Jul 30 19:57:39 hostname /sbin/kamailio[27506]: DEBUG: rtpengine [rtpengine_funcs.c:148]: check_content_type(): type found valid Jul 30 19:57:39 hostname rtpengine[14113]: INFO: [2efc3439125a167d24efa2d609912131@xx.xx.xx.78:5070]: Received command 'offer' from xx.xx.xx.78:51771 Jul 30 19:57:39 hostname rtpengine[14113]: DEBUG: [2efc3439125a167d24efa2d609912131@xx.xx.xx.78:5070]: Dump for 'offer' from xx.xx.xx.78:51771: { "sdp": "v=0#015#012o=root 579620384 579620384 IN IP4 xx.xx.xx.78#015#012s=Asterisk PBX 11.25.1#015#012c=IN IP4 xx.xx.xx.78#015#012t=0 0#015#012m=audio 12242 RTP/AVP 0 9 8 10 3 111 5 7 110 97 101#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:9 G722/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:10 L16/8000#015#012a=rtpmap:3 GSM/8000#015#012a=rtpmap:111 G726-32/8000#015#012a=rtpmap:5 DVI4/8000#015#012a=rtpmap:7 LPC/8000#015#012a=rtpmap:110 speex/8000#015#012a=rtpmap:97 iLBC/8000#015#012a=rtpmap:101 telephone-event/8000#015#012a=fmtp:101 0-16#015#012a=ptime:2 ... Jul 30 19:57:39 hostname rtpengine[14113]: DEBUG: [2efc3439125a167d24efa2d609912131@xx.xx.xx.78:5070]: ... 0#015#012a=sendrecv#015#012", "ICE": "force", "flags": [ "force", "trust-address" ], "replace": [ "origin", "session-connection" ], "transport-protocol": "RTP/SAVPF", "rtcp-mux": [ "accept", "offer" ], "call-id": "2efc3439125a167d24efa2d609912131@xx.xx.xx.78:5070", "received-from": [ "IP4", "xx.xx.xx.78" ], "from-tag": "as4df4c384", "command": "offer" } Jul 30 19:57:39 hostname rtpengine[14113]: WARNING: [2efc3439125a167d24efa2d609912131@xx.xx.xx.78:5070]: Unknown flag encountered: 'force' Jul 30 19:57:39 hostname rtpengine[14113]: NOTICE: [2efc3439125a167d24efa2d609912131@xx.xx.xx.78:5070]: Creating new call Jul 30 19:57:39 hostname rtpengine[14113]: DEBUG: [2efc3439125a167d24efa2d609912131@xx.xx.xx.78:5070]: set FILLED flag for stream xx.xx.xx.78:12242 Jul 30 19:57:39 hostname rtpengine[14113]: DEBUG: [2efc3439125a167d24efa2d609912131@xx.xx.xx.78:5070]: set FILLED flag for stream xx.xx.xx.78:12243 Jul 30 19:57:39 hostname rtpengine[14113]: INFO: [2efc3439125a167d24efa2d609912131@xx.xx.xx.78:5070]: offer time = 0.000338 sec Jul 30 19:57:39 hostname rtpengine[14113]: INFO: [2efc3439125a167d24efa2d609912131@xx.xx.xx.78:5070]: Replying to 'offer' from xx.xx.xx.78:51771 Jul 30 19:57:39 hostname rtpengine[14113]: DEBUG: [2efc3439125a167d24efa2d609912131@xx.xx.xx.78:5070]: Response dump for 'offer' to xx.xx.xx.78:51771: { "sdp": "v=0#015#012o=root 579620384 579620384 IN IP4 xx.xx.xx.78#015#012s=Asterisk PBX 11.25.1#015#012c=IN IP4 xx.xx.xx.78#015#012t=0 0#015#012m=audio 48144 RTP/SAVPF 0 9 8 10 3 111 5 7 110 97 101#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:9 G722/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:10 L16/8000#015#012a=rtpmap:3 GSM/8000#015#012a=rtpmap:111 G726-32/8000#015#012a=rtpmap:5 DVI4/8000#015#012a=rtpmap:7 LPC/8000#015#012a=rtpmap:110 speex/8000#015#012a=rtpmap:97 iLBC/8000#015#012a=rtpmap:101 telephone-event/8000#015#012a=fmtp:101 0-16#015#012 ... Jul 30 19:57:39 hostname rtpengine[14113]: DEBUG: [2efc3439125a167d24efa2d609912131@xx.xx.xx.78:5070]: ... a=ptime:20#015#012a=sendrecv#015#012a=rtcp:48145#015#012a=rtcp-mux#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:8kPQ4PUH3WRN/kALaLWkBh82FX2WW0WVRVMuAb1O#015#012a=setup:actpass#015#012a=fingerprint:sha-1 8E:5F:0B:B1:BA:AC:62:3C:C7:A6:F5:04:23:DA:0F:90:48:A3:C6:EF#015#012a=ice-ufrag:upBKkEvw#015#012a=ice-pwd:DgtxAvMgPSz41tmqDbIU825CqE#015#012a=candidate:io9MsxHW16F9fQY8 1 UDP 2130706431 xx.xx.xx.78 48144 typ host#015#012a=candidate:io9MsxHW16F9fQY8 2 UDP 2130706430 xx.xx.xx.78 48145 typ host#015#012", "result": "ok" } Jul 30 19:57:39 hostname /sbin/kamailio[27506]: DEBUG: rtpengine [rtpengine.c:1448]: rtpp_function_call(): proxy reply: d3:sdp883:v=0#015#012o=root 579620384 579620384 IN IP4 xx.xx.xx.78#015#012s=Asterisk PBX 11.25.1#015#012c=IN IP4 xx.xx.xx.78#015#012t=0 0#015#012m=audio 48144 RTP/SAVPF 0 9 8 10 3 111 5 7 110 97 101#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:9 G722/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:10 L16/8000#015#012a=rtpmap:3 GSM/8000#015#012a=rtpmap:111 G726-32/8000#015#012a=rtpmap:5 DVI4/8000#015#012a=rtpmap:7 LPC/8000#015#012a=rtpmap:110 speex/8000#015#012a=rtpmap:97 iLBC/8000#015#012a=rtpmap:101 telephone-event/8000#015#012a=fmtp:101 0-16#015#012a=ptime:20#015#012a=sendrecv#015#012a=rtcp:48145#015#012a=rtcp-mux#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:8kPQ4PUH3WRN/kALaLWkBh82FX2WW0WVRVMuAb1O#015#012a=setup:actpass#015#012a=fingerprint:sha-1 8E:5F:0B:B1:BA:AC:62:3C:C7:A6:F5:04:23:DA:0F:90:48:A3:C6:EF#015#012a=ice-ufrag:upBKkEvw#015#012a=ice-pwd:DgtxAvMgPSz41tmqDbIU825CqE#015#012a=candidate:io9MsxHW16F9fQY8 1 UDP 2130706431 xx.xx.xx.78 48144 typ host#015#012a=candidate:io9MsxHW16F9fQY8 2 UDP 2130706430 xx.xx.xx.78 48145 typ host#015#0126:result2:oke