Hello Richard,

Now, after upgrading to - OpenSSL 1.0.1j 15 Oct 2014
Errors like -
"Failed to set up SRTP after DTLS negotiation: no SRTP protection profile
negotiated" are not seen but still the call is not getting through.

Please let me know how to proceed..

Thanks in advance


On Tue, Jan 27, 2015 at 2:14 AM, Rahul MathuR <rahul.ultim...@gmail.com>
wrote:

> Hi Richard,
>
> Thanks for spending some cycles on it.
>
> It is OpenSSL 1.0.1e-fips 11 Feb 2013
>
> On Tue, Jan 27, 2015 at 2:04 AM, Richard Fuchs <rfu...@sipwise.com> wrote:
>
>> On 26/01/15 02:21 PM, Rahul MathuR wrote:
>>
>>> Hello,
>>>
>>> I am totally struck at a point while implementing Kamailio as proxy for
>>> WebRTC enabled UAC (Jssip). I am using Google's TURN server
>>> (rfc5766-turn-server for ICE/STUN). I am able to get to the point where
>>> the SIP server sends 183 session in progress to kamailio but after that
>>> I can only see -
>>> "STUN: using this candidate"
>>> "Successful STUN binding request from .."
>>> "SRTP output wanted, but no crypto suite was negotiated"
>>>
>>
>> This is fairly strange:
>>
>>  Jan 27 00:35:46 localhost rtpengine[5262]: [tsb1jrsqsadn33jjsi4f port
>>> 30794] Failed to set up SRTP after DTLS negotiation: no SRTP protection
>>> profile negotiated
>>> Jan 27 00:35:46 localhost rtpengine[5262]: [tsb1jrsqsadn33jjsi4f port
>>> 30794] Failed to set up SRTP after DTLS negotiation: no SRTP protection
>>> profile negotiated
>>>
>>
>> Are you running a very old OpenSSL version  by any chance?
>>
>> cheers
>>
>>
>> _______________________________________________
>> SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
>> sr-users@lists.sip-router.org
>> http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users
>>
>
>
>
> --
> Warm Regds.
> MathuRahul
>



-- 
Warm Regds.
MathuRahul
Jan 27 02:14:17 localhost kamailio[2246]: INFO: <script>: Starting of 
request_route - #012 port is [10080],#011 proto is [ws],#011 user is 
[919650926333]#012 Message [INVITE sip:919650926333@125.99.186.124 
SIP/2.0#015#012Route: <sip:125.99.186.126:10080;transport=ws;lr>#015#012Via: 
SIP/2.0/WS vf6huklcsg7i.invalid;branch=z9hG4bK8132976#015#012Max-Forwards: 
69#015#012To: <sip:919650926333@125.99.186.124>#015#012From: "114488" 
<sip:114488@125.99.186.124>;tag=iiq2flnorq#015#012Call-ID: 
2mi1qf5cb3mg9vf0bp22#015#012CSeq: 2623 INVITE#015#012Contact: 
<sip:emf13f83@vf6huklcsg7i.invalid;transport=ws;ob>#015#012Content-Type: 
application/sdp#015#012Allow: 
INVITE,ACK,CANCEL,BYE,UPDATE,MESSAGE,OPTIONS#015#012Supported: 
ice,outbound#015#012User-Agent: JsSIP 0.6.4#015#012Content-Length: 
3042#015#012#015#012v=0#015#012o=- 3479457386797450545 2 IN IP4 
127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio 
video#015#012a=msid-semantic: WMS 
5DKLhoDH63ksNQLPuJfODFZ0We62dvZHeypu#015#012m=audio 21455 RTP/SAVPF 111 103 104 
9 0 8 106 105 13 126#015#012c=IN IP4 59.178.53.133#015#012a=rtcp:21455 IN IP4 
59.178.53.133#015#012a=candidate:704553097 1 udp 2122260223 192.168.1.3 61780 
typ host generation 0#015#012a=candidate:704553097 2 udp 2122260223 192.168.1.3 
61780 typ host generation 0#015#012a=candidate:1736268921 1 tcp 1518280447 
192.168.1.3 0 typ host tcptype active generation 
0#015#012a=candidate:1736268921 2 tcp 1518280447 192.168.1.3 0 typ host tcptype 
active generation 0#015#012a=candidate:2158047068 1 udp 1686052607 
59.178.53.133 21455 typ srflx raddr 192.168.1.3 rport 61780 generation 
0#015#012a=candidate:2158047068 2 udp 1686052607 59.178.53.133 21455 typ srflx 
raddr 192.168.1.3 rport 61780 generation 
0#015#012a=ice-ufrag:u4MhDJ9rtq6tLJi+#015#012a=ice-pwd:hbArhf2sDAU/BfClFII2LHm8#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256
 
AA:79:7A:FA:6E:B8:38:A4:1B:5E:60:4A:27:67:96:76:2F:09:C8:E7:2F:5B:D6:0B:0B:DF:10:31:4A:B8:27:AA#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1
 urn:ietf:params:rtp-hdrext:ssrc-a
Jan 27 02:14:17 localhost kamailio[2246]: INFO: <script>: Calling REQINIT, per 
request initial checks#012
Jan 27 02:14:17 localhost kamailio[2246]: WARNING: <script>: Inside REQINIT - 
checking the hops
Jan 27 02:14:17 localhost kamailio[2246]: WARNING: <script>: Inside REQINIT - 
Sanity check 
Jan 27 02:14:17 localhost kamailio[2246]: ERROR: <script>: Calling NATDETECT#012
Jan 27 02:14:17 localhost kamailio[2246]: ERROR: <script>: Inside NATDETECT
Jan 27 02:14:17 localhost kamailio[2246]: ERROR: <script>: Inside NATDETECT - 
Non-REGISTER Method hence - callling add_contact_alias
Jan 27 02:14:17 localhost kamailio[2246]: ERROR: <script>: Exiting from 
NATDETECT
Jan 27 02:14:17 localhost kamailio[2246]: ERROR: <script>: CAlling WITHINDLG - 
handle requests within SIP dialogs
Jan 27 02:14:17 localhost kamailio[2246]: ERROR: <script>: Inside WITHINDLG 
Jan 27 02:14:17 localhost kamailio[2246]: ERROR: <script>: Removing Route header
Jan 27 02:14:17 localhost kamailio[2246]: ERROR: <script>: Removed Route header 
and adding new one..
