[SR-Users] Kamailio with rtpproxy-ng and mediaproxy-ng: Error rewriting SDP

Olli Heiskanen ohjelmistoarkkitehti at gmail.com
Sat Apr 12 15:31:58 CEST 2014


Hello,

I'm probably still doing something wrong, I still get 488 from the
grandstream. Also zoiper refuses the call with 415 Unsupported Media Type.

According to the module description I tried to change my config to this:
Btw, thanks for enabling verbose flags, those are more readable when
working on the config file.

if ( t_check_status("488") && sdp_content() ) {
  if ( sdp_get_line_startswith("$avp(mline)", "m=") ) {
    if ($avp(mline) =~ "SAVPF") {
      $avp(rtpproxy_offer_flags) = "rtcp-mux-demux force trust-address
replace-origin replace-session-connection ICE=force RTP/SAVPF";
      $avp(rtpproxy_answer_flags) = "rtcp-mux-demux force trust-address
replace-origin replace-session-connection ICE=remove RTP/SAVPF";
    } else {
      $avp(rtpproxy_offer_flags) = "rtcp-mux-demux force trust-address
replace-origin replace-session-connection ICE=remove RTP/SAVPF";
      $avp(rtpproxy_answer_flags) = "rtcp-mux-demux force trust-address
replace-origin replace-session-connection ICE=force RTP/SAVPF";
    }
  }
}


Below is the output from tail -f /var/log/messages when trying to call from
wsclient to gsclient
(are there any debug options etc to enable full logs being written to
syslog to help get the whole data out?)

I tried using -s0 option when using ngrep but the sdp still gets cut off
for some reason, that didn't help much... Although I think there are full
sdp when I write the output to a pcap file. I wonder if there's a trick to
force full packets onto ngrep output without writing to file?


