I'm probably still doing something wrong, I still get 488 from the grandstream. Also zoiper refuses the call with 415 Unsupported Media Type.
Btw, thanks for enabling verbose flags, those are more readable when working on the config file.
$avp(rtpproxy_offer_flags) = "rtcp-mux-demux force trust-address replace-origin replace-session-connection ICE=force RTP/SAVPF";
$avp(rtpproxy_answer_flags) = "rtcp-mux-demux force trust-address replace-origin replace-session-connection ICE=remove RTP/SAVPF";
$avp(rtpproxy_offer_flags) = "rtcp-mux-demux force trust-address replace-origin replace-session-connection ICE=remove RTP/SAVPF";
$avp(rtpproxy_answer_flags) = "rtcp-mux-demux force trust-address replace-origin replace-session-connection ICE=force RTP/SAVPF";
Below is the output from tail -f /var/log/messages when trying to call from wsclient to gsclient
(are there any debug options etc to enable full logs being written to syslog to help get the whole data out?)
I tried using -s0 option when using ngrep but the sdp still gets cut off for some reason, that didn't help much... Although I think there are full sdp when I write the output to a pcap file. I wonder if there's a trick to force full packets onto ngrep output without writing to file?
Apr 12 17:15:33 u363id562 kamailio[22688]: INFO: <script>: GOT An Initial SIP MESSAGE INVITE from
sip:wsclient@testers.com
Apr 12 17:15:33 u363id562 kamailio[22688]: INFO: <script>: GOT An Initial SIP MESSAGE INVITE from
sip:wsclient@testers.comApr 12 17:15:33 u363id562 kamailio[22688]: INFO: <script>: DEBUG: user wsclient authenticated
Apr 12 17:15:33 u363id562 rtpengine[13839]: Got valid command from
127.0.0.1:41760: offer - { "sdp": "v=0#015#012o=- 3596210531114072957 2 IN IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS dB4OToiqJrPwyddaFPR6VmIiYUu1yV9fg2ik#015#012m=audio 52996 RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 2.2.2.2#015#012a=rtcp:52996 IN IP4 2.2.2.2#015#012a=candidate:2999745851 1 udp 2122260223 192.168.56.1 52995 typ host generation 0#015#012a=candidate:2999745851 2 udp 2122260223 192.168.56.1 52995 typ host generation 0#015#012a=candidate:3350409123 1 udp 2122194687 192.168.0.101 52996 typ host generation 0#015#012a=candidate:3350409123 2 udp 2122194687 192.168.0.101 52996 typ host generation 0#015#012a=candidate:4233069003 1 tcp 1518280447 192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp 1518280447 192.168.56.1 0 typ host generation 0#015#012a=candidate:2301678419 1 tcp 1518214911 192.168.0.101 0 typ host generation 0#015#012a=candidate:2301678419 2 tcp 1518214911 192.168.0.101 0 typ host generation 0#015#012a=candidate:1190865175 1 udp 1685987071 2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation 0#015#012a=candidate:1190865175 2 udp 1685987071 2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation 0#015#012a=ice-ufrag:bAf6DoE8PTGZLWt9#015#012a=ice-pwd:HAEbKFAcaBfZXOVKZF3T0tX0#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256 72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=sendrecv#015#012a=rtcp-mux#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_32 inline:bVuZwhkjJpK/dTaBmrbPzh8SVzzBhmYmRYMl5pkb#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:1UQgbnwi5BH4w1Dc71HYvF2Qp4zAfVl2HT6EE+Mn#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015#012
Apr 12 17:15:33 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] Creating new call
Apr 12 17:15:33 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] Returning to SIP proxy: d3:sdp2276:v=0#015#012o=- 3596210531114072957 2 IN IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS dB4OToiqJrPwyddaFPR6VmIiYUu1yV9fg2ik#015#012m=audio 30240 RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 1.1.1.1#015#012a=candidate:2999745851 1 udp 2122260223 192.168.56.1 52995 typ host generation 0#015#012a=candidate:2999745851 2 udp 2122260223 192.168.56.1 52995 typ host generation 0#015#012a=candidate:3350409123 1 udp 2122194687 192.168.0.101 52996 typ host generation 0#015#012a=candidate:3350409123 2 udp 2122194687 192.168.0.101 52996 typ host generation 0#015#012a=candidate:4233069003 1 tcp 1518280447 192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp 1518280447 192.168.56.1 0 typ host generation 0#015#012a=candidate:2301678419 1 tcp 1518214911 192.168.0.101 0 typ host generation 0#015#012a=candidate:2301678419 2 tcp 1518214911 192.168.0.101 0 typ host generation 0#015#012a=candidate:1190865175 1 udp 1685987071 2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation 0#015#012a=candidate:1190865175 2 udp 1685987071 2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation 0#015#012a=ice-ufrag:bAf6DoE8PTGZLWt9#015#012a=ice-pwd:HAEbKFAcaBfZXOVKZF3T0tX0#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256 72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_32 inline:bVuZwhkjJpK/dTaBmrbPzh8SVzzBhmYmRYMl5pkb#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:1UQgbnwi5BH4w1Dc71HYvF2Qp4zAfVl2HT6EE+Mn#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:106 CN/32000#015#012a=rtpmap:105 CN/1
