Thanks Richard, I made a new test and below is the output from /var/log/messages.
Looks like the whole call gets somehow messed up, there are several BYE messages before I end the call from either side. I wonder what causes the BYE messages to be sent?
I'll get better sdp output soon...
Thanks again,
Olli
Apr 2 14:10:47 u363id562 mediaproxy-ng[18742]: Got valid command from
127.0.0.1:39795: offer - { "sdp": "v=0#015#012o=- 7083457405291314669 2 IN IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS No46lGs0HIghRI0dBCknwdhJyR8IlJ3FPqI3#015#012m=audio 64860 RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 2.2.2.2#015#012a=rtcp:64860 IN IP4 2.2.2.2#015#012a=candidate:2999745851 1 udp 2113937151 192.168.56.1 64859 typ host generation 0#015#012a=candidate:2999745851 2 udp 2113937151 192.168.56.1 64859 typ host generation 0#015#012a=candidate:3350409123 1 udp 2113937151 192.168.0.101 64860 typ host generation 0#015#012a=candidate:3350409123 2 udp 2113937151 192.168.0.101 64860 typ host generation 0#015#012a=candidate:4233069003 1 tcp 1509957375 192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp 1509957375 192.168.56.1 0 typ host generation 0#015#012a=candidate:2301678419 1 tcp 1509957375 192.168.0.101 0 typ host generation 0#015#012a=candidate:2301678419 2 tcp 1509957375 192.168.0.101 0 typ host generation 0#015#012a=candidate:1190865175 1 udp 1845501695 2.2.2.2 64860 typ srflx raddr 192.168.0.101 rport 64860 generation 0#015#012a=candidate:1190865175 2 udp 1845501695 2.2.2.2 64860 typ srflx raddr 192.168.0.101 rport 64860 generation 0#015#012a=ice-ufrag:Nuzos2pMurFvifge#015#012a=ice-pwd:AAcKZc38Sp21Y/kFzdYxFGjt#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256 72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=sendrecv#015#012a=rtcp-mux#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_32 inline:ERj6OGgpgTMY1kD3wmxN3oIOD8L5vL5tKAtmHM0f#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:UT3fhVoULjUtaHJdfLkFHqTbAEfb3oKDWqBY3ahK#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015
Apr 2 14:10:47 u363id562 mediaproxy-ng[18742]: [oginba5h5r8h1hk3kngu] Creating new call
Apr 2 14:10:47 u363id562 mediaproxy-ng[18742]: Returning to SIP proxy: d3:sdp2211:v=0#015#012o=- 7083457405291314669 2 IN IP4 1.1.1.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS No46lGs0HIghRI0dBCknwdhJyR8IlJ3FPqI3#015#012m=audio 30032 RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 1.1.1.1#015#012a=candidate:2999745851 1 udp 2113937151 192.168.56.1 64859 typ host generation 0#015#012a=candidate:2999745851 2 udp 2113937151 192.168.56.1 64859 typ host generation 0#015#012a=candidate:3350409123 1 udp 2113937151 192.168.0.101 64860 typ host generation 0#015#012a=candidate:3350409123 2 udp 2113937151 192.168.0.101 64860 typ host generation 0#015#012a=candidate:4233069003 1 tcp 1509957375 192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp 1509957375 192.168.56.1 0 typ host generation 0#015#012a=candidate:2301678419 1 tcp 1509957375 192.168.0.101 0 typ host generation 0#015#012a=candidate:2301678419 2 tcp 1509957375 192.168.0.101 0 typ host generation 0#015#012a=candidate:1190865175 1 udp 