From BADhills, 6 Years ago, written in FreeSWITCH.
- view diff
Embed
  1. recv 713 bytes from udp/[192.168.170.104]:12842 at 15:08:40.475847:
  2.    ------------------------------------------------------------------------
  3.    REGISTER sip:192.168.170.204:5060 SIP/2.0
  4.    Via: SIP/2.0/UDP 192.168.170.104:12842;rport;branch=z9hG4bK-69p63061339970169638r
  5.    From: "Markus -PLY" <sip:53@192.168.170.204>;tag=68g9055986257157952374m
  6.    To: "Markus -PLY" <sip:53@192.168.170.204>
  7.    Call-ID: 66e341763012106052335k11476rmwp
  8.    CSeq: 25074 REGISTER
  9.    Max-Forwards: 60
  10.    Expires: 180
  11.    Contact: "Markus -PLY" <sip:53@192.168.170.104:12842>
  12.    User-Agent: MizuDroid/2.0.2
  13.    FinalUA: MizuDroid 1f19cf5e3d7b3145
  14.    Supported: replaces
  15.   Allow: ACK,PRACK,BYE,CANCEL,INVITE,UPDATE,MESSAGE,INFO,OPTIONS,SUBSCRIBE,NOTIFY,REFER
  16.    Allow-Events: presence,refer,telephone-event,keep-alive,dialog
  17.    Accept: application/sdp,application/dtmf-relay,text/plain
  18.    Content-Length: 0
  19.    
  20.    ------------------------------------------------------------------------
  21. 2018-02-02 15:08:40.464318 [WARNING] sofia_reg.c:1792 SIP auth challenge (REGISTER) on sofia profile 'internal' for [53@192.168.170.204] from ip 192.168.170.104
  22. send 627 bytes to udp/[192.168.170.104]:12842 at 15:08:40.476274:
  23.    ------------------------------------------------------------------------
  24.    SIP/2.0 401 Unauthorized
  25.    Via: SIP/2.0/UDP 192.168.170.104:12842;rport=12842;branch=z9hG4bK-69p63061339970169638r
  26.    From: "Markus -PLY" <sip:53@192.168.170.204>;tag=68g9055986257157952374m
  27.    To: "Markus -PLY" <sip:53@192.168.170.204>;tag=KZmB4ZaXHrarH
  28.    Call-ID: 66e341763012106052335k11476rmwp
  29.    CSeq: 25074 REGISTER
  30.    User-Agent: FreeSWITCH
  31.   Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, SUBSCRIBE
  32.    Supported: timer, path, replaces
  33.    WWW-Authenticate: Digest realm="192.168.170.204", nonce="bf91956b-9bcc-4bd5-87c0-b922c8faf14f", algorithm=MD5, qop="auth"
  34.    Content-Length: 0
  35.    
  36.    ------------------------------------------------------------------------
  37. recv 905 bytes from udp/[192.168.170.104]:12842 at 15:08:40.479707:
  38.    ------------------------------------------------------------------------
  39.    REGISTER sip:192.168.170.204:5060 SIP/2.0
  40.    Via: SIP/2.0/UDP 192.168.170.104:12842;rport;branch=z9hG4bK-69p3210806700830300420r
  41.    From: "Markus -PLY" <sip:53@192.168.170.204>;tag=68g9055986257157952374m
  42.    To: "Markus -PLY" <sip:53@192.168.170.204>
  43.    Call-ID: 66e341763012106052335k11476rmwp
  44.    CSeq: 25075 REGISTER
  45.    Max-Forwards: 60
  46.    Expires: 180
  47.    Authorization: Digest username="53",realm="192.168.170.204",nonce="bf91956b-9bcc-4bd5-87c0-b922c8faf14f",uri="sip:192.168.170.204:5060",response="2deceef19db0b14d80466b93b261ebba",opaque="",cnonce="235532892903061821",nc=00000001,qop=auth,algorithm=MD5
  48.    Contact: "Markus -PLY" <sip:53@192.168.170.104:12842>
  49.    User-Agent: MizuDroid/2.0.2
  50.    FinalUA: MizuDroid 1f19cf5e3d7b3145
  51.    Supported: replaces
  52.   Allow: ACK,PRACK,BYE,CANCEL,INVITE,UPDATE,MESSAGE,INFO,OPTIONS,SUBSCRIBE,NOTIFY,REFER
  53.    Accept: application/sdp,application/dtmf-relay,text/plain
  54.    Content-Length: 0
  55.    
  56.    ------------------------------------------------------------------------
  57. send 586 bytes to udp/[192.168.170.104]:12842 at 15:08:40.488074:
  58.    ------------------------------------------------------------------------
  59.    SIP/2.0 200 OK
  60.    Via: SIP/2.0/UDP 192.168.170.104:12842;rport=12842;branch=z9hG4bK-69p3210806700830300420r
  61.    From: "Markus -PLY" <sip:53@192.168.170.204>;tag=68g9055986257157952374m
  62.    To: "Markus -PLY" <sip:53@192.168.170.204>;tag=m8D45tU0e10aD
  63.    Call-ID: 66e341763012106052335k11476rmwp
  64.    CSeq: 25075 REGISTER
  65.    Contact: <sip:53@192.168.170.104:12842>;expires=180
  66.    Date: Fri, 02 Feb 2018 14:08:40 GMT
  67.    User-Agent: FreeSWITCH
  68.   Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, SUBSCRIBE
  69.    Supported: timer, path, replaces
  70.    Content-Length: 0
  71.    
