86:1D:5F:60:2B:98:D4:71:26:B9:D2:87:36:41:64:FA:A7 a=rtpmap:100 VP8/90000 a=rtcp-fb:* ccm fir a=sendrecv --- [Jan 28 19:31:02] DEBUG[12401][C-00000003] chan_sip.c: Trying to put 'INVITE sip:' onto WS socket destined for 186.XX.XX.XX:37687 [Jan 28 19:31:02] VERBOSE[12197] chan_sip.c: <--- SIP read from WS:186.XX.XX.XX:37687 ---> SIP/2.0 100 Trying Via: SIP/2.0/WS 10.37.172.89:5060;branch=z9hG4bK2d65cf48;rport To: From: "102" ;tag=as5abd6230 Call-ID: 4ead8d547980693835eed3c5623cac67@10.37.172.89:5060 CSeq: 102 INVITE Supported: ice,outbound Content-Length: 0 <-------------> [Jan 28 19:31:02] DEBUG[12197] chan_sip.c: Header 0 [ 18]: SIP/2.0 100 Trying [Jan 28 19:31:02] DEBUG[12197] chan_sip.c: Header 1 [ 62]: Via: SIP/2.0/WS 10.37.172.89:5060;branch=z9hG4bK2d65cf48;rport [Jan 28 19:31:02] DEBUG[12197] chan_sip.c: Header 2 [ 52]: To: [Jan 28 19:31:02] DEBUG[12197] chan_sip.c: Header 3 [ 49]: From: "102" ;tag=as5abd6230 [Jan 28 19:31:02] DEBUG[12197] chan_sip.c: Header 4 [ 59]: Call-ID: 4ead8d547980693835eed3c5623cac67@10.37.172.89:5060 [Jan 28 19:31:02] DEBUG[12197] chan_sip.c: Header 5 [ 16]: CSeq: 102 INVITE [Jan 28 19:31:02] DEBUG[12197] chan_sip.c: Header 6 [ 23]: Supported: ice,outbound [Jan 28 19:31:02] DEBUG[12197] chan_sip.c: Header 7 [ 17]: Content-Length: 0 [Jan 28 19:31:02] VERBOSE[12197] chan_sip.c: --- (8 headers 0 lines) --- [Jan 28 19:31:02] DEBUG[12197] chan_sip.c: = Looking for Call ID: 4ead8d547980693835eed3c5623cac67@10.37.172.89:5060 (Checking To) --From tag as5abd6230 --To-tag [Jan 28 19:31:02] DEBUG[12197][C-00000003] chan_sip.c: SIP response 100 to standard invite [Jan 28 19:31:02] VERBOSE[12197] chan_sip.c: <--- SIP read from WS:186.XX.XX.XX:37687 ---> SIP/2.0 180 Ringing Via: SIP/2.0/WS 10.37.172.89:5060;branch=z9hG4bK2d65cf48;rport To: ;tag=a6tct1dgu3 From: "102" ;tag=as5abd6230 Call-ID: 4ead8d547980693835eed3c5623cac67@10.37.172.89:5060 CSeq: 102 INVITE Contact: Supported: ice,outbound Content-Length: 0 <-------------> [Jan 28 19:31:02] DEBUG[12197] chan_sip.c: Header 0 [ 19]: SIP/2.0 180 Ringing [Jan 28 19:31:02] DEBUG[12197] chan_sip.c: Header 1 [ 62]: Via: SIP/2.0/WS 10.37.172.89:5060;branch=z9hG4bK2d65cf48;rport [Jan 28 19:31:02] DEBUG[12197] chan_sip.c: Header 2 [ 67]: To: ;tag=a6tct1dgu3 [Jan 28 19:31:02] DEBUG[12197] chan_sip.c: Header 3 [ 49]: From: "102" ;tag=as5abd6230 [Jan 28 19:31:02] DEBUG[12197] chan_sip.c: Header 4 [ 59]: Call-ID: 4ead8d547980693835eed3c5623cac67@10.37.172.89:5060 [Jan 28 19:31:02] DEBUG[12197] chan_sip.c: Header 5 [ 16]: CSeq: 102 INVITE [Jan 28 19:31:02] DEBUG[12197] chan_sip.c: Header 6 [ 57]: Contact: [Jan 28 19:31:02] DEBUG[12197] chan_sip.c: Header 7 [ 23]: Supported: ice,outbound [Jan 28 19:31:02] DEBUG[12197] chan_sip.c: Header 8 [ 17]: Content-Length: 0 [Jan 28 19:31:02] VERBOSE[12197] chan_sip.c: --- (9 headers 0 lines) --- [Jan 28 19:31:02] DEBUG[12197] chan_sip.c: = Looking for Call ID: 4ead8d547980693835eed3c5623cac67@10.37.172.89:5060 (Checking To) --From tag as5abd6230 --To-tag a6tct1dgu3 [Jan 28 19:31:02] DEBUG[12197][C-00000003] chan_sip.c: SIP response 180 to standard invite [Jan 28 19:31:02] VERBOSE[12197][C-00000003] sip/route.c: sip_route_dump: route/path hop: [Jan 28 19:31:02] DEBUG[12125] devicestate.c: No provider found, checking channel drivers for SIP - 101 [Jan 28 19:31:02] DEBUG[12125] chan_sip.c: Checking device state for peer 101 [Jan 28 19:31:02] DEBUG[12125] devicestate.c: Changing state for SIP/101 - state 1 (Not in use) [Jan 28 19:31:02] DEBUG[12401][C-00000003] rtp_engine.c: Setting early bridge SDP of 'SIP/102-00000006' with that of 'SIP/101-00000007' [Jan 28 19:31:02] DEBUG[12401][C-00000003] channel.c: Driver for channel 'SIP/102-00000006' does not support indication 3, emulating it [Jan 28 19:31:02] DEBUG[12401][C-00000003] channel.c: Set channel SIP/102-00000006 to write format slin [Jan 28 19:31:02] DEBUG[12401][C-00000003] channel.c: Scheduling timer at (50 requested / 50 actual) timer ticks per second [Jan 28 19:31:02] DEBUG[12401][C-00000003] res_rtp_asterisk.c: Difference is 2688, ms is 356 [Jan 28 19:31:04] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:04] DEBUG[12150] netsock2.c: Splitting 'ip-10-37-172-89' into... [Jan 28 19:31:04] DEBUG[12150] netsock2.c: ...host 'ip-10-37-172-89' and port ''. [Jan 28 19:31:04] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:04] DEBUG[12150] acl.c: Attached to given IP address [Jan 28 19:31:04] DEBUG[12174] netsock2.c: Splitting '10.37.172.89:0' into... [Jan 28 19:31:04] DEBUG[12174] netsock2.c: ...host '10.37.172.89' and port '0'. [Jan 28 19:31:04] DEBUG[12174] netsock2.c: Splitting '186.XX.XX.XX:39849' into... [Jan 28 19:31:04] DEBUG[12174] netsock2.c: ...host '186.XX.XX.XX' and port '39849'. [Jan 28 19:31:05] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:05] DEBUG[12150] netsock2.c: Splitting 'ip-10-37-172-89' into... [Jan 28 19:31:05] DEBUG[12150] netsock2.c: ...host 'ip-10-37-172-89' and port ''. [Jan 28 19:31:05] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:05] DEBUG[12150] acl.c: Attached to given IP address [Jan 28 19:31:05] DEBUG[12174] netsock2.c: Splitting '10.37.172.89:0' into... [Jan 28 19:31:05] DEBUG[12174] netsock2.c: ...host '10.37.172.89' and port '0'. [Jan 28 19:31:05] DEBUG[12174] netsock2.c: Splitting '186.XX.XX.XX:58631' into... [Jan 28 19:31:05] DEBUG[12174] netsock2.c: ...host '186.XX.XX.XX' and port '58631'. [Jan 28 19:31:06] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3800 .RX 120 bytes STUN message from 186.XX.XX.XX:59186: --- begin STUN message --- STUN Binding request Hdr: length=100, magic=2112a442, tsx_id=e31ffea1c02a414f04720a73 Attributes: USERNAME: length=41, value="182c7c4f74e73d0624009e24222e9c85:c5484af7" PRIORITY: length=4, value=1853817087 (0x6e7f00ff) ICE-CONTROLLED: length=8, data=43e0b231d3c9f046 MESSAGE-INTEGRITY: length=20, data=3f75fbf27e795c032616b8f2fe9f75a5b840b933 FINGERPRINT: length=4, value=2113545759 (0x7dfa261f) --- end of STUN message --- [Jan 28 19:31:06] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3800 ..TX 80 bytes STUN message to 186.XX.XX.XX:59186: --- begin STUN message --- STUN Binding success response Hdr: length=60, magic=2112a442, tsx_id=e31ffea1c02a414f04720a73 Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=186.XX.XX.XX:59186 SOFTWARE: length=12, value="pjnath-2.3.0" MESSAGE-INTEGRITY: length=20, data=4a85bde4e9a6d254da6fb28cad34b4c32b9b59de FINGERPRINT: length=4, value=3599145780 (0xd6869b34) --- end of STUN message --- [Jan 28 19:31:06] DEBUG[12401][C-00000003] pjsip: icess0x7fc3800 .Received an early check for comp 1 [Jan 28 19:31:06] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3800 .RX 120 bytes STUN message from 186.XX.XX.XX:41177: --- begin STUN message --- STUN Binding request Hdr: length=100, magic=2112a442, tsx_id=b0255522d6795ac7f09ec8d3 Attributes: USERNAME: length=41, value="182c7c4f74e73d0624009e24222e9c85:c5484af7" PRIORITY: length=4, value=1853817086 (0x6e7f00fe) ICE-CONTROLLED: length=8, data=43e0b231d3c9f046 MESSAGE-INTEGRITY: length=20, data=49ce453278db3ebf44454c044dba21110342bb2b FINGERPRINT: length=4, value=2675647624 (0x9f7b2488) --- end of STUN message --- [Jan 28 19:31:06] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3800 ..TX 80 bytes STUN message to 186.XX.XX.XX:41177: --- begin STUN message --- STUN Binding success response Hdr: length=60, magic=2112a442, tsx_id=b0255522d6795ac7f09ec8d3 Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=186.XX.XX.XX:41177 SOFTWARE: length=12, value="pjnath-2.3.0" MESSAGE-INTEGRITY: length=20, data=e57f03c40b208c6f327e92bd2da61d2673cd627c FINGERPRINT: length=4, value=2128707253 (0x7ee17eb5) --- end of STUN message --- [Jan 28 19:31:06] DEBUG[12401][C-00000003] pjsip: icess0x7fc3800 .Received an early check for comp 2 [Jan 28 19:31:06] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3800 .RX 120 bytes STUN message from 186.XX.XX.XX:59186: --- begin STUN message --- STUN Binding request Hdr: length=100, magic=2112a442, tsx_id=e31ffea1c02a414f04720a73 Attributes: USERNAME: length=41, value="182c7c4f74e73d0624009e24222e9c85:c5484af7" PRIORITY: length=4, value=1853817087 (0x6e7f00ff) ICE-CONTROLLED: length=8, data=43e0b231d3c9f046 MESSAGE-INTEGRITY: length=20, data=3f75fbf27e795c032616b8f2fe9f75a5b840b933 FINGERPRINT: length=4, value=2113545759 (0x7dfa261f) --- end of STUN message --- [Jan 28 19:31:06] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3800 ..TX 80 bytes STUN message to 186.XX.XX.XX:59186: --- begin STUN message --- STUN Binding success response Hdr: length=60, magic=2112a442, tsx_id=e31ffea1c02a414f04720a73 Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=186.XX.XX.XX:59186 SOFTWARE: length=12, value="pjnath-2.3.0" MESSAGE-INTEGRITY: length=20, data=4a85bde4e9a6d254da6fb28cad34b4c32b9b59de FINGERPRINT: length=4, value=3599145780 (0xd6869b34) --- end of STUN message --- [Jan 28 19:31:06] DEBUG[12401][C-00000003] pjsip: icess0x7fc3800 .Received an early check for comp 1 [Jan 28 19:31:06] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3800 .RX 120 bytes STUN message from 186.XX.XX.XX:41177: --- begin STUN message --- STUN Binding request Hdr: length=100, magic=2112a442, tsx_id=b0255522d6795ac7f09ec8d3 Attributes: USERNAME: length=41, value="182c7c4f74e73d0624009e24222e9c85:c5484af7" PRIORITY: length=4, value=1853817086 (0x6e7f00fe) ICE-CONTROLLED: length=8, data=43e0b231d3c9f046 MESSAGE-INTEGRITY: length=20, data=49ce453278db3ebf44454c044dba21110342bb2b FINGERPRINT: length=4, value=2675647624 (0x9f7b2488) --- end of STUN message --- [Jan 28 19:31:06] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3800 ..TX 80 bytes STUN message to 186.XX.XX.XX:41177: --- begin STUN message --- STUN Binding success response Hdr: length=60, magic=2112a442, tsx_id=b0255522d6795ac7f09ec8d3 Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=186.XX.XX.XX:41177 SOFTWARE: length=12, value="pjnath-2.3.0" MESSAGE-INTEGRITY: length=20, data=e57f03c40b208c6f327e92bd2da61d2673cd627c FINGERPRINT: length=4, value=2128707253 (0x7ee17eb5) --- end of STUN message --- [Jan 28 19:31:06] DEBUG[12401][C-00000003] pjsip: icess0x7fc3800 .Received an early check for comp 2 [Jan 28 19:31:06] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3800 .RX 120 bytes STUN message from 186.XX.XX.XX:43997: --- begin STUN message --- STUN Binding request Hdr: length=100, magic=2112a442, tsx_id=7253c5e55a3429dec3e06232 Attributes: USERNAME: length=41, value="3010cd2c58ca0d3d4caf0f0905271818:c5484af7" PRIORITY: length=4, value=1853817087 (0x6e7f00ff) ICE-CONTROLLED: length=8, data=43e0b231d3c9f046 MESSAGE-INTEGRITY: length=20, data=30afcbfd111de562ccd4ea46004c73af87399af2 FINGERPRINT: length=4, value=2293367659 (0x88b2036b) --- end of STUN message --- [Jan 28 19:31:06] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3800 ..TX 80 bytes STUN message to 186.XX.XX.XX:43997: --- begin STUN message --- STUN Binding success response Hdr: length=60, magic=2112a442, tsx_id=7253c5e55a3429dec3e06232 Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=186.XX.XX.XX:43997 SOFTWARE: length=12, value="pjnath-2.3.0" MESSAGE-INTEGRITY: length=20, data=2f1b899e8f49b3c609fefed0c690c680d982edb8 FINGERPRINT: length=4, value=1274961143 (0x4bfe5cf7) --- end of STUN message --- [Jan 28 19:31:06] DEBUG[12401][C-00000003] pjsip: icess0x7fc3800 .Received an early check for comp 1 [Jan 28 19:31:06] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3800 .RX 120 bytes STUN message from 186.XX.XX.XX:57885: --- begin STUN message --- STUN Binding request Hdr: length=100, magic=2112a442, tsx_id=4395b3f441fe60dc0521eb4a Attributes: USERNAME: length=41, value="3010cd2c58ca0d3d4caf0f0905271818:c5484af7" PRIORITY: length=4, value=1853817086 (0x6e7f00fe) ICE-CONTROLLED: length=8, data=43e0b231d3c9f046 MESSAGE-INTEGRITY: length=20, data=32d36fbbc1995a779a45a7bbe93078e8f4bc85d7 FINGERPRINT: length=4, value=3825000532 (0xe3fce054) --- end of STUN message --- [Jan 28 19:31:06] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3800 ..TX 80 bytes STUN message to 186.XX.XX.XX:57885: --- begin STUN message --- STUN Binding success response Hdr: length=60, magic=2112a442, tsx_id=4395b3f441fe60dc0521eb4a Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=186.XX.XX.XX:57885 SOFTWARE: length=12, value="pjnath-2.3.0" MESSAGE-INTEGRITY: length=20, data=0b7c8e175421d642e43640b34cc901df2e8cb4d8 FINGERPRINT: length=4, value=2758804011 (0xa470022b) --- end of STUN message --- [Jan 28 19:31:06] DEBUG[12401][C-00000003] pjsip: icess0x7fc3800 .Received an early check for comp 2 [Jan 28 19:31:06] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3800 .RX 120 bytes STUN message from 186.XX.XX.XX:43997: --- begin STUN message --- STUN Binding request Hdr: length=100, magic=2112a442, tsx_id=7253c5e55a3429dec3e06232 Attributes: USERNAME: length=41, value="3010cd2c58ca0d3d4caf0f0905271818:c5484af7" PRIORITY: length=4, value=1853817087 (0x6e7f00ff) ICE-CONTROLLED: length=8, data=43e0b231d3c9f046 MESSAGE-INTEGRITY: length=20, data=30afcbfd111de562ccd4ea46004c73af87399af2 FINGERPRINT: length=4, value=2293367659 (0x88b2036b) --- end of STUN message --- [Jan 28 19:31:06] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3800 ..TX 80 bytes STUN message to 186.XX.XX.XX:43997: --- begin STUN message --- STUN Binding success response Hdr: length=60, magic=2112a442, tsx_id=7253c5e55a3429dec3e06232 Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=186.XX.XX.XX:43997 SOFTWARE: length=12, value="pjnath-2.3.0" MESSAGE-INTEGRITY: length=20, data=2f1b899e8f49b3c609fefed0c690c680d982edb8 FINGERPRINT: length=4, value=1274961143 (0x4bfe5cf7) --- end of STUN message --- [Jan 28 19:31:06] DEBUG[12401][C-00000003] pjsip: icess0x7fc3800 .Received an early check for comp 1 [Jan 28 19:31:06] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3800 .RX 120 bytes STUN message from 186.XX.XX.XX:57885: --- begin STUN message --- STUN Binding request Hdr: length=100, magic=2112a442, tsx_id=4395b3f441fe60dc0521eb4a Attributes: USERNAME: length=41, value="3010cd2c58ca0d3d4caf0f0905271818:c5484af7" PRIORITY: length=4, value=1853817086 (0x6e7f00fe) ICE-CONTROLLED: length=8, data=43e0b231d3c9f046 MESSAGE-INTEGRITY: length=20, data=32d36fbbc1995a779a45a7bbe93078e8f4bc85d7 FINGERPRINT: length=4, value=3825000532 (0xe3fce054) --- end of STUN message --- [Jan 28 19:31:06] DEBUG[12401][C-00000003] pjsip: stuse0x7fc3800 ..TX 80 bytes STUN message to 186.XX.XX.XX:57885: --- begin STUN message --- STUN Binding success response Hdr: length=60, magic=2112a442, tsx_id=4395b3f441fe60dc0521eb4a Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=186.XX.XX.XX:57885 SOFTWARE: length=12, value="pjnath-2.3.0" MESSAGE-INTEGRITY: length=20, data=0b7c8e175421d642e43640b34cc901df2e8cb4d8 FINGERPRINT: length=4, value=2758804011 (0xa470022b) --- end of STUN message --- [Jan 28 19:31:06] DEBUG[12401][C-00000003] pjsip: icess0x7fc3800 .Received an early check for comp 2 [Jan 28 19:31:08] VERBOSE[12197] chan_sip.c: <--- SIP read from WS:186.XX.XX.XX:37687 ---> SIP/2.0 200 OK Via: SIP/2.0/WS 10.37.172.89:5060;branch=z9hG4bK2d65cf48;rport To: ;tag=a6tct1dgu3 From: "102" ;tag=as5abd6230 Call-ID: 4ead8d547980693835eed3c5623cac67@10.37.172.89:5060 CSeq: 102 INVITE Contact: X-Can-Renegotiate: false Supported: ice,outbound Content-Type: application/sdp Content-Length: 762 v=0 o=Mozilla-SIPUA-34.0 6957 0 IN IP4 0.0.0.0 s=SIP Call t=0 0 a=ice-ufrag:c5484af7 a=ice-pwd:695f916d590ab08a8771ffe5146e503b a=fingerprint:sha-256 66:45:3F:AA:E3:92:F9:ED:0F:00:51:E0:07:12:E6:3A:B8:16:51:FC:4A:30:68:F2:36:A9:3C:DA:F0:C9:3A:C7 m=audio 9 RTP/SAVPF 0 101 c=IN IP4 0.0.0.0 a=rtpmap:0 PCMU/8000 a=rtpmap:101 telephone-event/8000 a=fmtp:101 0-15 a=sendrecv a=setup:active a=candidate:0 1 UDP 2122252543 192.168.2.106 59186 typ host a=candidate:0 2 UDP 2122252542 192.168.2.106 41177 typ host m=video 9 RTP/SAVPF 100 c=IN IP4 0.0.0.0 a=rtpmap:100 VP8/90000 a=sendrecv a=rtcp-fb:100 ccm fir a=setup:active a=candidate:0 1 UDP 2122252543 192.168.2.106 43997 typ host a=candidate:0 2 UDP 2122252542 192.168.2.106 57885 typ host <-------------> [Jan 28 19:31:08] DEBUG[12197] chan_sip.c: Header 0 [ 14]: SIP/2.0 200 OK [Jan 28 19:31:08] DEBUG[12197] chan_sip.c: Header 1 [ 62]: Via: SIP/2.0/WS 10.37.172.89:5060;branch=z9hG4bK2d65cf48;rport [Jan 28 19:31:08] DEBUG[12197] chan_sip.c: Header 2 [ 67]: To: ;tag=a6tct1dgu3 [Jan 28 19:31:08] DEBUG[12197] chan_sip.c: Header 3 [ 49]: From: "102" ;tag=as5abd6230 [Jan 28 19:31:08] DEBUG[12197] chan_sip.c: Header 4 [ 59]: Call-ID: 4ead8d547980693835eed3c5623cac67@10.37.172.89:5060 [Jan 28 19:31:08] DEBUG[12197] chan_sip.c: Header 5 [ 16]: CSeq: 102 INVITE [Jan 28 19:31:08] DEBUG[12197] chan_sip.c: Header 6 [ 57]: Contact: [Jan 28 19:31:08] DEBUG[12197] chan_sip.c: Header 7 [ 24]: X-Can-Renegotiate: false [Jan 28 19:31:08] DEBUG[12197] chan_sip.c: Header 8 [ 23]: Supported: ice,outbound [Jan 28 19:31:08] DEBUG[12197] chan_sip.c: Header 9 [ 29]: Content-Type: application/sdp [Jan 28 19:31:08] DEBUG[12197] chan_sip.c: Header 10 [ 19]: Content-Length: 762 [Jan 28 19:31:08] DEBUG[12197] chan_sip.c: Header 11 [ 0]: [Jan 28 19:31:08] DEBUG[12197] chan_sip.c: Body 0 [ 3]: v=0 [Jan 28 19:31:08] DEBUG[12197] chan_sip.c: Body 1 [ 42]: o=Mozilla-SIPUA-34.0 6957 0 IN IP4 0.0.0.0 [Jan 28 19:31:08] DEBUG[12197] chan_sip.c: Body 2 [ 10]: s=SIP Call [Jan 28 19:31:08] DEBUG[12197] chan_sip.c: Body 3 [ 5]: t=0 0 [Jan 28 19:31:08] DEBUG[12197] chan_sip.c: Body 4 [ 20]: a=ice-ufrag:c5484af7 [Jan 28 19:31:08] DEBUG[12197] chan_sip.c: Body 5 [ 42]: a=ice-pwd:695f916d590ab08a8771ffe5146e503b [Jan 28 19:31:08] DEBUG[12197] chan_sip.c: Body 6 [117]: a=fingerprint:sha-256 66:45:3F:AA:E3:92:F9:ED:0F:00:51:E0:07:12:E6:3A:B8:16:51:FC:4A:30:68:F2:36:A9:3C:DA:F0:C9:3A:C7 [Jan 28 19:31:08] DEBUG[12197] chan_sip.c: Body 7 [ 25]: m=audio 9 RTP/SAVPF 0 101 [Jan 28 19:31:08] DEBUG[12197] chan_sip.c: Body 8 [ 16]: c=IN IP4 0.0.0.0 [Jan 28 19:31:08] DEBUG[12197] chan_sip.c: Body 9 [ 20]: a=rtpmap:0 PCMU/8000 [Jan 28 19:31:08] DEBUG[12197] chan_sip.c: Body 10 [ 33]: a=rtpmap:101 telephone-event/8000 [Jan 28 19:31:08] DEBUG[12197] chan_sip.c: Body 11 [ 15]: a=fmtp:101 0-15 [Jan 28 19:31:08] DEBUG[12197] chan_sip.c: Body 12 [ 10]: a=sendrecv [Jan 28 19:31:08] DEBUG[12197] chan_sip.c: Body 13 [ 14]: a=setup:active [Jan 28 19:31:08] DEBUG[12197] chan_sip.c: Body 14 [ 59]: a=candidate:0 1 UDP 2122252543 192.168.2.106 59186 typ host [Jan 28 19:31:08] DEBUG[12197] chan_sip.c: Body 15 [ 59]: a=candidate:0 2 UDP 2122252542 192.168.2.106 41177 typ host [Jan 28 19:31:08] DEBUG[12197] chan_sip.c: Body 16 [ 23]: m=video 9 RTP/SAVPF 100 [Jan 28 19:31:08] DEBUG[12197] chan_sip.c: Body 17 [ 16]: c=IN IP4 0.0.0.0 [Jan 28 19:31:08] DEBUG[12197] chan_sip.c: Body 18 [ 22]: a=rtpmap:100 VP8/90000 [Jan 28 19:31:08] DEBUG[12197] chan_sip.c: Body 19 [ 10]: a=sendrecv [Jan 28 19:31:08] DEBUG[12197] chan_sip.c: Body 20 [ 21]: a=rtcp-fb:100 ccm fir [Jan 28 19:31:08] DEBUG[12197] chan_sip.c: Body 21 [ 14]: a=setup:active [Jan 28 19:31:08] DEBUG[12197] chan_sip.c: Body 22 [ 59]: a=candidate:0 1 UDP 2122252543 192.168.2.106 43997 typ host [Jan 28 19:31:08] DEBUG[12197] chan_sip.c: Body 23 [ 59]: a=candidate:0 2 UDP 2122252542 192.168.2.106 57885 typ host [Jan 28 19:31:08] VERBOSE[12197] chan_sip.c: --- (11 headers 24 lines) --- [Jan 28 19:31:08] DEBUG[12197] chan_sip.c: = Looking for Call ID: 4ead8d547980693835eed3c5623cac67@10.37.172.89:5060 (Checking To) --From tag as5abd6230 --To-tag a6tct1dgu3 [Jan 28 19:31:08] DEBUG[12197][C-00000003] chan_sip.c: SIP response 200 to standard invite [Jan 28 19:31:08] DEBUG[12197][C-00000003] chan_sip.c: Processing session-level SDP v=0... UNSUPPORTED OR FAILED. [Jan 28 19:31:08] DEBUG[12197][C-00000003] chan_sip.c: Processing session-level SDP o=Mozilla-SIPUA-34.0 6957 0 IN IP4 0.0.0.0... OK. [Jan 28 19:31:08] DEBUG[12197][C-00000003] chan_sip.c: Processing session-level SDP s=SIP Call... UNSUPPORTED OR FAILED. [Jan 28 19:31:08] DEBUG[12197][C-00000003] chan_sip.c: Processing session-level SDP t=0 0... UNSUPPORTED OR FAILED. [Jan 28 19:31:08] DEBUG[12197][C-00000003] chan_sip.c: Processing session-level SDP a=ice-ufrag:c5484af7... OK. [Jan 28 19:31:08] DEBUG[12197][C-00000003] chan_sip.c: Processing session-level SDP a=ice-pwd:695f916d590ab08a8771ffe5146e503b... OK. [Jan 28 19:31:08] DEBUG[12197][C-00000003] chan_sip.c: Processing session-level SDP a=fingerprint:sha-256 66:45:3F:AA:E3:92:F9:ED:0F:00:51:E0:07:12:E6:3A:B8:16:51:FC:4A:30:68:F2:36:A9:3C:DA:F0:C9:3A:C7... OK. [Jan 