Apr 12 17:15:33 u363id562 kamailio[22688]: INFO: <script>: GOT An Initial
SIP MESSAGE INVITE from sip:wsclient at testers.com
Apr 12 17:15:33 u363id562 kamailio[22688]: INFO: <script>: GOT An Initial
SIP MESSAGE INVITE from sip:wsclient at testers.com
Apr 12 17:15:33 u363id562 kamailio[22688]: INFO: <script>: DEBUG: user
wsclient authenticated
Apr 12 17:15:33 u363id562 rtpengine[13839]: Got valid command from
127.0.0.1:41760: offer - { "sdp": "v=0#015#012o=- 3596210531114072957 2 IN
IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE
audio#015#012a=msid-semantic: WMS
dB4OToiqJrPwyddaFPR6VmIiYUu1yV9fg2ik#015#012m=audio 52996 RTP/SAVPF 111 103
104 0 8 106 105 13 126#015#012c=IN IP4 2.2.2.2#015#012a=rtcp:52996 IN IP4
2.2.2.2#015#012a=candidate:2999745851 1 udp 2122260223 192.168.56.1 52995
typ host generation 0#015#012a=candidate:2999745851 2 udp 2122260223
192.168.56.1 52995 typ host generation 0#015#012a=candidate:3350409123 1
udp 2122194687 192.168.0.101 52996 typ host generation
0#015#012a=candidate:3350409123 2 udp 2122194687 192.168.0.101 52996 typ
host generation 0#015#012a=candidate:4233069003 1 tcp 1518280447
192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp
1518280447 192.168.56.1 0 typ host generation
0#015#012a=candidate:2301678419 1 tcp 1518214911 192.168.0.101 0 typ host
generation 0#015#012a=candidate:2301678419 2 tcp 1518214911 192.168.0.101 0
typ host generation 0#015#012a=candidate:1190865175 1 udp 1685987071
2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation
0#015#012a=candidate:1190865175 2 udp 1685987071 2.2.2.2 52996 typ srflx
raddr 192.168.0.101 rport 52996 generation
0#015#012a=ice-ufrag:bAf6DoE8PTGZLWt9#015#012a=ice-pwd:HAEbKFAcaBfZXOVKZF3T0tX0#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256
72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1
urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=sendrecv#015#012a=rtcp-mux#015#012a=crypto:0
AES_CM_128_HMAC_SHA1_32
inline:bVuZwhkjJpK/dTaBmrbPzh8SVzzBhmYmRYMl5pkb#015#012a=crypto:1
AES_CM_128_HMAC_SHA1_80
inline:1UQgbnwi5BH4w1Dc71HYvF2Qp4zAfVl2HT6EE+Mn#015#012a=rtpmap:111
opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103
ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0
PCMU/8000#015#012
Apr 12 17:15:33 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] Creating
new call
Apr 12 17:15:33 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c]
Returning to SIP proxy: d3:sdp2276:v=0#015#012o=- 3596210531114072957 2 IN
IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE
audio#015#012a=msid-semantic: WMS
dB4OToiqJrPwyddaFPR6VmIiYUu1yV9fg2ik#015#012m=audio 30240 RTP/SAVPF 111 103
104 0 8 106 105 13 126#015#012c=IN IP4
1.1.1.1#015#012a=candidate:2999745851 1 udp 2122260223 192.168.56.1 52995
typ host generation 0#015#012a=candidate:2999745851 2 udp 2122260223
192.168.56.1 52995 typ host generation 0#015#012a=candidate:3350409123 1
udp 2122194687 192.168.0.101 52996 typ host generation
0#015#012a=candidate:3350409123 2 udp 2122194687 192.168.0.101 52996 typ
host generation 0#015#012a=candidate:4233069003 1 tcp 1518280447
192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp
1518280447 192.168.56.1 0 typ host generation
0#015#012a=candidate:2301678419 1 tcp 1518214911 192.168.0.101 0 typ host
generation 0#015#012a=candidate:2301678419 2 tcp 1518214911 192.168.0.101 0
typ host generation 0#015#012a=candidate:1190865175 1 udp 1685987071
2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation
0#015#012a=candidate:1190865175 2 udp 1685987071 2.2.2.2 52996 typ srflx
raddr 192.168.0.101 rport 52996 generation
0#015#012a=ice-ufrag:bAf6DoE8PTGZLWt9#015#012a=ice-pwd:HAEbKFAcaBfZXOVKZF3T0tX0#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256
72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1
urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=crypto:0
AES_CM_128_HMAC_SHA1_32
inline:bVuZwhkjJpK/dTaBmrbPzh8SVzzBhmYmRYMl5pkb#015#012a=crypto:1
AES_CM_128_HMAC_SHA1_80
inline:1UQgbnwi5BH4w1Dc71HYvF2Qp4zAfVl2HT6EE+Mn#015#012a=rtpmap:111
opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103
ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0
PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:106
CN/32000#015#012a=rtpmap:105 CN/1
Apr 12 17:15:33 u363id562 kamailio[22674]: NOTICE: acc [acc.c:315]:
acc_log_request(): ACC: call missed:
timestamp=1397308533;method=INVITE;from_tag=6444olaqoi;to_tag=b364b8b4a27abfb1;call_id=dtgbbcrpth16rb2ks58c;code=488;reason=Not
Acceptable Here;src_user=wsclient;src_domain=testers.com
;src_ip=2.2.2.2;dst_ouser=gsclient;dst_user=gsclient;dst_domain=192.168.0.106
Apr 12 17:15:33 u363id562 kamailio[22674]: ALERT: <script>: SAVPF found,
setting flags using: ICE=force RTP/SAVPF in offer and ICE=remove RTP/SAVPF
in answer
Apr 12 17:15:33 u363id562 rtpengine[13839]: Got valid command from