  72.    ------------------------------------------------------------------------
  73. recv 1007 bytes from udp/[192.168.170.104]:12842 at 15:08:44.530282:
  74.    ------------------------------------------------------------------------
  75.    INVITE sip:040386XXXXX@192.168.170.204:5060 SIP/2.0
  76.    Via: SIP/2.0/UDP 192.168.170.104:12842;rport;branch=z9hG4bK-73p6588086307526668302r
  77.    From: "Markus -PLY" <sip:53@192.168.170.204>;tag=72g3277199316892673863m
  78.    To: <sip:040386XXXXX@192.168.170.204>
  79.    Call-ID: 70e8232010524409110301k11477rmwp
  80.    CSeq: 306 INVITE
  81.    Max-Forwards: 60
  82.    Contact: "Markus -PLY" <sip:53@192.168.170.104:12842>
  83.    User-Agent: MizuDroid/2.0.2
  84.    FinalUA: MizuDroid 1f19cf5e3d7b3145
  85.    Supported: replaces
  86.   Allow: ACK,PRACK,BYE,CANCEL,INVITE,UPDATE,MESSAGE,INFO,OPTIONS,SUBSCRIBE,NOTIFY,REFER
  87.    Allow-Events: presence,refer,telephone-event,keep-alive,dialog
  88.    Accept: application/sdp,application/dtmf-relay,text/plain
  89.    Content-Type: application/sdp
  90.    Content-Length: 271
  91.    
  92.    v=0
  93.    o=53 628 924 IN IP4 192.168.170.104
  94.    s=mizudroid
  95.    c=IN IP4 192.168.170.104
  96.    t=0 0
  97.    m=audio 10610 RTP/AVP 0 97 3 101
  98.    a=rtpmap:0 PCMU/8000
  99.    a=rtpmap:97 iLBC/8000
  100.    a=fmtp:97 mode=30
  101.    a=rtpmap:3 GSM/8000
  102.    a=rtpmap:101 telephone-event/8000
  103.    a=fmtp:101 0-16
  104.    a=sendrecv
  105.    ------------------------------------------------------------------------
  106. send 330 bytes to udp/[192.168.170.104]:12842 at 15:08:44.530517:
  107.    ------------------------------------------------------------------------
  108.    SIP/2.0 100 Trying
  109.    Via: SIP/2.0/UDP 192.168.170.104:12842;rport=12842;branch=z9hG4bK-73p6588086307526668302r
  110.    From: "Markus -PLY" <sip:53@192.168.170.204>;tag=72g3277199316892673863m
  111.    To: <sip:040386XXXXX@192.168.170.204>
  112.    Call-ID: 70e8232010524409110301k11477rmwp
  113.    CSeq: 306 INVITE
  114.    User-Agent: FreeSWITCH
  115.    Content-Length: 0
  116.    
  117.    ------------------------------------------------------------------------
  118. 2018-02-02 15:08:44.524312 [NOTICE] switch_channel.c:1104 New Channel sofia/internal/53@192.168.170.204 [783f720b-9e13-4524-8c57-49cbbd888ecf]
  119. 2018-02-02 15:08:44.524312 [DEBUG] switch_core_state_machine.c:584 (sofia/internal/53@192.168.170.204) Running State Change CS_NEW (Cur 1 Tot 30)
  120. 2018-02-02 15:08:44.524312 [DEBUG] sofia.c:9873 sofia/internal/53@192.168.170.204 receiving invite from 192.168.170.104:12842 version: 1.6.20 -37-987c9b9 64bit
  121. 2018-02-02 15:08:44.524312 [DEBUG] sofia.c:10044 IP 192.168.170.104 Rejected by acl "domains". Falling back to Digest auth.
  122. 2018-02-02 15:08:44.524312 [WARNING] sofia_reg.c:1792 SIP auth challenge (INVITE) on sofia profile 'internal' for [040386XXXXX@192.168.170.204] from ip 192.168.170.104
  123. 2018-02-02 15:08:44.524312 [DEBUG] switch_core_state_machine.c:603 (sofia/internal/53@192.168.170.204) State NEW
  124. send 836 bytes to udp/[192.168.170.104]:12842 at 15:08:44.530988:
  125.    ------------------------------------------------------------------------
  126.    SIP/2.0 407 Proxy Authentication Required
  127.    Via: SIP/2.0/UDP 192.168.170.104:12842;rport=12842;branch=z9hG4bK-73p6588086307526668302r
  128.    From: "Markus -PLY" <sip:53@192.168.170.204>;tag=72g3277199316892673863m
  129.    To: <sip:040386XXXXX@192.168.170.204>;tag=NH7v7Nc4BaQXr
  130.    Call-ID: 70e8232010524409110301k11477rmwp
  131.    CSeq: 306 INVITE
  132.    User-Agent: FreeSWITCH
  133.    Accept: application/sdp
  134.   Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, SUBSCRIBE
  135.    Supported: timer, path, replaces
  136.    Allow-Events: talk, hold, conference, presence, as-feature-event, dialog, line-seize, call-info, sla, include-session-description, presence.winfo, message-summary, refer
  137.    Proxy-Authenticate: Digest realm="192.168.170.204", nonce="759f5356-9188-4ace-9ca5-56a3cff68349", algorithm=MD5, qop="auth"
  138.    Content-Length: 0
  139.    
