Dear all,

I have set up both xten and sipura, I want to test onnet calls between them. I am fine with xten eyebeam to xten eyebeam, and sipura to sipura, both scenario works fine. when I do xten to sipura 2000, it rings and when pick up, xten sends BYE right after ACK. I've tried 1.0.1 verson and the CVS HEAD, happens to both version. did anyone encountered the same problem?

thanks

Ray
ps.  debug attached
U 61.144.140.110:42075 -> 210.184.138.8:5066
INVITE sip:[EMAIL PROTECTED]:5066 SIP/2.0.
To: <sip:[EMAIL PROTECTED]>.
From: 3068878<sip:[EMAIL PROTECTED]>;tag=6a33d80f.
Via: SIP/2.0/UDP 
192.168.1.168:9801;branch=z9hG4bK-d87543-443309010-1--d87543-;rport.
Call-ID: c47ef44f950e7a56.
CSeq: 1 INVITE.
Contact: <sip:[EMAIL PROTECTED]:9801>.
Max-Forwards: 70.
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, 
INFO.
Content-Type: application/sdp.
User-Agent: eyeBeam release 3004t stamp 16741.
Content-Length: 234.
.
v=0.
o=- 21525734 21525766 IN IP4 192.168.1.168.
s=eyeBeam.
c=IN IP4 192.168.1.168.
t=0 0.
m=audio 9802 RTP/AVP 18 101.
a=alt:1 1 : 8743E761 095E081B 192.168.1.168 9802.
a=fmtp:101 0-15.
a=rtpmap:101 telephone-event/8000.
a=sendrecv.

#
U 210.184.138.8:5066 -> 61.144.140.110:42075
SIP/2.0 100 trying -- your call is important to us.
To: <sip:[EMAIL PROTECTED]>.
From: 3068878<sip:[EMAIL PROTECTED]>;tag=6a33d80f.
Via: SIP/2.0/UDP 
192.168.1.168:9801;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075;received=61.144.140.110.
Call-ID: c47ef44f950e7a56.
CSeq: 1 INVITE.
Server: OpenSer (1.1.0-pre2-notls (i386/linux)).
Content-Length: 0.
.

#
U 210.184.138.8:5066 -> 219.136.10.86:64189
INVITE sip:[EMAIL PROTECTED]:64189 SIP/2.0.
Record-Route: <sip:210.184.138.8:5066;lr=on;ftag=6a33d80f>.
To: <sip:[EMAIL PROTECTED]>.
From: 3068878<sip:[EMAIL PROTECTED]>;tag=6a33d80f.
Via: SIP/2.0/UDP 210.184.138.8:5066;branch=z9hG4bK72b9.90fc56c.0.
Via: SIP/2.0/UDP 
192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075.
Call-ID: c47ef44f950e7a56.
CSeq: 1 INVITE.
Contact: <sip:[EMAIL PROTECTED]:42075>.
Max-Forwards: 69.
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, 
INFO.
Content-Type: application/sdp.
User-Agent: eyeBeam release 3004t stamp 16741.
Content-Length: 273.
P-hint: Proxied.
P-hint: usrloc applied.
.
v=0.
o=- 21525734 21525766 IN IP4 192.168.1.168.
s=eyeBeam.
c=IN IP4 210.184.138.8.
t=0 0.
m=audio 35130 RTP/AVP 18 101.
a=alt:1 1 : 8743E761 095E081B 192.168.1.168 9802.
a=fmtp:101 0-15.
a=rtpmap:101 telephone-event/8000.
a=sendrecv.
a=direction:active.
a=nortpproxy:yes.

#
U 219.136.10.86:64189 -> 210.184.138.8:5066
SIP/2.0 100 Trying.
To: <sip:[EMAIL PROTECTED]>.
From: 3068878<sip:[EMAIL PROTECTED]>;tag=6a33d80f.
Call-ID: c47ef44f950e7a56.
CSeq: 1 INVITE.
Via: SIP/2.0/UDP 210.184.138.8:5066;branch=z9hG4bK72b9.90fc56c.0.
Via: SIP/2.0/UDP 
192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075.
Record-Route: <sip:210.184.138.8:5066;lr=on;ftag=6a33d80f>.
Server: Sipura/SPA2000-2.0.13(g).
Content-Length: 0.
.

#
U 219.136.10.86:64189 -> 210.184.138.8:5066
SIP/2.0 180 Ringing.
To: <sip:[EMAIL PROTECTED]>;tag=3b3dbe3871bbfa37i0.
From: 3068878<sip:[EMAIL PROTECTED]>;tag=6a33d80f.
Call-ID: c47ef44f950e7a56.
CSeq: 1 INVITE.
Via: SIP/2.0/UDP 210.184.138.8:5066;branch=z9hG4bK72b9.90fc56c.0.
Via: SIP/2.0/UDP 
192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075.
Record-Route: <sip:210.184.138.8:5066;lr=on;ftag=6a33d80f>.
Server: Sipura/SPA2000-2.0.13(g).
Content-Length: 0.
.

#
U 210.184.138.8:5066 -> 61.144.140.110:42075
SIP/2.0 180 Ringing.
To: <sip:[EMAIL PROTECTED]>;tag=3b3dbe3871bbfa37i0.
From: 3068878<sip:[EMAIL PROTECTED]>;tag=6a33d80f.
Call-ID: c47ef44f950e7a56.
CSeq: 1 INVITE.
Via: SIP/2.0/UDP 
192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075.
Record-Route: <sip:210.184.138.8:5066;lr=on;ftag=6a33d80f>.
Server: Sipura/SPA2000-2.0.13(g).
Content-Length: 0.
.