28 19:31:08] VERBOSE[12197][C-00000003] chan_sip.c: Found RTP audio format 0 [Jan 28 19:31:08] DEBUG[12197][C-00000003] rtp_engine.c: Setting payload 0 (0x7fc36c014768) based on m type on 0x7fc3916cae60 [Jan 28 19:31:08] VERBOSE[12197][C-00000003] chan_sip.c: Found RTP audio format 101 [Jan 28 19:31:08] DEBUG[12197][C-00000003] rtp_engine.c: Setting payload 101 (0x7fc36c030738) based on m type on 0x7fc3916cae60 [Jan 28 19:31:08] DEBUG[12197][C-00000003] netsock2.c: Splitting '0.0.0.0' into... [Jan 28 19:31:08] DEBUG[12197][C-00000003] netsock2.c: ...host '0.0.0.0' and port ''. [Jan 28 19:31:08] DEBUG[12197][C-00000003] chan_sip.c: Processing media-level (audio) SDP c=IN IP4 0.0.0.0... OK. [Jan 28 19:31:08] VERBOSE[12197][C-00000003] chan_sip.c: Found audio description format PCMU for ID 0 [Jan 28 19:31:08] DEBUG[12197][C-00000003] chan_sip.c: Processing media-level (audio) SDP a=rtpmap:0 PCMU/8000... OK. [Jan 28 19:31:08] VERBOSE[12197][C-00000003] chan_sip.c: Found audio description format telephone-event for ID 101 [Jan 28 19:31:08] DEBUG[12197][C-00000003] chan_sip.c: Processing media-level (audio) SDP a=rtpmap:101 telephone-event/8000... OK. [Jan 28 19:31:08] DEBUG[12197][C-00000003] chan_sip.c: Processing media-level (audio) SDP a=fmtp:101 0-15... UNSUPPORTED OR FAILED. [Jan 28 19:31:08] DEBUG[12197][C-00000003] chan_sip.c: Processing media-level (audio) SDP a=sendrecv... OK. [Jan 28 19:31:08] DEBUG[12197][C-00000003] chan_sip.c: Processing media-level (audio) SDP a=setup:active... OK. [Jan 28 19:31:08] DEBUG[12197][C-00000003] netsock2.c: Splitting '192.168.2.106' into... [Jan 28 19:31:08] DEBUG[12197][C-00000003] netsock2.c: ...host '192.168.2.106' and port ''. [Jan 28 19:31:08] DEBUG[12197][C-00000003] chan_sip.c: Processing media-level (audio) SDP a=candidate:0 1 UDP 2122252543 192.168.2.106 59186 typ host... OK. [Jan 28 19:31:08] DEBUG[12197][C-00000003] netsock2.c: Splitting '192.168.2.106' into... [Jan 28 19:31:08] DEBUG[12197][C-00000003] netsock2.c: ...host '192.168.2.106' and port ''. [Jan 28 19:31:08] DEBUG[12197][C-00000003] chan_sip.c: Processing media-level (audio) SDP a=candidate:0 2 UDP 2122252542 192.168.2.106 41177 typ host... OK. [Jan 28 19:31:08] VERBOSE[12197][C-00000003] chan_sip.c: Found RTP video format 100 [Jan 28 19:31:08] DEBUG[12197][C-00000003] rtp_engine.c: Setting payload 100 (0x7fc36c030738) based on m type on 0x7fc3916caed0 [Jan 28 19:31:08] DEBUG[12197][C-00000003] netsock2.c: Splitting '0.0.0.0' into... [Jan 28 19:31:08] DEBUG[12197][C-00000003] netsock2.c: ...host '0.0.0.0' and port ''. [Jan 28 19:31:08] DEBUG[12197][C-00000003] chan_sip.c: Processing media-level (video) SDP c=IN IP4 0.0.0.0... OK. [Jan 28 19:31:08] VERBOSE[12197][C-00000003] chan_sip.c: Found video description format VP8 for ID 100 [Jan 28 19:31:08] DEBUG[12197][C-00000003] chan_sip.c: Processing media-level (video) SDP a=rtpmap:100 VP8/90000... OK. [Jan 28 19:31:08] DEBUG[12197][C-00000003] chan_sip.c: Processing media-level (video) SDP a=sendrecv... UNSUPPORTED OR FAILED. [Jan 28 19:31:08] DEBUG[12197][C-00000003] chan_sip.c: Processing media-level (video) SDP a=rtcp-fb:100 ccm fir... UNSUPPORTED OR FAILED. [Jan 28 19:31:08] DEBUG[12197][C-00000003] chan_sip.c: Processing media-level (video) SDP a=setup:active... OK. [Jan 28 19:31:08] DEBUG[12197][C-00000003] netsock2.c: Splitting '192.168.2.106' into... [Jan 28 19:31:08] DEBUG[12197][C-00000003] netsock2.c: ...host '192.168.2.106' and port ''. [Jan 28 19:31:08] DEBUG[12197][C-00000003] chan_sip.c: Processing media-level (video) SDP a=candidate:0 1 UDP 2122252543 192.168.2.106 43997 typ host... OK. [Jan 28 19:31:08] DEBUG[12197][C-00000003] netsock2.c: Splitting '192.168.2.106' into... [Jan 28 19:31:08] DEBUG[12197][C-00000003] netsock2.c: ...host '192.168.2.106' and port ''. [Jan 28 19:31:08] DEBUG[12197][C-00000003] chan_sip.c: Processing media-level (video) SDP a=candidate:0 2 UDP 2122252542 192.168.2.106 57885 typ host... OK. [Jan 28 19:31:08] VERBOSE[12197][C-00000003] chan_sip.c: Capabilities: us - (ulaw|vp8), peer - audio=(ulaw)/video=(vp8)/text=(nothing), combined - (ulaw|vp8) [Jan 28 19:31:08] VERBOSE[12197][C-00000003] chan_sip.c: Non-codec capabilities (dtmf): us - 0x1 (telephone-event|), peer - 0x1 (telephone-event|), combined - 0x1 (telephone-event|) [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 Role changed to Controlling [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 Check 2: [1] 10.37.172.89:14800-->192.168.2.106:59186 pruned (duplicate found) [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 Check 2: [2] 10.37.172.89:14801-->192.168.2.106:41177 pruned (duplicate found) [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 Checklist created: [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 0: [1] 10.37.172.89:14800-->192.168.2.106:59186 (not nominated, state=Frozen) [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 1: [2] 10.37.172.89:14801-->192.168.2.106:41177 (not nominated, state=Frozen) [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 Starting ICE check.. [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 .Check 0: [1] 10.37.172.89:14800-->192.168.2.106:59186: state changed from Frozen to Waiting [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 .Performing delayed triggerred check for component 1 [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 ..Added new remote candidate from the request: 186.XX.XX.XX:59186 [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 ..New triggered check added: 2 [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 ...Sending connectivity check for check 2: [1] 10.37.172.89:14800-->186.XX.XX.XX:59186 [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: stuse0x7fc3800 .....TX 140 bytes STUN message to 186.XX.XX.XX:59186: --- begin STUN message --- STUN Binding request Hdr: length=120, magic=2112a442, tsx_id=00002f4d414f5ce913cf2ac9 Attributes: PRIORITY: length=4, value=1862270975 (0x6effffff) USE-CANDIDATE: length=0 ICE-CONTROLLING: length=8, data=037fd3656539a8dc SOFTWARE: length=12, value="pjnath-2.3.0" USERNAME: length=41, value="c5484af7:182c7c4f74e73d0624009e24222e9c85" MESSAGE-INTEGRITY: length=20, data=cbfecefe2dc8ed224b45a89d473f26ed4d1c4f21 FINGERPRINT: length=4, value=4205539580 (0xfaab70fc) --- end of STUN message --- [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: utsx0x7fc36c01 .....STUN client transaction created [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: utsx0x7fc36c01 .....STUN sending message (transmit count=1) [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 ....Check 2: [1] 10.37.172.89:14800-->186.XX.XX.XX:59186: state changed from Waiting to In Progress [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 .Performing delayed triggerred check for component 2 [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 ..Added new remote candidate from the request: 186.XX.XX.XX:41177 [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 ..New triggered check added: 3 [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 ...Sending connectivity check for check 3: [2] 10.37.172.89:14801-->186.XX.XX.XX:41177 [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: stuse0x7fc3800 .....TX 140 bytes STUN message to 186.XX.XX.XX:41177: --- begin STUN message --- STUN Binding request Hdr: length=120, magic=2112a442, tsx_id=00002f4d51f6852013cf2aca Attributes: PRIORITY: length=4, value=1862270974 (0x6efffffe) USE-CANDIDATE: length=0 ICE-CONTROLLING: length=8, data=037fd3656539a8dc SOFTWARE: length=12, value="pjnath-2.3.0" USERNAME: length=41, value="c5484af7:182c7c4f74e73d0624009e24222e9c85" MESSAGE-INTEGRITY: length=20, data=e3d3d2155f44c1bc0018450bceede72f1752542d FINGERPRINT: length=4, value=3685283131 (0xdba8f53b) --- end of STUN message --- [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: utsx0x7fc36c01 .....STUN client transaction created [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: utsx0x7fc36c01 .....STUN sending message (transmit count=1) [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 ....Check 3: [2] 10.37.172.89:14801-->186.XX.XX.XX:41177: state changed from Waiting to In Progress [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 .Performing delayed triggerred check for component 1 [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 ..Triggered check for check 2 not performed because it's in progress. Retransmitting [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: utsx0x7fc36c01 ...STUN sending message (transmit count=1) [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 .Performing delayed triggerred check for component 2 [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 ..Triggered check for check 3 not performed because it's in progress. Retransmitting [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: utsx0x7fc36c01 ...STUN sending message (transmit count=1) [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 Checklist: state changed from Idle to Running [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 Starting checklist periodic check [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 .Sending connectivity check for check 0: [1] 10.37.172.89:14800-->192.168.2.106:59186 [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: stuse0x7fc3800 ...TX 140 bytes STUN message to 192.168.2.106:59186: --- begin STUN message --- STUN Binding request Hdr: length=120, magic=2112a442, tsx_id=00002f4d3c3eb99a13cf2acb Attributes: PRIORITY: length=4, value=1862270975 (0x6effffff) USE-CANDIDATE: length=0 ICE-CONTROLLING: length=8, data=037fd3656539a8dc SOFTWARE: length=12, value="pjnath-2.3.0" USERNAME: length=41, value="c5484af7:182c7c4f74e73d0624009e24222e9c85" MESSAGE-INTEGRITY: length=20, data=ea83df3842bab47c1f01c09d54872c22d6001c5c FINGERPRINT: length=4, value=3483390702 (0xcfa052ee) --- end of STUN message --- [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: utsx0x7fc36c03 ...STUN client transaction created [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: utsx0x7fc36c03 ...STUN sending message (transmit count=1) [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 ..Check 0: [1] 10.37.172.89:14800-->192.168.2.106:59186: state changed from Waiting to In Progress [Jan 28 19:31:08] DEBUG[12197][C-00000003] res_rtp_asterisk.c: Setting RTCP address on RTP instance '0x7fc380016318' [Jan 28 19:31:08] VERBOSE[12197][C-00000003] chan_sip.c: Peer audio RTP is at port 0.0.0.0:9 [Jan 28 19:31:08] DEBUG[12197][C-00000003] rtp_engine.c: Copying payload 0 (0x7fc36c00d8e8) from 0x7fc3916cae60 to 0x7fc380016458 [Jan 28 19:31:08] DEBUG[12197][C-00000003] rtp_engine.c: Copying payload 101 (0x7fc36c014768) from 0x7fc3916cae60 to 0x7fc380016458 [Jan 28 19:31:08] DEBUG[12197][C-00000003] res_rtp_asterisk.c: Ignoring duplicate RTCP property on RTP instance '0x7fc380016318' [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 Role changed to Controlling [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 Check 2: [1] 10.37.172.89:10976-->192.168.2.106:43997 pruned (duplicate found) [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 Check 2: [2] 10.37.172.89:10977-->192.168.2.106:57885 pruned (duplicate found) [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 Checklist created: [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 0: [1] 10.37.172.89:10976-->192.168.2.106:43997 (not nominated, state=Frozen) [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 1: [2] 10.37.172.89:10977-->192.168.2.106:57885 (not nominated, state=Frozen) [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 Starting ICE check.. [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 .Check 0: [1] 10.37.172.89:10976-->192.168.2.106:43997: state changed from Frozen to Waiting [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 .Performing delayed triggerred check for component 1 [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 ..Added new remote candidate from the request: 186.XX.XX.XX:43997 [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 ..New triggered check added: 2 [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 ...Sending connectivity check for check 2: [1] 10.37.172.89:10976-->186.XX.XX.XX:43997 [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: stuse0x7fc3800 .....TX 140 bytes STUN message to 186.XX.XX.XX:43997: --- begin STUN message --- STUN Binding request Hdr: length=120, magic=2112a442, tsx_id=00002f4d7efcdcaa13cf2acc Attributes: PRIORITY: length=4, value=1862270975 (0x6effffff) USE-CANDIDATE: length=0 ICE-CONTROLLING: length=8, data=6a77537f6a40ee80 SOFTWARE: length=12, value="pjnath-2.3.0" USERNAME: length=41, value="c5484af7:3010cd2c58ca0d3d4caf0f0905271818" MESSAGE-INTEGRITY: length=20, data=7427d98de1e724bc3b7c5eb1525b9ee0481f7d99 FINGERPRINT: length=4, value=2141155773 (0x7f9f71bd) --- end of STUN message --- [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: utsx0x7fc36c03 .....STUN client transaction created [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: utsx0x7fc36c03 .....STUN sending message (transmit count=1) [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 ....Check 2: [1] 10.37.172.89:10976-->186.XX.XX.XX:43997: state changed from Waiting to In Progress [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 .Performing delayed triggerred check for component 2 [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 ..Added new remote candidate from the request: 186.XX.XX.XX:57885 [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 ..New triggered check added: 3 [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 ...Sending connectivity check for check 3: [2] 10.37.172.89:10977-->186.XX.XX.XX:57885 [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: stuse0x7fc3800 .....TX 140 bytes STUN message to 186.XX.XX.XX:57885: --- begin STUN message --- STUN Binding request Hdr: length=120, magic=2112a442, tsx_id=00002f4d2d9c6e1213cf2acd Attributes: PRIORITY: length=4, value=1862270974 (0x6efffffe) USE-CANDIDATE: length=0 ICE-CONTROLLING: length=8, data=6a77537f6a40ee80 SOFTWARE: length=12, value="pjnath-2.3.0" USERNAME: length=41, value="c5484af7:3010cd2c58ca0d3d4caf0f0905271818" MESSAGE-INTEGRITY: length=20, data=47142b05986a45d8ce2cfeb22d847e5eb8a942f3 FINGERPRINT: length=4, value=1733654604 (0x6755784c) --- end of STUN message --- [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: utsx0x7fc36c03 .....STUN client transaction created [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: utsx0x7fc36c03 .....STUN sending message (transmit count=1) [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 ....Check 3: [2] 10.37.172.89:10977-->186.XX.XX.XX:57885: state changed from Waiting to In Progress [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 .Performing delayed triggerred check for component 1 [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 ..Triggered check for check 2 not performed because it's in progress. Retransmitting [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: utsx0x7fc36c03 ...STUN sending message (transmit count=1) [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 .Performing delayed triggerred check for component 2 [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 ..Triggered check for check 3 not performed because it's in progress. Retransmitting [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: utsx0x7fc36c03 ...STUN sending message (transmit count=1) [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 Checklist: state changed from Idle to Running [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 Starting checklist periodic check [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 .Sending connectivity check for check 0: [1] 10.37.172.89:10976-->192.168.2.106:43997 [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: stuse0x7fc3800 ...TX 140 bytes STUN message to 192.168.2.106:43997: --- begin STUN message --- STUN Binding request Hdr: length=120, magic=2112a442, tsx_id=00002f4d7f3352aa13cf2ace Attributes: PRIORITY: length=4, value=1862270975 (0x6effffff) USE-CANDIDATE: length=0 ICE-CONTROLLING: length=8, data=6a77537f6a40ee80 SOFTWARE: length=12, value="pjnath-2.3.0" USERNAME: length=41, value="c5484af7:3010cd2c58ca0d3d4caf0f0905271818" MESSAGE-INTEGRITY: length=20, data=de67fbfbba1b22ec7d17994c707a22504aa24793 FINGERPRINT: length=4, value=152801158 (0x91b8f86) --- end of STUN message --- [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: utsx0x7fc36c04 ...STUN client transaction created [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: utsx0x7fc36c04 ...STUN sending message (transmit count=1) [Jan 28 19:31:08] DEBUG[12197][C-00000003] pjsip: icess0x7fc3800 ..Check 0: [1] 10.37.172.89:10976-->192.168.2.106:43997: state changed from Waiting to In Progress [Jan 28 19:31:08] DEBUG[12197][C-00000003] res_rtp_asterisk.c: Setting RTCP address on RTP instance '0x7fc380027e18' [Jan 28 19:31:08] VERBOSE[12197][C-00000003] chan_sip.c: Peer video RTP is at port 0.0.0.0:9 [Jan 28 19:31:08] DEBUG[12197][C-00000003] rtp_engine.c: Copying payload 100 (0x7fc36c005cc8) from 0x7fc3916caed0 to 0x7fc380027f58 [Jan 28 19:31:08] DEBUG[12197][C-00000003] chan_sip.c: We're settling with these formats: (ulaw|vp8) [Jan 28 19:31:08] DEBUG[12197][C-00000003] chan_sip.c: We have an owner, now see if we need to change this call [Jan 28 19:31:08] DEBUG[12197][C-00000003] chan_sip.c: Setting native formats after processing SDP. peer joint formats (ulaw|vp8), old nativeformats (vp8|ulaw) [Jan 28 19:31:08] DEBUG[12197][C-00000003] chan_sip.c: Updating call counter for outgoing call [Jan 28 19:31:08] DEBUG[12125] devicestate.c: No provider found, checking channel drivers for SIP - 101 [Jan 28 19:31:08] DEBUG[12125] chan_sip.c: Checking device state for peer 101 [Jan 28 19:31:08] DEBUG[12125] devicestate.c: Changing state for SIP/101 - state 1 (Not in use) [Jan 28 19:31:08] VERBOSE[12197][C-00000003] sip/route.c: sip_route_dump: route/path hop: [Jan 28 19:31:08] DEBUG[12197][C-00000003] chan_sip.c: Strict routing enforced for session 4ead8d547980693835eed3c5623cac67@10.37.172.89:5060 [Jan 28 19:31:08] VERBOSE[12197][C-00000003] chan_sip.c: Transmitting (NAT) to 186.XX.XX.XX:37687: ACK sip:7dhldjib@jvp15e71m9jt.invalid;transport=ws SIP/2.0 Via: SIP/2.0/WS 10.37.172.89:5060;branch=z9hG4bK5fee6a77;rport Max-Forwards: 70 From: "102" ;tag=as5abd6230 To: ;tag=a6tct1dgu3 Contact: Call-ID: 4ead8d547980693835eed3c5623cac67@10.37.172.89:5060 CSeq: 102 ACK User-Agent: Asterisk PBX 13.1.0 Content-Length: 0 --- [Jan 28 19:31:08] DEBUG[12197][C-00000003] chan_sip.c: Trying to put 'ACK sip:7dh' onto WS socket destined for 186.XX.XX.XX:37687 [Jan 28 19:31:08] DEBUG[12401][C-00000003] res_rtp_asterisk.c: Setting the marker bit due to a source update [Jan 28 19:31:08] DEBUG[12401][C-00000003] channel.c: Set channel SIP/102-00000006 to write format ulaw [Jan 28 19:31:08] DEBUG[12401][C-00000003] channel.c: Scheduling timer at (50 requested / 50 actual) timer ticks per second [Jan 28 19:31:08] DEBUG[12125] devicestate.c: No provider found, checking channel drivers for SIP - 101 [Jan 28 19:31:08] DEBUG[12125] chan_sip.c: Checking device state for peer 101 [Jan 28 19:31:08] DEBUG[12125] devicestate.c: Changing state for SIP/101 - state 1 (Not in use) [Jan 28 19:31:08] DEBUG[12401][C-00000003] rtp_engine.c: Setting early bridge SDP of 'SIP/102-00000006' with that of 'SIP/101-00000007' [Jan 28 19:31:08] DEBUG[12401][C-00000003] channel.c: Scheduling timer at (0 requested / 0 actual) timer ticks per second [Jan 28 19:31:08] DEBUG[12401][C-00000003] features.c: Removing dialed interfaces datastore on SIP/101-00000007 since we're bridging [Jan 28 19:31:08] DEBUG[12401][C-00000003] dahdi/bridge_native_dahdi.c: Bridge 4baaddab-9cdd-47de-b03f-cfa4bec590c1: Cannot use native DAHDI. Must have two channels. [Jan 28 19:31:08] DEBUG[12401][C-00000003] bridge.c: Bridge technology native_dahdi is not compatible with properties of existing bridge. [Jan 28 19:31:08] DEBUG[12401][C-00000003] bridge.c: Bridge technology holding_bridge does not have any capabilities we want. [Jan 28 19:31:08] DEBUG[12401][C-00000003] bridge_native_rtp.c: Bridge '4baaddab-9cdd-47de-b03f-cfa4bec590c1' can not use native RTP bridge as two channels are required [Jan 28 19:31:08] DEBUG[12401][C-00000003] bridge.c: Bridge technology native_rtp is not compatible with properties of existing bridge. [Jan 28 19:31:08] DEBUG[12401][C-00000003] bridge.c: Chose bridge technology simple_bridge [Jan 28 