  140.    ------------------------------------------------------------------------
  141. 2018-02-02 15:08:44.524312 [DEBUG] sofia.c:2334 detaching session 783f720b-9e13-4524-8c57-49cbbd888ecf
  142. recv 484 bytes from udp/[192.168.170.104]:12842 at 15:08:44.536649:
  143.    ------------------------------------------------------------------------
  144.    ACK sip:040386XXXXX@192.168.170.204:5060 SIP/2.0
  145.    Via: SIP/2.0/UDP 192.168.170.104:12842;rport;branch=z9hG4bK-73p6588086307526668302r
  146.    From: "Markus -PLY" <sip:53@192.168.170.204>;tag=72g3277199316892673863m
  147.    To: <sip:040386XXXXX@192.168.170.204>;tag=NH7v7Nc4BaQXr
  148.    Call-ID: 70e8232010524409110301k11477rmwp
  149.    CSeq: 306 ACK
  150.    Max-Forwards: 60
  151.    Contact: "Markus -PLY" <sip:53@192.168.170.104:12842>
  152.    User-Agent: MizuDroid/2.0.2
  153.    FinalUA: MizuDroid 1f19cf5e3d7b3145
  154.    Content-Length: 0
  155.    
  156.    ------------------------------------------------------------------------
  157. recv 1216 bytes from udp/[192.168.170.104]:12842 at 15:08:44.537144:
  158.    ------------------------------------------------------------------------
  159.    INVITE sip:040386XXXXX@192.168.170.204:5060 SIP/2.0
  160.    Via: SIP/2.0/UDP 192.168.170.104:12842;rport;branch=z9hG4bK-73p2432075320701082491r
  161.    From: "Markus -PLY" <sip:53@192.168.170.204>;tag=72g3277199316892673863m
  162.    To: <sip:040386XXXXX@192.168.170.204>
  163.    Call-ID: 70e8232010524409110301k11477rmwp
  164.    CSeq: 307 INVITE
  165.    Max-Forwards: 60
  166.    Proxy-Authorization: Digest username="53",realm="192.168.170.204",nonce="759f5356-9188-4ace-9ca5-56a3cff68349",uri="sip:040386XXXXX@192.168.170.204:5060",response="f4f54aacb2b28da30c3805e2b103c624",opaque="",cnonce="3434507320225810600",nc=00000001,qop=auth,algorithm=MD5
  167.    Contact: "Markus -PLY" <sip:53@192.168.170.104:12842>
  168.    User-Agent: MizuDroid/2.0.2
  169.    FinalUA: MizuDroid 1f19cf5e3d7b3145
  170.    Supported: replaces
  171.   Allow: ACK,PRACK,BYE,CANCEL,INVITE,UPDATE,MESSAGE,INFO,OPTIONS,SUBSCRIBE,NOTIFY,REFER
  172.    Accept: application/sdp,application/dtmf-relay,text/plain
  173.    Content-Type: application/sdp
  174.    Content-Length: 271
  175.    
  176.    v=0
  177.    o=53 628 925 IN IP4 192.168.170.104
  178.    s=mizudroid
  179.    c=IN IP4 192.168.170.104
  180.    t=0 0
  181.    m=audio 10610 RTP/AVP 0 97 3 101
  182.    a=rtpmap:0 PCMU/8000
  183.    a=rtpmap:97 iLBC/8000
  184.    a=fmtp:97 mode=30
  185.    a=rtpmap:3 GSM/8000
  186.    a=rtpmap:101 telephone-event/8000
  187.    a=fmtp:101 0-16
  188.    a=sendrecv
  189.    ------------------------------------------------------------------------
  190. send 330 bytes to udp/[192.168.170.104]:12842 at 15:08:44.537347:
  191.    ------------------------------------------------------------------------
  192.    SIP/2.0 100 Trying
  193.    Via: SIP/2.0/UDP 192.168.170.104:12842;rport=12842;branch=z9hG4bK-73p2432075320701082491r
  194.    From: "Markus -PLY" <sip:53@192.168.170.204>;tag=72g3277199316892673863m
  195.    To: <sip:040386XXXXX@192.168.170.204>
  196.    Call-ID: 70e8232010524409110301k11477rmwp
  197.    CSeq: 307 INVITE
  198.    User-Agent: FreeSWITCH
  199.    Content-Length: 0
  200.    
  201.    ------------------------------------------------------------------------
  202. 2018-02-02 15:08:44.524312 [DEBUG] sofia.c:2442 Re-attaching to session 783f720b-9e13-4524-8c57-49cbbd888ecf
  203. 2018-02-02 15:08:44.544317 [DEBUG] sofia.c:9873 sofia/internal/53@192.168.170.204 receiving invite from 192.168.170.104:12842 version: 1.6.20 -37-987c9b9 64bit
  204. 2018-02-02 15:08:44.544317 [DEBUG] sofia.c:10044 IP 192.168.170.104 Rejected by acl "domains". Falling back to Digest auth.
  205. 2018-02-02 15:08:44.544317 [DEBUG] sofia.c:7084 Channel sofia/internal/53@192.168.170.204 entering state [received][100]
  206. 2018-02-02 15:08:44.544317 [DEBUG] sofia.c:7094 Remote SDP:
  207. v=0
  208. o=53 628 925 IN IP4 192.168.170.104
  209. s=mizudroid
  210. c=IN IP4 192.168.170.104
  211. t=0 0
  212. m=audio 10610 RTP/AVP 0 97 3 101
  213. a=rtpmap:0 PCMU/8000
  214. a=rtpmap:97 iLBC/8000
  215. a=fmtp:97 mode=30
  216. a=rtpmap:3 GSM/8000
  217. a=rtpmap:101 telephone-event/8000
  218. a=fmtp:101 0-16
  219.  
