Hi
I am getting error with rtpengine. Running Kamailio 4.2.3
I am trying to call from conventional SIP client to WebRTC client
Google Chrome v38.0.2125.104 Firefox v33.0
Using sipML5 as WebRTC client
root@rtcpbx:/home/avhan# /usr/sbin/rtpengine --interface=127.0.0.1!192.168.2.161 --listen-ng=7722 --pidfile=/var/run/ngcp-rtpengine-daemon.pid --tos=184 --table=42 --foreground --log-level=7 --log-stderr INFO: Generating new DTLS certificate DEBUG: Dump of DTLS certificate: DEBUG: --- -----BEGIN CERTIFICATE----- DEBUG: --- MIIBpDCCAQ2gAwIBAAIJAIH/X+7BeV8gMA0GCSqGSIb3DQEBBQUAMBQxEjAQBgNV DEBUG: --- BAMTCXJ0cGVuZ2luZTAeFw0xNTAyMTMxMjM5MjJaFw0xNTAzMTYxMjM5MjJaMBQx DEBUG: --- EjAQBgNVBAMTCXJ0cGVuZ2luZTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA DEBUG: --- tfOduffYlJeuTeA6GRRKpeuUougYgu33QKjPZ9RuQNl6AIsmJQrqPJ9bTv93BlNd DEBUG: --- I/COq89SRxxjhAHEw6v3F283/lZAitySVa+TazbpZrwKsWbfPTXtLMC5oJvEPUr/ DEBUG: --- 8xcX+rnImLHZPrECMZj4pjSI6htclKok+YFf3incSmECAwEAATANBgkqhkiG9w0B DEBUG: --- AQUFAAOBgQBA2zHxUAv4J/dRLMboF9y3h6hQNnoEQNDwlmE+M4bBbOAxNYNxpmy3 DEBUG: --- mmZ54GBZFbvIWO4MVYrGiEMXBsQ3LSHo+MeExtY7Jq1RbXHU+DT/hHg5DGHHeFyr DEBUG: --- d46TUaHIFG/XhKSAaaCX1EbqtezMaUWrJw+mtOfzfZMEVzMP72CmiA== DEBUG: --- -----END CERTIFICATE----- DEBUG: Dump of DTLS private key: DEBUG: --- -----BEGIN PRIVATE KEY----- DEBUG: --- MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBALXznbn32JSXrk3g DEBUG: --- OhkUSqXrlKLoGILt90Coz2fUbkDZegCLJiUK6jyfW07/dwZTXSPwjqvPUkccY4QB DEBUG: --- xMOr9xdvN/5WQIrcklWvk2s26Wa8CrFm3z017SzAuaCbxD1K//MXF/q5yJix2T6x DEBUG: --- AjGY+KY0iOobXJSqJPmBX94p3EphAgMBAAECgYBJG9sLZz/Z7Nx3pBoUC6g25OKz DEBUG: --- VmjK6w0HKQ01XhDy869m2oJ4LduSgkFxC4rqusJY94aMGGCp/AkseH10VfuQ/Dn4 DEBUG: --- 6Zv9l8xGlprRmW0do6w0AR7F5JpcuoMT7ae8Jf7hAJpa//LbAg2s0lJBMofIUtd/ DEBUG: --- 0xs0y9uX/stV9hRAAQJBAOUocKdTbN1J9W6EB+r64/QBPxB7jhbs8J76RRfCjhE2 DEBUG: --- CS8JRBajMJJ3XgjOWQuh44xmydGCJeSSisDKsONVpgECQQDLQ6QCHYJxeXJ0R4w9 DEBUG: --- 5XqUEQhb03GlwoTIas3YQfJJyk/zKnQAkBKwjwatrNEldCGBOCOgeQhTERPwSxcx DEBUG: --- kGRhAkBxjmSkxjaAQhIZPdwemU00sRlrNY7n1Wo3nZV3fLWh2cEbSeAvx5ZePkCe DEBUG: --- 5IJDvWlhPd5sr63PYr7XYpndTagBAkEAj27Nvwhf0f8nOtJ6LftPAkj6owGUAqo+ DEBUG: --- 1MY5N09hz5xJyoe8j+EaryheSBPZChrmwa6BxW1i6Gr2rOvwE/OWQQJACxjVriL8 DEBUG: --- mKFqDLN1rQuDqyA6f0jSaxuPsA3TGCcEbgw4e8hQD9pFJ6NK7/X/UeqqWsW0sAZS DEBUG: --- mNrnLY9VvZPSpw== DEBUG: --- -----END PRIVATE KEY----- INFO: Startup complete, version 3.3.0.0+0~mr3.8.0.0 DEBUG: Adding a proxy for control ng stats:127.0.0.1 INFO: Got valid command from 127.0.0.1:60075: offer - { "sdp": "v=0 o=- 28314700 28314700 IN IP4 192.168.2.18 s=http://www.portsip.com c=IN IP4 192.168.2.18 t=0 0 m=audio 20670 RTP/AVP 0 8 101 a=rtpmap:0 PCMU/8000 a=rtpmap:8 PCMA/8000 a=rtpmap:101 telephone-event/8000 a=fmtp:101 0-15 a=sendrecv ", "ICE": "force", "flags": [ "trust-address" ], "replace": [ "origin", "session-connection" ], "transport-protocol": "RTP/SAVPF", "call-id": "FjDYirMD4b8ldLCQFrUMaw..", "received-from": [ "IP4", "192.168.2.18" ], "from-tag": "7a3b9012", "command": "offer" } NOTICE: [FjDYirMD4b8ldLCQFrUMaw..] Creating new call DEBUG: [FjDYirMD4b8ldLCQFrUMaw..] Opened ports 30000..30001 for media relay DEBUG: [FjDYirMD4b8ldLCQFrUMaw..] Opened ports 30010..30011 for media relay INFO: [FjDYirMD4b8ldLCQFrUMaw..] Returning to SIP proxy: d3:sdp669:v=0 o=- 28314700 28314700 IN IP4 192.168.2.161 s=http://www.portsip.com c=IN IP4 192.168.2.161 t=0 0 a=ice-lite m=audio 30000 RTP/SAVPF 0 8 101 a=rtpmap:0 PCMU/8000 a=rtpmap:8 PCMA/8000 a=rtpmap:101 telephone-event/8000 a=fmtp:101 0-15 a=sendrecv a=rtcp:30001 a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:JBeKZmgOzhC3A5Ays2nm4Jx3GqSbsoVStGSjSFL/ a=setup:actpass a=fingerprint:sha-1 CE:47:48:60:04:D0:A5:D7:FD:00:89:6E:8F:D9:25:48:9D:2F:B9:89 a=ice-ufrag:bMtYwXGC a=ice-pwd:q053zJtRE8bxgCEu3eebdaqoWSmr a=candidate:EqkUFjVat8drCK70 1 UDP 2130706431 192.168.2.161 30000 typ host a=candidate:EqkUFjVat8drCK70 2 UDP 2130706430 192.168.2.161 30001 typ host 6:result2:oke INFO: [FjDYirMD4b8ldLCQFrUMaw.. port 30000] Successful STUN binding request from 192.168.2.18:7427 INFO: [FjDYirMD4b8ldLCQFrUMaw.. port 30000] STUN: using this candidate INFO: [FjDYirMD4b8ldLCQFrUMaw.. port 30001] Successful STUN binding request from 192.168.2.18:7428 INFO: [FjDYirMD4b8ldLCQFrUMaw.. port 30001] STUN: using this candidate INFO: [FjDYirMD4b8ldLCQFrUMaw.. port 30000] Successful STUN binding request from 192.168.2.18:7427 INFO: [FjDYirMD4b8ldLCQFrUMaw.. port 30000] STUN: using this candidate INFO: [FjDYirMD4b8ldLCQFrUMaw.. port 30001] Successful STUN binding request from 192.168.2.18:7428 INFO: [FjDYirMD4b8ldLCQFrUMaw.. port 30001] STUN: using this candidate INFO: [FjDYirMD4b8ldLCQFrUMaw.. port 30000] Successful STUN binding request from 192.168.2.18:7427 INFO: [FjDYirMD4b8ldLCQFrUMaw.. port 30000] STUN: using this candidate INFO: [FjDYirMD4b8ldLCQFrUMaw.. port 30001] Successful STUN binding request from 192.168.2.18:7428 INFO: [FjDYirMD4b8ldLCQFrUMaw.. port 30001] STUN: using this candidate INFO: [FjDYirMD4b8ldLCQFrUMaw.. port 30000] Successful STUN binding request from 192.168.2.18:7427 INFO: [FjDYirMD4b8ldLCQFrUMaw.. port 30000] STUN: using this candidate INFO: [FjDYirMD4b8ldLCQFrUMaw.. port 30001] Successful STUN binding request from 192.168.2.18:7428 INFO: [FjDYirMD4b8ldLCQFrUMaw.. port 30001] STUN: using this candidate INFO: [FjDYirMD4b8ldLCQFrUMaw.. port 30000] Successful STUN binding request from 192.168.2.18:7427 INFO: [FjDYirMD4b8ldLCQFrUMaw.. port 30000] STUN: using this candidate INFO: [FjDYirMD4b8ldLCQFrUMaw.. port 30001] Successful STUN binding request from 192.168.2.18:7428 INFO: [FjDYirMD4b8ldLCQFrUMaw.. port 30001] STUN: using this candidate INFO: [FjDYirMD4b8ldLCQFrUMaw.. port 30000] Successful STUN binding request from 192.168.2.18:7427 INFO: [FjDYirMD4b8ldLCQFrUMaw.. port 30000] STUN: using this candidate INFO: [FjDYirMD4b8ldLCQFrUMaw.. port 30001] Successful STUN binding request from 192.168.2.18:7428 INFO: [FjDYirMD4b8ldLCQFrUMaw.. port 30001] STUN: using this candidate INFO: Got valid command from 127.0.0.1:42832: ping - { "command": "ping" }