1845501695 2.2.2.2 64860 typ srflx raddr 192.168.0.101 rport 64860 generation 0#015#012a=candidate:1190865175 2 udp 1845501695 2.2.2.2 64860 typ srflx raddr 192.168.0.101 rport 64860 generation 0#015#012a=ice-ufrag:Nuzos2pMurFvifge#015#012a=ice-pwd:AAcKZc38Sp21Y/kFzdYxFGjt#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256 72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=sendrecv#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_32 inline:ERj6OGgpgTMY1kD3wmxN3oIOD8L5vL5tKAtmHM0f#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:UT3fhVoULjUtaHJdfLkFHqTbAEfb3oKDWqBY3ahK#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:106 CN/32000#015#012a=rtpmap:105 CN/16000#015#012a=rtpmap:13 CN/8000#015#012a=rtpmap:126 telephon
Apr 2 14:10:47 u363id562 kamailio[27059]: NOTICE: acc [acc.c:315]: acc_log_request(): ACC: call missed: timestamp=1396433447;method=INVITE;from_tag=a5uk5lnjvf;to_tag=f7a91f721d721d45;call_id=oginba5h5r8h1hk3kngu;code=488;reason=Not Acceptable Here;src_user=wsclient;src_domain=
testers.com;src_ip=2.2.2.2;dst_ouser=gsclient;dst_user=gsclient;dst_domain=192.168.0.106
Apr 2 14:10:47 u363id562 mediaproxy-ng[18742]: Got valid command from
127.0.0.1:55835: offer - { "sdp": "v=0#015#012o=- 7083457405291314669 2 IN IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS No46lGs0HIghRI0dBCknwdhJyR8IlJ3FPqI3#015#012m=audio 64860 RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 2.2.2.2#015#012a=rtcp:64860 IN IP4 2.2.2.2#015#012a=candidate:2999745851 1 udp 2113937151 192.168.56.1 64859 typ host generation 0#015#012a=candidate:2999745851 2 udp 2113937151 192.168.56.1 64859 typ host generation 0#015#012a=candidate:3350409123 1 udp 2113937151 192.168.0.101 64860 typ host generation 0#015#012a=candidate:3350409123 2 udp 2113937151 192.168.0.101 64860 typ host generation 0#015#012a=candidate:4233069003 1 tcp 1509957375 192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp 1509957375 192.168.56.1 0 typ host generation 0#015#012a=candidate:2301678419 1 tcp 1509957375 192.168.0.101 0 typ host generation 0#015#012a=candidate:2301678419 2 tcp 1509957375 192.168.0.101 0 typ host generation 0#015#012a=candidate:1190865175 1 udp 1845501695 2.2.2.2 64860 typ srflx raddr 192.168.0.101 rport 64860 generation 0#015#012a=candidate:1190865175 2 udp 1845501695 2.2.2.2 64860 typ srflx raddr 192.168.0.101 rport 64860 generation 0#015#012a=ice-ufrag:Nuzos2pMurFvifge#015#012a=ice-pwd:AAcKZc38Sp21Y/kFzdYxFGjt#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256 72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=sendrecv#015#012a=rtcp-mux#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_32 inline:ERj6OGgpgTMY1kD3wmxN3oIOD8L5vL5tKAtmHM0f#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:UT3fhVoULjUtaHJdfLkFHqTbAEfb3oKDWqBY3ahK#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015