  220. 2018-02-02 15:08:44.544317 [DEBUG] switch_core_media.c:4449 Audio Codec Compare [PCMU:0:8000:20:64000:1]/[G722:9:8000:20:64000:1]
  221. 2018-02-02 15:08:44.544317 [DEBUG] switch_core_media.c:4449 Audio Codec Compare [PCMU:0:8000:20:64000:1]/[PCMU:0:8000:20:64000:1]
  222. 2018-02-02 15:08:44.544317 [DEBUG] switch_core_media.c:4504 Audio Codec Compare [PCMU:0:8000:20:64000:1] ++++ is saved as a match
  223. 2018-02-02 15:08:44.544317 [DEBUG] switch_core_media.c:4449 Audio Codec Compare [PCMU:0:8000:20:64000:1]/[PCMA:8:8000:20:64000:1]
  224. 2018-02-02 15:08:44.544317 [DEBUG] switch_core_media.c:4449 Audio Codec Compare [iLBC:97:8000:30:0:1]/[G722:9:8000:20:64000:1]
  225. 2018-02-02 15:08:44.544317 [DEBUG] switch_core_media.c:4449 Audio Codec Compare [iLBC:97:8000:30:0:1]/[PCMU:0:8000:20:64000:1]
  226. 2018-02-02 15:08:44.544317 [DEBUG] switch_core_media.c:4449 Audio Codec Compare [iLBC:97:8000:30:0:1]/[PCMA:8:8000:20:64000:1]
  227. 2018-02-02 15:08:44.544317 [DEBUG] switch_core_media.c:4449 Audio Codec Compare [GSM:3:8000:20:13200:1]/[G722:9:8000:20:64000:1]
  228. 2018-02-02 15:08:44.544317 [DEBUG] switch_core_media.c:4449 Audio Codec Compare [GSM:3:8000:20:13200:1]/[PCMU:0:8000:20:64000:1]
  229. 2018-02-02 15:08:44.544317 [DEBUG] switch_core_media.c:4449 Audio Codec Compare [GSM:3:8000:20:13200:1]/[PCMA:8:8000:20:64000:1]
  230. 2018-02-02 15:08:44.544317 [DEBUG] switch_core_media.c:4365 Set telephone-event payload to 101@8000
  231. 2018-02-02 15:08:44.544317 [DEBUG] switch_core_media.c:3061 Set Codec sofia/internal/53@192.168.170.204 PCMU/8000 20 ms 160 samples 64000 bits 1 channels
  232. 2018-02-02 15:08:44.544317 [DEBUG] switch_core_codec.c:111 sofia/internal/53@192.168.170.204 Original read codec set to PCMU:0
  233. 2018-02-02 15:08:44.544317 [DEBUG] switch_core_media.c:4708 Set telephone-event payload to 101@8000
  234. 2018-02-02 15:08:44.544317 [DEBUG] switch_core_media.c:4767 sofia/internal/53@192.168.170.204 Set 2833 dtmf send payload to 101 recv payload to 101
  235. 2018-02-02 15:08:44.544317 [DEBUG] sofia.c:7507 (sofia/internal/53@192.168.170.204) State Change CS_NEW -> CS_INIT
  236. 2018-02-02 15:08:44.544317 [DEBUG] switch_core_state_machine.c:584 (sofia/internal/53@192.168.170.204) Running State Change CS_INIT (Cur 1 Tot 30)
  237. 2018-02-02 15:08:44.544317 [DEBUG] switch_core_state_machine.c:627 (sofia/internal/53@192.168.170.204) State INIT
  238. 2018-02-02 15:08:44.544317 [DEBUG] mod_sofia.c:90 sofia/internal/53@192.168.170.204 SOFIA INIT
  239. 2018-02-02 15:08:44.544317 [DEBUG] switch_core_state_machine.c:40 sofia/internal/53@192.168.170.204 Standard INIT
  240. 2018-02-02 15:08:44.544317 [DEBUG] switch_core_state_machine.c:48 (sofia/internal/53@192.168.170.204) State Change CS_INIT -> CS_ROUTING
  241. 2018-02-02 15:08:44.544317 [DEBUG] switch_core_state_machine.c:627 (sofia/internal/53@192.168.170.204) State INIT going to sleep
  242. 2018-02-02 15:08:44.544317 [DEBUG] switch_core_state_machine.c:584 (sofia/internal/53@192.168.170.204) Running State Change CS_ROUTING (Cur 1 Tot 30)
  243. 2018-02-02 15:08:44.544317 [DEBUG] switch_channel.c:2249 (sofia/internal/53@192.168.170.204) Callstate Change DOWN -> RINGING
  244. 2018-02-02 15:08:44.544317 [DEBUG] switch_core_state_machine.c:643 (sofia/internal/53@192.168.170.204) State ROUTING
  245. 2018-02-02 15:08:44.544317 [DEBUG] mod_sofia.c:143 sofia/internal/53@192.168.170.204 SOFIA ROUTING
  246. 2018-02-02 15:08:44.544317 [DEBUG] switch_core_state_machine.c:236 sofia/internal/53@192.168.170.204 Standard ROUTING
  247. 2018-02-02 15:08:44.544317 [INFO] mod_dialplan_xml.c:637 Processing Markus -PLY <53>->040386XXXXX in context 192.168.170.204
  248. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->user_exists] continue=true
  249. Dialplan: sofia/internal/53@192.168.170.204 Regex (PASS) [user_exists] () =~ // break=on-false
  250. Dialplan: sofia/internal/53@192.168.170.204 Action set(user_exists=${user_exists id ${destination_number} ${domain_name}}) INLINE
  251. 2018-02-02 15:08:44.544317 [DEBUG] freeswitch_lua.cpp:365 DBH handle 0x7fe92816b790 Connected.
  252. 2018-02-02 15:08:44.564313 [DEBUG] freeswitch_lua.cpp:382 DBH handle 0x7fe92816b790 released.