#
U 61.144.140.110:46935 -> 210.184.138.8:5066
SIP/2.0 404 Not Found.
To: sip:61.144.140.110:46935;tag=ab59191034906d25i0.
From: sip:[EMAIL PROTECTED];tag=75ca79a5.
Call-ID: [EMAIL PROTECTED]
CSeq: 1 OPTIONS.
Via: SIP/2.0/UDP 210.184.138.8:5066;branch=0.
Server: Sipura/SPA2002-3.1.2(a).
Content-Length: 0.
.

#
U 219.136.10.86:64189 -> 210.184.138.8:5066
SIP/2.0 180 Ringing.
To: <sip:[EMAIL PROTECTED]>;tag=3b3dbe3871bbfa37i0.
From: 3068878<sip:[EMAIL PROTECTED]>;tag=6a33d80f.
Call-ID: c47ef44f950e7a56.
CSeq: 1 INVITE.
Via: SIP/2.0/UDP 210.184.138.8:5066;branch=z9hG4bK72b9.90fc56c.0.
Via: SIP/2.0/UDP 
192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075.
Record-Route: <sip:210.184.138.8:5066;lr=on;ftag=6a33d80f>.
Server: Sipura/SPA2000-2.0.13(g).
Content-Length: 0.
.

#
U 210.184.138.8:5066 -> 61.144.140.110:42075
SIP/2.0 180 Ringing.
To: <sip:[EMAIL PROTECTED]>;tag=3b3dbe3871bbfa37i0.
From: 3068878<sip:[EMAIL PROTECTED]>;tag=6a33d80f.
Call-ID: c47ef44f950e7a56.
CSeq: 1 INVITE.
Via: SIP/2.0/UDP 
192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075.
Record-Route: <sip:210.184.138.8:5066;lr=on;ftag=6a33d80f>.
Server: Sipura/SPA2000-2.0.13(g).
Content-Length: 0.
.

#
U 219.136.10.86:64189 -> 210.184.138.8:5066
SIP/2.0 200 OK.
To: <sip:[EMAIL PROTECTED]>;tag=3b3dbe3871bbfa37i0.
From: 3068878<sip:[EMAIL PROTECTED]>;tag=6a33d80f.
Call-ID: c47ef44f950e7a56.
CSeq: 1 INVITE.
Via: SIP/2.0/UDP 210.184.138.8:5066;branch=z9hG4bK72b9.90fc56c.0.
Via: SIP/2.0/UDP 
192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075.
Record-Route: <sip:210.184.138.8:5066;lr=on;ftag=6a33d80f>.
Contact: 862061241205 <sip:[EMAIL PROTECTED]:8177>.
Server: Sipura/SPA2000-2.0.13(g).
Content-Length: 238.
Allow: ACK, BYE, CANCEL, INFO, INVITE, NOTIFY, OPTIONS, REFER.
Supported: x-sipura.
Content-Type: application/sdp.
.
v=0.
o=- 12432 12432 IN IP4 192.168.10.244.
s=-.
c=IN IP4 192.168.10.244.
t=0 0.
m=audio 43712 RTP/AVP 18 100 101.
a=rtpmap:18 G729a/8000.
a=rtpmap:100 NSE/8000.
a=rtpmap:101 telephone-event/8000.
a=fmtp:101 0-15.
a=ptime:30.
a=sendrecv.

#
U 210.184.138.8:5066 -> 61.144.140.110:42075
SIP/2.0 200 OK.
To: <sip:[EMAIL PROTECTED]>;tag=3b3dbe3871bbfa37i0.
From: 3068878<sip:[EMAIL PROTECTED]>;tag=6a33d80f.
Call-ID: c47ef44f950e7a56.
CSeq: 1 INVITE.
Via: SIP/2.0/UDP 
192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075.
Record-Route: <sip:210.184.138.8:5066;lr=on;ftag=6a33d80f>.
Contact: 862061241205 <sip:[EMAIL PROTECTED]:64189>.
Server: Sipura/SPA2000-2.0.13(g).
Content-Length: 255.
Allow: ACK, BYE, CANCEL, INFO, INVITE, NOTIFY, OPTIONS, REFER.
Supported: x-sipura.
Content-Type: application/sdp.
P-hint: Reply-Proxied.
.
v=0.
o=- 12432 12432 IN IP4 192.168.10.244.
s=-.
c=IN IP4 210.184.138.8.
t=0 0.
m=audio 35132 RTP/AVP 18 100 101.
a=rtpmap:18 G729a/8000.
a=rtpmap:100 NSE/8000.
a=rtpmap:101 telephone-event/8000.
a=fmtp:101 0-15.
a=ptime:30.
a=sendrecv.
a=nortpproxy:yes.

#
U 61.144.140.110:42075 -> 210.184.138.8:5066
ACK sip:[EMAIL PROTECTED]:64189 SIP/2.0.
To: <sip:[EMAIL PROTECTED]>;tag=3b3dbe3871bbfa37i0.
From: 3068878<sip:[EMAIL PROTECTED]>;tag=6a33d80f.
Via: SIP/2.0/UDP 
192.168.1.168:9801;branch=z9hG4bK-d87543-708924014-1--d87543-;rport.
Call-ID: c47ef44f950e7a56.
CSeq: 1 ACK.
Route: <sip:210.184.138.8:5066;lr;ftag=6a33d80f>.
Contact: <sip:[EMAIL PROTECTED]:9801>.
Max-Forwards: 70.
User-Agent: eyeBeam release 3004t stamp 16741.
Content-Length: 0.
.