19:31:08] DEBUG[12401][C-00000003] bridge.c: Bridge 4baaddab-9cdd-47de-b03f-cfa4bec590c1: calling simple_bridge technology constructor [Jan 28 19:31:08] DEBUG[12401][C-00000003] bridge.c: Bridge 4baaddab-9cdd-47de-b03f-cfa4bec590c1: calling simple_bridge technology start [Jan 28 19:31:08] DEBUG[12401][C-00000003] bridge_channel.c: Bridge 4baaddab-9cdd-47de-b03f-cfa4bec590c1: 0x7fc3800763c8(SIP/102-00000006) is joining [Jan 28 19:31:08] DEBUG[12401][C-00000003] bridge_channel.c: Bridge 4baaddab-9cdd-47de-b03f-cfa4bec590c1: pushing 0x7fc3800763c8(SIP/102-00000006) [Jan 28 19:31:08] DEBUG[12401][C-00000003] dahdi/bridge_native_dahdi.c: Bridge 4baaddab-9cdd-47de-b03f-cfa4bec590c1: Cannot use native DAHDI. Must have two channels. [Jan 28 19:31:08] DEBUG[12401][C-00000003] bridge.c: Bridge technology native_dahdi is not compatible with properties of existing bridge. [Jan 28 19:31:08] DEBUG[12401][C-00000003] bridge.c: Bridge technology softmix does not have any capabilities we want. [Jan 28 19:31:08] DEBUG[12401][C-00000003] bridge.c: Bridge technology holding_bridge does not have any capabilities we want. [Jan 28 19:31:08] DEBUG[12401][C-00000003] bridge_native_rtp.c: Bridge '4baaddab-9cdd-47de-b03f-cfa4bec590c1' can not use native RTP bridge as two channels are required [Jan 28 19:31:08] DEBUG[12401][C-00000003] bridge.c: Bridge technology native_rtp is not compatible with properties of existing bridge. [Jan 28 19:31:08] DEBUG[12401][C-00000003] bridge.c: Chose bridge technology simple_bridge [Jan 28 19:31:08] DEBUG[12401][C-00000003] bridge.c: Bridge 4baaddab-9cdd-47de-b03f-cfa4bec590c1 is already using the new technology. [Jan 28 19:31:08] DEBUG[12401][C-00000003] bridge.c: Bridge 4baaddab-9cdd-47de-b03f-cfa4bec590c1 is happy that channel SIP/102-00000006 already has read format ulaw [Jan 28 19:31:08] DEBUG[12401][C-00000003] bridge.c: Bridge 4baaddab-9cdd-47de-b03f-cfa4bec590c1 is happy that channel SIP/102-00000006 already has write format ulaw [Jan 28 19:31:08] DEBUG[12401][C-00000003] bridge.c: Bridge 4baaddab-9cdd-47de-b03f-cfa4bec590c1: 0x7fc3800763c8(SIP/102-00000006) is joining simple_bridge technology [Jan 28 19:31:08] DEBUG[12401][C-00000003] res_rtp_asterisk.c: Changing ssrc from 1587710117 to 776622808 due to a source change [Jan 28 19:31:08] DEBUG[12401][C-00000003] res_rtp_asterisk.c: Changing ssrc for SRTP from 1587710117 to 776622808 [Jan 28 19:31:08] DEBUG[12401][C-00000003] res_srtp.c: Adding new policy for SSRC 776622808 [Jan 28 19:31:08] DEBUG[12401][C-00000003] res_srtp.c: Couldn't remove stream (13) [Jan 28 19:31:08] DEBUG[12410][C-00000003] bridge_channel.c: Bridge 4baaddab-9cdd-47de-b03f-cfa4bec590c1: 0x7fc380076258(SIP/101-00000007) is joining [Jan 28 19:31:08] DEBUG[12410][C-00000003] bridge_channel.c: Bridge 4baaddab-9cdd-47de-b03f-cfa4bec590c1: pushing 0x7fc380076258(SIP/101-00000007) [Jan 28 19:31:08] DEBUG[12127] cdr.c: Finalized CDR for SIP/101-00000007 - start 1422473462.219059 answer 1422473468.227502 end 1422473468.229267 dispo ANSWERED [Jan 28 19:31:08] DEBUG[12410][C-00000003] dahdi/bridge_native_dahdi.c: Channel 'SIP/102-00000006' is not DAHDI. [Jan 28 19:31:08] DEBUG[12410][C-00000003] dahdi/bridge_native_dahdi.c: Bridge 4baaddab-9cdd-47de-b03f-cfa4bec590c1: Cannot use native DAHDI. Channel 'SIP/102-00000006' not compatible. [Jan 28 19:31:08] DEBUG[12410][C-00000003] bridge.c: Bridge technology native_dahdi is not compatible with properties of existing bridge. [Jan 28 19:31:08] DEBUG[12410][C-00000003] bridge.c: Bridge technology softmix does not have any capabilities we want. [Jan 28 19:31:08] DEBUG[12410][C-00000003] bridge.c: Bridge technology holding_bridge does not have any capabilities we want. [Jan 28 19:31:08] DEBUG[12410][C-00000003] bridge_native_rtp.c: Bridge '4baaddab-9cdd-47de-b03f-cfa4bec590c1' can not use native RTP bridge as it was forbidden while getting details [Jan 28 19:31:08] DEBUG[12410][C-00000003] bridge.c: Bridge technology native_rtp is not compatible with properties of existing bridge. [Jan 28 19:31:08] DEBUG[12410][C-00000003] bridge.c: Chose bridge technology simple_bridge [Jan 28 19:31:08] DEBUG[12410][C-00000003] bridge.c: Bridge 4baaddab-9cdd-47de-b03f-cfa4bec590c1 is already using the new technology. [Jan 28 19:31:08] DEBUG[12410][C-00000003] bridge.c: Bridge 4baaddab-9cdd-47de-b03f-cfa4bec590c1 is happy that channel SIP/101-00000007 already has read format ulaw [Jan 28 19:31:08] DEBUG[12410][C-00000003] bridge.c: Bridge 4baaddab-9cdd-47de-b03f-cfa4bec590c1 is happy that channel SIP/101-00000007 already has write format ulaw [Jan 28 19:31:08] DEBUG[12410][C-00000003] bridge.c: Bridge 4baaddab-9cdd-47de-b03f-cfa4bec590c1: 0x7fc380076258(SIP/101-00000007) is joining simple_bridge technology [Jan 28 19:31:08] DEBUG[12410][C-00000003] res_rtp_asterisk.c: Not changing SSRC since we haven't sent any RTP yet [Jan 28 19:31:08] DEBUG[12147] pjsip: icess0x7fc3800 Starting checklist periodic check [Jan 28 19:31:08] DEBUG[12147] pjsip: icess0x7fc3800 .Sending connectivity check for check 1: [2] 10.37.172.89:14801-->192.168.2.106:41177 [Jan 28 19:31:08] DEBUG[12147] pjsip: stuse0x7fc3800 ...TX 140 bytes STUN message to 192.168.2.106:41177: --- begin STUN message --- STUN Binding request Hdr: length=120, magic=2112a442, tsx_id=00002f4d4a7cfe5e13cf2acf Attributes: PRIORITY: length=4, value=1862270974 (0x6efffffe) USE-CANDIDATE: length=0 ICE-CONTROLLING: length=8, data=037fd3656539a8dc SOFTWARE: length=12, value="pjnath-2.3.0" USERNAME: length=41, value="c5484af7:182c7c4f74e73d0624009e24222e9c85" MESSAGE-INTEGRITY: length=20, data=a80e9af0f48a7ba1701b143831834509680126ba FINGERPRINT: length=4, value=1948388773 (0x74220da5) --- end of STUN message --- [Jan 28 19:31:08] DEBUG[12147] pjsip: utsx0x7fc38c00 ...STUN client transaction created [Jan 28 19:31:08] DEBUG[12147] pjsip: utsx0x7fc38c00 ...STUN sending message (transmit count=1) [Jan 28 19:31:08] DEBUG[12147] pjsip: icess0x7fc3800 ..Check 1: [2] 10.37.172.89:14801-->192.168.2.106:41177: state changed from Frozen to In Progress [Jan 28 19:31:08] DEBUG[12147] pjsip: icess0x7fc3800 Starting checklist periodic check [Jan 28 19:31:08] DEBUG[12147] pjsip: icess0x7fc3800 .Sending connectivity check for check 1: [2] 10.37.172.89:10977-->192.168.2.106:57885 [Jan 28 19:31:08] DEBUG[12147] pjsip: stuse0x7fc3800 ...TX 140 bytes STUN message to 192.168.2.106:57885: --- begin STUN message --- STUN Binding request Hdr: length=120, magic=2112a442, tsx_id=00002f4d0bcc5b4713cf2ad0 Attributes: PRIORITY: length=4, value=1862270974 (0x6efffffe) USE-CANDIDATE: length=0 ICE-CONTROLLING: length=8, data=6a77537f6a40ee80 SOFTWARE: length=12, value="pjnath-2.3.0" USERNAME: length=41, value="c5484af7:3010cd2c58ca0d3d4caf0f0905271818" MESSAGE-INTEGRITY: length=20, data=e190fb3c990bf6ccb6492dc4c9b20521b06db380 FINGERPRINT: length=4, value=2862444064 (0xaa9d6e20) --- end of STUN message --- [Jan 28 19:31:08] DEBUG[12147] pjsip: utsx0x7fc38c07 ...STUN client transaction created [Jan 28 19:31:08] DEBUG[12147] pjsip: utsx0x7fc38c07 ...STUN sending message (transmit count=1) [Jan 28 19:31:08] DEBUG[12147] pjsip: icess0x7fc3800 ..Check 1: [2] 10.37.172.89:10977-->192.168.2.106:57885: state changed from Frozen to In Progress [Jan 28 19:31:08] DEBUG[12410][C-00000003] res_rtp_asterisk.c: Ooh, format changed from none to vp8 [Jan 28 19:31:08] DEBUG[12410][C-00000003] res_rtp_asterisk.c: Starting RTCP transmission on RTP instance '0x7fc380027e18' [Jan 28 19:31:08] DEBUG[12147] pjsip: icess0x7fc3800 Starting checklist periodic check [Jan 28 19:31:08] DEBUG[12147] pjsip: icess0x7fc3800 Starting checklist periodic check [Jan 28 19:31:08] DEBUG[12410][C-00000003] res_rtp_asterisk.c: Ooh, format changed from none to ulaw [Jan 28 19:31:08] DEBUG[12410][C-00000003] res_rtp_asterisk.c: Starting RTCP transmission on RTP instance '0x7fc380016318' [Jan 28 19:31:08] DEBUG[12147] pjsip: utsx0x7fc36c01 STUN sending message (transmit count=2) [Jan 28 19:31:08] DEBUG[12147] pjsip: utsx0x7fc36c01 STUN sending message (transmit count=2) [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: stuse0x7fc3800 .RX 64 bytes STUN message from 186.XX.XX.XX:59186: --- begin STUN message --- STUN Binding success response Hdr: length=44, magic=2112a442, tsx_id=00002f4d414f5ce913cf2ac9 Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=59.XX.XX.XX:14800 MESSAGE-INTEGRITY: length=20, data=af470e202e44100ac29c4706f35c5ec9581a902c FINGERPRINT: length=4, value=2503289754 (0x95352b9a) --- end of STUN message --- [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: icess0x7fc3800 .Check 2: [1] 10.37.172.89:14800-->186.XX.XX.XX:59186 (nominated): connectivity check SUCCESS [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: icess0x7fc3800 .Check 2: [1] 10.37.172.89:14800-->186.XX.XX.XX:59186: state changed from In Progress to Succeeded [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: icess0x7fc3800 .Check 2 is successful and nominated [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: icess0x7fc3800 .Cancelling check 0: [1] 10.37.172.89:14800-->192.168.2.106:59186 (In Progress) [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: stun_session.c .tdata 0x7fc36c035b78 destroy request, force=0, tsx=0x7fc36c035d60 [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: utsx0x7fc36c03 .STUN transaction 0x7fc36c035d60 schedule destroy [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: icess0x7fc3800 .Check 0: [1] 10.37.172.89:14800-->192.168.2.106:59186: state changed from In Progress to Failed [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: stun_session.c .tdata 0x7fc36c01a8b8 destroy request, force=0, tsx=0x7fc36c01aaa0 [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: utsx0x7fc36c01 .STUN transaction 0x7fc36c01aaa0 schedule destroy [Jan 28 19:31:08] DEBUG[12147] pjsip: utsx0x7fc36c03 STUN sending message (transmit count=2) [Jan 28 19:31:08] DEBUG[12147] pjsip: utsx0x7fc36c03 STUN sending message (transmit count=2) [Jan 28 19:31:08] DEBUG[12147] pjsip: utsx0x7fc36c04 STUN sending message (transmit count=2) [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: stuse0x7fc3800 .RX 64 bytes STUN message from 186.XX.XX.XX:59186: --- begin STUN message --- STUN Binding success response Hdr: length=44, magic=2112a442, tsx_id=00002f4d414f5ce913cf2ac9 Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=59.XX.XX.XX:14800 MESSAGE-INTEGRITY: length=20, data=af470e202e44100ac29c4706f35c5ec9581a902c FINGERPRINT: length=4, value=2503289754 (0x95352b9a) --- end of STUN message --- [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: stuse0x7fc3800 .RX 64 bytes STUN message from 186.XX.XX.XX:41177: --- begin STUN message --- STUN Binding success response Hdr: length=44, magic=2112a442, tsx_id=00002f4d51f6852013cf2aca Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=59.XX.XX.XX:14801 MESSAGE-INTEGRITY: length=20, data=1a57852a8334a137316c7396ba8ce4451f20a7d9 FINGERPRINT: length=4, value=59598929 (0x38d6851) --- end of STUN message --- [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: icess0x7fc3800 .Check 3: [2] 10.37.172.89:14801-->186.XX.XX.XX:41177 (nominated): connectivity check SUCCESS [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: icess0x7fc3800 .Check 3: [2] 10.37.172.89:14801-->186.XX.XX.XX:41177: state changed from In Progress to Succeeded [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: icess0x7fc3800 .Check 3 is successful and nominated [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: icess0x7fc3800 .Cancelling check 1: [2] 10.37.172.89:14801-->192.168.2.106:41177 (In Progress) [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: stun_session.c .tdata 0x7fc38c0053d8 destroy request, force=0, tsx=0x7fc38c0055c0 [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: utsx0x7fc38c00 .STUN transaction 0x7fc38c0055c0 schedule destroy [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: icess0x7fc3800 .Check 1: [2] 10.37.172.89:14801-->192.168.2.106:41177: state changed from In Progress to Failed [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: icess0x7fc3800 .ICE process complete, status=Success [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: icess0x7fc3800 .Valid list [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: icess0x7fc3800 . 0: [1] 59.XX.XX.XX:14800-->186.XX.XX.XX:59186 (nominated, state=Succeeded) [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: icess0x7fc3800 . 1: [2] 59.XX.XX.XX:14801-->186.XX.XX.XX:41177 (nominated, state=Succeeded) [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: stun_session.c .tdata 0x7fc36c01d3b8 destroy request, force=0, tsx=0x7fc36c01d5a0 [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: utsx0x7fc36c01 .STUN transaction 0x7fc36c01d5a0 schedule destroy [Jan 28 19:31:08] DEBUG[12147] netsock2.c: Splitting '186.XX.XX.XX' into... [Jan 28 19:31:08] DEBUG[12147] netsock2.c: ...host '186.XX.XX.XX' and port ''. [Jan 28 19:31:08] DEBUG[12147] res_rtp_asterisk.c: Setting RTCP address on RTP instance '0x7fc380016318' [Jan 28 19:31:08] DEBUG[12147] netsock2.c: Splitting '186.XX.XX.XX' into... [Jan 28 19:31:08] DEBUG[12147] netsock2.c: ...host '186.XX.XX.XX' and port ''. [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: stuse0x7fc3800 .RX 64 bytes STUN message from 186.XX.XX.XX:41177: --- begin STUN message --- STUN Binding success response Hdr: length=44, magic=2112a442, tsx_id=00002f4d51f6852013cf2aca Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=59.XX.XX.XX:14801 MESSAGE-INTEGRITY: length=20, data=1a57852a8334a137316c7396ba8ce4451f20a7d9 FINGERPRINT: length=4, value=59598929 (0x38d6851) --- end of STUN message --- [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: stuse0x7fc3800 .RX 64 bytes STUN message from 186.XX.XX.XX:43997: --- begin STUN message --- STUN Binding success response Hdr: length=44, magic=2112a442, tsx_id=00002f4d7efcdcaa13cf2acc Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=59.XX.XX.XX:10976 MESSAGE-INTEGRITY: length=20, data=1804c11e91bc856a34eab87a1614ebe688a6d7e2 FINGERPRINT: length=4, value=2425249585 (0x908e5f31) --- end of STUN message --- [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: icess0x7fc3800 .Check 2: [1] 10.37.172.89:10976-->186.XX.XX.XX:43997 (nominated): connectivity check SUCCESS [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: icess0x7fc3800 .Check 2: [1] 10.37.172.89:10976-->186.XX.XX.XX:43997: state changed from In Progress to Succeeded [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: icess0x7fc3800 .Check 2 is successful and nominated [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: icess0x7fc3800 .Cancelling check 0: [1] 10.37.172.89:10976-->192.168.2.106:43997 (In Progress) [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: stun_session.c .tdata 0x7fc36c042238 destroy request, force=0, tsx=0x7fc36c042420 [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: utsx0x7fc36c04 .STUN transaction 0x7fc36c042420 schedule destroy [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: icess0x7fc3800 .Check 0: [1] 10.37.172.89:10976-->192.168.2.106:43997: state changed from In Progress to Failed [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: stun_session.c .tdata 0x7fc36c03b8d8 destroy request, force=0, tsx=0x7fc36c03bac0 [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: utsx0x7fc36c03 .STUN transaction 0x7fc36c03bac0 schedule destroy [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: stuse0x7fc3800 .RX 64 bytes STUN message from 186.XX.XX.XX:43997: --- begin STUN message --- STUN Binding success response Hdr: length=44, magic=2112a442, tsx_id=00002f4d7efcdcaa13cf2acc Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=59.XX.XX.XX:10976 MESSAGE-INTEGRITY: length=20, data=1804c11e91bc856a34eab87a1614ebe688a6d7e2 FINGERPRINT: length=4, value=2425249585 (0x908e5f31) --- end of STUN message --- [Jan 28 19:31:08] DEBUG[12147] pjsip: utsx0x7fc38c07 STUN sending message (transmit count=2) [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: stuse0x7fc3800 .RX 64 bytes STUN message from 186.XX.XX.XX:57885: --- begin STUN message --- STUN Binding success response Hdr: length=44, magic=2112a442, tsx_id=00002f4d2d9c6e1213cf2acd Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=59.XX.XX.XX:10977 MESSAGE-INTEGRITY: length=20, data=335e5229c65272e485da56578ecbc7284f034f19 FINGERPRINT: length=4, value=1305632189 (0x4dd25dbd) --- end of STUN message --- [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: icess0x7fc3800 .Check 3: [2] 10.37.172.89:10977-->186.XX.XX.XX:57885 (nominated): connectivity check SUCCESS [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: icess0x7fc3800 .Check 3: [2] 10.37.172.89:10977-->186.XX.XX.XX:57885: state changed from In Progress to Succeeded [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: icess0x7fc3800 .Check 3 is successful and nominated [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: icess0x7fc3800 .Cancelling check 1: [2] 10.37.172.89:10977-->192.168.2.106:57885 (In Progress) [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: stun_session.c .tdata 0x7fc38c0772c8 destroy request, force=0, tsx=0x7fc38c0774b0 [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: utsx0x7fc38c07 .STUN transaction 0x7fc38c0774b0 schedule destroy [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: icess0x7fc3800 .Check 1: [2] 10.37.172.89:10977-->192.168.2.106:57885: state changed from In Progress to Failed [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: icess0x7fc3800 .ICE process complete, status=Success [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: icess0x7fc3800 .Valid list [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: icess0x7fc3800 . 0: [1] 59.XX.XX.XX:10976-->186.XX.XX.XX:43997 (nominated, state=Succeeded) [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: icess0x7fc3800 . 