From Obese Bushbaby, 5 Years ago, written in FreeSWITCH.
- view diff
Embed
  1. recv 1055 bytes from tls/[103.249.234.189]:54432 at 13:09:16.986764:
  2.    ------------------------------------------------------------------------
  3.    INVITE sip:wifi%23CTTESTCALL029@81.95.124.28:5061 SIP/2.0
  4.    v: SIP/2.0/TLS 192.168.1.175:54604;rport;branch=z9hG4bKPjitKIsghXrhbCp4olKp5ptE07qVftanmn;alias
  5.    Max-Forwards: 70
  6.    f: <sip:CTTESTCALL027@81.95.124.28>;tag=SAK2AGF1MHtOyiP9Tm5o7OtBlhzQ4f.q
  7.    t: <sip:wifi%23CTTESTCALL029@81.95.124.28>
  8.    m: <sip:CTTESTCALL027@192.168.1.175:54604;transport=TLS;ob>
  9.    i: Mz5C0YV9PzFPWIkzjvOuvqlArQ-wSAGX
  10.    CSeq: 27268 INVITE
  11.    Route: <sip:81.95.124.28:5061;transport=tls;lr>
  12.    k: replaces, 100rel, timer, norefersub
  13.    x: 1800
  14.    Min-SE: 180
  15.    User-Agent: CallApp
  16.    c: application/sdp
  17.    l:   481
  18.    
  19.    v=0
  20.    o=- 3757928957 3757928957 IN IP4 192.168.1.175
  21.    s=pjmedia
  22.    c=IN IP4 192.168.1.175
  23.    t=0 0
  24.    m=audio 4004 RTP/SAVP 111 0 8 101
  25.    c=IN IP4 192.168.1.175
  26.    a=rtcp:4005 IN IP4 192.168.1.175
  27.    a=sendrecv
  28.    a=rtpmap:111 opus/48000/2
  29.    a=fmtp:111 maxplaybackrate=16000
  30.    a=rtpmap:101 telephone-event/8000
  31.    a=fmtp:101 0-16
  32.    a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:EWcosERKhSShSgtPrE81JIwe6B2jWdamhFrR+xUi
  33.    a=crypto:2 AES_CM_128_HMAC_SHA1_32 inline:8/k3hTuAyvUHyvdlPtcL2C7AYYsSsD2OSqByBkTU
  34.    ------------------------------------------------------------------------
  35. send 365 bytes to tls/[103.249.234.189]:54432 at 13:09:16.987005:
  36.    ------------------------------------------------------------------------
  37.    SIP/2.0 100 Trying
  38.    Via: SIP/2.0/TLS 192.168.1.175:54604;rport=54432;branch=z9hG4bKPjitKIsghXrhbCp4olKp5ptE07qVftanmn;alias;received=103.249.234.189
  39.    f: <sip:CTTESTCALL027@81.95.124.28>;tag=SAK2AGF1MHtOyiP9Tm5o7OtBlhzQ4f.q
  40.    t: <sip:wifi%23CTTESTCALL029@81.95.124.28>
  41.    i: Mz5C0YV9PzFPWIkzjvOuvqlArQ-wSAGX
  42.    CSeq: 27268 INVITE
  43.    User-Agent: ASTPP
  44.    Content-Length: 0
  45.    
  46.    ------------------------------------------------------------------------
  47. 2019-01-31 13:09:16.983039 [NOTICE] switch_channel.c:1104 New Channel sofia/default/CTTESTCALL027@81.95.124.28 [e9c3d8e6-d071-4b81-9117-33907273b363]
  48. 2019-01-31 13:09:16.983039 [DEBUG] switch_core_state_machine.c:584 (sofia/default/CTTESTCALL027@81.95.124.28) Running State Change CS_NEW (Cur 1 Tot 39)
  49. 2019-01-31 13:09:16.983039 [DEBUG] sofia.c:9873 sofia/default/CTTESTCALL027@81.95.124.28 receiving invite from 103.249.234.189:54432 version: 1.6.19 git 7a77e0b 2017-07-13 12:01:45Z 64bit
  50. 2019-01-31 13:09:16.983039 [DEBUG] sofia.c:10044 IP 103.249.234.189 Rejected by acl "default". Falling back to Digest auth.
  51. 2019-01-31 13:09:16.983039 [WARNING] sofia_reg.c:1792 SIP auth challenge (INVITE) on sofia profile 'default' for [wifi%23CTTESTCALL029@81.95.124.28] from ip 103.249.234.189
  52. 2019-01-31 13:09:16.983039 [DEBUG] switch_core_state_machine.c:603 (sofia/default/CTTESTCALL027@81.95.124.28) State NEW
  53. send 855 bytes to tls/[103.249.234.189]:54432 at 13:09:16.988236:
  54.    ------------------------------------------------------------------------
  55.    SIP/2.0 407 Proxy Authentication Required
  56.    Via: SIP/2.0/TLS 192.168.1.175:54604;rport=54432;branch=z9hG4bKPjitKIsghXrhbCp4olKp5ptE07qVftanmn;alias;received=103.249.234.189
  57.    f: <sip:CTTESTCALL027@81.95.124.28>;tag=SAK2AGF1MHtOyiP9Tm5o7OtBlhzQ4f.q
  58.    To: <sip:wifi%23CTTESTCALL029@81.95.124.28>;tag=54jc9t9aQU9vB
  59.    i: Mz5C0YV9PzFPWIkzjvOuvqlArQ-wSAGX
  60.    CSeq: 27268 INVITE
  61.    User-Agent: ASTPP
  62.    Accept: application/sdp
  63.   Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, NOTIFY, PUBLISH, SUBSCRIBE
  64.    Supported: path, replaces
  65.    Allow-Events: talk, hold, conference, presence, as-feature-event, dialog, line-seize, call-info, sla, include-session-description, presence.winfo, message-summary, refer
  66.    Proxy-Authenticate: Digest realm="81.95.124.28", nonce="25cb1693-fe55-437e-bbd3-cff12ea2a975", algorithm=MD5, qop="auth"
  67.    Content-Length: 0
  68.    
  69.    ------------------------------------------------------------------------
  70. 2019-01-31 13:09:16.983039 [DEBUG] sofia.c:2334 detaching session e9c3d8e6-d071-4b81-9117-33907273b363
  71. recv 419 bytes from tls/[103.249.234.189]:54432 at 13:09:17.318387:
  72.    ------------------------------------------------------------------------
  73.    ACK sip:wifi%23CTTESTCALL029@81.95.124.28:5061 SIP/2.0
  74.    v: SIP/2.0/TLS 192.168.1.175:54604;rport;branch=z9hG4bKPjitKIsghXrhbCp4olKp5ptE07qVftanmn;alias
  75.    Max-Forwards: 70
  76.    f: <sip:CTTESTCALL027@81.95.124.28>;tag=SAK2AGF1MHtOyiP9Tm5o7OtBlhzQ4f.q
  77.    t: <sip:wifi%23CTTESTCALL029@81.95.124.28>;tag=54jc9t9aQU9vB
  78.    i: Mz5C0YV9PzFPWIkzjvOuvqlArQ-wSAGX
  79.    CSeq: 27268 ACK
  80.    Route: <sip:81.95.124.28:5061;transport=tls;lr>
  81.    l:  0
  82.    
  83.    ------------------------------------------------------------------------
  84. recv 1353 bytes from tls/[103.249.234.189]:54432 at 13:09:18.092028:
  85.    ------------------------------------------------------------------------
  86.    INVITE sip:wifi%23CTTESTCALL029@81.95.124.28:5061 SIP/2.0
  87.    v: SIP/2.0/TLS 192.168.1.175:54604;rport;branch=z9hG4bKPjglj0s2HhON9H1-65zR39oqVnp7x9VoRa;alias
  88.    Max-Forwards: 70
  89.    f: <sip:CTTESTCALL027@81.95.124.28>;tag=SAK2AGF1MHtOyiP9Tm5o7OtBlhzQ4f.q
  90.    t: <sip:wifi%23CTTESTCALL029@81.95.124.28>
  91.    m: <sip:CTTESTCALL027@192.168.1.175:54604;transport=TLS;ob>
  92.    i: Mz5C0YV9PzFPWIkzjvOuvqlArQ-wSAGX
  93.    CSeq: 27269 INVITE
  94.    Route: <sip:81.95.124.28:5061;transport=tls;lr>
  95.    k: replaces, 100rel, timer, norefersub
  96.    x: 1800
  97.    Min-SE: 180
  98.    User-Agent: CallApp
  99.    Proxy-Authorization: Digest username="CTTESTCALL027", realm="81.95.124.28", nonce="25cb1693-fe55-437e-bbd3-cff12ea2a975", uri="sip:wifi%23CTTESTCALL029@81.95.124.28:5061", response="01641f5dff6612ae73e08852b92021e8", algorithm=MD5, cnonce="hlomS4cBP6HBnWcMgxyyMfPSssA07U37", qop=auth, nc=00000001
  100.    c: application/sdp
  101.    l:   481
  102.    
