[asterisk-bugs] [Asterisk 0005413]: [patch] [branch] Secure RTP (SRTP)

Asterisk Bug Tracker noreply at bugs.digium.com
Wed May 5 01:24:46 CDT 2010


A NOTE has been added to this issue. 
====================================================================== 
https://issues.asterisk.org/view.php?id=5413 
====================================================================== 
Reported By:                mikma
Assigned To:                twilson
====================================================================== 
Project:                    Asterisk
Issue ID:                   5413
Category:                   Channels/chan_sip/NewFeature
Reproducibility:            N/A
Severity:                   feature
Priority:                   normal
Status:                     assigned
Target Version:             1.8
Asterisk Version:           SVN 
JIRA:                        
Regression:                 No 
Reviewboard Link:            
SVN Branch (only for SVN checkouts, not tarball releases): N/A 
SVN Revision (number only!): 48491 
Request Review:              
====================================================================== 
Date Submitted:             2005-10-09 10:36 CDT
Last Modified:              2010-05-05 01:24 CDT
====================================================================== 
Summary:                    [patch] [branch] Secure RTP (SRTP)
Description: 
This patch adds initial support for secure RTP using libsrt[1]. It can
be used in for example an implementation of the sdecriptions draft[2].

[1] http://srtp.sourceforge.net/srtp.html
[2]
http://www.ietf.org/internet-drafts/draft-ietf-mmusic-sdescriptions-12.txt


Update (16/03/2010): Branch against trunk is located here
http://svn.asterisk.org/svn/asterisk/team/group/srtp_reboot

*** IF TESTING, PLEASE USE THE ABOVE BRANCH AND NOT THE PATCHED ATTACHED
TO THIS ISSUE AS THEY ARE OUT OF DATE ***
======================================================================
Relationships       ID      Summary
----------------------------------------------------------------------
related to          0010129 Module SRTP can't loaded
====================================================================== 

---------------------------------------------------------------------- 
 (0121396) Joels (reporter) - 2010-05-05 01:24
 https://issues.asterisk.org/view.php?id=5413#c121396 
---------------------------------------------------------------------- 
Call from a Nokia E72 (31.023) -> eyeBeam:

<--- SIP read from TLS:86.96.229.88:55324 --->
INVITE sips:5553000 at sec.maeg.com;user=phone SIP/2.0
Route: <sips:sec.maeg.com:6000;lr;transport=TCP>
Via: SIP/2.0/TLS
192.168.178.104:5060;branch=z9hG4bK3b632jceelhc6trv07mgkmi;rport
From: <sip:5553001 at sec.maeg.com>;tag=9ai528m7n9hc642907mg
To: <sips:5553000 at sec.maeg.com;user=phone>
Contact: <sips:4cWDAREngqRPezacKC47 at 192.168.178.104;transport=TCP>
Supported: precondition,100rel,timer,sec-agree
CSeq: 3096 INVITE
Call-ID: yflivjE3oIccB07J2B7_JOYGHFZeU9
Allow: UPDATE,PRACK,SUBSCRIBE,REFER,NOTIFY,INVITE,ACK,CANCEL,OPTIONS,BYE
User-Agent: Nokia RM-530 031.023 00-BD-3A-00-10-8C
Expires: 120
Privacy: None
Session-Expires: 300
Max-Forwards: 70
Content-Type: application/sdp
Accept-Language: de
Content-Length: 524

v=0
o=5553001 63441302944196250 63441302944196250 IN IP4 192.168.178.104
s=-
c=IN IP4 192.168.178.104
t=0 0
m=audio 16384 RTP/SAVP 8 18 98
a=sendrecv
a=crypto:1 AES_CM_128_HMAC_SHA1_80
inline:VGI3Y2N5ZUFhM015UnZTZ0VnakVXeWJXdjRJQWhV
a=crypto:2 AES_CM_128_HMAC_SHA1_32
inline:ZVBBUmhWQlc2SWJzTWl5Ml9Hc1psMFRBZEc0Q3VS
a=curr:sec e2e none
a=des:sec optional e2e sendrecv
a=rtpmap:8 PCMA/8000
a=ptime:20
a=maxptime:200
a=rtpmap:18 G729/8000
a=fmtp:18 annexb=yes
a=rtpmap:98 telephone-event/8000
a=fmtp:98 0-15