#
U 210.184.138.8:5066 -> 219.136.10.86:64189
ACK sip:[EMAIL PROTECTED]:64189 SIP/2.0.
To: <sip:[EMAIL PROTECTED]>;tag=3b3dbe3871bbfa37i0.
From: 3068878<sip:[EMAIL PROTECTED]>;tag=6a33d80f.
Via: SIP/2.0/UDP 210.184.138.8:5066;branch=z9hG4bK72b9.90fc56c.2.
Via: SIP/2.0/UDP 
192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-708924014-1--d87543-;rport=42075.
Call-ID: c47ef44f950e7a56.
CSeq: 1 ACK.
Contact: <sip:[EMAIL PROTECTED]:42075>.
Max-Forwards: 69.
User-Agent: eyeBeam release 3004t stamp 16741.
Content-Length: 0.
P-hint: Proxied.
P-hint: rr-enforced.
.

#
U 61.144.140.110:42075 -> 210.184.138.8:5066
BYE sip:[EMAIL PROTECTED]:64189 SIP/2.0.
To: <sip:[EMAIL PROTECTED]>;tag=3b3dbe3871bbfa37i0.
From: 3068878<sip:[EMAIL PROTECTED]>;tag=6a33d80f.
Via: SIP/2.0/UDP 
192.168.1.168:9801;branch=z9hG4bK-d87543-956249433-1--d87543-;rport.
Call-ID: c47ef44f950e7a56.
CSeq: 2 BYE.
Route: <sip:210.184.138.8:5066;lr;ftag=6a33d80f>.
Contact: <sip:[EMAIL PROTECTED]:9801>.
Max-Forwards: 70.
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, 
INFO.
User-Agent: eyeBeam release 3004t stamp 16741.
Content-Length: 0.
.

#
U 210.184.138.8:5066 -> 219.136.10.86:64189
BYE sip:[EMAIL PROTECTED]:64189 SIP/2.0.
To: <sip:[EMAIL PROTECTED]>;tag=3b3dbe3871bbfa37i0.
From: 3068878<sip:[EMAIL PROTECTED]>;tag=6a33d80f.
Via: SIP/2.0/UDP 210.184.138.8:5066;branch=z9hG4bK42b9.d7afa485.0.
Via: SIP/2.0/UDP 
192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-956249433-1--d87543-;rport=42075.
Call-ID: c47ef44f950e7a56.
CSeq: 2 BYE.
Contact: <sip:[EMAIL PROTECTED]:42075>.
Max-Forwards: 69.
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, 
INFO.
User-Agent: eyeBeam release 3004t stamp 16741.
Content-Length: 0.
P-hint: Proxied.
P-hint: rr-enforced.
.

#
U 219.136.10.86:64189 -> 210.184.138.8:5066
SIP/2.0 200 OK.
To: <sip:[EMAIL PROTECTED]>;tag=3b3dbe3871bbfa37i0.
From: 3068878<sip:[EMAIL PROTECTED]>;tag=6a33d80f.
Call-ID: c47ef44f950e7a56.
CSeq: 2 BYE.
Via: SIP/2.0/UDP 210.184.138.8:5066;branch=z9hG4bK42b9.d7afa485.0.
Via: SIP/2.0/UDP 
192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-956249433-1--d87543-;rport=42075.
Server: Sipura/SPA2000-2.0.13(g).
Content-Length: 0.
.

#
U 210.184.138.8:5066 -> 61.144.140.110:42075
SIP/2.0 200 OK.
To: <sip:[EMAIL PROTECTED]>;tag=3b3dbe3871bbfa37i0.
From: 3068878<sip:[EMAIL PROTECTED]>;tag=6a33d80f.
Call-ID: c47ef44f950e7a56.
CSeq: 2 BYE.
Via: SIP/2.0/UDP 
192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-956249433-1--d87543-;rport=42075.
Server: Sipura/SPA2000-2.0.13(g).
Content-Length: 0.


 0(2815) receive_msg: cleaning up
 0(2815) SIP Request:
 0(2815)  method:  <INVITE>
 0(2815)  uri:     <sip:[EMAIL PROTECTED]:5066>
 0(2815)  version: <SIP/2.0>
 0(2815) parse_headers: flags=2
 0(2815) DEBUG:parse_to:end of header reached, state=10
 0(2815) DBUG:parse_to: display={}, ruri={sip:[EMAIL PROTECTED]
 0(2815) DEBUG: get_hdr_field: <To> [33]; uri=[sip:[EMAIL PROTECTED] 
 0(2815) DEBUG: to body [<sip:[EMAIL PROTECTED]>
]
 0(2815) Found param type 232, <branch> = 
<z9hG4bK-d87543-443309010-1--d87543->; state=6
 0(2815) Found param type 235, <rport> = <n/a>; state=17
 0(2815) end of header reached, state=5
 0(2815) parse_headers: Via found, flags=2
 0(2815) parse_headers: this is the first via
 0(2815) After parse_msg...
 0(2815) preparing to run routing scripts...
 0(2815) parse_headers: flags=100
 0(2815) get_hdr_field: cseq <CSeq>: <1> <INVITE>
 0(2815) DEBUG:maxfwd:is_maxfwd_present: value = 70 
 0(2815) parse_headers: flags=80
 0(2815) parse_headers: flags=ffffffffffffffff
 0(2815) DEBUG: get_hdr_body : content_length=234
 0(2815) found end of header
 0(2815) DEBUG:check_content_type: type <application/sdp> found valid
 0(2815) parse_headers: flags=ffffffffffffffff
 0(2815) parse_headers: flags=200
 0(2815) find_first_route: No Route headers found
 0(2815) loose_route: There is no Route HF
 0(2815) DEBUG: add_param: tag=6a33d80f
 0(2815) DEBUG:parse_to:end of header reached, state=29
 0(2815) DBUG:parse_to: display={3068878}, ruri={sip:[EMAIL PROTECTED]
 0(2815) grep_sock_info - checking if host==us: 13==13 &&  [210.184.138.8] == 
[210.184.138.8]
 0(2815) grep_sock_info - checking if port 5066 matches port 5066
 0(2815) DEBUG:avpops:load_avps: loaded avps = 0
 0(2815) rewrite_uri: Rewriting Request-URI with 'sip:[EMAIL PROTECTED]:64189'
 0(2815) DEBUG:avpops:load_avps: loaded avps = 0
 0(2815) parse_headers: flags=ffffffffffffffff
 0(2815) parse_headers: flags=ffffffffffffffff
 0(2815) DEBUG:check_content_type: type <application/sdp> found valid
 0(2815) parse_headers: flags=40
 0(2815) force_rtp_proxy2: proxy reply: 35130 210.184.138.8

