I think this is related to what has been discussed here:
http://lists.sip-router.org/pipermail/sr-users/2014-March/082211.html

I haven't gotten around to fixing this particular case yet. I'll see if
I can get something going in the next few days.

cheers


On 04/07/14 08:55, Juha Heinanen wrote:
> Richard Fuchs writes:
> 
>> Can you provide the rtpengine log output?
> 
> below,
> 
> -- juha
> 
> Apr  7 15:53:13 siika /usr/sbin/sip-proxy[6799]: INFO: INVITE 
> <sip:[email protected]> is to local user <[email protected]>
> Apr  7 15:53:13 siika /usr/sbin/sip-proxy[6799]: INFO: ===== 
> rtpengine_offer(replace-session-connection replace-origin via-branch=1 
> trust-address)
> Apr  7 15:53:13 siika rtpengine[12409]: Got valid command from 
> 127.0.0.1:57950: offer - { "sdp": "v=0#015#012o=- 105525634 1836351013 IN IP4 
> 192.168.43.146#015#012s=-#015#012c=IN IP4 192.168.43.146#015#012t=0 
> 0#015#012a=tool:baresip 0.4.10#015#012m=audio 10610 RTP/SAVPF 96 97 98 8 0 
> 101#015#012b=AS:125#015#012a=rtpmap:96 opus/48000/2#015#012a=fmtp:96 
> stereo=1;sprop-stereo=1#015#012a=rtpmap:97 speex/16000#015#012a=fmtp:97 
> mode="7";vbr=off;cng=on#015#012a=rtpmap:98 speex/8000#015#012a=fmtp:98 
> mode="7";vbr=off;cng=on#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:0 
> PCMU/8000#015#012a=rtpmap:101 telephone-event/8000#015#012a=fmtp:101 
> 0-15#015#012a=sendrecv#015#012a=label:1#015#012a=rtcp-rsize#015#012a=ssrc:721305898
>  cname:sip:[email protected]#015#012a=crypto:0 AES_CM_128_HMAC_SHA1_80 
> inline:T3nlFkYcttcBj2043AyD91nlYRj5NornYHkq7yh+#015#012a=ptime:20#015#012", 
> "flags": [ "trust-address" ], "replace": [ "session-connection", "origin" ], 
> "call-id": "01a67cc3213c924f", "via-branch": "z9hG4b
K
>  07531aad8821f685", "received-from": [ "IP4", "192.98.102.30" ], "from-tag": 
> "7fd43a78aa5b5497", "command": "offer" }
> Apr  7 15:53:13 siika rtpengine[12409]: [01a67cc3213c924f] Creating new call
> Apr  7 15:53:13 siika rtpengine[12409]: [01a67cc3213c924f] Opened ports 
> 50000..50001 for media relay
> Apr  7 15:53:13 siika rtpengine[12409]: [01a67cc3213c924f] Opened ports 
> 50002..50003 for media relay
> Apr  7 15:53:13 siika rtpengine[12409]: [01a67cc3213c924f] Returning to SIP 
> proxy: d3:sdp959:v=0#015#012o=- 105525634 1836351013 IN IP4 
> 192.98.102.30#015#012s=-#015#012c=IN IP4 192.98.102.30#015#012t=0 
> 0#015#012a=tool:baresip 0.4.10#015#012a=ice-lite#015#012m=audio 50000 
> RTP/SAVPF 96 97 98 8 0 101#015#012b=AS:125#015#012a=rtpmap:96 
> opus/48000/2#015#012a=fmtp:96 stereo=1;sprop-stereo=1#015#012a=rtpmap:97 
> speex/16000#015#012a=fmtp:97 mode="7";vbr=off;cng=on#015#012a=rtpmap:98 
> speex/8000#015#012a=fmtp:98 mode="7";vbr=off;cng=on#015#012a=rtpmap:8 
> PCMA/8000#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:101 
> telephone-event/8000#015#012a=fmtp:101 
> 0-15#015#012a=label:1#015#012a=rtcp-rsize#015#012a=ssrc:721305898 
> cname:sip:[email protected]#015#012a=ptime:20#015#012a=sendrecv#015#012a=rtcp:50001#015#012a=crypto:0
>  AES_CM_128_HMAC_SHA1_80 
> inline:T3nlFkYcttcBj2043AyD91nlYRj5NornYHkq7yh+#015#012a=setup:actpass#015#012a=fingerprint:sha-1
>  13:DC:F9:F7:3A:18:43:89:36:DD:B0:B7:A5:44:5E:B1:67:56:41:C
6
>  
> #015#012a=ice-ufrag:BKSxeEUb#015#012a=ice-pwd:lr1GnviPc1t3xBqM1yWaQJRrrHWD#015#012a=candidate:yjWbVwOpZHzPlWwB
>  1 UDP 2130706432 192.98.102.30 50000 typ 