1: [2] 59.XX.XX.XX:10977-->186.XX.XX.XX:57885 (nominated, state=Succeeded) [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: stun_session.c .tdata 0x7fc36c03e3d8 destroy request, force=0, tsx=0x7fc36c03e5c0 [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: utsx0x7fc36c03 .STUN transaction 0x7fc36c03e5c0 schedule destroy [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: stuse0x7fc3800 .RX 64 bytes STUN message from 186.XX.XX.XX:57885: --- begin STUN message --- STUN Binding success response Hdr: length=44, magic=2112a442, tsx_id=00002f4d2d9c6e1213cf2acd Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=59.XX.XX.XX:10977 MESSAGE-INTEGRITY: length=20, data=335e5229c65272e485da56578ecbc7284f034f19 FINGERPRINT: length=4, value=1305632189 (0x4dd25dbd) --- end of STUN message --- [Jan 28 19:31:08] DEBUG[12147] netsock2.c: Splitting '186.XX.XX.XX' into... [Jan 28 19:31:08] DEBUG[12147] netsock2.c: ...host '186.XX.XX.XX' and port ''. [Jan 28 19:31:08] DEBUG[12147] res_rtp_asterisk.c: Setting RTCP address on RTP instance '0x7fc380027e18' [Jan 28 19:31:08] DEBUG[12147] netsock2.c: Splitting '186.XX.XX.XX' into... [Jan 28 19:31:08] DEBUG[12147] netsock2.c: ...host '186.XX.XX.XX' and port ''. [Jan 28 19:31:08] DEBUG[12150] chan_sip.c: Auto destroying SIP dialog 'tneuhruf1l6596af282bdr' [Jan 28 19:31:08] DEBUG[12150] chan_sip.c: Destroying SIP dialog tneuhruf1l6596af282bdr [Jan 28 19:31:08] VERBOSE[12150] chan_sip.c: Really destroying SIP dialog 'tneuhruf1l6596af282bdr' Method: REGISTER [Jan 28 19:31:08] DEBUG[12147] pjsip: stuse0x7fc3880 Response cache deleted [Jan 28 19:31:08] DEBUG[12147] pjsip: stun_session.c tdata 0x7fc38005c068 destroy request, force=0, tsx=(nil) [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: stuse0x7fc3800 .RX 64 bytes STUN message from 186.XX.XX.XX:59186: --- begin STUN message --- STUN Binding success response Hdr: length=44, magic=2112a442, tsx_id=00002f4d414f5ce913cf2ac9 Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=59.XX.XX.XX:14800 MESSAGE-INTEGRITY: length=20, data=af470e202e44100ac29c4706f35c5ec9581a902c FINGERPRINT: length=4, value=2503289754 (0x95352b9a) --- end of STUN message --- [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: stuse0x7fc3800 .RX 64 bytes STUN message from 186.XX.XX.XX:41177: --- begin STUN message --- STUN Binding success response Hdr: length=44, magic=2112a442, tsx_id=00002f4d51f6852013cf2aca Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=59.XX.XX.XX:14801 MESSAGE-INTEGRITY: length=20, data=1a57852a8334a137316c7396ba8ce4451f20a7d9 FINGERPRINT: length=4, value=59598929 (0x38d6851) --- end of STUN message --- [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: stuse0x7fc3800 .RX 64 bytes STUN message from 186.XX.XX.XX:57885: --- begin STUN message --- STUN Binding success response Hdr: length=44, magic=2112a442, tsx_id=00002f4d2d9c6e1213cf2acd Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=59.XX.XX.XX:10977 MESSAGE-INTEGRITY: length=20, data=335e5229c65272e485da56578ecbc7284f034f19 FINGERPRINT: length=4, value=1305632189 (0x4dd25dbd) --- end of STUN message --- [Jan 28 19:31:08] DEBUG[12410][C-00000003] pjsip: stuse0x7fc3800 .RX 64 bytes STUN message from 186.XX.XX.XX:43997: --- begin STUN message --- STUN Binding success response Hdr: length=44, magic=2112a442, tsx_id=00002f4d7efcdcaa13cf2acc Attributes: XOR-MAPPED-ADDRESS: length=8, IPv4 addr=59.XX.XX.XX:10976 MESSAGE-INTEGRITY: length=20, data=1804c11e91bc856a34eab87a1614ebe688a6d7e2 FINGERPRINT: length=4, value=2425249585 (0x908e5f31) --- end of STUN message --- [Jan 28 19:31:08] DEBUG[12410][C-00000003] res_srtp.c: Adding new policy for SSRC 257067918 [Jan 28 19:31:08] DEBUG[12410][C-00000003] res_srtp.c: Adding new policy for SSRC 1473912179 [Jan 28 19:31:08] DEBUG[12147] pjsip: utsx0x7fc36c01 STUN client transaction 0x7fc36c01aaa0 stopped, ref_cnt=12 [Jan 28 19:31:08] DEBUG[12147] pjsip: stun_session.c STUN transaction 0x7fc36c01aaa0 destroyed [Jan 28 19:31:08] DEBUG[12147] pjsip: utsx0x7fc36c03 STUN client transaction 0x7fc36c035d60 stopped, ref_cnt=11 [Jan 28 19:31:08] DEBUG[12147] pjsip: stun_session.c STUN transaction 0x7fc36c035d60 destroyed [Jan 28 19:31:08] DEBUG[12147] pjsip: utsx0x7fc38c00 STUN client transaction 0x7fc38c0055c0 stopped, ref_cnt=10 [Jan 28 19:31:08] DEBUG[12147] pjsip: stun_session.c STUN transaction 0x7fc38c0055c0 destroyed [Jan 28 19:31:08] DEBUG[12147] pjsip: utsx0x7fc36c01 STUN client transaction 0x7fc36c01d5a0 stopped, ref_cnt=9 [Jan 28 19:31:08] DEBUG[12147] pjsip: stun_session.c STUN transaction 0x7fc36c01d5a0 destroyed [Jan 28 19:31:08] DEBUG[12147] pjsip: utsx0x7fc36c04 STUN client transaction 0x7fc36c042420 stopped, ref_cnt=12 [Jan 28 19:31:08] DEBUG[12147] pjsip: stun_session.c STUN transaction 0x7fc36c042420 destroyed [Jan 28 19:31:08] DEBUG[12147] pjsip: utsx0x7fc36c03 STUN client transaction 0x7fc36c03bac0 stopped, ref_cnt=11 [Jan 28 19:31:08] DEBUG[12147] pjsip: stun_session.c STUN transaction 0x7fc36c03bac0 destroyed [Jan 28 19:31:08] DEBUG[12147] pjsip: utsx0x7fc38c07 STUN client transaction 0x7fc38c0774b0 stopped, ref_cnt=10 [Jan 28 19:31:08] DEBUG[12147] pjsip: stun_session.c STUN transaction 0x7fc38c0774b0 destroyed [Jan 28 19:31:08] DEBUG[12147] pjsip: utsx0x7fc36c03 STUN client transaction 0x7fc36c03e5c0 stopped, ref_cnt=9 [Jan 28 19:31:08] DEBUG[12147] pjsip: stun_session.c STUN transaction 0x7fc36c03e5c0 destroyed [Jan 28 19:31:08] DEBUG[12410][C-00000003] res_rtp_asterisk.c: 0x7fc38001bf60 -- Probation learning mode pass with source address 186.XX.XX.XX:59186 [Jan 28 19:31:08] DEBUG[12410][C-00000003] res_rtp_asterisk.c: 0x7fc3800286b0 -- Probation learning mode pass with source address 186.XX.XX.XX:43997 [Jan 28 19:31:08] DEBUG[12401][C-00000003] res_rtp_asterisk.c: Ooh, format changed from none to vp8 [Jan 28 19:31:09] DEBUG[12147] pjsip: stuse0x7fc3880 Response cache deleted [Jan 28 19:31:09] DEBUG[12147] pjsip: stun_session.c tdata 0x7fc3800079d8 destroy request, force=0, tsx=(nil) [Jan 28 19:31:09] DEBUG[12147] pjsip: stuse0x7fc3880 Response cache deleted [Jan 28 19:31:09] DEBUG[12147] pjsip: stun_session.c tdata 0x7fc38004d838 destroy request, force=0, tsx=(nil) [Jan 28 19:31:09] DEBUG[12147] pjsip: stuse0x7fc3880 Response cache deleted [Jan 28 19:31:09] DEBUG[12147] pjsip: stun_session.c tdata 0x7fc380031f78 destroy request, force=0, tsx=(nil) [Jan 28 19:31:09] DEBUG[12147] pjsip: stuse0x7fc3880 Response cache deleted [Jan 28 19:31:09] DEBUG[12147] pjsip: stun_session.c tdata 0x7fc38004b828 destroy request, force=0, tsx=(nil) [Jan 28 19:31:09] DEBUG[12147] pjsip: stuse0x7fc3880 Response cache deleted [Jan 28 19:31:09] DEBUG[12147] pjsip: stun_session.c tdata 0x7fc38004c7e8 destroy request, force=0, tsx=(nil) [Jan 28 19:31:09] DEBUG[12147] pjsip: stuse0x7fc3880 .TX 20 bytes STUN message to 186.XX.XX.XX:58090: --- begin STUN message --- STUN Binding indication Hdr: length=0, magic=2112a442, tsx_id=00002f4d18fe76ab13cf2ad1 Attributes: --- end of STUN message --- [Jan 28 19:31:09] DEBUG[12147] pjsip: stun_session.c .tdata 0x7fc38c0053d8 destroy request, force=0, tsx=(nil) [Jan 28 19:31:09] DEBUG[12147] pjsip: stuse0x7fc3880 Response cache deleted [Jan 28 19:31:09] DEBUG[12147] pjsip: stun_session.c tdata 0x7fc3800043b8 destroy request, force=0, tsx=(nil) [Jan 28 19:31:09] DEBUG[12410][C-00000003] res_rtp_asterisk.c: Difference is 8100, ms is 128 (11520), pred/ts/samples 98370/90270/3420 [Jan 28 19:31:09] DEBUG[12401][C-00000003] res_rtp_asterisk.c: Difference is 9090, ms is 132 (11880), pred/ts/samples 55530/46440/2790 [Jan 28 19:31:09] WARNING[12401][C-00000003] res_srtp.c: SRTP unprotect failed with: authentication failure 10 [Jan 28 19:31:09] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:09] DEBUG[12150] netsock2.c: Splitting 'ip-10-37-172-89' into... [Jan 28 19:31:09] DEBUG[12150] netsock2.c: ...host 'ip-10-37-172-89' and port ''. [Jan 28 19:31:09] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:09] DEBUG[12150] acl.c: Attached to given IP address [Jan 28 19:31:09] DEBUG[12174] netsock2.c: Splitting '10.37.172.89:0' into... [Jan 28 19:31:09] DEBUG[12174] netsock2.c: ...host '10.37.172.89' and port '0'. [Jan 28 19:31:09] DEBUG[12174] netsock2.c: Splitting '186.XX.XX.XX:39849' into... [Jan 28 19:31:09] DEBUG[12174] netsock2.c: ...host '186.XX.XX.XX' and port '39849'. [Jan 28 19:31:09] DEBUG[12147] pjsip: stuse0x7fc3880 .TX 20 bytes STUN message to 186.XX.XX.XX:42932: --- begin STUN message --- STUN Binding indication Hdr: length=0, magic=2112a442, tsx_id=00002f4d45ce376713cf2ad2 Attributes: --- end of STUN message --- [Jan 28 19:31:09] DEBUG[12147] pjsip: stun_session.c .tdata 0x7fc38c0053d8 destroy request, force=0, tsx=(nil) [Jan 28 19:31:10] DEBUG[12410][C-00000003] res_rtp_asterisk.c: Difference is 20160, ms is 261 (23490), pred/ts/samples 133470/113310/3330 [Jan 28 19:31:10] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:10] DEBUG[12150] netsock2.c: Splitting 'ip-10-37-172-89' into... [Jan 28 19:31:10] DEBUG[12150] netsock2.c: ...host 'ip-10-37-172-89' and port ''. [Jan 28 19:31:10] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:10] DEBUG[12150] acl.c: Attached to given IP address [Jan 28 19:31:10] DEBUG[12174] netsock2.c: Splitting '10.37.172.89:0' into... [Jan 28 19:31:10] DEBUG[12174] netsock2.c: ...host '10.37.172.89' and port '0'. [Jan 28 19:31:10] DEBUG[12174] netsock2.c: Splitting '186.XX.XX.XX:58631' into... [Jan 28 19:31:10] DEBUG[12174] netsock2.c: ...host '186.XX.XX.XX' and port '58631'. [Jan 28 19:31:13] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:13] DEBUG[12150] netsock2.c: Splitting 'ip-10-37-172-89' into... [Jan 28 19:31:13] DEBUG[12150] netsock2.c: ...host 'ip-10-37-172-89' and port ''. [Jan 28 19:31:13] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:13] DEBUG[12150] acl.c: Attached to given IP address [Jan 28 19:31:13] DEBUG[12174] netsock2.c: Splitting '10.37.172.89:0' into... [Jan 28 19:31:13] DEBUG[12174] netsock2.c: ...host '10.37.172.89' and port '0'. [Jan 28 19:31:13] DEBUG[12174] netsock2.c: Splitting '186.XX.XX.XX:57885' into... [Jan 28 19:31:13] DEBUG[12174] netsock2.c: ...host '186.XX.XX.XX' and port '57885'. [Jan 28 19:31:13] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:13] DEBUG[12150] netsock2.c: Splitting 'ip-10-37-172-89' into... [Jan 28 19:31:13] DEBUG[12150] netsock2.c: ...host 'ip-10-37-172-89' and port ''. [Jan 28 19:31:13] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:13] DEBUG[12150] acl.c: Attached to given IP address [Jan 28 19:31:13] DEBUG[12174] netsock2.c: Splitting '10.37.172.89:0' into... [Jan 28 19:31:13] DEBUG[12174] netsock2.c: ...host '10.37.172.89' and port '0'. [Jan 28 19:31:13] DEBUG[12174] netsock2.c: Splitting '186.XX.XX.XX:41177' into... [Jan 28 19:31:13] DEBUG[12174] netsock2.c: ...host '186.XX.XX.XX' and port '41177'. [Jan 28 19:31:14] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:14] DEBUG[12150] netsock2.c: Splitting 'ip-10-37-172-89' into... [Jan 28 19:31:14] DEBUG[12150] netsock2.c: ...host 'ip-10-37-172-89' and port ''. [Jan 28 19:31:14] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:14] DEBUG[12150] acl.c: Attached to given IP address [Jan 28 19:31:14] DEBUG[12174] netsock2.c: Splitting '10.37.172.89:0' into... [Jan 28 19:31:14] DEBUG[12174] netsock2.c: ...host '10.37.172.89' and port '0'. [Jan 28 19:31:14] DEBUG[12174] netsock2.c: Splitting '186.XX.XX.XX:39849' into... [Jan 28 19:31:14] DEBUG[12174] netsock2.c: ...host '186.XX.XX.XX' and port '39849'. [Jan 28 19:31:15] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:15] DEBUG[12150] netsock2.c: Splitting 'ip-10-37-172-89' into... [Jan 28 19:31:15] DEBUG[12150] netsock2.c: ...host 'ip-10-37-172-89' and port ''. [Jan 28 19:31:15] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:15] DEBUG[12150] acl.c: Attached to given IP address [Jan 28 19:31:15] DEBUG[12174] netsock2.c: Splitting '10.37.172.89:0' into... [Jan 28 19:31:15] DEBUG[12174] netsock2.c: ...host '10.37.172.89' and port '0'. [Jan 28 19:31:15] DEBUG[12174] netsock2.c: Splitting '186.XX.XX.XX:58631' into... [Jan 28 19:31:15] DEBUG[12174] netsock2.c: ...host '186.XX.XX.XX' and port '58631'. [Jan 28 19:31:16] DEBUG[12147] pjsip: stuse0x7fc3800 Response cache deleted [Jan 28 19:31:16] DEBUG[12147] pjsip: stun_session.c tdata 0x7fc3800665b8 destroy request, force=0, tsx=(nil) [Jan 28 19:31:16] DEBUG[12147] pjsip: stuse0x7fc3800 Response cache deleted [Jan 28 19:31:16] DEBUG[12147] pjsip: stun_session.c tdata 0x7fc380066db8 destroy request, force=0, tsx=(nil) [Jan 28 19:31:16] DEBUG[12147] pjsip: stuse0x7fc3800 Response cache deleted [Jan 28 19:31:16] DEBUG[12147] pjsip: stun_session.c tdata 0x7fc380068118 destroy request, force=0, tsx=(nil) [Jan 28 19:31:16] DEBUG[12147] pjsip: stuse0x7fc3800 Response cache deleted [Jan 28 19:31:16] DEBUG[12147] pjsip: stun_session.c tdata 0x7fc380068918 destroy request, force=0, tsx=(nil) [Jan 28 19:31:16] DEBUG[12147] pjsip: stuse0x7fc3800 Response cache deleted [Jan 28 19:31:16] DEBUG[12147] pjsip: stun_session.c tdata 0x7fc380069118 destroy request, force=0, tsx=(nil) [Jan 28 19:31:16] DEBUG[12147] pjsip: stuse0x7fc3800 Response cache deleted [Jan 28 19:31:16] DEBUG[12147] pjsip: stun_session.c tdata 0x7fc380069918 destroy request, force=0, tsx=(nil) [Jan 28 19:31:16] DEBUG[12147] pjsip: stuse0x7fc3800 Response cache deleted [Jan 28 19:31:16] DEBUG[12147] pjsip: stun_session.c tdata 0x7fc38006f158 destroy request, force=0, tsx=(nil) [Jan 28 19:31:16] DEBUG[12147] pjsip: stuse0x7fc3800 Response cache deleted [Jan 28 19:31:16] DEBUG[12147] pjsip: stun_session.c tdata 0x7fc38006fb68 destroy request, force=0, tsx=(nil) [Jan 28 19:31:17] DEBUG[12401][C-00000003] res_rtp_asterisk.c: Difference is 7290, ms is 151 (13590), pred/ts/samples 749520/756810/20880 [Jan 28 19:31:18] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:18] DEBUG[12150] netsock2.c: Splitting 'ip-10-37-172-89' into... [Jan 28 19:31:18] DEBUG[12150] netsock2.c: ...host 'ip-10-37-172-89' and port ''. [Jan 28 19:31:18] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:18] DEBUG[12150] acl.c: Attached to given IP address [Jan 28 19:31:18] DEBUG[12174] netsock2.c: Splitting '10.37.172.89:0' into... [Jan 28 19:31:18] DEBUG[12174] netsock2.c: ...host '10.37.172.89' and port '0'. [Jan 28 19:31:18] DEBUG[12174] netsock2.c: Splitting '186.XX.XX.XX:57885' into... [Jan 28 19:31:18] DEBUG[12174] netsock2.c: ...host '186.XX.XX.XX' and port '57885'. [Jan 28 19:31:18] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:18] DEBUG[12150] netsock2.c: Splitting 'ip-10-37-172-89' into... [Jan 28 19:31:18] DEBUG[12150] netsock2.c: ...host 'ip-10-37-172-89' and port ''. [Jan 28 19:31:18] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:18] DEBUG[12150] acl.c: Attached to given IP address [Jan 28 19:31:18] DEBUG[12174] netsock2.c: Splitting '10.37.172.89:0' into... [Jan 28 19:31:18] DEBUG[12174] netsock2.c: ...host '10.37.172.89' and port '0'. [Jan 28 19:31:18] DEBUG[12174] netsock2.c: Splitting '186.XX.XX.XX:41177' into... [Jan 28 19:31:18] DEBUG[12174] netsock2.c: ...host '186.XX.XX.XX' and port '41177'. [Jan 28 19:31:19] DEBUG[12147] pjsip: stuse0x7fc3800 .TX 20 bytes STUN message to 186.XX.XX.XX:43997: --- begin STUN message --- STUN Binding indication Hdr: length=0, magic=2112a442, tsx_id=00002f4d5c2d836913cf2ad3 Attributes: --- end of STUN message --- [Jan 28 19:31:19] DEBUG[12147] pjsip: stun_session.c .tdata 0x7fc38c0053d8 destroy request, force=0, tsx=(nil) [Jan 28 19:31:19] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:19] DEBUG[12150] netsock2.c: Splitting 'ip-10-37-172-89' into... [Jan 28 19:31:19] DEBUG[12150] netsock2.c: ...host 'ip-10-37-172-89' and port ''. [Jan 28 19:31:19] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:19] DEBUG[12150] acl.c: Attached to given IP address [Jan 28 19:31:19] DEBUG[12174] netsock2.c: Splitting '10.37.172.89:0' into... [Jan 28 19:31:19] DEBUG[12174] netsock2.c: ...host '10.37.172.89' and port '0'. [Jan 28 19:31:19] DEBUG[12174] netsock2.c: Splitting '186.XX.XX.XX:39849' into... [Jan 28 19:31:19] DEBUG[12174] netsock2.c: ...host '186.XX.XX.XX' and port '39849'. [Jan 28 19:31:19] DEBUG[12147] pjsip: stuse0x7fc3880 .TX 20 bytes STUN message to 186.XX.XX.XX:58631: --- begin STUN message --- STUN Binding indication Hdr: length=0, magic=2112a442, tsx_id=00002f4d00438b6213cf2ad4 Attributes: --- end of STUN message --- [Jan 28 19:31:19] DEBUG[12147] pjsip: stun_session.c .tdata 0x7fc38c0053d8 destroy request, force=0, tsx=(nil) [Jan 28 19:31:20] DEBUG[12147] pjsip: stuse0x7fc3800 .TX 20 bytes STUN message to 186.XX.XX.XX:59186: --- begin STUN message --- STUN Binding indication Hdr: length=0, magic=2112a442, tsx_id=00002f4d36153c5a13cf2ad5 Attributes: --- end of STUN message --- [Jan 28 19:31:20] DEBUG[12147] pjsip: stun_session.c .tdata 0x7fc38c0053d8 destroy request, force=0, tsx=(nil) [Jan 28 19:31:20] DEBUG[12147] pjsip: stuse0x7fc3880 .TX 20 bytes STUN message to 186.XX.XX.XX:39849: --- begin STUN message --- STUN Binding indication Hdr: length=0, magic=2112a442, tsx_id=00002f4d37170b7c13cf2ad6 Attributes: --- end of STUN message --- [Jan 28 19:31:20] DEBUG[12147] pjsip: stun_session.c .tdata 0x7fc38c0053d8 destroy request, force=0, tsx=(nil) [Jan 28 19:31:20] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:20] DEBUG[12150] netsock2.c: Splitting 'ip-10-37-172-89' into... [Jan 28 19:31:20] DEBUG[12150] netsock2.c: ...host 'ip-10-37-172-89' and port ''. [Jan 28 19:31:20] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:20] DEBUG[12150] acl.c: Attached to given IP address [Jan 28 19:31:20] DEBUG[12174] netsock2.c: Splitting '10.37.172.89:0' into... [Jan 28 19:31:20] DEBUG[12174] netsock2.c: ...host '10.37.172.89' and port '0'. [Jan 28 19:31:20] DEBUG[12174] netsock2.c: Splitting '186.XX.XX.XX:58631' into... [Jan 28 19:31:20] DEBUG[12174] netsock2.c: ...host '186.XX.XX.XX' and port '58631'. [Jan 28 19:31:22] DEBUG[12410][C-00000003] res_rtp_asterisk.c: Difference is 9000, ms is 66 (5940), pred/ts/samples 1290960/1299960/14940 [Jan 28 19:31:22] DEBUG[12401][C-00000003] res_rtp_asterisk.c: Difference is 9360, ms is 129 (11610), pred/ts/samples 1219770/1229130/20970 [Jan 28 19:31:23] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:23] DEBUG[12150] netsock2.c: Splitting 'ip-10-37-172-89' into... [Jan 28 19:31:23] DEBUG[12150] netsock2.c: ...host 'ip-10-37-172-89' and port ''. [Jan 28 19:31:23] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:23] DEBUG[12150] acl.c: Attached to given IP address [Jan 28 19:31:23] DEBUG[12174] netsock2.c: Splitting '10.37.172.89:0' into... [Jan 28 19:31:23] DEBUG[12174] netsock2.c: ...host '10.37.172.89' and port '0'. [Jan 28 19:31:23] DEBUG[12174] netsock2.c: Splitting '186.XX.XX.XX:57885' into... [Jan 28 19:31:23] DEBUG[12174] netsock2.c: ...host '186.XX.XX.XX' and port '57885'. [Jan 28 19:31:23] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:23] DEBUG[12150] netsock2.c: Splitting 'ip-10-37-172-89' into... [Jan 28 19:31:23] DEBUG[12150] netsock2.c: ...host 'ip-10-37-172-89' and port ''. [Jan 28 19:31:23] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:23] DEBUG[12150] acl.c: Attached to given IP address [Jan 28 19:31:23] DEBUG[12174] netsock2.c: Splitting '10.37.172.89:0' into... [Jan 28 19:31:23] DEBUG[12174] netsock2.c: ...host '10.37.172.89' and port '0'. [Jan 28 19:31:23] DEBUG[12174] netsock2.c: Splitting '186.XX.XX.XX:41177' into... [Jan 28 19:31:23] DEBUG[12174] netsock2.c: ...host '186.XX.XX.XX' and port '41177'. [Jan 28 19:31:24] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:24] DEBUG[12150] netsock2.c: Splitting 'ip-10-37-172-89' into... [Jan 28 19:31:24] DEBUG[12150] netsock2.c: ...host 'ip-10-37-172-89' and port ''. [Jan 28 19:31:24] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:24] DEBUG[12150] acl.c: Attached to given IP address [Jan 28 19:31:24] DEBUG[12174] netsock2.c: Splitting '10.37.172.89:0' into... [Jan 28 19:31:24] DEBUG[12174] netsock2.c: ...host '10.37.172.89' and port '0'. [Jan 28 19:31:24] DEBUG[12174] netsock2.c: Splitting '186.XX.XX.XX:39849' into... [Jan 28 19:31:24] DEBUG[12174] netsock2.c: ...host '186.XX.XX.XX' and port '39849'. [Jan 28 19:31:25] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:25] DEBUG[12150] netsock2.c: Splitting 'ip-10-37-172-89' into... [Jan 28 19:31:25] DEBUG[12150] netsock2.c: ...host 'ip-10-37-172-89' and port ''. [Jan 28 19:31:25] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:25] DEBUG[12150] acl.c: Attached to given IP address [Jan 28 19:31:25] DEBUG[12174] netsock2.c: Splitting '10.37.172.89:0' into... [Jan 28 19:31:25] DEBUG[12174] netsock2.c: ...host '10.37.172.89' and port '0'. [Jan 28 19:31:25] DEBUG[12174] netsock2.c: Splitting '186.XX.XX.XX:58631' into... [Jan 28 19:31:25] DEBUG[12174] netsock2.c: ...host '186.XX.XX.XX' and port '58631'. [Jan 28 19:31:27] DEBUG[12401][C-00000003] res_rtp_asterisk.c: Difference is 7830, ms is 114 (10260), pred/ts/samples 1661580/1669410/18090 [Jan 28 19:31:28] DEBUG[12400] threadpool.c: Worker thread idle timeout reached. Dying. [Jan 28 19:31:28] DEBUG[12113] threadpool.c: Destroying worker thread 23 [Jan 28 19:31:28] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:28] DEBUG[12150] netsock2.c: Splitting 'ip-10-37-172-89' into... [Jan 28 19:31:28] DEBUG[12150] netsock2.c: ...host 'ip-10-37-172-89' and port ''. [Jan 28 19:31:28] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:28] DEBUG[12150] acl.c: Attached to given IP address [Jan 28 19:31:28] DEBUG[12174] netsock2.c: Splitting '10.37.172.89:0' into... [Jan 28 19:31:28] DEBUG[12174] netsock2.c: ...host '10.37.172.89' and port '0'. [Jan 28 19:31:28] DEBUG[12174] netsock2.c: Splitting '186.XX.XX.XX:57885' into... [Jan 28 19:31:28] DEBUG[12174] netsock2.c: ...host '186.XX.XX.XX' and port '57885'. [Jan 28 19:31:28] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:28] DEBUG[12150] netsock2.c: Splitting 'ip-10-37-172-89' into... [Jan 28 19:31:28] DEBUG[12150] netsock2.c: ...host 'ip-10-37-172-89' and port ''. [Jan 28 19:31:28] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:28] DEBUG[12150] acl.c: Attached to given IP address [Jan 28 19:31:28] DEBUG[12174] netsock2.c: Splitting '10.37.172.89:0' into... [Jan 28 19:31:28] DEBUG[12174] netsock2.c: ...host '10.37.172.89' and port '0'. [Jan 28 19:31:28] DEBUG[12174] netsock2.c: Splitting '186.XX.XX.XX:41177' into... [Jan 28 19:31:28] DEBUG[12174] netsock2.c: ...host '186.XX.XX.XX' and port '41177'. [Jan 28 19:31:29] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:29] DEBUG[12150] netsock2.c: Splitting 'ip-10-37-172-89' into... [Jan 28 19:31:29] DEBUG[12150] netsock2.c: ...host 'ip-10-37-172-89' and port ''. [Jan 28 19:31:29] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:29] DEBUG[12150] acl.c: Attached to given IP address [Jan 28 19:31:29] DEBUG[12174] netsock2.c: Splitting '10.37.172.89:0' into... [Jan 28 19:31:29] DEBUG[12174] netsock2.c: ...host '10.37.172.89' and port '0'. [Jan 28 19:31:29] DEBUG[12174] netsock2.c: Splitting '186.XX.XX.XX:39849' into... [Jan 28 19:31:29] DEBUG[12174] netsock2.c: ...host '186.XX.XX.XX' and port '39849'. [Jan 28 19:31:30] DEBUG[12147] pjsip: stuse0x7fc3800 .TX 20 bytes STUN message to 186.XX.XX.XX:41177: --- begin STUN message --- STUN Binding indication Hdr: length=0, magic=2112a442, tsx_id=00002f4d4855d01313cf2ad7 Attributes: --- end of STUN message --- [Jan 28 19:31:30] DEBUG[12147] pjsip: stun_session.c .tdata 0x7fc38c0053d8 destroy request, force=0, tsx=(nil) [Jan 28 19:31:30] DEBUG[12147] pjsip: stuse0x7fc3880 .TX 20 bytes STUN message to 186.XX.XX.XX:58090: --- begin STUN message --- STUN Binding indication Hdr: length=0, magic=2112a442, tsx_id=00002f4d754f44dc13cf2ad8 Attributes: --- end of STUN message --- [Jan 28 19:31:30] DEBUG[12147] pjsip: stun_session.c .tdata 0x7fc38c0053d8 destroy request, force=0, tsx=(nil) [Jan 28 19:31:30] DEBUG[12147] pjsip: stuse0x7fc3880 .TX 20 bytes STUN message to 186.XX.XX.XX:42932: --- begin STUN message --- STUN Binding indication Hdr: length=0, magic=2112a442, tsx_id=00002f4d10b8d8dc13cf2ad9 Attributes: --- end of STUN message --- [Jan 28 19:31:30] DEBUG[12147] pjsip: stun_session.c .tdata 0x7fc38c0053d8 destroy request, force=0, tsx=(nil) [Jan 28 19:31:30] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:30] DEBUG[12150] netsock2.c: Splitting 'ip-10-37-172-89' into... [Jan 28 19:31:30] DEBUG[12150] netsock2.c: ...host 'ip-10-37-172-89' and port ''. [Jan 28 19:31:30] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:30] DEBUG[12150] acl.c: Attached to given IP address [Jan 28 19:31:30] DEBUG[12174] netsock2.c: Splitting '10.37.172.89:0' into... [Jan 28 19:31:30] DEBUG[12174] netsock2.c: ...host '10.37.172.89' and port '0'. [Jan 28 19:31:30] DEBUG[12174] netsock2.c: Splitting '186.XX.XX.XX:58631' into... [Jan 28 19:31:30] DEBUG[12174] netsock2.c: ...host '186.XX.XX.XX' and port '58631'. [Jan 28 19:31:31] DEBUG[12147] pjsip: stuse0x7fc3800 .TX 20 bytes STUN message to 186.XX.XX.XX:57885: --- begin STUN message --- STUN Binding indication Hdr: length=0, magic=2112a442, tsx_id=00002f4d147ce1c013cf2ada Attributes: --- end of STUN message --- [Jan 28 19:31:31] DEBUG[12147] pjsip: stun_session.c .tdata 0x7fc38c0053d8 destroy request, force=0, tsx=(nil) [Jan 28 19:31:32] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016288, ts 14181393, len 000908) [Jan 28 19:31:32] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028615, ts 2193750, len 000918) [Jan 28 19:31:32] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032887, ts 539524025, len 000160) [Jan 28 19:31:32] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042683, ts 539524024, len 000170) [Jan 28 19:31:32] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016290, ts 14184633, len 000863) [Jan 28 19:31:32] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028616, ts 2196990, len 000873) [Jan 28 19:31:32] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008416, ts 540110211, len 000160) [Jan 28 19:31:32] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023347, ts 540110208, len 000170) [Jan 28 19:31:32] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019151, ts 3768038608, len 001107) [Jan 28 19:31:32] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058834, ts 2107890, len 001117) [Jan 28 19:31:32] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008417, ts 540110371, len 000160) [Jan 28 19:31:32] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023348, ts 540110368, len 000170) [Jan 28 19:31:32] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032890, ts 539524505, len 000160) [Jan 28 19:31:32] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042684, ts 539524504, len 000170) [Jan 28 19:31:32] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008418, ts 540110531, len 000160) [Jan 28 19:31:32] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023349, ts 540110528, len 000170) [Jan 28 19:31:32] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019152, ts 3768041848, len 001088) [Jan 28 19:31:32] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058835, ts 2111130, len 001098) [Jan 28 19:31:32] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016291, ts 14187603, len 000679) [Jan 28 19:31:32] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028617, ts 2199960, len 000689) [Jan 28 19:31:32] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032891, ts 539524665, len 000160) [Jan 28 19:31:32] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042685, ts 539524664, len 000170) [Jan 28 19:31:32] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008419, ts 540110691, len 000160) [Jan 28 19:31:32] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023350, ts 540110688, len 000170) [Jan 28 19:31:32] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016293, ts 14193453, len 000638) [Jan 28 19:31:32] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028618, ts 2205810, len 000648) [Jan 28 19:31:32] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032893, ts 539524985, len 000160) [Jan 28 19:31:32] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042686, ts 539524984, len 000170) [Jan 28 19:31:32] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008421, ts 540111011, len 000160) [Jan 28 19:31:32] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023351, ts 540111008, len 000170) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019154, ts 3768047608, len 000638) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058836, ts 2116890, len 000648) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032894, ts 539525145, len 000160) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042687, ts 539525144, len 000170) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008422, ts 540111171, len 000160) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023352, ts 540111168, len 000170) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032895, ts 539525305, len 000160) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042688, ts 539525304, len 000170) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016295, ts 14196513, len 001117) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028619, ts 2208870, len 001127) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032896, ts 539525465, len 000160) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042689, ts 539525464, len 000170) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016296, ts 14199663, len 000751) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028620, ts 2212020, len 000761) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019158, ts 3768053728, len 000686) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058837, ts 2123010, len 000696) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008425, ts 540111651, len 000160) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023353, ts 540111648, len 000170) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008426, ts 540111811, len 000160) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023354, ts 540111808, len 000170) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032898, ts 539525785, len 000160) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042690, ts 539525784, len 000170) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016298, ts 14202453, len 000956) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028621, ts 2214810, len 000966) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019160, ts 3768056608, len 001017) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058838, ts 2125890, len 001027) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008427, ts 540111971, len 000160) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023355, ts 540111968, len 000170) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032900, ts 539526105, len 000160) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042691, ts 539526104, len 000170) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019161, ts 3768059848, len 000939) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058839, ts 2129130, len 000949) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032902, ts 539526425, len 000160) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042692, ts 539526424, len 000170) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019162, ts 3768062728, len 000662) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058840, ts 2132010, len 000672) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019163, ts 3768062728, len 000661) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058841, ts 2132010, len 000671) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008431, ts 540112611, len 000160) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023356, ts 540112608, len 000170) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032903, ts 539526585, len 000160) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042693, ts 539526584, len 000170) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016303, ts 14211363, len 000966) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028622, ts 2223720, len 000976) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019164, ts 3768065698, len 000608) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058842, ts 2134980, len 000618) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019165, ts 3768065698, len 000607) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058843, ts 2134980, len 000617) [Jan 28 19:31:33] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:33] DEBUG[12150] netsock2.c: Splitting 'ip-10-37-172-89' into... [Jan 28 19:31:33] DEBUG[12150] netsock2.c: ...host 'ip-10-37-172-89' and port ''. [Jan 28 19:31:33] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:33] DEBUG[12150] acl.c: Attached to given IP address [Jan 28 19:31:33] DEBUG[12174] netsock2.c: Splitting '10.37.172.89:0' into... [Jan 28 19:31:33] DEBUG[12174] netsock2.c: ...host '10.37.172.89' and port '0'. [Jan 28 19:31:33] DEBUG[12174] netsock2.c: Splitting '186.XX.XX.XX:57885' into... [Jan 28 19:31:33] DEBUG[12174] netsock2.c: ...host '186.XX.XX.XX' and port '57885'. [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008432, ts 540112771, len 000160) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023357, ts 540112768, len 000170) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032905, ts 539526905, len 000160) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042694, ts 539526904, len 000170) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019166, ts 3768068848, len 000694) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058844, ts 2138130, len 000704) [Jan 28 19:31:33] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:33] DEBUG[12150] netsock2.c: Splitting 'ip-10-37-172-89' into... [Jan 28 19:31:33] DEBUG[12150] netsock2.c: ...host 'ip-10-37-172-89' and port ''. [Jan 28 19:31:33] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:33] DEBUG[12150] acl.c: Attached to given IP address [Jan 28 19:31:33] DEBUG[12174] netsock2.c: Splitting '10.37.172.89:0' into... [Jan 28 19:31:33] DEBUG[12174] netsock2.c: ...host '10.37.172.89' and port '0'. [Jan 28 19:31:33] DEBUG[12174] netsock2.c: Splitting '186.XX.XX.XX:41177' into... [Jan 28 19:31:33] DEBUG[12174] netsock2.c: ...host '186.XX.XX.XX' and port '41177'. [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008434, ts 540113091, len 000160) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023358, ts 540113088, len 000170) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032906, ts 539527065, len 000160) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042695, ts 539527064, len 000170) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008435, ts 540113251, len 000160) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023359, ts 540113248, len 000170) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019168, ts 3768071728, len 001037) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058845, ts 2141010, len 001047) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032907, ts 539527225, len 000160) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042696, ts 539527224, len 000170) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032908, ts 539527385, len 000160) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042697, ts 539527384, len 000170) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019169, ts 3768074608, len 001069) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058846, ts 2143890, len 001079) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032909, ts 539527545, len 000160) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042698, ts 539527544, len 000170) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008437, ts 540113571, len 000160) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023360, ts 540113568, len 000170) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032910, ts 539527705, len 000160) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042699, ts 539527704, len 000170) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019170, ts 3768077938, len 000699) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058847, ts 2147220, len 000709) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019171, ts 3768077938, len 000699) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058848, ts 2147220, len 000709) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016307, ts 14223333, len 000647) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028623, ts 2235690, len 000657) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032911, ts 539527865, len 000160) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042700, ts 539527864, len 000170) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008440, ts 540114051, len 000160) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023361, ts 540114048, len 000170) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032913, ts 539528185, len 000160) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042701, ts 539528184, len 000170) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019174, ts 3768083608, len 000612) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058849, ts 2152890, len 000622) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019175, ts 3768083608, len 000611) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058850, ts 2152890, len 000621) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008441, ts 540114211, len 000160) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023362, ts 540114208, len 000170) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016311, ts 14232153, len 000898) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028624, ts 2244510, len 000908) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008443, ts 540114531, len 000160) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023363, ts 540114528, len 000170) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016312, ts 14235213, len 000880) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028625, ts 2247570, len 000890) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019176, ts 3768086938, len 001105) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058851, ts 2156220, len 001115) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032917, ts 539528825, len 000160) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042702, ts 539528824, len 000170) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019177, ts 3768089728, len 000614) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058852, ts 2159010, len 000624) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016314, ts 14238363, len 000981) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028626, ts 2250720, len 000991) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019179, ts 3768092608, len 000653) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058853, ts 2161890, len 000663) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032920, ts 539529305, len 000160) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042703, ts 539529304, len 000170) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019181, ts 3768095938, len 000709) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058854, ts 2165220, len 000719) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019182, ts 3768095938, len 000709) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058855, ts 2165220, len 000719) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008448, ts 540115331, len 000160) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023364, ts 540115328, len 000170) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032921, ts 539529465, len 000160) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042704, ts 539529464, len 000170) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032922, ts 539529625, len 000160) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042705, ts 539529624, len 000170) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008450, ts 540115651, len 000160) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023365, ts 540115648, len 000170) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019183, ts 3768098818, len 000729) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058856, ts 2168100, len 000739) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019185, ts 3768101698, len 000735) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058857, ts 2170980, len 000745) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019186, ts 3768101698, len 000735) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058858, ts 2170980, len 000745) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016320, ts 14250243, len 000859) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028627, ts 2262600, len 000869) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032925, ts 539530105, len 000160) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042706, ts 539530104, len 000170) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008453, ts 540116131, len 000160) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023366, ts 540116128, len 000170) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019187, ts 3768104938, len 000690) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058859, ts 2174220, len 000700) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008454, ts 540116291, len 000160) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023367, ts 540116288, len 000170) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032927, ts 539530425, len 000160) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042707, ts 539530424, len 000170) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008455, ts 540116451, len 000160) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023368, ts 540116448, len 000170) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032928, ts 539530585, len 000160) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042708, ts 539530584, len 000170) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008456, ts 540116611, len 000160) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023369, ts 540116608, len 000170) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032929, ts 539530745, len 000160) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042709, ts 539530744, len 000170) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008458, ts 540116931, len 000160) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023370, ts 540116928, len 000170) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032930, ts 539530905, len 000160) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042710, ts 539530904, len 000170) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032931, ts 539531065, len 000160) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042711, ts 539531064, len 000170) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008459, ts 540117091, len 000160) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023371, ts 540117088, len 000170) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032932, ts 539531225, len 000160) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042712, ts 539531224, len 000170) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016327, ts 14265273, len 000912) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028628, ts 2277630, len 000922) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019197, ts 3768119698, len 000695) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058860, ts 2188980, len 000705) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019198, ts 3768119698, len 