 0(2815) DEBUG: t_newtran: msg id=69 , global msg id=40 , T on 
entrance=0xffffffff
 0(2815) parse_headers: flags=ffffffffffffffff
 0(2815) parse_headers: flags=78
 0(2815) t_lookup_request: start searching: hash=39719, isACK=0
 0(2815) DEBUG: RFC3261 transaction matching failed
 0(2815) DEBUG: t_lookup_request: no transaction found
 0(2815) DEBUG:tm:t_relay: new INVITE
 0(2815) parse_headers: flags=ffffffffffffffff
 0(2815) check_via_address(61.144.140.110, 192.168.1.168, 1)
 0(2815) check_via_address: doing dns lookup
 0(2815) WARNING:vqm_resize: resize(0) called
 0(2815) DEBUG:tm:_reply_light: reply sent out. buf=0x81631c0: SIP/2.0 1..., 
shmem=0xb60aff08: SIP/2.0 1
 0(2815) DEBUG:tm:_reply_light: finished
 0(2815) DEBUG: mk_proxy: doing DNS lookup...
 0(2815) parse_headers: flags=2000
 0(2815) parse_headers: flags=ffffffffffffffff
 0(2815) clen_builder: content-length: 273 (273)
 0(2815) check_via_address(61.144.140.110, 192.168.1.168, 1)
 0(2815) check_via_address: doing dns lookup
 0(2815) DEBUG: add_to_tail_of_timer[4]: 0xb60b048c
 0(2815) DEBUG: add_to_tail_of_timer[0]: 0xb60b049c
 0(2815) SER: new transaction fwd'ed
 0(2815) DEBUG:tm:UNREF_UNSAFE: after is 0
 0(2815) DEBUG:destroy_avp_list: destroying list (nil)
 0(2815) receive_msg: cleaning up
 0(2815) SIP Reply  (status):
 0(2815)  version: <SIP/2.0>
 0(2815)  status:  <100>
 0(2815)  reason:  <Trying>
 0(2815) parse_headers: flags=2
 0(2815) DEBUG:parse_to:end of header reached, state=10
 0(2815) DBUG:parse_to: display={}, ruri={sip:[EMAIL PROTECTED]
 0(2815) DEBUG: get_hdr_field: <To> [33]; uri=[sip:[EMAIL PROTECTED] 
 0(2815) DEBUG: to body [<sip:[EMAIL PROTECTED]>
]
 0(2815) get_hdr_field: cseq <CSeq>: <1> <INVITE>
 0(2815) Found param type 232, <branch> = <z9hG4bK72b9.90fc56c.0>; state=16
 0(2815) end of header reached, state=5
 0(2815) parse_headers: Via found, flags=2
 0(2815) parse_headers: this is the first via
 0(2815) After parse_msg...
 0(2815) forward_reply: found module nathelper, passing reply to it
 0(2815) forward_reply: found module tm, passing reply to it
 0(2815) DEBUG: t_check: msg id=70 global id=69 T start=0xffffffff
 0(2815) parse_headers: flags=22
 0(2815) parse_headers: flags=8
 0(2815) DEBUG: t_reply_matching: hash 39719 label 207998729 branch 0
 0(2815) DEBUG:tm:REF_UNSAFE: after is 1
 0(2815) DEBUG: t_reply_matching: reply matched (T=0xb60b0370)!
 0(2815) DEBUG: t_check: msg id=70 global id=70 T end=0xb60b0370
 0(2815) DEBUG:tm:reply_received: org. status uas=100, uac[0]=0 local=0 
is_invite=1)
 0(2815) parse_headers: flags=80
 0(2815) Found param type 234, <received> = <61.144.140.110>; state=6
 0(2815) Found param type 232, <branch> = 
<z9hG4bK-d87543-443309010-1--d87543->; state=6
 0(2815) Found param type 235, <rport> = <42075>; state=16
 0(2815) end of header reached, state=5
 0(2815) parse_headers: Via found, flags=80
 0(2815) parse_headers: this is the second via
 0(2815) DEBUG: get_hdr_body : content_length=0
 0(2815) found end of header
 0(2815) DEBUG:tm:t_should_relay_response: T_code=100, new_code=100
 0(2815) DEBUG:tm:relay_reply: branch=0, save=0, relay=-1
 0(2815) DEBUG: add_to_tail_of_timer[1]: 0xb60b049c
 0(2815) DEBUG:tm:UNREF_UNSAFE: after is 0
 0(2815) DEBUG:destroy_avp_list: destroying list (nil)
 0(2815) receive_msg: cleaning up
 0(2815) SIP Reply  (status):
 0(2815)  version: <SIP/2.0>
 0(2815)  status:  <180>
 0(2815)  reason:  <Ringing>
 0(2815) parse_headers: flags=2
 0(2815) DEBUG: add_param: tag=3b3dbe3871bbfa37i0
 0(2815) DEBUG:parse_to:end of header reached, state=29
 0(2815) DBUG:parse_to: display={}, ruri={sip:[EMAIL PROTECTED]
 0(2815) DEBUG: get_hdr_field: <To> [56]; uri=[sip:[EMAIL PROTECTED] 
 0(2815) DEBUG: to body [<sip:[EMAIL PROTECTED]>]
 0(2815) get_hdr_field: cseq <CSeq>: <1> <INVITE>
 0(2815) Found param type 232, <branch> = <z9hG4bK72b9.90fc56c.0>; state=16
 0(2815) end of header reached, state=5
 0(2815) parse_headers: Via found, flags=2
 0(2815) parse_headers: this is the first via
 0(2815) After parse_msg...
 0(2815) forward_reply: found module nathelper, passing reply to it
 0(2815) forward_reply: found module tm, passing reply to it
 0(2815) DEBUG: t_check: msg id=71 global id=70 T start=0xffffffff
 0(2815) parse_headers: flags=22
 0(2815) parse_headers: flags=8
 0(2815) DEBUG: t_reply_matching: hash 39719 label 207998729 branch 0
 0(2815) DEBUG:tm:REF_UNSAFE: after is 1
 0(2815) DEBUG: t_reply_matching: reply matched (T=0xb60b0370)!
 0(2815) DEBUG: t_check: msg id=71 global id=71 T end=0xb60b0370
 0(2815) DEBUG:tm:reply_received: org. status uas=100, uac[0]=100 local=0 
is_invite=1)
 0(2815) parse_headers: flags=80
 0(2815) Found param type 234, <received> = <61.144.140.110>; state=6
 0(2815) Found param type 232, <branch> = 
<z9hG4bK-d87543-443309010-1--d87543->; state=6
 0(2815) Found param type 235, <rport> = <42075>; state=16
 0(2815) end of header reached, state=5
 0(2815) parse_headers: Via found, flags=80
 0(2815) parse_headers: this is the second via
 0(2815) DEBUG: get_hdr_body : content_length=0
 0(2815) found end of header
 0(2815) DEBUG:tm:t_should_relay_response: T_code=100, new_code=180
 0(2815) DEBUG:tm:relay_reply: branch=0, save=0, relay=0
 0(2815)  old size: 476, new size: 410
 0(2815) build_res_from_sip_res: copied size: orig:245, new: 179, rest: 231 msg=
SIP/2.0 180 Ringing
To: <sip:[EMAIL PROTECTED]>;tag=3b3dbe3871bbfa37i0
From: 3068878<sip:[EMAIL PROTECTED]>;tag=6a33d80f
Call-ID: c47ef44f950e7a56
CSeq: 1 INVITE
Via: SIP/2.0/UDP 
192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075
Record-Route: <sip:210.184.138.8:5066;lr=on;ftag=6a33d80f>
Server: Sipura/SPA2000-2.0.13(g)
Content-Length: 0


