Hello,

I'm probably still doing something wrong, I still get 488 from the grandstream. Also zoiper refuses the call with 415 Unsupported Media Type.

According to the module description I tried to change my config to this:
Btw, thanks for enabling verbose flags, those are more readable when working on the config file.

if ( t_check_status("488") && sdp_content() ) {
  if ( sdp_get_line_startswith("$avp(mline)", "m=") ) {
    if ($avp(mline) =~ "SAVPF") {
      $avp(rtpproxy_offer_flags) = "rtcp-mux-demux force trust-address replace-origin replace-session-connection ICE=force RTP/SAVPF";
      $avp(rtpproxy_answer_flags) = "rtcp-mux-demux force trust-address replace-origin replace-session-connection ICE=remove RTP/SAVPF";
    } else {
      $avp(rtpproxy_offer_flags) = "rtcp-mux-demux force trust-address replace-origin replace-session-connection ICE=remove RTP/SAVPF";
      $avp(rtpproxy_answer_flags) = "rtcp-mux-demux force trust-address replace-origin replace-session-connection ICE=force RTP/SAVPF";
    }
  }
}


Below is the output from tail -f /var/log/messages when trying to call from wsclient to gsclient
(are there any debug options etc to enable full logs being written to syslog to help get the whole data out?)

I tried using -s0 option when using ngrep but the sdp still gets cut off for some reason, that didn't help much... Although I think there are full sdp when I write the output to a pcap file. I wonder if there's a trick to force full packets onto ngrep output without writing to file?