INFO: Returning to SIP proxy: d6:result4:ponge INFO: Got valid command from 127.0.0.1:35595: offer - { "sdp": "v=0 o=- 28373892 28373892 IN IP4 192.168.2.18 s=http://www.portsip.com c=IN IP4 192.168.2.18 t=0 0 m=audio 20674 RTP/AVP 0 8 101 a=rtpmap:0 PCMU/8000 a=rtpmap:8 PCMA/8000 a=rtpmap:101 telephone-event/8000 a=fmtp:101 0-15 a=sendrecv ", "ICE": "force", "flags": [ "trust-address" ], "replace": [ "origin", "session-connection" ], "transport-protocol": "RTP/SAVPF", "call-id": "fJTfptxXKrVoGdalt_2MMA..", "received-from": [ "IP4", "192.168.2.18" ], "from-tag": "bd78da3f", "command": "offer" } NOTICE: [fJTfptxXKrVoGdalt_2MMA..] Creating new call DEBUG: [fJTfptxXKrVoGdalt_2MMA..] Opened ports 30022..30023 for media relay DEBUG: [fJTfptxXKrVoGdalt_2MMA..] Opened ports 30044..30045 for media relay INFO: [fJTfptxXKrVoGdalt_2MMA..] Returning to SIP proxy: d3:sdp669:v=0 o=- 28373892 28373892 IN IP4 192.168.2.161 s=http://www.portsip.com c=IN IP4 192.168.2.161 t=0 0 a=ice-lite m=audio 30022 RTP/SAVPF 0 8 101 a=rtpmap:0 PCMU/8000 a=rtpmap:8 PCMA/8000 a=rtpmap:101 telephone-event/8000 a=fmtp:101 0-15 a=sendrecv a=rtcp:30023 a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:YUVDWqqE+RNOPLu4d1J81/gee3OY8tnfGSjc2zjB a=setup:actpass a=fingerprint:sha-1 CE:47:48:60:04:D0:A5:D7:FD:00:89:6E:8F:D9:25:48:9D:2F:B9:89 a=ice-ufrag:1d16gzNH a=ice-pwd:qpNBX4eBwfNKq0TPpNHLeuMdHOjX a=candidate:EqkUFjVat8drCK70 1 UDP 2130706431 192.168.2.161 30022 typ host a=candidate:EqkUFjVat8drCK70 2 UDP 2130706430 192.168.2.161 30023 typ host 6:result2:oke INFO: [fJTfptxXKrVoGdalt_2MMA.. port 30022] Successful STUN binding request from 192.168.2.18:7449 INFO: [fJTfptxXKrVoGdalt_2MMA.. port 30022] STUN: using this candidate INFO: [fJTfptxXKrVoGdalt_2MMA.. port 30023] Successful STUN binding request from 192.168.2.18:7450 INFO: [fJTfptxXKrVoGdalt_2MMA.. port 30023] STUN: using this candidate INFO: [fJTfptxXKrVoGdalt_2MMA.. port 30022] Successful STUN binding request from 192.168.2.18:7449 INFO: [fJTfptxXKrVoGdalt_2MMA.. port 30022] STUN: using this candidate INFO: [fJTfptxXKrVoGdalt_2MMA.. port 30023] Successful STUN binding request from 192.168.2.18:7450 INFO: [fJTfptxXKrVoGdalt_2MMA.. port 30023] STUN: using this candidate INFO: [fJTfptxXKrVoGdalt_2MMA.. port 30022] Successful STUN binding request from 192.168.2.18:7449 INFO: [fJTfptxXKrVoGdalt_2MMA.. port 30022] STUN: using this candidate INFO: [fJTfptxXKrVoGdalt_2MMA.. port 30023] Successful STUN binding request from 192.168.2.18:7450 INFO: [fJTfptxXKrVoGdalt_2MMA.. port 30023] STUN: using this candidate INFO: [fJTfptxXKrVoGdalt_2MMA.. port 30022] Successful STUN