[Users] nathelper & fax = bug ?

Daniel-Constantin Mierla daniel at voice-system.ro
Thu Aug 10 20:42:52 CEST 2006


As you can see in the snippet a left from the debug, the re-INVITE is 
managed by the nathelper module. Please provide network trace to be able 
to see the result of the processing (received and sent messages). Use:

ngrep -qt -d any port 5060

on your sip server.

Cheers,
Daniel


On 08/10/06 14:57, Pavel D. Kuzin wrote:
> this is a debug view with debug=5
>
>
> [...]

> 0(14154) SIP Request:
> 0(14154)  method:  <INVITE>
> 0(14154)  uri:     <sip:400 at 192.168.39.50:5060;nat=yes>
> 0(14154)  version: <SIP/2.0>
> 0(14154) parse_headers: flags=2
> 0(14154) DEBUG: add_param: tag=0-13c4-44db1c5c-b38bc-7e15
> 0(14154) DEBUG:parse_to:end of header reached, state=29
> 0(14154) DBUG:parse_to: display={}, ruri={sip:anonymous at anonymous.com}
> 0(14154) DEBUG: get_hdr_field: <To> [62]; 
> uri=[sip:anonymous at anonymous.com]
> 0(14154) DEBUG: to body [<sip:anonymous at anonymous.com>]
> 0(14154) get_hdr_field: cseq <CSeq>: <1> <INVITE>
> 0(14154) Found param type 232, <branch> = 
> <z9hG4bK-44db1c63-b5374-2864>; state=16
> 0(14154) end of header reached, state=5
> 0(14154) parse_headers: Via found, flags=2
> 0(14154) parse_headers: this is the first via
> 0(14154) After parse_msg...
> 0(14154) preparing to run routing scripts...
> 0(14154) parse_headers: flags=100
> 0(14154) DEBUG:maxfwd:is_maxfwd_present: value = 70
> 0(14154) check_via_address(192.168.39.50, 192.168.39.50, 0)
> 0(14154) parse_headers: flags=80
> 0(14154) parse_headers: flags=80
> 0(14154) DEBUG: add_param: tag=0-13c4-44db1c5c-b390c-6691
> 0(14154) DEBUG:parse_to:end of header reached, state=29
> 0(14154) DBUG:parse_to: display={}, ruri={sip:500 at 192.168.39.54}
> 0(14154) parse_headers: flags=200
> 0(14154) is_preloaded: No
> 0(14154) grep_sock_info - checking if host==us: 13==13 &&  
> [192.168.39.50] == [192.168.39.54]
> 0(14154) grep_sock_info - checking if port 5060 matches port 5060
> 0(14154) grep_sock_info - checking if host==us: 13==13 &&  
> [192.168.39.50] == [192.168.39.54]
> 0(14154) grep_sock_info - checking if port 5060 matches port 5060
> 0(14154) check_self: host != me
> 0(14154) grep_sock_info - checking if host==us: 13==13 &&  
> [192.168.39.54] == [192.168.39.54]
> 0(14154) grep_sock_info - checking if port 5060 matches port 5060
> 0(14154) after_loose: Topmost route URI: 
> 'sip:192.168.39.54;lr;ftag=0-13c4-44db1c5c-b38bc-7e15' is me
> 0(14154) parse_headers: flags=200
> 0(14154) DEBUG: get_hdr_body : content_length=318
> 0(14154) found end of header
> 0(14154) find_next_route: No next Route HF found
> 0(14154) after_loose: No next URI found
> 0(14154) parse_headers: flags=ffffffffffffffff
> 0(14154) parse_headers: flags=40
> 0(14154) parse_headers: flags=ffffffffffffffff
> 0(14154) DEBUG:check_content_type: type <application/sdp> found valid
> 0(14154) parse_headers: flags=40
> 0(14154) force_rtp_proxy2: proxy reply: 35030 192.168.39.54
>
> 0(14154) subst_run: running. r=0
> 0(14154) subst_run: matched (0, 34): [sip:400 at 192.168.39.50:5060;nat=yes]
> 0(14154) textops: subst_uri_f: match - old uri= 
> [sip:400 at 192.168.39.50:5060;nat=yes], new uri= 
> [sip:400 at 192.168.39.50:5060]
> 0(14154) parse_headers: flags=ffffffffffffffff
> 0(14154) DEBUG:check_content_type: type <application/sdp> found valid
> 0(14154) parse_headers: flags=40
> 0(14154) force_rtp_proxy2: proxy reply: 35030 192.168.39.54
>
> 0(14154) DEBUG: t_newtran: msg id=6 , global msg id=5 , T on 
> entrance=0xffffffffffffffff
> 0(14154) parse_headers: flags=ffffffffffffffff
> 0(14154) parse_headers: flags=78
> 0(14154) t_lookup_request: start searching: hash=34382, isACK=0
> 0(14154) DEBUG: RFC3261 transaction matching failed
> 0(14154) DEBUG: t_lookup_request: no transaction found
> 0(14154) DEBUG:tm:t_relay: new INVITE
> 0(14154) parse_headers: flags=ffffffffffffffff
> 0(14154) check_via_address(192.168.39.50, 192.168.39.50, 0)
> 0(14154) WARNING:vqm_resize: resize(0) called
> 0(14154) DEBUG:tm:_reply_light: reply sent out. buf=0x6166b8: SIP/2.0 
> 1..., shmem=0x2ba62f3c3f30: SIP/2.0 1
> 0(14154) DEBUG:tm:_reply_light: finished
> 0(14154) DEBUG: mk_proxy: doing DNS lookup...
> 0(14154) parse_headers: flags=2000
> 0(14154) parse_headers: flags=ffffffffffffffff
> 0(14154) clen_builder: content-length: 372 (372)
> 0(14154) check_via_address(192.168.39.50, 192.168.39.50, 0)
> 0(14154) DEBUG: add_to_tail_of_timer[4]: 0x2ba62f3c16a8
> 0(14154) DEBUG: add_to_tail_of_timer[0]: 0x2ba62f3c16c8
> 0(14154) SER: new transaction fwd'ed
> 0(14154) DEBUG:tm:UNREF_UNSAFE: after is 0
> 0(14154) DEBUG:destroy_avp_list: destroying list (nil)
> 0(14154) receive_msg: cleaning up
>




More information about the Users mailing list