Jan 27 02:14:17 localhost kamailio[2246]: ERROR: <script>: New message becomes 
- [INVITE sip:919650926333@125.99.186.124 SIP/2.0#015#012Route: 
<sip:125.99.186.126:10080;transport=ws;lr>#015#012Via: SIP/2.0/WS 
vf6huklcsg7i.invalid;branch=z9hG4bK8132976#015#012Max-Forwards: 68#015#012To: 
<sip:919650926333@125.99.186.124>#015#012From: "114488" 
<sip:114488@125.99.186.124>;tag=iiq2flnorq#015#012Call-ID: 
2mi1qf5cb3mg9vf0bp22#015#012CSeq: 2623 INVITE#015#012Contact: 
<sip:emf13f83@vf6huklcsg7i.invalid;transport=ws;ob>#015#012Content-Type: 
application/sdp#015#012Allow: 
INVITE,ACK,CANCEL,BYE,UPDATE,MESSAGE,OPTIONS#015#012Supported: 
ice,outbound#015#012User-Agent: JsSIP 0.6.4#015#012Content-Length: 
3042#015#012#015#012v=0#015#012o=- 3479457386797450545 2 IN IP4 
127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio 
video#015#012a=msid-semantic: WMS 
5DKLhoDH63ksNQLPuJfODFZ0We62dvZHeypu#015#012m=audio 21455 RTP/SAVPF 111 103 104 
9 0 8 106 105 13 126#015#012c=IN IP4 59.178.53.133#015#012a=rtcp:21455 IN IP4 
59.178.53.133#015#012a=candidate:704553097 1 udp 2122260223 192.168.1.3 61780 
typ host generation 0#015#012a=candidate:704553097 2 udp 2122260223 192.168.1.3 
61780 typ host generation 0#015#012a=candidate:1736268921 1 tcp 1518280447 
192.168.1.3 0 typ host tcptype active generation 
0#015#012a=candidate:1736268921 2 tcp 1518280447 192.168.1.3 0 typ host tcptype 
active generation 0#015#012a=candidate:2158047068 1 udp 1686052607 
59.178.53.133 21455 typ srflx raddr 192.168.1.3 rport 61780 generation 
0#015#012a=candidate:2158047068 2 udp 1686052607 59.178.53.133 21455 typ srflx 
raddr 192.168.1.3 rport 61780 generation 
0#015#012a=ice-ufrag:u4MhDJ9rtq6tLJi+#015#012a=ice-pwd:hbArhf2sDAU/BfClFII2LHm8#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256
 
AA:79:7A:FA:6E:B8:38:A4:1B:5E:60:4A:27:67:96:76:2F:09:C8:E7:2F:5B:D6:0B:0B:DF:10:31:4A:B8:27:AA#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1
 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=extmap:3 
http://www.webrtc.org/experiments/rtp-hdrext/abs-send-ti
Jan 27 02:14:17 localhost kamailio[2246]: ERROR: <script>: Various informaiton 
for the message - #012rU: [919650926333] #012fd: [125.99.186.124] #012mb: 
[INVITE sip:919650926333@125.99.186.124 SIP/2.0#015#012Route: 
<sip:125.99.186.126:10080;transport=ws;lr>#015#012Via: SIP/2.0/WS 
vf6huklcsg7i.invalid;branch=z9hG4bK8132976#015#012Max-Forwards: 68#015#012To: 
<sip:919650926333@125.99.186.124>#015#012From: "114488" 
<sip:114488@125.99.186.124>;tag=iiq2flnorq#015#012Call-ID: 
2mi1qf5cb3mg9vf0bp22#015#012CSeq: 2623 INVITE#015#012Contact: 
<sip:emf13f83@vf6huklcsg7i.invalid;transport=ws;ob>#015#012Content-Type: 
application/sdp#015#012Allow: 
INVITE,ACK,CANCEL,BYE,UPDATE,MESSAGE,OPTIONS#015#012Supported: 
ice,outbound#015#012User-Agent: JsSIP 0.6.4#015#012Content-Length: 
3042#015#012#015#012v=0#015#012o=- 3479457386797450545 2 IN IP4 
127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio 
video#015#012a=msid-semantic: WMS 
5DKLhoDH63ksNQLPuJfODFZ0We62dvZHeypu#015#012m=audio 21455 RTP/SAVPF 111 103 104 
9 0 8 106 105 13 126#015#012c=IN IP4 59.178.53.133#015#012a=rtcp:21455 IN IP4 
59.178.53.133#015#012a=candidate:704553097 1 udp 2122260223 192.168.1.3 61780 
typ host generation 0#015#012a=candidate:704553097 2 udp 2122260223 192.168.1.3 
61780 typ host generation 0#015#012a=candidate:1736268921 1 tcp 1518280447 
192.168.1.3 0 typ host tcptype active generation 
0#015#012a=candidate:1736268921 2 tcp 1518280447 192.168.1.3 0 typ host tcptype 
active generation 0#015#012a=candidate:2158047068 1 udp 1686052607 
59.178.53.133 21455 typ srflx raddr 192.168.1.3 rport 61780 generation 
0#015#012a=candidate:2158047068 2 udp 1686052607 59.178.53.133 21455 typ srflx 
raddr 192.168.1.3 rport 61780 generation 
0#015#012a=ice-ufrag:u4MhDJ9rtq6tLJi+#015#012a=ice-pwd:hbArhf2sDAU/BfClFII2LHm8#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256
 
AA:79:7A:FA:6E:B8:38:A4:1B:5E:60:4A:27:67:96:76:2F:09:C8:E7:2F:5B:D6:0B:0B:DF:10:31:4A:B8:27:AA#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1
 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015
Jan 27 02:14:17 localhost kamailio[2246]: INFO: <script>: Request coming from WS
Jan 27 02:14:17 localhost rtpengine[2226]: Got valid command from 
127.0.0.1:49405: offer - { "sdp": "v=0#015#012o=- 3479457386797450545 2 IN IP4 
127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio 
video#015#012a=msid-semantic: WMS 
5DKLhoDH63ksNQLPuJfODFZ0We62dvZHeypu#015#012m=audio 21455 RTP/SAVPF 111 103 104 
9 0 8 106 105 13 126#015#012c=IN IP4 59.178.53.133#015#012a=rtcp:21455 IN IP4 
59.178.53.133#015#012a=candidate:704553097 1 udp 2122260223 192.168.1.3 61780 
typ host generation 0#015#012a=candidate:704553097 2 udp 2122260223 192.168.1.3 
61780 typ host generation 0#015#012a=candidate:17362 ...
Jan 27 02:14:17 localhost rtpengine[2226]: ... 68921 1 tcp 1518280447 
192.168.1.3 0 typ host tcptype active generation 
0#015#012a=candidate:1736268921 2 tcp 1518280447 192.168.1.3 0 typ host tcptype 
active generation 0#015#012a=candidate:2158047068 1 udp 1686052607 
59.178.53.133 21455 typ srflx raddr 192.168.1.3 rport 61780 generation 
0#015#012a=candidate:2158047068 2 udp 1686052607 59.178.53.133 21455 typ srflx 
raddr 192.168.1.3 rport 61780 generation 
0#015#012a=ice-ufrag:u4MhDJ9rtq6tLJi+#015#012a=ice-pwd:hbArhf2sDAU/BfClFII2LHm8#015#012a=ice-options:google-ice#015#012a=fingerprint
 ...
Jan 27 02:14:17 localhost rtpengine[2226]: ... :sha-256 
AA:79:7A:FA:6E:B8:38:A4:1B:5E:60:4A:27:67:96:76:2F:09:C8:E7:2F:5B:D6:0B:0B:DF:10:31:4A:B8:27:AA#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1
 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=extmap:3 
http://www.webrtc.org/experiments/rtp-hdrext/abs-send-time#015#012a=sendrecv#015#012a=rtcp-mux#015#012a=rtpmap:111
 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 
ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:9 
G722/8000#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 
PCMA/8000#015#012a=rtpmap:106 CN/32000#015#012a=rtpmap:105 CN/16000#015#012 ...