Apr 12 17:15:33 u363id562 kamailio[22688]: INFO: <script>: GOT An Initial SIP MESSAGE INVITE from sip:wsclient@testers.com
Apr 12 17:15:33 u363id562 kamailio[22688]: INFO: <script>: GOT An Initial SIP MESSAGE INVITE from sip:wsclient@testers.com
Apr 12 17:15:33 u363id562 kamailio[22688]: INFO: <script>: DEBUG: user wsclient authenticated
Apr 12 17:15:33 u363id562 rtpengine[13839]: Got valid command from 127.0.0.1:41760: offer - { "sdp": "v=0#015#012o=- 3596210531114072957 2 IN IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS dB4OToiqJrPwyddaFPR6VmIiYUu1yV9fg2ik#015#012m=audio 52996 RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 2.2.2.2#015#012a=rtcp:52996 IN IP4 2.2.2.2#015#012a=candidate:2999745851 1 udp 2122260223 192.168.56.1 52995 typ host generation 0#015#012a=candidate:2999745851 2 udp 2122260223 192.168.56.1 52995 typ host generation 0#015#012a=candidate:3350409123 1 udp 2122194687 192.168.0.101 52996 typ host generation 0#015#012a=candidate:3350409123 2 udp 2122194687 192.168.0.101 52996 typ host generation 0#015#012a=candidate:4233069003 1 tcp 1518280447 192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp 1518280447 192.168.56.1 0 typ host generation 0#015#012a=candidate:2301678419 1 tcp 1518214911 192.168.0.101 0 typ host generation 0#015#012a=candidate:2301678419 2 tcp 1518214911 192.168.0.101 0 typ host generation 0#015#012a=candidate:1190865175 1 udp 1685987071 2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation 0#015#012a=candidate:1190865175 2 udp 1685987071 2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation 0#015#012a=ice-ufrag:bAf6DoE8PTGZLWt9#015#012a=ice-pwd:HAEbKFAcaBfZXOVKZF3T0tX0#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256 72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=sendrecv#015#012a=rtcp-mux#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_32 inline:bVuZwhkjJpK/dTaBmrbPzh8SVzzBhmYmRYMl5pkb#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:1UQgbnwi5BH4w1Dc71HYvF2Qp4zAfVl2HT6EE+Mn#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015#012
Apr 12 17:15:33 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] Creating new call
Apr 12 17:15:33 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] Returning to SIP proxy: d3:sdp2276:v=0#015#012o=- 3596210531114072957 2 IN IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS dB4OToiqJrPwyddaFPR6VmIiYUu1yV9fg2ik#015#012m=audio 30240 RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 1.1.1.1#015#012a=candidate:2999745851 1 udp 2122260223 192.168.56.1 52995 typ host generation 0#015#012a=candidate:2999745851 2 udp 2122260223 192.168.56.1 52995 typ host generation 0#015#012a=candidate:3350409123 1 udp 2122194687 192.168.0.101 52996 typ host generation 0#015#012a=candidate:3350409123 2 udp 2122194687 192.168.0.101 52996 typ host generation 0#015#012a=candidate:4233069003 1 tcp 1518280447 192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp 1518280447 192.168.56.1 0 typ host generation 0#015#012a=candidate:2301678419 1 tcp 1518214911 192.168.0.101 0 typ host generation 0#015#012a=candidate:2301678419 2 tcp 1518214911 192.168.0.101 0 typ host generation 0#015#012a=candidate:1190865175 1 udp 1685987071 2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation 0#015#012a=candidate:1190865175 2 udp 1685987071 2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation 0#015#012a=ice-ufrag:bAf6DoE8PTGZLWt9#015#012a=ice-pwd:HAEbKFAcaBfZXOVKZF3T0tX0#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256 72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_32 inline:bVuZwhkjJpK/dTaBmrbPzh8SVzzBhmYmRYMl5pkb#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:1UQgbnwi5BH4w1Dc71HYvF2Qp4zAfVl2HT6EE+Mn#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:106 CN/32000#015#012a=rtpmap:105 CN/1
Apr 12 17:15:33 u363id562 kamailio[22674]: NOTICE: acc [acc.c:315]: acc_log_request(): ACC: call missed: timestamp=1397308533;method=INVITE;from_tag=6444olaqoi;to_tag=b364b8b4a27abfb1;call_id=dtgbbcrpth16rb2ks58c;code=488;reason=Not Acceptable Here;src_user=wsclient;src_domain=testers.com;src_ip=2.2.2.2;dst_ouser=gsclient;dst_user=gsclient;dst_domain=192.168.0.106
Apr 12 17:15:33 u363id562 kamailio[22674]: ALERT: <script>: SAVPF found, setting flags using: ICE=force RTP/SAVPF in offer and ICE=remove RTP/SAVPF in answer
Apr 12 17:15:33 u363id562 rtpengine[13839]: Got valid command from 127.0.0.1:54535: offer - { "sdp": "v=0#015#012o=- 3596210531114072957 2 IN IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS dB4OToiqJrPwyddaFPR6VmIiYUu1yV9fg2ik#015#012m=audio 52996 RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 2.2.2.2#015#012a=rtcp:52996 IN IP4 2.2.2.2#015#012a=candidate:2999745851 1 udp 2122260223 192.168.56.1 52995 typ host generation 0#015#012a=candidate:2999745851 2 udp 2122260223 192.168.56.1 52995 typ host generation 0#015#012a=candidate:3350409123 1 udp 2122194687 192.168.0.101 52996 typ host generation 0#015#012a=candidate:3350409123 2 udp 2122194687 192.168.0.101 52996 typ host generation 0#015#012a=candidate:4233069003 1 tcp 1518280447 192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp 1518280447 192.168.56.1 0 typ host generation 0#015#012a=candidate:2301678419 1 tcp 1518214911 192.168.0.101 0 typ host generation 0#015#012a=candidate:2301678419 2 tcp 1518214911 192.168.0.101 0 typ host generation 0#015#012a=candidate:1190865175 1 udp 1685987071 2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation 0#015#012a=candidate:1190865175 2 udp 1685987071 2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation 0#015#012a=ice-ufrag:bAf6DoE8PTGZLWt9#015#012a=ice-pwd:HAEbKFAcaBfZXOVKZF3T0tX0#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256 72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=sendrecv#015#012a=rtcp-mux#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_32 inline:bVuZwhkjJpK/dTaBmrbPzh8SVzzBhmYmRYMl5pkb#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:1UQgbnwi5BH4w1Dc71HYvF2Qp4zAfVl2HT6EE+Mn#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015#012
