[Spce-user] webRTC in production

H Yavari hyavari at rocketmail.com
Thu Nov 20 04:42:01 EST 2014


Hi again,
I attached the rtp.log for a call between browser to eyebeam soft phone.
Regards,H.Yavari
      
   
Hi Thomas,
I using : "srtp_transcoding" = "Force RTP"  and "rtcp_feedback" = "Force AVP" other things are default of sipwise.Thanks for reply.

Regards,H. Yavari


    Hello Yavari,what are your current settings in „NAT and Media Flow Control“ for your sip user ?jssip should actually work.BRThomas
Am 20.11.2014 um 09:35 schrieb H Yavari <hyavari at rocketmail.com>:



Hi,I could to solve this issue. someone that had this problem said that jssip should run on Apache, so I did my test with sipml5 and now call will be established but there is no voice (RTP) and after 30 sec call terminated that I think is because for RTP timeout.So are there any configs that I should do ?Thanks.


Regards,H.Yavari

      From: H Yavari <hyavari at rocketmail.com>
 To: "spce-user at lists.sipwise.com" <spce-user at lists.sipwise.com> 
 Sent: Thursday, 20 November 2014, 10:12:08
 Subject: Re: [Spce-user] webRTC in production
   
Hi,I installed the m3.6.1 and now I can registered my sip user from browser. But now when I create a call, I receive "User Denied Media Access"and call not established.
I changed the "srtp_transcoding" to Force RTP but error not changed. 
How can I solve this issue?Thanks.

Regards,H.Yavari


   
Jssip (like http://tryit.jssip.net/) work with wss URLs too. Use the
ones I specified earlier in the thread.

Andreas





   
_______________________________________________
Spce-user mailing list
Spce-user at lists.sipwise.com
https://lists.sipwise.com/listinfo/spce-user