Jan 27 02:14:17 localhost rtpengine[2226]: ... a=rtpmap:13 
CN/8000#015#012a=rtpmap:126 
telephone-event/8000#015#012a=maxptime:60#015#012a=ssrc:3582067407 
cname:3B3uHRwYKt8E1dB0#015#012a=ssrc:3582067407 
msid:5DKLhoDH63ksNQLPuJfODFZ0We62dvZHeypu 
641324d1-3df6-4f0a-95dc-f93ce2f87b90#015#012a=ssrc:3582067407 
mslabel:5DKLhoDH63ksNQLPuJfODFZ0We62dvZHeypu#015#012a=ssrc:3582067407 
label:641324d1-3df6-4f0a-95dc-f93ce2f87b90#015#012m=video 21455 RTP/SAVPF 100 
116 117 96#015#012c=IN IP4 59.178.53.133#015#012a=rtcp:21455 IN IP4 
59.178.53.133#015#012a=candidate:704553097 1 udp 2122260223 192.168.1.3 61780 
typ hos ...
Jan 27 02:14:17 localhost rtpengine[2226]: ... t generation 
0#015#012a=candidate:704553097 2 udp 2122260223 192.168.1.3 61780 typ host 
generation 0#015#012a=candidate:1736268921 1 tcp 1518280447 192.168.1.3 0 typ 
host tcptype active generation 0#015#012a=candidate:1736268921 2 tcp 1518280447 
192.168.1.3 0 typ host tcptype active generation 
0#015#012a=candidate:2158047068 1 udp 1686052607 59.178.53.133 21455 typ srflx 
raddr 192.168.1.3 rport 61780 generation 0#015#012a=candidate:2158047068 2 udp 
1686052607 59.178.53.133 21455 typ srflx raddr 192.168.1.3 rport 61780 genera 
...
Jan 27 02:14:17 localhost rtpengine[2226]: ... tion 
0#015#012a=ice-ufrag:u4MhDJ9rtq6tLJi+#015#012a=ice-pwd:hbArhf2sDAU/BfClFII2LHm8#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256
 
AA:79:7A:FA:6E:B8:38:A4:1B:5E:60:4A:27:67:96:76:2F:09:C8:E7:2F:5B:D6:0B:0B:DF:10:31:4A:B8:27:AA#015#012a=setup:actpass#015#012a=mid:video#015#012a=extmap:2
 urn:ietf:params:rtp-hdrext:toffset#015#012a=extmap:3 
http://www.webrtc.org/experiments/rtp-hdrext/abs-send-time#015#012a=recvonly#015#012a=rtcp-mux#015#012a=rtpmap:100
 VP8/90000#015#012a=rtcp-fb:100 ccm fir#015#012a=rtcp-fb:100 
nack#015#012a=rtcp-fb:100 nack pli#015#012a=rtcp-fb:100 goog ...
Jan 27 02:14:17 localhost rtpengine[2226]: ... -remb#015#012a=rtpmap:116 
red/90000#015#012a=rtpmap:117 ulpfec/90000#015#012a=rtpmap:96 
rtx/90000#015#012a=fmtp:96 apt=100#015#012", "ICE": "remove", "flags": [ 
"trust-address" ], "replace": [ "origin", "session-connection" ], 
"transport-protocol": "RTP/AVP", "rtcp-mux": [ "demux" ], "call-id": 
"2mi1qf5cb3mg9vf0bp22", "received-from": [ "IP4", "59.178.53.133" ], 
"from-tag": "iiq2flnorq", "command": "offer" }
Jan 27 02:14:17 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22] Creating new 
call
Jan 27 02:14:17 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22] Returning to 
SIP proxy: d3:sdp1080:v=0#015#012o=- 3479457386797450545 2 IN IP4 
125.99.186.126#015#012s=-#015#012t=0 0#015#012a=msid-semantic: WMS 
5DKLhoDH63ksNQLPuJfODFZ0We62dvZHeypu#015#012m=audio 30126 RTP/AVP 111 103 104 9 
0 8 106 105 13 126#015#012c=IN IP4 125.99.186.126#015#012a=rtpmap:111 
opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 
ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:9 
G722/8000#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 
PCMA/8000#015#012a=rtpmap:106 CN/32000#015#012a=rtpmap:105 
CN/16000#015#012a=rtpmap:13 CN/8000#015#012a=rtpmap:126 telephone-ev ...
Jan 27 02:14:17 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22] ... 
ent/8000#015#012a=maxptime:60#015#012a=ssrc:3582067407 
cname:3B3uHRwYKt8E1dB0#015#012a=ssrc:3582067407 
msid:5DKLhoDH63ksNQLPuJfODFZ0We62dvZHeypu 
641324d1-3df6-4f0a-95dc-f93ce2f87b90#015#012a=ssrc:3582067407 
mslabel:5DKLhoDH63ksNQLPuJfODFZ0We62dvZHeypu#015#012a=ssrc:3582067407 
label:641324d1-3df6-4f0a-95dc-f93ce2f87b90#015#012a=sendrecv#015#012a=rtcp:30127#015#012m=video
 30160 RTP/AVP 100 116 117 96#015#012c=IN IP4 
125.99.186.126#015#012a=rtpmap:100 VP8/90000#015#012a=rtcp-fb:100 ccm 
fir#015#012a=rtcp-fb:100 nack#015#012a=rtcp-fb:100 nack 
pli#015#012a=rtcp-fb:100 goog-remb#015#012a=rt ...
