Hello,
I'm probably still doing something wrong, I still get 488 from the grandstream. Also zoiper refuses the call with 415 Unsupported Media Type.
According to the module description I tried to change my config to this: Btw, thanks for enabling verbose flags, those are more readable when working on the config file.
if ( t_check_status("488") && sdp_content() ) { if ( sdp_get_line_startswith("$avp(mline)", "m=") ) { if ($avp(mline) =~ "SAVPF") { $avp(rtpproxy_offer_flags) = "rtcp-mux-demux force trust-address replace-origin replace-session-connection ICE=force RTP/SAVPF"; $avp(rtpproxy_answer_flags) = "rtcp-mux-demux force trust-address replace-origin replace-session-connection ICE=remove RTP/SAVPF"; } else { $avp(rtpproxy_offer_flags) = "rtcp-mux-demux force trust-address replace-origin replace-session-connection ICE=remove RTP/SAVPF"; $avp(rtpproxy_answer_flags) = "rtcp-mux-demux force trust-address replace-origin replace-session-connection ICE=force RTP/SAVPF"; } } }
Below is the output from tail -f /var/log/messages when trying to call from wsclient to gsclient (are there any debug options etc to enable full logs being written to syslog to help get the whole data out?)
I tried using -s0 option when using ngrep but the sdp still gets cut off for some reason, that didn't help much... Although I think there are full sdp when I write the output to a pcap file. I wonder if there's a trick to force full packets onto ngrep output without writing to file?
Apr 12 17:15:33 u363id562 kamailio[22688]: INFO: <script>: GOT An Initial SIP MESSAGE INVITE from sip:wsclient@testers.com Apr 12 17:15:33 u363id562 kamailio[22688]: INFO: <script>: GOT An Initial SIP MESSAGE INVITE from sip:wsclient@testers.com Apr 12 17:15:33 u363id562 kamailio[22688]: INFO: <script>: DEBUG: user wsclient authenticated Apr 12 17:15:33 u363id562 rtpengine[13839]: Got valid command from 127.0.0.1:41760: offer - { "sdp": "v=0#015#012o=- 3596210531114072957 2 IN IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS dB4OToiqJrPwyddaFPR6VmIiYUu1yV9fg2ik#015#012m=audio 52996 RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 2.2.2.2#015#012a=rtcp:52996 IN IP4 2.2.2.2#015#012a=candidate:2999745851 1 udp 2122260223 192.168.56.1 52995 typ host generation 0#015#012a=candidate:2999745851 2 udp 2122260223 192.168.56.1 52995 typ host generation 0#015#012a=candidate:3350409123 1 udp 2122194687 192.168.0.101 52996 typ host generation 0#015#012a=candidate:3350409123 2 udp 2122194687 192.168.0.101 52996 typ host generation 0#015#012a=candidate:4233069003 1 tcp 1518280447 192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp 1518280447 192.168.56.1 0 typ host generation 0#015#012a=candidate:2301678419 1 tcp 1518214911 192.168.0.101 0 typ host generation 0#015#012a=candidate:2301678419 2 tcp 1518214911 192.168.0.101 0 typ host generation 0#015#012a=candidate:1190865175 1 udp 1685987071 2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation 0#015#012a=candidate:1190865175 2 udp 1685987071 2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation 0#015#012a=ice-ufrag:bAf6DoE8PTGZLWt9#015#012a=ice-pwd:HAEbKFAcaBfZXOVKZF3T0tX0#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256 72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=sendrecv#015#012a=rtcp-mux#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_32 inline:bVuZwhkjJpK/dTaBmrbPzh8SVzzBhmYmRYMl5pkb#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:1UQgbnwi5BH4w1Dc71HYvF2Qp4zAfVl2HT6EE+Mn#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015#012 Apr 12 17:15:33 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] Creating new call Apr 12 17:15:33 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] Returning to SIP proxy: d3:sdp2276:v=0#015#012o=- 3596210531114072957 2 IN IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS dB4OToiqJrPwyddaFPR6VmIiYUu1yV9fg2ik#015#012m=audio 30240 RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 1.1.1.1#015#012a=candidate:2999745851 1 udp 2122260223 192.168.56.1 52995 typ host generation 0#015#012a=candidate:2999745851 2 udp 