Apr 2 14:10:47 u363id562 mediaproxy-ng[18742]: Returning to SIP proxy: d3:sdp925:v=0#015#012o=- 7083457405291314669 2 IN IP4 1.1.1.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS No46lGs0HIghRI0dBCknwdhJyR8IlJ3FPqI3#015#012m=audio 30032 RTP/AVP 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 1.1.1.1#015#012a=fingerprint:sha-256 72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=sendrecv#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:106 CN/32000#015#012a=rtpmap:105 CN/16000#015#012a=rtpmap:13 CN/8000#015#012a=rtpmap:126 telephone-event/8000#015#012a=maxptime:60#015#012a=ssrc:1883467027 cname:xLrdjUv0kmdPbie/#015#012a=ssrc:1883467027 msid:No46lGs0HIghRI0dBCknwdhJyR8IlJ3FPqI3 2cddb28d-832f-4b95-a39f-cc2e39cf620c#015#012a=ssrc:1883467027 mslabel:No46lGs0HIghRI0dBCknwdhJyR8IlJ3FPqI3#015#012a=ssrc:1883467027 label:2cddb28d-832f-4b95-a39f-cc2e39cf620c#015#012a=rtcp:30033#015#0126:result2:oke
Apr 2 14:10:47 u363id562 mediaproxy-ng[18742]: Got valid command from
127.0.0.1:55835: offer - { "sdp": "v=0#015#012o=- 7083457405291314669 2 IN IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS No46lGs0HIghRI0dBCknwdhJyR8IlJ3FPqI3#015#012m=audio 64860 RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 2.2.2.2#015#012a=rtcp:64860 IN IP4 2.2.2.2#015#012a=candidate:2999745851 1 udp 2113937151 192.168.56.1 64859 typ host generation 0#015#012a=candidate:2999745851 2 udp 2113937151 192.168.56.1 64859 typ host generation 0#015#012a=candidate:3350409123 1 udp 2113937151 192.168.0.101 64860 typ host generation 0#015#012a=candidate:3350409123 2 udp 2113937151 192.168.0.101 64860 typ host generation 0#015#012a=candidate:4233069003 1 tcp 1509957375 192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp 1509957375 192.168.56.1 0 typ host generation 0#015#012a=candidate:2301678419 1 tcp 1509957375 192.168.0.101 0 typ host generation 0#015#012a=candidate:2301678419 2 tcp 1509957375 192.168.0.101 0 typ host generation 0#015#012a=candidate:1190865175 1 udp 1845501695 2.2.2.2 64860 typ srflx raddr 192.168.0.101 rport 64860 generation 0#015#012a=candidate:1190865175 2 udp 1845501695 2.2.2.2 64860 typ srflx raddr 192.168.0.101 rport 64860 generation 0#015#012a=ice-ufrag:Nuzos2pMurFvifge#015#012a=ice-pwd:AAcKZc38Sp21Y/kFzdYxFGjt#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256 72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=sendrecv#015#012a=rtcp-mux#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_32 inline:ERj6OGgpgTMY1kD3wmxN3oIOD8L5vL5tKAtmHM0f#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:UT3fhVoULjUtaHJdfLkFHqTbAEfb3oKDWqBY3ahK#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015
Apr 2 14:10:47 u363id562 mediaproxy-ng[18742]: Returning to SIP proxy: d3:sdp2211:v=0#015#012o=- 7083457405291314669 2 IN IP4 1.1.1.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS No46lGs0HIghRI0dBCknwdhJyR8IlJ3FPqI3#015#012m=audio 30032 RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 1.1.1.1#015#012a=candidate:2999745851 1 udp 2113937151 192.168.56.1 64859 typ host generation 0#015#012a=candidate:2999745851 2 udp 2113937151 192.168.56.1 64859 typ host generation 0#015#012a=candidate:3350409123 1 udp 2113937151 192.168.0.101 64860 typ host generation 0#015#012a=candidate:3350409123 2 udp 2113937151 192.168.0.101 64860 typ host generation 0#015#012a=candidate:4233069003 1 tcp 1509957375 192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp 1509957375 192.168.56.1 