Jan 27 02:14:17 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22] ... pmap:116 
red/90000#015#012a=rtpmap:117 ulpfec/90000#015#012a=rtpmap:96 
rtx/90000#015#012a=fmtp:96 
apt=100#015#012a=recvonly#015#012a=rtcp:30161#015#0126:result2:oke
Jan 27 02:14:17 localhost kamailio[2246]: WARNING: <script>: port is [10080], 
proto is [ws], user is [919650926333]#012 Message [INVITE 
sip:919650926333@125.99.186.124 SIP/2.0#015#012Route: 
<sip:125.99.186.126:10080;transport=ws;lr>#015#012Via: SIP/2.0/WS 
vf6huklcsg7i.invalid;branch=z9hG4bK8132976#015#012Max-Forwards: 68#015#012To: 
<sip:919650926333@125.99.186.124>#015#012From: "114488" 
<sip:114488@125.99.186.124>;tag=iiq2flnorq#015#012Call-ID: 
2mi1qf5cb3mg9vf0bp22#015#012CSeq: 2623 INVITE#015#012Contact: 
<sip:emf13f83@vf6huklcsg7i.invalid;transport=ws;ob>#015#012Content-Type: 
application/sdp#015#012Allow: 
INVITE,ACK,CANCEL,BYE,UPDATE,MESSAGE,OPTIONS#015#012Supported: 
ice,outbound#015#012User-Agent: JsSIP 0.6.4#015#012Content-Length: 
3042#015#012#015#012v=0#015#012o=- 3479457386797450545 2 IN IP4 
127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio 
video#015#012a=msid-semantic: WMS 
5DKLhoDH63ksNQLPuJfODFZ0We62dvZHeypu#015#012m=audio 21455 RTP/SAVPF 111 103 104 
9 0 8 106 105 13 126#015#012c=IN IP4 59.178.53.133#015#012a=rtcp:21455 IN IP4 
59.178.53.133#015#012a=candidate:704553097 1 udp 2122260223 192.168.1.3 61780 
typ host generation 0#015#012a=candidate:704553097 2 udp 2122260223 192.168.1.3 
61780 typ host generation 0#015#012a=candidate:1736268921 1 tcp 1518280447 
192.168.1.3 0 typ host tcptype active generation 
0#015#012a=candidate:1736268921 2 tcp 1518280447 192.168.1.3 0 typ host tcptype 
active generation 0#015#012a=candidate:2158047068 1 udp 1686052607 
59.178.53.133 21455 typ srflx raddr 192.168.1.3 rport 61780 generation 
0#015#012a=candidate:2158047068 2 udp 1686052607 59.178.53.133 21455 typ srflx 
raddr 192.168.1.3 rport 61780 generation 
0#015#012a=ice-ufrag:u4MhDJ9rtq6tLJi+#015#012a=ice-pwd:hbArhf2sDAU/BfClFII2LHm8#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256
 
AA:79:7A:FA:6E:B8:38:A4:1B:5E:60:4A:27:67:96:76:2F:09:C8:E7:2F:5B:D6:0B:0B:DF:10:31:4A:B8:27:AA#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1
 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=extmap:3 http://ww
Jan 27 02:14:17 localhost kamailio[2236]: INFO: <script>: Reply from softphone: 
100
Jan 27 02:14:17 localhost kamailio[2237]: INFO: <script>: Reply from softphone: 
407
Jan 27 02:14:17 localhost kamailio[2246]: INFO: <script>: Starting of 
request_route - #012 port is [10080],#011 proto is [ws],#011 user is 
[919650926333]#012 Message [ACK sip:919650926333@125.99.186.124 
SIP/2.0#015#012Via: SIP/2.0/WS 
vf6huklcsg7i.invalid;branch=z9hG4bK8132976#015#012Route: 
<sip:125.99.186.126:10080;transport=ws;lr>#015#012To: 
<sip:919650926333@125.99.186.124>;tag=4r5B0rgv1paSQ#015#012From: "114488" 
<sip:114488@125.99.186.124>;tag=iiq2flnorq#015#012Call-ID: 
2mi1qf5cb3mg9vf0bp22#015#012CSeq: 2623 ACK#015#012Content-Length: 
0#015#012#015#012]#012
Jan 27 02:14:17 localhost kamailio[2246]: INFO: <script>: Calling REQINIT, per 
request initial checks#012
Jan 27 02:14:17 localhost kamailio[2246]: WARNING: <script>: Inside REQINIT - 
checking the hops
Jan 27 02:14:17 localhost kamailio[2246]: WARNING: <script>: Inside REQINIT - 
Sanity check 
Jan 27 02:14:17 localhost kamailio[2246]: ERROR: <script>: Calling NATDETECT#012
Jan 27 02:14:17 localhost kamailio[2246]: ERROR: <script>: Inside NATDETECT
Jan 27 02:14:17 localhost kamailio[2246]: ERROR: <script>: Inside NATDETECT - 
Non-REGISTER Method hence - callling add_contact_alias
Jan 27 02:14:17 localhost kamailio[2246]: ERROR: <script>: Exiting from 
NATDETECT
Jan 27 02:14:17 localhost kamailio[2246]: ERROR: <script>: CAlling WITHINDLG - 
handle requests within SIP dialogs
Jan 27 02:14:17 localhost kamailio[2246]: ERROR: <script>: Inside WITHINDLG 
Jan 27 02:14:17 localhost kamailio[2246]: ERROR: <script>: Inside WITHINDLG - 
and has to_tag
Jan 27 02:14:17 localhost kamailio[2246]: ERROR: <script>: Inside WITHINDLG - 
loose_routed
Jan 27 02:14:17 localhost kamailio[2246]: ERROR: <script>: ==> duri=[<null>]
Jan 27 02:14:17 localhost kamailio[2246]: ERROR: <script>: Inside WITHINDLG - 
duri:[<null>], method is ACK and calling NATMANAGE
Jan 27 02:14:17 localhost kamailio[2246]: ERROR: <script>: Inside WITHINDLG - 
has to_tag and calling route(RELAY) 
Jan 27 02:14:17 localhost kamailio[2246]: INFO: <script>: Starting of 
request_route - #012 port is [10080],#011 proto is [ws],#011 user is 
[919650926333]#012 Message [INVITE sip:919650926333@125.99.186.124 
SIP/2.0#015#012Route: <sip:125.99.186.126:10080;transport=ws;lr>#015#012Via: 
SIP/2.0/WS vf6huklcsg7i.invalid;branch=z9hG4bK6689719#015#012Max-Forwards: 
69#015#012To: <sip:919650926333@125.99.186.124>#015#012From: "114488" 
<sip:114488@125.99.186.124>;tag=iiq2flnorq#015#012Call-ID: 
2mi1qf5cb3mg9vf0bp22#015#012CSeq: 2624 INVITE#015#012Proxy-Authorization: 
Digest algorithm=MD5, username="114488", realm="125.99.186.124", 
nonce="45c4cae8-a59d-11e4-a7b2-d33334a82f85", 
uri="sip:919650926333@125.99.186.124", 
response="e16155a76a14d7b4d12f3b23455dc135", qop=auth, cnonce="o7fdku9ci084", 
nc=00000001#015#012Contact: 
<sip:emf13f83@vf6huklcsg7i.invalid;transport=ws;ob>#015#012Content-Type: 
application/sdp#015#012Allow: 
INVITE,ACK,CANCEL,BYE,UPDATE,MESSAGE,OPTIONS#015#012Supported: 
ice,outbound#015#012User-Agent: JsSIP 0.6.4#015#012Content-Length: 
3042#015#012#015#012v=0#015#012o=- 3479457386797450545 2 IN IP4 
127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio 
video#015#012a=msid-semantic: WMS 
5DKLhoDH63ksNQLPuJfODFZ0We62dvZHeypu#015#012m=audio 21455 RTP/SAVPF 111 103 104 
9 0 8 106 105 13 126#015#012c=IN IP4 59.178.53.133#015#012a=rtcp:21455 IN IP4 
59.178.53.133#015#012a=candidate:704553097 1 udp 2122260223 192.168.1.3 61780 
typ host generation 0#015#012a=candidate:704553097 2 udp 2122260223 192.168.1.3 
61780 typ host generation 0#015#012a=candidate:1736268921 1 tcp 1518280447 
192.168.1.3 0 typ host tcptype active generation 
0#015#012a=candidate:1736268921 2 tcp 1518280447 192.168.1.3 0 typ host tcptype 
active generation 0#015#012a=candidate:2158047068 1 udp 1686052607 
59.178.53.133 21455 typ srflx raddr 192.168.1.3 rport 61780 generation 
0#015#012a=candidate:2158047068 2 udp 1686052607 59.178.53.133 21455 typ srflx 
raddr 192.168.1.3 rport 61780 generation 
0#015#012a=ice-ufrag:u4MhDJ9rtq6tLJi+#015#012a=ice-pwd:hbArhf2
Jan 27 02:14:17 localhost kamailio[2246]: INFO: <script>: Calling REQINIT, per 
request initial checks#012
Jan 27 02:14:17 localhost kamailio[2246]: WARNING: <script>: Inside REQINIT - 
checking the hops
Jan 27 02:14:17 localhost kamailio[2246]: WARNING: <script>: Inside REQINIT - 
Sanity check 
Jan 27 02:14:17 localhost kamailio[2246]: ERROR: <script>: Calling NATDETECT#012
Jan 27 02:14:17 localhost kamailio[2246]: ERROR: <script>: Inside NATDETECT
Jan 27 02:14:17 localhost kamailio[2246]: ERROR: <script>: Inside NATDETECT - 
Non-REGISTER Method hence - callling add_contact_alias
Jan 27 02:14:17 localhost kamailio[2246]: ERROR: <script>: Exiting from 
NATDETECT
Jan 27 02:14:17 localhost kamailio[2246]: ERROR: <script>: CAlling WITHINDLG - 
handle requests within SIP dialogs
Jan 27 02:14:17 localhost kamailio[2246]: ERROR: <script>: Inside WITHINDLG 
Jan 27 02:14:17 localhost kamailio[2246]: ERROR: <script>: Removing Route header
Jan 27 02:14:17 localhost kamailio[2246]: ERROR: <script>: Removed Route header 
and adding new one..