  
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.sipwise.com/pipermail/spce-user_lists.sipwise.com/attachments/20141120/c39ab4ef/attachment-0001.html>
-------------- next part --------------
Nov 20 15:01:56 spce rtpengine[6168]: Got valid command from 127.0.0.1:40274: offer - { "sdp": "v=0#015#012o=- 5554664196078908000 2 IN IP4 127.0.0.1#015#012s=Doubango Telecom - chrome#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS AslaQZmELMoeSB1irRN4o7LGGUDlqjs8e3E9#015#012m=audio 54674 UDP/TLS/RTP/SAVPF 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 192.168.1.198#015#012a=rtcp:54674 IN IP4 192.168.99.10#015#012a=candidate:232351827 1 udp 2122194687 192.168.99.10 54674 typ host generation 0#015#012a=candidate:232351827 2 udp 2122194687 192.168.99.10 54674 typ host gen ...
Nov 20 15:01:56 spce rtpengine[6168]: ... eration 0#015#012a=candidate:2268300305 1 udp 2122129151 192.168.1.214 54675 typ host generation 0#015#012a=candidate:2268300305 2 udp 2122129151 192.168.1.214 54675 typ host generation 0#015#012a=candidate:1465516038 1 udp 2122063615 172.16.99.50 54676 typ host generation 0#015#012a=candidate:1465516038 2 udp 2122063615 172.16.99.50 54676 typ host generation 0#015#012a=candidate:1130009763 1 tcp 1518214911 192.168.99.10 0 typ host tcptype active generation 0#015#012a=candidate:1130009763 2 tcp 1518214911 192.168.99.10 0 typ host  ...
Nov 20 15:01:56 spce rtpengine[6168]: ... tcptype active generation 0#015#012a=candidate:3383785697 1 tcp 1518149375 192.168.1.214 0 typ host tcptype active generation 0#015#012a=candidate:3383785697 2 tcp 1518149375 192.168.1.214 0 typ host tcptype active generation 0#015#012a=candidate:433716470 1 tcp 1518083839 172.16.99.50 0 typ host tcptype active generation 0#015#012a=candidate:433716470 2 tcp 1518083839 172.16.99.50 0 typ host tcptype active generation 0#015#012a=ice-ufrag:cRsPDA6jEoCw8kGV#015#012a=ice-pwd:JXD1/WrInD8cs/oFuMMqdCtQ#015#012a=ice-options:google-ice#015#012a=finge ...
Nov 20 15:01:56 spce rtpengine[6168]: ... rprint:sha-256 18:C5:21:3D:71:09:11:02:B8:A3:0E:3B:82:C1:2B:06:A6:F4:51:F2:A9:A9:6C:F7:25:A9:EC:69:71:E4:3F:D5#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=extmap:3 http://www.webrtc.org/experiments/rtp-hdrext/abs-send-time#015#012a=sendrecv#015#012a=rtcp-mux#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:106 CN/32000#015#012a=rtpmap:105 CN/16000#015#012a=rtpmap:13 CN/8 ...
Nov 20 15:01:56 spce rtpengine[6168]: ... 000#015#012a=rtpmap:126 telephone-event/8000#015#012a=maxptime:60#015#012a=ssrc:4196000575 cname:tkfQNZvMSuMsA7mz#015#012a=ssrc:4196000575 msid:AslaQZmELMoeSB1irRN4o7LGGUDlqjs8e3E9 9b39a3e3-b64b-4b7b-a4e1-b9d5f873a20e#015#012a=ssrc:4196000575 mslabel:AslaQZmELMoeSB1irRN4o7LGGUDlqjs8e3E9#015#012a=ssrc:4196000575 label:9b39a3e3-b64b-4b7b-a4e1-b9d5f873a20e#015#012a=direction:active#015#012a=oldmediaip:192.168.99.10#015#012", "address-family": "IP4", "ICE": "remove", "flags": [ "trust-address" ], "replace": [ "origin", "session-connection" ], "transpor ...
Nov 20 15:01:56 spce rtpengine[6168]: ... t-protocol": "RTP/AVP", "rtcp-mux": [ "demux" ], "call-id": "2f758536-81ac-64ec-9641-472a058286e5", "via-branch": "z9hG4bK054c.b5a10521924b52e05d949724c8f5a10f.0", "received-from": [ "IP4", "127.0.0.1" ], "from-tag": "MT7QNeUxg0UgD2fBzz2X", "command": "offer" }
Nov 20 15:01:56 spce rtpengine[6168]: [2f758536-81ac-64ec-9641-472a058286e5] Creating new call
Nov 20 15:01:56 spce rtpengine[6168]: [2f758536-81ac-64ec-9641-472a058286e5] Returning to SIP proxy: d3:sdp828:v=0#015#012o=- 5554664196078908000 2 IN IP4 192.168.1.198#015#012s=Doubango Telecom - chrome#015#012t=0 0#015#012a=msid-semantic: WMS AslaQZmELMoeSB1irRN4o7LGGUDlqjs8e3E9#015#012m=audio 30578 RTP/AVP 111 103 104 0 8 106 105 13 126#015#012c=IN IP4 192.168.1.198#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:106 CN/32000#015#012a=rtpmap:105 CN/16000#015#012a=rtpmap:13 CN/8000#015#012a=rtpmap:126 telephone-event ...
Nov 20 15:01:56 spce rtpengine[6168]: [2f758536-81ac-64ec-9641-472a058286e5] ... /8000#015#012a=maxptime:60#015#012a=ssrc:4196000575 cname:tkfQNZvMSuMsA7mz#015#012a=ssrc:4196000575 msid:AslaQZmELMoeSB1irRN4o7LGGUDlqjs8e3E9 9b39a3e3-b64b-4b7b-a4e1-b9d5f873a20e#015#012a=ssrc:4196000575 mslabel:AslaQZmELMoeSB1irRN4o7LGGUDlqjs8e3E9#015#012a=ssrc:4196000575 label:9b39a3e3-b64b-4b7b-a4e1-b9d5f873a20e#015#012a=direction:active#015#012a=oldmediaip:192.168.99.10#015#012a=sendrecv#015#012a=rtcp:30579#015#0126:result2:oke
Nov 20 15:01:59 spce rtpengine[6168]: [2f758536-81ac-64ec-9641-472a058286e5 port 30579] SRTCP output wanted, but no crypto suite was negotiated