  103.    v=0
  104.    o=- 3757928957 3757928957 IN IP4 192.168.1.175
  105.    s=pjmedia
  106.    c=IN IP4 192.168.1.175
  107.    t=0 0
  108.    m=audio 4004 RTP/SAVP 111 0 8 101
  109.    c=IN IP4 192.168.1.175
  110.    a=rtcp:4005 IN IP4 192.168.1.175
  111.    a=sendrecv
  112.    a=rtpmap:111 opus/48000/2
  113.    a=fmtp:111 maxplaybackrate=16000
  114.    a=rtpmap:101 telephone-event/8000
  115.    a=fmtp:101 0-16
  116.    a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:EWcosERKhSShSgtPrE81JIwe6B2jWdamhFrR+xUi
  117.    a=crypto:2 AES_CM_128_HMAC_SHA1_32 inline:8/k3hTuAyvUHyvdlPtcL2C7AYYsSsD2OSqByBkTU
  118.    ------------------------------------------------------------------------
  119. send 365 bytes to tls/[103.249.234.189]:54432 at 13:09:18.092364:
  120.    ------------------------------------------------------------------------
  121.    SIP/2.0 100 Trying
  122.    Via: SIP/2.0/TLS 192.168.1.175:54604;rport=54432;branch=z9hG4bKPjglj0s2HhON9H1-65zR39oqVnp7x9VoRa;alias;received=103.249.234.189
  123.    f: <sip:CTTESTCALL027@81.95.124.28>;tag=SAK2AGF1MHtOyiP9Tm5o7OtBlhzQ4f.q
  124.    t: <sip:wifi%23CTTESTCALL029@81.95.124.28>
  125.    i: Mz5C0YV9PzFPWIkzjvOuvqlArQ-wSAGX
  126.    CSeq: 27269 INVITE
  127.    User-Agent: ASTPP
  128.    Content-Length: 0
  129.    
  130.    ------------------------------------------------------------------------
  131. 2019-01-31 13:09:18.083046 [DEBUG] sofia.c:2442 Re-attaching to session e9c3d8e6-d071-4b81-9117-33907273b363
  132. 2019-01-31 13:09:18.083046 [DEBUG] sofia.c:9873 sofia/default/CTTESTCALL027@81.95.124.28 receiving invite from 103.249.234.189:54432 version: 1.6.19 git 7a77e0b 2017-07-13 12:01:45Z 64bit
  133. 2019-01-31 13:09:18.083046 [DEBUG] sofia.c:10044 IP 103.249.234.189 Rejected by acl "default". Falling back to Digest auth.
  134. 2019-01-31 13:09:18.263035 [DEBUG] sofia.c:11168 Setting NAT mode based on via received
  135. 2019-01-31 13:09:18.263035 [DEBUG] sofia.c:7084 Channel sofia/default/CTTESTCALL027@81.95.124.28 entering state [received][100]
  136. 2019-01-31 13:09:18.263035 [DEBUG] sofia.c:7094 Remote SDP:
  137. v=0
  138. o=- 3757928957 3757928957 IN IP4 192.168.1.175
  139. s=pjmedia
  140. c=IN IP4 192.168.1.175
  141. t=0 0
  142. m=audio 4004 RTP/SAVP 111 0 8 101
  143. c=IN IP4 192.168.1.175
  144. a=rtpmap:111 opus/48000/2
  145. a=fmtp:111 maxplaybackrate=16000
  146. a=rtpmap:101 telephone-event/8000
  147. a=fmtp:101 0-16
  148. a=rtcp:4005 IN IP4 192.168.1.175
  149. a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:EWcosERKhSShSgtPrE81JIwe6B2jWdamhFrR+xUi
  150. a=crypto:2 AES_CM_128_HMAC_SHA1_32 inline:8/k3hTuAyvUHyvdlPtcL2C7AYYsSsD2OSqByBkTU
  151.  
  152. 2019-01-31 13:09:18.263035 [DEBUG] switch_core_media.c:1395 looking for crypto suite [AEAD_AES_256_GCM_8] in [1 AES_CM_128_HMAC_SHA1_80 inline:EWcosERKhSShSgtPrE81JIwe6B2jWdamhFrR+xUi]
  153. 2019-01-31 13:09:18.263035 [DEBUG] switch_core_media.c:1395 looking for crypto suite [AEAD_AES_128_GCM_8] in [1 AES_CM_128_HMAC_SHA1_80 inline:EWcosERKhSShSgtPrE81JIwe6B2jWdamhFrR+xUi]
  154. 2019-01-31 13:09:18.263035 [DEBUG] switch_core_media.c:1395 looking for crypto suite [AES_CM_256_HMAC_SHA1_80] in [1 AES_CM_128_HMAC_SHA1_80 inline:EWcosERKhSShSgtPrE81JIwe6B2jWdamhFrR+xUi]
  155. 2019-01-31 13:09:18.263035 [DEBUG] switch_core_media.c:1395 looking for crypto suite [AES_CM_192_HMAC_SHA1_80] in [1 AES_CM_128_HMAC_SHA1_80 inline:EWcosERKhSShSgtPrE81JIwe6B2jWdamhFrR+xUi]
  156. 2019-01-31 13:09:18.263035 [DEBUG] switch_core_media.c:1395 looking for crypto suite [AES_CM_128_HMAC_SHA1_80] in [1 AES_CM_128_HMAC_SHA1_80 inline:EWcosERKhSShSgtPrE81JIwe6B2jWdamhFrR+xUi]
  157. 2019-01-31 13:09:18.263035 [DEBUG] switch_core_media.c:1400 Found suite AES_CM_128_HMAC_SHA1_80
  158. 2019-01-31 13:09:18.263035 [DEBUG] switch_core_media.c:1466 Set Remote Key [1 AES_CM_128_HMAC_SHA1_80 inline:EWcosERKhSShSgtPrE81JIwe6B2jWdamhFrR+xUi]
  159. 2019-01-31 13:09:18.263035 [DEBUG] switch_core_media.c:1128 Set Local audio crypto Key [1 AES_CM_128_HMAC_SHA1_80 inline:nn8faHX1CeYa07ug67vvkVL6GopWXfQ6rdxxn6Jr]
  160. 2019-01-31 13:09:18.263035 [DEBUG] switch_core_media.c:4449 Audio Codec Compare [opus:111:48000:20:0:1]/[PCMA:8:8000:20:64000:1]
  161. 2019-01-31 13:09:18.263035 [DEBUG] switch_core_media.c:4449 Audio Codec Compare [opus:111:48000:20:0:1]/[PCMU:0:8000:20:64000:1]
  162. 2019-01-31 13:09:18.263035 [DEBUG] switch_core_media.c:4449 Audio Codec Compare [opus:111:48000:20:0:1]/[G729:18:8000:20:8000:1]
  163. 2019-01-31 13:09:18.263035 [DEBUG] switch_core_media.c:4449 Audio Codec Compare [PCMU:0:8000:20:64000:1]/[PCMA:8:8000:20:64000:1]
  164. 2019-01-31 13:09:18.263035 [DEBUG] switch_core_media.c:4449 Audio Codec Compare [PCMU:0:8000:20:64000:1]/[PCMU:0:8000:20:64000:1]
  165. 2019-01-31 13:09:18.263035 [DEBUG] switch_core_media.c:4504 Audio Codec Compare [PCMU:0:8000:20:64000:1] ++++ is saved as a match
  166. 2019-01-31 13:09:18.263035 [DEBUG] switch_core_media.c:4449 Audio Codec Compare [PCMU:0:8000:20:64000:1]/[G729:18:8000:20:8000:1]
  167. 2019-01-31 13:09:18.263035 [DEBUG] switch_core_media.c:4449 Audio Codec Compare [PCMA:8:8000:20:64000:1]/[PCMA:8:8000:20:64000:1]
  168. 2019-01-31 13:09:18.263035 [DEBUG] switch_core_media.c:4504 Audio Codec Compare [PCMA:8:8000:20:64000:1] ++++ is saved as a match
  169. 2019-01-31 13:09:18.263035 [DEBUG] switch_core_media.c:4449 Audio Codec Compare [PCMA:8:8000:20:64000:1]/[PCMU:0:8000:20:64000:1]
  170. 2019-01-31 13:09:18.263035 [DEBUG] switch_core_media.c:4449 Audio Codec Compare [PCMA:8:8000:20:64000:1]/[G729:18:8000:20:8000:1]
  171. 2019-01-31 13:09:18.263035 [DEBUG] switch_core_media.c:4365 Set telephone-event payload to 101@8000
  172. 2019-01-31 13:09:18.263035 [DEBUG] switch_core_media.c:3061 Set Codec sofia/default/CTTESTCALL027@81.95.124.28 PCMU/8000 20 ms 160 samples 64000 bits 1 channels
  173. 2019-01-31 13:09:18.263035 [DEBUG] switch_core_codec.c:111 sofia/default/CTTESTCALL027@81.95.124.28 Original read codec set to PCMU:0
  174. 2019-01-31 13:09:18.263035 [DEBUG] switch_core_media.c:4708 Set telephone-event payload to 101@8000
  175. 2019-01-31 13:09:18.263035 [DEBUG] switch_core_media.c:4767 sofia/default/CTTESTCALL027@81.95.124.28 Set 2833 dtmf send payload to 101 recv payload to 101
  176. 2019-01-31 13:09:18.263035 [DEBUG] sofia.c:7507 (sofia/default/CTTESTCALL027@81.95.124.28) State Change CS_NEW -> CS_INIT
  177. 2019-01-31 13:09:18.263035 [DEBUG] switch_core_state_machine.c:584 (sofia/default/CTTESTCALL027@81.95.124.28) Running State Change CS_INIT (Cur 1 Tot 39)