Jan 27 02:14:17 localhost kamailio[2246]: ERROR: <script>: New message becomes 
- [INVITE sip:919650926333@125.99.186.124 SIP/2.0#015#012Route: 
<sip:125.99.186.126:10080;transport=ws;lr>#015#012Via: SIP/2.0/WS 
vf6huklcsg7i.invalid;branch=z9hG4bK6689719#015#012Max-Forwards: 68#015#012To: 
<sip:919650926333@125.99.186.124>#015#012From: "114488" 
<sip:114488@125.99.186.124>;tag=iiq2flnorq#015#012Call-ID: 
2mi1qf5cb3mg9vf0bp22#015#012CSeq: 2624 INVITE#015#012Proxy-Authorization: 
Digest algorithm=MD5, username="114488", realm="125.99.186.124", 
nonce="45c4cae8-a59d-11e4-a7b2-d33334a82f85", 
uri="sip:919650926333@125.99.186.124", 
response="e16155a76a14d7b4d12f3b23455dc135", qop=auth, cnonce="o7fdku9ci084", 
nc=00000001#015#012Contact: 
<sip:emf13f83@vf6huklcsg7i.invalid;transport=ws;ob>#015#012Content-Type: 
application/sdp#015#012Allow: 
INVITE,ACK,CANCEL,BYE,UPDATE,MESSAGE,OPTIONS#015#012Supported: 
ice,outbound#015#012User-Agent: JsSIP 0.6.4#015#012Content-Length: 
3042#015#012#015#012v=0#015#012o=- 3479457386797450545 2 IN IP4 
127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio 
video#015#012a=msid-semantic: WMS 
5DKLhoDH63ksNQLPuJfODFZ0We62dvZHeypu#015#012m=audio 21455 RTP/SAVPF 111 103 104 
9 0 8 106 105 13 126#015#012c=IN IP4 59.178.53.133#015#012a=rtcp:21455 IN IP4 
59.178.53.133#015#012a=candidate:704553097 1 udp 2122260223 192.168.1.3 61780 
typ host generation 0#015#012a=candidate:704553097 2 udp 2122260223 192.168.1.3 
61780 typ host generation 0#015#012a=candidate:1736268921 1 tcp 1518280447 
192.168.1.3 0 typ host tcptype active generation 
0#015#012a=candidate:1736268921 2 tcp 1518280447 192.168.1.3 0 typ host tcptype 
active generation 0#015#012a=candidate:2158047068 1 udp 1686052607 
59.178.53.133 21455 typ srflx raddr 192.168.1.3 rport 61780 generation 
0#015#012a=candidate:2158047068 2 udp 1686052607 59.178.53.133 21455 typ srflx 
raddr 192.168.1.3 rport 61780 generation 
0#015#012a=ice-ufrag:u4MhDJ9rtq6tLJi+#015#012a=ice-pwd:hbArhf2sDAU/BfClFII2LHm8#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256
 AA:79:
Jan 27 02:14:17 localhost kamailio[2246]: ERROR: <script>: Various informaiton 
for the message - #012rU: [919650926333] #012fd: [125.99.186.124] #012mb: 
[INVITE sip:919650926333@125.99.186.124 SIP/2.0#015#012Route: 
<sip:125.99.186.126:10080;transport=ws;lr>#015#012Via: SIP/2.0/WS 
vf6huklcsg7i.invalid;branch=z9hG4bK6689719#015#012Max-Forwards: 68#015#012To: 
<sip:919650926333@125.99.186.124>#015#012From: "114488" 
<sip:114488@125.99.186.124>;tag=iiq2flnorq#015#012Call-ID: 
2mi1qf5cb3mg9vf0bp22#015#012CSeq: 2624 INVITE#015#012Proxy-Authorization: 
Digest algorithm=MD5, username="114488", realm="125.99.186.124", 
nonce="45c4cae8-a59d-11e4-a7b2-d33334a82f85", 
uri="sip:919650926333@125.99.186.124", 
response="e16155a76a14d7b4d12f3b23455dc135", qop=auth, cnonce="o7fdku9ci084", 
nc=00000001#015#012Contact: 
<sip:emf13f83@vf6huklcsg7i.invalid;transport=ws;ob>#015#012Content-Type: 
application/sdp#015#012Allow: 
INVITE,ACK,CANCEL,BYE,UPDATE,MESSAGE,OPTIONS#015#012Supported: 
ice,outbound#015#012User-Agent: JsSIP 0.6.4#015#012Content-Length: 
3042#015#012#015#012v=0#015#012o=- 3479457386797450545 2 IN IP4 
127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio 
video#015#012a=msid-semantic: WMS 
5DKLhoDH63ksNQLPuJfODFZ0We62dvZHeypu#015#012m=audio 21455 RTP/SAVPF 111 103 104 
9 0 8 106 105 13 126#015#012c=IN IP4 59.178.53.133#015#012a=rtcp:21455 IN IP4 
59.178.53.133#015#012a=candidate:704553097 1 udp 2122260223 192.168.1.3 61780 
typ host generation 0#015#012a=candidate:704553097 2 udp 2122260223 192.168.1.3 
61780 typ host generation 0#015#012a=candidate:1736268921 1 tcp 1518280447 
192.168.1.3 0 typ host tcptype active generation 
0#015#012a=candidate:1736268921 2 tcp 1518280447 192.168.1.3 0 typ host tcptype 
active generation 0#015#012a=candidate:2158047068 1 udp 1686052607 
59.178.53.133 21455 typ srflx raddr 192.168.1.3 rport 61780 generation 
0#015#012a=candidate:2158047068 2 udp 1686052607 59.178.53.133 21455 typ srflx 
raddr 192.168.1.3 rport 61780 generation 
0#015#012a=ice-ufrag:u4MhDJ9rtq6tLJi+#015#012a=ice-pwd:hbArhf2sDAU/BfClFII2
Jan 27 02:14:17 localhost kamailio[2246]: INFO: <script>: Request coming from WS
Jan 27 02:14:17 localhost rtpengine[2226]: Got valid command from 
127.0.0.1:49405: offer - { "sdp": "v=0#015#012o=- 3479457386797450545 2 IN IP4 
127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio 
video#015#012a=msid-semantic: WMS 
5DKLhoDH63ksNQLPuJfODFZ0We62dvZHeypu#015#012m=audio 21455 RTP/SAVPF 111 103 104 
9 0 8 106 105 13 126#015#012c=IN IP4 59.178.53.133#015#012a=rtcp:21455 IN IP4 
59.178.53.133#015#012a=candidate:704553097 1 udp 2122260223 192.168.1.3 61780 
typ host generation 0#015#012a=candidate:704553097 2 udp 2122260223 192.168.1.3 
61780 typ host generation 0#015#012a=candidate:17362 ...