<------------->
--- (18 headers 18 lines) ---
Sending to 86.96.229.88 : 5060 (no NAT)
Using INVITE request as basis request - yflivjE3oIccB07J2B7_JOYGHFZeU9
Found peer '5553001' for '5553001' from 86.96.229.88:55324
81-89-105-60*CLI>
<--- Reliably Transmitting (NAT) to 86.96.229.88:55324 --->
SIP/2.0 401 Unauthorized
Via: SIP/2.0/TLS
192.168.178.104:5060;branch=z9hG4bK3b632jceelhc6trv07mgkmi;received=86.96.229.88;rport=55324
From: <sip:5553001 at sec.maeg.com>;tag=9ai528m7n9hc642907mg
To: <sips:5553000 at sec.maeg.com;user=phone>;tag=as59fd410d
Call-ID: yflivjE3oIccB07J2B7_JOYGHFZeU9
CSeq: 3096 INVITE
Server: MAEG TLS SEC
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO,
PUBLISH
Supported: replaces, timer
WWW-Authenticate: Digest algorithm=MD5, realm="maeg.com",
nonce="6ae9216f"
Content-Length: 0


<------------>
Scheduling destruction of SIP dialog 'yflivjE3oIccB07J2B7_JOYGHFZeU9' in
32000 ms (Method: INVITE)
81-89-105-60*CLI>
<--- SIP read from TLS:86.96.229.88:55324 --->
ACK sips:5553000 at sec.maeg.com;user=phone SIP/2.0
Via: SIP/2.0/TLS
192.168.178.104:5060;branch=z9hG4bK3b632jceelhc6trv07mgkmi;rport
Route: <sips:sec.maeg.com:6000;lr;transport=TCP>
From: <sip:5553001 at sec.maeg.com>;tag=9ai528m7n9hc642907mg
To: <sips:5553000 at sec.maeg.com;user=phone>;tag=as59fd410d
Call-ID: yflivjE3oIccB07J2B7_JOYGHFZeU9
CSeq: 3096 ACK
Supported: sec-agree
Max-Forwards: 70
Content-Length: 0


<------------->
--- (10 headers 0 lines) ---
81-89-105-60*CLI>
<--- SIP read from TLS:86.96.229.88:55324 --->
INVITE sips:5553000 at sec.maeg.com;user=phone SIP/2.0
Route: <sips:sec.maeg.com:6000;lr;transport=TCP>
Via: SIP/2.0/TLS
192.168.178.104:5060;branch=z9hG4bKrvljqrmjo82unjm3e0p77j3;rport
From: <sip:5553001 at sec.maeg.com>;tag=9ai528m7n9hc642907mg
To: <sips:5553000 at sec.maeg.com;user=phone>
Contact: <sips:4cWDAREngqRPezacKC47 at 192.168.178.104;transport=TCP>
Supported: precondition,100rel,timer,sec-agree
CSeq: 3097 INVITE
Call-ID: yflivjE3oIccB07J2B7_JOYGHFZeU9
Allow: UPDATE,PRACK,SUBSCRIBE,REFER,NOTIFY,INVITE,ACK,CANCEL,OPTIONS,BYE
User-Agent: Nokia RM-530 031.023 00-BD-3A-00-10-8C
Expires: 120
Privacy: None
Session-Expires: 300
Max-Forwards: 70
Authorization: Digest
realm="maeg.com",nonce="6ae9216f",algorithm=MD5,username="5553001",uri="sips:5553000 at sec.maeg.com;user=phone",response="ee9ec3e329301a764d7b54cf61d08586"
Content-Type: application/sdp
Accept-Language: de
Content-Length: 524

