Hello,
After some tests, I'm still having some strange results.
When calling from ws client to grandstream, I get the below output to
/var/log/messages.
In a sip trace after 488 there are only INVITEs from kamailio server to
grandstream but no responses come back to kamailio server.
I haven't changed any other configurations, kamailio or otherwise. I run
the rtpengine like this:
/usr/sbin/rtpengine --table=0 --ip=1.1.1.1
--listen-udp=127.0.0.1:7722--listen-ng=
127.0.0.1:7723 --tos=184 --pidfile=/var/run/rtpengine.pid
(where 1.1.1.1 is my kamailio server ip)
How do I work out the problem from here? Please let me know if you need any
further info or logs and I'll dig those out.
cheers,
Olli
Apr 10 17:10:16 u363id562 kamailio[10451]: INFO: <script>: GOT An Initial
SIP MESSAGE INVITE from sip:wsclient@testers.com
Apr 10 17:10:17 u363id562 kamailio[10451]: INFO: <script>: GOT An Initial
SIP MESSAGE INVITE from sip:wsclient@testers.com
Apr 10 17:10:17 u363id562 kamailio[10451]: INFO: <script>: DEBUG: user
wsclient authenticated
Apr 10 17:10:17 u363id562 rtpengine[13839]: Got valid command from
127.0.0.1:35608: offer - { "sdp": "v=0#015#012o=- 3039037756476840958 2 IN
IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE
audio#015#012a=msid-semantic: WMS
BvNdmpBIxiDTYKfuot9JeFD89fHbTTPzK6MG#015#012m=audio 60273 RTP/SAVPF 111 103
104 0 8 106 105 13 126#015#012c=IN IP4 2.2.2.2#015#012a=rtcp:60273 IN IP4
2.2.2.2#015#012a=candidate:2999745851 1 udp 2113937151 192.168.56.1 60272
typ host generation 0#015#012a=candidate:2999745851 2 udp 2113937151
192.168.56.1 60272 typ host generation 0#015#012a=candidate:3350409123 1
udp 2113937151 192.168.0.101 60273 typ host generation
0#015#012a=candidate:3350409123 2 udp 2113937151 192.168.0.101 60273 typ
host generation 0#015#012a=candidate:4233069003 1 tcp 1509957375
192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp
1509957375 192.168.56.1 0 typ host generation
0#015#012a=candidate:2301678419 1 tcp 1509957375 192.168.0.101 0 typ host
generation 0#015#012a=candidate:2301678419 2 tcp 1509957375 192.168.0.101 0
typ host generation 0#015#012a=candidate:1190865175 1 udp 1845501695
2.2.2.2 60273 typ srflx raddr 192.168.0.101 rport 60273 generation
0#015#012a=candidate:1190865175 2 udp 1845501695 2.2.2.2 60273 typ srflx
raddr 192.168.0.101 rport 60273 generation
0#015#012a=ice-ufrag:OQDSQjsP/gqERPJK#015#012a=ice-pwd:Yi4cb76Uyk2S8+v9yAiH1Rvq#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256
72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1
urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=sendrecv#015#012a=rtcp-mux#015#012a=crypto:0
AES_CM_128_HMAC_SHA1_32
inline:J/4necDa9RPPu8pBeS5/ATPlAUPbRN1i0sA1cH5h#015#012a=crypto:1
AES_CM_128_HMAC_SHA1_80
inline:1wAuy1eAPr5XVKEjzv+D43J6Ev86P6DIxPWugdC3#015#012a=rtpmap:111
opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103
ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0
PCMU/8000#015#012
Apr 10 17:10:17 u363id562 rtpengine[13839]: [cid3il8lc9432jo3iair] Creating
new call
Apr 10 17:10:17 u363id562 rtpengine[13839]: [cid3il8lc9432jo3iair]
Returning to SIP proxy: d3:sdp2275:v=0#015#012o=- 3039037756476840958 2 IN
IP4 1.1.1.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE
audio#015#012a=msid-semantic: WMS
BvNdmpBIxiDTYKfuot9JeFD89fHbTTPzK6MG#015#012m=audio 30136 RTP/SAVPF 111 103
104 0 8 106 105 13 126#015#012c=IN IP4
1.1.1.1#015#012a=candidate:2999745851 1 udp 2113937151 192.168.56.1 60272
typ host generation 0#015#012a=candidate:2999745851 2 udp 2113937151
192.168.56.1 60272 typ host generation 0#015#012a=candidate:3350409123 1
udp 2113937151 192.168.0.101 60273 typ host generation
0#015#012a=candidate:3350409123 2 udp 2113937151 192.168.0.101 60273 typ
host generation 0#015#012a=candidate:4233069003 1 tcp 1509957375