000694) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058861, ts 2188980, len 000704) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032934, ts 539531545, len 000160) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042713, ts 539531544, len 000170) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008462, ts 540117571, len 000160) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023372, ts 540117568, len 000170) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016328, ts 14268333, len 000852) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028629, ts 2280690, len 000862) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016329, ts 14268333, len 000851) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028630, ts 2280690, len 000861) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019199, ts 3768122848, len 000605) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058862, ts 2192130, len 000615) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016330, ts 14271303, len 001048) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028631, ts 2283660, len 001058) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032937, ts 539532025, len 000160) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042714, ts 539532024, len 000170) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016331, ts 14274363, len 000668) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028632, ts 2286720, len 000678) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008466, ts 540118211, len 000160) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023373, ts 540118208, len 000170) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019202, ts 3768128788, len 001116) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058863, ts 2198070, len 001126) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008467, ts 540118371, len 000160) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023374, ts 540118368, len 000170) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032940, ts 539532505, len 000160) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042715, ts 539532504, len 000170) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032941, ts 539532665, len 000160) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042716, ts 539532664, len 000170) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008469, ts 540118691, len 000160) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023375, ts 540118688, len 000170) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016335, ts 14280213, len 000973) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028633, ts 2292570, len 000983) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008470, ts 540118851, len 000160) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023376, ts 540118848, len 000170) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019205, ts 3768134728, len 001156) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058864, ts 2204010, len 001166) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032942, ts 539532825, len 000160) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042717, ts 539532824, len 000170) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008471, ts 540119011, len 000160) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023377, ts 540119008, len 000170) [Jan 28 19:31:33] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032943, ts 539532985, len 000160) [Jan 28 19:31:33] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042718, ts 539532984, len 000170) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019206, ts 3768137608, len 000607) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058865, ts 2206890, len 000617) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019207, ts 3768137608, len 000606) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058866, ts 2206890, len 000616) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032944, ts 539533145, len 000160) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042719, ts 539533144, len 000170) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008473, ts 540119331, len 000160) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023378, ts 540119328, len 000170) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008474, ts 540119491, len 000160) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023379, ts 540119488, len 000170) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032947, ts 539533625, len 000160) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042720, ts 539533624, len 000170) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019209, ts 3768143728, len 000739) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058867, ts 2213010, len 000749) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016339, ts 14289303, len 000651) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028634, ts 2301660, len 000661) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016341, ts 14295333, len 000695) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028635, ts 2307690, len 000705) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032949, ts 539533945, len 000160) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042721, ts 539533944, len 000170) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008477, ts 540119971, len 000160) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023380, ts 540119968, len 000170) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008478, ts 540120131, len 000160) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023381, ts 540120128, len 000170) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032950, ts 539534105, len 000160) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042722, ts 539534104, len 000170) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019214, ts 3768149848, len 000613) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058868, ts 2219130, len 000623) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016343, ts 14298213, len 000812) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028636, ts 2310570, len 000822) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032951, ts 539534265, len 000160) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042723, ts 539534264, len 000170) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008479, ts 540120291, len 000160) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023382, ts 540120288, len 000170) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008480, ts 540120451, len 000160) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023383, ts 540120448, len 000170) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032953, ts 539534585, len 000160) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042724, ts 539534584, len 000170) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008481, ts 540120611, len 000160) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023384, ts 540120608, len 000170) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032954, ts 539534745, len 000160) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042725, ts 539534744, len 000170) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016346, ts 14304333, len 001088) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028637, ts 2316690, len 001098) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032955, ts 539534905, len 000160) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042726, ts 539534904, len 000170) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016347, ts 14307213, len 000651) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028638, ts 2319570, len 000661) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008484, ts 540121091, len 000160) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023385, ts 540121088, len 000170) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032957, ts 539535225, len 000160) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042727, ts 539535224, len 000170) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019219, ts 3768161728, len 000611) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058869, ts 2231010, len 000621) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019220, ts 3768161728, len 000611) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058870, ts 2231010, len 000621) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008485, ts 540121251, len 000160) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023386, ts 540121248, len 000170) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016349, ts 14310183, len 000756) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028639, ts 2322540, len 000766) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016350, ts 14310183, len 000755) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028640, ts 2322540, len 000765) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032958, ts 539535385, len 000160) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042728, ts 539535384, len 000170) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008486, ts 540121411, len 000160) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023387, ts 540121408, len 000170) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019221, ts 3768164698, len 001118) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058871, ts 2233980, len 001128) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008487, ts 540121571, len 000160) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023388, ts 540121568, len 000170) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016351, ts 14313153, len 000825) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028641, ts 2325510, len 000835) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019222, ts 3768167488, len 001010) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058872, ts 2236770, len 001020) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032961, ts 539535865, len 000160) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042729, ts 539535864, len 000170) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019223, ts 3768170728, len 001001) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058873, ts 2240010, len 001011) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032962, ts 539536025, len 000160) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042730, ts 539536024, len 000170) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016352, ts 14316573, len 000813) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028642, ts 2328930, len 000823) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016354, ts 14322243, len 001115) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028643, ts 2334600, len 001125) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019224, ts 3768173698, len 000736) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058874, ts 2242980, len 000746) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032965, ts 539536505, len 000160) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042731, ts 539536504, len 000170) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019226, ts 3768176488, len 000665) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058875, ts 2245770, len 000675) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019227, ts 3768176488, len 000665) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058876, ts 2245770, len 000675) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008494, ts 540122691, len 000160) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023389, ts 540122688, len 000170) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032966, ts 539536665, len 000160) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042732, ts 539536664, len 000170) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008495, ts 540122851, len 000160) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023390, ts 540122848, len 000170) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016356, ts 14328273, len 000714) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028644, ts 2340630, len 000724) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016357, ts 14328273, len 000714) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028645, ts 2340630, len 000724) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008496, ts 540123011, len 000160) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023391, ts 540123008, len 000170) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032968, ts 539536985, len 000160) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042733, ts 539536984, len 000170) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019230, ts 3768182698, len 001114) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058877, ts 2251980, len 001124) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008497, ts 540123171, len 000160) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023392, ts 540123168, len 000170) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016358, ts 14331783, len 000901) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028646, ts 2344140, len 000911) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008499, ts 540123491, len 000160) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023393, ts 540123488, len 000170) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016359, ts 14334213, len 000799) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028647, ts 2346570, len 000809) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032971, ts 539537465, len 000160) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042734, ts 539537464, len 000170) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008500, ts 540123651, len 000160) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023394, ts 540123648, len 000170) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032972, ts 539537625, len 000160) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042735, ts 539537624, len 000170) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032973, ts 539537785, len 000160) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042736, ts 539537784, len 000170) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008501, ts 540123811, len 000160) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023395, ts 540123808, len 000170) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019235, ts 3768191608, len 000711) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058878, ts 2260890, len 000721) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019236, ts 3768191608, len 000711) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058879, ts 2260890, len 000721) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016361, ts 14337093, len 001154) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028648, ts 2349450, len 001164) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008503, ts 540124131, len 000160) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023396, ts 540124128, len 000170) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032975, ts 539538105, len 000160) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042737, ts 539538104, len 000170) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032976, ts 539538265, len 000160) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042738, ts 539538264, len 000170) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008504, ts 540124291, len 000160) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023397, ts 540124288, len 000170) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008505, ts 540124451, len 000160) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023398, ts 540124448, len 000170) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032977, ts 539538425, len 000160) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042739, ts 539538424, len 000170) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016364, ts 14343303, len 000733) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028649, ts 2355660, len 000743) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016365, ts 14343303, len 000733) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028650, ts 2355660, len 000743) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016366, ts 14349063, len 000843) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028651, ts 2361420, len 000853) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008506, ts 540124611, len 000160) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023399, ts 540124608, len 000170) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019241, ts 3768200698, len 000827) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058880, ts 2269980, len 000837) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019242, ts 3768200698, len 000827) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058881, ts 2269980, len 000837) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008507, ts 540124771, len 000160) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023400, ts 540124768, len 000170) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032980, ts 539538905, len 000160) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042740, ts 539538904, len 000170) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008508, ts 540124931, len 000160) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023401, ts 540124928, len 000170) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019243, ts 3768203488, len 000718) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058882, ts 2272770, len 000728) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032981, ts 539539065, len 000160) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042741, ts 539539064, len 000170) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008509, ts 540125091, len 000160) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023402, ts 540125088, len 000170) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016367, ts 14352033, len 000771) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028652, ts 2364390, len 000781) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032982, ts 539539225, len 000160) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042742, ts 539539224, len 000170) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019245, ts 3768206728, len 000614) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058883, ts 2276010, len 000624) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016369, ts 14355183, len 001114) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028653, ts 2367540, len 001124) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032983, ts 539539385, len 000160) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042743, ts 539539384, len 000170) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019247, ts 3768209698, len 001001) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058884, ts 2278980, len 001011) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008512, ts 540125571, len 000160) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023403, ts 540125568, len 000170) [Jan 28 19:31:34] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:34] DEBUG[12150] netsock2.c: Splitting 'ip-10-37-172-89' into... [Jan 28 19:31:34] DEBUG[12150] netsock2.c: ...host 'ip-10-37-172-89' and port ''. [Jan 28 19:31:34] DEBUG[12150] acl.c: Not an IPv4 nor IPv6 address, cannot get port. [Jan 28 19:31:34] DEBUG[12150] acl.c: Attached to given IP address [Jan 28 19:31:34] DEBUG[12174] netsock2.c: Splitting '10.37.172.89:0' into... [Jan 28 19:31:34] DEBUG[12174] netsock2.c: ...host '10.37.172.89' and port '0'. [Jan 28 19:31:34] DEBUG[12174] netsock2.c: Splitting '186.XX.XX.XX:39849' into... [Jan 28 19:31:34] DEBUG[12174] netsock2.c: ...host '186.XX.XX.XX' and port '39849'. [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016370, ts 14358243, len 000723) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028654, ts 2370600, len 000733) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008513, ts 540125731, len 000160) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023404, ts 540125728, len 000170) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032986, ts 539539865, len 000160) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042744, ts 539539864, len 000170) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008514, ts 540125891, len 000160) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023405, ts 540125888, len 000170) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008515, ts 