v=0
o=5553001 63441302944196250 63441302944196250 IN IP4 192.168.178.104
s=-
c=IN IP4 192.168.178.104
t=0 0
m=audio 16384 RTP/SAVP 8 18 98
a=sendrecv
a=crypto:1 AES_CM_128_HMAC_SHA1_80
inline:VGI3Y2N5ZUFhM015UnZTZ0VnakVXeWJXdjRJQWhV
a=crypto:2 AES_CM_128_HMAC_SHA1_32
inline:ZVBBUmhWQlc2SWJzTWl5Ml9Hc1psMFRBZEc0Q3VS
a=curr:sec e2e none
a=des:sec optional e2e sendrecv
a=rtpmap:8 PCMA/8000
a=ptime:20
a=maxptime:200
a=rtpmap:18 G729/8000
a=fmtp:18 annexb=yes
a=rtpmap:98 telephone-event/8000
a=fmtp:98 0-15

<------------->
--- (19 headers 18 lines) ---
Sending to 86.96.229.88 : 55324 (NAT)
Using INVITE request as basis request - yflivjE3oIccB07J2B7_JOYGHFZeU9
Found peer '5553001' for '5553001' from 86.96.229.88:55324
Found RTP audio format 8
Found RTP audio format 18
Found RTP audio format 98
Found audio description format PCMA for ID 8
Found audio description format G729 for ID 18
Found audio description format telephone-event for ID 98
Capabilities: us - 0x8 (alaw), peer - audio=0x108 (alaw|g729)/video=0x0
(nothing)/text=0x0 (nothing), combined - 0x8 (alaw)
Non-codec capabilities (dtmf): us - 0x0 (nothing), peer - 0x1
(telephone-event|), combined - 0x0 (nothing)
Peer audio RTP is at port 192.168.178.104:16384
Looking for 5553000 in from-sip (domain sec.maeg.com)
list_route: hop:
<sips:4cWDAREngqRPezacKC47 at 192.168.178.104;transport=TCP>
81-89-105-60*CLI>
<--- Transmitting (NAT) to 86.96.229.88:55324 --->
SIP/2.0 100 Trying
Via: SIP/2.0/TLS
192.168.178.104:5060;branch=z9hG4bKrvljqrmjo82unjm3e0p77j3;received=86.96.229.88;rport=55324
From: <sip:5553001 at sec.maeg.com>;tag=9ai528m7n9hc642907mg
To: <sips:5553000 at sec.maeg.com;user=phone>
Call-ID: yflivjE3oIccB07J2B7_JOYGHFZeU9
CSeq: 3097 INVITE
Server: MAEG TLS SEC
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO,
PUBLISH
Supported: replaces, timer
Require: timer
Session-Expires: 300;refresher=uas
Contact: <sip:5553000 at 65.49.14.19;transport=TLS>
Content-Length: 0


<------------>
Audio is at 65.49.14.19 port 27064
Adding codec 0x8 (alaw) to SDP
Reliably Transmitting (NAT) to 86.96.229.88:50093:
INVITE
sip:5553000 at 86.96.229.88:50093;transport=TLS;rinstance=ce2ef0e4a7a3494b
SIP/2.0
Via: SIP/2.0/TLS 65.49.14.19:5061;branch=z9hG4bK16f800a2;rport
Max-Forwards: 70
From: "Jochen E72 TLS UNCC" <sip:5553001 at sec.maeg.com>;tag=as4ef71c16
To:
<sip:5553000 at 86.96.229.88:50093;transport=TLS;rinstance=ce2ef0e4a7a3494b>
Contact: <sip:5553001 at 65.49.14.19;transport=TLS>
Call-ID: 035b2c465a81dd720d193f00012f7e7d at sec.maeg.com
CSeq: 102 INVITE
User-Agent: MAEG TLS SEC
Date: Wed, 05 May 2010 06:08:40 GMT
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO,
PUBLISH
Supported: replaces, timer
Content-Type: application/sdp
Content-Length: 280