  178. 2019-01-31 13:09:18.263035 [DEBUG] switch_core_state_machine.c:627 (sofia/default/CTTESTCALL027@81.95.124.28) State INIT
  179. 2019-01-31 13:09:18.263035 [DEBUG] mod_sofia.c:90 sofia/default/CTTESTCALL027@81.95.124.28 SOFIA INIT
  180. 2019-01-31 13:09:18.263035 [DEBUG] switch_core_state_machine.c:40 sofia/default/CTTESTCALL027@81.95.124.28 Standard INIT
  181. 2019-01-31 13:09:18.263035 [DEBUG] switch_core_state_machine.c:48 (sofia/default/CTTESTCALL027@81.95.124.28) State Change CS_INIT -> CS_ROUTING
  182. 2019-01-31 13:09:18.263035 [DEBUG] switch_core_state_machine.c:627 (sofia/default/CTTESTCALL027@81.95.124.28) State INIT going to sleep
  183. 2019-01-31 13:09:18.263035 [DEBUG] switch_core_state_machine.c:584 (sofia/default/CTTESTCALL027@81.95.124.28) Running State Change CS_ROUTING (Cur 1 Tot 39)
  184. 2019-01-31 13:09:18.263035 [DEBUG] switch_channel.c:2249 (sofia/default/CTTESTCALL027@81.95.124.28) Callstate Change DOWN -> RINGING
  185. 2019-01-31 13:09:18.263035 [DEBUG] switch_core_state_machine.c:643 (sofia/default/CTTESTCALL027@81.95.124.28) State ROUTING
  186. 2019-01-31 13:09:18.263035 [DEBUG] mod_sofia.c:143 sofia/default/CTTESTCALL027@81.95.124.28 SOFIA ROUTING
  187. 2019-01-31 13:09:18.263035 [DEBUG] switch_core_state_machine.c:236 sofia/default/CTTESTCALL027@81.95.124.28 Standard ROUTING
  188. 2019-01-31 13:09:18.263035 [INFO] mod_dialplan_xml.c:637 Processing CTTESTCALL027 <CTTESTCALL027>->wifi#CTTESTCALL029 in context default
  189. span style="color: goldenrod; font-weight: bold;"> 2019-01-31 13:09:18.803147 [DEBUG] freeswitch_lua.cpp:365 DBH handle 0x7f4038069d60 Connected.
  190. 2019-01-31 13:09:18.803147 [DEBUG] switch_cpp.cpp:1365 [ASTPP] [LOAD_CONF] Query :SELECT name,value FROM system WHERE group_title IN ('global','opensips','callingcard')
  191. 2019-01-31 13:09:19.083035 [INFO] switch_cpp.cpp:1365 [ASTPP] [Dialplan] Dialed number using WIFI : CTTESTCALL029
  192. 2019-01-31 13:09:19.083035 [INFO] switch_cpp.cpp:1365 [ASTPP] [Dialplan] Dialed number : CTTESTCALL029
  193. 2019-01-31 13:09:19.083035 [INFO] switch_cpp.cpp:1365 [ASTPP] [Dialplan] Caller Id name / number  : 027 / CTTESTCALL027
  194. 2019-01-31 13:09:19.083035 [DEBUG] switch_cpp.cpp:1365 [ASTPP] [CHECK_DID] Query :SELECT A.id as id,B.id as accountid,B.number as account_code,B.did_cid_translation as did_cid_translation,A.number as  did_number,A.connectcost,A.includedseconds,A.cost,A.inc,A.extensions,A.maxchannels,A.call_type,A.city,A.province,A.init_inc,A.leg_timeout FROM dids AS A,accounts AS B WHERE A.status=0 AND B.status=0 AND B.deleted=0 AND B.id=A.accountid AND A.number ="CTTESTCALL029" LIMIT 1
  195. 2019-01-31 13:09:19.263093 [DEBUG] switch_cpp.cpp:1365 [ASTPP] [CHECK_LOCAL_CALL] Query :SELECT sip_devices.username as username,accounts.number as accountcode,sip_devices.accountid as accountid,accounts.did_cid_translation as did_cid_translation FROM sip_devices as sip_devices,accounts as  accounts WHERE accounts.status=0 AND accounts.deleted=0 AND accounts.id=sip_devices.accountid AND sip_devices.username="CTTESTCALL029" limit 1
  196. 2019-01-31 13:09:19.443059 [INFO] switch_cpp.cpp:1365 [ASTPP] [Dialplan] Call direction : local
  197. 2019-01-31 13:09:19.443059 [NOTICE] switch_cpp.cpp:1365 [ASTPP] [Accountcode : CTTESTCALL027]
  198. 2019-01-31 13:09:19.443059 [DEBUG] switch_cpp.cpp:1365 [ASTPP] [DOAUTHORIZATION] Query :SELECT * FROM accounts WHERE (number = "CTTESTCALL027" OR id="CTTESTCALL027") AND status=0 AND deleted=0 AND (expiry >= '2019-01-31 13:09:19' OR expiry = '0000-00-00 00:00:00') limit 1
  199. 2019-01-31 13:09:19.623108 [DEBUG] switch_cpp.cpp:1365 [ASTPP] [GET_PACKAGE_INFO] Query :SELECT * FROM packages  as P inner join package_patterns as PKGPTR on P.id = PKGPTR.package_id WHERE (patterns ='^CTTESTCALL029.*' OR patterns ='^CTTESTCALL02.*' OR patterns ='^CTTESTCALL0.*' OR patterns ='^CTTESTCALL.*' OR patterns ='^CTTESTCAL.*' OR patterns ='^CTTESTCA.*' OR patterns ='^CTTESTC.*' OR patterns ='^CTTEST.*' OR patterns ='^CTTES.*' OR patterns ='^CTTE.*' OR patterns ='^CTT.*' OR patterns ='^CT.*' OR patterns ='^C.*' OR patterns ='--') AND status = 0 AND pricelist_id = 1 ORDER BY LENGTH(PKGPTR.patterns) DESC LIMIT 1
  200. 2019-01-31 13:09:19.803176 [INFO] switch_cpp.cpp:1365 [ASTPP] =============== Account Information ===================
  201. 2019-01-31 13:09:19.803176 [INFO] switch_cpp.cpp:1365 [ASTPP] User id : 581
  202. 2019-01-31 13:09:19.803176 [INFO] switch_cpp.cpp:1365 [ASTPP] Account code : CTTESTCALL027
  203. 2019-01-31 13:09:19.803176 [INFO] switch_cpp.cpp:1365 [ASTPP] Balance : 60
  204. 2019-01-31 13:09:19.803176 [INFO] switch_cpp.cpp:1365 [ASTPP] Type : 0 [0:prepaid,1:postpaid]
  205. 2019-01-31 13:09:19.803176 [INFO] switch_cpp.cpp:1365 [ASTPP] Ratecard id : 1
  206. 2019-01-31 13:09:19.803176 [INFO] switch_cpp.cpp:1365 [ASTPP] ========================================================
  207. 2019-01-31 13:09:19.803176 [DEBUG] switch_cpp.cpp:1365 [ASTPP] [GET_PRICELIST_INFO] Query :select * from pricelists WHERE id = 1 AND status = 0
  208. 2019-01-31 13:09:19.983085 [INFO] switch_cpp.cpp:1365 [ASTPP] [FIND_MAXLENGTH] LIMITING CALL TO CONFIG MAX LENGTH 24!!!
  209. 2019-01-31 13:09:19.983085 [INFO] switch_cpp.cpp:1365 [ASTPP] =============== Rates Information ===================
  210. 2019-01-31 13:09:19.983085 [INFO] switch_cpp.cpp:1365 [ASTPP] ID : 0
  211. 2019-01-31 13:09:19.983085 [INFO] switch_cpp.cpp:1365 [ASTPP] Code : CTTESTCALL029
  212. 2019-01-31 13:09:19.983085 [INFO] switch_cpp.cpp:1365 [ASTPP] Destination : Local
  213. 2019-01-31 13:09:19.983085 [INFO] switch_cpp.cpp:1365 [ASTPP] Connectcost : 0
  214. 2019-01-31 13:09:19.983085 [INFO] switch_cpp.cpp:1365 [ASTPP] Includedseconds : 0
  215. 2019-01-31 13:09:19.983085 [INFO] switch_cpp.cpp:1365 [ASTPP] Cost : 1
  216. 2019-01-31 13:09:19.983085 [INFO] switch_cpp.cpp:1365 [ASTPP] Initial Increment : 60
  217. 2019-01-31 13:09:19.983085 [INFO] switch_cpp.cpp:1365 [ASTPP] Increment : 60
  218. 2019-01-31 13:09:19.983085 [INFO] switch_cpp.cpp:1365 [ASTPP] Accid : 581
  219. 2019-01-31 13:09:19.983085 [INFO] switch_cpp.cpp:1365 [ASTPP] ================================================================
  220. 2019-01-31 13:09:19.983085 [DEBUG] switch_cpp.cpp:1365 [ASTPP] [CHECK_SPEEDDIAL] Query :SELECT balance FROM accounts WHERE status=0 AND deleted=0 AND number ="CTTESTCALL029" limit 1
  221. 2019-01-31 13:09:20.163041 [INFO] switch_cpp.cpp:1365 [ASTPP] [FIND_MAXLENGTH1] Balance for destination number 60.00000 !!!