  253. EXECUTE sofia/internal/53@192.168.170.204 set(user_exists=false)
  254. 2018-02-02 15:08:44.564313 [DEBUG] mod_dptools.c:1548 SET sofia/internal/53@192.168.170.204 [user_exists]=[false]
  255. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [user_exists] ${user_exists}(false) =~ /^true$/ break=on-false
  256. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->call-direction] continue=true
  257. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [call-direction] ${call_direction}() =~ /^(inbound|outbound|local)$/ break=never
  258. Dialplan: sofia/internal/53@192.168.170.204 ANTI-Action set(call_direction=local)
  259. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->variables] continue=true
  260. Dialplan: sofia/internal/53@192.168.170.204 Regex (PASS) [variables] () =~ // break=on-false
  261. Dialplan: sofia/internal/53@192.168.170.204 Action export(origination_callee_id_name=${destination_number})
  262. Dialplan: sofia/internal/53@192.168.170.204 Action set(RFC2822_DATE=${strftime(%a, %d %b %Y %T %z)})
  263. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->user_record] continue=true
  264. Dialplan: sofia/internal/53@192.168.170.204 Regex (PASS) [user_record] () =~ // break=on-false
  265. Dialplan: sofia/internal/53@192.168.170.204 Action set(user_record=${user_data ${destination_number}@${domain_name} var user_record}) INLINE
  266. 2018-02-02 15:08:44.564313 [DEBUG] freeswitch_lua.cpp:365 DBH handle 0x7fe92816b790 Connected.
  267. 2018-02-02 15:08:44.564313 [DEBUG] freeswitch_lua.cpp:382 DBH handle 0x7fe92816b790 released.
  268. 2018-02-02 15:08:44.564313 [DEBUG] freeswitch_lua.cpp:365 DBH handle 0x7fe92816b790 Connected.
  269. 2018-02-02 15:08:44.564313 [DEBUG] freeswitch_lua.cpp:382 DBH handle 0x7fe92816b790 released.
  270. EXECUTE sofia/internal/53@192.168.170.204 set(user_record=)
  271. 2018-02-02 15:08:44.564313 [DEBUG] mod_dptools.c:1548 SET sofia/internal/53@192.168.170.204 [user_record]=[UNDEF]
  272. Dialplan: sofia/internal/53@192.168.170.204 Action set(from_user_exists=${user_exists id ${sip_from_user} ${sip_from_host}}) INLINE
  273. EXECUTE sofia/internal/53@192.168.170.204 set(from_user_exists=true)
  274. 2018-02-02 15:08:44.564313 [DEBUG] mod_dptools.c:1548 SET sofia/internal/53@192.168.170.204 [from_user_exists]=[true]
  275. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [user_record] ${user_exists}(false) =~ /^true$/ break=never
  276. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [user_record] ${user_record}() =~ /^all$/ break=never
  277. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [user_record] ${user_exists}(false) =~ /^true$/ break=never
  278. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [user_record] ${call_direction}() =~ /^inbound$/ break=never
  279. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [user_record] ${user_record}() =~ /^inbound$/ break=never
  280. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [user_record] ${user_exists}(false) =~ /^true$/ break=never
  281. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [user_record] ${call_direction}() =~ /^outbound$/ break=never
  282. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [user_record] ${user_record}() =~ /^outbound$/ break=never
  283. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [user_record] ${user_exists}(false) =~ /^true$/ break=never
  284. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [user_record] ${call_direction}() =~ /^local$/ break=never
  285. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [user_record] ${user_record}() =~ /^local$/ break=never
  286. Dialplan: sofia/internal/53@192.168.170.204 Regex (PASS) [user_record] ${from_user_exists}(true) =~ /^true$/ break=never
  287. Dialplan: sofia/internal/53@192.168.170.204 Action set(from_user_record=${user_data ${sip_from_user}@${sip_from_host} var user_record}) INLINE
  288. EXECUTE sofia/internal/53@192.168.170.204 set(from_user_record=)
  289. 2018-02-02 15:08:44.564313 [DEBUG] mod_dptools.c:1548 SET sofia/internal/53@192.168.170.204 [from_user_record]=[UNDEF]
  290. Dialplan: sofia/internal/53@192.168.170.204 Regex (PASS) [user_record] ${from_user_exists}(true) =~ /^true$/ break=never
  291. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [user_record] ${from_user_record}() =~ /^all$/ break=never
  292. Dialplan: sofia/internal/53@192.168.170.204 Regex (PASS) [user_record] ${from_user_exists}(true) =~ /^true$/ break=never
  293. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [user_record] ${call_direction}() =~ /^inbound$/ break=never
  294. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [user_record] ${from_user_record}() =~ /^inbound$/ break=never
  295. Dialplan: sofia/internal/53@192.168.170.204 Regex (PASS) [user_record] ${from_user_exists}(true) =~ /^true$/ break=never
  296. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [user_record] ${call_direction}() =~ /^outbound$/ break=never
  297. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [user_record] ${from_user_record}() =~ /^outbound$/ break=never
  298. Dialplan: sofia/internal/53@192.168.170.204 Regex (PASS) [user_record] ${from_user_exists}(true) =~ /^true$/ break=never
  299. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [user_record] ${call_direction}() =~ /^local$/ break=never
  300. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [user_record] ${from_user_record}() =~ /^local$/ break=never
  301. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [user_record] ${record_session}() =~ /^true$/ break=on-false
  302. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->redial] continue=true
  303. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [redial] destination_number(040386XXXXX) =~ /^(redial|\*870)$/ break=on-true
  304. Dialplan: sofia/internal/53@192.168.170.204 Regex (PASS) [redial] () =~ // break=never
  305. Dialplan: sofia/internal/53@192.168.170.204 Action hash(insert/${domain_name}-last_dial/${caller_id_number}/${destination_number})
  306. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->speed_dial] continue=false
  307. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [speed_dial] destination_number(040386XXXXX) =~ /^\*0(.*)$/ break=on-false
