Hi,

Haven't follow if it is or not a fragmentation issue, but if it is, instead of switching to TCP, you can use the compression module to reduce the size of the SIP packet. See the mc_compact() function:
http://www.opensips.org/html/docs/modules/2.1.x/compression.html#id293508

If running an older version (than 2.1), you may simply consider removing (via remove_hf()) some optional headers (like User-Agent, Date, Time, etc)

Regards,

Bogdan-Andrei Iancu
OpenSIPS Founder and Developer
http://www.opensips-solutions.com

On 05.05.2016 23:28, Patrick Wakano wrote:
It seems you are facing packet fragmentation, and the second part of the fragment isn't reaching opensips... maybe your wifi router (if it is the only element between your endpoint and opensips) is not correct handling this situation.... I would sugest a change to TCP as your next step for debugging this problem!

On Thu, May 5, 2016 at 5:23 PM, Nabeel <[email protected] <mailto:[email protected]>> wrote:

    Yes, it is definitely listening on the non-standard port:

    # netstat -lnp | grep opensips
    udp        0      0 162.xxx.x.110:12341   0.0.0.0:*     1750/opensips

    In fact, it even seems to register correctly, but the INVITE does
    not get through.

    I have OpenSIPS set on debug level 4 but did not see anything in
    the log.


    On 5 May 2016 at 21:14, Tito Cumpen <[email protected]
    <mailto:[email protected]>> wrote:

        Nabeel,


        Did you verify that your opensips server is listening on this
        non Standard port ?

        run

        netstat -lnp | grep opensips


        On Thu, May 5, 2016 at 4:12 PM, Nabeel
        <[email protected] <mailto:[email protected]>> wrote:

            Tito Campen, I took the trace on my OpenSIPS server, which
            is the receiving proxy. However, OpenSIPS did not add
            anything to the server's log itself.

            On 5 May 2016 at 21:08, Tito Cumpen <[email protected]
            <mailto:[email protected]>> wrote:

                Nabel, You should should take a trace at the receiving
                proxy to verify the traffic is even getting there. If
                there is no sdp received from the UAS you would not
                see rtp traversing at all. Using non Standard points
                doesn't assure you that messaging traffic will traverse.

                On Thu, May 5, 2016 at 3:54 PM, Tito Cumpen
                <[email protected] <mailto:[email protected]>> wrote:

                    Adding to Bogdan's point I am successfully using
                    sip tls on port 443 without any issues as of yet.
                    It's bypassing some  isp enforced algs as well as
                    those enforced by local routers. :-).




                    On Thu, May 5, 2016 at 3:35 PM, Nabeel
                    <[email protected]
                    <mailto:[email protected]>> wrote:


                        Please check the following SIP trace taken
                        within a WiFi network. The call fails to
                        connect despite the INVITE request and using a
                        non-standard port. Could this be caused by SIP
                        ALG, or some unopened RTP port on the router?

                        http://pastebin.com/raw/C4iymTbh

                        _______________________________________________
                        Users mailing list
                        [email protected]
                        <mailto:[email protected]>
                        http://lists.opensips.org/cgi-bin/mailman/listinfo/users




                _______________________________________________
                Users mailing list
                [email protected] <mailto:[email protected]>
                http://lists.opensips.org/cgi-bin/mailman/listinfo/users



            _______________________________________________
            Users mailing list
            [email protected] <mailto:[email protected]>
            http://lists.opensips.org/cgi-bin/mailman/listinfo/users



        _______________________________________________
        Users mailing list
        [email protected] <mailto:[email protected]>
        http://lists.opensips.org/cgi-bin/mailman/listinfo/users



    _______________________________________________
    Users mailing list
    [email protected] <mailto:[email protected]>
    http://lists.opensips.org/cgi-bin/mailman/listinfo/users




_______________________________________________
Users mailing list
[email protected]
http://lists.opensips.org/cgi-bin/mailman/listinfo/users

_______________________________________________
Users mailing list
[email protected]
http://lists.opensips.org/cgi-bin/mailman/listinfo/users

Reply via email to