[sr-dev] rtpengine trouble

Richard Fuchs rfuchs at sipwise.com
Mon Apr 7 15:14:28 CEST 2014


I think this is related to what has been discussed here:
http://lists.sip-router.org/pipermail/sr-users/2014-March/082211.html

I haven't gotten around to fixing this particular case yet. I'll see if
I can get something going in the next few days.

cheers


On 04/07/14 08:55, Juha Heinanen wrote:
> Richard Fuchs writes:
> 
>> Can you provide the rtpengine log output?
> 
> below,
> 
> -- juha
> 
> Apr  7 15:53:13 siika /usr/sbin/sip-proxy[6799]: INFO: INVITE <sip:jh at test.tutpro.com> is to local user <jh at test.tutpro.com>
> Apr  7 15:53:13 siika /usr/sbin/sip-proxy[6799]: INFO: ===== rtpengine_offer(replace-session-connection replace-origin via-branch=1 trust-address)
> Apr  7 15:53:13 siika rtpengine[12409]: Got valid command from 127.0.0.1:57950: offer - { "sdp": "v=0#015#012o=- 105525634 1836351013 IN IP4 192.168.43.146#015#012s=-#015#012c=IN IP4 192.168.43.146#015#012t=0 0#015#012a=tool:baresip 0.4.10#015#012m=audio 10610 RTP/SAVPF 96 97 98 8 0 101#015#012b=AS:125#015#012a=rtpmap:96 opus/48000/2#015#012a=fmtp:96 stereo=1;sprop-stereo=1#015#012a=rtpmap:97 speex/16000#015#012a=fmtp:97 mode="7";vbr=off;cng=on#015#012a=rtpmap:98 speex/8000#015#012a=fmtp:98 mode="7";vbr=off;cng=on#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:101 telephone-event/8000#015#012a=fmtp:101 0-15#015#012a=sendrecv#015#012a=label:1#015#012a=rtcp-rsize#015#012a=ssrc:721305898 cname:sip:test at test.tutpro.com#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_80 inline:T3nlFkYcttcBj2043AyD91nlYRj5NornYHkq7yh+#015#012a=ptime:20#015#012", "flags": [ "trust-address" ], "replace": [ "session-connection", "origin" ], "call-id": "01a67cc3213c924f", "via-branch": "z9hG4b
K
>  07531aad8821f685", "received-from": [ "IP4", "192.98.102.30" ], "from-tag": "7fd43a78aa5b5497", "command": "offer" }
> Apr  7 15:53:13 siika rtpengine[12409]: [01a67cc3213c924f] Creating new call
> Apr  7 15:53:13 siika rtpengine[12409]: [01a67cc3213c924f] Opened ports 50000..50001 for media relay
> Apr  7 15:53:13 siika rtpengine[12409]: [01a67cc3213c924f] Opened ports 50002..50003 for media relay
> Apr  7 15:53:13 siika rtpengine[12409]: [01a67cc3213c924f] Returning to SIP proxy: d3:sdp959:v=0#015#012o=- 105525634 1836351013 IN IP4 192.98.102.30#015#012s=-#015#012c=IN IP4 192.98.102.30#015#012t=0 0#015#012a=tool:baresip 0.4.10#015#012a=ice-lite#015#012m=audio 50000 RTP/SAVPF 96 97 98 8 0 101#015#012b=AS:125#015#012a=rtpmap:96 opus/48000/2#015#012a=fmtp:96 stereo=1;sprop-stereo=1#015#012a=rtpmap:97 speex/16000#015#012a=fmtp:97 mode="7";vbr=off;cng=on#015#012a=rtpmap:98 speex/8000#015#012a=fmtp:98 mode="7";vbr=off;cng=on#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:101 telephone-event/8000#015#012a=fmtp:101 0-15#015#012a=label:1#015#012a=rtcp-rsize#015#012a=ssrc:721305898 cname:sip:test at test.tutpro.com#015#012a=ptime:20#015#012a=sendrecv#015#012a=rtcp:50001#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_80 inline:T3nlFkYcttcBj2043AyD91nlYRj5NornYHkq7yh+#015#012a=setup:actpass#015#012a=fingerprint:sha-1 13:DC:F9:F7:3A:18:43:89:36:DD:B0:B7:A5:44:5E:B1:67:56:41:C
6