Jan 27 02:14:17 localhost rtpengine[2226]: ... 68921 1 tcp 1518280447 
192.168.1.3 0 typ host tcptype active generation 
0#015#012a=candidate:1736268921 2 tcp 1518280447 192.168.1.3 0 typ host tcptype 
active generation 0#015#012a=candidate:2158047068 1 udp 1686052607 
59.178.53.133 21455 typ srflx raddr 192.168.1.3 rport 61780 generation 
0#015#012a=candidate:2158047068 2 udp 1686052607 59.178.53.133 21455 typ srflx 
raddr 192.168.1.3 rport 61780 generation 
0#015#012a=ice-ufrag:u4MhDJ9rtq6tLJi+#015#012a=ice-pwd:hbArhf2sDAU/BfClFII2LHm8#015#012a=ice-options:google-ice#015#012a=fingerprint
 ...
Jan 27 02:14:17 localhost rtpengine[2226]: ... :sha-256 
AA:79:7A:FA:6E:B8:38:A4:1B:5E:60:4A:27:67:96:76:2F:09:C8:E7:2F:5B:D6:0B:0B:DF:10:31:4A:B8:27:AA#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1
 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=extmap:3 
http://www.webrtc.org/experiments/rtp-hdrext/abs-send-time#015#012a=sendrecv#015#012a=rtcp-mux#015#012a=rtpmap:111
 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 
ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:9 
G722/8000#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 
PCMA/8000#015#012a=rtpmap:106 CN/32000#015#012a=rtpmap:105 CN/16000#015#012 ...
Jan 27 02:14:17 localhost rtpengine[2226]: ... a=rtpmap:13 
CN/8000#015#012a=rtpmap:126 
telephone-event/8000#015#012a=maxptime:60#015#012a=ssrc:3582067407 
cname:3B3uHRwYKt8E1dB0#015#012a=ssrc:3582067407 
msid:5DKLhoDH63ksNQLPuJfODFZ0We62dvZHeypu 
641324d1-3df6-4f0a-95dc-f93ce2f87b90#015#012a=ssrc:3582067407 
mslabel:5DKLhoDH63ksNQLPuJfODFZ0We62dvZHeypu#015#012a=ssrc:3582067407 
label:641324d1-3df6-4f0a-95dc-f93ce2f87b90#015#012m=video 21455 RTP/SAVPF 100 
116 117 96#015#012c=IN IP4 59.178.53.133#015#012a=rtcp:21455 IN IP4 
59.178.53.133#015#012a=candidate:704553097 1 udp 2122260223 192.168.1.3 61780 
typ hos ...
Jan 27 02:14:17 localhost rtpengine[2226]: ... t generation 
0#015#012a=candidate:704553097 2 udp 2122260223 192.168.1.3 61780 typ host 
generation 0#015#012a=candidate:1736268921 1 tcp 1518280447 192.168.1.3 0 typ 
host tcptype active generation 0#015#012a=candidate:1736268921 2 tcp 1518280447 
192.168.1.3 0 typ host tcptype active generation 
0#015#012a=candidate:2158047068 1 udp 1686052607 59.178.53.133 21455 typ srflx 
raddr 192.168.1.3 rport 61780 generation 0#015#012a=candidate:2158047068 2 udp 
1686052607 59.178.53.133 21455 typ srflx raddr 192.168.1.3 rport 61780 genera 
...
Jan 27 02:14:17 localhost rtpengine[2226]: ... tion 
0#015#012a=ice-ufrag:u4MhDJ9rtq6tLJi+#015#012a=ice-pwd:hbArhf2sDAU/BfClFII2LHm8#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256
 
AA:79:7A:FA:6E:B8:38:A4:1B:5E:60:4A:27:67:96:76:2F:09:C8:E7:2F:5B:D6:0B:0B:DF:10:31:4A:B8:27:AA#015#012a=setup:actpass#015#012a=mid:video#015#012a=extmap:2
 urn:ietf:params:rtp-hdrext:toffset#015#012a=extmap:3 
http://www.webrtc.org/experiments/rtp-hdrext/abs-send-time#015#012a=recvonly#015#012a=rtcp-mux#015#012a=rtpmap:100
 VP8/90000#015#012a=rtcp-fb:100 ccm fir#015#012a=rtcp-fb:100 
nack#015#012a=rtcp-fb:100 nack pli#015#012a=rtcp-fb:100 goog ...
Jan 27 02:14:17 localhost rtpengine[2226]: ... -remb#015#012a=rtpmap:116 
red/90000#015#012a=rtpmap:117 ulpfec/90000#015#012a=rtpmap:96 
rtx/90000#015#012a=fmtp:96 apt=100#015#012", "ICE": "remove", "flags": [ 
"trust-address" ], "replace": [ "origin", "session-connection" ], 
"transport-protocol": "RTP/AVP", "rtcp-mux": [ "demux" ], "call-id": 
"2mi1qf5cb3mg9vf0bp22", "received-from": [ "IP4", "59.178.53.133" ], 
"from-tag": "iiq2flnorq", "command": "offer" }
Jan 27 02:14:17 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22] Returning to 
SIP proxy: d3:sdp1080:v=0#015#012o=- 3479457386797450545 2 IN IP4 
125.99.186.126#015#012s=-#015#012t=0 0#015#012a=msid-semantic: WMS 
5DKLhoDH63ksNQLPuJfODFZ0We62dvZHeypu#015#012m=audio 30126 RTP/AVP 111 103 104 9 
0 8 106 105 13 126#015#012c=IN IP4 125.99.186.126#015#012a=rtpmap:111 
opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 
ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:9 
G722/8000#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 
PCMA/8000#015#012a=rtpmap:106 CN/32000#015#012a=rtpmap:105 
CN/16000#015#012a=rtpmap:13 CN/8000#015#012a=rtpmap:126 telephone-ev ...
