Hello,
After some tests, I'm still having some strange results.
When calling from ws client to grandstream, I get the below output to /var/log/messages. In a sip trace after 488 there are only INVITEs from kamailio server to grandstream but no responses come back to kamailio server.
I haven't changed any other configurations, kamailio or otherwise. I run the rtpengine like this: /usr/sbin/rtpengine --table=0 --ip=1.1.1.1 --listen-udp=127.0.0.1:7722--listen-ng= 127.0.0.1:7723 --tos=184 --pidfile=/var/run/rtpengine.pid (where 1.1.1.1 is my kamailio server ip)
How do I work out the problem from here? Please let me know if you need any further info or logs and I'll dig those out.
cheers, Olli
Apr 10 17:10:16 u363id562 kamailio[10451]: INFO: <script>: GOT An Initial SIP MESSAGE INVITE from sip:wsclient@testers.com Apr 10 17:10:17 u363id562 kamailio[10451]: INFO: <script>: GOT An Initial SIP MESSAGE INVITE from sip:wsclient@testers.com Apr 10 17:10:17 u363id562 kamailio[10451]: INFO: <script>: DEBUG: user wsclient authenticated Apr 10 17:10:17 u363id562 rtpengine[13839]: Got valid command from 127.0.0.1:35608: offer - { "sdp": "v=0#015#012o=- 3039037756476840958 2 IN IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS BvNdmpBIxiDTYKfuot9JeFD89fHbTTPzK6MG#015#012m=audio 60273 RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 2.2.2.2#015#012a=rtcp:60273 IN IP4 2.2.2.2#015#012a=candidate:2999745851 1 udp 2113937151 192.168.56.1 60272 typ host generation 0#015#012a=candidate:2999745851 2 udp 2113937151 192.168.56.1 60272 typ host generation 0#015#012a=candidate:3350409123 1 udp 2113937151 192.168.0.101 60273 typ host generation 0#015#012a=candidate:3350409123 2 udp 2113937151 192.168.0.101 60273 typ host generation 0#015#012a=candidate:4233069003 1 tcp 1509957375 192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp 1509957375 192.168.56.1 0 typ host generation 0#015#012a=candidate:2301678419 1 tcp 1509957375 192.168.0.101 0 typ host generation 0#015#012a=candidate:2301678419 2 tcp 1509957375 192.168.0.101 0 typ host generation 0#015#012a=candidate:1190865175 1 udp 1845501695 2.2.2.2 60273 typ srflx raddr 192.168.0.101 rport 60273 generation 0#015#012a=candidate:1190865175 2 udp 1845501695 2.2.2.2 60273 typ srflx raddr 192.168.0.101 rport 60273 generation 0#015#012a=ice-ufrag:OQDSQjsP/gqERPJK#015#012a=ice-pwd:Yi4cb76Uyk2S8+v9yAiH1Rvq#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256 72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=sendrecv#015#012a=rtcp-mux#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_32 inline:J/4necDa9RPPu8pBeS5/ATPlAUPbRN1i0sA1cH5h#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:1wAuy1eAPr5XVKEjzv+D43J6Ev86P6DIxPWugdC3#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015#012 Apr 10 17:10:17 u363id562 rtpengine[13839]: [cid3il8lc9432jo3iair] Creating new call Apr 10 17:10:17 u363id562 rtpengine[13839]: [cid3il8lc9432jo3iair] Returning to SIP proxy: d3:sdp2275:v=0#015#012o=- 3039037756476840958 2 IN IP4 1.1.1.