  222. 2019-01-31 13:09:20.163041 [INFO] switch_cpp.cpp:1365 [ASTPP] [FIND_MAXLENGTH1] LIMITING CALL TO CONFIG MAX LENGTH 60!!!
  223. 2019-01-31 13:09:20.163041 [INFO] switch_cpp.cpp:1365 [ASTPP] Call Max length duration : 60 minutes
  224. 2019-01-31 13:09:20.163041 [DEBUG] switch_cpp.cpp:1365 [ASTPP] [CHECK_LOCAL_CALL] Query :SELECT sip_devices.username as username,accounts.number as accountcode,sip_devices.accountid as accountid,accounts.did_cid_translation as did_cid_translation FROM sip_devices as sip_devices,accounts as  accounts WHERE accounts.status=0 AND accounts.deleted=0 AND accounts.id=sip_devices.accountid AND sip_devices.username="CTTESTCALL029" limit 1
  225. 2019-01-31 13:09:20.343097 [WARNING] switch_cpp.cpp:1365 [ASTPP] [FSXMLLOCAL] Caller ID Translation Starts
  226. 2019-01-31 13:09:20.343097 [WARNING] switch_cpp.cpp:1365 [ASTPP] [FSXMLLOCAL] Caller ID Translation Ends
  227. 2019-01-31 13:09:20.343097 [DEBUG] switch_cpp.cpp:1365 [ASTPP] [NOTIFY] Query :select devicetoken from accounts where number = 'CTTESTCALL029' and status =0 and deleted =0 limit 1
  228. 2019-01-31 13:09:20.523083 [DEBUG] switch_cpp.cpp:1365 [ASTPP] [Dialplan] Generated XML:
  229. <?xml version="1.0" encoding="UTF-8" standalone="no"?>
  230. <document type="freeswitch/xml">
  231. <section name="dialplan" description="ASTPP Dialplan">
  232. <context name="default">
  233. <extension name="CTTESTCALL029">
  234. <condition field="destination_number" expression="wifi#CTTESTCALL029">
  235. <action application="set" data="effective_destination_number=CTTESTCALL029"/>
  236. <action application="sched_hangup" data="+3600 normal_clearing"/>
  237. <action application="set" data="callstart=2019-01-31 13:09:20"/>
  238. <action application="set" data="hangup_after_bridge=true"/>
  239. <action application="set" data="rtp_enable_vad_in=true"/>
  240. <action application="set" data="rtp_enable_vad_out=true"/>
  241. <action application="set" data="continue_on_fail=!USER_BUSY"/>
  242. <action application="set" data="account_id=581"/>
  243. <action application="set" data="parent_id=0"/>
  244. <action application="set" data="entity_id=0"/>
  245. <action application="set" data="call_processed=internal"/>
  246. <action application="set" data="call_direction=local"/>
  247. <action application="set" data="accountname=default"/>
  248. <action application="set" data="origination_rates=ID:0|CODE:CTTESTCALL029|DESTINATION:Local|CONNECTIONCOST:0|INCLUDEDSECONDS:0|COST:1|INC:60|INITIALBLOCK:60|RATEGROUP:1|MARKUP:0|ACCID:581"/>
  249. <action application="set" data="wificall=true"/>
  250. <action application="set" data="original_caller_id_name=027"/>
  251. <action application="set" data="original_caller_id_number=CTTESTCALL027"/>
  252. <action application="set" data="effective_caller_id_name=027"/>
  253. <action application="set" data="effective_caller_id_number=CTTESTCALL027"/>
  254. <action application="set" data="calltype=LOCAL"/>
  255. <action application="set" data="rtp_secure_media=true"/>
  256. <action application="export" data="rtp_secure_media=true"/>
  257. <action application="set" data="receiver_accid=583"/>
  258. <action application="curl" data="http://142.44.213.51:8711/notify.php post destination=CTTESTCALL029&uuid=${uuid}&google_push_api_key=AIzaSyBcE27m3oTIC5wP6Kx_VV_iDbzbMTAwnMc&callkit_token=cjo1KMETez4:APA91bHR_SvQzg9FyNX5RkixPDmovtueVawVXsAxt6RY6qgkk_iBdVF_4-i1_HJ8qPLqNz-TknChhgIYWV8dCtZ8FMyi7Gvb-ezefl8Sdo0L4flxVSa9CxSNCJkPWLi9YGM87r7aW0ix&destination=${effective_destination_number}&source_main=CTTESTCALL027&source_override=${effective_caller_id_number}"/>
  259. <action application="ring_ready"/>
  260. <action application="sleep" data="9000"/>
  261. <action application="set" data="rtp_enable_vad_in=true"/>
  262. <action application="set" data="rtp_enable_vad_out=true"/>
  263. <action application="bridge" data="[leg_timeout=30]user/CTTESTCALL029@${domain_name}"/>
  264. <condition field="${cond(${user_data CTTESTCALL029@${domain_name} param vm-enabled} == true ? YES : NO)}" expression="^YES$">
  265. <action application="answer"/>
  266. <action application="export" data="voicemail_alternate_greet_id=CTTESTCALL029"/>
  267. <action application="voicemail" data="default $${domain_name} CTTESTCALL029"/>
  268. <anti-action application="hangup" data="${originate_disposition}"/>
  269. </condition>
  270. </condition>
  271. </extension>
  272. </context>
  273. </section>
  274. </document>
  275. 2019-01-31 13:09:20.523083 [DEBUG] freeswitch_lua.cpp:382 DBH handle 0x7f4038069d60 released.
  276. Dialplan: sofia/default/CTTESTCALL027@81.95.124.28 parsing [default->CTTESTCALL029] continue=false
  277. Dialplan: sofia/default/CTTESTCALL027@81.95.124.28 Regex (PASS) [CTTESTCALL029] destination_number(wifi#CTTESTCALL029) =~ /wifi#CTTESTCALL029/ break=on-false
  278. Dialplan: sofia/default/CTTESTCALL027@81.95.124.28 Action set(effective_destination_number=CTTESTCALL029)
  279. Dialplan: sofia/default/CTTESTCALL027@81.95.124.28 Action sched_hangup(+3600 normal_clearing)
  280. Dialplan: sofia/default/CTTESTCALL027@81.95.124.28 Action set(callstart=2019-01-31 13:09:20)
  281. Dialplan: sofia/default/CTTESTCALL027@81.95.124.28 Action set(hangup_after_bridge=true)
  282. Dialplan: sofia/default/CTTESTCALL027@81.95.124.28 Action set(rtp_enable_vad_in=true)
  283. Dialplan: sofia/default/CTTESTCALL027@81.95.124.28 Action set(rtp_enable_vad_out=true)
  284. Dialplan: sofia/default/CTTESTCALL027@81.95.124.28 Action set(continue_on_fail=!USER_BUSY)
  285. Dialplan: sofia/default/CTTESTCALL027@81.95.124.28 Action set(account_id=581)
  286. Dialplan: sofia/default/CTTESTCALL027@81.95.124.28 Action set(parent_id=0)
  287. Dialplan: sofia/default/CTTESTCALL027@81.95.124.28 Action set(entity_id=0)
  288. Dialplan: sofia/default/CTTESTCALL027@81.95.124.28 Action set(call_processed=internal)
  289. Dialplan: sofia/default/CTTESTCALL027@81.95.124.28 Action set(call_direction=local)
  290. Dialplan: sofia/default/CTTESTCALL027@81.95.124.28 Action set(accountname=default)
  291. Dialplan: sofia/default/CTTESTCALL027@81.95.124.28 Action set(origination_rates=ID:0|CODE:CTTESTCALL029|DESTINATION:Local|CONNECTIONCOST:0|INCLUDEDSECONDS:0|COST:1|INC:60|INITIALBLOCK:60|RATEGROUP:1|MARKUP:0|ACCID:581)