Nov 20 15:01:59 spce rtpengine[6168]: Got valid command from 127.0.0.1:40274: answer - { "sdp": "v=0#015#012o=- 7 2 IN IP4 192.168.1.214#015#012s=CounterPath eyeBeam 1.5#015#012c=IN IP4 192.168.1.214#015#012t=0 0#015#012m=audio 47234 RTP/AVP 0 8 126#015#012a=rtpmap:126 telephone-event/8000#015#012a=sendrecv#015#012a=x-rtp-session-id:2244D8EB6AA34D1785DACDE18ED53CE0#015#012a=direction:active#015#012", "ICE": "remove", "flags": [ "trust-address" ], "replace": [ "origin", "session-connection" ], "transport-protocol": "RTP/SAVPF", "rtcp-mux": [ "demux" ], "call-id": "2f758536-81ac-64ec-9641-472a ...
Nov 20 15:01:59 spce rtpengine[6168]: ... 058286e5", "via-branch": "z9hG4bK054c.b5a10521924b52e05d949724c8f5a10f.0", "received-from": [ "IP4", "127.0.0.1" ], "from-tag": "MT7QNeUxg0UgD2fBzz2X", "to-tag": "70EEFB90-546DF45400098D51-E3BAE700", "command": "answer" }
Nov 20 15:01:59 spce rtpengine[6168]: [2f758536-81ac-64ec-9641-472a058286e5] Returning to SIP proxy: d3:sdp369:v=0#015#012o=- 7 2 IN IP4 192.168.1.198#015#012s=CounterPath eyeBeam 1.5#015#012c=IN IP4 192.168.1.198#015#012t=0 0#015#012m=audio 30598 RTP/SAVPF 0 8 126#015#012a=rtpmap:126 telephone-event/8000#015#012a=x-rtp-session-id:2244D8EB6AA34D1785DACDE18ED53CE0#015#012a=direction:active#015#012a=sendrecv#015#012a=rtcp:30598#015#012a=rtcp-mux#015#012a=setup:active#015#012a=fingerprint:sha-1 28:FA:8D:59:D9:45:F6:70:23:35:D5:63:10:E1:56:CF:C7:1A:8F:F2#015#0126:result2:oke
Nov 20 15:01:59 spce rtpengine[6168]: [2f758536-81ac-64ec-9641-472a058286e5 port 30578] SRTP output wanted, but no crypto suite was negotiated
Nov 20 15:02:00 spce rtpengine[6168]: Got valid command from 127.0.0.1:40274: answer - { "sdp": "v=0#015#012o=- 7 2 IN IP4 192.168.1.214#015#012s=CounterPath eyeBeam 1.5#015#012c=IN IP4 192.168.1.214#015#012t=0 0#015#012m=audio 47234 RTP/AVP 0 8 126#015#012a=rtpmap:126 telephone-event/8000#015#012a=sendrecv#015#012a=x-rtp-session-id:2244D8EB6AA34D1785DACDE18ED53CE0#015#012a=direction:active#015#012", "ICE": "remove", "flags": [ "trust-address" ], "replace": [ "origin", "session-connection" ], "transport-protocol": "RTP/SAVPF", "rtcp-mux": [ "demux" ], "call-id": "2f758536-81ac-64ec-9641-472a ...
Nov 20 15:02:00 spce rtpengine[6168]: ... 058286e5", "via-branch": "z9hG4bK054c.b5a10521924b52e05d949724c8f5a10f.0", "received-from": [ "IP4", "127.0.0.1" ], "from-tag": "MT7QNeUxg0UgD2fBzz2X", "to-tag": "70EEFB90-546DF45400098D51-E3BAE700", "command": "answer" }
Nov 20 15:02:00 spce rtpengine[6168]: [2f758536-81ac-64ec-9641-472a058286e5] Returning to SIP proxy: d3:sdp369:v=0#015#012o=- 7 2 IN IP4 192.168.1.198#015#012s=CounterPath eyeBeam 1.5#015#012c=IN IP4 192.168.1.198#015#012t=0 0#015#012m=audio 30598 RTP/SAVPF 0 8 126#015#012a=rtpmap:126 telephone-event/8000#015#012a=x-rtp-session-id:2244D8EB6AA34D1785DACDE18ED53CE0#015#012a=direction:active#015#012a=sendrecv#015#012a=rtcp:30598#015#012a=rtcp-mux#015#012a=setup:active#015#012a=fingerprint:sha-1 28:FA:8D:59:D9:45:F6:70:23:35:D5:63:10:E1:56:CF:C7:1A:8F:F2#015#0126:result2:oke
Nov 20 15:02:01 spce rtpengine[6168]: Got valid command from 127.0.0.1:40274: answer - { "sdp": "v=0#015#012o=- 7 2 IN IP4 192.168.1.214#015#012s=CounterPath eyeBeam 1.5#015#012c=IN IP4 192.168.1.214#015#012t=0 0#015#012m=audio 47234 RTP/AVP 0 8 126#015#012a=rtpmap:126 telephone-event/8000#015#012a=sendrecv#015#012a=x-rtp-session-id:2244D8EB6AA34D1785DACDE18ED53CE0#015#012a=direction:active#015#012", "ICE": "remove", "flags": [ "trust-address" ], "replace": [ "origin", "session-connection" ], "transport-protocol": "RTP/SAVPF", "rtcp-mux": [ "demux" ], "call-id": "2f758536-81ac-64ec-9641-472a ...
Nov 20 15:02:01 spce rtpengine[6168]: ... 058286e5", "via-branch": "z9hG4bK054c.b5a10521924b52e05d949724c8f5a10f.0", "received-from": [ "IP4", "127.0.0.1" ], "from-tag": "MT7QNeUxg0UgD2fBzz2X", "to-tag": "70EEFB90-546DF45400098D51-E3BAE700", "command": "answer" }
Nov 20 15:02:01 spce rtpengine[6168]: [2f758536-81ac-64ec-9641-472a058286e5] Returning to SIP proxy: d3:sdp369:v=0#015#012o=- 7 2 IN IP4 192.168.1.198#015#012s=CounterPath eyeBeam 1.5#015#012c=IN IP4 192.168.1.198#015#012t=0 0#015#012m=audio 30598 RTP/SAVPF 0 8 126#015#012a=rtpmap:126 telephone-event/8000#015#012a=x-rtp-session-id:2244D8EB6AA34D1785DACDE18ED53CE0#015#012a=direction:active#015#012a=sendrecv#015#012a=rtcp:30598#015#012a=rtcp-mux#015#012a=setup:active#015#012a=fingerprint:sha-1 28:FA:8D:59:D9:45:F6:70:23:35:D5:63:10:E1:56:CF:C7:1A:8F:F2#015#0126:result2:oke


More information about the Spce-user mailing list