0 typ host generation 0#015#012a=candidate:2301678419 1 tcp 1509957375 192.168.0.101 0 typ host generation 0#015#012a=candidate:2301678419 2 tcp 1509957375 192.168.0.101 0 typ host generation 0#015#012a=candidate:1190865175 1 udp 1845501695 2.2.2.2 64860 typ srflx raddr 192.168.0.101 rport 64860 generation 0#015#012a=candidate:1190865175 2 udp 1845501695 2.2.2.2 64860 typ srflx raddr 192.168.0.101 rport 64860 generation 0#015#012a=ice-ufrag:Nuzos2pMurFvifge#015#012a=ice-pwd:AAcKZc38Sp21Y/kFzdYxFGjt#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256 72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=sendrecv#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_32 inline:ERj6OGgpgTMY1kD3wmxN3oIOD8L5vL5tKAtmHM0f#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:UT3fhVoULjUtaHJdfLkFHqTbAEfb3oKDWqBY3ahK#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:106 CN/32000#015#012a=rtpmap:105 CN/16000#015#012a=rtpmap:13 CN/8000#015#012a=rtpmap:126 telephon
Apr 2 14:10:52 u363id562 mediaproxy-ng[18742]: Got valid command from
127.0.0.1:40131: answer - { "sdp": "v=0#015#012o=gsclient 8000 8000 IN IP4 192.168.0.106#015#012s=SIP Call#015#012c=IN IP4 192.168.0.106#015#012t=0 0#015#012m=audio 5030 RTP/AVP 0 13#015#012a=sendrecv#015#012a=rtpmap:0 PCMU/8000#015#012a=ptime:20#015#012m=audio 0 RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#012", "ICE": "force", "flags": [ "force", "trust-address" ], "replace": [ "origin", "session-connection" ], "transport-protocol": "RTP/SAVPF", "call-id": "oginba5h5r8h1hk3kngu", "received-from": [ "IP4", "2.2.2.2" ], "from-tag": "a5uk5lnjvf", "to-tag": "7067a267ea14db11", "command": "answer" }
Apr 2 14:10:52 u363id562 mediaproxy-ng[18742]: [oginba5h5r8h1hk3kngu - ] Got LOOKUP, but no usable callstreams found
Apr 2 14:10:52 u363id562 mediaproxy-ng[18742]: Error rewriting SDP
Apr 2 14:10:52 u363id562 mediaproxy-ng[18742]: Protocol error in packet from
127.0.0.1:40131: Error rewriting SDP [d3:sdp216:v=0#015#012o=gsclient 8000 8000 IN IP4 192.168.0.106#015#012s=SIP Call#015#012c=IN IP4 192.168.0.106#015#012t=0 0#015#012m=audio 5030 RTP/AVP 0 13#015#012a=sendrecv#015#012a=rtpmap:0 PCMU/8000#015#012a=ptime:20#015#012m=audio 0 RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#0123:ICE5:force5:flagsl5:force13:trust-addresse7:replacel6:origin18:session-connectione18:transport-protocol9:RTP/SAVPF7:call-id20:oginba5h5r8h1hk3kngu13:received-froml3:IP412:2.2.2.2e8:from-tag10:a5uk5lnjvf6:to-tag16:7067a267ea14db117:command6:answere]
Apr 2 14:10:52 u363id562 mediaproxy-ng[18742]: Returning to SIP proxy: d6:result5:error12:error-reason19:Error rewriting SDPe
Apr 2 14:10:52 u363id562 kamailio[27056]: ERROR: rtpproxy-ng [rtpproxy.c:1346]: rtpp_function_call(): proxy replied with error: Error rewriting SDP
Apr 2 14:10:52 u363id562 kamailio[27056]: NOTICE: acc [acc.c:315]: acc_log_request(): ACC: transaction answered: timestamp=1396433452;method=INVITE;from_tag=a5uk5lnjvf;to_tag=7067a267ea14db11;call_id=oginba5h5r8h1hk3kngu;code=200;reason=OK;src_user=wsclient;src_domain=
testers.com;src_ip=2.2.2.2;dst_ouser=gsclient;dst_user=gsclient;dst_domain=192.168.0.106
