Hello,

After some tests, I'm still having some strange results. 

When calling from ws client to grandstream, I get the below output to /var/log/messages.
In a sip trace after 488 there are only INVITEs from kamailio server to grandstream but no responses come back to kamailio server. 

I haven't changed any other configurations, kamailio or otherwise. I run the rtpengine like this:
/usr/sbin/rtpengine --table=0 --ip=1.1.1.1 --listen-udp=127.0.0.1:7722 --listen-ng=127.0.0.1:7723 --tos=184 --pidfile=/var/run/rtpengine.pid
(where 1.1.1.1 is my kamailio server ip)

How do I work out the problem from here? Please let me know if you need any further info or logs and I'll dig those out.

cheers,
Olli


Apr 10 17:10:16 u363id562 kamailio[10451]: INFO: <script>: GOT An Initial SIP MESSAGE INVITE from sip:wsclient@testers.com
Apr 10 17:10:17 u363id562 kamailio[10451]: INFO: <script>: GOT An Initial SIP MESSAGE INVITE from sip:wsclient@testers.com
Apr 10 17:10:17 u363id562 kamailio[10451]: INFO: <script>: DEBUG: user wsclient authenticated
Apr 10 17:10:17 u363id562 rtpengine[13839]: Got valid command from 127.0.0.1:35608: offer - { "sdp": "v=0#015#012o=- 3039037756476840958 2 IN IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS BvNdmpBIxiDTYKfuot9JeFD89fHbTTPzK6MG#015#012m=audio 60273 RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 2.2.2.2#015#012a=rtcp:60273 IN IP4 2.2.2.2#015#012a=candidate:2999745851 1 udp 2113937151 192.168.56.1 60272 typ host generation 0#015#012a=candidate:2999745851 2 udp 2113937151 192.168.56.1 60272 typ host generation 0#015#012a=candidate:3350409123 1 udp 2113937151 192.168.0.101 60273 typ host generation 0#015#012a=candidate:3350409123 2 udp 2113937151 192.168.0.101 60273 typ host generation 0#015#012a=candidate:4233069003 1 tcp 1509957375 192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp 1509957375 192.168.56.1 0 typ host generation 0#015#012a=candidate:2301678419 1 tcp 1509957375 192.168.0.101 0 typ host generation 0#015#012a=candidate:2301678419 2 tcp 1509957375 192.168.0.101 0 typ host generation 0#015#012a=candidate:1190865175 1 udp 1845501695 2.2.2.2 60273 typ srflx raddr 192.168.0.101 rport 60273 generation 0#015#012a=candidate:1190865175 2 udp 1845501695 2.2.2.2 60273 typ srflx raddr 192.168.0.101 rport 60273 generation 0#015#012a=ice-ufrag:OQDSQjsP/gqERPJK#015#012a=ice-pwd:Yi4cb76Uyk2S8+v9yAiH1Rvq#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256 72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=sendrecv#015#012a=rtcp-mux#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_32 inline:J/4necDa9RPPu8pBeS5/ATPlAUPbRN1i0sA1cH5h#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:1wAuy1eAPr5XVKEjzv+D43J6Ev86P6DIxPWugdC3#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015#012
Apr 10 17:10:17 u363id562 rtpengine[13839]: [cid3il8lc9432jo3iair] Creating new call
Apr 10 17:10:17 u363id562 rtpengine[13839]: [cid3il8lc9432jo3iair] Returning to SIP proxy: d3:sdp2275:v=0#015#012o=- 3039037756476840958 2 IN IP4 1.1.1.