As you can see in the snippet a left from the debug, the re-INVITE is managed by the nathelper module. Please provide network trace to be able to see the result of the processing (received and sent messages). Use:

ngrep -qt -d any port 5060

on your sip server.

Cheers,
Daniel


On 08/10/06 14:57, Pavel D. Kuzin wrote:
this is a debug view with debug=5


[...]

0(14154) SIP Request:
0(14154)  method:  <INVITE>
0(14154)  uri:     <sip:[EMAIL PROTECTED]:5060;nat=yes>
0(14154)  version: <SIP/2.0>
0(14154) parse_headers: flags=2
0(14154) DEBUG: add_param: tag=0-13c4-44db1c5c-b38bc-7e15
0(14154) DEBUG:parse_to:end of header reached, state=29
0(14154) DBUG:parse_to: display={}, ruri={sip:[EMAIL PROTECTED]
0(14154) DEBUG: get_hdr_field: <To> [62]; uri=[sip:[EMAIL PROTECTED]
0(14154) DEBUG: to body [<sip:[EMAIL PROTECTED]>]
0(14154) get_hdr_field: cseq <CSeq>: <1> <INVITE>
0(14154) Found param type 232, <branch> = <z9hG4bK-44db1c63-b5374-2864>; state=16
0(14154) end of header reached, state=5
0(14154) parse_headers: Via found, flags=2
0(14154) parse_headers: this is the first via
0(14154) After parse_msg...
0(14154) preparing to run routing scripts...
0(14154) parse_headers: flags=100
0(14154) DEBUG:maxfwd:is_maxfwd_present: value = 70
0(14154) check_via_address(192.168.39.50, 192.168.39.50, 0)
0(14154) parse_headers: flags=80
0(14154) parse_headers: flags=80
0(14154) DEBUG: add_param: tag=0-13c4-44db1c5c-b390c-6691
0(14154) DEBUG:parse_to:end of header reached, state=29
0(14154) DBUG:parse_to: display={}, ruri={sip:[EMAIL PROTECTED]
0(14154) parse_headers: flags=200
0(14154) is_preloaded: No
0(14154) grep_sock_info - checking if host==us: 13==13 && [192.168.39.50] == [192.168.39.54]
0(14154) grep_sock_info - checking if port 5060 matches port 5060
0(14154) grep_sock_info - checking if host==us: 13==13 && [192.168.39.50] == [192.168.39.54]
0(14154) grep_sock_info - checking if port 5060 matches port 5060
0(14154) check_self: host != me
0(14154) grep_sock_info - checking if host==us: 13==13 && [192.168.39.54] == [192.168.39.54]
0(14154) grep_sock_info - checking if port 5060 matches port 5060
0(14154) after_loose: Topmost route URI: 'sip:192.168.39.54;lr;ftag=0-13c4-44db1c5c-b38bc-7e15' is me
0(14154) parse_headers: flags=200
0(14154) DEBUG: get_hdr_body : content_length=318
0(14154) found end of header
0(14154) find_next_route: No next Route HF found
0(14154) after_loose: No next URI found
0(14154) parse_headers: flags=ffffffffffffffff
0(14154) parse_headers: flags=40
0(14154) parse_headers: flags=ffffffffffffffff
0(14154) DEBUG:check_content_type: type <application/sdp> found valid
0(14154) parse_headers: flags=40
0(14154) force_rtp_proxy2: proxy reply: 35030 192.168.39.54

0(14154) subst_run: running. r=0
0(14154) subst_run: matched (0, 34): [sip:[EMAIL PROTECTED]:5060;nat=yes]
0(14154) textops: subst_uri_f: match - old uri= [sip:[EMAIL PROTECTED]:5060;nat=yes], new uri= [sip:[EMAIL PROTECTED]:5060]
0(14154) parse_headers: flags=ffffffffffffffff
0(14154) DEBUG:check_content_type: type <application/sdp> found valid
0(14154) parse_headers: flags=40
0(14154) force_rtp_proxy2: proxy reply: 35030 192.168.39.54

0(14154) DEBUG: t_newtran: msg id=6 , global msg id=5 , T on entrance=0xffffffffffffffff
0(14154) parse_headers: flags=ffffffffffffffff
0(14154) parse_headers: flags=78
0(14154) t_lookup_request: start searching: hash=34382, isACK=0
0(14154) DEBUG: RFC3261 transaction matching failed
0(14154) DEBUG: t_lookup_request: no transaction found
0(14154) DEBUG:tm:t_relay: new INVITE
0(14154) parse_headers: flags=ffffffffffffffff
0(14154) check_via_address(192.168.39.50, 192.168.39.50, 0)
0(14154) WARNING:vqm_resize: resize(0) called
0(14154) DEBUG:tm:_reply_light: reply sent out. buf=0x6166b8: SIP/2.0 1..., shmem=0x2ba62f3c3f30: SIP/2.0 1
0(14154) DEBUG:tm:_reply_light: finished
0(14154) DEBUG: mk_proxy: doing DNS lookup...
0(14154) parse_headers: flags=2000
0(14154) parse_headers: flags=ffffffffffffffff
0(14154) clen_builder: content-length: 372 (372)
0(14154) check_via_address(192.168.39.50, 192.168.39.50, 0)
0(14154) DEBUG: add_to_tail_of_timer[4]: 0x2ba62f3c16a8
0(14154) DEBUG: add_to_tail_of_timer[0]: 0x2ba62f3c16c8
0(14154) SER: new transaction fwd'ed
0(14154) DEBUG:tm:UNREF_UNSAFE: after is 0
0(14154) DEBUG:destroy_avp_list: destroying list (nil)
0(14154) receive_msg: cleaning up


_______________________________________________
Users mailing list
[email protected]
http://openser.org/cgi-bin/mailman/listinfo/users

Reply via email to