Apr 12 17:15:33 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] Returning to SIP proxy: d3:sdp2267:v=0#015#012o=- 3596210531114072957 2 IN IP4 1.1.1.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS dB4OToiqJrPwyddaFPR6VmIiYUu1yV9fg2ik#015#012m=audio 30240 RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 1.1.1.1#015#012a=candidate:2999745851 1 udp 2122260223 192.168.56.1 52995 typ host generation 0#015#012a=candidate:2999745851 2 udp 2122260223 192.168.56.1 52995 typ host generation 0#015#012a=candidate:3350409123 1 udp 2122194687 192.168.0.101 52996 typ host generation 0#015#012a=candidate:3350409123 2 udp 2122194687 192.168.0.101 52996 typ host generation 0#015#012a=candidate:4233069003 1 tcp 1518280447 192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp 1518280447 192.168.56.1 0 typ host generation 0#015#012a=candidate:2301678419 1 tcp 1518214911 192.168.0.101 0 typ host generation 0#015#012a=candidate:2301678419 2 tcp 1518214911 192.168.0.101 0 typ host generation 0#015#012a=candidate:1190865175 1 udp 1685987071 2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation 0#015#012a=candidate:1190865175 2 udp 1685987071 2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation 0#015#012a=ice-ufrag:bAf6DoE8PTGZLWt9#015#012a=ice-pwd:HAEbKFAcaBfZXOVKZF3T0tX0#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256 72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_32 inline:bVuZwhkjJpK/dTaBmrbPzh8SVzzBhmYmRYMl5pkb#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:1UQgbnwi5BH4w1Dc71HYvF2Qp4zAfVl2HT6EE+Mn#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:106 CN/32000#015#012a=rtpmap:105 C
Apr 12 17:15:33 u363id562 rtpengine[13839]: Got valid command from 127.0.0.1:54535: offer - { "sdp": "v=0#015#012o=- 3596210531114072957 2 IN IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS dB4OToiqJrPwyddaFPR6VmIiYUu1yV9fg2ik#015#012m=audio 52996 RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 2.2.2.2#015#012a=rtcp:52996 IN IP4 2.2.2.2#015#012a=candidate:2999745851 1 udp 2122260223 192.168.56.1 52995 typ host generation 0#015#012a=candidate:2999745851 2 udp 2122260223 192.168.56.1 52995 typ host generation 0#015#012a=candidate:3350409123 1 udp 2122194687 192.168.0.101 52996 typ host generation 0#015#012a=candidate:3350409123 2 udp 2122194687 192.168.0.101 52996 typ host generation 0#015#012a=candidate:4233069003 1 tcp 1518280447 192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp 1518280447 192.168.56.1 0 typ host generation 0#015#012a=candidate:2301678419 1 tcp 1518214911 192.168.0.101 0 typ host generation 0#015#012a=candidate:2301678419 2 tcp 1518214911 192.168.0.101 0 typ host generation 0#015#012a=candidate:1190865175 1 udp 1685987071 2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation 0#015#012a=candidate:1190865175 2 udp 1685987071 2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation 0#015#012a=ice-ufrag:bAf6DoE8PTGZLWt9#015#012a=ice-pwd:HAEbKFAcaBfZXOVKZF3T0tX0#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256 72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=sendrecv#015#012a=rtcp-mux#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_32 inline:bVuZwhkjJpK/dTaBmrbPzh8SVzzBhmYmRYMl5pkb#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:1UQgbnwi5BH4w1Dc71HYvF2Qp4zAfVl2HT6EE+Mn#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015#012
Apr 12 17:15:33 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] Returning to SIP proxy: d3:sdp2276:v=0#015#012o=- 3596210531114072957 2 IN IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS dB4OToiqJrPwyddaFPR6VmIiYUu1yV9fg2ik#015#012m=audio 30240 RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 1.1.1.1#015#012a=candidate:2999745851 1 udp 2122260223 192.168.56.1 52995 typ host generation 0#015#012a=candidate:2999745851 2 udp 2122260223 192.168.56.1 52995 typ host generation 0#015#012a=candidate:3350409123 1 udp 2122194687 192.168.0.101 52996 typ host generation 0#015#012a=candidate:3350409123 2 udp 2122194687 192.168.0.101 52996 typ host generation 0#015#012a=candidate:4233069003 1 tcp 1518280447 192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp 1518280447 192.168.56.1 0 typ host generation 0#015#012a=candidate:2301678419 1 tcp 1518214911 192.168.0.101 0 typ host generation 0#015#012a=candidate:2301678419 2 tcp 1518214911 192.168.0.101 0 typ host generation 0#015#012a=candidate:1190865175 1 udp 1685987071 2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation 0#015#012a=candidate:1190865175 2 udp 1685987071 2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation 0#015#012a=ice-ufrag:bAf6DoE8PTGZLWt9#015#012a=ice-pwd:HAEbKFAcaBfZXOVKZF3T0tX0#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256 72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_32 inline:bVuZwhkjJpK/dTaBmrbPzh8SVzzBhmYmRYMl5pkb#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:1UQgbnwi5BH4w1Dc71HYvF2Qp4zAfVl2HT6EE+Mn#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:106 CN/32000#015#012a=rtpmap:105 CN/1
Apr 12 17:15:34 u363id562 kamailio[22689]: INFO: <script>: GOT An Initial SIP MESSAGE REGISTER from sip:zoiperclient2@testers.com;transport=TCP
Apr 12 17:15:34 u363id562 kamailio[22689]: INFO: <script>: GOT An Initial SIP MESSAGE REGISTER from sip:zoiperclient2@testers.com;transport=TCP
Apr 12 17:15:34 u363id562 kamailio[22689]: INFO: <script>: DEBUG: user zoiperclient2 authenticated
Apr 12 17:15:34 u363id562 kamailio[22689]: INFO: <script>: GOT An Initial SIP MESSAGE SUBSCRIBE from sip:zoiperclient2@testers.com;transport=TCP
Apr 12 17:15:34 u363id562 kamailio[22689]: INFO: <script>: GOT An Initial SIP MESSAGE SUBSCRIBE from sip:zoiperclient2@testers.com;transport=TCP
Apr 12 17:15:34 u363id562 kamailio[22689]: INFO: <script>: DEBUG: user zoiperclient2 authenticated
Apr 12 17:15:35 u363id562 kamailio[22690]: ERROR: <core> [tcp_read.c:289]: tcp_read_data(): error reading: Connection reset by peer (104)
Apr 12 17:15:35 u363id562 kamailio[22690]: ERROR: <core> [tcp_read.c:1281]: tcp_read_req(): ERROR: tcp_read_req: error reading
Apr 12 17:15:37 u363id562 rtpengine[13839]: Got valid command from 127.0.0.1:36626: delete - { "call-id": "dtgbbcrpth16rb2ks58c", "received-from": [ "IP4", "2.2.2.2" ], "from-tag": "6444olaqoi", "command": "delete" }
Apr 12 17:15:37 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] Deleting full call
Apr 12 17:15:37 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] Final packet stats:
Apr 12 17:15:37 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] --- Tag '', created 0:04 ago, in dialogue with '(none)'
Apr 12 17:15:37 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] ------ Media #1, port 30242 <>    2.2.2.2:52996, 0 p, 0 b, 0 e
Apr 12 17:15:37 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] --- Tag '6444olaqoi', created 0:04 ago, in dialogue with ''
Apr 12 17:15:37 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] ------ Media #1, port 30240 <>            [::]:0    , 0 p, 0 b, 0 e
Apr 12 17:15:37 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] Returning to SIP proxy: d6:result2:oke