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS BvNdmpBIxiDTYKfuot9JeFD89fHbTTPzK6MG#015#012m=audio 30136 RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 1.1.1.1#015#012a=candidate:2999745851 1 udp 2113937151 192.168.56.1 60272 typ host generation 0#015#012a=candidate:2999745851 2 udp 2113937151 192.168.56.1 60272 typ host generation 0#015#012a=candidate:3350409123 1 udp 2113937151 192.168.0.101 60273 typ host generation 0#015#012a=candidate:3350409123 2 udp 2113937151 192.168.0.101 60273 typ host generation 0#015#012a=candidate:4233069003 1 tcp 1509957375 192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp 1509957375 192.168.56.1 0 typ host generation 0#015#012a=candidate:2301678419 1 tcp 1509957375 192.168.0.101 0 typ host generation 0#015#012a=candidate:2301678419 2 tcp 1509957375 192.168.0.101 0 typ host generation 0#015#012a=candidate:1190865175 1 udp 1845501695 2.2.2.2 60273 typ srflx raddr 192.168.0.101 rport 60273 generation 0#015#012a=candidate:1190865175 2 udp 1845501695 2.2.2.2 60273 typ srflx raddr 192.168.0.101 rport 60273 generation 0#015#012a=ice-ufrag:OQDSQjsP/gqERPJK#015#012a=ice-pwd:Yi4cb76Uyk2S8+v9yAiH1Rvq#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256 72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_32 inline:J/4necDa9RPPu8pBeS5/ATPlAUPbRN1i0sA1cH5h#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:1wAuy1eAPr5XVKEjzv+D43J6Ev86P6DIxPWugdC3#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:106 CN/32000#015#012a=rtpmap:105 C Apr 10 17:10:17 u363id562 kamailio[10437]: NOTICE: acc [acc.c:315]: acc_log_request(): ACC: call missed: timestamp=1397135417;method=INVITE;from_tag=26rk17462e;to_tag=ffce92879a57942a;call_id=cid3il8lc9432jo3iair;code=488;reason=Not Acceptable Here;src_user=wsclient;src_domain=testers.com ;src_ip=2.2.2.2;dst_ouser=gsclient;dst_user=gsclient;dst_domain=192.168.0.106 Apr 10 17:10:17 u363id562 rtpengine[13839]: Got valid command from 127.0.0.1:55156: offer - { "sdp": "v=0#015#012o=- 3039037756476840958 2 IN IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS BvNdmpBIxiDTYKfuot9JeFD89fHbTTPzK6MG#015#012m=audio 60273 RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 2.2.2.2#015#012a=rtcp:60273 IN IP4 2.2.2.2#015#012a=candidate:2999745851 1 udp 2113937151 192.168.56.1 60272 typ host generation 0#015#012a=candidate:2999745851 2 udp 2113937151 192.168.56.1 60272 typ host generation 0#015#012a=candidate:3350409123 1 udp 2113937151 192.168.0.101 60273 typ host generation 0#015#012a=candidate:3350409123 2 udp 2113937151 192.168.0.101 60273 typ host generation 0#015#012a=candidate:4233069003 1 tcp 1509957375 192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp 1509957375 192.168.56.1 0 typ host generation 0#015#012a=candidate:2301678419 1 tcp 1509957375 192.168.0.101 0 typ host generation 0#015#012a=candidate:2301678419 2 tcp 1509957375 192.168.0.101 0 typ host generation 0#015#012a=candidate:1190865175 1 udp 1845501695 2.2.2.2 60273 typ srflx raddr 192.168.0.101 rport 60273 generation 0#015#012a=candidate:1190865175 2 udp 1845501695 2.2.2.2 60273 typ srflx raddr 192.168.0.101 rport 60273 generation 0#015#012a=ice-ufrag:OQDSQjsP/gqERPJK#015#012a=ice-pwd:Yi4cb76Uyk2S8+v9yAiH1Rvq#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256 72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=sendrecv#015#012a=rtcp-mux#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_32 inline:J/4necDa9RPPu8pBeS5/ATPlAUPbRN1i0sA1cH5h#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:1wAuy1eAPr5XVKEjzv+D43J6Ev86P6DIxPWugdC3#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015#012 Apr 10 17:10:17 u363id562 rtpengine[13839]: [cid3il8lc9432jo3iair] Returning to SIP proxy: d3:sdp2123:v=0#015#012o=- 3039037756476840958 2 IN IP4 1.1.1.