Hey,
Your use case (injecting ICE candidates only) won't work with Firefox
right now, as mediaproxy-ng now speaks DTLS-SRTP and so wants to use its
own DTLS certificate when advertising SRTP. Since FF's certificate won't
match MP-NG's certificate, the DTLS handshake can always only ever work
against one of the two.
What's missing is something like a "passthrough everything" mode, where
MP-NG becomes agnostic to the protocol being used and simply forwards
raw packets. Again, since this is not our focus of development, this
isn't implemented yet. But we're getting there.
That being said, I don't know if this is the actual reason for the error
you're seeing, but at least for now, there's not much point in trying.
However, Firefox <> Chrome should work nicely if you force the media
streams through MP-NG.
It should also be noted that there's still problems with WebRTC in
Firefox. For example it doesn't do ICE role switching correctly when
encountering ice-lite, and in your SDP I see that it's sending separate
ICE candidates for RTCP despite rtcp-mux being used, which is incorrect
in an answer.
Keep an eye on the repo for updates.
cheers
On 03/26/14 11:27, Mihai Marin wrote:
Hellor Sirs, Sir Richard,
I saw some updates in the last 2 weeks that were working with Firefox -
I also did some tests as it was working. Now, I tried to get the latest
version and I'm getting the following error:
mediaproxy-ng[2747]: Got valid command from 127.0.0.1:35127
<http://127.0.0.1:35127>: answer - { "sdp":
"v=0#015#012o=Mozilla-SIPUA-29.0a2 13431 0 IN IP4 0.0.0.0#015#012s=SIP
Call#015#012t=0
0#015#012a=ice-ufrag:8a9a3649#015#012a=ice-pwd:80b3b796ecdd0addb079fc531c7e0afa#015#012a=fingerprint:sha-256
A3:D7:1F:F6:60:1D:91:27:64:89:2E:09:CE:42:19:DB:7E:5F:02:06:A3:DA:E0:26:0F:F7:30:4C:1E:65:86:2B#015#012m=audio
50990 RTP/SAVPF 109 101#015#012c=IN IP4
188.215.94.132#015#012a=rtpmap:109
opus/48000/2#015#012a=ptime:20#015#012a=rtpmap:101
telephone-event/8000#015#012a=fmtp:101
0-15#015#012a=recvonly#015#012a=setup:active#015#012a=candidate:0 1 UDP
2128609535 192.168.0.5 50990 typ host#015#012a=candidate:1 1 UDP
1692467199 188.215.94.132 50990 typ srflx raddr 192.168.0.5 rport
50990#015#012a=candidate:0 2 UDP 2128609534 192.168.0.5 50991 typ
host#015#012a=candidate:1 2 UDP 1692467198 188.215.94.132 50991 typ
srflx raddr 192.168.0.5 rport 50991#015#012a=rtcp-mux#015#012m=video
50992 RTP/SAVPF 120#015#012c=IN IP4 188.215.94.132#015#012a=rtpmap:120
VP8/90000#015#012a=sendrecv#015#012a=rtcp-fb:120
nack#015#012a=rtcp-fb:120 nack pli#015#012a=rtcp-fb:120 ccm
fir#015#012a=setup:active#015#012a=candidate:0 1 UDP 2128609535
192.168.0.5 50992 typ host#015#012a=candidate:1 1 UDP 1692467199
188.215.94.132 50992 typ srflx raddr 192.168.0.5 rport
50992#015#012a=candidate:0 2 UDP 2128609534 192.168.0.5 50993 typ
host#015#012a=candidate:1 2 UDP 1692467198 188.215.94.132 50993 typ
srflx raddr 192.168.0.5 rport 50993#015#012a=rtcp-mux#015#012", "flags":
[ "force", "trust-address" ], "replace": [
"origin",
"session-connection" ], "call-id": "ufdo7gas8lt6jpco60b1",
"received-from": [ "IP4", "188.215.94.132" ],
"from-tag": "nj7tuhg5hj",
"to-tag": "7lpqrsa1eb", "command": "answer" }
mediaproxy-ng[2747]: [ufdo7gas8lt6jpco60b1] Returning to SIP proxy:
d3:sdp1463:v=0#015#012o=Mozilla-SIPUA-29.0a2 13431 0 IN IP4
0.0.0.0#015#012s=SIP Call#015#012t=0
0#015#012a=ice-ufrag:8a9a3649#015#012a=ice-pwd:80b3b796ecdd0addb079fc531c7e0afa#015#012m=audio
30002 RTP/SAVPF 109 101#015#012c=IN IP4
93.187.138.212#015#012a=rtpmap:109
opus/48000/2#015#012a=ptime:20#015#012a=rtpmap:101
telephone-event/8000#015#012a=fmtp:101 0-15#015#012a=candidate:0 1 UDP
2128609535 192.168.0.5 50990 typ host#015#012a=candidate:1 1 UDP
1692467199 188.215.94.132 50990 typ srflx raddr 192.168.0.5 rport
50990#015#012a=candidate:0 2 UDP 2128609534 192.168.0.5 50991 typ
host#015#012a=candidate:1 2 UDP 1692467198 188.215.94.132 50991 typ
srflx raddr 192.168.0.5 rport
50991#015#012a=recvonly#015#012a=rtcp:30002#015#012a=rtcp-mux#015#012a=setup:active#015#012a=fingerprint:sha-1
CA:7D:5B:F1:C8:1A:05:8E:9B:88:0F:36:9B:C4:7A:60:A3:B5:02:A4#015#012a=candidate:kgDINMdmuvprUMd6
1 UDP 2130706432 93.187.138.212 30002 typ host#015#012m=video 30006
RTP/SAVPF 120#015#012c=IN IP4 93.187.138.212#015#012a=rtpmap:120
VP8/90000#015#012a=rtcp-fb:120 nack#015#012a=rtcp-fb:120 nack
pli#015#012a=rtcp-fb:120 ccm fir#015#012a=candidate:0 1 UDP 2128609535
192.168.0.5 50992 typ host#015#012a=candidate:1 1 UDP 1692467199
188.215.94.132 50992 typ srflx raddr 192.168.0.5 rport
50992#015#012a=candidate:0 2 UDP 2128609534 192.168.0.5 50993 typ
host#015#012a=candidate:1 2 UDP 1692467198 188.215.94.132 50993 typ
srflx raddr 192.168.0.5 rport
50993#015#012a=sendrecv#015#012a=rtcp:30006#015#012a=rtcp-mux#015#012a=setup:active#015#012a=fingerprint:sha-1
CA:7D:5B:F1:C8:1A:05:8E:9B:88:0F:36:9B:C4:7A:60:A3:B5:02:A4#015#012a=candidate:kgDINMdmuvprUMd6
1 UDP 2130706432 93.187.138.212 30006 typ host#015#0126:result2:oke
mediaproxy-ng[2747]: [ufdo7gas8lt6jpco60b1 port 30000] Error parsing RTP
header: invalid header version
mediaproxy-ng[2747]: [ufdo7gas8lt6jpco60b1 port 30004] Error parsing RTP
header: invalid header version
mediaproxy-ng[2747]: [ufdo7gas8lt6jpco60b1 port 30002] Error parsing RTP
header: invalid header version
mediaproxy-ng[2747]: [ufdo7gas8lt6jpco60b1 port 30006] Error parsing RTP
header: invalid header version
I was dreaming one week ago when I saw Firefox working with chrome :)?
Do you know something about this error?
Thank you.
Best regards,
Mihai M
_______________________________________________
SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
sr-users(a)lists.sip-router.org
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users