Has anyone seen a case where the to and from fields of an SIP invite packet are getting swapped in Asterisk 11.2.1? I started using CallCentric SIP this week to supplement my current Sotel SIP provider (both for Trunking). When doing a test call to my Asterisk PBX, I see an error message:
[May 8 21:20:35] NOTICE[1024][C-00000000]: chan_sip.c:25081 handle_request_invite: Sending fake auth rejection for device “CALIFORNIA CALL” <sip:1NXXNXXXXX@(CallCentric’s IP Address)>;tag=3577062035-626165
Where ‘device “CALIFORNIA CALL” <sip:1NXXNXXXXXX@(CallCentric’s IP Address)>’ is actually the data that is contained in the “from” field of the Invite packet.
Here is the data from the sniffed packet:
“INVITE sip:***********@(My Router’s IP Address):5060 SIP/2.0
v: SIP/2.0/UDP 204.11.192.170:5060;branch=z9hG4bK-649527bc7907bb013a25f9bcfba4dd92
f: “CALIFORNIA CALL” <sip:1NXXNXXXXXX@(CallCentric’s IP Address)>;tag=3577062280-620808
t: <sip:(My CallCentric DID Extension)@ss.callcentric.com>
…”
(Trucated for clarity by me).
Here is my sip.conf for CallCentric with passwords and IP’s removed:
[CallCentric-Trunk]
type=peer
host=callcentric.com
fromdomain=callcentric.com
deny=0.0.0.0/0.0.0.0
permit=(CallCentric’s First Public Subnet)/255.255.255.0
permit=(CallCentric’s Second Public Subnet)/255.255.255.0
nat=force_rport,comedia
srvlookup=yes
dtmfmods=rfc2833
insecure=invite,port
canreinvite=no
disallow=all
allow=ulaw
allow=g729
context=*
defaultuser=*
fromuser=*
authuser=*
secret=*
Is there a way to push out the full SIP authentication attempt info to a file for debugging/logging from within Asterisk? Any ideas?