192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp
1509957375 192.168.56.1 0 typ host generation
0#015#012a=candidate:2301678419 1 tcp 1509957375 192.168.0.101 0 typ host
generation 0#015#012a=candidate:2301678419 2 tcp 1509957375 192.168.0.101 0
typ host generation 0#015#012a=candidate:1190865175 1 udp 1845501695
2.2.2.2 60273 typ srflx raddr 192.168.0.101 rport 60273 generation
0#015#012a=candidate:1190865175 2 udp 1845501695 2.2.2.2 60273 typ srflx
raddr 192.168.0.101 rport 60273 generation
0#015#012a=ice-ufrag:OQDSQjsP/gqERPJK#015#012a=ice-pwd:Yi4cb76Uyk2S8+v9yAiH1Rvq#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256
72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1
urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=crypto:0
AES_CM_128_HMAC_SHA1_32
inline:J/4necDa9RPPu8pBeS5/ATPlAUPbRN1i0sA1cH5h#015#012a=crypto:1
AES_CM_128_HMAC_SHA1_80
inline:1wAuy1eAPr5XVKEjzv+D43J6Ev86P6DIxPWugdC3#015#012a=rtpmap:111
opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103
ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0
PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:106
CN/32000#015#012a=rtpmap:105 C
Apr 10 17:10:17 u363id562 kamailio[10437]: NOTICE: acc [acc.c:315]:
acc_log_request(): ACC: call missed:
timestamp=1397135417;method=INVITE;from_tag=26rk17462e;to_tag=ffce92879a57942a;call_id=cid3il8lc9432jo3iair;code=488;reason=Not
Acceptable
Here;src_user=wsclient;src_domain=testers.com
;src_ip=2.2.2.2;dst_ouser=gsclient;dst_user=gsclient;dst_domain=192.168.0.106
Apr 10 17:10:17 u363id562 rtpengine[13839]: Got valid command from
127.0.0.1:55156: offer - { "sdp": "v=0#015#012o=- 3039037756476840958 2 IN
IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE
audio#015#012a=msid-semantic: WMS
BvNdmpBIxiDTYKfuot9JeFD89fHbTTPzK6MG#015#012m=audio 60273 RTP/SAVPF 111 103
104 0 8 106 105 13 126#015#012c=IN IP4 2.2.2.2#015#012a=rtcp:60273 IN IP4
2.2.2.2#015#012a=candidate:2999745851 1 udp 2113937151 192.168.56.1 60272
typ host generation 0#015#012a=candidate:2999745851 2 udp 2113937151
192.168.56.1 60272 typ host generation 0#015#012a=candidate:3350409123 1
udp 2113937151 192.168.0.101 60273 typ host generation
0#015#012a=candidate:3350409123 2 udp 2113937151 192.168.0.101 60273 typ
host generation 0#015#012a=candidate:4233069003 1 tcp 1509957375
192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp
1509957375 192.168.56.1 0 typ host generation
0#015#012a=candidate:2301678419 1 tcp 1509957375 192.168.0.101 0 typ host
generation 0#015#012a=candidate:2301678419 2 tcp 1509957375 192.168.0.101 0
typ host generation 0#015#012a=candidate:1190865175 1 udp 1845501695
2.2.2.2 60273 typ srflx raddr 192.168.0.101 rport 60273 generation
0#015#012a=candidate:1190865175 2 udp 1845501695 2.2.2.2 60273 typ srflx
raddr 192.168.0.101 rport 60273 generation
0#015#012a=ice-ufrag:OQDSQjsP/gqERPJK#015#012a=ice-pwd:Yi4cb76Uyk2S8+v9yAiH1Rvq#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256
72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1
urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=sendrecv#015#012a=rtcp-mux#015#012a=crypto:0
AES_CM_128_HMAC_SHA1_32
inline:J/4necDa9RPPu8pBeS5/ATPlAUPbRN1i0sA1cH5h#015#012a=crypto:1
AES_CM_128_HMAC_SHA1_80
inline:1wAuy1eAPr5XVKEjzv+D43J6Ev86P6DIxPWugdC3#015#012a=rtpmap:111
opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103
ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0
PCMU/8000#015#012
Apr 10 17:10:17 u363id562 rtpengine[13839]: [cid3il8lc9432jo3iair]
Returning to SIP proxy: d3:sdp2123:v=0#015#012o=- 3039037756476840958 2 IN
IP4 1.1.1.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE
audio#015#012a=msid-semantic: WMS
BvNdmpBIxiDTYKfuot9JeFD89fHbTTPzK6MG#015#012m=audio 30136 RTP/AVP 111 103
104 0 8 106 105 13 126#015#012c=IN IP4
