Hello,
I'm probably still doing something wrong, I still get 488 from the
grandstream. Also zoiper refuses the call with 415 Unsupported Media Type.
According to the module description I tried to change my config to this:
Btw, thanks for enabling verbose flags, those are more readable when
working on the config file.
if ( t_check_status("488") && sdp_content() ) {
if ( sdp_get_line_startswith("$avp(mline)", "m=") ) {
if ($avp(mline) =~ "SAVPF") {
$avp(rtpproxy_offer_flags) = "rtcp-mux-demux force trust-address
replace-origin replace-session-connection ICE=force RTP/SAVPF";
$avp(rtpproxy_answer_flags) = "rtcp-mux-demux force trust-address
replace-origin replace-session-connection ICE=remove RTP/SAVPF";
} else {
$avp(rtpproxy_offer_flags) = "rtcp-mux-demux force trust-address
replace-origin replace-session-connection ICE=remove RTP/SAVPF";
$avp(rtpproxy_answer_flags) = "rtcp-mux-demux force trust-address
replace-origin replace-session-connection ICE=force RTP/SAVPF";
}
}
}
Below is the output from tail -f /var/log/messages when trying to call from
wsclient to gsclient
(are there any debug options etc to enable full logs being written to
syslog to help get the whole data out?)
I tried using -s0 option when using ngrep but the sdp still gets cut off
for some reason, that didn't help much... Although I think there are full
sdp when I write the output to a pcap file. I wonder if there's a trick to
force full packets onto ngrep output without writing to file?
Apr 12 17:15:33 u363id562 kamailio[22688]: INFO: <script>: GOT An Initial
SIP MESSAGE INVITE from sip:wsclient@testers.com
Apr 12 17:15:33 u363id562 kamailio[22688]: INFO: <script>: GOT An Initial
SIP MESSAGE INVITE from sip:wsclient@testers.com
Apr 12 17:15:33 u363id562 kamailio[22688]: INFO: <script>: DEBUG: user
wsclient authenticated
Apr 12 17:15:33 u363id562 rtpengine[13839]: Got valid command from
127.0.0.1:41760: offer - { "sdp": "v=0#015#012o=- 3596210531114072957 2 IN
IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE
audio#015#012a=msid-semantic: WMS
dB4OToiqJrPwyddaFPR6VmIiYUu1yV9fg2ik#015#012m=audio 52996 RTP/SAVPF 111 103
104 0 8 106 105 13 126#015#012c=IN IP4 2.2.2.2#015#012a=rtcp:52996 IN IP4
2.2.2.2#015#012a=candidate:2999745851 1 udp 2122260223 192.168.56.1 52995
typ host generation 0#015#012a=candidate:2999745851 2 udp 2122260223
192.168.56.1 52995 typ host generation 0#015#012a=candidate:3350409123 1
udp 2122194687 192.168.0.101 52996 typ host generation
0#015#012a=candidate:3350409123 2 udp 2122194687 192.168.0.101 52996 typ
host generation 0#015#012a=candidate:4233069003 1 tcp 1518280447
192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp
1518280447 192.168.56.1 0 typ host generation
0#015#012a=candidate:2301678419 1 tcp 1518214911 192.168.0.101 0 typ host
generation 0#015#012a=candidate:2301678419 2 tcp 1518214911 192.168.0.101 0
typ host generation 0#015#012a=candidate:1190865175 1 udp 1685987071
2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation
0#015#012a=candidate:1190865175 2 udp 1685987071 2.2.2.2 52996 typ srflx
raddr 192.168.0.101 rport 52996 generation
0#015#012a=ice-ufrag:bAf6DoE8PTGZLWt9#015#012a=ice-pwd:HAEbKFAcaBfZXOVKZF3T0tX0#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256
72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1
urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=sendrecv#015#012a=rtcp-mux#015#012a=crypto:0
AES_CM_128_HMAC_SHA1_32
inline:bVuZwhkjJpK/dTaBmrbPzh8SVzzBhmYmRYMl5pkb#015#012a=crypto:1
AES_CM_128_HMAC_SHA1_80
inline:1UQgbnwi5BH4w1Dc71HYvF2Qp4zAfVl2HT6EE+Mn#015#012a=rtpmap:111
opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103
ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0
PCMU/8000#015#012
Apr 12 17:15:33 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] Creating
new call
Apr 12 17:15:33 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c]
Returning to SIP proxy: d3:sdp2276:v=0#015#012o=- 3596210531114072957 2 IN
IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE
audio#015#012a=msid-semantic: WMS
dB4OToiqJrPwyddaFPR6VmIiYUu1yV9fg2ik#015#012m=audio 30240 RTP/SAVPF 111 103
104 0 8 106 105 13 126#015#012c=IN IP4
1.1.1.1#015#012a=candidate:2999745851 1 udp 2122260223 192.168.56.1 52995
typ host generation 0#015#012a=candidate:2999745851 2 udp 2122260223
192.168.56.1 52995 typ host generation 0#015#012a=candidate:3350409123 1
udp 2122194687 192.168.0.101 52996 typ host generation
0#015#012a=candidate:3350409123 2 udp 2122194687 192.168.0.101 52996 typ
host generation 0#015#012a=candidate:4233069003 1 tcp 1518280447
192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp
1518280447 192.168.56.1 0 typ host generation
0#015#012a=candidate:2301678419 1 tcp 1518214911 192.168.0.101 0 typ host
generation 0#015#012a=candidate:2301678419 2 tcp 1518214911 192.168.0.101 0
typ host generation 0#015#012a=candidate:1190865175 1 udp 1685987071
2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation
0#015#012a=candidate:1190865175 2 udp 1685987071 2.2.2.2 52996 typ srflx
raddr 192.168.0.101 rport 52996 generation
0#015#012a=ice-ufrag:bAf6DoE8PTGZLWt9#015#012a=ice-pwd:HAEbKFAcaBfZXOVKZF3T0tX0#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256
72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1
urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=crypto:0
AES_CM_128_HMAC_SHA1_32
inline:bVuZwhkjJpK/dTaBmrbPzh8SVzzBhmYmRYMl5pkb#015#012a=crypto:1
AES_CM_128_HMAC_SHA1_80
inline:1UQgbnwi5BH4w1Dc71HYvF2Qp4zAfVl2HT6EE+Mn#015#012a=rtpmap:111
opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103
ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0
PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:106
CN/32000#015#012a=rtpmap:105 CN/1
Apr 12 17:15:33 u363id562 kamailio[22674]: NOTICE: acc [acc.c:315]:
acc_log_request(): ACC: call missed:
timestamp=1397308533;method=INVITE;from_tag=6444olaqoi;to_tag=b364b8b4a27abfb1;call_id=dtgbbcrpth16rb2ks58c;code=488;reason=Not
Acceptable
Here;src_user=wsclient;src_domain=testers.com
;src_ip=2.2.2.2;dst_ouser=gsclient;dst_user=gsclient;dst_domain=192.168.0.106
Apr 12 17:15:33 u363id562 kamailio[22674]: ALERT: <script>: SAVPF found,
setting flags using: ICE=force RTP/SAVPF in offer and ICE=remove RTP/SAVPF
in answer
Apr 12 17:15:33 u363id562 rtpengine[13839]: Got valid command from
127.0.0.1:54535: offer - { "sdp": "v=0#015#012o=- 3596210531114072957 2 IN
IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE
audio#015#012a=msid-semantic: WMS
dB4OToiqJrPwyddaFPR6VmIiYUu1yV9fg2ik#015#012m=audio 52996 RTP/SAVPF 111 103
104 0 8 106 105 13 126#015#012c=IN IP4 2.2.2.2#015#012a=rtcp:52996 IN IP4
2.2.2.2#015#012a=candidate:2999745851 1 udp 2122260223 192.168.56.1 52995
typ host generation 0#015#012a=candidate:2999745851 2 udp 2122260223
192.168.56.1 52995 typ host generation 0#015#012a=candidate:3350409123 1
udp 2122194687 192.168.0.101 52996 typ host generation
0#015#012a=candidate:3350409123 2 udp 2122194687 192.168.0.101 52996 typ
host generation 0#015#012a=candidate:4233069003 1 tcp 1518280447
192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp
1518280447 192.168.56.1 0 typ host generation