v=0
o=MAEG 569318442 569318442 IN IP4 65.49.14.19
s=MAEG TLS
c=IN IP4 65.49.14.19
t=0 0
m=audio 27064 RTP/SAVP 8
a=rtpmap:8 PCMA/8000
a=silenceSupp:off - - - -
a=ptime:20
a=sendrecv
a=crypto:1 AES_CM_128_HMAC_SHA1_80
inline:4lyVB4wPy9uP1olUfUDmRyGNC+u8wGxNWLMtnl70

---
81-89-105-60*CLI>
<--- SIP read from TLS:86.96.229.88:50093 --->
SIP/2.0 180 Ringing
Via: SIP/2.0/TLS 65.49.14.19:5061;branch=z9hG4bK16f800a2;rport=5061
Contact:
<sip:5553000 at 86.96.229.88:50093;transport=TLS;rinstance=ce2ef0e4a7a3494b>
To:
<sip:5553000 at 86.96.229.88:50093;transport=TLS;rinstance=ce2ef0e4a7a3494b>;tag=1e0be518
From: "Jochen E72 TLS UNCC"<sip:5553001 at sec.maeg.com>;tag=as4ef71c16
Call-ID: 035b2c465a81dd720d193f00012f7e7d at sec.maeg.com
CSeq: 102 INVITE
User-Agent: eyeBeam release 1102q stamp 51814
Content-Length: 0


<------------->
--- (9 headers 0 lines) ---
81-89-105-60*CLI>
<--- Transmitting (NAT) to 86.96.229.88:55324 --->
SIP/2.0 180 Ringing
Via: SIP/2.0/TLS
192.168.178.104:5060;branch=z9hG4bKrvljqrmjo82unjm3e0p77j3;received=86.96.229.88;rport=55324
From: <sip:5553001 at sec.maeg.com>;tag=9ai528m7n9hc642907mg
To: <sips:5553000 at sec.maeg.com;user=phone>;tag=as48b920d0
Call-ID: yflivjE3oIccB07J2B7_JOYGHFZeU9
CSeq: 3097 INVITE
Server: MAEG TLS SEC
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO,
PUBLISH
Supported: replaces, timer
Require: timer
Session-Expires: 300;refresher=uas
Contact: <sip:5553000 at 65.49.14.19;transport=TLS>
Content-Length: 0


<------------>
81-89-105-60*CLI>
<--- SIP read from TLS:86.96.229.88:50093 --->



<------------->
81-89-105-60*CLI>
<--- SIP read from TLS:86.96.229.88:50093 --->
SIP/2.0 200 OK
Via: SIP/2.0/TLS 65.49.14.19:5061;branch=z9hG4bK16f800a2;rport=5061
Contact:
<sip:5553000 at 86.96.229.88:50093;transport=TLS;rinstance=ce2ef0e4a7a3494b>
To:
<sip:5553000 at 86.96.229.88:50093;transport=TLS;rinstance=ce2ef0e4a7a3494b>;tag=1e0be518
From: "Jochen E72 TLS UNCC"<sip:5553001 at sec.maeg.com>;tag=as4ef71c16
Call-ID: 035b2c465a81dd720d193f00012f7e7d at sec.maeg.com
CSeq: 102 INVITE
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE,
SUBSCRIBE, INFO
Content-Type: application/sdp
User-Agent: eyeBeam release 1102q stamp 51814
Content-Length: 217

v=0
o=- 8 2 IN IP4 192.168.178.63
s=CounterPath eyeBeam 1.5
c=IN IP4 192.168.178.63
t=0 0
m=audio 19038 RTP/SAVP 8
a=crypto:1 AES_CM_128_HMAC_SHA1_80
inline:0CpsUAIJO2Ww0QMEE9UkDtZQ9+FOPrJTVnLjVQsS
a=sendrecv