>  #015#012a=ice-ufrag:BKSxeEUb#015#012a=ice-pwd:lr1GnviPc1t3xBqM1yWaQJRrrHWD#015#012a=candidate:yjWbVwOpZHzPlWwB 1 UDP 2130706432 192.98.102.30 50000 typ host#015#012a=candidate:yjWbVwOpZHzPlWwB 2 UDP 2130706431 192.98.102.30 50001 typ host#015#0126:result2:oke
> Apr  7 15:53:13 siika /usr/sbin/sip-proxy[6799]: INFO: Routing INVITE <sip:le9dho0j at hj2m0mult01v.invalid;transport=ws> to contact via <sip:192.98.102.30:34664;transport=WS>
> Apr  7 15:53:21 siika rtpengine[12409]: [01a67cc3213c924f port 50000] Successful STUN binding request from 192.98.104.1:54576
> Apr  7 15:53:21 siika rtpengine[12409]: [01a67cc3213c924f port 50001] Successful STUN binding request from 192.98.104.1:34509
> Apr  7 15:53:21 siika rtpengine[12409]: [01a67cc3213c924f port 50000] DTLS handshake successful
> Apr  7 15:53:21 siika rtpengine[12409]: [01a67cc3213c924f port 50000] DTLS-SRTP successfully negotiated
> Apr  7 15:53:21 siika rtpengine[12409]: [01a67cc3213c924f port 50001] DTLS handshake successful
> Apr  7 15:53:21 siika rtpengine[12409]: [01a67cc3213c924f port 50001] DTLS-SRTP successfully negotiated
> Apr  7 15:53:21 siika /usr/sbin/sip-proxy[6799]: INFO: ===== rtpengine_answer(replace-session-connection replace-origin via-branch=2  trust-address)
> Apr  7 15:53:21 siika rtpengine[12409]: Got valid command from 127.0.0.1:57950: answer - { "sdp": "v=0#015#012o=- 4128609880524945129 2 IN IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=msid-semantic: WMS Ge7wfuPeDpQ8jRC6NbxYEz97Ipw9QK0WrooB#015#012m=audio 54576 RTP/SAVPF 96 0 8 101#015#012c=IN IP4 192.98.104.1#015#012a=rtcp:34509 IN IP4 192.98.104.1#015#012a=candidate:1937193501 1 udp 2113937151 192.98.104.1 54576 typ host generation 0#015#012a=candidate:451549855 1 udp 2113937151 192.98.102.39 50856 typ host generation 0#015#012a=candidate:1603072777 1 udp 2113937151 192.168.43.146 55551 typ host generation 0#015#012a=candidate:1937193501 2 udp 2113937150 192.98.104.1 34509 typ host generation 0#015#012a=candidate:451549855 2 udp 2113937150 192.98.102.39 35743 typ host generation 0#015#012a=candidate:1603072777 2 udp 2113937150 192.168.43.146 53835 typ host generation 0#015#012a=ice-ufrag:dJbBYDEMzX+cIyp0#015#012a=ice-pwd:kPd0kKQjb5XxyFum2fdSTDmq#015#012a=fingerprint:sha-256 6C:31
:
>  49:8D:B3:74:9E:84:C8:D7:D9:E5:3A:27:7B:1B:6C:F1:B0:BD:6F:9C:8A:ED:FB:4D:4E:CB:7F:D6:06:9E#015#012a=setup:active#015#012a=mid:audio#015#012a=sendrecv#015#012a=rtpmap:96 opus/48000/2#015#012a=fmtp:96 minptime=10#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:101 telephone-event/8000#015#012a=maxptime:60#015#012a=ssrc:834916748 cname:l6uQ8e42H/tsIlt0#015#012a=ssrc:834916748 msid:Ge7wfuPeDpQ8jRC6NbxYEz97Ipw9QK0WrooB 3e6a6582-0f28-4030-9d3e-2242e092354f#015#012a=ssrc:834916748 mslabel:Ge7wfuPeDpQ8jRC6NbxYEz97Ipw9QK0WrooB#015#012a=ssrc:834916748 label:3e6a6582-0f28-4030-9d3e-2242e092354f#015#012", "flags": [ "trust-address" ], "replace": [ "session-connection", "origin" ], "call-id": "01a67cc3213c924f", "via-branch": "z9hG4bK07531aad8821f685", "received-from": [ "IP4", "192.98.102.30" ], "from-tag": "7fd43a78aa5b5497", "to-tag": "d6ms4tiim9", "command": "answer" }
> Apr  7 15:53:21 siika rtpengine[12409]: [01a67cc3213c924f] DTLS: Peer certificate accepted
> Apr  7 15:53:21 siika rtpengine[12409]: [01a67cc3213c924f] DTLS: Peer certificate accepted