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS BvNdmpBIxiDTYKfuot9JeFD89fHbTTPzK6MG#015#012m=audio 30136 RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 1.1.1.1#015#012a=candidate:2999745851 1 udp 2113937151 192.168.56.1 60272 typ host generation 0#015#012a=candidate:2999745851 2 udp 2113937151 192.168.56.1 60272 typ host generation 0#015#012a=candidate:3350409123 1 udp 2113937151 192.168.0.101 60273 typ host generation 0#015#012a=candidate:3350409123 2 udp 2113937151 192.168.0.101 60273 typ host generation 0#015#012a=candidate:4233069003 1 tcp 1509957375 192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp 1509957375 192.168.56.1 0 typ host generation 0#015#012a=candidate:2301678419 1 tcp 1509957375 192.168.0.101 0 typ host generation 0#015#012a=candidate:2301678419 2 tcp 1509957375 192.168.0.101 0 typ host generation 0#015#012a=candidate:1190865175 1 udp 1845501695 2.2.2.2 60273 typ srflx raddr 192.168.0.101 rport 60273 generation 0#015#012a=candidate:1190865175 2 udp 1845501695 2.2.2.2 60273 typ srflx raddr 192.168.0.101 rport 60273 generation 0#015#012a=ice-ufrag:OQDSQjsP/gqERPJK#015#012a=ice-pwd:Yi4cb76Uyk2S8+v9yAiH1Rvq#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256 72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_32 inline:J/4necDa9RPPu8pBeS5/ATPlAUPbRN1i0sA1cH5h#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:1wAuy1eAPr5XVKEjzv+D43J6Ev86P6DIxPWugdC3#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:106 CN/32000#015#012a=rtpmap:105 C
Apr 10 17:10:17 u363id562 kamailio[10437]: NOTICE: acc [acc.c:315]: acc_log_request(): ACC: call missed: timestamp=1397135417;method=INVITE;from_tag=26rk17462e;to_tag=ffce92879a57942a;call_id=cid3il8lc9432jo3iair;code=488;reason=Not Acceptable Here;src_user=wsclient;src_domain=testers.com;src_ip=2.2.2.2;dst_ouser=gsclient;dst_user=gsclient;dst_domain=192.168.0.106
Apr 10 17:10:17 u363id562 rtpengine[13839]: Got valid command from 127.0.0.1:55156: offer - { "sdp": "v=0#015#012o=- 3039037756476840958 2 IN IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS BvNdmpBIxiDTYKfuot9JeFD89fHbTTPzK6MG#015#012m=audio 60273 RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 2.2.2.2#015#012a=rtcp:60273 IN IP4 2.2.2.2#015#012a=candidate:2999745851 1 udp 2113937151 192.168.56.1 60272 typ host generation 0#015#012a=candidate:2999745851 2 udp 2113937151 192.168.56.1 60272 typ host generation 0#015#012a=candidate:3350409123 1 udp 2113937151 192.168.0.101 60273 typ host generation 0#015#012a=candidate:3350409123 2 udp 2113937151 192.168.0.101 60273 typ host generation 0#015#012a=candidate:4233069003 1 tcp 1509957375 192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp 1509957375 192.168.56.1 0 typ host generation 0#015#012a=candidate:2301678419 1 tcp 1509957375 192.168.0.101 0 typ host generation 0#015#012a=candidate:2301678419 2 tcp 1509957375 192.168.0.101 0 typ host generation 0#015#012a=candidate:1190865175 1 udp 1845501695 2.2.2.2 60273 typ srflx raddr 192.168.0.101 rport 60273 generation 0#015#012a=candidate:1190865175 2 udp 1845501695 2.2.2.2 60273 typ srflx raddr 192.168.0.101 rport 60273 generation 0#015#012a=ice-ufrag:OQDSQjsP/gqERPJK#015#012a=ice-pwd:Yi4cb76Uyk2S8+v9yAiH1Rvq#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256 72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=sendrecv#015#012a=rtcp-mux#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_32 inline:J/4necDa9RPPu8pBeS5/ATPlAUPbRN1i0sA1cH5h#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:1wAuy1eAPr5XVKEjzv+D43J6Ev86P6DIxPWugdC3#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015#012