  308. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->192.168.170.205.d3] continue=true
  309. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [192.168.170.205.d3] destination_number(040386XXXXX) =~ /(^\d{3+}$)/ break=on-false
  310. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->agent_status] continue=false
  311. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [agent_status] destination_number(040386XXXXX) =~ /^\*22$/ break=on-false
  312. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->agent_status_id] continue=false
  313. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [agent_status_id] destination_number(040386XXXXX) =~ /^\*23$/ break=on-false
  314. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->group-intercept] continue=false
  315. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [group-intercept] destination_number(040386XXXXX) =~ /^\*8$/ break=on-false
  316. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->page-extension] continue=false
  317. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [page-extension] destination_number(040386XXXXX) =~ /^\*8(\d{2,7})$/ break=on-false
  318. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->eavesdrop] continue=false
  319. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [eavesdrop] destination_number(040386XXXXX) =~ /^\*33(\d{2,7})$/ break=on-false
  320. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->call_privacy] continue=false
  321. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [call_privacy] destination_number(040386XXXXX) =~ /^\*67(\d+)$/ break=on-false
  322. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->call_return] continue=false
  323. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [call_return] destination_number(040386XXXXX) =~ /^\*69$/ break=on-false
  324. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->extension_queue] continue=false
  325. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [extension_queue] destination_number(040386XXXXX) =~ /^\*800(.*)$/ break=on-false
  326. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->intercept-ext] continue=false
  327. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [intercept-ext] destination_number(040386XXXXX) =~ /^\*\*(\d+)$/ break=on-false
  328. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->intercept-ext-polycom] continue=false
  329. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [intercept-ext-polycom] destination_number(040386XXXXX) =~ /^\*97(\d+)$/ break=on-false
  330. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->dx] continue=false
  331. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [dx] destination_number(040386XXXXX) =~ /^dx$/ break=on-false
  332. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->att_xfer] continue=false
  333. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [att_xfer] destination_number(040386XXXXX) =~ /^att_xfer$/ break=on-false
  334. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->extension-to-voicemail] continue=false
  335. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [extension-to-voicemail] ${user_exists}(false) =~ /^true$/ break=on-false
  336. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->send_to_voicemail] continue=false
  337. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [send_to_voicemail] destination_number(040386XXXXX) =~ /^\*99(\d{2,10})$/ break=on-false
  338. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->vmain] continue=false
  339. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [vmain] destination_number(040386XXXXX) =~ /^vmain$|^\*4000$|^\*98$/ break=on-false
  340. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->xfer_vm] continue=false
  341. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [xfer_vm] destination_number(040386XXXXX) =~ /^xfer_vm$/ break=on-false
  342. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->is_transfer] continue=false
  343. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [is_transfer] destination_number(040386XXXXX) =~ /^is_transfer$/ break=on-false
  344. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->vmain_user] continue=false
  345. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [vmain_user] destination_number(040386XXXXX) =~ /^\*97$/ break=on-false
  346. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->cf] continue=false
  347. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [cf] destination_number(040386XXXXX) =~ /^cf$/ break=on-false
  348. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->delay_echo] continue=false
  349. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [delay_echo] destination_number(040386XXXXX) =~ /^\*9195$/ break=on-false
  350. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->echo] continue=false
  351. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [echo] destination_number(040386XXXXX) =~ /^\*9196$/ break=on-false
  352. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->is_zrtp_secure] continue=true
  353. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [is_zrtp_secure] ${zrtp_secure_media_confirmed}() =~ /^true$/ break=on-false
  354. Dialplan: sofia/internal/53@192.168.170.204 ANTI-Action eval(not_secure)
  355. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->milliwatt] continue=false
  356. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [milliwatt] destination_number(040386XXXXX) =~ /^\*9197$/ break=on-false
  357. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->is_secure] continue=true
  358. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [is_secure] ${sip_via_protocol}(udp) =~ /tls/ break=on-false
  359. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->tone_stream] continue=false
  360. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [tone_stream] destination_number(040386XXXXX) =~ /^\*9198$/ break=on-false
  361. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->hold_music] continue=false
  362. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [hold_music] destination_number(040386XXXXX) =~ /^\*9664$/ break=on-false
  363. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->recordings] continue=false