<------------->
--- (11 headers 8 lines) ---
Found RTP audio format 8
Capabilities: us - 0x8 (alaw), peer - audio=0x8 (alaw)/video=0x0
(nothing)/text=0x0 (nothing), combined - 0x8 (alaw)
Non-codec capabilities (dtmf): us - 0x0 (nothing), peer - 0x0 (nothing),
combined - 0x0 (nothing)
Peer audio RTP is at port 192.168.178.63:19038
list_route: hop:
<sip:5553000 at 86.96.229.88:50093;transport=TLS;rinstance=ce2ef0e4a7a3494b>
set_destination: Parsing
<sip:5553000 at 86.96.229.88:50093;transport=TLS;rinstance=ce2ef0e4a7a3494b>
for address/port to send to
set_destination: set destination to 86.96.229.88, port 50093
Transmitting (NAT) to 86.96.229.88:50093:
ACK
sip:5553000 at 86.96.229.88:50093;transport=TLS;rinstance=ce2ef0e4a7a3494b
SIP/2.0
Via: SIP/2.0/TLS 65.49.14.19:5061;branch=z9hG4bK76b0b58b;rport
Max-Forwards: 70
From: "Jochen E72 TLS UNCC" <sip:5553001 at sec.maeg.com>;tag=as4ef71c16
To:
<sip:5553000 at 86.96.229.88:50093;transport=TLS;rinstance=ce2ef0e4a7a3494b>;tag=1e0be518
Contact: <sip:5553001 at 65.49.14.19;transport=TLS>
Call-ID: 035b2c465a81dd720d193f00012f7e7d at sec.maeg.com
CSeq: 102 ACK
User-Agent: MAEG TLS SEC
Content-Length: 0


---
Audio is at 65.49.14.19 port 30144
Adding codec 0x8 (alaw) to SDP

<--- Reliably Transmitting (NAT) to 86.96.229.88:55324 --->
SIP/2.0 200 OK
Via: SIP/2.0/TLS
192.168.178.104:5060;branch=z9hG4bKrvljqrmjo82unjm3e0p77j3;received=86.96.229.88;rport=55324
From: <sip:5553001 at sec.maeg.com>;tag=9ai528m7n9hc642907mg
To: <sips:5553000 at sec.maeg.com;user=phone>;tag=as48b920d0
Call-ID: yflivjE3oIccB07J2B7_JOYGHFZeU9
CSeq: 3097 INVITE
Server: MAEG TLS SEC
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO,
PUBLISH
Supported: replaces, timer
Require: timer
Session-Expires: 300;refresher=uas
Contact: <sip:5553000 at 65.49.14.19;transport=TLS>
Content-Type: application/sdp
Content-Length: 280

v=0
o=MAEG 809561325 809561325 IN IP4 65.49.14.19
s=MAEG TLS
c=IN IP4 65.49.14.19
t=0 0
m=audio 30144 RTP/SAVP 8
a=rtpmap:8 PCMA/8000
a=silenceSupp:off - - - -
a=ptime:20
a=sendrecv
a=crypto:1 AES_CM_128_HMAC_SHA1_80
inline:rqDJHu7XQpTyamgsQeoA9KkgTOfbGOLHvW87nyD9

<------------>
81-89-105-60*CLI>
<--- SIP read from TLS:86.96.229.88:55324 --->
ACK sip:5553000 at 65.49.14.19;transport=TLS SIP/2.0
Via: SIP/2.0/TLS
192.168.178.104:5060;branch=z9hG4bKtrcnhoia12oprjm3qlh3cs3;rport
To: <sips:5553000 at sec.maeg.com;user=phone>;tag=as48b920d0
From: <sip:5553001 at sec.maeg.com>;tag=9ai528m7n9hc642907mg
Call-ID: yflivjE3oIccB07J2B7_JOYGHFZeU9
CSeq: 3097 ACK
Supported: sec-agree
Allow: INVITE,ACK,CANCEL,OPTIONS,BYE,INVITE,ACK,CANCEL,OPTIONS,BYE
Max-Forwards: 70
Authorization: Digest
realm="maeg.com",nonce="6ae9216f",algorithm=MD5,username="5553001",uri="sips:5553000 at sec.maeg.com;user=phone",response="ee9ec3e329301a764d7b54cf61d08586"
Content-Length: 0