 0(2815) DEBUG:tm:relay_reply: sent buf=0x81631c0: SIP/2.0 1..., 
shmem=0xb60ae728: SIP/2.0 1
 0(2815) DEBUG: add_to_tail_of_timer[1]: 0xb60b049c
 0(2815) DEBUG:tm:UNREF_UNSAFE: after is 0
 0(2815) DEBUG:destroy_avp_list: destroying list (nil)
 0(2815) receive_msg: cleaning up
 1(2817) DEBUG: timer routine:4,tl=0xb60b048c next=(nil)
 0(2815) SIP Reply  (status):
 0(2815)  version: <SIP/2.0>
 0(2815)  status:  <404>
 0(2815)  reason:  <Not Found>
 0(2815) parse_headers: flags=2
 0(2815) DEBUG: add_param: tag=ab59191034906d25i0
 0(2815) DEBUG:parse_to:end of header reached, state=29
 0(2815) DBUG:parse_to: display={}, ruri={sip:61.144.140.110:46935}
 0(2815) DEBUG: get_hdr_field: <To> [49]; uri=[sip:61.144.140.110:46935] 
 0(2815) DEBUG: to body [sip:61.144.140.110:46935]
 0(2815) get_hdr_field: cseq <CSeq>: <1> <OPTIONS>
 0(2815) Found param type 232, <branch> = <0>; state=16
 0(2815) end of header reached, state=5
 0(2815) parse_headers: Via found, flags=2
 0(2815) parse_headers: this is the first via
 0(2815) After parse_msg...
 0(2815) forward_reply: found module nathelper, passing reply to it
 0(2815) DEBUG:nathelper:sipping_rpl_filter: reply for SIP natping filtered
 0(2815) DEBUG:destroy_avp_list: destroying list (nil)
 0(2815) receive_msg: cleaning up
 0(2815) SIP Reply  (status):
 0(2815)  version: <SIP/2.0>
 0(2815)  status:  <180>
 0(2815)  reason:  <Ringing>
 0(2815) parse_headers: flags=2
 0(2815) DEBUG: add_param: tag=3b3dbe3871bbfa37i0
 0(2815) DEBUG:parse_to:end of header reached, state=29
 0(2815) DBUG:parse_to: display={}, ruri={sip:[EMAIL PROTECTED]
 0(2815) DEBUG: get_hdr_field: <To> [56]; uri=[sip:[EMAIL PROTECTED] 
 0(2815) DEBUG: to body [<sip:[EMAIL PROTECTED]>]
 0(2815) get_hdr_field: cseq <CSeq>: <1> <INVITE>
 0(2815) Found param type 232, <branch> = <z9hG4bK72b9.90fc56c.0>; state=16
 0(2815) end of header reached, state=5
 0(2815) parse_headers: Via found, flags=2
 0(2815) parse_headers: this is the first via
 0(2815) After parse_msg...
 0(2815) forward_reply: found module nathelper, passing reply to it
 0(2815) forward_reply: found module tm, passing reply to it
 0(2815) DEBUG: t_check: msg id=73 global id=71 T start=0xffffffff
 0(2815) parse_headers: flags=22
 0(2815) parse_headers: flags=8
 0(2815) DEBUG: t_reply_matching: hash 39719 label 207998729 branch 0
 0(2815) DEBUG:tm:REF_UNSAFE: after is 1
 0(2815) DEBUG: t_reply_matching: reply matched (T=0xb60b0370)!
 0(2815) DEBUG: t_check: msg id=73 global id=73 T end=0xb60b0370
 0(2815) DEBUG:tm:reply_received: org. status uas=180, uac[0]=180 local=0 
is_invite=1)
 0(2815) parse_headers: flags=80
 0(2815) Found param type 234, <received> = <61.144.140.110>; state=6
 0(2815) Found param type 232, <branch> = 
<z9hG4bK-d87543-443309010-1--d87543->; state=6
 0(2815) Found param type 235, <rport> = <42075>; state=16
 0(2815) end of header reached, state=5
 0(2815) parse_headers: Via found, flags=80
 0(2815) parse_headers: this is the second via
 0(2815) DEBUG: get_hdr_body : content_length=0
 0(2815) found end of header
 0(2815) DEBUG:tm:t_should_relay_response: T_code=180, new_code=180
 0(2815) DEBUG:tm:relay_reply: branch=0, save=0, relay=0
 0(2815)  old size: 476, new size: 410
 0(2815) build_res_from_sip_res: copied size: orig:245, new: 179, rest: 231 msg=
SIP/2.0 180 Ringing
To: <sip:[EMAIL PROTECTED]>;tag=3b3dbe3871bbfa37i0
From: 3068878<sip:[EMAIL PROTECTED]>;tag=6a33d80f
Call-ID: c47ef44f950e7a56
CSeq: 1 INVITE
Via: SIP/2.0/UDP 
192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075
Record-Route: <sip:210.184.138.8:5066;lr=on;ftag=6a33d80f>
Server: Sipura/SPA2000-2.0.13(g)
Content-Length: 0