Apr 10 17:10:17 u363id562 rtpengine[13839]: [cid3il8lc9432jo3iair] Returning to SIP proxy: d3:sdp2123:v=0#015#012o=- 3039037756476840958 2 IN IP4 1.1.1.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS BvNdmpBIxiDTYKfuot9JeFD89fHbTTPzK6MG#015#012m=audio 30136 RTP/AVP 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 1.1.1.1#015#012a=candidate:2999745851 1 udp 2113937151 192.168.56.1 60272 typ host generation 0#015#012a=candidate:2999745851 2 udp 2113937151 192.168.56.1 60272 typ host generation 0#015#012a=candidate:3350409123 1 udp 2113937151 192.168.0.101 60273 typ host generation 0#015#012a=candidate:3350409123 2 udp 2113937151 192.168.0.101 60273 typ host generation 0#015#012a=candidate:4233069003 1 tcp 1509957375 192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp 1509957375 192.168.56.1 0 typ host generation 0#015#012a=candidate:2301678419 1 tcp 1509957375 192.168.0.101 0 typ host generation 0#015#012a=candidate:2301678419 2 tcp 1509957375 192.168.0.101 0 typ host generation 0#015#012a=candidate:1190865175 1 udp 1845501695 2.2.2.2 60273 typ srflx raddr 192.168.0.101 rport 60273 generation 0#015#012a=candidate:1190865175 2 udp 1845501695 2.2.2.2 60273 typ srflx raddr 192.168.0.101 rport 60273 generation 0#015#012a=ice-ufrag:OQDSQjsP/gqERPJK#015#012a=ice-pwd:Yi4cb76Uyk2S8+v9yAiH1Rvq#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256 72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_32 inline:J/4necDa9RPPu8pBeS5/ATPlAUPbRN1i0sA1cH5h#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:1wAuy1eAPr5XVKEjzv+D43J6Ev86P6DIxPWugdC3#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:106 CN/32000#015#012a=rtpmap:105 CN/
Apr 10 17:10:17 u363id562 rtpengine[13839]: Got valid command from 127.0.0.1:55156: offer - { "sdp": "v=0#015#012o=- 3039037756476840958 2 IN IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS BvNdmpBIxiDTYKfuot9JeFD89fHbTTPzK6MG#015#012m=audio 60273 RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 2.2.2.2#015#012a=rtcp:60273 IN IP4 2.2.2.2#015#012a=candidate:2999745851 1 udp 2113937151 192.168.56.1 60272 typ host generation 0#015#012a=candidate:2999745851 2 udp 2113937151 192.168.56.1 60272 typ host generation 0#015#012a=candidate:3350409123 1 udp 2113937151 192.168.0.101 60273 typ host generation 0#015#012a=candidate:3350409123 2 udp 2113937151 192.168.0.101 60273 typ host generation 0#015#012a=candidate:4233069003 1 tcp 1509957375 192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp 1509957375 192.168.56.1 0 typ host generation 0#015#012a=candidate:2301678419 1 tcp 1509957375 192.168.0.101 0 typ host generation 0#015#012a=candidate:2301678419 2 tcp 1509957375 192.168.0.101 0 typ host generation 0#015#012a=candidate:1190865175 1 udp 1845501695 2.2.2.2 60273 typ srflx raddr 192.168.0.101 rport 60273 generation 0#015#012a=candidate:1190865175 2 udp 1845501695 2.2.2.2 60273 typ srflx raddr 192.168.0.101 rport 60273 generation 0#015#012a=ice-ufrag:OQDSQjsP/gqERPJK#015#012a=ice-pwd:Yi4cb76Uyk2S8+v9yAiH1Rvq#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256 72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=sendrecv#015#012a=rtcp-mux#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_32 inline:J/4necDa9RPPu8pBeS5/ATPlAUPbRN1i0sA1cH5h#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:1wAuy1eAPr5XVKEjzv+D43J6Ev86P6DIxPWugdC3#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015#012
