diff --git a/channels/chan_sip.c b/channels/chan_sip.c
index 01f184fec281ee3208a37b24edfb6e68bf55e85b..06e26c98b01f4b23d2d4ec8c27c4eff76b4ef248 100644
--- a/channels/chan_sip.c
+++ b/channels/chan_sip.c
@@ -9883,6 +9883,15 @@ static void append_date(struct sip_request *req)
 	add_header(req, "Date", tmpdat);
 }
 
+/*! \brief Append Retry-After header field when transmitting response */
+static int transmit_response_with_retry_after(struct sip_pvt *p, const char *msg, const struct sip_request *req, const char *seconds)
+{
+	struct sip_request resp;
+	respprep(&resp, p, msg, req);
+	add_header(&resp, "Retry-After", seconds);
+	return send_response(p, &resp, XMIT_UNRELIABLE, 0);
+}
+
 /*! \brief Append date and content length before transmitting response */
 static int transmit_response_with_date(struct sip_pvt *p, const char *msg, const struct sip_request *req)
 {
@@ -23609,10 +23618,16 @@ static int handle_incoming(struct sip_pvt *p, struct sip_request *req, struct as
 	if (p->icseq && (p->icseq > seqno) ) {
 		if (p->pendinginvite && seqno == p->pendinginvite && (req->method == SIP_ACK || req->method == SIP_CANCEL)) {
 			ast_debug(2, "Got CANCEL or ACK on INVITE with transactions in between.\n");
-		}  else {
+		} else {
 			ast_debug(1, "Ignoring too old SIP packet packet %d (expecting >= %d)\n", seqno, p->icseq);
-			if (req->method != SIP_ACK)
+			if (req->method == SIP_INVITE) {
+				unsigned int ran = (ast_random() % 10) + 1;
+				char seconds[4];
+				snprintf(seconds, sizeof(seconds), "%u", ran);
+				transmit_response_with_retry_after(p, "500 Server error", req, seconds);	/* respond according to RFC 3261 14.2 with Retry-After betwewn 0 and 10 */
+			} else if (req->method != SIP_ACK) {
 				transmit_response(p, "500 Server error", req);	/* We must respond according to RFC 3261 sec 12.2 */
+			}
 			return -1;
 		}
 	} else if (p->icseq &&