[Spce-user] Fw: OnSip Sip.Js WebRTC Libraries and SipWise

H Yavari hyavari at rocketmail.com
Sat Apr 18 01:46:48 EDT 2015


Sorry I added full RTP log.
Hi,
Thank you for your reply. Information that may help :
mysql> select * from peer_preferences where attribute="transport_protocol";
+----+------+----------+--------+--------------------+------+---------+---------------------+
| id | uuid | username | domain | attribute          | type | value   | last_modified       |
+----+------+----------+--------+--------------------+------+---------+---------------------+
| 12 | 1    | 0        |        | transport_protocol |    0 | RTP/AVP | 0000-00-00 00:00:00 |
+----+------+----------+--------+--------------------+------+---------+---------------------+
1 row in set (0.00 sec)



RTP log level = 7,
Out put RTP log for one webrtc to legacy :
Apr 15 15:07:57 spce rtpengine[12271]: [e9640eff-c708-a1e0-678d-0eb0900dd418/PPHJ4e98fcwfRo51N7d1/1] Sending ICE/STUN request for candidate pair ylDG7pe3pRG6hWj3:2268300305:1 from 192.168.1.100 to 192.168.1.214:63474
Apr 15 15:07:59 spce rtpengine[12271]: [05ecf083-4d38-55bc-8064-8f1087e0366a] Received command 'offer' from 127.0.0.1:39028
Apr 15 15:07:59 spce rtpengine[12271]: [05ecf083-4d38-55bc-8064-8f1087e0366a] Dump for 'offer' from 127.0.0.1:39028: { "sdp": "v=0#015#012o=- 1588337998838600400 2 IN IP4 127.0.0.1#015#012s=Doubango Telecom - chrome#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS GHqlidCkwoZNllf07ZG5mqisZFw0f88bhque#015#012m=audio 63476 UDP/TLS/RTP/SAVPF 111 103 104 9 0 8 106 105 13 126#015#012c=IN IP4 192.168.1.214#015#012a=rtcp:63476 IN IP4 192.168.1.214#015#012a=candidate:2268300305 1 udp 2122260223 192.168.1.214 63476 typ host generation 0#015#012a=candidate:2268300305 2 udp 2122260223 192.168.1.214 63476 typ host generati ...
Apr 15 15:07:59 spce rtpengine[12271]: [05ecf083-4d38-55bc-8064-8f1087e0366a] ... on 0#015#012a=candidate:3383785697 1 tcp 1518280447 192.168.1.214 0 typ host tcptype active generation 0#015#012a=candidate:3383785697 2 tcp 1518280447 192.168.1.214 0 typ host tcptype active generation 0#015#012a=ice-ufrag:30mAozFYdyDzL0i5#015#012a=ice-pwd:hnuE52MjUKR/OQn2kHSpHe41#015#012a=ice-options:google-ice#015#012a=fingerprint:sha-256 7A:D1:15:E1:05:61:E0:20:84:2F:58:B5:68:E7:86:91:B5:61:F6:7E:21:DB:CD:47:D8:29:B6:49:3D:37:4C:BD#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level#015#012a=extmap: ...
Apr 15 15:07:59 spce rtpengine[12271]: [05ecf083-4d38-55bc-8064-8f1087e0366a] ... 3 http://www.webrtc.org/experiments/rtp-hdrext/abs-send-time#015#012a=sendrecv#015#012a=rtcp-mux#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10; useinbandfec=1#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:9 G722/8000#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:106 CN/32000#015#012a=rtpmap:105 CN/16000#015#012a=rtpmap:13 CN/8000#015#012a=rtpmap:126 telephone-event/8000#015#012a=maxptime:60#015#012a=ssrc:3308026223 cname:YJxvoh2Lu9SITFRm#015#012a=ssrc:3308026223 msid:GHqlidCkwoZNllf07ZG5mqisZFw0f88bhque 0673ec4b-853 ...
Apr 15 15:07:59 spce rtpengine[12271]: [05ecf083-4d38-55bc-8064-8f1087e0366a] ... b-4225-97b7-3b74cee0b833#015#012a=ssrc:3308026223 mslabel:GHqlidCkwoZNllf07ZG5mqisZFw0f88bhque#015#012a=ssrc:3308026223 label:0673ec4b-853b-4225-97b7-3b74cee0b833#015#012a=direction:active#015#012", "address-family": "IP4", "ICE": "force", "replace": [ "origin", "session-connection" ], "rtcp-mux": [ "demux" ], "call-id": "05ecf083-4d38-55bc-8064-8f1087e0366a", "received-from": [ "IP4", "127.0.0.1" ], "from-tag": "CoveKg3EytFc1g52H37F", "command": "offer" }
Apr 15 15:07:59 spce rtpengine[12271]: [05ecf083-4d38-55bc-8064-8f1087e0366a] Creating new call