127.0.0.1:54535: offer - { "sdp": "v=0#015#012o=- 3596210531114072957 2 IN
IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE
audio#015#012a=msid-semantic: WMS
dB4OToiqJrPwyddaFPR6VmIiYUu1yV9fg2ik#015#012m=audio 52996 RTP/SAVPF 111 103
104 0 8 106 105 13 126#015#012c=IN IP4 2.2.2.2#015#012a=rtcp:52996 IN IP4
2.2.2.2#015#012a=candidate:2999745851 1 udp 2122260223 192.168.56.1 52995
typ host generation 0#015#012a=candidate:2999745851 2 udp 2122260223
192.168.56.1 52995 typ host generation 0#015#012a=candidate:3350409123 1
udp 2122194687 192.168.0.101 52996 typ host generation
0#015#012a=candidate:3350409123 2 udp 2122194687 192.168.0.101 52996 typ
host generation 0#015#012a=candidate:4233069003 1 tcp 1518280447
192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp
1518280447 192.168.56.1 0 typ host generation
0#015#012a=candidate:2301678419 1 tcp 1518214911 192.168.0.101 0 typ host
generation 0#015#012a=candidate:2301678419 2 tcp 1518214911 192.168.0.101 0
typ host generation 0#015#012a=candidate:1190865175 1 udp 1685987071
2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation
0#015#012a=candidate:1190865175 2 udp 1685987071 2.2.2.2 52996 typ srflx
raddr 192.168.0.101 rport 52996 generation
0#015#012a=ice-ufrag:bAf6DoE8PTGZLWt9#015#012a=ice-pwd:HAEbKFAcaBfZXOVKZF3T0tX0#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256
72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1
urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=sendrecv#015#012a=rtcp-mux#015#012a=crypto:0
AES_CM_128_HMAC_SHA1_32
inline:bVuZwhkjJpK/dTaBmrbPzh8SVzzBhmYmRYMl5pkb#015#012a=crypto:1
AES_CM_128_HMAC_SHA1_80
inline:1UQgbnwi5BH4w1Dc71HYvF2Qp4zAfVl2HT6EE+Mn#015#012a=rtpmap:111
opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103
ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0
PCMU/8000#015#012
Apr 12 17:15:33 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c]
Returning to SIP proxy: d3:sdp2267:v=0#015#012o=- 3596210531114072957 2 IN
IP4 1.1.1.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE
audio#015#012a=msid-semantic: WMS
dB4OToiqJrPwyddaFPR6VmIiYUu1yV9fg2ik#015#012m=audio 30240 RTP/SAVPF 111 103
104 0 8 106 105 13 126#015#012c=IN IP4
1.1.1.1#015#012a=candidate:2999745851 1 udp 2122260223 192.168.56.1 52995
typ host generation 0#015#012a=candidate:2999745851 2 udp 2122260223
192.168.56.1 52995 typ host generation 0#015#012a=candidate:3350409123 1
udp 2122194687 192.168.0.101 52996 typ host generation
0#015#012a=candidate:3350409123 2 udp 2122194687 192.168.0.101 52996 typ
host generation 0#015#012a=candidate:4233069003 1 tcp 1518280447
192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp
1518280447 192.168.56.1 0 typ host generation
0#015#012a=candidate:2301678419 1 tcp 1518214911 192.168.0.101 0 typ host
generation 0#015#012a=candidate:2301678419 2 tcp 1518214911 192.168.0.101 0
typ host generation 0#015#012a=candidate:1190865175 1 udp 1685987071
2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation
0#015#012a=candidate:1190865175 2 udp 1685987071 2.2.2.2 52996 typ srflx
raddr 192.168.0.101 rport 52996 generation
0#015#012a=ice-ufrag:bAf6DoE8PTGZLWt9#015#012a=ice-pwd:HAEbKFAcaBfZXOVKZF3T0tX0#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256
72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1
urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=crypto:0
AES_CM_128_HMAC_SHA1_32
inline:bVuZwhkjJpK/dTaBmrbPzh8SVzzBhmYmRYMl5pkb#015#012a=crypto:1
AES_CM_128_HMAC_SHA1_80
inline:1UQgbnwi5BH4w1Dc71HYvF2Qp4zAfVl2HT6EE+Mn#015#012a=rtpmap:111
opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103
ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0
PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:106
CN/32000#015#012a=rtpmap:105 C
Apr 12 17:15:33 u363id562 rtpengine[13839]: Got valid command from
127.0.0.1:54535: offer - { "sdp": "v=0#015#012o=- 3596210531114072957 2 IN
IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE
audio#015#012a=msid-semantic: WMS
dB4OToiqJrPwyddaFPR6VmIiYUu1yV9fg2ik#015#012m=audio 52996 RTP/SAVPF 111 103
104 0 8 106 105 13 126#015#012c=IN IP4 2.2.2.2#015#012a=rtcp:52996 IN IP4
2.2.2.2#015#012a=candidate:2999745851 1 udp 2122260223 192.168.56.1 52995
typ host generation 0#015#012a=candidate:2999745851 2 udp 2122260223
192.168.56.1 52995 typ host generation 0#015#012a=candidate:3350409123 1
udp 2122194687 192.168.0.101 52996 typ host generation
0#015#012a=candidate:3350409123 2 udp 2122194687 192.168.0.101 52996 typ
host generation 0#015#012a=candidate:4233069003 1 tcp 1518280447
192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp
1518280447 192.168.56.1 0 typ host generation
0#015#012a=candidate:2301678419 1 tcp 1518214911 192.168.0.101 0 typ host
generation 0#015#012a=candidate:2301678419 2 tcp 1518214911 192.168.0.101 0