Apr 2 14:10:52 u363id562 mediaproxy-ng[18742]: Got valid command from
127.0.0.1:39795: delete - { "call-id": "oginba5h5r8h1hk3kngu", "received-from": [ "IP4", "2.2.2.2" ], "from-tag": "a5uk5lnjvf", "command": "delete" }
Apr 2 14:10:52 u363id562 mediaproxy-ng[18742]: [oginba5h5r8h1hk3kngu] Deleting full call
Apr 2 14:10:52 u363id562 mediaproxy-ng[18742]: [oginba5h5r8h1hk3kngu] Final packet stats:
Apr 2 14:10:52 u363id562 mediaproxy-ng[18742]: [oginba5h5r8h1hk3kngu] --- side A: RTP[30032] 0 p, 0 b, 0 e; RTCP[0] 0 p, 0 b, 30033 e; side B: RTP[0] 0 p, 0 b, 0 e; RTCP[0] 0 p, 30034 b, 0 e
Apr 2 14:10:52 u363id562 mediaproxy-ng[18742]: [oginba5h5r8h1hk3kngu] --- side A: RTP[0] 0 p, 0 b, 0 e; RTCP[0] 0 p, 0 b, 0 e; side B: RTP[0] 0 p, 0 b, 0 e; RTCP[0] 0 p, 0 b, 0 e
Apr 2 14:10:52 u363id562 mediaproxy-ng[18742]: [oginba5h5r8h1hk3kngu] --- side A: RTP[0] 0 p, 0 b, 0 e; RTCP[0] 0 p, 0 b, 0 e; side B: RTP[0] 0 p, 0 b, 0 e; RTCP[0] 0 p, 0 b, 0 e
Apr 2 14:10:52 u363id562 mediaproxy-ng[18742]: Returning to SIP proxy: d7:createdi1396433447e7:streamslld3:tag10:a5uk5lnjvf6:status34:known but unconfirmed peer address5:statsd3:rtpd8:countersd7:packetsi0e5:bytesi0e6:errorsi0ee12:peer addressd6:family4:IPv47:address12:2.2.2.24:porti64860ee23:advertised peer addressd6:family4:IPv47:address12:2.2.2.24:porti64860ee10:local porti30032ee4:rtcpd8:countersd7:packetsi0e5:bytesi0e6:errorsi0ee12:peer addressd6:family4:IPv47:address12:2.2.2.24:porti64861ee23:advertised peer addressd6:family4:IPv47:address12:2.2.2.24:porti64861ee10:local porti30033eeeed3:tag16:7067a267ea14db116:status34:known but unconfirmed peer address5:statsd3:rtpd8:countersd7:packetsi0e5:bytesi0e6:errorsi0ee12:peer addressd6:family4:IPv47:address13:192.168.0.1064:porti5030ee23:advertised peer addressd6:family4:IPv47:address13:192.168.0.1064:porti5030ee10:local porti30034ee4:rtcpd8:countersd7:packetsi0e5:bytesi0e6:errorsi0ee12:peer addressd6:family4:IPv47:address13:192.168.0.1064:porti5031ee23:advertised peer addressd6:family4:IPv47:address13:192.168.0.1064:porti5031ee10:local porti30035eeeeee6:totalsd5:inputd3:rtpd7:packetsi0e5:bytesi0e6:errorsi0ee4:rtcpd7:packetsi0e5:bytesi0e6:errorsi0eee6:outputd3:rtpd7:packetsi0e5:bytesi0e6:errorsi0ee4:rtcpd7:packetsi0e5:bytesi0e6:errorsi0eeee6:result2:oke
Apr 2 14:10:53 u363id562 mediaproxy-ng[18742]: Got valid command from
127.0.0.1:55835: answer - { "sdp": "v=0#015#012o=gsclient 8000 8001 IN IP4 192.168.0.106#015#012s=SIP Call#015#012c=IN IP4 192.168.0.106#015#012t=0 0#015#012m=audio 5030 RTP/AVP 0 13#015#012a=sendrecv#015#012a=rtpmap:0 PCMU/8000#015#012a=ptime:20#015#012m=audio 0 RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#012", "ICE": "force", "flags": [ "force", "trust-address" ], "replace": [ "origin", "session-connection" ], "transport-protocol": "RTP/SAVPF", "call-id": "oginba5h5r8h1hk3kngu", "received-from": [ "IP4", "2.2.2.2" ], "from-tag": "a5uk5lnjvf", "to-tag": "7067a267ea14db11", "command": "answer" }
Apr 2 14:10:53 u363id562 mediaproxy-ng[18742]: Protocol error in packet from