Apr 12 17:15:33 u363id562 kamailio[22674]: NOTICE: acc [acc.c:315]: acc_log_request(): ACC: call missed: timestamp=1397308533;method=INVITE;from_tag=6444olaqoi;to_tag=b364b8b4a27abfb1;call_id=dtgbbcrpth16rb2ks58c;code=488;reason=Not Acceptable Here;src_user=wsclient;src_domain=
testers.com;src_ip=2.2.2.2;dst_ouser=gsclient;dst_user=gsclient;dst_domain=192.168.0.106
Apr 12 17:15:33 u363id562 kamailio[22674]: ALERT: <script>: SAVPF found, setting flags using: ICE=force RTP/SAVPF in offer and ICE=remove RTP/SAVPF in answer
Apr 12 17:15:33 u363id562 rtpengine[13839]: Got valid command from
127.0.0.1:54535: offer - { "sdp": "v=0#015#012o=- 3596210531114072957 2 IN IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS dB4OToiqJrPwyddaFPR6VmIiYUu1yV9fg2ik#015#012m=audio 52996 RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 2.2.2.2#015#012a=rtcp:52996 IN IP4 2.2.2.2#015#012a=candidate:2999745851 1 udp 2122260223 192.168.56.1 52995 typ host generation 0#015#012a=candidate:2999745851 2 udp 2122260223 192.168.56.1 52995 typ host generation 0#015#012a=candidate:3350409123 1 udp 2122194687 192.168.0.101 52996 typ host generation 0#015#012a=candidate:3350409123 2 udp 2122194687 192.168.0.101 52996 typ host generation 0#015#012a=candidate:4233069003 1 tcp 1518280447 192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp 1518280447 192.168.56.1 0 typ host generation 0#015#012a=candidate:2301678419 1 tcp 1518214911 192.168.0.101 0 typ host generation 0#015#012a=candidate:2301678419 2 tcp 1518214911 192.168.0.101 0 typ host generation 0#015#012a=candidate:1190865175 1 udp 1685987071 2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation 0#015#012a=candidate:1190865175 2 udp 1685987071 2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation 0#015#012a=ice-ufrag:bAf6DoE8PTGZLWt9#015#012a=ice-pwd:HAEbKFAcaBfZXOVKZF3T0tX0#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256 72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=sendrecv#015#012a=rtcp-mux#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_32 inline:bVuZwhkjJpK/dTaBmrbPzh8SVzzBhmYmRYMl5pkb#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:1UQgbnwi5BH4w1Dc71HYvF2Qp4zAfVl2HT6EE+Mn#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015#012
Apr 12 17:15:33 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] Returning to SIP proxy: d3:sdp2267:v=0#015#012o=- 3596210531114072957 2 IN IP4 1.1.1.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS dB4OToiqJrPwyddaFPR6VmIiYUu1yV9fg2ik#015#012m=audio 30240 RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 1.1.1.1#015#012a=candidate:2999745851 1 udp 2122260223 192.168.56.1 52995 typ host generation 0#015#012a=candidate:2999745851 2 udp 2122260223 192.168.56.1 52995 typ host generation 0#015#012a=candidate:3350409123 1 udp 2122194687 192.168.0.101 52996 typ host generation 0#015#012a=candidate:3350409123 2 udp 2122194687 192.168.0.101 52996 typ host generation 0#015#012a=candidate:4233069003 1 tcp 1518280447 192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp 1518280447 192.168.56.1 0 typ host generation 0#015#012a=candidate:2301678419 1 tcp 1518214911 192.168.0.101 0 typ host generation 0#015#012a=candidate:2301678419 2 tcp 1518214911 192.168.0.101 0 typ host generation 0#015#012a=candidate:1190865175 1 udp 1685987071 2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation 0#015#012a=candidate:1190865175 2 udp 1685987071 2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation 0#015#012a=ice-ufrag:bAf6DoE8PTGZLWt9#015#012a=ice-pwd:HAEbKFAcaBfZXOVKZF3T0tX0#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256 72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_32 inline:bVuZwhkjJpK/dTaBmrbPzh8SVzzBhmYmRYMl5pkb#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:1UQgbnwi5BH4w1Dc71HYvF2Qp4zAfVl2HT6EE+Mn#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:106 CN/32000#015#012a=rtpmap:105 C
Apr 12 17:15:33 u363id562 rtpengine[13839]: Got valid command from