 0(2815) DEBUG:tm:relay_reply: sent buf=0x81631c0: SIP/2.0 1..., 
shmem=0xb60ae728: SIP/2.0 1
 0(2815) DEBUG: add_to_tail_of_timer[1]: 0xb60b049c
 0(2815) DEBUG:tm:UNREF_UNSAFE: after is 0
 0(2815) DEBUG:destroy_avp_list: destroying list (nil)
 0(2815) receive_msg: cleaning up
 0(2815) SIP Reply  (status):
 0(2815)  version: <SIP/2.0>
 0(2815)  status:  <200>
 0(2815)  reason:  <OK>
 0(2815) parse_headers: flags=2
 0(2815) DEBUG: add_param: tag=3b3dbe3871bbfa37i0
 0(2815) DEBUG:parse_to:end of header reached, state=29
 0(2815) DBUG:parse_to: display={}, ruri={sip:[EMAIL PROTECTED]
 0(2815) DEBUG: get_hdr_field: <To> [56]; uri=[sip:[EMAIL PROTECTED] 
 0(2815) DEBUG: to body [<sip:[EMAIL PROTECTED]>]
 0(2815) get_hdr_field: cseq <CSeq>: <1> <INVITE>
 0(2815) Found param type 232, <branch> = <z9hG4bK72b9.90fc56c.0>; state=16
 0(2815) end of header reached, state=5
 0(2815) parse_headers: Via found, flags=2
 0(2815) parse_headers: this is the first via
 0(2815) After parse_msg...
 0(2815) forward_reply: found module nathelper, passing reply to it
 0(2815) forward_reply: found module tm, passing reply to it
 0(2815) DEBUG: t_check: msg id=74 global id=73 T start=0xffffffff
 0(2815) parse_headers: flags=22
 0(2815) parse_headers: flags=8
 0(2815) DEBUG: t_reply_matching: hash 39719 label 207998729 branch 0
 0(2815) DEBUG:tm:REF_UNSAFE: after is 1
 0(2815) DEBUG: t_reply_matching: reply matched (T=0xb60b0370)!
 0(2815) DEBUG: t_check: msg id=74 global id=74 T end=0xb60b0370
 0(2815) DEBUG:tm:reply_received: org. status uas=180, uac[0]=180 local=0 
is_invite=1)
 0(2815) parse_headers: flags=ffffffffffffffff
 0(2815) Found param type 234, <received> = <61.144.140.110>; state=6
 0(2815) Found param type 232, <branch> = 
<z9hG4bK-d87543-443309010-1--d87543->; state=6
 0(2815) Found param type 235, <rport> = <42075>; state=16
 0(2815) end of header reached, state=5
 0(2815) parse_headers: Via found, flags=ffffffffffffffff
 0(2815) parse_headers: this is the second via
 0(2815) DEBUG: get_hdr_body : content_length=238
 0(2815) found end of header
 0(2815) DEBUG:check_content_type: type <application/sdp> found valid
 0(2815) parse_headers: flags=40
 0(2815) DEBUG: add_param: tag=6a33d80f
 0(2815) DEBUG:parse_to:end of header reached, state=29
 0(2815) DBUG:parse_to: display={3068878}, ruri={sip:[EMAIL PROTECTED]
 0(2815) force_rtp_proxy2: proxy reply: 35132 210.184.138.8