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS BvNdmpBIxiDTYKfuot9JeFD89fHbTTPzK6MG#015#012m=audio 30136 RTP/AVP 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 1.1.1.1#015#012a=candidate:2999745851 1 udp 2113937151 192.168.56.1 60272 typ host generation 0#015#012a=candidate:2999745851 2 udp 2113937151 192.168.56.1 60272 typ host generation 0#015#012a=candidate:3350409123 1 udp 2113937151 192.168.0.101 60273 typ host generation 0#015#012a=candidate:3350409123 2 udp 2113937151 192.168.0.101 60273 typ host generation 0#015#012a=candidate:4233069003 1 tcp 1509957375 192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp 1509957375 192.168.56.1 0 typ host generation 0#015#012a=candidate:2301678419 1 tcp 1509957375 192.168.0.101 0 typ host generation 0#015#012a=candidate:2301678419 2 tcp 1509957375 192.168.0.101 0 typ host generation 0#015#012a=candidate:1190865175 1 udp 1845501695 2.2.2.2 60273 typ srflx raddr 192.168.0.101 rport 60273 generation 0#015#012a=candidate:1190865175 2 udp 1845501695 2.2.2.2 60273 typ srflx raddr 192.168.0.101 rport 60273 generation 0#015#012a=ice-ufrag:OQDSQjsP/gqERPJK#015#012a=ice-pwd:Yi4cb76Uyk2S8+v9yAiH1Rvq#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256 72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_32 inline:J/4necDa9RPPu8pBeS5/ATPlAUPbRN1i0sA1cH5h#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:1wAuy1eAPr5XVKEjzv+D43J6Ev86P6DIxPWugdC3#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:106 CN/32000#015#012a=rtpmap:105 CN/ Apr 10 17:10:17 u363id562 rtpengine[13839]: Got valid command from 127.0.0.1:55156: offer - { "sdp": "v=0#015#012o=- 3039037756476840958 2 IN IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS BvNdmpBIxiDTYKfuot9JeFD89fHbTTPzK6MG#015#012m=audio 60273 RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 2.2.2.2#015#012a=rtcp:60273 IN IP4 2.2.2.2#015#012a=candidate:2999745851 1 udp 2113937151 192.168.56.1 60272 typ host generation 0#015#012a=candidate:2999745851 2 udp 2113937151 192.168.56.1 60272 typ host generation 0#015#012a=candidate:3350409123 1 udp 2113937151 192.168.0.101 60273 typ host generation 0#015#012a=candidate:3350409123 2 udp 2113937151 192.168.0.101 60273 typ host generation 0#015#012a=candidate:4233069003 1 tcp 1509957375 192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp 1509957375 192.168.56.1 0 typ host generation 0#015#012a=candidate:2301678419 1 tcp 1509957375 192.168.0.101 0 typ host generation 0#015#012a=candidate:2301678419 2 tcp 1509957375 192.168.0.101 0 typ host generation 0#015#012a=candidate:1190865175 1 udp 1845501695 2.2.2.2 60273 typ srflx raddr 192.168.0.101 rport 60273 generation 0#015#012a=candidate:1190865175 2 udp 1845501695 2.2.2.2 60273 typ srflx raddr 192.168.0.101 rport 60273 generation 0#015#012a=ice-ufrag:OQDSQjsP/gqERPJK#015#012a=ice-pwd:Yi4cb76Uyk2S8+v9yAiH1Rvq#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256 72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=sendrecv#015#012a=rtcp-mux#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_32 inline:J/4necDa9RPPu8pBeS5/ATPlAUPbRN1i0sA1cH5h#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:1wAuy1eAPr5XVKEjzv+D43J6Ev86P6DIxPWugdC3#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015#012 Apr 10 17:10:17 u363id562 rtpengine[13839]: [cid3il8lc9432jo3iair] Returning to SIP proxy: d3:sdp2273:v=0#015#012o=- 3039037756476840958 2 IN IP4 1.1.1.