<------------->
--- (11 headers 0 lines) ---
[May  5 06:09:00] NOTICE[30684]: res_rtp_asterisk.c:2128 ast_rtp_read:
Unknown RTP codec 120 received from '86.96.229.88'
81-89-105-60*CLI>
<--- SIP read from TLS:86.96.229.88:55324 --->
BYE sip:5553000 at 65.49.14.19;transport=TLS SIP/2.0
Via: SIP/2.0/TLS
192.168.178.104:5060;branch=z9hG4bKqkiv8sk20phc73vsv576rsl;rport
To: <sips:5553000 at sec.maeg.com;user=phone>;tag=as48b920d0
From: <sip:5553001 at sec.maeg.com>;tag=9ai528m7n9hc642907mg
Call-ID: yflivjE3oIccB07J2B7_JOYGHFZeU9
CSeq: 3098 BYE
Allow: INVITE,ACK,CANCEL,OPTIONS,BYE,INVITE,ACK,CANCEL,OPTIONS,BYE
Max-Forwards: 70
Content-Length: 0


<------------->
--- (9 headers 0 lines) ---
Sending to 86.96.229.88 : 55324 (NAT)

<--- Transmitting (NAT) to 86.96.229.88:55324 --->
SIP/2.0 200 OK
Via: SIP/2.0/TLS
192.168.178.104:5060;branch=z9hG4bKqkiv8sk20phc73vsv576rsl;received=86.96.229.88;rport=55324
From: <sip:5553001 at sec.maeg.com>;tag=9ai528m7n9hc642907mg
To: <sips:5553000 at sec.maeg.com;user=phone>;tag=as48b920d0
Call-ID: yflivjE3oIccB07J2B7_JOYGHFZeU9
CSeq: 3098 BYE
Server: MAEG TLS SEC
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO,
PUBLISH
Supported: replaces, timer
Content-Length: 0


<------------>
Scheduling destruction of SIP dialog
'035b2c465a81dd720d193f00012f7e7d at sec.maeg.com' in 18112 ms (Method:
INVITE)
set_destination: Parsing
<sip:5553000 at 86.96.229.88:50093;transport=TLS;rinstance=ce2ef0e4a7a3494b>
for address/port to send to
set_destination: set destination to 86.96.229.88, port 50093
Reliably Transmitting (NAT) to 86.96.229.88:50093:
BYE
sip:5553000 at 86.96.229.88:50093;transport=TLS;rinstance=ce2ef0e4a7a3494b
SIP/2.0
Via: SIP/2.0/TLS 65.49.14.19:5061;branch=z9hG4bK10e987bd;rport
Max-Forwards: 70
From: "Jochen E72 TLS UNCC" <sip:5553001 at sec.maeg.com>;tag=as4ef71c16
To:
<sip:5553000 at 86.96.229.88:50093;transport=TLS;rinstance=ce2ef0e4a7a3494b>;tag=1e0be518
Call-ID: 035b2c465a81dd720d193f00012f7e7d at sec.maeg.com
CSeq: 103 BYE
User-Agent: MAEG TLS SEC
X-Asterisk-HangupCause: Normal Clearing
X-Asterisk-HangupCauseCode: 16
Content-Length: 0