typ host generation 0#015#012a=candidate:1190865175 1 udp 1685987071
2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation
0#015#012a=candidate:1190865175 2 udp 1685987071 2.2.2.2 52996 typ srflx
raddr 192.168.0.101 rport 52996 generation
0#015#012a=ice-ufrag:bAf6DoE8PTGZLWt9#015#012a=ice-pwd:HAEbKFAcaBfZXOVKZF3T0tX0#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256
72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1
urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=sendrecv#015#012a=rtcp-mux#015#012a=crypto:0
AES_CM_128_HMAC_SHA1_32
inline:bVuZwhkjJpK/dTaBmrbPzh8SVzzBhmYmRYMl5pkb#015#012a=crypto:1
AES_CM_128_HMAC_SHA1_80
inline:1UQgbnwi5BH4w1Dc71HYvF2Qp4zAfVl2HT6EE+Mn#015#012a=rtpmap:111
opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103
ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0
PCMU/8000#015#012
Apr 12 17:15:33 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c]
Returning to SIP proxy: d3:sdp2276:v=0#015#012o=- 3596210531114072957 2 IN
IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE
audio#015#012a=msid-semantic: WMS
dB4OToiqJrPwyddaFPR6VmIiYUu1yV9fg2ik#015#012m=audio 30240 RTP/SAVPF 111 103
104 0 8 106 105 13 126#015#012c=IN IP4
1.1.1.1#015#012a=candidate:2999745851 1 udp 2122260223 192.168.56.1 52995
typ host generation 0#015#012a=candidate:2999745851 2 udp 2122260223
192.168.56.1 52995 typ host generation 0#015#012a=candidate:3350409123 1
udp 2122194687 192.168.0.101 52996 typ host generation
0#015#012a=candidate:3350409123 2 udp 2122194687 192.168.0.101 52996 typ
host generation 0#015#012a=candidate:4233069003 1 tcp 1518280447
192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp
1518280447 192.168.56.1 0 typ host generation
0#015#012a=candidate:2301678419 1 tcp 1518214911 192.168.0.101 0 typ host
generation 0#015#012a=candidate:2301678419 2 tcp 1518214911 192.168.0.101 0
typ host generation 0#015#012a=candidate:1190865175 1 udp 1685987071
2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation
0#015#012a=candidate:1190865175 2 udp 1685987071 2.2.2.2 52996 typ srflx
raddr 192.168.0.101 rport 52996 generation
0#015#012a=ice-ufrag:bAf6DoE8PTGZLWt9#015#012a=ice-pwd:HAEbKFAcaBfZXOVKZF3T0tX0#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256
72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1
urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=crypto:0
AES_CM_128_HMAC_SHA1_32
inline:bVuZwhkjJpK/dTaBmrbPzh8SVzzBhmYmRYMl5pkb#015#012a=crypto:1
AES_CM_128_HMAC_SHA1_80
inline:1UQgbnwi5BH4w1Dc71HYvF2Qp4zAfVl2HT6EE+Mn#015#012a=rtpmap:111
opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103
ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0
PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:106
CN/32000#015#012a=rtpmap:105 CN/1
Apr 12 17:15:34 u363id562 kamailio[22689]: INFO: <script>: GOT An Initial
SIP MESSAGE REGISTER from sip:zoiperclient2 at testers.com;transport=TCP
Apr 12 17:15:34 u363id562 kamailio[22689]: INFO: <script>: GOT An Initial
SIP MESSAGE REGISTER from sip:zoiperclient2 at testers.com;transport=TCP
Apr 12 17:15:34 u363id562 kamailio[22689]: INFO: <script>: DEBUG: user
zoiperclient2 authenticated
Apr 12 17:15:34 u363id562 kamailio[22689]: INFO: <script>: GOT An Initial
SIP MESSAGE SUBSCRIBE from sip:zoiperclient2 at testers.com;transport=TCP
Apr 12 17:15:34 u363id562 kamailio[22689]: INFO: <script>: GOT An Initial
SIP MESSAGE SUBSCRIBE from sip:zoiperclient2 at testers.com;transport=TCP
Apr 12 17:15:34 u363id562 kamailio[22689]: INFO: <script>: DEBUG: user
zoiperclient2 authenticated
Apr 12 17:15:35 u363id562 kamailio[22690]: ERROR: <core> [tcp_read.c:289]:
tcp_read_data(): error reading: Connection reset by peer (104)
Apr 12 17:15:35 u363id562 kamailio[22690]: ERROR: <core> [tcp_read.c:1281]:
tcp_read_req(): ERROR: tcp_read_req: error reading
Apr 12 17:15:37 u363id562 rtpengine[13839]: Got valid command from
127.0.0.1:36626: delete - { "call-id": "dtgbbcrpth16rb2ks58c",
"received-from": [ "IP4", "2.2.2.2" ], "from-tag": "6444olaqoi", "command":
"delete" }
Apr 12 17:15:37 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] Deleting
full call
Apr 12 17:15:37 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] Final
packet stats:
Apr 12 17:15:37 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] --- Tag
'', created 0:04 ago, in dialogue with '(none)'
Apr 12 17:15:37 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] ------
Media #1, port 30242 <>    2.2.2.2:52996, 0 p, 0 b, 0 e
Apr 12 17:15:37 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] --- Tag
'6444olaqoi', created 0:04 ago, in dialogue with ''
Apr 12 17:15:37 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] ------
Media #1, port 30240 <>            [::]:0    , 0 p, 0 b, 0 e
Apr 12 17:15:37 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c]
Returning to SIP proxy: d6:result2:oke