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS BvNdmpBIxiDTYKfuot9JeFD89fHbTTPzK6MG#015#012m=audio 30136 RTP/AVP 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 1.1.1.1#015#012a=candidate:2999745851 1 udp 2113937151 192.168.56.1 60272 typ host generation 0#015#012a=candidate:2999745851 2 udp 2113937151 192.168.56.1 60272 typ host generation 0#015#012a=candidate:3350409123 1 udp 2113937151 192.168.0.101 60273 typ host generation 0#015#012a=candidate:3350409123 2 udp 2113937151 192.168.0.101 60273 typ host generation 0#015#012a=candidate:4233069003 1 tcp 1509957375 192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp 1509957375 192.168.56.1 0 typ host generation 0#015#012a=candidate:2301678419 1 tcp 1509957375 192.168.0.101 0 typ host generation 0#015#012a=candidate:2301678419 2 tcp 1509957375 192.168.0.101 0 typ host generation 0#015#012a=candidate:1190865175 1 udp 1845501695 2.2.2.2 60273 typ srflx raddr 192.168.0.101 rport 60273 generation 0#015#012a=candidate:1190865175 2 udp 1845501695 2.2.2.2 60273 typ srflx raddr 192.168.0.101 rport 60273 generation 0#015#012a=ice-ufrag:OQDSQjsP/gqERPJK#015#012a=ice-pwd:Yi4cb76Uyk2S8+v9yAiH1Rvq#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256 72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_32 inline:J/4necDa9RPPu8pBeS5/ATPlAUPbRN1i0sA1cH5h#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:1wAuy1eAPr5XVKEjzv+D43J6Ev86P6DIxPWugdC3#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:106 CN/32000#015#012a=rtpmap:105 CN/ Apr 10 17:10:47 u363id562 rtpengine[13839]: Got valid command from 127.0.0.1:34672: delete - { "call-id": "cid3il8lc9432jo3iair", "received-from": [ "IP4", "2.2.2.2" ], "from-tag": "26rk17462e", "command": "delete" } Apr 10 17:10:47 u363id562 rtpengine[13839]: [cid3il8lc9432jo3iair] Deleting full call Apr 10 17:10:47 u363id562 rtpengine[13839]: [cid3il8lc9432jo3iair] Final packet stats: Apr 10 17:10:47 u363id562 rtpengine[13839]: [cid3il8lc9432jo3iair] --- Tag '', created 0:30 ago, in dialogue with '(none)' Apr 10 17:10:47 u363id562 rtpengine[13839]: [cid3il8lc9432jo3iair] ------ Media #1, port 30138 <> 2.2.2.2:60273, 0 p, 0 b, 0 e Apr 10 17:10:47 u363id562 rtpengine[13839]: [cid3il8lc9432jo3iair] --- Tag '26rk17462e', created 0:30 ago, in dialogue with '' Apr 10 17:10:47 u363id562 rtpengine[13839]: [cid3il8lc9432jo3iair] ------ Media #1, port 30136 <> [::]:0 , 0 p, 0 b, 0 e Apr 10 17:10:47 u363id562 rtpengine[13839]: [cid3il8lc9432jo3iair] Returning to SIP proxy: d6:result2:oke
2014-04-09 15:00 GMT+03:00 Peter Dunkley peter.dunkley@acision.com:
Indeed, which works for simple demos and fits on a single slide - the whole purpose of that presentation. If someone is building a production system they really need to understand the various use-cases they will see and write their Kamailio configuration properly.
Regards,
Peter
On 6 April 2014 19:58, Juha Heinanen jh@tutpro.com wrote:
Olli Heiskanen writes:
Thanks, I'll look into the rtpengine, had a busy weekend but next week
I'll
have better time.
what comes to peter's slideshare failure_route example, i think it only works in very simple unrealistic scenario when there is no forking or serial routing. also, its nathelper handling is unnecessary when websocket sip ua, such as jssip, supports gruu.
-- juha
SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list sr-users@lists.sip-router.org http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users
-- Peter Dunkley Technical Director Acision
SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list sr-users@lists.sip-router.org http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users