0#015#012a=candidate:2301678419 1 tcp 1518214911 192.168.0.101 0 typ host
generation 0#015#012a=candidate:2301678419 2 tcp 1518214911 192.168.0.101 0
typ host generation 0#015#012a=candidate:1190865175 1 udp 1685987071
2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation
0#015#012a=candidate:1190865175 2 udp 1685987071 2.2.2.2 52996 typ srflx
raddr 192.168.0.101 rport 52996 generation
0#015#012a=ice-ufrag:bAf6DoE8PTGZLWt9#015#012a=ice-pwd:HAEbKFAcaBfZXOVKZF3T0tX0#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256
72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1
urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=sendrecv#015#012a=rtcp-mux#015#012a=crypto:0
AES_CM_128_HMAC_SHA1_32
inline:bVuZwhkjJpK/dTaBmrbPzh8SVzzBhmYmRYMl5pkb#015#012a=crypto:1
AES_CM_128_HMAC_SHA1_80
inline:1UQgbnwi5BH4w1Dc71HYvF2Qp4zAfVl2HT6EE+Mn#015#012a=rtpmap:111
opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103
ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0
PCMU/8000#015#012
Apr 12 17:15:33 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c]
Returning to SIP proxy: d3:sdp2267:v=0#015#012o=- 3596210531114072957 2 IN
IP4 1.1.1.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE
audio#015#012a=msid-semantic: WMS
dB4OToiqJrPwyddaFPR6VmIiYUu1yV9fg2ik#015#012m=audio 30240 RTP/SAVPF 111 103
104 0 8 106 105 13 126#015#012c=IN IP4
1.1.1.1#015#012a=candidate:2999745851 1 udp 2122260223 192.168.56.1 52995
typ host generation 0#015#012a=candidate:2999745851 2 udp 2122260223
192.168.56.1 52995 typ host generation 0#015#012a=candidate:3350409123 1
udp 2122194687 192.168.0.101 52996 typ host generation
0#015#012a=candidate:3350409123 2 udp 2122194687 192.168.0.101 52996 typ
host generation 0#015#012a=candidate:4233069003 1 tcp 1518280447
192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp
1518280447 192.168.56.1 0 typ host generation
0#015#012a=candidate:2301678419 1 tcp 1518214911 192.168.0.101 0 typ host
generation 0#015#012a=candidate:2301678419 2 tcp 1518214911 192.168.0.101 0
typ host generation 0#015#012a=candidate:1190865175 1 udp 1685987071
2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation
0#015#012a=candidate:1190865175 2 udp 1685987071 2.2.2.2 52996 typ srflx
raddr 192.168.0.101 rport 52996 generation
0#015#012a=ice-ufrag:bAf6DoE8PTGZLWt9#015#012a=ice-pwd:HAEbKFAcaBfZXOVKZF3T0tX0#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256
72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1
urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=crypto:0
AES_CM_128_HMAC_SHA1_32
inline:bVuZwhkjJpK/dTaBmrbPzh8SVzzBhmYmRYMl5pkb#015#012a=crypto:1
AES_CM_128_HMAC_SHA1_80
inline:1UQgbnwi5BH4w1Dc71HYvF2Qp4zAfVl2HT6EE+Mn#015#012a=rtpmap:111
opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103
ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0
PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:106
CN/32000#015#012a=rtpmap:105 C
Apr 12 17:15:33 u363id562 rtpengine[13839]: Got valid command from
127.0.0.1:54535: offer - { "sdp": "v=0#015#012o=- 3596210531114072957 2 IN
IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE
audio#015#012a=msid-semantic: WMS
dB4OToiqJrPwyddaFPR6VmIiYUu1yV9fg2ik#015#012m=audio 52996 RTP/SAVPF 111 103
104 0 8 106 105 13 126#015#012c=IN IP4 2.2.2.2#015#012a=rtcp:52996 IN IP4
2.2.2.2#015#012a=candidate:2999745851 1 udp 2122260223 192.168.56.1 52995
typ host generation 0#015#012a=candidate:2999745851 2 udp 2122260223
192.168.56.1 52995 typ host generation 0#015#012a=candidate:3350409123 1
udp 2122194687 192.168.0.101 52996 typ host generation