127.0.0.1:55835: Unknown call-id [d3:sdp216:v=0#015#012o=gsclient 8000 8001 IN IP4 192.168.0.106#015#012s=SIP Call#015#012c=IN IP4 192.168.0.106#015#012t=0 0#015#012m=audio 5030 RTP/AVP 0 13#015#012a=sendrecv#015#012a=rtpmap:0 PCMU/8000#015#012a=ptime:20#015#012m=audio 0 RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#0123:ICE5:force5:flagsl5:force13:trust-addresse7:replacel6:origin18:session-connectione18:transport-protocol9:RTP/SAVPF7:call-id20:oginba5h5r8h1hk3kngu13:received-froml3:IP412:2.2.2.2e8:from-tag10:a5uk5lnjvf6:to-tag16:7067a267ea14db117:command6:answere]
Apr 2 14:10:53 u363id562 mediaproxy-ng[18742]: Returning to SIP proxy: d6:result5:error12:error-reason15:Unknown call-ide
Apr 2 14:10:53 u363id562 kamailio[27059]: ERROR: rtpproxy-ng [rtpproxy.c:1346]: rtpp_function_call(): proxy replied with error: Unknown call-id
Apr 2 14:10:55 u363id562 mediaproxy-ng[18742]: Got valid command from
127.0.0.1:34407: answer - { "sdp": "v=0#015#012o=gsclient 8000 8002 IN IP4 192.168.0.106#015#012s=SIP Call#015#012c=IN IP4 192.168.0.106#015#012t=0 0#015#012m=audio 5030 RTP/AVP 0 13#015#012a=sendrecv#015#012a=rtpmap:0 PCMU/8000#015#012a=ptime:20#015#012m=audio 0 RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#012", "ICE": "force", "flags": [ "force", "trust-address" ], "replace": [ "origin", "session-connection" ], "transport-protocol": "RTP/SAVPF", "call-id": "oginba5h5r8h1hk3kngu", "received-from": [ "IP4", "2.2.2.2" ], "from-tag": "a5uk5lnjvf", "to-tag": "7067a267ea14db11", "command": "answer" }
Apr 2 14:10:55 u363id562 mediaproxy-ng[18742]: Protocol error in packet from
127.0.0.1:34407: Unknown call-id [d3:sdp216:v=0#015#012o=gsclient 8000 8002 IN IP4 192.168.0.106#015#012s=SIP Call#015#012c=IN IP4 192.168.0.106#015#012t=0 0#015#012m=audio 5030 RTP/AVP 0 13#015#012a=sendrecv#015#012a=rtpmap:0 PCMU/8000#015#012a=ptime:20#015#012m=audio 0 RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#0123:ICE5:force5:flagsl5:force13:trust-addresse7:replacel6:origin18:session-connectione18:transport-protocol9:RTP/SAVPF7:call-id20:oginba5h5r8h1hk3kngu13:received-froml3:IP412:2.2.2.2e8:from-tag10:a5uk5lnjvf6:to-tag16:7067a267ea14db117:command6:answere]
Apr 2 14:10:55 u363id562 mediaproxy-ng[18742]: Returning to SIP proxy: d6:result5:error12:error-reason15:Unknown call-ide
Apr 2 14:10:55 u363id562 kamailio[27058]: ERROR: rtpproxy-ng [rtpproxy.c:1346]: rtpp_function_call(): proxy replied with error: Unknown call-id
Apr 2 14:11:07 u363id562 mediaproxy-ng[18742]: Got valid command from
127.0.0.1:55835: delete - { "call-id": "oginba5h5r8h1hk3kngu", "received-from": [ "IP4", "2.2.2.2" ], "from-tag": "7067a267ea14db11", "command": "delete" }
Apr 2 14:11:07 u363id562 mediaproxy-ng[18742]: [oginba5h5r8h1hk3kngu] Call-ID to delete not found
Apr 2 14:11:07 u363id562 mediaproxy-ng[18742]: Returning to SIP proxy: d7:warning38:Call-ID not found or tags didn't match6:result2:oke
Apr 2 14:11:07 u363id562 kamailio[27074]: NOTICE: acc [acc.c:315]: acc_log_request(): ACC: transaction answered: timestamp=1396433467;method=BYE;from_tag=7067a267ea14db11;to_tag=a5uk5lnjvf;call_id=oginba5h5r8h1hk3kngu;code=481;reason=Call/Transaction Does Not Exist;src_user=gsclient;src_domain=
testers.com;src_ip=2.2.2.2;dst_ouser=wsclient;dst_user=wsclient;dst_domain=
testers.com