Jan 27 02:14:17 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22] ... 
ent/8000#015#012a=maxptime:60#015#012a=ssrc:3582067407 
cname:3B3uHRwYKt8E1dB0#015#012a=ssrc:3582067407 
msid:5DKLhoDH63ksNQLPuJfODFZ0We62dvZHeypu 
641324d1-3df6-4f0a-95dc-f93ce2f87b90#015#012a=ssrc:3582067407 
mslabel:5DKLhoDH63ksNQLPuJfODFZ0We62dvZHeypu#015#012a=ssrc:3582067407 
label:641324d1-3df6-4f0a-95dc-f93ce2f87b90#015#012a=sendrecv#015#012a=rtcp:30127#015#012m=video
 30160 RTP/AVP 100 116 117 96#015#012c=IN IP4 
125.99.186.126#015#012a=rtpmap:100 VP8/90000#015#012a=rtcp-fb:100 ccm 
fir#015#012a=rtcp-fb:100 nack#015#012a=rtcp-fb:100 nack 
pli#015#012a=rtcp-fb:100 goog-remb#015#012a=rt ...
Jan 27 02:14:17 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22] ... pmap:116 
red/90000#015#012a=rtpmap:117 ulpfec/90000#015#012a=rtpmap:96 
rtx/90000#015#012a=fmtp:96 
apt=100#015#012a=recvonly#015#012a=rtcp:30161#015#0126:result2:oke
Jan 27 02:14:17 localhost kamailio[2246]: WARNING: <script>: port is [10080], 
proto is [ws], user is [919650926333]#012 Message [INVITE 
sip:919650926333@125.99.186.124 SIP/2.0#015#012Route: 
<sip:125.99.186.126:10080;transport=ws;lr>#015#012Via: SIP/2.0/WS 
vf6huklcsg7i.invalid;branch=z9hG4bK6689719#015#012Max-Forwards: 68#015#012To: 
<sip:919650926333@125.99.186.124>#015#012From: "114488" 
<sip:114488@125.99.186.124>;tag=iiq2flnorq#015#012Call-ID: 
2mi1qf5cb3mg9vf0bp22#015#012CSeq: 2624 INVITE#015#012Proxy-Authorization: 
Digest algorithm=MD5, username="114488", realm="125.99.186.124", 
nonce="45c4cae8-a59d-11e4-a7b2-d33334a82f85", 
uri="sip:919650926333@125.99.186.124", 
response="e16155a76a14d7b4d12f3b23455dc135", qop=auth, cnonce="o7fdku9ci084", 
nc=00000001#015#012Contact: 
<sip:emf13f83@vf6huklcsg7i.invalid;transport=ws;ob>#015#012Content-Type: 
application/sdp#015#012Allow: 
INVITE,ACK,CANCEL,BYE,UPDATE,MESSAGE,OPTIONS#015#012Supported: 
ice,outbound#015#012User-Agent: JsSIP 0.6.4#015#012Content-Length: 
3042#015#012#015#012v=0#015#012o=- 3479457386797450545 2 IN IP4 
127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio 
video#015#012a=msid-semantic: WMS 
5DKLhoDH63ksNQLPuJfODFZ0We62dvZHeypu#015#012m=audio 21455 RTP/SAVPF 111 103 104 
9 0 8 106 105 13 126#015#012c=IN IP4 59.178.53.133#015#012a=rtcp:21455 IN IP4 
59.178.53.133#015#012a=candidate:704553097 1 udp 2122260223 192.168.1.3 61780 
typ host generation 0#015#012a=candidate:704553097 2 udp 2122260223 192.168.1.3 
61780 typ host generation 0#015#012a=candidate:1736268921 1 tcp 1518280447 
192.168.1.3 0 typ host tcptype active generation 
0#015#012a=candidate:1736268921 2 tcp 1518280447 192.168.1.3 0 typ host tcptype 
active generation 0#015#012a=candidate:2158047068 1 udp 1686052607 
59.178.53.133 21455 typ srflx raddr 192.168.1.3 rport 61780 generation 
0#015#012a=candidate:2158047068 2 udp 1686052607 59.178.53.133 21455 typ srflx 
raddr 192.168.1.3 rport 61780 generation 
0#015#012a=ice-ufrag:u4MhDJ9rtq6tLJi+#015#012a=ice-pwd:hbArhf2sDAU/BfClFII2LHm8#015#012a=ice-options
Jan 27 02:14:17 localhost kamailio[2235]: INFO: <script>: Reply from softphone: 
100
Jan 27 02:14:18 localhost kamailio[2234]: INFO: <script>: Reply from softphone: 
183
Jan 27 02:14:18 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30126] 
SRTP output wanted, but no crypto suite was negotiated
Jan 27 02:14:18 localhost rtpengine[2226]: Got valid command from 
127.0.0.1:33458: answer - { "sdp": "v=0#015#012o=FreeSWITCH 1422281209 
1422281210 IN IP4 125.99.186.124#015#012s=FreeSWITCH#015#012c=IN IP4 
125.99.186.124#015#012t=0 0#015#012m=audio 24354 RTP/AVP 0 126 
106#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:126 
telephone-event/8000#015#012a=fmtp:126 0-16#015#012a=rtpmap:106 
CN/8000#015#012a=ptime:20#015#012a=rtcp:24355 IN IP4 
125.99.186.124#015#012m=video 0 RTP/AVP 19#015#012", "ICE": "force", "flags": [ 
"rtcp-mux", "trust-address" ], "replace": [ "origin", "session-connection" ], 
"transport-protocol": "RT ...
Jan 27 02:14:18 localhost rtpengine[2226]: ... P/SAVPF", "call-id": 
"2mi1qf5cb3mg9vf0bp22", "received-from": [ "IP4", "125.99.186.124" ], 
"from-tag": "iiq2flnorq", "to-tag": "51y41K1ZyZ0BK", "command": "answer" }
Jan 27 02:14:18 localhost rtpengine[2226]: Unknown flag encountered: 'rtcp-mux'
Jan 27 02:14:18 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22] Returning to 
SIP proxy: d3:sdp563:v=0#015#012o=FreeSWITCH 1422281209 1422281210 IN IP4 
125.99.186.126#015#012s=FreeSWITCH#015#012c=IN IP4 125.99.186.126#015#012t=0 
0#015#012a=ice-lite#015#012m=audio 30140 RTP/SAVPF 0 126 106#015#012a=rtpmap:0 
PCMU/8000#015#012a=rtpmap:126 telephone-event/8000#015#012a=fmtp:126 
0-16#015#012a=rtpmap:106 
CN/8000#015#012a=ptime:20#015#012a=sendrecv#015#012a=rtcp:30140#015#012a=rtcp-mux#015#012a=setup:passive#015#012a=fingerprint:sha-1
 
B1:A4:F1:21:90:D0:F5:FF:D3:7B:5A:88:1D:F4:CF:4C:75:7A:5D:6C#015#012a=ice-ufrag:66orVeik#015#012a=ice-pwd:7GYfZjLu5DCKDeEDAxApj36n8sO3#015#012a=ca
 ...