2122260223 192.168.56.1 52995 typ host generation 0#015#012a=candidate:3350409123 1 udp 2122194687 192.168.0.101 52996 typ host generation 0#015#012a=candidate:3350409123 2 udp 2122194687 192.168.0.101 52996 typ host generation 0#015#012a=candidate:4233069003 1 tcp 1518280447 192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp 1518280447 192.168.56.1 0 typ host generation 0#015#012a=candidate:2301678419 1 tcp 1518214911 192.168.0.101 0 typ host generation 0#015#012a=candidate:2301678419 2 tcp 1518214911 192.168.0.101 0 typ host generation 0#015#012a=candidate:1190865175 1 udp 1685987071 2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation 0#015#012a=candidate:1190865175 2 udp 1685987071 2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation 0#015#012a=ice-ufrag:bAf6DoE8PTGZLWt9#015#012a=ice-pwd:HAEbKFAcaBfZXOVKZF3T0tX0#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256 72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_32 inline:bVuZwhkjJpK/dTaBmrbPzh8SVzzBhmYmRYMl5pkb#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:1UQgbnwi5BH4w1Dc71HYvF2Qp4zAfVl2HT6EE+Mn#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:106 CN/32000#015#012a=rtpmap:105 CN/1 Apr 12 17:15:33 u363id562 kamailio[22674]: NOTICE: acc [acc.c:315]: acc_log_request(): ACC: call missed: timestamp=1397308533;method=INVITE;from_tag=6444olaqoi;to_tag=b364b8b4a27abfb1;call_id=dtgbbcrpth16rb2ks58c;code=488;reason=Not Acceptable Here;src_user=wsclient;src_domain=testers.com ;src_ip=2.2.2.2;dst_ouser=gsclient;dst_user=gsclient;dst_domain=192.168.0.106 Apr 12 17:15:33 u363id562 kamailio[22674]: ALERT: <script>: SAVPF found, setting flags using: ICE=force RTP/SAVPF in offer and ICE=remove RTP/SAVPF in answer Apr 12 17:15:33 u363id562 rtpengine[13839]: Got valid command from 127.0.0.1:54535: offer - { "sdp": "v=0#015#012o=- 3596210531114072957 2 IN IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS dB4OToiqJrPwyddaFPR6VmIiYUu1yV9fg2ik#015#012m=audio 52996 RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 2.2.2.2#015#012a=rtcp:52996 IN IP4 2.2.2.2#015#012a=candidate:2999745851 1 udp 2122260223 192.168.56.1 52995 typ host generation 0#015#012a=candidate:2999745851 2 udp 2122260223 192.168.56.1 52995 typ host generation 0#015#012a=candidate:3350409123 1 udp 2122194687 192.168.0.101 52996 typ host generation 0#015#012a=candidate:3350409123 2 udp 2122194687 192.168.0.101 52996 typ host generation 0#015#012a=candidate:4233069003 1 tcp 1518280447 192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp 1518280447 192.168.56.1 0 typ host generation 0#015#012a=candidate:2301678419 1 tcp 1518214911 192.168.0.101 0 typ host generation 0#015#012a=candidate:2301678419 2 tcp 1518214911 192.168.0.101 0 typ host generation 0#015#012a=candidate:1190865175 1 udp 1685987071 2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation 0#015#012a=candidate:1190865175 2 udp 1685987071 2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation 0#015#012a=ice-ufrag:bAf6DoE8PTGZLWt9#015#012a=ice-pwd:HAEbKFAcaBfZXOVKZF3T0tX0#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256 72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=sendrecv#015#012a=rtcp-mux#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_32 inline:bVuZwhkjJpK/dTaBmrbPzh8SVzzBhmYmRYMl5pkb#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:1UQgbnwi5BH4w1Dc71HYvF2Qp4zAfVl2HT6EE+Mn#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015#012 Apr 12 17:15:33 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] Returning to SIP proxy: d3:sdp2267:v=0#015#012o=- 3596210531114072957 2 IN IP4 1.1.1.