cheers,
Olli



2014-04-10 16:48 GMT+03:00 Richard Fuchs <rfuchs at sipwise.com>:

> On 04/10/14 09:26, Olli Heiskanen wrote:
> >
> > Hello,
> >
> > After some tests, I'm still having some strange results.
> >
> > When calling from ws client to grandstream, I get the below output to
> > /var/log/messages.
> > In a sip trace after 488 there are only INVITEs from kamailio server to
> > grandstream but no responses come back to kamailio server.
> >
> > I haven't changed any other configurations, kamailio or otherwise. I run
> > the rtpengine like this:
> > /usr/sbin/rtpengine --table=0 --ip=1.1.1.1 --listen-udp=127.0.0.1:7722
> > <http://127.0.0.1:7722> --listen-ng=127.0.0.1:7723
> > <http://127.0.0.1:7723> --tos=184 --pidfile=/var/run/rtpengine.pid
> > (where 1.1.1.1 is my kamailio server ip)
> >
> > How do I work out the problem from here? Please let me know if you need
> > any further info or logs and I'll dig those out.
> >
>
> Unfortunately the log lines are cut off and don't include the entire
> command packet to rtpengine, but my guess is that you omitted the ICE
> handling parameter, which (as of a few days ago) forces rtpengine into
> passthrough mode, which means that most of the RTP/SAVPF attributes are
> left in place. My guess is that this confuses the grandstream.
>
> You should use either ICE=force or ICE=remove (formerly "+" or "-"
> flags) to make sure rtpengine is actually able to bridge between the
> protocols. You should also add the "rtcp-mux-demux" flag (through
> rtpengine module) in case the grandstream gets confused by rtcp-mux
> being offered.
>
> With those two in place, the resulting RTP/AVP SDP should be very small
> and clean.
>
> cheers
>
>
> _______________________________________________
> SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
> sr-users at lists.sip-router.org
> http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.sip-router.org/pipermail/sr-users/attachments/20140412/c47562cb/attachment.html>


More information about the sr-users mailing list