  364. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [recordings] destination_number(040386XXXXX) =~ /^\*(732)$/ break=on-false
  365. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->directory] continue=false
  366. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [directory] destination_number(040386XXXXX) =~ /^\*411$/ break=on-false
  367. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->wake-up] continue=false
  368. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [wake-up] destination_number(040386XXXXX) =~ /^\*(925)$/ break=on-false
  369. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->valet_park] continue=false
  370. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [valet_park] destination_number(040386XXXXX) =~ /^(park\+)?(\*59[0-9][0-9])$/ break=never
  371. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [valet_park] ${sip_h_Referred-By}() =~ /sip:(.*)@.*/ break=never
  372. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [valet_park] destination_number(040386XXXXX) =~ /^(park\+)?(\*59[0-9][0-9])$/ break=never
  373. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [valet_park] destination_number(040386XXXXX) =~ /^(park\+)?(\*59[0-9][0-9])$/ break=on-false
  374. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->operator-forward] continue=false
  375. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [operator-forward] destination_number(040386XXXXX) =~ /^\*000$/ break=on-false
  376. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->do-not-disturb] continue=false
  377. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [do-not-disturb] destination_number(040386XXXXX) =~ /^\*77$/ break=on-true
  378. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [do-not-disturb] destination_number(040386XXXXX) =~ /^\*78$|\*363$/ break=on-true
  379. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [do-not-disturb] destination_number(040386XXXXX) =~ /^\*79$/ break=on-false
  380. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->call-forward] continue=false
  381. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [call-forward] destination_number(040386XXXXX) =~ /^\*72$/ break=on-true
  382. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [call-forward] destination_number(040386XXXXX) =~ /^\*73$/ break=on-true
  383. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [call-forward] destination_number(040386XXXXX) =~ /^\*74$/ break=on-true
  384. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->call forward all] continue=false
  385. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [call forward all] ${user_exists}(false) =~ /^true/ break=on-false
  386. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->follow-me] continue=false
  387. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [follow-me] destination_number(040386XXXXX) =~ /^\*21$/ break=on-false
  388. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->clear_sip_auto_answer] continue=true
  389. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [clear_sip_auto_answer] ${click_to_call}() =~ /true/ break=on-false
  390. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->talking clock date and time] continue=true
  391. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [talking clock date and time] destination_number(040386XXXXX) =~ /^\*9172$/ break=on-false
  392. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->talking clock time] continue=true
  393. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [talking clock time] destination_number(040386XXXXX) =~ /^\*9170$/ break=on-false
  394. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->talking clock date] continue=true
  395. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [talking clock date] destination_number(040386XXXXX) =~ /^\*9171$/ break=on-false
  396. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->call_screen] continue=true
  397. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [call_screen] ${call_screen_enabled}(false) =~ /^true$/ break=on-false
  398. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->local_extension] continue=true
  399. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [local_extension] ${user_exists}(false) =~ /true/ break=on-false
  400. Dialplan: sofia/internal/53@192.168.170.204 parsing [192.168.170.204->voicemail] continue=false
  401. Dialplan: sofia/internal/53@192.168.170.204 Regex (FAIL) [voicemail] ${user_exists}(false) =~ /true/ break=on-false
  402. 2018-02-02 15:08:44.564313 [DEBUG] switch_core_state_machine.c:286 (sofia/internal/53@192.168.170.204) State Change CS_ROUTING -> CS_EXECUTE
  403. 2018-02-02 15:08:44.564313 [DEBUG] switch_core_state_machine.c:643 (sofia/internal/53@192.168.170.204) State ROUTING going to sleep
  404. 2018-02-02 15:08:44.564313 [DEBUG] switch_core_state_machine.c:584 (sofia/internal/53@192.168.170.204) Running State Change CS_EXECUTE (Cur 1 Tot 30)
  405. 2018-02-02 15:08:44.564313 [DEBUG] switch_core_state_machine.c:650 (sofia/internal/53@192.168.170.204) State EXECUTE
  406. 2018-02-02 15:08:44.564313 [DEBUG] mod_sofia.c:198 sofia/internal/53@192.168.170.204 SOFIA EXECUTE
  407. 2018-02-02 15:08:44.564313 [DEBUG] switch_core_state_machine.c:328 sofia/internal/53@192.168.170.204 Standard EXECUTE
  408. EXECUTE sofia/internal/53@192.168.170.204 set(call_direction=local)
  409. 2018-02-02 15:08:44.564313 [DEBUG] mod_dptools.c:1548 SET sofia/internal/53@192.168.170.204 [call_direction]=[local]
  410. EXECUTE sofia/internal/53@192.168.170.204 export(origination_callee_id_name=040386XXXXX)
  411. 2018-02-02 15:08:44.564313 [DEBUG] switch_channel.c:1296 EXPORT (export_vars) [origination_callee_id_name]=[040386XXXXX]
  412. EXECUTE sofia/internal/53@192.168.170.204 set(RFC2822_DATE=Fri, 02 Feb 2018 15:08:44 +0100)
  413. 2018-02-02 15:08:44.564313 [DEBUG] mod_dptools.c:1548 SET sofia/internal/53@192.168.170.204 [RFC2822_DATE]=[Fri, 02 Feb 2018 15:08:44 +0100]
  414. EXECUTE sofia/internal/53@192.168.170.204 hash(insert/192.168.170.204-last_dial/325XXXX53/040386XXXXX)
  415. EXECUTE sofia/internal/53@192.168.170.204 eval(not_secure)
  416. 2018-02-02 15:08:44.564313 [NOTICE] switch_core_state_machine.c:385 sofia/internal/53@192.168.170.204 has executed the last dialplan instruction, hanging up.