1.1.1.1#015#012a=candidate:2999745851 1 udp 2113937151 192.168.56.1 60272
typ host generation 0#015#012a=candidate:2999745851 2 udp 2113937151
192.168.56.1 60272 typ host generation 0#015#012a=candidate:3350409123 1
udp 2113937151 192.168.0.101 60273 typ host generation
0#015#012a=candidate:3350409123 2 udp 2113937151 192.168.0.101 60273 typ
host generation 0#015#012a=candidate:4233069003 1 tcp 1509957375
192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp
1509957375 192.168.56.1 0 typ host generation
0#015#012a=candidate:2301678419 1 tcp 1509957375 192.168.0.101 0 typ host
generation 0#015#012a=candidate:2301678419 2 tcp 1509957375 192.168.0.101 0
typ host generation 0#015#012a=candidate:1190865175 1 udp 1845501695
2.2.2.2 60273 typ srflx raddr 192.168.0.101 rport 60273 generation
0#015#012a=candidate:1190865175 2 udp 1845501695 2.2.2.2 60273 typ srflx
raddr 192.168.0.101 rport 60273 generation
0#015#012a=ice-ufrag:OQDSQjsP/gqERPJK#015#012a=ice-pwd:Yi4cb76Uyk2S8+v9yAiH1Rvq#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256
72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1
urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=crypto:0
AES_CM_128_HMAC_SHA1_32
inline:J/4necDa9RPPu8pBeS5/ATPlAUPbRN1i0sA1cH5h#015#012a=crypto:1
AES_CM_128_HMAC_SHA1_80
inline:1wAuy1eAPr5XVKEjzv+D43J6Ev86P6DIxPWugdC3#015#012a=rtpmap:111
opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103
ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0
PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:106
CN/32000#015#012a=rtpmap:105 CN/
Apr 10 17:10:17 u363id562 rtpengine[13839]: Got valid command from
127.0.0.1:55156: offer - { "sdp": "v=0#015#012o=- 3039037756476840958 2 IN
IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE
audio#015#012a=msid-semantic: WMS
BvNdmpBIxiDTYKfuot9JeFD89fHbTTPzK6MG#015#012m=audio 60273 RTP/SAVPF 111 103
104 0 8 106 105 13 126#015#012c=IN IP4 2.2.2.2#015#012a=rtcp:60273 IN IP4
2.2.2.2#015#012a=candidate:2999745851 1 udp 2113937151 192.168.56.1 60272
typ host generation 0#015#012a=candidate:2999745851 2 udp 2113937151
192.168.56.1 60272 typ host generation 0#015#012a=candidate:3350409123 1
udp 2113937151 192.168.0.101 60273 typ host generation
0#015#012a=candidate:3350409123 2 udp 2113937151 192.168.0.101 60273 typ
host generation 0#015#012a=candidate:4233069003 1 tcp 1509957375
192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp
1509957375 192.168.56.1 0 typ host generation
0#015#012a=candidate:2301678419 1 tcp 1509957375 192.168.0.101 0 typ host
generation 0#015#012a=candidate:2301678419 2 tcp 1509957375 192.168.0.101 0
typ host generation 0#015#012a=candidate:1190865175 1 udp 1845501695
2.2.2.2 60273 typ srflx raddr 192.168.0.101 rport 60273 generation
0#015#012a=candidate:1190865175 2 udp 1845501695 2.2.2.2 60273 typ srflx
raddr 192.168.0.101 rport 60273 generation
0#015#012a=ice-ufrag:OQDSQjsP/gqERPJK#015#012a=ice-pwd:Yi4cb76Uyk2S8+v9yAiH1Rvq#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256
72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1
urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=sendrecv#015#012a=rtcp-mux#015#012a=crypto:0
AES_CM_128_HMAC_SHA1_32
inline:J/4necDa9RPPu8pBeS5/ATPlAUPbRN1i0sA1cH5h#015#012a=crypto:1
AES_CM_128_HMAC_SHA1_80
inline:1wAuy1eAPr5XVKEjzv+D43J6Ev86P6DIxPWugdC3#015#012a=rtpmap:111
opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103
ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0
PCMU/8000#015#012
Apr 10 17:10:17 u363id562 rtpengine[13839]: [cid3il8lc9432jo3iair]
Returning to SIP proxy: d3:sdp2273:v=0#015#012o=- 3039037756476840958 2 IN
IP4 1.1.1.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE
audio#015#012a=msid-semantic: WMS
BvNdmpBIxiDTYKfuot9JeFD89fHbTTPzK6MG#015#012m=audio 30136 RTP/AVP 111 103
104 0 8 106 105 13 126#015#012c=IN IP4