127.0.0.1:54535: offer - { "sdp": "v=0#015#012o=- 3596210531114072957 2 IN IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS dB4OToiqJrPwyddaFPR6VmIiYUu1yV9fg2ik#015#012m=audio 52996 RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 2.2.2.2#015#012a=rtcp:52996 IN IP4 2.2.2.2#015#012a=candidate:2999745851 1 udp 2122260223 192.168.56.1 52995 typ host generation 0#015#012a=candidate:2999745851 2 udp 2122260223 192.168.56.1 52995 typ host generation 0#015#012a=candidate:3350409123 1 udp 2122194687 192.168.0.101 52996 typ host generation 0#015#012a=candidate:3350409123 2 udp 2122194687 192.168.0.101 52996 typ host generation 0#015#012a=candidate:4233069003 1 tcp 1518280447 192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp 1518280447 192.168.56.1 0 typ host generation 0#015#012a=candidate:2301678419 1 tcp 1518214911 192.168.0.101 0 typ host generation 0#015#012a=candidate:2301678419 2 tcp 1518214911 192.168.0.101 0 typ host generation 0#015#012a=candidate:1190865175 1 udp 1685987071 2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation 0#015#012a=candidate:1190865175 2 udp 1685987071 2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation 0#015#012a=ice-ufrag:bAf6DoE8PTGZLWt9#015#012a=ice-pwd:HAEbKFAcaBfZXOVKZF3T0tX0#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256 72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=sendrecv#015#012a=rtcp-mux#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_32 inline:bVuZwhkjJpK/dTaBmrbPzh8SVzzBhmYmRYMl5pkb#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:1UQgbnwi5BH4w1Dc71HYvF2Qp4zAfVl2HT6EE+Mn#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015#012
Apr 12 17:15:33 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] Returning to SIP proxy: d3:sdp2276:v=0#015#012o=- 3596210531114072957 2 IN IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS dB4OToiqJrPwyddaFPR6VmIiYUu1yV9fg2ik#015#012m=audio 30240 RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 1.1.1.1#015#012a=candidate:2999745851 1 udp 2122260223 192.168.56.1 52995 typ host generation 0#015#012a=candidate:2999745851 2 udp 2122260223 192.168.56.1 52995 typ host generation 0#015#012a=candidate:3350409123 1 udp 2122194687 192.168.0.101 52996 typ host generation 0#015#012a=candidate:3350409123 2 udp 2122194687 192.168.0.101 52996 typ host generation 0#015#012a=candidate:4233069003 1 tcp 1518280447 192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp 1518280447 192.168.56.1 0 typ host generation 0#015#012a=candidate:2301678419 1 tcp 1518214911 192.168.0.101 0 typ host generation 0#015#012a=candidate:2301678419 2 tcp 1518214911 192.168.0.101 0 typ host generation 0#015#012a=candidate:1190865175 1 udp 1685987071 2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation 0#015#012a=candidate:1190865175 2 udp 1685987071 2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation 0#015#012a=ice-ufrag:bAf6DoE8PTGZLWt9#015#012a=ice-pwd:HAEbKFAcaBfZXOVKZF3T0tX0#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256 72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_32 inline:bVuZwhkjJpK/dTaBmrbPzh8SVzzBhmYmRYMl5pkb#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:1UQgbnwi5BH4w1Dc71HYvF2Qp4zAfVl2HT6EE+Mn#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:106 CN/32000#015#012a=rtpmap:105 CN/1
Apr 12 17:15:34 u363id562 kamailio[22689]: INFO: <script>: DEBUG: user zoiperclient2 authenticated
Apr 12 17:15:34 u363id562 kamailio[22689]: INFO: <script>: DEBUG: user zoiperclient2 authenticated
Apr 12 17:15:35 u363id562 kamailio[22690]: ERROR: <core> [tcp_read.c:289]: tcp_read_data(): error reading: Connection reset by peer (104)
Apr 12 17:15:35 u363id562 kamailio[22690]: ERROR: <core> [tcp_read.c:1281]: tcp_read_req(): ERROR: tcp_read_req: error reading
Apr 12 17:15:37 u363id562 rtpengine[13839]: Got valid command from
127.0.0.1:36626: delete - { "call-id": "dtgbbcrpth16rb2ks58c", "received-from": [ "IP4", "2.2.2.2" ], "from-tag": "6444olaqoi", "command": "delete" }
Apr 12 17:15:37 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] Deleting full call
Apr 12 17:15:37 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] Final packet stats:
Apr 12 17:15:37 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] --- Tag '', created 0:04 ago, in dialogue with '(none)'
Apr 12 17:15:37 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] ------ Media #1, port 30242 <>
2.2.2.2:52996, 0 p, 0 b, 0 e
Apr 12 17:15:37 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] --- Tag '6444olaqoi', created 0:04 ago, in dialogue with ''
Apr 12 17:15:37 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] ------ Media #1, port 30240 <> [::]:0 , 0 p, 0 b, 0 e
Apr 12 17:15:37 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] Returning to SIP proxy: d6:result2:oke