  292. Dialplan: sofia/default/CTTESTCALL027@81.95.124.28 Action set(wificall=true)
  293. Dialplan: sofia/default/CTTESTCALL027@81.95.124.28 Action set(original_caller_id_name=027)
  294. Dialplan: sofia/default/CTTESTCALL027@81.95.124.28 Action set(original_caller_id_number=CTTESTCALL027)
  295. Dialplan: sofia/default/CTTESTCALL027@81.95.124.28 Action set(effective_caller_id_name=027)
  296. Dialplan: sofia/default/CTTESTCALL027@81.95.124.28 Action set(effective_caller_id_number=CTTESTCALL027)
  297. Dialplan: sofia/default/CTTESTCALL027@81.95.124.28 Action set(calltype=LOCAL)
  298. Dialplan: sofia/default/CTTESTCALL027@81.95.124.28 Action set(rtp_secure_media=true)
  299. Dialplan: sofia/default/CTTESTCALL027@81.95.124.28 Action export(rtp_secure_media=true)
  300. Dialplan: sofia/default/CTTESTCALL027@81.95.124.28 Action set(receiver_accid=583)
  301. Dialplan: sofia/default/CTTESTCALL027@81.95.124.28 Action curl(http://142.44.213.51:8711/notify.php post destination=CTTESTCALL029&uuid=${uuid}&google_push_api_key=AIzaSyBcE27m3oTIC5wP6Kx_VV_iDbzbMTAwnMc&callkit_token=cjo1KMETez4:APA91bHR_SvQzg9FyNX5RkixPDmovtueVawVXsAxt6RY6qgkk_iBdVF_4-i1_HJ8qPLqNz-TknChhgIYWV8dCtZ8FMyi7Gvb-ezefl8Sdo0L4flxVSa9CxSNCJkPWLi9YGM87r7aW0ix&destination=${effective_destination_number}&source_main=CTTESTCALL027&source_override=${effective_caller_id_number})
  302. Dialplan: sofia/default/CTTESTCALL027@81.95.124.28 Action ring_ready()
  303. Dialplan: sofia/default/CTTESTCALL027@81.95.124.28 Action sleep(9000)
  304. Dialplan: sofia/default/CTTESTCALL027@81.95.124.28 Action set(rtp_enable_vad_in=true)
  305. Dialplan: sofia/default/CTTESTCALL027@81.95.124.28 Action set(rtp_enable_vad_out=true)
  306. Dialplan: sofia/default/CTTESTCALL027@81.95.124.28 Action bridge([leg_timeout=30]user/CTTESTCALL029@${domain_name})
  307. |--- Dialplan: Processing recursive conditions level:1 [CTTESTCALL029_recur_1] require-nested=TRUE
  308. |--- Dialplan: sofia/default/CTTESTCALL027@81.95.124.28 Regex (FAIL) [CTTESTCALL029_recur_1] ${cond(${user_data CTTESTCALL029@${domain_name} param vm-enabled} == true ? YES : NO)}(NO) =~ /^YES$/ break=on-false
  309. |--- Dialplan: sofia/default/CTTESTCALL027@81.95.124.28 ANTI-Action hangup(${originate_disposition})
  310. 2019-01-31 13:09:20.703033 [DEBUG] switch_core_state_machine.c:286 (sofia/default/CTTESTCALL027@81.95.124.28) State Change CS_ROUTING -> CS_EXECUTE
  311. 2019-01-31 13:09:20.703033 [DEBUG] switch_core_state_machine.c:643 (sofia/default/CTTESTCALL027@81.95.124.28) State ROUTING going to sleep
  312. 2019-01-31 13:09:20.703033 [DEBUG] switch_core_state_machine.c:584 (sofia/default/CTTESTCALL027@81.95.124.28) Running State Change CS_EXECUTE (Cur 1 Tot 39)
  313. 2019-01-31 13:09:20.703033 [DEBUG] switch_core_state_machine.c:650 (sofia/default/CTTESTCALL027@81.95.124.28) State EXECUTE
  314. 2019-01-31 13:09:20.703033 [DEBUG] mod_sofia.c:198 sofia/default/CTTESTCALL027@81.95.124.28 SOFIA EXECUTE
  315. 2019-01-31 13:09:20.703033 [DEBUG] switch_core_state_machine.c:328 sofia/default/CTTESTCALL027@81.95.124.28 Standard EXECUTE
  316. EXECUTE sofia/default/CTTESTCALL027@81.95.124.28 set(effective_destination_number=CTTESTCALL029)
  317. 2019-01-31 13:09:20.703033 [DEBUG] mod_dptools.c:1548 SET sofia/default/CTTESTCALL027@81.95.124.28 [effective_destination_number]=[CTTESTCALL029]
  318. EXECUTE sofia/default/CTTESTCALL027@81.95.124.28 sched_hangup(+3600 normal_clearing)
  319. 2019-01-31 13:09:20.703033 [DEBUG] switch_scheduler.c:249 Added task 23 switch_ivr_schedule_hangup (e9c3d8e6-d071-4b81-9117-33907273b363) to run at 1548943760
  320. EXECUTE sofia/default/CTTESTCALL027@81.95.124.28 set(callstart=2019-01-31 13:09:20)
  321. 2019-01-31 13:09:20.703033 [DEBUG] mod_dptools.c:1548 SET sofia/default/CTTESTCALL027@81.95.124.28 [callstart]=[2019-01-31 13:09:20]
  322. EXECUTE sofia/default/CTTESTCALL027@81.95.124.28 set(hangup_after_bridge=true)
  323. 2019-01-31 13:09:20.703033 [DEBUG] mod_dptools.c:1548 SET sofia/default/CTTESTCALL027@81.95.124.28 [hangup_after_bridge]=[true]
  324. EXECUTE sofia/default/CTTESTCALL027@81.95.124.28 set(rtp_enable_vad_in=true)
  325. 2019-01-31 13:09:20.703033 [DEBUG] mod_dptools.c:1548 SET sofia/default/CTTESTCALL027@81.95.124.28 [rtp_enable_vad_in]=[true]
  326. EXECUTE sofia/default/CTTESTCALL027@81.95.124.28 set(rtp_enable_vad_out=true)
  327. 2019-01-31 13:09:20.703033 [DEBUG] mod_dptools.c:1548 SET sofia/default/CTTESTCALL027@81.95.124.28 [rtp_enable_vad_out]=[true]
  328. EXECUTE sofia/default/CTTESTCALL027@81.95.124.28 set(continue_on_fail=!USER_BUSY)
  329. 2019-01-31 13:09:20.703033 [DEBUG] mod_dptools.c:1548 SET sofia/default/CTTESTCALL027@81.95.124.28 [continue_on_fail]=[!USER_BUSY]
  330. EXECUTE sofia/default/CTTESTCALL027@81.95.124.28 set(account_id=581)
  331. 2019-01-31 13:09:20.703033 [DEBUG] mod_dptools.c:1548 SET sofia/default/CTTESTCALL027@81.95.124.28 [account_id]=[581]
  332. EXECUTE sofia/default/CTTESTCALL027@81.95.124.28 set(parent_id=0)
  333. 2019-01-31 13:09:20.703033 [DEBUG] mod_dptools.c:1548 SET sofia/default/CTTESTCALL027@81.95.124.28 [parent_id]=[0]
  334. EXECUTE sofia/default/CTTESTCALL027@81.95.124.28 set(entity_id=0)
  335. 2019-01-31 13:09:20.703033 [DEBUG] mod_dptools.c:1548 SET sofia/default/CTTESTCALL027@81.95.124.28 [entity_id]=[0]
  336. EXECUTE sofia/default/CTTESTCALL027@81.95.124.28 set(call_processed=internal)
  337. 2019-01-31 13:09:20.703033 [DEBUG] mod_dptools.c:1548 SET sofia/default/CTTESTCALL027@81.95.124.28 [call_processed]=[internal]
  338. EXECUTE sofia/default/CTTESTCALL027@81.95.124.28 set(call_direction=local)
  339. 2019-01-31 13:09:20.703033 [DEBUG] mod_dptools.c:1548 SET sofia/default/CTTESTCALL027@81.95.124.28 [call_direction]=[local]
  340. EXECUTE sofia/default/CTTESTCALL027@81.95.124.28 set(accountname=default)
  341. 2019-01-31 13:09:20.703033 [DEBUG] mod_dptools.c:1548 SET sofia/default/CTTESTCALL027@81.95.124.28 [accountname]=[default]
  342. EXECUTE sofia/default/CTTESTCALL027@81.95.124.28 set(origination_rates=ID:0|CODE:CTTESTCALL029|DESTINATION:Local|CONNECTIONCOST:0|INCLUDEDSECONDS:0|COST:1|INC:60|INITIALBLOCK:60|RATEGROUP:1|MARKUP:0|ACCID:581)