0#015#012a=candidate:3350409123 2 udp 2122194687 192.168.0.101 52996 typ
host generation 0#015#012a=candidate:4233069003 1 tcp 1518280447
192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp
1518280447 192.168.56.1 0 typ host generation
0#015#012a=candidate:2301678419 1 tcp 1518214911 192.168.0.101 0 typ host
generation 0#015#012a=candidate:2301678419 2 tcp 1518214911 192.168.0.101 0
typ host generation 0#015#012a=candidate:1190865175 1 udp 1685987071
2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation
0#015#012a=candidate:1190865175 2 udp 1685987071 2.2.2.2 52996 typ srflx
raddr 192.168.0.101 rport 52996 generation
0#015#012a=ice-ufrag:bAf6DoE8PTGZLWt9#015#012a=ice-pwd:HAEbKFAcaBfZXOVKZF3T0tX0#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256
72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1
urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=sendrecv#015#012a=rtcp-mux#015#012a=crypto:0
AES_CM_128_HMAC_SHA1_32
inline:bVuZwhkjJpK/dTaBmrbPzh8SVzzBhmYmRYMl5pkb#015#012a=crypto:1
AES_CM_128_HMAC_SHA1_80
inline:1UQgbnwi5BH4w1Dc71HYvF2Qp4zAfVl2HT6EE+Mn#015#012a=rtpmap:111
opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103
ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0
PCMU/8000#015#012
Apr 12 17:15:33 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c]
Returning to SIP proxy: d3:sdp2276:v=0#015#012o=- 3596210531114072957 2 IN
IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE
audio#015#012a=msid-semantic: WMS
dB4OToiqJrPwyddaFPR6VmIiYUu1yV9fg2ik#015#012m=audio 30240 RTP/SAVPF 111 103
104 0 8 106 105 13 126#015#012c=IN IP4
1.1.1.1#015#012a=candidate:2999745851 1 udp 2122260223 192.168.56.1 52995
typ host generation 0#015#012a=candidate:2999745851 2 udp 2122260223
192.168.56.1 52995 typ host generation 0#015#012a=candidate:3350409123 1
udp 2122194687 192.168.0.101 52996 typ host generation
0#015#012a=candidate:3350409123 2 udp 2122194687 192.168.0.101 52996 typ
host generation 0#015#012a=candidate:4233069003 1 tcp 1518280447
192.168.56.1 0 typ host generation 0#015#012a=candidate:4233069003 2 tcp
1518280447 192.168.56.1 0 typ host generation
0#015#012a=candidate:2301678419 1 tcp 1518214911 192.168.0.101 0 typ host
generation 0#015#012a=candidate:2301678419 2 tcp 1518214911 192.168.0.101 0
typ host generation 0#015#012a=candidate:1190865175 1 udp 1685987071
2.2.2.2 52996 typ srflx raddr 192.168.0.101 rport 52996 generation
0#015#012a=candidate:1190865175 2 udp 1685987071 2.2.2.2 52996 typ srflx
raddr 192.168.0.101 rport 52996 generation
0#015#012a=ice-ufrag:bAf6DoE8PTGZLWt9#015#012a=ice-pwd:HAEbKFAcaBfZXOVKZF3T0tX0#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256
72:54:87:EC:D2:4C:D1:70:C2:FE:69:08:20:5C:92:1D:E0:EA:BD:45:09:E0:90:62:27:B6:34:60:54:E2:99:28#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1
urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=crypto:0
AES_CM_128_HMAC_SHA1_32
inline:bVuZwhkjJpK/dTaBmrbPzh8SVzzBhmYmRYMl5pkb#015#012a=crypto:1
AES_CM_128_HMAC_SHA1_80
inline:1UQgbnwi5BH4w1Dc71HYvF2Qp4zAfVl2HT6EE+Mn#015#012a=rtpmap:111
opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103
ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0
PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:106
CN/32000#015#012a=rtpmap:105 CN/1
Apr 12 17:15:34 u363id562 kamailio[22689]: INFO: <script>: GOT An Initial
SIP MESSAGE REGISTER from sip:zoiperclient2@testers.com;transport=TCP
Apr 12 17:15:34 u363id562 kamailio[22689]: INFO: <script>: GOT An Initial
SIP MESSAGE REGISTER from sip:zoiperclient2@testers.com;transport=TCP