> Apr  7 15:53:21 siika rtpengine[12409]: [01a67cc3213c924f] Returning to SIP proxy: d3:sdp1342:v=0#015#012o=- 4128609880524945129 2 IN IP4 192.98.102.30#015#012s=-#015#012t=0 0#015#012a=msid-semantic: WMS Ge7wfuPeDpQ8jRC6NbxYEz97Ipw9QK0WrooB#015#012m=audio 50002 RTP/SAVPF 96 0 8 101#015#012c=IN IP4 192.98.102.30#015#012a=candidate:1937193501 1 udp 2113937151 192.98.104.1 54576 typ host generation 0#015#012a=candidate:451549855 1 udp 2113937151 192.98.102.39 50856 typ host generation 0#015#012a=candidate:1603072777 1 udp 2113937151 192.168.43.146 55551 typ host generation 0#015#012a=candidate:1937193501 2 udp 2113937150 192.98.104.1 34509 typ host generation 0#015#012a=candidate:451549855 2 udp 2113937150 192.98.102.39 35743 typ host generation 0#015#012a=candidate:1603072777 2 udp 2113937150 192.168.43.146 53835 typ host generation 0#015#012a=ice-ufrag:dJbBYDEMzX+cIyp0#015#012a=ice-pwd:kPd0kKQjb5XxyFum2fdSTDmq#015#012a=mid:audio#015#012a=rtpmap:96 opus/48000/2#015#012a=fmtp:96 minpti
m
>  e=10#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:101 telephone-event/8000#015#012a=maxptime:60#015#012a=ssrc:834916748 cname:l6uQ8e42H/tsIlt0#015#012a=ssrc:834916748 msid:Ge7wfuPeDpQ8jRC6NbxYEz97Ipw9QK0WrooB 3e6a6582-0f28-4030-9d3e-2242e092354f#015#012a=ssrc:834916748 mslabel:Ge7wfuPeDpQ8jRC6NbxYEz97Ipw9QK0WrooB#015#012a=ssrc:834916748 label:3e6a6582-0f28-4030-9d3e-2242e092354f#015#012a=sendrecv#015#012a=rtcp:50003#015#012a=candidate:yjWbVwOpZHzPlWwB 1 UDP 2130706432 192.98.102.30 50002 typ host#015#012a=candidate:yjWbVwOpZHzPlWwB 2 UDP 2130706431 192.98.102.30 50003 typ host#015#0126:result2:oke
> Apr  7 15:53:21 siika /usr/sbin/sip-proxy[6801]: INFO: Routing in-dialog ACK <sip:le9dho0j at hj2m0mult01v.invalid;transport=ws> from <sip:test at test.tutpro.com> to <sip:192.98.102.30:34664;transport=WS> based on gruu
> Apr  7 15:53:21 siika rtpengine[12409]: [01a67cc3213c924f port 50000] Successful STUN binding request from 192.98.102.39:50856
> Apr  7 15:53:21 siika rtpengine[12409]: [01a67cc3213c924f port 50001] Successful STUN binding request from 192.98.102.39:35743
> Apr  7 15:53:21 siika rtpengine[12409]: [01a67cc3213c924f port 50000] Successful STUN binding request from 192.168.43.146:55551
> Apr  7 15:53:21 siika rtpengine[12409]: [01a67cc3213c924f port 50001] Successful STUN binding request from 192.168.43.146:53835
> Apr  7 15:53:22 siika rtpengine[12409]: [01a67cc3213c924f port 50000] Successful STUN binding request from 192.98.104.1:54576
> Apr  7 15:53:22 siika rtpengine[12409]: [01a67cc3213c924f port 50001] Successful STUN binding request from 192.98.104.1:34509
> Apr  7 15:53:22 siika rtpengine[12409]: [01a67cc3213c924f port 50000] Successful STUN binding request from 192.98.102.39:50856
> Apr  7 15:53:22 siika rtpengine[12409]: [01a67cc3213c924f port 50001] Successful STUN binding request from 192.98.102.39:35743
> Apr  7 15:53:23 siika rtpengine[12409]: [01a67cc3213c924f port 50000] Successful STUN binding request from 192.98.104.1:54576
> Apr  7 15:53:23 siika rtpengine[12409]: [01a67cc3213c924f port 50001] Successful STUN binding request from 192.98.104.1:34509
> Apr  7 15:53:23 siika rtpengine[12409]: [01a67cc3213c924f port 50000] Successful STUN binding request from 192.168.43.146:55551