  343. 2019-01-31 13:09:20.723042 [DEBUG] mod_dptools.c:1548 SET sofia/default/CTTESTCALL027@81.95.124.28 [origination_rates]=[ID:0|CODE:CTTESTCALL029|DESTINATION:Local|CONNECTIONCOST:0|INCLUDEDSECONDS:0|COST:1|INC:60|INITIALBLOCK:60|RATEGROUP:1|MARKUP:0|ACCID:581]
  344. EXECUTE sofia/default/CTTESTCALL027@81.95.124.28 set(wificall=true)
  345. 2019-01-31 13:09:20.723042 [DEBUG] mod_dptools.c:1548 SET sofia/default/CTTESTCALL027@81.95.124.28 [wificall]=[true]
  346. EXECUTE sofia/default/CTTESTCALL027@81.95.124.28 set(original_caller_id_name=027)
  347. 2019-01-31 13:09:20.723042 [DEBUG] mod_dptools.c:1548 SET sofia/default/CTTESTCALL027@81.95.124.28 [original_caller_id_name]=[027]
  348. EXECUTE sofia/default/CTTESTCALL027@81.95.124.28 set(original_caller_id_number=CTTESTCALL027)
  349. 2019-01-31 13:09:20.723042 [DEBUG] mod_dptools.c:1548 SET sofia/default/CTTESTCALL027@81.95.124.28 [original_caller_id_number]=[CTTESTCALL027]
  350. EXECUTE sofia/default/CTTESTCALL027@81.95.124.28 set(effective_caller_id_name=027)
  351. 2019-01-31 13:09:20.723042 [DEBUG] mod_dptools.c:1548 SET sofia/default/CTTESTCALL027@81.95.124.28 [effective_caller_id_name]=[027]
  352. EXECUTE sofia/default/CTTESTCALL027@81.95.124.28 set(effective_caller_id_number=CTTESTCALL027)
  353. 2019-01-31 13:09:20.723042 [DEBUG] mod_dptools.c:1548 SET sofia/default/CTTESTCALL027@81.95.124.28 [effective_caller_id_number]=[CTTESTCALL027]
  354. EXECUTE sofia/default/CTTESTCALL027@81.95.124.28 set(calltype=LOCAL)
  355. 2019-01-31 13:09:20.723042 [DEBUG] mod_dptools.c:1548 SET sofia/default/CTTESTCALL027@81.95.124.28 [calltype]=[LOCAL]
  356. EXECUTE sofia/default/CTTESTCALL027@81.95.124.28 set(rtp_secure_media=true)
  357. 2019-01-31 13:09:20.723042 [DEBUG] mod_dptools.c:1548 SET sofia/default/CTTESTCALL027@81.95.124.28 [rtp_secure_media]=[true]
  358. EXECUTE sofia/default/CTTESTCALL027@81.95.124.28 export(rtp_secure_media=true)
  359. 2019-01-31 13:09:20.723042 [DEBUG] switch_channel.c:1296 EXPORT (export_vars) [rtp_secure_media]=[true]
  360. EXECUTE sofia/default/CTTESTCALL027@81.95.124.28 set(receiver_accid=583)
  361. 2019-01-31 13:09:20.723042 [DEBUG] mod_dptools.c:1548 SET sofia/default/CTTESTCALL027@81.95.124.28 [receiver_accid]=[583]
  362. EXECUTE sofia/default/CTTESTCALL027@81.95.124.28 curl(http://142.44.213.51:8711/notify.php post destination=CTTESTCALL029&uuid=e9c3d8e6-d071-4b81-9117-33907273b363&google_push_api_key=AIzaSyBcE27m3oTIC5wP6Kx_VV_iDbzbMTAwnMc&callkit_token=cjo1KMETez4:APA91bHR_SvQzg9FyNX5RkixPDmovtueVawVXsAxt6RY6qgkk_iBdVF_4-i1_HJ8qPLqNz-TknChhgIYWV8dCtZ8FMyi7Gvb-ezefl8Sdo0L4flxVSa9CxSNCJkPWLi9YGM87r7aW0ix&destination=CTTESTCALL029&source_main=CTTESTCALL027&source_override=CTTESTCALL027)
  363. 2019-01-31 13:09:20.723042 [DEBUG] mod_curl.c:182 method: post, url: http://142.44.213.51:8711/notify.php, content-type: (null)
  364. 2019-01-31 13:09:20.723042 [DEBUG] mod_curl.c:211 Post data: destination=CTTESTCALL029&uuid=e9c3d8e6-d071-4b81-9117-33907273b363&google_push_api_key=AIzaSyBcE27m3oTIC5wP6Kx_VV_iDbzbMTAwnMc&callkit_token=cjo1KMETez4:APA91bHR_SvQzg9FyNX5RkixPDmovtueVawVXsAxt6RY6qgkk_iBdVF_4-i1_HJ8qPLqNz-TknChhgIYWV8dCtZ8FMyi7Gvb-ezefl8Sdo0L4flxVSa9CxSNCJkPWLi9YGM87r7aW0ix&destination=CTTESTCALL029&source_main=CTTESTCALL027&source_override=CTTESTCALL027
  365. EXECUTE sofia/default/CTTESTCALL027@81.95.124.28 ring_ready()
  366. 2019-01-31 13:09:21.123146 [NOTICE] mod_sofia.c:2273 Ring-Ready sofia/default/CTTESTCALL027@81.95.124.28!
  367. send 778 bytes to tls/[103.249.234.189]:54432 at 13:09:21.136090:
  368.    ------------------------------------------------------------------------
  369.    SIP/2.0 180 Ringing
  370.    Via: SIP/2.0/TLS 192.168.1.175:54604;rport=54432;branch=z9hG4bKPjglj0s2HhON9H1-65zR39oqVnp7x9VoRa;alias;received=103.249.234.189
  371.    f: <sip:CTTESTCALL027@81.95.124.28>;tag=SAK2AGF1MHtOyiP9Tm5o7OtBlhzQ4f.q
  372.    To: <sip:wifi%23CTTESTCALL029@81.95.124.28>;tag=6Dc5aptem4ZFQ
  373.    i: Mz5C0YV9PzFPWIkzjvOuvqlArQ-wSAGX
  374.    CSeq: 27269 INVITE
  375.    Contact: <sip:wifi#CTTESTCALL029@81.95.124.28:5061;transport=tls>
  376.    User-Agent: ASTPP
  377.    Accept: application/sdp
  378.   Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, NOTIFY, PUBLISH, SUBSCRIBE
  379.    Supported: path, replaces
  380.    Allow-Events: talk, hold, conference, presence, as-feature-event, dialog, line-seize, call-info, sla, include-session-description, presence.winfo, message-summary, refer
  381.    Content-Length: 0
  382.    
  383.    ------------------------------------------------------------------------
  384. 2019-01-31 13:09:21.123146 [DEBUG] sofia.c:7084 Channel sofia/default/CTTESTCALL027@81.95.124.28 entering state [early][180]
  385. 2019-01-31 13:09:21.123146 [NOTICE] mod_dptools.c:1028 Ring Ready sofia/default/CTTESTCALL027@81.95.124.28!
  386. EXECUTE sofia/default/CTTESTCALL027@81.95.124.28 sleep(9000)
  387. freeswitch@astpp04>
  388. freeswitch@astpp04>
  389. freeswitch@astpp04>
  390. freeswitch@astpp04>
  391. freeswitch@astpp04>
  392. freeswitch@astpp04>
  393. freeswitch@astpp04>
  394. freeswitch@astpp04>
  395. freeswitch@astpp04>
  396. freeswitch@astpp04>
  397. freeswitch@astpp04>
  398. freeswitch@astpp04>
  399. freeswitch@astpp04>
  400. freeswitch@astpp04>
  401. freeswitch@astpp04>
  402. freeswitch@astpp04>
  403. freeswitch@astpp04>
  404. freeswitch@astpp04>
  405. freeswitch@astpp04>
  406. freeswitch@astpp04>
  407. freeswitch@astpp04>
  408. freeswitch@astpp04>
  409. freeswitch@astpp04>
  410. freeswitch@astpp04>
  411. freeswitch@astpp04>
  412. freeswitch@astpp04>
  413. freeswitch@astpp04>
  414. EXECUTE sofia/default/CTTESTCALL027@81.95.124.28 set(rtp_enable_vad_in=true)
  415. 2019-01-31 13:09:30.143036 [DEBUG] mod_dptools.c:1548 SET sofia/default/CTTESTCALL027@81.95.124.28 [rtp_enable_vad_in]=[true]
  416. EXECUTE sofia/default/CTTESTCALL027@81.95.124.28 set(rtp_enable_vad_out=true)
  417. 2019-01-31 13:09:30.163036 [DEBUG] mod_dptools.c:1548 SET sofia/default/CTTESTCALL027@81.95.124.28 [rtp_enable_vad_out]=[true]
  418. EXECUTE sofia/default/CTTESTCALL027@81.95.124.28 bridge([leg_timeout=30]user/CTTESTCALL029@81.95.124.28)