---
81-89-105-60*CLI>
<--- SIP read from TLS:86.96.229.88:50093 --->
SIP/2.0 200 OK
Via: SIP/2.0/TLS 65.49.14.19:5061;branch=z9hG4bK10e987bd;rport=5061
Contact:
<sip:5553000 at 86.96.229.88:50093;transport=TLS;rinstance=ce2ef0e4a7a3494b>
To:
<sip:5553000 at 86.96.229.88:50093;transport=TLS;rinstance=ce2ef0e4a7a3494b>;tag=1e0be518
From: "Jochen E72 TLS UNCC"<sip:5553001 at sec.maeg.com>;tag=as4ef71c16
Call-ID: 035b2c465a81dd720d193f00012f7e7d at sec.maeg.com
CSeq: 103 BYE
User-Agent: eyeBeam release 1102q stamp 51814
Content-Length: 0


<------------->
--- (9 headers 0 lines) ---
Really destroying SIP dialog
'035b2c465a81dd720d193f00012f7e7d at sec.maeg.com' Method: INVITE
Really destroying SIP dialog 'yflivjE3oIccB07J2B7_JOYGHFZeU9' Method: BYE
81-89-105-60*CLI>
<--- SIP read from TLS:86.96.229.88:50093 --->



<------------->
Reliably Transmitting (NAT) to 86.96.229.88:50093:
OPTIONS
sip:5553000 at 86.96.229.88:50093;transport=TLS;rinstance=ce2ef0e4a7a3494b
SIP/2.0
Via: SIP/2.0/TLS 65.49.14.19:5061;branch=z9hG4bK3497fb47;rport
Max-Forwards: 70
From: "asterisk" <sip:asterisk at sec.maeg.com>;tag=as4f0d4c84
To:
<sip:5553000 at 86.96.229.88:50093;transport=TLS;rinstance=ce2ef0e4a7a3494b>
Contact: <sip:asterisk at 65.49.14.19;transport=TLS>
Call-ID: 2343369555c993812d027d3b58728dac at sec.maeg.com
CSeq: 102 OPTIONS
User-Agent: MAEG TLS SEC
Date: Wed, 05 May 2010 06:09:15 GMT
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO,
PUBLISH
Supported: replaces, timer
Content-Length: 0


---
81-89-105-60*CLI>
<--- SIP read from TLS:86.96.229.88:50093 --->
SIP/2.0 200 OK
Via: SIP/2.0/TLS 65.49.14.19:5061;branch=z9hG4bK3497fb47;rport=5061
Contact: <sip:192.168.178.63:41141;transport=TLS>
To:
<sip:5553000 at 86.96.229.88:50093;transport=TLS;rinstance=ce2ef0e4a7a3494b>;tag=a6647e1e
From: "asterisk"<sip:asterisk at sec.maeg.com>;tag=as4f0d4c84
Call-ID: 2343369555c993812d027d3b58728dac at sec.maeg.com
CSeq: 102 OPTIONS
Accept: application/sdp
Accept-Language: en
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE,
SUBSCRIBE, INFO
User-Agent: eyeBeam release 1102q stamp 51814
Content-Length: 0


<------------->
--- (12 headers 0 lines) ---
81-89-105-60*CLI>
<--- SIP read from TLS:86.96.229.88:50093 --->
SUBSCRIBE sip:5553000 at sec.maeg.com:5061 SIP/2.0
Via: SIP/2.0/TLS
192.168.178.63:41141;branch=z9hG4bK-d8754z-e87db67f1474f45a-1---d8754z-;rport
Max-Forwards: 70
Contact: <sip:5553000 at 86.96.229.88:50093;transport=TLS>
To: "MAEG ENCRYPTED"<sip:5553000 at sec.maeg.com:5061>
From: "MAEG ENCRYPTED"<sip:5553000 at sec.maeg.com:5061>;tag=0d216377
Call-ID: NDQ5MTU5MmZiM2VlMjk2YjY4ZjYzNWJjZWI5MTczMDk.
CSeq: 1 SUBSCRIBE
Expires: 300
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE,
SUBSCRIBE, INFO
User-Agent: eyeBeam release 1102q stamp 51814
Event: message-summary
Content-Length: 0


<------------->
--- (13 headers 0 lines) ---
Creating new subscription
Sending to 86.96.229.88 : 41141 (no NAT)
list_route: hop: <sip:5553000 at 86.96.229.88:50093;transport=TLS>
Found peer '5553000' for '5553000' from 86.96.229.88:50093