540126051, len 000160) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023406, ts 540126048, len 000170) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008516, ts 540126211, len 000160) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023407, ts 540126208, len 000170) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032989, ts 539540345, len 000160) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042745, ts 539540344, len 000170) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016374, ts 14364723, len 000881) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028655, ts 2377080, len 000891) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032990, ts 539540505, len 000160) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042746, ts 539540504, len 000170) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019252, ts 3768221578, len 001025) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058885, ts 2290860, len 001035) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032992, ts 539540825, len 000160) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042747, ts 539540824, len 000170) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008520, ts 540126851, len 000160) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023408, ts 540126848, len 000170) [Jan 28 19:31:34] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032993, ts 539540985, len 000160) [Jan 28 19:31:34] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042748, ts 539540984, len 000170) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008521, ts 540127011, len 000160) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023409, ts 540127008, len 000170) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008522, ts 540127171, len 000160) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023410, ts 540127168, len 000170) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016379, ts 14376153, len 000724) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028656, ts 2388510, len 000734) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016380, ts 14376153, len 000723) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028657, ts 2388510, len 000733) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008523, ts 540127331, len 000160) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023411, ts 540127328, len 000170) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019257, ts 3768230578, len 000600) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058886, ts 2299860, len 000610) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008524, ts 540127491, len 000160) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023412, ts 540127488, len 000170) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016381, ts 14379933, len 000639) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028658, ts 2392290, len 000649) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019259, ts 3768233728, len 001101) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058887, ts 2303010, len 001111) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008525, ts 540127651, len 000160) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023413, ts 540127648, len 000170) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019260, ts 3768236608, len 001124) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058888, ts 2305890, len 001134) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 032999, ts 539541945, len 000160) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042749, ts 539541944, len 000170) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008527, ts 540127971, len 000160) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023414, ts 540127968, len 000170) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016384, ts 14385243, len 000703) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028659, ts 2397600, len 000713) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019261, ts 3768239578, len 000621) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058889, ts 2308860, len 000631) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008529, ts 540128291, len 000160) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023415, ts 540128288, len 000170) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 033001, ts 539542265, len 000160) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042750, ts 539542264, len 000170) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016386, ts 14388123, len 000678) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028660, ts 2400480, len 000688) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016387, ts 14388123, len 000677) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028661, ts 2400480, len 000687) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 033002, ts 539542425, len 000160) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042751, ts 539542424, len 000170) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008531, ts 540128611, len 000160) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023416, ts 540128608, len 000170) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019265, ts 3768245608, len 000667) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058890, ts 2314890, len 000677) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008533, ts 540128931, len 000160) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023417, ts 540128928, len 000170) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 033005, ts 539542905, len 000160) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042752, ts 539542904, len 000170) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019267, ts 3768248488, len 001019) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058891, ts 2317770, len 001029) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016390, ts 14397123, len 000661) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028662, ts 2409480, len 000671) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016391, ts 14397123, len 000661) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028663, ts 2409480, len 000671) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 033006, ts 539543065, len 000160) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042753, ts 539543064, len 000170) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008534, ts 540129091, len 000160) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023418, ts 540129088, len 000170) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019268, ts 3768251728, len 000583) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058892, ts 2321010, len 000593) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008535, ts 540129251, len 000160) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023419, ts 540129248, len 000170) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 033008, ts 539543385, len 000160) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042754, ts 539543384, len 000170) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019270, ts 3768254698, len 000601) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058893, ts 2323980, len 000611) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016393, ts 14403243, len 000691) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028664, ts 2415600, len 000701) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 033010, ts 539543705, len 000160) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042755, ts 539543704, len 000170) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019272, ts 3768257488, len 000618) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058894, ts 2326770, len 000628) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 033011, ts 539543865, len 000160) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042756, ts 539543864, len 000170) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016395, ts 14406573, len 000689) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028665, ts 2418930, len 000699) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008539, ts 540129891, len 000160) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023420, ts 540129888, len 000170) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019274, ts 3768260728, len 000707) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058895, ts 2330010, len 000717) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 033013, ts 539544185, len 000160) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042757, ts 539544184, len 000170) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016397, ts 14409543, len 000659) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028666, ts 2421900, len 000669) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016398, ts 14409543, len 000659) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028667, ts 2421900, len 000669) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008541, ts 540130211, len 000160) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023421, ts 540130208, len 000170) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008543, ts 540130531, len 000160) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023422, ts 540130528, len 000170) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 033015, ts 539544505, len 000160) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042758, ts 539544504, len 000170) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016399, ts 14412063, len 000647) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028668, ts 2424420, len 000657) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 033016, ts 539544665, len 000160) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042759, ts 539544664, len 000170) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019279, ts 3768269368, len 001153) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058896, ts 2338650, len 001163) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008545, ts 540130851, len 000160) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023423, ts 540130848, len 000170) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 033018, ts 539544985, len 000160) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042760, ts 539544984, len 000170) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019280, ts 3768272698, len 000604) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058897, ts 2341980, len 000614) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019281, ts 3768272698, len 000603) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058898, ts 2341980, len 000613) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 033019, ts 539545145, len 000160) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042761, ts 539545144, len 000170) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008546, ts 540131011, len 000160) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023424, ts 540131008, len 000170) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008547, ts 540131171, len 000160) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023425, ts 540131168, len 000170) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016402, ts 14421333, len 000725) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028669, ts 2433690, len 000735) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008548, ts 540131331, len 000160) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023426, ts 540131328, len 000170) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016404, ts 14424213, len 000656) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028670, ts 2436570, len 000666) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 033021, ts 539545465, len 000160) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042762, ts 539545464, len 000170) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008549, ts 540131491, len 000160) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023427, ts 540131488, len 000170) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019284, ts 3768278368, len 001148) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058899, ts 2347650, len 001158) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 033023, ts 539545785, len 000160) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042763, ts 539545784, len 000170) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016406, ts 14427093, len 000675) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028671, ts 2439450, len 000685) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016407, ts 14427093, len 000674) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028672, ts 2439450, len 000684) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:43997 (type 100, seq 019285, ts 3768281608, len 000594) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:42932 (via ICE) (type 120, seq 058900, ts 2350890, len 000604) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016408, ts 14430063, len 000709) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028673, ts 2442420, len 000719) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008553, ts 540132131, len 000160) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023428, ts 540132128, len 000170) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008554, ts 540132291, len 000160) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023429, ts 540132288, len 000170) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008555, ts 540132451, len 000160) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023430, ts 540132448, len 000170) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016410, ts 14433213, len 000835) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028674, ts 2445570, len 000845) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 033028, ts 539546585, len 000160) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042764, ts 539546584, len 000170) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:42932 (type 120, seq 016411, ts 14439333, len 000720) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:43997 (via ICE) (type 100, seq 028675, ts 2451690, len 000730) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 033029, ts 539546745, len 000160) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042765, ts 539546744, len 000170) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008557, ts 540132771, len 000160) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023431, ts 540132768, len 000170) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 033030, ts 539546905, len 000160) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042766, ts 539546904, len 000170) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008558, ts 540132931, len 000160) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023432, ts 540132928, len 000170) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:59186 (type 00, seq 033031, ts 539547065, len 000160) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:58090 (via ICE) (type 00, seq 042767, ts 539547064, len 000170) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008559, ts 540133091, len 000160) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023433, ts 540133088, len 000170) [Jan 28 19:31:35] VERBOSE[12401][C-00000003] res_rtp_asterisk.c: Got RTP packet from 186.XX.XX.XX:58090 (type 00, seq 008560, ts 540133251, len 000160) [Jan 28 19:31:35] VERBOSE[12410][C-00000003] res_rtp_asterisk.c: Sent RTP packet to 186.XX.XX.XX:59186 (via ICE) (type 00, seq 023434, ts 540133248, len 000170) [Jan 28 19:31:35] VERBOSE[12197] chan_sip.c: <--- SIP read from WS:186.XX.XX.XX:37687 ---> BYE sip:102@10.37.172.89:5060;transport=ws SIP/2.0 Via: SIP/2.0/WS jvp15e71m9jt.invalid;branch=z9hG4bK4807297 Max-Forwards: 69 To: ;tag=as5abd6230 From: "101" ;tag=a6tct1dgu3 Call-ID: 4ead8d547980693835eed3c5623cac67@10.37.172.89:5060 CSeq: 8131 BYE Allow: INVITE,ACK,CANCEL,BYE,UPDATE,MESSAGE,OPTIONS Supported: outbound User-Agent: JsSIP 0.6.12 Content-Length: 0 <-------------> [Jan 28 19:31:35] DEBUG[12197] chan_sip.c: Header 0 [ 50]: BYE sip:102@10.37.172.89:5060;transport=ws SIP/2.0 [Jan 28 19:31:35] DEBUG[12197] chan_sip.c: Header 1 [ 58]: Via: SIP/2.0/WS jvp15e71m9jt.invalid;branch=z9hG4bK4807297 [Jan 28 19:31:35] DEBUG[12197] chan_sip.c: Header 2 [ 16]: Max-Forwards: 69 [Jan 28 19:31:35] DEBUG[12197] chan_sip.c: Header 3 [ 41]: To: ;tag=as5abd6230 [Jan 28 19:31:35] DEBUG[12197] chan_sip.c: Header 4 [ 75]: From: "101" ;tag=a6tct1dgu3 [Jan 28 19:31:35] DEBUG[12197] chan_sip.c: Header 5 [ 59]: Call-ID: 4ead8d547980693835eed3c5623cac67@10.37.172.89:5060 [Jan 28 19:31:35] DEBUG[12197] chan_sip.c: Header 6 [ 14]: CSeq: 8131 BYE [Jan 28 19:31:35] DEBUG[12197] chan_sip.c: Header 7 [ 51]: Allow: INVITE,ACK,CANCEL,BYE,UPDATE,MESSAGE,OPTIONS [Jan 28 19:31:35] DEBUG[12197] chan_sip.c: Header 8 [ 19]: Supported: outbound [Jan 28 19:31:35] DEBUG[12197] chan_sip.c: Header 9 [ 24]: User-Agent: JsSIP 0.6.12 [Jan 28 19:31:35] DEBUG[12197] chan_sip.c: Header 10 [ 17]: Content-Length: 0 [Jan 28 19:31:35] VERBOSE[12197] chan_sip.c: --- (11 headers 0 lines) --- [Jan 28 19:31:35] DEBUG[12197] chan_sip.c: = Looking for Call ID: 4ead8d547980693835eed3c5623cac67@10.37.172.89:5060 (Checking From) --From tag a6tct1dgu3 --To-tag as5abd6230 [Jan 28 19:31:35] DEBUG[12197][C-00000003] chan_sip.c: **** Received BYE (8) - Command in SIP BYE [Jan 28 19:31:35] DEBUG[12197][C-00000003] chan_sip.c: Initializing initreq for method BYE - callid 4ead8d547980693835eed3c5623cac67@10.37.172.89:5060 [Jan 28 19:31:35] DEBUG[12197][C-00000003] chan_sip.c: Setting SIP_ALREADYGONE on dialog 4ead8d547980693835eed3c5623cac67@10.37.172.89:5060 [Jan 28 19:31:35] DEBUG[12197][C-00000003] res_rtp_asterisk.c: Setting RTCP address on RTP instance '0x7fc380016318' [Jan 28 19:31:35] DEBUG[12197][C-00000003] res_rtp_asterisk.c: Setting RTCP address on RTP instance '0x7fc380027e18' [Jan 28 19:31:35] VERBOSE[12197][C-00000003] chan_sip.c: Scheduling destruction of SIP dialog '4ead8d547980693835eed3c5623cac67@10.37.172.89:5060' in 32000 ms (Method: BYE) [Jan 28 19:31:35] DEBUG[12197][C-00000003] chan_sip.c: Received bye, issuing owner hangup [Jan 28 19:31:35] VERBOSE[12197][C-00000003] chan_sip.c: <--- Transmitting (NAT) to 186.XX.XX.XX:37687 ---> SIP/2.0 200 OK Via: SIP/2.0/WS jvp15e71m9jt.invalid;branch=z9hG4bK4807297;received=186.XX.XX.XX;rport=37687 From: "101" ;tag=a6tct1dgu3 To: ;tag=as5abd6230 Call-ID: 4ead8d547980693835eed3c5623cac67@10.37.172.89:5060 CSeq: 8131 BYE Server: Asterisk PBX 13.1.0 Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE Supported: replaces, timer Content-Length: 0 <------------> [Jan 28 19:31:35] DEBUG[12197][C-00000003] chan_sip.c: Trying to put 'SIP/2.0 200' onto WS socket destined for 186.XX.XX.XX:37687 [Jan 28 19:31:35] DEBUG[12113] threadpool.c: Increasing threadpool stasis-core's size by 1 [Jan 28 19:31:35] DEBUG[12113] threadpool.c: Increasing threadpool stasis-core's size by 1 [Jan 28 19:31:35] DEBUG[12410][C-00000003] bridge_channel.c: Setting 0x7fc380076258(SIP/101-00000007) state from:0 to:1 [Jan 28 19:31:35] DEBUG[12410][C-00000003] bridge_channel.c: Bridge 4baaddab-9cdd-47de-b03f-cfa4bec590c1: pulling 0x7fc380076258(SIP/101-00000007) [Jan 28 19:31:35] DEBUG[12410][C-00000003] bridge_channel.c: Bridge 4baaddab-9cdd-47de-b03f-cfa4bec590c1: 0x7fc380076258(SIP/101-00000007) is leaving simple_bridge technology [Jan 28 19:31:35] DEBUG[12410][C-00000003] bridge.c: Bridge 4baaddab-9cdd-47de-b03f-cfa4bec590c1: dissolving bridge with cause 16(Normal Clearing) [Jan 28 19:31:35] DEBUG[12410][C-00000003] bridge_channel.c: Setting 0x7fc3800763c8(SIP/102-00000006) state from:0 to:2 [Jan 28 19:31:35] DEBUG[12410][C-00000003] bridge.c: Bridge 4baaddab-9cdd-47de-b03f-cfa4bec590c1: queueing action type:13 sub:1001 [Jan 28 19:31:35] DEBUG[12127] cdr.c: Finalized CDR for SIP/102-00000006 - start 1422473457.532539 answer 1422473457.535069 end 1422473495.747557 dispo ANSWERED [Jan 28 19:31:35] DEBUG[12410][C-00000003] bridge.c: Bridge 4baaddab-9cdd-47de-b03f-cfa4bec590c1 is dissolved, not performing smart bridge operation. [Jan 28 19:31:35] DEBUG[12410][C-00000003] channel.c: Hanging up channel 'SIP/101-00000007' [Jan 28 19:31:35] DEBUG[12410][C-00000003] chan_sip.c: Hangup call SIP/101-00000007, SIP callid 4ead8d547980693835eed3c5623cac67@10.37.172.89:5060 [Jan 28 19:31:35] DEBUG[12410][C-00000003] chan_sip.c: update_call_counter(tfrblitj) - decrement call limit counter on hangup [Jan 28 19:31:35] DEBUG[12410][C-00000003] chan_sip.c: Updating call counter for