  419. 2019-01-31 13:09:30.163036 [DEBUG] switch_channel.c:1250 sofia/default/CTTESTCALL027@81.95.124.28 EXPORTING[export_vars] [rtp_secure_media]=[true] to event
  420. 2019-01-31 13:09:30.163036 [DEBUG] switch_ivr_originate.c:2142 Parsing global variables
  421. 2019-01-31 13:09:30.163036 [DEBUG] switch_ivr_originate.c:2669 Parsing session specific variables
  422. 2019-01-31 13:09:30.343054 [DEBUG] switch_channel.c:1250 sofia/default/CTTESTCALL027@81.95.124.28 EXPORTING[export_vars] [rtp_secure_media]=[true] to event
  423. 2019-01-31 13:09:30.343054 [DEBUG] switch_ivr_originate.c:2142 Parsing global variables
  424. 2019-01-31 13:09:30.343054 [NOTICE] switch_channel.c:1104 New Channel sofia/default/CTTESTCALL029@192.168.1.176:37032 [255d7d4f-71d5-43a0-8464-e05948debf70]
  425. 2019-01-31 13:09:30.343054 [DEBUG] mod_sofia.c:4819 (sofia/default/CTTESTCALL029@192.168.1.176:37032) State Change CS_NEW -> CS_INIT
  426. 2019-01-31 13:09:30.343054 [DEBUG] switch_ivr_originate.c:2963 sofia/default/CTTESTCALL029@192.168.1.176:37032 Setting leg timeout to 30
  427. 2019-01-31 13:09:30.343054 [DEBUG] switch_core_state_machine.c:584 (sofia/default/CTTESTCALL029@192.168.1.176:37032) Running State Change CS_INIT (Cur 2 Tot 40)
  428. 2019-01-31 13:09:30.343054 [DEBUG] switch_core_state_machine.c:627 (sofia/default/CTTESTCALL029@192.168.1.176:37032) State INIT
  429. 2019-01-31 13:09:30.343054 [DEBUG] mod_sofia.c:90 sofia/default/CTTESTCALL029@192.168.1.176:37032 SOFIA INIT
  430. 2019-01-31 13:09:30.343054 [DEBUG] switch_core_media.c:1128 Set Local audio crypto Key [1 AEAD_AES_256_GCM_8 inline:woE/Y36wEuUGKgmnMlGz/GmYN3okwssROpno30x3N61Fj1ZpfMaWHHl4fm4]
  431. 2019-01-31 13:09:30.343054 [DEBUG] switch_core_media.c:1128 Set Local video crypto Key [1 AEAD_AES_256_GCM_8 inline:0KWOSuc65h0WHAhOje2uB0KX5MGT3KAGVgUkp3yWEARqieoXPXizdAzKeMk]
  432. 2019-01-31 13:09:30.343054 [DEBUG] switch_core_media.c:1128 Set Local audio crypto Key [2 AEAD_AES_128_GCM_8 inline:fUQzIHPzq4eaHrsCo6ZRtC6+g4sE2jQXThCyOA]
  433. 2019-01-31 13:09:30.343054 [DEBUG] switch_core_media.c:1128 Set Local video crypto Key [2 AEAD_AES_128_GCM_8 inline:dVLvUV6rnrFd9ZnA1MrfwvPj18Pjju0OUiqEdQ]
  434. 2019-01-31 13:09:30.343054 [DEBUG] switch_core_media.c:1128 Set Local audio crypto Key [3 AES_CM_256_HMAC_SHA1_80 inline:JPOTKolGsbAiPVvkAPZJYTbhD+uUCQ582hQKhwAqBB2B6gB7f0voveasjdpr9g]
  435. 2019-01-31 13:09:30.343054 [DEBUG] switch_core_media.c:1128 Set Local video crypto Key [3 AES_CM_256_HMAC_SHA1_80 inline:X0T9OiYpSNFYMbJmFf/VLg7zJJoOvu34krNoVg3ANYD+eGBzTiIOp/Y+VjFlGg]
  436. 2019-01-31 13:09:30.343054 [DEBUG] switch_core_media.c:1128 Set Local audio crypto Key [4 AES_CM_192_HMAC_SHA1_80 inline:wDkU742kVQQjXCaEhMEaL6pGwCfylHGl4/iTkAPWexGRXqD44GY]
  437. 2019-01-31 13:09:30.343054 [DEBUG] switch_core_media.c:1128 Set Local video crypto Key [4 AES_CM_192_HMAC_SHA1_80 inline:HcMd/qnS0UA4Q30tT06D7YH2K4lZkhnp7N9oxhwIp82vFpd+7O4]
  438. 2019-01-31 13:09:30.343054 [DEBUG] switch_core_media.c:1128 Set Local audio crypto Key [5 AES_CM_128_HMAC_SHA1_80 inline:cdzx2x6UTDpFOk985c7vHGzHG8pR0OGrTFE1Wd9y]
  439. 2019-01-31 13:09:30.343054 [DEBUG] switch_core_media.c:1128 Set Local video crypto Key [5 AES_CM_128_HMAC_SHA1_80 inline:kWsJ6nF53+EagW89Pp7Hy9dvXX5AMHIyi05I4PKt]
  440. 2019-01-31 13:09:30.343054 [DEBUG] switch_core_media.c:1128 Set Local audio crypto Key [6 AES_CM_256_HMAC_SHA1_32 inline:9loS3TW8PZxDsRc2dY3G5alCKRJ8YlYfCrNbRLDnsNIUC4PRYDFH+alaAa0VVA]
  441. 2019-01-31 13:09:30.343054 [DEBUG] switch_core_media.c:1128 Set Local video crypto Key [6 AES_CM_256_HMAC_SHA1_32 inline:yiiALsxadW4WKGYpHncmeQUZHFoMlja9byKLrakjGjJAJ0L7uDJEb4p+ukufnQ]
  442. 2019-01-31 13:09:30.343054 [DEBUG] switch_core_media.c:1128 Set Local audio crypto Key [7 AES_CM_192_HMAC_SHA1_32 inline:64lKiD4IMGXZXHjoVMfpCmWmYbRC1o0aoxzMc41rP/f0yala2cg]
  443. 2019-01-31 13:09:30.343054 [DEBUG] switch_core_media.c:1128 Set Local video crypto Key [7 AES_CM_192_HMAC_SHA1_32 inline:OioMNKaOpeUP1tJAFfQIpzJ2qBVu0D2EkVS6cXcTpfu0dpuo5gw]
  444. 2019-01-31 13:09:30.343054 [DEBUG] switch_core_media.c:1128 Set Local audio crypto Key [8 AES_CM_128_HMAC_SHA1_32 inline:v92aVv7qUJGWUdjtiYeo0zP1QHLT3/TraMW/L+/g]
  445. 2019-01-31 13:09:30.343054 [DEBUG] switch_core_media.c:1128 Set Local video crypto Key [8 AES_CM_128_HMAC_SHA1_32 inline:5u7GdffNGEJjRxSOWCc1rr5Z4d2QFiA24fmE6HTg]
  446. 2019-01-31 13:09:30.343054 [DEBUG] switch_core_media.c:1128 Set Local audio crypto Key [9 AES_CM_128_NULL_AUTH inline:d+wNijiCW87bPZvStUGHNxvRRNFtu9WmwtH9nE2B]
  447. 2019-01-31 13:09:30.343054 [DEBUG] switch_core_media.c:1128 Set Local video crypto Key [9 AES_CM_128_NULL_AUTH inline:FBsKB+O+GovsZyxVa6PCw/SPBNsU0MGmervVIa9i]
  448. 2019-01-31 13:09:30.343054 [DEBUG] sofia_glue.c:1264 sip:CTTESTCALL029@103.249.234.189:55144;transport=TLS;ob Setting proxy route to sofia/default/CTTESTCALL029@192.168.1.176:37032
  449. 2019-01-31 13:09:30.343054 [DEBUG] sofia_glue.c:1295 sofia/default/CTTESTCALL029@192.168.1.176:37032 sending invite version: 1.6.19 git 7a77e0b 2017-07-13 12:01:45Z 64bit
  450. Local SDP:
  451. v=0
  452. o=FreeSWITCH 1548923422 1548923423 IN IP4 81.95.124.28
  453. s=FreeSWITCH
  454. c=IN IP4 81.95.124.28
  455. t=0 0
  456. m=audio 16748 RTP/SAVP 0 101
  457. a=rtpmap:0 PCMU/8000
  458. a=rtpmap:101 telephone-event/8000
  459. a=fmtp:101 0-16
  460. a=crypto:1 AEAD_AES_256_GCM_8 inline:woE/Y36wEuUGKgmnMlGz/GmYN3okwssROpno30x3N61Fj1ZpfMaWHHl4fm4
  461. a=crypto:2 AEAD_AES_128_GCM_8 inline:fUQzIHPzq4eaHrsCo6ZRtC6+g4sE2jQXThCyOA
  462. a=crypto:3 AES_CM_256_HMAC_SHA1_80 inline:JPOTKolGsbAiPVvkAPZJYTbhD+uUCQ582hQKhwAqBB2B6gB7f0voveasjdpr9g
  463. a=crypto:4 AES_CM_192_HMAC_SHA1_80 inline:wDkU742kVQQjXCaEhMEaL6pGwCfylHGl4/iTkAPWexGRXqD44GY
  464. a=crypto:5 AES_CM_128_HMAC_SHA1_80 inline:cdzx2x6UTDpFOk985c7vHGzHG8pR0OGrTFE1Wd9y
  465. a=crypto:6 AES_CM_256_HMAC_SHA1_32 inline:9loS3TW8PZxDsRc2dY3G5alCKRJ8YlYfCrNbRLDnsNIUC4PRYDFH+alaAa0VVA
  466. a=crypto:7 AES_CM_192_HMAC_SHA1_32 inline:64lKiD4IMGXZXHjoVMfpCmWmYbRC1o0aoxzMc41rP/f0yala2cg
  467. a=crypto:8 AES_CM_128_HMAC_SHA1_32 inline:v92aVv7qUJGWUdjtiYeo0zP1QHLT3/TraMW/L+/g
  468. a=crypto:9 AES_CM_128_NULL_AUTH inline:d+wNijiCW87bPZvStUGHNxvRRNFtu9WmwtH9nE2B
  469. a=ptime:20
  470. a=sendrecv
  471.  