 0(2815) parse_headers: flags=ffffffffffffffff
 0(2815) parse_headers: flags=80
 0(2815) parse_headers: flags=80
 0(2815) DEBUG:tm:t_should_relay_response: T_code=180, new_code=200
 0(2815) DEBUG:tm:relay_reply: branch=0, save=0, relay=0
 0(2815) parse_headers: flags=2000
 0(2815) parse_headers: flags=ffffffffffffffff
 0(2815) clen_builder: content-length: 255 (255)
 0(2815)  old size: 888, new size: 862
 0(2815) build_res_from_sip_res: copied size: orig:888, new: 862, rest: 0 msg=
SIP/2.0 200 OK
To: <sip:[EMAIL PROTECTED]>;tag=3b3dbe3871bbfa37i0
From: 3068878<sip:[EMAIL PROTECTED]>;tag=6a33d80f
Call-ID: c47ef44f950e7a56
CSeq: 1 INVITE
Via: SIP/2.0/UDP 
192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-443309010-1--d87543-;rport=42075
Record-Route: <sip:210.184.138.8:5066;lr=on;ftag=6a33d80f>
Contact: 862061241205 <sip:[EMAIL PROTECTED]:64189>
Server: Sipura/SPA2000-2.0.13(g)
Content-Length: 255
Allow: ACK, BYE, CANCEL, INFO, INVITE, NOTIFY, OPTIONS, REFER
Supported: x-sipura
Content-Type: application/sdp
P-hint: Reply-Proxied

v=0
o=- 12432 12432 IN IP4 192.168.10.244
s=-
c=IN IP4 210.184.138.8
t=0 0
m=audio 35132 RTP/AVP 18 100 101
a=rtpmap:18 G729a/8000
a=rtpmap:100 NSE/8000
a=rtpmap:101 telephone-event/8000
a=fmtp:101 0-15
a=ptime:30
a=sendrecv
a=nortpproxy:yes

 0(2815) DEBUG: add_to_tail_of_timer[2]: 0xb60b03b8
 0(2815) DEBUG:tm:relay_reply: sent buf=0x81633c8: SIP/2.0 2..., 
shmem=0xb60b2060: SIP/2.0 2
 0(2815) DEBUG: cleanup_uac_timers: RETR/FR timers reset
 0(2815) DEBUG:tm:UNREF_UNSAFE: after is 0
 0(2815) DEBUG:destroy_avp_list: destroying list (nil)
 0(2815) receive_msg: cleaning up
 0(2815) SIP Request:
 0(2815)  method:  <ACK>
 0(2815)  uri:     <sip:[EMAIL PROTECTED]:64189>
 0(2815)  version: <SIP/2.0>
 0(2815) parse_headers: flags=2
 0(2815) DEBUG: add_param: tag=3b3dbe3871bbfa37i0
 0(2815) DEBUG:parse_to:end of header reached, state=29
 0(2815) DBUG:parse_to: display={}, ruri={sip:[EMAIL PROTECTED]
 0(2815) DEBUG: get_hdr_field: <To> [56]; uri=[sip:[EMAIL PROTECTED] 
 0(2815) DEBUG: to body [<sip:[EMAIL PROTECTED]>]
 0(2815) Found param type 232, <branch> = 
<z9hG4bK-d87543-708924014-1--d87543->; state=6
 0(2815) Found param type 235, <rport> = <n/a>; state=17
 0(2815) end of header reached, state=5
 0(2815) parse_headers: Via found, flags=2
 0(2815) parse_headers: this is the first via
 0(2815) After parse_msg...
 0(2815) preparing to run routing scripts...
 0(2815) DEBUG : sl_filter_ACK: to late to be a local ACK!
 0(2815) parse_headers: flags=100
 0(2815) get_hdr_field: cseq <CSeq>: <1> <ACK>
 0(2815) DEBUG:maxfwd:is_maxfwd_present: value = 70 
 0(2815) parse_headers: flags=80
 0(2815) parse_headers: flags=ffffffffffffffff
 0(2815) DEBUG: get_hdr_body : content_length=0
 0(2815) found end of header
 0(2815) parse_headers: flags=200
 0(2815) is_preloaded: No
 0(2815) grep_sock_info - checking if host==us: 13==13 &&  [219.136.10.86] == 
[210.184.138.8]
 0(2815) grep_sock_info - checking if port 5066 matches port 64189
 0(2815) grep_sock_info - checking if host==us: 13==13 &&  [219.136.10.86] == 
[210.184.138.8]
 0(2815) grep_sock_info - checking if port 5066 matches port 64189
 0(2815) check_self: host != me
 0(2815) grep_sock_info - checking if host==us: 13==13 &&  [210.184.138.8] == 
[210.184.138.8]
 0(2815) grep_sock_info - checking if port 5066 matches port 5066
 0(2815) after_loose: Topmost route URI: 
'sip:210.184.138.8:5066;lr;ftag=6a33d80f' is me
 0(2815) parse_headers: flags=200
 0(2815) found end of header
 0(2815) find_next_route: No next Route HF found
 0(2815) after_loose: No next URI found
 0(2815) DBG:rr:run_rr_callbacks: callback id 0 entered
 0(2815) DEBUG:uac:restore_from: getting 'vsf' Route param
 0(2815) DEBUG:uac:restore_from: Route param 'vsf' not found
 0(2815) parse_headers: flags=ffffffffffffffff
 0(2815) parse_headers: flags=ffffffffffffffff
 0(2815) ERROR: extract_body: message body has length zero
 0(2815) ERROR: force_rtp_proxy2: can't extract body from the message
 0(2815) DEBUG: t_newtran: msg id=75 , global msg id=74 , T on 
entrance=0xffffffff
 0(2815) parse_headers: flags=ffffffffffffffff
 0(2815) parse_headers: flags=78
 0(2815) t_lookup_request: start searching: hash=39719, isACK=1
 0(2815) parse_headers: flags=38
 0(2815) DEBUG: add_param: tag=6a33d80f
 0(2815) DEBUG:parse_to:end of header reached, state=29
 0(2815) DBUG:parse_to: display={3068878}, ruri={sip:[EMAIL PROTECTED]
 0(2815) DEBUG: t_lookup_request: e2e proxy ACK found
 0(2815) DEBUG:tm:REF_UNSAFE: after is 1
 0(2815) DEBUG:tm:t_relay: forwarding ACK
 0(2815) DEBUG:tm:t_relay: it's an end2end ACK
 0(2815) DEBUG:tm:UNREF_UNSAFE: after is 0
 0(2815) DEBUG: mk_proxy: doing DNS lookup...
 0(2815) check_via_address(61.144.140.110, 192.168.1.168, 1)
 0(2815) check_via_address: doing dns lookup
 0(2815) Sending:
ACK sip:[EMAIL PROTECTED]:64189 SIP/2.0
To: <sip:[EMAIL PROTECTED]>;tag=3b3dbe3871bbfa37i0
From: 3068878<sip:[EMAIL PROTECTED]>;tag=6a33d80f
Via: SIP/2.0/UDP 210.184.138.8:5066;branch=z9hG4bK72b9.90fc56c.2
Via: SIP/2.0/UDP 
192.168.1.168:9801;received=61.144.140.110;branch=z9hG4bK-d87543-708924014-1--d87543-;rport=42075
Call-ID: c47ef44f950e7a56
CSeq: 1 ACK
Contact: <sip:[EMAIL PROTECTED]:42075>
Max-Forwards: 69
User-Agent: eyeBeam release 3004t stamp 16741
Content-Length: 0
P-hint: Proxied
P-hint: rr-enforced