> host#015#012a=candidate:yjWbVwOpZHzPlWwB 2 UDP 2130706431 192.98.102.30 50001 
> typ host#015#0126:result2:oke
> Apr  7 15:53:13 siika /usr/sbin/sip-proxy[6799]: INFO: Routing INVITE 
> <sip:[email protected];transport=ws> to contact via 
> <sip:192.98.102.30:34664;transport=WS>
> Apr  7 15:53:21 siika rtpengine[12409]: [01a67cc3213c924f port 50000] 
> Successful STUN binding request from 192.98.104.1:54576
> Apr  7 15:53:21 siika rtpengine[12409]: [01a67cc3213c924f port 50001] 
> Successful STUN binding request from 192.98.104.1:34509
> Apr  7 15:53:21 siika rtpengine[12409]: [01a67cc3213c924f port 50000] DTLS 
> handshake successful
> Apr  7 15:53:21 siika rtpengine[12409]: [01a67cc3213c924f port 50000] 
> DTLS-SRTP successfully negotiated
> Apr  7 15:53:21 siika rtpengine[12409]: [01a67cc3213c924f port 50001] DTLS 
> handshake successful
> Apr  7 15:53:21 siika rtpengine[12409]: [01a67cc3213c924f port 50001] 
> DTLS-SRTP successfully negotiated
> Apr  7 15:53:21 siika /usr/sbin/sip-proxy[6799]: INFO: ===== 
> rtpengine_answer(replace-session-connection replace-origin via-branch=2  
> trust-address)
> Apr  7 15:53:21 siika rtpengine[12409]: Got valid command from 
> 127.0.0.1:57950: answer - { "sdp": "v=0#015#012o=- 4128609880524945129 2 IN 
> IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=msid-semantic: WMS 
> Ge7wfuPeDpQ8jRC6NbxYEz97Ipw9QK0WrooB#015#012m=audio 54576 RTP/SAVPF 96 0 8 
> 101#015#012c=IN IP4 192.98.104.1#015#012a=rtcp:34509 IN IP4 
> 192.98.104.1#015#012a=candidate:1937193501 1 udp 2113937151 192.98.104.1 
> 54576 typ host generation 0#015#012a=candidate:451549855 1 udp 2113937151 
> 192.98.102.39 50856 typ host generation 0#015#012a=candidate:1603072777 1 udp 
> 2113937151 192.168.43.146 55551 typ host generation 
> 0#015#012a=candidate:1937193501 2 udp 2113937150 192.98.104.1 34509 typ host 
> generation 0#015#012a=candidate:451549855 2 udp 2113937150 192.98.102.39 
> 35743 typ host generation 0#015#012a=candidate:1603072777 2 udp 2113937150 
> 192.168.43.146 53835 typ host generation 
> 0#015#012a=ice-ufrag:dJbBYDEMzX+cIyp0#015#012a=ice-pwd:kPd0kKQjb5XxyFum2fdSTDmq#015#012a=fingerprint:sha-256
>  6C:31
:
>  
> 49:8D:B3:74:9E:84:C8:D7:D9:E5:3A:27:7B:1B:6C:F1:B0:BD:6F:9C:8A:ED:FB:4D:4E:CB:7F:D6:06:9E#015#012a=setup:active#015#012a=mid:audio#015#012a=sendrecv#015#012a=rtpmap:96
>  opus/48000/2#015#012a=fmtp:96 minptime=10#015#012a=rtpmap:0 
> PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:101 
> telephone-event/8000#015#012a=maxptime:60#015#012a=ssrc:834916748 
> cname:l6uQ8e42H/tsIlt0#015#012a=ssrc:834916748 
> msid:Ge7wfuPeDpQ8jRC6NbxYEz97Ipw9QK0WrooB 
> 3e6a6582-0f28-4030-9d3e-2242e092354f#015#012a=ssrc:834916748 
> mslabel:Ge7wfuPeDpQ8jRC6NbxYEz97Ipw9QK0WrooB#015#012a=ssrc:834916748 
> label:3e6a6582-0f28-4030-9d3e-2242e092354f#015#012", "flags": [ 
> "trust-address" ], "replace": [ "session-connection", "origin" ], "call-id": 
> "01a67cc3213c924f", "via-branch": "z9hG4bK07531aad8821f685", "received-from": 
> [ "IP4", "192.98.102.30" ], "from-tag": "7fd43a78aa5b5497", "to-tag": 
> "d6ms4tiim9", "command": "answer" }
> Apr  7 15:53:21 siika rtpengine[12409]: [01a67cc3213c924f] DTLS: Peer 
> certificate accepted
> Apr  7 15:53:21 siika rtpengine[12409]: [01a67cc3213c924f] DTLS: Peer 
> certificate accepted