<--- Transmitting (NAT) to 86.96.229.88:50093 --->
SIP/2.0 401 Unauthorized
Via: SIP/2.0/TLS
192.168.178.63:41141;branch=z9hG4bK-d8754z-e87db67f1474f45a-1---d8754z-;received=86.96.229.88;rport=50093
From: "MAEG ENCRYPTED"<sip:5553000 at sec.maeg.com:5061>;tag=0d216377
To: "MAEG ENCRYPTED"<sip:5553000 at sec.maeg.com:5061>;tag=as5bec72bd
Call-ID: NDQ5MTU5MmZiM2VlMjk2YjY4ZjYzNWJjZWI5MTczMDk.
CSeq: 1 SUBSCRIBE
Server: MAEG TLS SEC
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO,
PUBLISH
Supported: replaces, timer
WWW-Authenticate: Digest algorithm=MD5, realm="maeg.com",
nonce="3e0e64a3"
Content-Length: 0


<------------>
Scheduling destruction of SIP dialog
'NDQ5MTU5MmZiM2VlMjk2YjY4ZjYzNWJjZWI5MTczMDk.' in 17920 ms (Method:
SUBSCRIBE)
Really destroying SIP dialog
'2343369555c993812d027d3b58728dac at sec.maeg.com' Method: OPTIONS
81-89-105-60*CLI>
<--- SIP read from TLS:86.96.229.88:50093 --->
SUBSCRIBE sip:5553000 at sec.maeg.com:5061 SIP/2.0
Via: SIP/2.0/TLS
192.168.178.63:41141;branch=z9hG4bK-d8754z-0a5ca014d30f4762-1---d8754z-;rport
Max-Forwards: 70
Contact: <sip:5553000 at 86.96.229.88:50093;transport=TLS>
To: "MAEG ENCRYPTED"<sip:5553000 at sec.maeg.com:5061>
From: "MAEG ENCRYPTED"<sip:5553000 at sec.maeg.com:5061>;tag=0d216377
Call-ID: NDQ5MTU5MmZiM2VlMjk2YjY4ZjYzNWJjZWI5MTczMDk.
CSeq: 2 SUBSCRIBE
Expires: 300
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE,
SUBSCRIBE, INFO
User-Agent: eyeBeam release 1102q stamp 51814
Authorization: Digest
username="5553000",realm="maeg.com",nonce="3e0e64a3",uri="sip:5553000 at sec.maeg.com:5061",response="8d8381f5cdca8138a8e8f5219d58991f",algorithm=MD5
Event: message-summary
Content-Length: 0


<------------->
--- (14 headers 0 lines) ---
Creating new subscription
Sending to 86.96.229.88 : 50093 (NAT)
Found peer '5553000' for '5553000' from 86.96.229.88:50093

<--- Transmitting (NAT) to 86.96.229.88:50093 --->
SIP/2.0 404 Not found (no mailbox)
Via: SIP/2.0/TLS
192.168.178.63:41141;branch=z9hG4bK-d8754z-0a5ca014d30f4762-1---d8754z-;received=86.96.229.88;rport=50093
From: "MAEG ENCRYPTED"<sip:5553000 at sec.maeg.com:5061>;tag=0d216377
To: "MAEG ENCRYPTED"<sip:5553000 at sec.maeg.com:5061>;tag=as5bec72bd
Call-ID: NDQ5MTU5MmZiM2VlMjk2YjY4ZjYzNWJjZWI5MTczMDk.
CSeq: 2 SUBSCRIBE
Server: MAEG TLS SEC
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO,
PUBLISH
Supported: replaces, timer
Content-Length: 0 

Issue History 
Date Modified    Username       Field                    Change               
====================================================================== 
2010-05-05 01:24 Joels          Note Added: 0121396                          
======================================================================




More information about the asterisk-bugs mailing list