  417. 2018-02-02 15:08:44.564313 [NOTICE] switch_core_state_machine.c:387 Hangup sofia/internal/53@192.168.170.204 [CS_EXECUTE] [NORMAL_CLEARING]
  418. 2018-02-02 15:08:44.564313 [DEBUG] switch_core_state_machine.c:650 (sofia/internal/53@192.168.170.204) State EXECUTE going to sleep
  419. 2018-02-02 15:08:44.564313 [DEBUG] switch_core_state_machine.c:584 (sofia/internal/53@192.168.170.204) Running State Change CS_HANGUP (Cur 1 Tot 30)
  420. 2018-02-02 15:08:44.564313 [DEBUG] switch_core_state_machine.c:850 (sofia/internal/53@192.168.170.204) Callstate Change RINGING -> HANGUP
  421. 2018-02-02 15:08:44.564313 [DEBUG] switch_core_state_machine.c:852 (sofia/internal/53@192.168.170.204) State HANGUP
  422. 2018-02-02 15:08:44.564313 [DEBUG] mod_sofia.c:438 Channel sofia/internal/53@192.168.170.204 hanging up, cause: NORMAL_CLEARING
  423. 2018-02-02 15:08:44.564313 [DEBUG] mod_sofia.c:577 Responding to INVITE with: 480
  424. 2018-02-02 15:08:44.564313 [DEBUG] switch_core_state_machine.c:60 sofia/internal/53@192.168.170.204 Standard HANGUP, cause: NORMAL_CLEARING
  425. 2018-02-02 15:08:44.564313 [DEBUG] switch_core_state_machine.c:852 (sofia/internal/53@192.168.170.204) State HANGUP going to sleep
  426. 2018-02-02 15:08:44.564313 [DEBUG] switch_core_state_machine.c:619 (sofia/internal/53@192.168.170.204) State Change CS_HANGUP -> CS_REPORTING
  427. send 872 bytes to udp/[192.168.170.104]:12842 at 15:08:44.580402:
  428.    ------------------------------------------------------------------------
  429.    SIP/2.0 480 Temporarily Unavailable
  430.    Via: SIP/2.0/UDP 192.168.170.104:12842;rport=12842;branch=z9hG4bK-73p2432075320701082491r
  431.    Max-Forwards: 60
  432.    From: "Markus -PLY" <sip:53@192.168.170.204>;tag=72g3277199316892673863m
  433.    To: <sip:040386XXXXX@192.168.170.204>;tag=pt0N9gX78jDgm
  434.    Call-ID: 70e8232010524409110301k11477rmwp
  435.    CSeq: 307 INVITE
  436.    User-Agent: FreeSWITCH
  437.    Accept: application/sdp
  438.   Allow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, SUBSCRIBE
  439.    Supported: timer, path, replaces
  440.    Allow-Events: talk, hold, conference, presence, as-feature-event, dialog, line-seize, call-info, sla, include-session-description, presence.winfo, message-summary, refer
  441.    Reason: Q.850;cause=16;text="NORMAL_CLEARING"
  442.    Content-Length: 0
  443.    Remote-Party-ID: "040386XXXXX" <sip:040386XXXXX@192.168.170.204>;party=calling;privacy=off;screen=no
  444.    
  445.    ------------------------------------------------------------------------
  446. 2018-02-02 15:08:44.564313 [DEBUG] switch_core_state_machine.c:584 (sofia/internal/53@192.168.170.204) Running State Change CS_REPORTING (Cur 1 Tot 30)
  447. 2018-02-02 15:08:44.564313 [DEBUG] switch_core_state_machine.c:938 (sofia/internal/53@192.168.170.204) State REPORTING
  448. recv 702 bytes from udp/[192.168.170.104]:12842 at 15:08:44.721884:
  449.    ------------------------------------------------------------------------
  450.    ACK sip:040386XXXXX@192.168.170.204:5060 SIP/2.0
  451.    Via: SIP/2.0/UDP 192.168.170.104:12842;rport;branch=z9hG4bK-73p2432075320701082491r
  452.    From: "Markus -PLY" <sip:53@192.168.170.204>;tag=72g3277199316892673863m
  453.    To: <sip:040386XXXXX@192.168.170.204>;tag=pt0N9gX78jDgm
  454.    Call-ID: 70e8232010524409110301k11477rmwp
  455.    CSeq: 307 ACK
  456.    Max-Forwards: 60
  457.    Proxy-Authorization: Digest username="53",realm="192.168.170.204",nonce="759f5356-9188-4ace-9ca5-56a3cff68349",uri="sip:040386XXXXX@192.168.170.204:5060",response="f4f54aacb2b28da30c3805e2b103c624",opaque="",cnonce="3434507320225810600",nc=00000001,qop=auth,algorithm=MD5
  458.    User-Agent: MizuDroid/2.0.2
  459.    FinalUA: MizuDroid 1f19cf5e3d7b3145
  460.    Content-Length: 0
  461.    
  462.    ------------------------------------------------------------------------
  463. 2018-02-02 15:08:45.224317 [DEBUG] switch_core_state_machine.c:174 sofia/internal/53@192.168.170.204 Standard REPORTING, cause: NORMAL_CLEARING
  464. 2018-02-02 15:08:45.224317 [DEBUG] switch_core_state_machine.c:938 (sofia/internal/53@192.168.170.204) State REPORTING going to sleep
  465. 2018-02-02 15:08:45.224317 [DEBUG] switch_core_state_machine.c:610 (sofia/internal/53@192.168.170.204) State Change CS_REPORTING -> CS_DESTROY
  466. 2018-02-02 15:08:45.224317 [DEBUG] switch_core_session.c:1665 Session 30 (sofia/internal/53@192.168.170.204) Locked, Waiting on external entities
  467. 2018-02-02 15:08:45.224317 [NOTICE] switch_core_session.c:1683 Session 30 (sofia/internal/53@192.168.170.204) Ended
  468. 2018-02-02 15:08:45.224317 [NOTICE] switch_core_session.c:1687 Close Channel sofia/internal/53@192.168.170.204 [CS_DESTROY]
  469. 2018-02-02 15:08:45.224317 [DEBUG] switch_core_state_machine.c:741 (sofia/internal/53@192.168.170.204) Running State Change CS_DESTROY (Cur 0 Tot 30)
  470. 2018-02-02 15:08:45.224317 [DEBUG] switch_core_state_machine.c:751 (sofia/internal/53@192.168.170.204) State DESTROY
  471. 2018-02-02 15:08:45.224317 [DEBUG] mod_sofia.c:343 sofia/internal/53@192.168.170.204 SOFIA DESTROY
  472.