Apr 12 17:15:34 u363id562 kamailio[22689]: INFO: <script>: DEBUG: user
zoiperclient2 authenticated
Apr 12 17:15:34 u363id562 kamailio[22689]: INFO: <script>: GOT An Initial
SIP MESSAGE SUBSCRIBE from sip:zoiperclient2@testers.com;transport=TCP
Apr 12 17:15:34 u363id562 kamailio[22689]: INFO: <script>: GOT An Initial
SIP MESSAGE SUBSCRIBE from sip:zoiperclient2@testers.com;transport=TCP
Apr 12 17:15:34 u363id562 kamailio[22689]: INFO: <script>: DEBUG: user
zoiperclient2 authenticated
Apr 12 17:15:35 u363id562 kamailio[22690]: ERROR: <core> [tcp_read.c:289]:
tcp_read_data(): error reading: Connection reset by peer (104)
Apr 12 17:15:35 u363id562 kamailio[22690]: ERROR: <core> [tcp_read.c:1281]:
tcp_read_req(): ERROR: tcp_read_req: error reading
Apr 12 17:15:37 u363id562 rtpengine[13839]: Got valid command from
127.0.0.1:36626: delete - { "call-id": "dtgbbcrpth16rb2ks58c",
"received-from": [ "IP4", "2.2.2.2" ], "from-tag":
"6444olaqoi", "command":
"delete" }
Apr 12 17:15:37 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] Deleting
full call
Apr 12 17:15:37 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] Final
packet stats:
Apr 12 17:15:37 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] --- Tag
'', created 0:04 ago, in dialogue with '(none)'
Apr 12 17:15:37 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] ------
Media #1, port 30242 <> 2.2.2.2:52996, 0 p, 0 b, 0 e
Apr 12 17:15:37 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] --- Tag
'6444olaqoi', created 0:04 ago, in dialogue with ''
Apr 12 17:15:37 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c] ------
Media #1, port 30240 <> [::]:0 , 0 p, 0 b, 0 e
Apr 12 17:15:37 u363id562 rtpengine[13839]: [dtgbbcrpth16rb2ks58c]
Returning to SIP proxy: d6:result2:oke
cheers,
Olli
2014-04-10 16:48 GMT+03:00 Richard Fuchs <rfuchs(a)sipwise.com>om>:
On 04/10/14 09:26, Olli Heiskanen wrote:
Hello,
After some tests, I'm still having some strange results.
When calling from ws client to grandstream, I get the below output to
/var/log/messages.
In a sip trace after 488 there are only INVITEs from kamailio server to
grandstream but no responses come back to kamailio server.
I haven't changed any other configurations, kamailio or otherwise. I run
the rtpengine like this:
/usr/sbin/rtpengine --table=0 --ip=1.1.1.1 --listen-udp=127.0.0.1:7722
<http://127.0.0.1:7722> --listen-ng=127.0.0.1:7723
<http://127.0.0.1:7723> --tos=184 --pidfile=/var/run/rtpengine.pid
(where 1.1.1.1 is my kamailio server ip)
How do I work out the problem from here? Please let me know if you need
any further info or logs and I'll dig those out.
Unfortunately the log lines are cut off and don't include the entire
command packet to rtpengine, but my guess is that you omitted the ICE
handling parameter, which (as of a few days ago) forces rtpengine into
passthrough mode, which means that most of the RTP/SAVPF attributes are
left in place. My guess is that this confuses the grandstream.
You should use either ICE=force or ICE=remove (formerly "+" or "-"
flags) to make sure rtpengine is actually able to bridge between the
protocols. You should also add the "rtcp-mux-demux" flag (through
rtpengine module) in case the grandstream gets confused by rtcp-mux
being offered.
With those two in place, the resulting RTP/AVP SDP should be very small
and clean.
cheers
_______________________________________________
SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
sr-users(a)lists.sip-router.org
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users