> Apr  7 15:53:21 siika rtpengine[12409]: [01a67cc3213c924f] Returning to SIP 
> proxy: d3:sdp1342:v=0#015#012o=- 4128609880524945129 2 IN IP4 
> 192.98.102.30#015#012s=-#015#012t=0 0#015#012a=msid-semantic: WMS 
> Ge7wfuPeDpQ8jRC6NbxYEz97Ipw9QK0WrooB#015#012m=audio 50002 RTP/SAVPF 96 0 8 
> 101#015#012c=IN IP4 192.98.102.30#015#012a=candidate:1937193501 1 udp 
> 2113937151 192.98.104.1 54576 typ host generation 
> 0#015#012a=candidate:451549855 1 udp 2113937151 192.98.102.39 50856 typ host 
> generation 0#015#012a=candidate:1603072777 1 udp 2113937151 192.168.43.146 
> 55551 typ host generation 0#015#012a=candidate:1937193501 2 udp 2113937150 
> 192.98.104.1 34509 typ host generation 0#015#012a=candidate:451549855 2 udp 
> 2113937150 192.98.102.39 35743 typ host generation 
> 0#015#012a=candidate:1603072777 2 udp 2113937150 192.168.43.146 53835 typ 
> host generation 
> 0#015#012a=ice-ufrag:dJbBYDEMzX+cIyp0#015#012a=ice-pwd:kPd0kKQjb5XxyFum2fdSTDmq#015#012a=mid:audio#015#012a=rtpmap:96
>  opus/48000/2#015#012a=fmtp:96 minpti
m
>  e=10#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 
> PCMA/8000#015#012a=rtpmap:101 
> telephone-event/8000#015#012a=maxptime:60#015#012a=ssrc:834916748 
> cname:l6uQ8e42H/tsIlt0#015#012a=ssrc:834916748 
> msid:Ge7wfuPeDpQ8jRC6NbxYEz97Ipw9QK0WrooB 
> 3e6a6582-0f28-4030-9d3e-2242e092354f#015#012a=ssrc:834916748 
> mslabel:Ge7wfuPeDpQ8jRC6NbxYEz97Ipw9QK0WrooB#015#012a=ssrc:834916748 
> label:3e6a6582-0f28-4030-9d3e-2242e092354f#015#012a=sendrecv#015#012a=rtcp:50003#015#012a=candidate:yjWbVwOpZHzPlWwB
>  1 UDP 2130706432 192.98.102.30 50002 typ 
> host#015#012a=candidate:yjWbVwOpZHzPlWwB 2 UDP 2130706431 192.98.102.30 50003 
> typ host#015#0126:result2:oke
> Apr  7 15:53:21 siika /usr/sbin/sip-proxy[6801]: INFO: Routing in-dialog ACK 
> <sip:[email protected];transport=ws> from 
> <sip:[email protected]> to <sip:192.98.102.30:34664;transport=WS> based on 
> gruu
> Apr  7 15:53:21 siika rtpengine[12409]: [01a67cc3213c924f port 50000] 
> Successful STUN binding request from 192.98.102.39:50856
> Apr  7 15:53:21 siika rtpengine[12409]: [01a67cc3213c924f port 50001] 
> Successful STUN binding request from 192.98.102.39:35743
> Apr  7 15:53:21 siika rtpengine[12409]: [01a67cc3213c924f port 50000] 
> Successful STUN binding request from 192.168.43.146:55551
> Apr  7 15:53:21 siika rtpengine[12409]: [01a67cc3213c924f port 50001] 
> Successful STUN binding request from 192.168.43.146:53835
> Apr  7 15:53:22 siika rtpengine[12409]: [01a67cc3213c924f port 50000] 
> Successful STUN binding request from 192.98.104.1:54576
> Apr  7 15:53:22 siika rtpengine[12409]: [01a67cc3213c924f port 50001] 
> Successful STUN binding request from 192.98.104.1:34509
> Apr  7 15:53:22 siika rtpengine[12409]: [01a67cc3213c924f port 50000] 
> Successful STUN binding request from 192.98.102.39:50856
> Apr  7 15:53:22 siika rtpengine[12409]: [01a67cc3213c924f port 50001] 
> Successful STUN binding request from 192.98.102.39:35743
> Apr  7 15:53:23 siika rtpengine[12409]: [01a67cc3213c924f port 50000] 
> Successful STUN binding request from 192.98.104.1:54576
> Apr  7 15:53:23 siika rtpengine[12409]: [01a67cc3213c924f port 50001] 
> Successful STUN binding request from 192.98.104.1:34509
> Apr  7 15:53:23 siika rtpengine[12409]: [01a67cc3213c924f port 50000] 
> Successful STUN binding request from 192.168.43.146:55551