> Apr  7 15:53:23 siika rtpengine[12409]: [01a67cc3213c924f port 50001] Successful STUN binding request from 192.168.43.146:53835
> Apr  7 15:53:24 siika rtpengine[12409]: [01a67cc3213c924f port 50000] Successful STUN binding request from 192.98.104.1:54576
> Apr  7 15:53:24 siika rtpengine[12409]: [01a67cc3213c924f port 50001] Successful STUN binding request from 192.98.104.1:34509
> Apr  7 15:53:24 siika rtpengine[12409]: [01a67cc3213c924f port 50000] Successful STUN binding request from 192.98.102.39:50856
> Apr  7 15:53:24 siika rtpengine[12409]: [01a67cc3213c924f port 50001] Successful STUN binding request from 192.98.102.39:35743
> Apr  7 15:53:25 siika rtpengine[12409]: [01a67cc3213c924f port 50000] Confirmed peer information for port 50000 - 192.98.104.1:54576
> Apr  7 15:53:25 siika rtpengine[12409]: [01a67cc3213c924f port 50002] Confirmed peer information for port 50002 - 192.98.102.30:10610
> Apr  7 15:53:25 siika rtpengine[12409]: [01a67cc3213c924f port 50002] Kernelizing media stream with local port 50002
> Apr  7 15:53:25 siika rtpengine[12409]: [01a67cc3213c924f port 50000] Kernelizing media stream with local port 50000
> Apr  7 15:53:25 siika rtpengine[12409]: [01a67cc3213c924f port 50000] Successful STUN binding request from 192.98.104.1:54576
> Apr  7 15:53:25 siika rtpengine[12409]: [01a67cc3213c924f port 50001] Successful STUN binding request from 192.98.104.1:34509
> Apr  7 15:53:25 siika rtpengine[12409]: [01a67cc3213c924f port 50001] Confirmed peer information for port 50001 - 192.98.104.1:34509
> Apr  7 15:53:25 siika /usr/sbin/sip-proxy[6801]: INFO: ===== rtpengine_delete()
> Apr  7 15:53:25 siika rtpengine[12409]: Got valid command from 127.0.0.1:38149: delete - { "call-id": "01a67cc3213c924f", "received-from": [ "IP4", "192.98.102.30" ], "from-tag": "7fd43a78aa5b5497", "command": "delete" }
> Apr  7 15:53:25 siika rtpengine[12409]: [01a67cc3213c924f] Deleting full call
> Apr  7 15:53:25 siika rtpengine[12409]: [01a67cc3213c924f] Final packet stats:
> Apr  7 15:53:25 siika rtpengine[12409]: [01a67cc3213c924f] --- Tag 'd6ms4tiim9', created 0:12 ago, in dialogue with '7fd43a78aa5b5497'
> Apr  7 15:53:25 siika rtpengine[12409]: [01a67cc3213c924f] ------ Media #1, port 50002 <>   192.98.102.30:10610, 186 p, 48401 b, 0 e
> Apr  7 15:53:25 siika rtpengine[12409]: [01a67cc3213c924f] ------ Media #1, port 50003 <>  192.168.43.146:10611 (RTCP), 0 p, 0 b, 0 e
> Apr  7 15:53:25 siika rtpengine[12409]: [01a67cc3213c924f] --- Tag '7fd43a78aa5b5497', created 0:12 ago, in dialogue with 'd6ms4tiim9'
> Apr  7 15:53:25 siika rtpengine[12409]: [01a67cc3213c924f] ------ Media #1, port 50000 <>    192.98.104.1:54576, 194 p, 64134 b, 0 e
> Apr  7 15:53:25 siika rtpengine[12409]: [01a67cc3213c924f] ------ Media #1, port 50001 <>    192.98.104.1:34509 (RTCP), 5 p, 502 b, 0 e
> Apr  7 15:53:25 siika rtpengine[12409]: [01a67cc3213c924f] Returning to SIP proxy: d6:result2:oke
> _______________________________________________
> sr-dev mailing list
> sr-dev at lists.sip-router.org
> http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-dev
> 

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 897 bytes
Desc: OpenPGP digital signature
URL: <http://lists.sip-router.org/pipermail/sr-dev/attachments/20140407/3a7e07b8/attachment.pgp>


More information about the sr-dev mailing list