[asterisk-bugs] [Asterisk 0012994]: Spamming CLI / logs with 'Remote host can't match request BYE to call...'

noreply at bugs.digium.com noreply at bugs.digium.com
Fri Jul 18 04:07:12 CDT 2008


A NOTE has been added to this issue. 
====================================================================== 
http://bugs.digium.com/view.php?id=12994 
====================================================================== 
Reported By:                pabelanger
Assigned To:                
====================================================================== 
Project:                    Asterisk
Issue ID:                   12994
Category:                   Channels/chan_sip/General
Reproducibility:            random
Severity:                   minor
Priority:                   normal
Status:                     new
Asterisk Version:           1.6.0-beta9 
SVN Branch (only for SVN checkouts, not tarball releases): N/A 
SVN Revision (number only!):  
Disclaimer on File?:        N/A 
Request Review:              
====================================================================== 
Date Submitted:             07-04-2008 11:33 CDT
Last Modified:              07-18-2008 04:06 CDT
====================================================================== 
Summary:                    Spamming CLI / logs with 'Remote host can't match
request BYE to call...'
Description: 
Every 6/7 seconds, our cli is getting spammed (see below).

sip show channel 05b6e9a07669fa0c0a4d88a663b4a2bd at 192.168.20.2
---
  * SIP Call
  Curr. trans. direction:  Outgoing
  Call-ID:                05b6e9a07669fa0c0a4d88a663b4a2bd at 192.168.20.2
  Owner channel ID:       <none>
  Our Codec Capability:   6
  Non-Codec Capability (DTMF):   1
  Their Codec Capability:   4
  Joint Codec Capability:   4
  Format:                 0x0 (nothing)
  T.38 support            No
  Video support           No
  MaxCallBR:              384 kbps
  Theoretical Address:    192.168.20.3:5070
  Received Address:       192.168.20.4:5070
  SIP Transfer mode:      open
  NAT Support:            RFC3581
  Audio IP:               192.168.20.2 (local)
  Our Tag:                as643fb95e
  Their Tag:              as643fb95e
  SIP User agent:         RTCC/3.0.0.0
  Peername:               sv0071iv
  Original uri:           sip:sv0071iv.internal.xxx.on.ca:5070
  Need Destroy:           No
  Last Message:           Tx: BYE
  Promiscuous Redir:      No
  Route:                 
sip:sv0071iv.internal.xxx.on.ca:5070;transport=Tcp;maddr=192.168.20.3
  DTMF Mode:              rfc2833
  SIP Options:            (none)
  Session-Timer:          Inactive

====================================================================== 

---------------------------------------------------------------------- 
 oej - 07-18-08 04:06  
---------------------------------------------------------------------- 


More information about the asterisk-bugs mailing list