1.1.1.1#015#012a=candidate:2999745851 1 udp 2113937151 192.168.56.1 60272
typ host generation 0#015#012a=candidate:2999745851 2 udp 2113937151
192.168.56.1 60272 typ host generation 0#015#012a=candidate:3350409123 1
udp 2113937151 192.168.0.101 60273 typ host generation
0#015#012a=candidate:3350409123 2 udp 2113937151 192.168.0.101 60273 typ
host generation 0#015#012a=candidate:4233069003 1 tcp 1509957375
192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp
1509957375 192.168.56.1 0 typ host generation
0#015#012a=candidate:2301678419 1 tcp 1509957375 192.168.0.101 0 typ host
generation 0#015#012a=candidate:2301678419 2 tcp 1509957375 192.168.0.101 0
typ host generation 0#015#012a=candidate:1190865175 1 udp 1845501695
2.2.2.2 60273 typ srflx raddr 192.168.0.101 rport 60273 generation
0#015#012a=candidate:1190865175 2 udp 1845501695 2.2.2.2 60273 typ srflx
raddr 192.168.0.101 rport 60273 generation
0#015#012a=ice-ufrag:OQDSQjsP/gqERPJK#015#012a=ice-pwd:Yi4cb76Uyk2S8+v9yAiH1Rvq#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256
72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1
urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=crypto:0
AES_CM_128_HMAC_SHA1_32
inline:J/4necDa9RPPu8pBeS5/ATPlAUPbRN1i0sA1cH5h#015#012a=crypto:1
AES_CM_128_HMAC_SHA1_80
inline:1wAuy1eAPr5XVKEjzv+D43J6Ev86P6DIxPWugdC3#015#012a=rtpmap:111
opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103
ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0
PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:106
CN/32000#015#012a=rtpmap:105 CN/
Apr 10 17:10:47 u363id562 rtpengine[13839]: Got valid command from
127.0.0.1:34672: delete - { "call-id": "cid3il8lc9432jo3iair",
"received-from": [ "IP4", "2.2.2.2" ], "from-tag":
"26rk17462e", "command":
"delete" }
Apr 10 17:10:47 u363id562 rtpengine[13839]: [cid3il8lc9432jo3iair] Deleting
full call
Apr 10 17:10:47 u363id562 rtpengine[13839]: [cid3il8lc9432jo3iair] Final
packet stats:
Apr 10 17:10:47 u363id562 rtpengine[13839]: [cid3il8lc9432jo3iair] --- Tag
'', created 0:30 ago, in dialogue with '(none)'
Apr 10 17:10:47 u363id562 rtpengine[13839]: [cid3il8lc9432jo3iair] ------
Media #1, port 30138 <> 2.2.2.2:60273, 0 p, 0 b, 0 e
Apr 10 17:10:47 u363id562 rtpengine[13839]: [cid3il8lc9432jo3iair] --- Tag
'26rk17462e', created 0:30 ago, in dialogue with ''
Apr 10 17:10:47 u363id562 rtpengine[13839]: [cid3il8lc9432jo3iair] ------
Media #1, port 30136 <> [::]:0 , 0 p, 0 b, 0 e
Apr 10 17:10:47 u363id562 rtpengine[13839]: [cid3il8lc9432jo3iair]
Returning to SIP proxy: d6:result2:oke
2014-04-09 15:00 GMT+03:00 Peter Dunkley <peter.dunkley(a)acision.com>om>:
Indeed, which works for simple demos and fits on a
single slide - the
whole purpose of that presentation. If someone is building a production
system they really need to understand the various use-cases they will see
and write their Kamailio configuration properly.
Regards,
Peter
On 6 April 2014 19:58, Juha Heinanen <jh(a)tutpro.com> wrote:
Olli Heiskanen writes:
Thanks, I'll look into the rtpengine, had a
busy weekend but next week
I'll
have better time.
what comes to peter's slideshare failure_route example, i think it only
works in very simple unrealistic scenario when there is no forking or
serial routing. also, its nathelper handling is unnecessary when
websocket sip ua, such as jssip, supports gruu.
-- juha
_______________________________________________
SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
sr-users(a)lists.sip-router.org
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users
--
Peter Dunkley
Technical Director
Acision
_______________________________________________
SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
sr-users(a)lists.sip-router.org
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users