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS dB4OToiqJrPwyddaFPR6VmIiYUu1yV9fg2ik#015#012m=audio 30240 RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 1.1.1.1#015#012a=candidate:2999745851 1 udp 2122260223 192.168.56.1 52995 typ host generation 0#015#012a=candidate:2999745851 2 udp 2122260223 192.168.56.1 52995 typ host generation 0#015#012a=candidate:3350409123 1 udp 2122194687 192.168.0.101 52996 typ host generation 0#015#012a=candidate:3350409123 2 udp 2122194687 192.168.0.101 52996 typ host generation 0#015#012a=candidate:4233069003 1 tcp 1518280447 192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp 1518280447 192.168.56.1 0 typ host generation 0#015#012a=candidate:2301678419 1 tcp 1518214911 192.168.0.101 0 typ host generation 0#015#012a=candidate:2301678419 2 tcp 1518214911 192.168.0.101 0 typ host generation 0#015#012a=candidate:1190865175 1 udp 1685987071 2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation 0#015#012a=candidate:1190865175 2 udp 1685987071 2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation 0#015#012a=ice-ufrag:bAf6DoE8PTGZLWt9#015#012a=ice-pwd:HAEbKFAcaBfZXOVKZF3T0tX0#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256 72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_32 inline:bVuZwhkjJpK/dTaBmrbPzh8SVzzBhmYmRYMl5pkb#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:1UQgbnwi5BH4w1Dc71HYvF2Qp4zAfVl2HT6EE+Mn#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:106 CN/32000#015#012a=rtpmap:105 C Apr 12 17:15:33 u363id562 rtpengine[13839]: Got valid command from 127.0.0.1:54535: offer - { "sdp": "v=0#015#012o=- 3596210531114072957 2 IN IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS dB4OToiqJrPwyddaFPR6VmIiYUu1yV9fg2ik#015#012m=audio 52996 RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 2.2.2.2#015#012a=rtcp:52996 IN IP4 2.2.2.2#015#012a=candidate:2999745851 1 udp 2122260223 192.168.56.1 52995 typ host generation 0#015#012a=candidate:2999745851 2 udp 2122260223 192.168.56.1 52995 typ host generation 0#015#012a=candidate:3350409123 1 udp 2122194687 192.168.0.101 52996 typ host generation 0#015#012a=candidate:3350409123 2 udp 2122194687 192.168.0.101 52996 typ host generation 0#015#012a=candidate:4233069003 1 tcp 1518280447 192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp 1518280447 192.168.56.1 0 typ host generation 0#015#012a=candidate:2301678419 1 tcp 1518214911 192.168.0.101 0 typ host generation 0#015#012a=candidate:2301678419 2 tcp 1518214911 192.168.0.101 0 typ host generation 0#015#012a=candidate:1190865175 1 udp 1685987071 2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation 0#015#012a=candidate:1190865175 2 udp 1685987071 2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation 0#015#012a=ice-ufrag:bAf6DoE8PTGZLWt9#015#012a=ice-pwd:HAEbKFAcaBfZXOVKZF3T0tX0#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256 72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=sendrecv#015#012a=rtcp-mux#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_32 inline:bVuZwhkjJpK/dTaBmrbPzh8SVzzBhmYmRYMl5pkb#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:1UQgbnwi5BH4w1Dc71HYvF2Qp4zAfVl2HT6EE+Mn#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015#012 Apr 12 17:15:33 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] Returning to SIP proxy: d3:sdp2276:v=0#015#012o=- 3596210531114072957 2 IN IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS dB4OToiqJrPwyddaFPR6VmIiYUu1yV9fg2ik#015#012m=audio 30240 RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 1.1.1.1#015#012a=candidate:2999745851 1 udp 2122260223 192.168.56.1 52995 typ host generation 0#015#012a=candidate:2999745851 2 udp 2122260223 192.168.56.1 52995 typ host generation 0#015#012a=candidate:3350409123 1 udp 2122194687 192.168.0.101 52996 typ host generation 0#015#012a=candidate:3350409123 2 udp 2122194687 192.168.0.101 52996 typ host generation 0#015#012a=candidate:4233069003 1 tcp 1518280447 192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp 1518280447 192.168.56.1 0 typ host generation 0#015#012a=candidate:2301678419 1 tcp 1518214911 192.168.0.101 0 typ host generation 0#015#012a=candidate:2301678419 2 tcp 1518214911 192.168.0.101 0 typ host generation 0#015#012a=candidate:1190865175 1 udp 1685987071 2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation 0#015#012a=candidate:1190865175 2 udp 1685987071 2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation 0#015#012a=ice-ufrag:bAf6DoE8PTGZLWt9#015#012a=ice-pwd:HAEbKFAcaBfZXOVKZF3T0tX0#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256 