outgoing call [Jan 28 19:31:35] DEBUG[12410][C-00000003] chan_sip.c: Call to peer '101' removed from call limit 0 [Jan 28 19:31:35] DEBUG[12125] devicestate.c: No provider found, checking channel drivers for SIP - 101 [Jan 28 19:31:35] DEBUG[12125] chan_sip.c: Checking device state for peer 101 [Jan 28 19:31:35] DEBUG[12125] devicestate.c: Changing state for SIP/101 - state 1 (Not in use) [Jan 28 19:31:35] DEBUG[12410][C-00000003] res_rtp_asterisk.c: Setting RTCP address on RTP instance '0x7fc380016318' [Jan 28 19:31:35] DEBUG[12410][C-00000003] res_rtp_asterisk.c: Setting RTCP address on RTP instance '0x7fc380027e18' [Jan 28 19:31:35] DEBUG[12127] cdr.c: CDR for SIP/101-00000007 is dialed and has no Party B; discarding [Jan 28 19:31:35] DEBUG[12125] devicestate.c: No provider found, checking channel drivers for SIP - 101 [Jan 28 19:31:35] DEBUG[12125] chan_sip.c: Checking device state for peer 101 [Jan 28 19:31:35] DEBUG[12125] devicestate.c: Changing state for SIP/101 - state 1 (Not in use) [Jan 28 19:31:35] DEBUG[12401][C-00000003] bridge_channel.c: Bridge 4baaddab-9cdd-47de-b03f-cfa4bec590c1: pulling 0x7fc3800763c8(SIP/102-00000006) [Jan 28 19:31:35] DEBUG[12401][C-00000003] bridge_channel.c: Bridge 4baaddab-9cdd-47de-b03f-cfa4bec590c1: 0x7fc3800763c8(SIP/102-00000006) is leaving simple_bridge technology [Jan 28 19:31:35] DEBUG[12401][C-00000003] bridge.c: Bridge 4baaddab-9cdd-47de-b03f-cfa4bec590c1 is dissolved, not performing smart bridge operation. [Jan 28 19:31:35] DEBUG[12401][C-00000003] bridge_channel.c: Channel SIP/102-00000006 simulating UNHOLD for bridge end. [Jan 28 19:31:35] DEBUG[12401][C-00000003] res_rtp_asterisk.c: Setting the marker bit due to a source update [Jan 28 19:31:35] DEBUG[12401][C-00000003] res_rtp_asterisk.c: Changing ssrc from 776622808 to 1332703990 due to a source change [Jan 28 19:31:35] DEBUG[12401][C-00000003] res_rtp_asterisk.c: Changing ssrc for SRTP from 776622808 to 1332703990 [Jan 28 19:31:35] DEBUG[12401][C-00000003] res_srtp.c: Adding new policy for SSRC 1332703990 [Jan 28 19:31:35] DEBUG[12401][C-00000003] res_srtp.c: Couldn't remove stream (13) [Jan 28 19:31:35] DEBUG[12401][C-00000003] bridge.c: Bridge 4baaddab-9cdd-47de-b03f-cfa4bec590c1: actually destroying basic bridge, nobody wants it anymore [Jan 28 19:31:35] DEBUG[12401][C-00000003] bridge.c: Bridge 4baaddab-9cdd-47de-b03f-cfa4bec590c1: calling basic bridge destructor [Jan 28 19:31:35] DEBUG[12401][C-00000003] bridge.c: Bridge 4baaddab-9cdd-47de-b03f-cfa4bec590c1: calling simple_bridge technology stop [Jan 28 19:31:35] DEBUG[12401][C-00000003] bridge.c: Bridge 4baaddab-9cdd-47de-b03f-cfa4bec590c1: calling simple_bridge technology destructor [Jan 28 19:31:35] DEBUG[12401][C-00000003] app_dial.c: Exiting with DIALSTATUS=ANSWER. [Jan 28 19:31:35] DEBUG[12401][C-00000003] pbx.c: Spawn extension (video-test,101,4) exited non-zero on 'SIP/102-00000006' [Jan 28 19:31:35] DEBUG[12401][C-00000003] channel.c: Soft-Hanging (0x10) up channel 'SIP/102-00000006' [Jan 28 19:31:35] DEBUG[12401][C-00000003] channel.c: Hanging up channel 'SIP/102-00000006' [Jan 28 19:31:35] DEBUG[12401][C-00000003] chan_sip.c: Hangup call SIP/102-00000006, SIP callid hqaqv9bdm2s5u92le2rn [Jan 28 19:31:35] DEBUG[12401][C-00000003] res_rtp_asterisk.c: Setting RTCP address on RTP instance '0x7fc388001d68' [Jan 28 19:31:35] DEBUG[12401][C-00000003] res_rtp_asterisk.c: Setting RTCP address on RTP instance '0x7fc388003228' [Jan 28 19:31:35] VERBOSE[12401][C-00000003] chan_sip.c: Scheduling destruction of SIP dialog 'hqaqv9bdm2s5u92le2rn' in 32000 ms (Method: INVITE) [Jan 28 19:31:35] DEBUG[12401][C-00000003] chan_sip.c: Strict routing enforced for session hqaqv9bdm2s5u92le2rn [Jan 28 19:31:35] VERBOSE[12401][C-00000003] chan_sip.c: Reliably Transmitting (NAT) to 186.XX.XX.XX:60753: BYE sip:81iaqkr7@ksdmllpbgsdf.invalid;transport=ws;ob SIP/2.0 Via: SIP/2.0/WS 10.37.172.89:5060;branch=z9hG4bK1797c3cb;rport Max-Forwards: 70 From: ;tag=as0df222f9 To: "102" ;tag=sa54urm37e Call-ID: hqaqv9bdm2s5u92le2rn CSeq: 102 BYE User-Agent: Asterisk PBX 13.1.0 Proxy-Authorization: Digest username="3g6o6jen", realm="59.XX.XX.XX", algorithm=MD5, uri="sip:59.XX.XX.XX", nonce="7eb08087", response="64d2916c711e1fb1ee788ea020fb85a0" X-Asterisk-HangupCause: Normal Clearing X-Asterisk-HangupCauseCode: 16 Content-Length: 0 --- [Jan 28 19:31:35] DEBUG[12401][C-00000003] chan_sip.c: Trying to put 'BYE sip:81i' onto WS socket destined for 186.XX.XX.XX:60753 [Jan 28 19:31:35] DEBUG[12125] devicestate.c: No provider found, checking channel drivers for SIP - 102 [Jan 28 19:31:35] DEBUG[12125] chan_sip.c: Checking device state for peer 102 [Jan 28 19:31:35] DEBUG[12125] devicestate.c: Changing state for SIP/102 - state 1 (Not in use) [Jan 28 19:31:36] VERBOSE[12398] chan_sip.c: <--- SIP read from WS:186.XX.XX.XX:60753 ---> SIP/2.0 200 OK Via: SIP/2.0/WS 10.37.172.89:5060;branch=z9hG4bK1797c3cb;rport To: "102" ;tag=sa54urm37e From: ;tag=as0df222f9 Call-ID: hqaqv9bdm2s5u92le2rn CSeq: 102 BYE Supported: outbound Content-Length: 0 <-------------> [Jan 28 19:31:36] DEBUG[12398] chan_sip.c: Header 0 [ 14]: SIP/2.0 200 OK [Jan 28 19:31:36] DEBUG[12398] chan_sip.c: Header 1 [ 62]: Via: SIP/2.0/WS 10.37.172.89:5060;branch=z9hG4bK1797c3cb;rport [Jan 28 19:31:36] DEBUG[12398] chan_sip.c: Header 2 [ 49]: To: "102" ;tag=sa54urm37e [Jan 28 19:31:36] DEBUG[12398] chan_sip.c: Header 3 [ 45]: From: ;tag=as0df222f9 [Jan 28 19:31:36] DEBUG[12398] chan_sip.c: Header 4 [ 29]: Call-ID: hqaqv9bdm2s5u92le2rn [Jan 28 19:31:36] DEBUG[12398] chan_sip.c: Header 5 [ 13]: CSeq: 102 BYE [Jan 28 19:31:36] DEBUG[12398] chan_sip.c: Header 6 [ 19]: Supported: outbound [Jan 28 19:31:36] DEBUG[12398] chan_sip.c: Header 7 [ 17]: Content-Length: 0 [Jan 28 19:31:36] VERBOSE[12398] chan_sip.c: --- (8 headers 0 lines) --- [Jan 28 19:31:36] DEBUG[12398] chan_sip.c: = Looking for Call ID: hqaqv9bdm2s5u92le2rn (Checking To) --From tag as0df222f9 --To-tag sa54urm37e [Jan 28 19:31:36] VERBOSE[12398][C-00000003] chan_sip.c: SIP Response message for INCOMING dialog BYE arrived [Jan 28 19:31:36] DEBUG[12150] chan_sip.c: Destroying SIP dialog hqaqv9bdm2s5u92le2rn [Jan 28 19:31:36] VERBOSE[12150] chan_sip.c: Really destroying SIP dialog 'hqaqv9bdm2s5u92le2rn' Method: INVITE [Jan 28 19:31:36] DEBUG[12150] pjsip: icess0x7fc3880 Destroying ICE session 0x7fc38800ed78 [Jan 28 19:31:36] DEBUG[12150] pjsip: stuse0x7fc3880 STUN session 0x7fc388011198 destroy request, ref_cnt=4 [Jan 28 19:31:36] DEBUG[12150] pjsip: stuse0x7fc3880 STUN session 0x7fc388012198 destroy request, ref_cnt=3 [Jan 28 19:31:36] DEBUG[12150] pjsip: ice_session.c ICE session 0x7fc38800ed78 destroyed [Jan 28 19:31:36] DEBUG[12150] pjsip: stun_session.c STUN session 0x7fc388011198 destroyed [Jan 28 19:31:36] DEBUG[12150] pjsip: stun_session.c STUN session 0x7fc388012198 destroyed [Jan 28 19:31:36] DEBUG[12150] rtp_engine.c: Destroyed RTP instance '0x7fc388001d68' [Jan 28 19:31:36] DEBUG[12150] pjsip: icess0x7fc3880 Destroying ICE session 0x7fc388003ec8 [Jan 28 19:31:36] DEBUG[12150] pjsip: stuse0x7fc3880 STUN session 0x7fc388030818 destroy request, ref_cnt=4 [Jan 28 19:31:36] DEBUG[12150] pjsip: stuse0x7fc3880 STUN session 0x7fc388031818 destroy request, ref_cnt=3 [Jan 28 19:31:36] DEBUG[12150] pjsip: ice_session.c ICE session 0x7fc388003ec8 destroyed [Jan 28 19:31:36] DEBUG[12150] pjsip: stun_session.c STUN session 0x7fc388030818 destroyed [Jan 28 19:31:36] DEBUG[12150] pjsip: stun_session.c STUN session 0x7fc388031818 destroyed [Jan 28 19:31:36] DEBUG[12150] rtp_engine.c: Destroyed RTP instance '0x7fc388003228' [Jan 28 19:31:41] DEBUG[12147] pjsip: stuse0x7fc3800 .TX 20 bytes STUN message to 186.XX.XX.XX:43997: --- begin STUN message --- STUN Binding indication Hdr: length=0, magic=2112a442, tsx_id=00002f4d0057e7d113cf2adb Attributes: --- end of STUN message --- [Jan 28 19:31:41] DEBUG[12147] pjsip: stun_session.c .tdata 0x7fc38c0053d8 destroy request, force=0, tsx=(nil) [Jan 28 19:31:42] DEBUG[12147] pjsip: stuse0x7fc3800 .TX 20 bytes STUN message to 186.XX.XX.XX:59186: --- begin STUN message --- STUN Binding indication Hdr: length=0, magic=2112a442, tsx_id=00002f4d7cf66d8513cf2adc Attributes: --- end of STUN message --- [Jan 28 19:31:42] DEBUG[12147] pjsip: stun_session.c .tdata 0x7fc38c0053d8 destroy request, force=0, tsx=(nil) [Jan 28 19:31:53] DEBUG[12147] pjsip: stuse0x7fc3800 .TX 20 bytes STUN message to 186.XX.XX.XX:41177: --- begin STUN message --- STUN Binding indication Hdr: length=0, magic=2112a442, tsx_id=00002f4d0257523d13cf2add Attributes: --- end of STUN message --- [Jan 28 19:31:53] DEBUG[12147] pjsip: stun_session.c .tdata 0x7fc38c0053d8 destroy request, force=0, tsx=(nil) [Jan 28 19:31:53] DEBUG[12147] pjsip: stuse0x7fc3800 .TX 20 bytes STUN message to 186.XX.XX.XX:57885: --- begin STUN message --- STUN Binding indication Hdr: length=0, magic=2112a442, tsx_id=00002f4d31f1715d13cf2ade Attributes: --- end of STUN message --- [Jan 28 19:31:53] DEBUG[12147] pjsip: stun_session.c .tdata 0x7fc38c0053d8 destroy request, force=0, tsx=(nil) [Jan 28 19:31:55] DEBUG[12412] threadpool.c: Worker thread idle timeout reached. Dying. [Jan 28 19:31:55] DEBUG[12411] threadpool.c: Worker thread idle timeout reached. Dying. [Jan 28 19:31:55] DEBUG[12113] threadpool.c: Destroying worker thread 25 [Jan 28 19:31:55] DEBUG[12113] threadpool.c: Destroying worker thread 24 [Jan 28 19:32:03] DEBUG[12147] pjsip: stuse0x7fc3800 .TX 20 bytes STUN message to 186.XX.XX.XX:59186: --- begin STUN message --- STUN Binding indication Hdr: length=0, magic=2112a442, tsx_id=00002f4d083acb0313cf2adf Attributes: --- end of STUN message --- [Jan 28 19:32:03] DEBUG[12147] pjsip: stun_session.c .tdata 0x7fc38c0053d8 destroy request, force=0, tsx=(nil) [Jan 28 19:32:04] DEBUG[12147] pjsip: stuse0x7fc3800 .TX 20 bytes STUN message to 186.XX.XX.XX:43997: --- begin STUN message --- STUN Binding indication Hdr: length=0, magic=2112a442, tsx_id=00002f4d7fff456c13cf2ae0 Attributes: --- end of STUN message --- [Jan 28 19:32:04] DEBUG[12147] pjsip: stun_session.c .tdata 0x7fc38c0053d8 destroy request, force=0, tsx=(nil) [Jan 28 19:32:07] DEBUG[12150] chan_sip.c: Auto destroying SIP dialog '4ead8d547980693835eed3c5623cac67@10.37.172.89:5060' [Jan 28 19:32:07] DEBUG[12150] chan_sip.c: Destroying SIP dialog 4ead8d547980693835eed3c5623cac67@10.37.172.89:5060 [Jan 28 19:32:07] VERBOSE[12150] chan_sip.c: Really destroying SIP dialog '4ead8d547980693835eed3c5623cac67@10.37.172.89:5060' Method: BYE [Jan 28 19:32:07] DEBUG[12150] chan_sip.c: Updating call counter for outgoing call [Jan 28 19:32:07] DEBUG[12150] chan_sip.c: Call to peer '101' removed from call limit 0 [Jan 28 19:32:07] DEBUG[12150] chan_sip.c: This call did not properly clean up call limits. Call ID 4ead8d547980693835eed3c5623cac67@10.37.172.89:5060 [Jan 28 19:32:07] DEBUG[12125] devicestate.c: No provider found, checking channel drivers for SIP - 101 [Jan 28 19:32:07] DEBUG[12125] chan_sip.c: Checking device state for peer 101 [Jan 28 19:32:07] DEBUG[12125] devicestate.c: Changing state for SIP/101 - state 1 (Not in use) [Jan 28 19:32:07] DEBUG[12150] pjsip: icess0x7fc3800 Destroying ICE session 0x7fc38001e9e8 [Jan 28 19:32:07] DEBUG[12150] pjsip: stuse0x7fc3800 STUN session 0x7fc3800209f8 destroy request, ref_cnt=4 [Jan 28 19:32:07] DEBUG[12150] pjsip: stuse0x7fc3800 STUN session 0x7fc3800219f8 destroy request, ref_cnt=3 [Jan 28 19:32:07] DEBUG[12150] pjsip: ice_session.c ICE session 0x7fc38001e9e8 destroyed [Jan 28 19:32:07] DEBUG[12150] pjsip: stun_session.c STUN session 0x7fc3800209f8 destroyed [Jan 28 19:32:07] DEBUG[12150] pjsip: stun_session.c STUN session 0x7fc3800219f8 destroyed [Jan 28 19:32:07] DEBUG[12150] rtp_engine.c: Destroyed RTP instance '0x7fc380016318' [Jan 28 19:32:07] DEBUG[12150] pjsip: icess0x7fc3800 Destroying ICE session 0x7fc38002b138 [Jan 28 19:32:07] DEBUG[12150] pjsip: stuse0x7fc3800 STUN session 0x7fc38002d978 destroy request, ref_cnt=4 [Jan 28 19:32:07] DEBUG[12150] pjsip: stuse0x7fc3800 STUN session 0x7fc38002e978 destroy request, ref_cnt=3 [Jan 28 19:32:07] DEBUG[12150] pjsip: ice_session.c ICE session 0x7fc38002b138 destroyed [Jan 28 19:32:07] DEBUG[12150] pjsip: stun_session.c STUN session 0x7fc38002d978 destroyed [Jan 28 19:32:07] DEBUG[12150] pjsip: stun_session.c STUN session 0x7fc38002e978 destroyed [Jan 28 19:32:07] DEBUG[12150] rtp_engine.c: Destroyed RTP instance '0x7fc380027e18' [Jan 28 19:36:20] VERBOSE[12197] chan_sip.c: <--- SIP read from WS:186.XX.XX.XX:37687 ---> REGISTER sip:59.XX.XX.XX SIP/2.0 Via: SIP/2.0/WS jvp15e71m9jt.invalid;branch=z9hG4bK4809329 Max-Forwards: 69 To: From: "101" ;tag=68shlrq9vv Call-ID: cc6qa8p3jgsck71v00rvvr CSeq: 5 REGISTER Contact: ;+sip.ice;reg-id=1;+sip.instance="";expires=600 Expires: 600 Allow: INVITE,ACK,CANCEL,BYE,UPDATE,MESSAGE,OPTIONS Supported: path,gruu,outbound User-Agent: JsSIP 0.6.12 Content-Length: 0 <-------------> [Jan 28 19:36:20] DEBUG[12197] chan_sip.c: Header 0 [ 35]: REGISTER sip:59.XX.XX.XX SIP/2.0 [Jan 28 19:36:20] DEBUG[12197] chan_sip.c: Header 1 [ 58]: Via: SIP/2.0/WS jvp15e71m9jt.invalid;branch=z9hG4bK4809329 [Jan 28 19:36:20] DEBUG[12197] chan_sip.c: Header 2 [ 16]: Max-Forwards: 69 [Jan 28 19:36:20] DEBUG[12197] chan_sip.c: Header 3 [ 28]: To: [Jan 28 19:36:20] DEBUG[12197] chan_sip.c: Header 4 [ 51]: From: "101" ;tag=68shlrq9vv [Jan 28 19:36:20] DEBUG[12197] chan_sip.c: Header 5 [ 31]: Call-ID: cc6qa8p3jgsck71v00rvvr [Jan 28 19:36:20] DEBUG[12197] chan_sip.c: Header 6 [ 16]: CSeq: 5 REGISTER [Jan 28 19:36:20] DEBUG[12197] chan_sip.c: Header 7 [151]: Contact: ;+sip.ice;reg-id=1;+sip.instance="";expires=600 [Jan 28 19:36:20] DEBUG[12197] chan_sip.c: Header 8 [ 12]: Expires: 600 [Jan 28 19:36:20] DEBUG[12197] chan_sip.c: Header 9 [ 51]: Allow: INVITE,ACK,CANCEL,BYE,UPDATE,MESSAGE,OPTIONS [Jan 28 19:36:20] DEBUG[12197] chan_sip.c: Header 10 [ 29]: Supported: path,gruu,outbound [Jan 28 19:36:20] DEBUG[12197] chan_sip.c: Header 11 [ 24]: User-Agent: JsSIP 0.6.12 [Jan 28 19:36:20] DEBUG[12197] chan_sip.c: Header 12 [ 17]: Content-Length: 0 [Jan 28 19:36:20] VERBOSE[12197] chan_sip.c: --- (13 headers 0 lines) --- [Jan 28 19:36:20] DEBUG[12197] chan_sip.c: = Looking for Call ID: cc6qa8p3jgsck71v00rvvr (Checking From) --From tag 68shlrq9vv --To-tag [Jan 28 19:36:20] DEBUG[12197] acl.c: For destination '186.XX.XX.XX', our source address is '10.37.172.89'. [Jan 28 19:36:20] DEBUG[12197] chan_sip.c: Setting AST_TRANSPORT_WS with address 10.37.172.89:5060 [Jan 28 19:36:20] DEBUG[12197] chan_sip.c: Allocating new SIP dialog for cc6qa8p3jgsck71v00rvvr - REGISTER (No RTP) [Jan 28 19:36:20] DEBUG[12197] chan_sip.c: **** Received REGISTER (2) - Command in SIP REGISTER [Jan 28 19:36:20] DEBUG[12197] chan_sip.c: Initializing initreq for method REGISTER - callid cc6qa8p3jgsck71v00rvvr [Jan 28 19:36:20] DEBUG[12197] netsock2.c: Splitting '59.XX.XX.XX' into... [Jan 28 19:36:20] DEBUG[12197] netsock2.c: ...host '59.XX.XX.XX' and port ''. [Jan 28 19:36:20] VERBOSE[12197] chan_sip.c: <--- Transmitting (NAT) to 186.XX.XX.XX:37687 ---> SIP/2.0 401 Unauthorized Via: SIP/2.0/WS jvp15e71m9jt.invalid;branch=z9hG4bK4809329;received=186.XX.XX.XX;rport=37687 From: "101" ;tag=68shlrq9vv To: ;tag=as2d957304 Call-ID: cc6qa8p3jgsck71v00rvvr CSeq: 5 REGISTER Server: Asterisk PBX 13.1.0 Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE Supported: replaces, timer WWW-Authenticate: Digest algorithm=MD5, realm="59.XX.XX.XX", nonce="481633be" Content-Length: 0 <------------> [Jan 28 19:36:20] DEBUG[12197] chan_sip.c: Trying to put 'SIP/2.0 401' onto WS socket destined for 186.XX.XX.XX:37687 [Jan 28 19:36:20] VERBOSE[12197] chan_sip.c: Scheduling destruction of SIP dialog 'cc6qa8p3jgsck71v00rvvr' in 32000 ms (Method: REGISTER) [Jan 28 19:36:21] VERBOSE[12197] chan_sip.c: <--- SIP read from WS:186.XX.XX.XX:37687 ---> REGISTER sip:59.XX.XX.XX SIP/2.0 Via: SIP/2.0/WS jvp15e71m9jt.invalid;branch=z9hG4bK8560989 Max-Forwards: 69 To: From: "101" ;tag=68shlrq9vv Call-ID: cc6qa8p3jgsck71v00rvvr CSeq: 6 REGISTER Authorization: Digest algorithm=MD5, username="101", realm="59.XX.XX.XX", nonce="481633be", uri="sip:59.XX.XX.XX", response="dd534bcc9c7941d9e9b622a49d37451c" Contact: ;+sip.ice;reg-id=1;+sip.instance="";expires=600 Expires: 600 Allow: INVITE,ACK,CANCEL,BYE,UPDATE,MESSAGE,OPTIONS Supported: path,gruu,outbound User-Agent: JsSIP 0.6.12 Content-Length: 0 <-------------> [Jan 28 19:36:21] DEBUG[12197] chan_sip.c: Header 0 [ 35]: REGISTER sip:59.XX.XX.XX SIP/2.0 [Jan 28 19:36:21] DEBUG[12197] chan_sip.c: Header 1 [ 58]: Via: SIP/2.0/WS jvp15e71m9jt.invalid;branch=z9hG4bK8560989 [Jan 28 19:36:21] DEBUG[12197] chan_sip.c: Header 2 [ 16]: Max-Forwards: 69 [Jan 28 19:36:21] DEBUG[12197] chan_sip.c: Header 3 [ 28]: To: [Jan 28 19:36:21] DEBUG[12197] chan_sip.c: Header 4 [ 51]: From: "101" ;tag=68shlrq9vv [Jan 28 19:36:21] DEBUG[12197] chan_sip.c: Header 5 [ 31]: Call-ID: cc6qa8p3jgsck71v00rvvr [Jan 28 19:36:21] DEBUG[12197] chan_sip.c: Header 6 [ 16]: CSeq: 6 REGISTER [Jan 28 19:36:21] DEBUG[12197] chan_sip.c: Header 7 [164]: Authorization: Digest algorithm=MD5, username="101", realm="59.XX.XX.XX", nonce="481633be", uri="sip:59.XX.XX.XX", response="dd534bcc9c7941d9e9b622a49d37451c" [Jan 28 19:36:21] DEBUG[12197] chan_sip.c: Header 8 [151]: Contact: ;+sip.ice;reg-id=1;+sip.instance="";expires=600 [Jan 28 19:36:21] DEBUG[12197] chan_sip.c: Header 9 [ 12]: Expires: 600 [Jan 28 19:36:21] DEBUG[12197] chan_sip.c: Header 10 [ 51]: Allow: INVITE,ACK,CANCEL,BYE,UPDATE,MESSAGE,OPTIONS [Jan 28 19:36:21] DEBUG[12197] chan_sip.c: Header 11 [ 29]: Supported: path,gruu,outbound [Jan 28 19:36:21] DEBUG[12197] chan_sip.c: Header 12 [ 24]: User-Agent: JsSIP 0.6.12 [Jan 28 19:36:21] DEBUG[12197] chan_sip.c: Header 13 [ 17]: Content-Length: 0 [Jan 28 19:36:21] VERBOSE[12197] chan_sip.c: --- (14 headers 0 lines) --- [Jan 28 19:36:21] DEBUG[12197] chan_sip.c: = Looking for Call ID: cc6qa8p3jgsck71v00rvvr (Checking From) --From tag 68shlrq9vv --To-tag [Jan 28 19:36:21] DEBUG[12197] netsock2.c: Splitting '59.XX.XX.XX' into... [Jan 28 19:36:21] DEBUG[12197] netsock2.c: ...host '59.XX.XX.XX' and port ''. [Jan 28 19:36:21] DEBUG[12197] netsock2.c: Splitting '59.XX.XX.XX' into... [Jan 28 19:36:21] DEBUG[12197] netsock2.c: ...host '59.XX.XX.XX' and port ''. [Jan 28 19:36:21] DEBUG[12197] chan_sip.c: **** Received REGISTER (2) - Command in SIP REGISTER [Jan 28 19:36:21] DEBUG[12197] chan_sip.c: Initializing initreq for method REGISTER - callid cc6qa8p3jgsck71v00rvvr [Jan 28 19:36:21] DEBUG[12197] netsock2.c: Splitting '59.XX.XX.XX' into... [Jan 28 19:36:21] DEBUG[12197] netsock2.c: ...host '59.XX.XX.XX' and port ''. [Jan 28 19:36:21] DEBUG[12197] chan_sip.c: Store REGISTER's src-IP:port for call routing. [Jan 28 19:36:21] DEBUG[12197] chan_sip.c: build_path: do not use Path headers [Jan 28 19:36:21] DEBUG[12113] threadpool.c: Increasing threadpool stasis-core's size by 1 [Jan 28 19:36:21] VERBOSE[12197] chan_sip.c: <--- Transmitting (NAT) to 186.XX.XX.XX:37687 ---> SIP/2.0 200 OK Via: SIP/2.0/WS jvp15e71m9jt.invalid;branch=z9hG4bK8560989;received=186.XX.XX.XX;rport=37687 From: "101" ;tag=68shlrq9vv To: ;tag=as2d957304 Call-ID: cc6qa8p3jgsck71v00rvvr CSeq: 6 REGISTER Server: Asterisk PBX 13.1.0 Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE Supported: replaces, timer Expires: 600 Contact: ;expires=600 Date: Wed, 28 Jan 2015 19:36:21 GMT Content-Length: 0 <------------> [Jan 28 19:36:21] DEBUG[12197] chan_sip.c: Trying to put 'SIP/2.0 200' onto WS socket destined for 186.XX.XX.XX:37687 [Jan 28 19:36:21] DEBUG[12125] devicestate.c: No provider found, checking channel drivers for SIP - 101 [Jan 28 19:36:21] DEBUG[12125] chan_sip.c: Checking device state for peer 101 [Jan 28 19:36:21] DEBUG[12125] devicestate.c: Changing state for SIP/101 - state 1 (Not in use) [Jan 28 19:36:21] VERBOSE[12197] chan_sip.c: Scheduling destruction of SIP dialog 'cc6qa8p3jgsck71v00rvvr' in 32000 ms (Method: REGISTER) [Jan 28 19:36:41] DEBUG[12471] threadpool.c: Worker thread idle timeout reached. Dying. [Jan 28 19:36:41] DEBUG[12113] threadpool.c: Destroying worker thread 26 [Jan 28 19:36:53] DEBUG[12150] chan_sip.c: Auto destroying SIP dialog 'cc6qa8p3jgsck71v00rvvr' [Jan 28 19:36:53] DEBUG[12150] chan_sip.c: Destroying SIP dialog cc6qa8p3jgsck71v00rvvr [Jan 28 19:36:53] VERBOSE[12150] chan_sip.c: Really destroying SIP dialog 'cc6qa8p3jgsck71v00rvvr' Method: REGISTER [Jan 28 19:37:02] DEBUG[12167] res_timing_timerfd.c: Expected to acknowledge 1 ticks but got 2 instead