.
 0(2815) orig. len=470, new_len=556, proto=1
 0(2815) DEBUG:destroy_avp_list: destroying list (nil)
 0(2815) receive_msg: cleaning up
 1(2817) DEBUG: timer routine:1,tl=0xb60b049c next=(nil)
 0(2815) SIP Request:
 0(2815)  method:  <BYE>
 0(2815)  uri:     <sip:[EMAIL PROTECTED]:64189>
 0(2815)  version: <SIP/2.0>
 0(2815) parse_headers: flags=2
 0(2815) DEBUG: add_param: tag=3b3dbe3871bbfa37i0
 0(2815) DEBUG:parse_to:end of header reached, state=29
 0(2815) DBUG:parse_to: display={}, ruri={sip:[EMAIL PROTECTED]
 0(2815) DEBUG: get_hdr_field: <To> [56]; uri=[sip:[EMAIL PROTECTED] 
 0(2815) DEBUG: to body [<sip:[EMAIL PROTECTED]>]
 0(2815) Found param type 232, <branch> = 
<z9hG4bK-d87543-956249433-1--d87543->; state=6
 0(2815) Found param type 235, <rport> = <n/a>; state=17
 0(2815) end of header reached, state=5
 0(2815) parse_headers: Via found, flags=2







configuration :

        if (nat_uac_test("19")) {

                if (!search("^Record-Route:")) {

                        fix_nated_contact(); # Rewrite contact with source IP 
of signalling
                        if (method=="REGISTER") {
                                fix_nated_register();
                        } else if (method == "INVITE") {
                                fix_nated_sdp("1"); # Add direction=active to 
SDP
                        };

                        force_rport(); # Add rport parameter to topmost Via
                        append_hf("P-hint: Proxied\r\n");
                        setflag(10);    # Mark as NATed
                };
        
        };      
                        
        if (loose_route()) {
                append_hf("P-hint: rr-enforced\r\n");
                route(1);
                exit();
        }; 
                

        if (method=="REGISTER") {
                                
                if (src_ip==222.88.222.67 || src_ip==210.184.138.4) {
                        save("location");
                        exit();
                }

                if (!www_authorize("", "subscriber")) {
                        www_challenge("", "0");
                        exit();
                };
                                
                save("location");
                                
                if (isflagset(10)) {    
                        if (!(src_ip==222.88.222.67 || src_ip==210.184.138.4)) {
                                #add_path_received();
                                append_branch("sip:222.88.222.67:80");
                                t_replicate("sip:210.184.138.4:80");
                        }
                } else {
                        if (!(src_ip==222.88.222.67 || src_ip==210.184.138.4)) {
                                #add_path();
                                append_branch("sip:222.88.222.67:80");
                                t_replicate("sip:210.184.138.4:80");
                        }   
                }               
                        
                return;

        };

route[1]                                
{                                       

        # if client or server know to be behind a NAT, enable relay
        if (isflagset(10)) {
                force_rtp_proxy();
        };              
                        
        # NAT processing of replies; apply to all transactions (for example,
        # re-INVITEs from public to private UA are hard to identify as
        # NATed at the moment of request processing); look at replies
                        
        t_on_reply("1");
                        
        t_on_failure("1");

        # send it out now; use stateful forwarding as it works reliably
        # even for UDP2TCP
        if (!t_relay()) {
                sl_reply_error();
                return;         
        };                              
}       




_______________________________________________
Devel mailing list
[email protected]
http://openser.org/cgi-bin/mailman/listinfo/devel

Reply via email to