72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_32 inline:bVuZwhkjJpK/dTaBmrbPzh8SVzzBhmYmRYMl5pkb#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:1UQgbnwi5BH4w1Dc71HYvF2Qp4zAfVl2HT6EE+Mn#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:106 CN/32000#015#012a=rtpmap:105 CN/1 Apr 12 17:15:34 u363id562 kamailio[22689]: INFO: <script>: GOT An Initial SIP MESSAGE REGISTER from sip:zoiperclient2@testers.com;transport=TCP Apr 12 17:15:34 u363id562 kamailio[22689]: INFO: <script>: GOT An Initial SIP MESSAGE REGISTER from sip:zoiperclient2@testers.com;transport=TCP Apr 12 17:15:34 u363id562 kamailio[22689]: INFO: <script>: DEBUG: user zoiperclient2 authenticated Apr 12 17:15:34 u363id562 kamailio[22689]: INFO: <script>: GOT An Initial SIP MESSAGE SUBSCRIBE from sip:zoiperclient2@testers.com;transport=TCP Apr 12 17:15:34 u363id562 kamailio[22689]: INFO: <script>: GOT An Initial SIP MESSAGE SUBSCRIBE from sip:zoiperclient2@testers.com;transport=TCP Apr 12 17:15:34 u363id562 kamailio[22689]: INFO: <script>: DEBUG: user zoiperclient2 authenticated Apr 12 17:15:35 u363id562 kamailio[22690]: ERROR: <core> [tcp_read.c:289]: tcp_read_data(): error reading: Connection reset by peer (104) Apr 12 17:15:35 u363id562 kamailio[22690]: ERROR: <core> [tcp_read.c:1281]: tcp_read_req(): ERROR: tcp_read_req: error reading Apr 12 17:15:37 u363id562 rtpengine[13839]: Got valid command from 127.0.0.1:36626: delete - { "call-id": "dtgbbcrpth16rb2ks58c", "received-from": [ "IP4", "2.2.2.2" ], "from-tag": "6444olaqoi", "command": "delete" } Apr 12 17:15:37 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] Deleting full call Apr 12 17:15:37 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] Final packet stats: Apr 12 17:15:37 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] --- Tag '', created 0:04 ago, in dialogue with '(none)' Apr 12 17:15:37 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] ------ Media #1, port 30242 <> 2.2.2.2:52996, 0 p, 0 b, 0 e Apr 12 17:15:37 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] --- Tag '6444olaqoi', created 0:04 ago, in dialogue with '' Apr 12 17:15:37 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] ------ Media #1, port 30240 <> [::]:0 , 0 p, 0 b, 0 e Apr 12 17:15:37 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] Returning to SIP proxy: d6:result2:oke
cheers, Olli
2014-04-10 16:48 GMT+03:00 Richard Fuchs rfuchs@sipwise.com:
On 04/10/14 09:26, Olli Heiskanen wrote:
Hello,
After some tests, I'm still having some strange results.
When calling from ws client to grandstream, I get the below output to /var/log/messages. In a sip trace after 488 there are only INVITEs from kamailio server to grandstream but no responses come back to kamailio server.
I haven't changed any other configurations, kamailio or otherwise. I run the rtpengine like this: /usr/sbin/rtpengine --table=0 --ip=1.1.1.1 --listen-udp=127.0.0.1:7722 http://127.0.0.1:7722 --listen-ng=127.0.0.1:7723 http://127.0.0.1:7723 --tos=184 --pidfile=/var/run/rtpengine.pid (where 1.1.1.1 is my kamailio server ip)
How do I work out the problem from here? Please let me know if you need any further info or logs and I'll dig those out.
Unfortunately the log lines are cut off and don't include the entire command packet to rtpengine, but my guess is that you omitted the ICE handling parameter, which (as of a few days ago) forces rtpengine into passthrough mode, which means that most of the RTP/SAVPF attributes are left in place. My guess is that this confuses the grandstream.
You should use either ICE=force or ICE=remove (formerly "+" or "-" flags) to make sure rtpengine is actually able to bridge between the protocols. You should also add the "rtcp-mux-demux" flag (through rtpengine module) in case the grandstream gets confused by rtcp-mux being offered.
With those two in place, the resulting RTP/AVP SDP should be very small and clean.
cheers
SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list sr-users@lists.sip-router.org http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users