cheers,
Olli
 


2014-04-10 16:48 GMT+03:00 Richard Fuchs <rfuchs@sipwise.com>:
On 04/10/14 09:26, Olli Heiskanen wrote:
>
> Hello,
>
> After some tests, I'm still having some strange results.
>
> When calling from ws client to grandstream, I get the below output to
> /var/log/messages.
> In a sip trace after 488 there are only INVITEs from kamailio server to
> grandstream but no responses come back to kamailio server.
>
> I haven't changed any other configurations, kamailio or otherwise. I run
> the rtpengine like this:
> /usr/sbin/rtpengine --table=0 --ip=1.1.1.1 --listen-udp=127.0.0.1:7722
> <http://127.0.0.1:7722> --listen-ng=127.0.0.1:7723
> <http://127.0.0.1:7723> --tos=184 --pidfile=/var/run/rtpengine.pid
> (where 1.1.1.1 is my kamailio server ip)
>
> How do I work out the problem from here? Please let me know if you need
> any further info or logs and I'll dig those out.
>

Unfortunately the log lines are cut off and don't include the entire
command packet to rtpengine, but my guess is that you omitted the ICE
handling parameter, which (as of a few days ago) forces rtpengine into
passthrough mode, which means that most of the RTP/SAVPF attributes are
left in place. My guess is that this confuses the grandstream.

You should use either ICE=force or ICE=remove (formerly "+" or "-"
flags) to make sure rtpengine is actually able to bridge between the
protocols. You should also add the "rtcp-mux-demux" flag (through
rtpengine module) in case the grandstream gets confused by rtcp-mux
being offered.

With those two in place, the resulting RTP/AVP SDP should be very small
and clean.

cheers


_______________________________________________
SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
sr-users@lists.sip-router.org
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users