Apr 10 17:10:17 u363id562 rtpengine[13839]: [cid3il8lc9432jo3iair] Returning to SIP proxy: d3:sdp2273:v=0#015#012o=- 3039037756476840958 2 IN IP4 1.1.1.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS BvNdmpBIxiDTYKfuot9JeFD89fHbTTPzK6MG#015#012m=audio 30136 RTP/AVP 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 1.1.1.1#015#012a=candidate:2999745851 1 udp 2113937151 192.168.56.1 60272 typ host generation 0#015#012a=candidate:2999745851 2 udp 2113937151 192.168.56.1 60272 typ host generation 0#015#012a=candidate:3350409123 1 udp 2113937151 192.168.0.101 60273 typ host generation 0#015#012a=candidate:3350409123 2 udp 2113937151 192.168.0.101 60273 typ host generation 0#015#012a=candidate:4233069003 1 tcp 1509957375 192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp 1509957375 192.168.56.1 0 typ host generation 0#015#012a=candidate:2301678419 1 tcp 1509957375 192.168.0.101 0 typ host generation 0#015#012a=candidate:2301678419 2 tcp 1509957375 192.168.0.101 0 typ host generation 0#015#012a=candidate:1190865175 1 udp 1845501695 2.2.2.2 60273 typ srflx raddr 192.168.0.101 rport 60273 generation 0#015#012a=candidate:1190865175 2 udp 1845501695 2.2.2.2 60273 typ srflx raddr 192.168.0.101 rport 60273 generation 0#015#012a=ice-ufrag:OQDSQjsP/gqERPJK#015#012a=ice-pwd:Yi4cb76Uyk2S8+v9yAiH1Rvq#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256 72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_32 inline:J/4necDa9RPPu8pBeS5/ATPlAUPbRN1i0sA1cH5h#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:1wAuy1eAPr5XVKEjzv+D43J6Ev86P6DIxPWugdC3#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:106 CN/32000#015#012a=rtpmap:105 CN/
Apr 10 17:10:47 u363id562 rtpengine[13839]: Got valid command from 127.0.0.1:34672: delete - { "call-id": "cid3il8lc9432jo3iair", "received-from": [ "IP4", "2.2.2.2" ], "from-tag": "26rk17462e", "command": "delete" }
Apr 10 17:10:47 u363id562 rtpengine[13839]: [cid3il8lc9432jo3iair] Deleting full call
Apr 10 17:10:47 u363id562 rtpengine[13839]: [cid3il8lc9432jo3iair] Final packet stats:
Apr 10 17:10:47 u363id562 rtpengine[13839]: [cid3il8lc9432jo3iair] --- Tag '', created 0:30 ago, in dialogue with '(none)'
Apr 10 17:10:47 u363id562 rtpengine[13839]: [cid3il8lc9432jo3iair] ------ Media #1, port 30138 <>    2.2.2.2:60273, 0 p, 0 b, 0 e
Apr 10 17:10:47 u363id562 rtpengine[13839]: [cid3il8lc9432jo3iair] --- Tag '26rk17462e', created 0:30 ago, in dialogue with ''
Apr 10 17:10:47 u363id562 rtpengine[13839]: [cid3il8lc9432jo3iair] ------ Media #1, port 30136 <>            [::]:0    , 0 p, 0 b, 0 e
Apr 10 17:10:47 u363id562 rtpengine[13839]: [cid3il8lc9432jo3iair] Returning to SIP proxy: d6:result2:oke





2014-04-09 15:00 GMT+03:00 Peter Dunkley <peter.dunkley@acision.com>:
Indeed, which works for simple demos and fits on a single slide - the whole purpose of that presentation.  If someone is building a production system they really need to understand the various use-cases they will see and write their Kamailio configuration properly.

Regards,

Peter




On 6 April 2014 19:58, Juha Heinanen <jh@tutpro.com> wrote:
Olli Heiskanen writes:

> Thanks, I'll look into the rtpengine, had a busy weekend but next week I'll
> have better time.

what comes to peter's slideshare failure_route example, i think it only
works in very simple unrealistic scenario when there is no forking or
serial routing.  also, its nathelper handling is unnecessary when
websocket sip ua, such as jssip, supports gruu.

-- juha

_______________________________________________
SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
sr-users@lists.sip-router.org
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users



--
Peter Dunkley
Technical Director
Acision

_______________________________________________
SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
sr-users@lists.sip-router.org
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users