binding request from 192.168.2.18:7449 INFO: [fJTfptxXKrVoGdalt_2MMA.. port 30022] STUN: using this candidate INFO: [fJTfptxXKrVoGdalt_2MMA.. port 30023] Successful STUN binding request from 192.168.2.18:7450 INFO: [fJTfptxXKrVoGdalt_2MMA.. port 30023] STUN: using this candidate INFO: [fJTfptxXKrVoGdalt_2MMA.. port 30022] Successful STUN binding request from 192.168.2.18:7449 INFO: [fJTfptxXKrVoGdalt_2MMA.. port 30022] STUN: using this candidate INFO: [fJTfptxXKrVoGdalt_2MMA.. port 30023] Successful STUN binding request from 192.168.2.18:7450 INFO: [fJTfptxXKrVoGdalt_2MMA.. port 30023] STUN: using this candidate INFO: [FjDYirMD4b8ldLCQFrUMaw..] Closing call due to timeout INFO: [FjDYirMD4b8ldLCQFrUMaw..] Final packet stats: INFO: [FjDYirMD4b8ldLCQFrUMaw..] --- Tag '', created 1:06 ago, in dialogue with '(none)' INFO: [FjDYirMD4b8ldLCQFrUMaw..] ------ Media #1, port 30000 <> [::]:0 , 6 p, 600 b, 0 e, 1423917572 last_packet INFO: [FjDYirMD4b8ldLCQFrUMaw..] ------ Media #1, port 30001 <> [::]:0 (RTCP), 6 p, 600 b, 0 e, 1423917572 last_packet INFO: [FjDYirMD4b8ldLCQFrUMaw..] --- Tag '7a3b9012', created 1:06 ago, in dialogue with '' INFO: [FjDYirMD4b8ldLCQFrUMaw..] ------ Media #1, port 30010 <> 192.168.2.18:20670, 0 p, 0 b, 0 e, 1423917566 last_packet INFO: [FjDYirMD4b8ldLCQFrUMaw..] ------ Media #1, port 30011 <> 192.168.2.18:20671 (RTCP), 0 p, 0 b, 0 e, 1423917566 last_packet INFO: [fJTfptxXKrVoGdalt_2MMA.. port 30022] Successful STUN binding request from 192.168.2.18:7449 INFO: [fJTfptxXKrVoGdalt_2MMA.. port 30022] STUN: using this candidate INFO: [fJTfptxXKrVoGdalt_2MMA.. port 30023] Successful STUN binding request from 192.168.2.18:7450 INFO: [fJTfptxXKrVoGdalt_2MMA.. port 30023] STUN: using this candidate INFO: [fJTfptxXKrVoGdalt_2MMA.. port 30022] Successful STUN binding request from 192.168.2.18:7449 INFO: [fJTfptxXKrVoGdalt_2MMA.. port 30022] STUN: using this candidate INFO: [fJTfptxXKrVoGdalt_2MMA.. port 30023] Successful STUN binding request from 192.168.2.18:7450 INFO: [fJTfptxXKrVoGdalt_2MMA.. port 30023] STUN: using this candidate INFO: Got valid command from 127.0.0.1:36029: answer - { "sdp": "v=0 o=Mozilla-SIPUA-33.0 15128 1 IN IP4 0.0.0.0 s=Doubango Telecom - firefox t=0 0 a=ice-ufrag:524a14d8 a=ice-pwd:f23ceb82b6f9a86a2c1f180a013a9ff3 a=fingerprint:sha-256 6A:5D:49:F6:7B:FE:5B:5E:23:43:EE:31:43:20:46:C0:E8:12:B7:AD:AB:A2:09:66:94:55:42:E2:6B:D3:D9:63 m=audio 7449 UDP/TLS/RTP/SAVPF 0 101 c=IN IP4 192.168.2.18 a=rtpmap:0 PCMU/8000 a=rtpmap:101 telephone-event/8000 a=fmtp:101 0-15 a=sendrecv a=setup:active a=candidate:0 1 UDP 2128609535 192.168.2.18 7449 typ host a=candidate:0 2 UDP 2128609534 192.168.2.18 7450 typ host ", "ICE": "remove", "flags": [ "trust-address" ], "replace": [ "origin", "session-connection" ], "transport-protocol": "RTP/AVP", "call-id": "fJTfptxXKrVoGdalt_2MMA..", "received-from": [ "IP4", "192.168.2.18" ], "from-tag": "bd78da3f", "to-tag": "mUTC7w3qs5ka6fJWKCiM", "command": "answer" } INFO: [fJTfptxXKrVoGdalt_2MMA..] Returning to SIP proxy: d3:sdp240:v=0 o=Mozilla-SIPUA-33.0 15128 1 IN IP4 0.0.0.0 s=Doubango Telecom - firefox t=0 0 m=audio 30044 RTP/AVP 0 101 c=IN IP4 192.168.2.161 a=rtpmap:0 PCMU/8000 a=rtpmap:101 telephone-event/8000 a=fmtp:101 0-15 a=sendrecv a=rtcp:30045 6:result2:oke *DEBUG: [fJTfptxXKrVoGdalt_2MMA.. port 30044] Error when sending message. Error: Invalid argument WARNING: [fJTfptxXKrVoGdalt_2MMA.. port 30044] Write error on RTP socket: Invalid argument* INFO: [fJTfptxXKrVoGdalt_2MMA.. port 30044] Final packet stats: INFO: [fJTfptxXKrVoGdalt_2MMA.. port 30044] --- Tag 'mUTC7w3qs5ka6fJWKCiM', created 0:13 ago, in dialogue with 'bd78da3f' INFO: [fJTfptxXKrVoGdalt_2MMA.. port 30044] ------ Media #1, port 30022 <> 192.168.2.18:7449 , 7 p, 700 b, 0 e, 1423917638 last_packet INFO: [fJTfptxXKrVoGdalt_2MMA.. port 30044] ------ Media #1, port 30023 <> 192.168.2.18:7450 (RTCP), 7 p, 700 b, 0 e, 1423917638 last_packet INFO: [fJTfptxXKrVoGdalt_2MMA.. port 30044] --- Tag 'bd78da3f', created 0:13 ago, in dialogue with 'mUTC7w3qs5ka6fJWKCiM' INFO: [fJTfptxXKrVoGdalt_2MMA.. port 30044] ------ Media #1, port 30044 <> 192.168.2.18:20674, 0 p, 0 b, 1 e, 1423917626 last_packet INFO: [fJTfptxXKrVoGdalt_2MMA.. port 30044] ------ Media #1, port 30045 <> 192.168.2.18:20675 (RTCP), 0 p, 0 b, 0 e, 1423917626 last_packet
Regards Amit
On 14/02/15 08:13 AM, Amit Patkar wrote:
Hi
I am getting error with rtpengine. Running Kamailio 4.2.3
I am trying to call from conventional SIP client to WebRTC client
Google Chrome v38.0.2125.104 Firefox v33.0
Using sipML5 as WebRTC client
root@rtcpbx:/home/avhan# /usr/sbin/rtpengine --interface=127.0.0.1!192.168.2.161 --listen-ng=7722 --pidfile=/var/run/ngcp-rtpengine-daemon.pid --tos=184 --table=42 --foreground --log-level=7 --log-stderr
The problem is the --interface=127.0.0.1!192.168.2.161 part. This binds the UDP sockets for RTP to 127.0.0.1. You can't send to any other address from such a socket.
Cheers
Thanks Richard. It worked.
*Thanks & Regards,* Amit
On 2/14/2015 7:02 PM, Richard Fuchs wrote:
On 14/02/15 08:13 AM, Amit Patkar wrote:
Hi
I am getting error with rtpengine. Running Kamailio 4.2.3
I am trying to call from conventional SIP client to WebRTC client
Google Chrome v38.0.2125.104 Firefox v33.0
Using sipML5 as WebRTC client
root@rtcpbx:/home/avhan# /usr/sbin/rtpengine --interface=127.0.0.1!192.168.2.161 --listen-ng=7722 --pidfile=/var/run/ngcp-rtpengine-daemon.pid --tos=184 --table=42 --foreground --log-level=7 --log-stderr
The problem is the --interface=127.0.0.1!192.168.2.161 part. This binds the UDP sockets for RTP to 127.0.0.1. You can't send to any other address from such a socket.
Cheers
SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list sr-users@lists.sip-router.org http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users