Jan 27 02:14:18 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22] ... 
ndidate:on1viKGptuKcipkY 1 UDP 2130706431 125.99.186.126 30140 typ 
host#015#012m=video 0 RTP/SAVPF 19#015#0126:result2:oke
Jan 27 02:14:18 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:18 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:18 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:18 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:18 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:19 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:19 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:19 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:19 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:20 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:20 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:20 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:20 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:21 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:21 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:21 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:21 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:22 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:22 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:22 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Confirmed peer address as 59.178.53.133:21455
Jan 27 02:14:22 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:22 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:23 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:23 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:23 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30126] 
Confirmed peer address as 125.99.186.124:24354
Jan 27 02:14:23 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30126] 
Kernelizing media stream
Jan 27 02:14:23 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30126] No 
support for kernel packet forwarding available
Jan 27 02:14:23 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:23 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:24 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:24 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:24 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:24 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:25 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:25 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:25 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:25 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:26 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:26 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:26 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:26 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:26 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:26 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:27 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:27 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:27 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:27 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:28 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:28 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:28 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:28 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:29 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:29 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:29 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:29 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:30 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:30 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:30 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:30 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:31 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:31 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:31 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:31 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:32 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:32 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:32 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:32 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:33 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30126] 
SRTP output wanted, but no crypto suite was negotiated
Jan 27 02:14:33 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:33 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:33 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:33 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:34 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:34 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:34 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:34 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:35 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:35 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:35 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:35 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:36 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:36 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:36 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:36 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:37 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:37 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:37 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:37 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:38 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:38 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:38 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:38 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:38 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:38 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:39 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:39 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:39 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:39 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:40 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:40 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:40 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:40 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:41 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:41 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:41 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:41 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:42 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:42 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:42 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:42 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:43 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:43 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:43 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:43 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:44 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:44 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:44 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:44 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:45 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:45 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:45 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:45 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:46 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:46 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:46 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:46 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:47 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:47 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:47 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:47 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:48 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:48 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:48 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30126] 
SRTP output wanted, but no crypto suite was negotiated
Jan 27 02:14:48 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:48 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:49 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:49 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:49 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:49 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:50 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:50 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:50 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:50 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:50 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:50 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:51 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:51 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:51 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:51 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:52 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:52 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:52 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:52 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:53 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:53 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:53 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:53 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:54 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:54 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:54 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:54 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:55 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:55 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:55 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:55 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:56 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:56 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:56 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:56 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:57 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:57 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:57 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:57 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:58 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:58 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:58 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:58 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:59 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
Successful STUN binding request from 59.178.53.133:21455
Jan 27 02:14:59 localhost rtpengine[2226]: [2mi1qf5cb3mg9vf0bp22 port 30140] 
STUN: using this candidate
Jan 27 02:14:59 localhost kamailio[2247]: INFO: <script>: Starting of 
request_route - #012 port is [10080],#011 proto is [ws],#011 user is 
[919650926333]#012 Message [CANCEL sip:919650926333@125.99.186.124 
SIP/2.0#015#012Via: SIP/2.0/WS 
vf6huklcsg7i.invalid;branch=z9hG4bK6689719#015#012Route: 
<sip:125.99.186.126:10080;transport=ws;lr>#015#012To: 
<sip:919650926333@125.99.186.124>#015#012From: "114488" 
<sip:114488@125.99.186.124>;tag=iiq2flnorq#015#012Call-ID: 
2mi1qf5cb3mg9vf0bp22#015#012CSeq: 2624 CANCEL#015#012Content-Length: 
0#015#012#015#012]#012
Jan 27 02:14:59 localhost kamailio[2247]: INFO: <script>: Calling REQINIT, per 
request initial checks#012
Jan 27 02:14:59 localhost kamailio[2247]: WARNING: <script>: Inside REQINIT - 
checking the hops
Jan 27 02:14:59 localhost kamailio[2247]: WARNING: <script>: Inside REQINIT - 
Sanity check 
Jan 27 02:14:59 localhost kamailio[2247]: ERROR: <script>: Calling NATDETECT#012
Jan 27 02:14:59 localhost kamailio[2247]: ERROR: <script>: Inside NATDETECT
Jan 27 02:14:59 localhost kamailio[2247]: ERROR: <script>: Inside NATDETECT - 
Non-REGISTER Method hence - callling add_contact_alias
Jan 27 02:14:59 localhost kamailio[2247]: ERROR: <script>: Exiting from 
NATDETECT
Jan 27 02:14:59 localhost kamailio[2247]: ERROR: <script>: CANCEL processing at 
the start
Jan 27 02:14:59 localhost kamailio[2236]: INFO: <script>: Reply from softphone: 
487
Jan 27 02:15:00 localhost kamailio[2247]: INFO: <script>: Starting of 
request_route - #012 port is [10080],#011 proto is [ws],#011 user is 
[919650926333]#012 Message [ACK sip:919650926333@125.99.186.124 
SIP/2.0#015#012Via: SIP/2.0/WS 
vf6huklcsg7i.invalid;branch=z9hG4bK6689719#015#012Route: 
<sip:125.99.186.126:10080;transport=ws;lr>#015#012To: 
<sip:919650926333@125.99.186.124>;tag=51y41K1ZyZ0BK#015#012From: "114488" 
<sip:114488@125.99.186.124>;tag=iiq2flnorq#015#012Call-ID: 
2mi1qf5cb3mg9vf0bp22#015#012CSeq: 2624 ACK#015#012Content-Length: 
0#015#012#015#012]#012
Jan 27 02:15:00 localhost kamailio[2247]: INFO: <script>: Calling REQINIT, per 
request initial checks#012
Jan 27 02:15:00 localhost kamailio[2247]: WARNING: <script>: Inside REQINIT - 
checking the hops
Jan 27 02:15:00 localhost kamailio[2247]: WARNING: <script>: Inside REQINIT - 
Sanity check 
Jan 27 02:15:00 localhost kamailio[2247]: ERROR: <script>: Calling NATDETECT#012
Jan 27 02:15:00 localhost kamailio[2247]: ERROR: <script>: Inside NATDETECT
Jan 27 02:15:00 localhost kamailio[2247]: ERROR: <script>: Inside NATDETECT - 
Non-REGISTER Method hence - callling add_contact_alias
Jan 27 02:15:00 localhost kamailio[2247]: ERROR: <script>: Exiting from 
NATDETECT
Jan 27 02:15:00 localhost kamailio[2247]: ERROR: <script>: CAlling WITHINDLG - 
handle requests within SIP dialogs
Jan 27 02:15:00 localhost kamailio[2247]: ERROR: <script>: Inside WITHINDLG 
Jan 27 02:15:00 localhost kamailio[2247]: ERROR: <script>: Inside WITHINDLG - 
and has to_tag
Jan 27 02:15:00 localhost kamailio[2247]: ERROR: <script>: Inside WITHINDLG - 
loose_routed
Jan 27 02:15:00 localhost kamailio[2247]: ERROR: <script>: ==> duri=[<null>]
Jan 27 02:15:00 localhost kamailio[2247]: ERROR: <script>: Inside WITHINDLG - 
duri:[<null>], method is ACK and calling NATMANAGE
Jan 27 02:15:00 localhost kamailio[2247]: ERROR: <script>: Inside WITHINDLG - 
has to_tag and calling route(RELAY) 
_______________________________________________
SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
sr-users@lists.sip-router.org
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users

Reply via email to