> Apr  7 15:53:23 siika rtpengine[12409]: [01a67cc3213c924f port 50001] 
> Successful STUN binding request from 192.168.43.146:53835
> Apr  7 15:53:24 siika rtpengine[12409]: [01a67cc3213c924f port 50000] 
> Successful STUN binding request from 192.98.104.1:54576
> Apr  7 15:53:24 siika rtpengine[12409]: [01a67cc3213c924f port 50001] 
> Successful STUN binding request from 192.98.104.1:34509
> Apr  7 15:53:24 siika rtpengine[12409]: [01a67cc3213c924f port 50000] 
> Successful STUN binding request from 192.98.102.39:50856
> Apr  7 15:53:24 siika rtpengine[12409]: [01a67cc3213c924f port 50001] 
> Successful STUN binding request from 192.98.102.39:35743
> Apr  7 15:53:25 siika rtpengine[12409]: [01a67cc3213c924f port 50000] 
> Confirmed peer information for port 50000 - 192.98.104.1:54576
> Apr  7 15:53:25 siika rtpengine[12409]: [01a67cc3213c924f port 50002] 
> Confirmed peer information for port 50002 - 192.98.102.30:10610
> Apr  7 15:53:25 siika rtpengine[12409]: [01a67cc3213c924f port 50002] 
> Kernelizing media stream with local port 50002
> Apr  7 15:53:25 siika rtpengine[12409]: [01a67cc3213c924f port 50000] 
> Kernelizing media stream with local port 50000
> Apr  7 15:53:25 siika rtpengine[12409]: [01a67cc3213c924f port 50000] 
> Successful STUN binding request from 192.98.104.1:54576
> Apr  7 15:53:25 siika rtpengine[12409]: [01a67cc3213c924f port 50001] 
> Successful STUN binding request from 192.98.104.1:34509
> Apr  7 15:53:25 siika rtpengine[12409]: [01a67cc3213c924f port 50001] 
> Confirmed peer information for port 50001 - 192.98.104.1:34509
> Apr  7 15:53:25 siika /usr/sbin/sip-proxy[6801]: INFO: ===== 
> rtpengine_delete()
> Apr  7 15:53:25 siika rtpengine[12409]: Got valid command from 
> 127.0.0.1:38149: delete - { "call-id": "01a67cc3213c924f", "received-from": [ 
> "IP4", "192.98.102.30" ], "from-tag": "7fd43a78aa5b5497", "command": "delete" 
> }
> Apr  7 15:53:25 siika rtpengine[12409]: [01a67cc3213c924f] Deleting full call
> Apr  7 15:53:25 siika rtpengine[12409]: [01a67cc3213c924f] Final packet stats:
> Apr  7 15:53:25 siika rtpengine[12409]: [01a67cc3213c924f] --- Tag 
> 'd6ms4tiim9', created 0:12 ago, in dialogue with '7fd43a78aa5b5497'
> Apr  7 15:53:25 siika rtpengine[12409]: [01a67cc3213c924f] ------ Media #1, 
> port 50002 <>   192.98.102.30:10610, 186 p, 48401 b, 0 e
> Apr  7 15:53:25 siika rtpengine[12409]: [01a67cc3213c924f] ------ Media #1, 
> port 50003 <>  192.168.43.146:10611 (RTCP), 0 p, 0 b, 0 e
> Apr  7 15:53:25 siika rtpengine[12409]: [01a67cc3213c924f] --- Tag 
> '7fd43a78aa5b5497', created 0:12 ago, in dialogue with 'd6ms4tiim9'
> Apr  7 15:53:25 siika rtpengine[12409]: [01a67cc3213c924f] ------ Media #1, 
> port 50000 <>    192.98.104.1:54576, 194 p, 64134 b, 0 e
> Apr  7 15:53:25 siika rtpengine[12409]: [01a67cc3213c924f] ------ Media #1, 
> port 50001 <>    192.98.104.1:34509 (RTCP), 5 p, 502 b, 0 e
> Apr  7 15:53:25 siika rtpengine[12409]: [01a67cc3213c924f] Returning to SIP 
> proxy: d6:result2:oke
> _______________________________________________
> sr-dev mailing list
> [email protected]
> http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-dev
> 

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
sr-dev mailing list
[email protected]
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-dev

Reply via email to