  472. 2019-01-31 13:09:30.343054 [DEBUG] switch_core_state_machine.c:40 sofia/default/CTTESTCALL029@192.168.1.176:37032 Standard INIT
  473. 2019-01-31 13:09:30.343054 [DEBUG] switch_core_state_machine.c:48 (sofia/default/CTTESTCALL029@192.168.1.176:37032) State Change CS_INIT -> CS_ROUTING
  474. 2019-01-31 13:09:30.343054 [DEBUG] switch_core_state_machine.c:627 (sofia/default/CTTESTCALL029@192.168.1.176:37032) State INIT going to sleep
  475. 2019-01-31 13:09:30.343054 [DEBUG] switch_core_state_machine.c:584 (sofia/default/CTTESTCALL029@192.168.1.176:37032) Running State Change CS_ROUTING (Cur 2 Tot 40)
  476. 2019-01-31 13:09:30.343054 [DEBUG] switch_core_state_machine.c:643 (sofia/default/CTTESTCALL029@192.168.1.176:37032) State ROUTING
  477. 2019-01-31 13:09:30.343054 [DEBUG] mod_sofia.c:143 sofia/default/CTTESTCALL029@192.168.1.176:37032 SOFIA ROUTING
  478. 2019-01-31 13:09:30.343054 [DEBUG] switch_ivr_originate.c:67 (sofia/default/CTTESTCALL029@192.168.1.176:37032) State Change CS_ROUTING -> CS_CONSUME_MEDIA
  479. 2019-01-31 13:09:30.343054 [DEBUG] switch_core_state_machine.c:643 (sofia/default/CTTESTCALL029@192.168.1.176:37032) State ROUTING going to sleep
  480. 2019-01-31 13:09:30.343054 [DEBUG] switch_core_state_machine.c:584 (sofia/default/CTTESTCALL029@192.168.1.176:37032) Running State Change CS_CONSUME_MEDIA (Cur 2 Tot 40)
  481. 2019-01-31 13:09:30.343054 [DEBUG] sofia.c:7084 Channel sofia/default/CTTESTCALL029@192.168.1.176:37032 entering state [calling][0]
  482. 2019-01-31 13:09:30.343054 [DEBUG] switch_core_state_machine.c:662 (sofia/default/CTTESTCALL029@192.168.1.176:37032) State CONSUME_MEDIA
  483. 2019-01-31 13:09:30.343054 [DEBUG] switch_core_state_machine.c:662 (sofia/default/CTTESTCALL029@192.168.1.176:37032) State CONSUME_MEDIA going to sleep
  484. recv 758 bytes from tcp/[117.247.91.162]:54048 at 13:09:45.928767:
  485.    ------------------------------------------------------------------------
  486.    PUBLISH sip:CTTESTCALL007@81.95.124.28;transport=TCP SIP/2.0
  487.    Via: SIP/2.0/TCP 192.168.1.15:41430;branch=z9hG4bK-d8754z-5babef54be68e8fc-1---d8754z-
  488.    Max-Forwards: 70
  489.    Contact: <sip:CTTESTCALL007@117.247.91.162:41430;transport=TCP>
  490.    To: <sip:CTTESTCALL007@81.95.124.28;transport=TCP>
  491.    From: <sip:CTTESTCALL007@81.95.124.28;transport=TCP>;tag=2ebc8815
  492.    Call-ID: MWZiNTZiZjBhODQwZjRjZTNiMDRlNzMxMzMxNzBjYzc.
  493.    CSeq: 10 PUBLISH
  494.    Expires: 600
  495.   Allow: INVITE, ACK, CANCEL, BYE, NOTIFY, REFER, MESSAGE, OPTIONS, INFO, SUBSCRIBE
  496.    Content-Type: application/pidf+xml
  497.    SIP-If-Match: C0wJBEn8
  498.    Supported: replaces, norefersub, extended-refer, timer, X-cisco-serviceuri
  499.    User-Agent: Z 3.3.21933 r21903
  500.    Event: presence
  501.    Allow-Events: presence, kpml
  502.    Content-Length: 0
  503.    
  504.    ------------------------------------------------------------------------
  505. send 754 bytes to tcp/[117.247.91.162]:54048 at 13:09:45.929253:
  506.    ------------------------------------------------------------------------
  507.    SIP/2.0 200 OK
  508.    Via: SIP/2.0/TCP 192.168.1.15:41430;branch=z9hG4bK-d8754z-5babef54be68e8fc-1---d8754z-;received=117.247.91.162;rport=54048
  509.    From: <sip:CTTESTCALL007@81.95.124.28;transport=TCP>;tag=2ebc8815
  510.    To: <sip:CTTESTCALL007@81.95.124.28;transport=TCP>;tag=8ZypecvNepcNe
  511.    Call-ID: MWZiNTZiZjBhODQwZjRjZTNiMDRlNzMxMzMxNzBjYzc.
  512.    CSeq: 10 PUBLISH
  513.    Contact: <sip:81.95.124.28>
  514.    Expires: 600
  515.    User-Agent: ASTPP
  516.   Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, NOTIFY, PUBLISH, SUBSCRIBE
  517.    Supported: path, replaces
  518.    Allow-Events: talk, hold, conference, presence, as-feature-event, dialog, line-seize, call-info, sla, include-session-description, presence.winfo, message-summary, refer
  519.    SIP-ETag: XvRpCEhc
  520.    Content-Length: 0
  521.    
  522.    ------------------------------------------------------------------------
  523. 2019-01-31 13:10:00.003045 [NOTICE] switch_ivr_originate.c:3612 Hangup sofia/default/CTTESTCALL029@192.168.1.176:37032 [CS_CONSUME_MEDIA] [NO_ANSWER]
  524. 2019-01-31 13:10:00.003045 [DEBUG] switch_core_state_machine.c:584 (sofia/default/CTTESTCALL029@192.168.1.176:37032) Running State Change CS_HANGUP (Cur 2 Tot 40)
  525. 2019-01-31 13:10:00.003045 [DEBUG] switch_core_state_machine.c:850 (sofia/default/CTTESTCALL029@192.168.1.176:37032) Callstate Change DOWN -> HANGUP
  526. 2019-01-31 13:10:00.003045 [DEBUG] switch_core_state_machine.c:852 (sofia/default/CTTESTCALL029@192.168.1.176:37032) State HANGUP
  527. 2019-01-31 13:10:00.003045 [DEBUG] mod_sofia.c:438 Channel sofia/default/CTTESTCALL029@192.168.1.176:37032 hanging up, cause: NO_ANSWER
  528. 2019-01-31 13:10:00.003045 [NOTICE] switch_ivr_originate.c:2851 Cannot create outgoing channel of type [user] cause: [NO_ANSWER]
  529. 2019-01-31 13:10:00.003045 [DEBUG] switch_ivr_originate.c:3848 Originate Resulted in Error Cause: 19 [NO_ANSWER]
  530. 2019-01-31 13:10:00.003045 [DEBUG] mod_sofia.c:502 Sending CANCEL to sofia/default/CTTESTCALL029@192.168.1.176:37032
  531. 2019-01-31 13:10:00.003045 [DEBUG] switch_core_state_machine.c:60 sofia/default/CTTESTCALL029@192.168.1.176:37032 Standard HANGUP, cause: NO_ANSWER
  532. 2019-01-31 13:10:00.003045 [DEBUG] switch_core_state_machine.c:852 (sofia/default/CTTESTCALL029@192.168.1.176:37032) State HANGUP going to sleep
  533. 2019-01-31 13:10:00.003045 [DEBUG] switch_core_state_machine.c:619 (sofia/default/CTTESTCALL029@192.168.1.176:37032) State Change CS_HANGUP -> CS_REPORTING
  534. 2019-01-31 13:10:00.003045 [INFO] mod_dptools.c:3436 Originate Failed.  Cause: NO_ANSWER
  535. 2019-01-31 13:10:00.003045 [DEBUG] switch_core_state_machine.c:584 (sofia/default/CTTESTCALL029@192.168.1.176:37032) Running State Change CS_REPORTING (Cur 2 Tot 40)
  536. 2019-01-31 13:10:00.003045 [NOTICE] switch_channel.c:4844 Hangup sofia/default/CTTESTCALL027@81.95.124.28 [CS_EXECUTE] [NO_ANSWER]
  537. 2019-01-31 13:10:00.003045 [DEBUG] switch_core_state_machine.c:938 (sofia/default/CTTESTCALL029@192.168.1.176:37032) State REPORTING
  538. 2019-01-31 13:10:00.003045 [INFO] mod_json_cdr.c:271 Process [255d7d4f-71d5-43a0-8464-e05948debf70.cdr.json]
  539.