Apr 15 15:07:59 spce rtpengine[12271]: [05ecf083-4d38-55bc-8064-8f1087e0366a] Opened ports 30036..30037 for media relay
Apr 15 15:07:59 spce rtpengine[12271]: [05ecf083-4d38-55bc-8064-8f1087e0366a] Opened ports 30054..30055 for media relay
Apr 15 15:07:59 spce rtpengine[12271]: [05ecf083-4d38-55bc-8064-8f1087e0366a] Learning new ICE candidate 2268300305:1
Apr 15 15:07:59 spce rtpengine[12271]: [05ecf083-4d38-55bc-8064-8f1087e0366a] Created candidate pair ylDG7pe3pRG6hWj3:2268300305:1 between 192.168.1.100 and 192.168.1.214:63476, type host
Apr 15 15:07:59 spce rtpengine[12271]: [05ecf083-4d38-55bc-8064-8f1087e0366a] Learning new ICE candidate 2268300305:2
Apr 15 15:07:59 spce rtpengine[12271]: [05ecf083-4d38-55bc-8064-8f1087e0366a] Sending ICE/STUN request for candidate pair ylDG7pe3pRG6hWj3:2268300305:1 from 192.168.1.100 to 192.168.1.214:63476
Apr 15 15:07:59 spce rtpengine[12271]: [05ecf083-4d38-55bc-8064-8f1087e0366a] Shutting down ICE agent (nothing to do)
Apr 15 15:07:59 spce rtpengine[12271]: [05ecf083-4d38-55bc-8064-8f1087e0366a] Replying to 'offer' from 127.0.0.1:39028
Apr 15 15:07:59 spce rtpengine[12271]: [05ecf083-4d38-55bc-8064-8f1087e0366a] Response dump for 'offer' to 127.0.0.1:39028: { "sdp": "v=0#015#012o=- 1588337998838600400 2 IN IP4 192.168.1.100#015#012s=Doubango Telecom - chrome#015#012t=0 0#015#012a=msid-semantic: WMS GHqlidCkwoZNllf07ZG5mqisZFw0f88bhque#015#012m=audio 30036 UDP/TLS/RTP/SAVPF 111 103 104 9 0 8 106 105 13 126#015#012c=IN IP4 192.168.1.100#015#012a=rtpmap:111 opus/48000/2#015#012a=fmtp:111 minptime=10; useinbandfec=1#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:9 G722/8000#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:106 CN/32000#015#012 ...
Apr 15 15:07:59 spce rtpengine[12271]: [05ecf083-4d38-55bc-8064-8f1087e0366a] ... a=rtpmap:105 CN/16000#015#012a=rtpmap:13 CN/8000#015#012a=rtpmap:126 telephone-event/8000#015#012a=maxptime:60#015#012a=ssrc:3308026223 cname:YJxvoh2Lu9SITFRm#015#012a=ssrc:3308026223 msid:GHqlidCkwoZNllf07ZG5mqisZFw0f88bhque 0673ec4b-853b-4225-97b7-3b74cee0b833#015#012a=ssrc:3308026223 mslabel:GHqlidCkwoZNllf07ZG5mqisZFw0f88bhque#015#012a=ssrc:3308026223 label:0673ec4b-853b-4225-97b7-3b74cee0b833#015#012a=direction:active#015#012a=sendrecv#015#012a=rtcp:30037#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:akiHLG373asewCkIlF9pIERV5KGNKNZwhDCZnnOo#015#012a=setup:ac ...
Apr 15 15:07:59 spce rtpengine[12271]: [05ecf083-4d38-55bc-8064-8f1087e0366a] ... tpass#015#012a=fingerprint:sha-1 6C:ED:E4:70:74:EB:1E:30:B8:5E:FE:83:C5:CF:7A:AA:A5:65:8B:43#015#012a=ice-ufrag:bkzlLfXN#015#012a=ice-pwd:iu7vOmsThyTMUlVtUwg7Vcz4u8#015#012a=candidate:ylDG7pe3pRG6hWj3 1 UDP 2130706431 192.168.1.100 30036 typ host#015#012a=candidate:ylDG7pe3pRG6hWj3 2 UDP 2130706430 192.168.1.100 30037 typ host#015#012", "result": "ok" }
Apr 15 15:07:59 spce rtpengine[12271]: [05ecf083-4d38-55bc-8064-8f1087e0366a] Received command 'delete' from 127.0.0.1:46666
Apr 15 15:07:59 spce rtpengine[12271]: [05ecf083-4d38-55bc-8064-8f1087e0366a] Dump for 'delete' from 127.0.0.1:46666: { "call-id": "05ecf083-4d38-55bc-8064-8f1087e0366a", "received-from": [ "IP4", "127.0.0.1" ], "from-tag": "CoveKg3EytFc1g52H37F", "command": "delete" }
Apr 15 15:07:59 spce rtpengine[12271]: [05ecf083-4d38-55bc-8064-8f1087e0366a] Scheduling deletion of call branch 'CoveKg3EytFc1g52H37F' in 30 seconds
Apr 15 15:07:59 spce rtpengine[12271]: [05ecf083-4d38-55bc-8064-8f1087e0366a] Replying to 'delete' from 127.0.0.1:46666
Apr 15 15:07:59 spce rtpengine[12271]: [05ecf083-4d38-55bc-8064-8f1087e0366a] Response dump for 'delete' to 127.0.0.1:46666: { "created": 1429103279, "last signal": 1429103279, "tags": { "CoveKg3EytFc1g52H37F": { "tag": "CoveKg3EytFc1g52H37F", "created": 1429103279, "in dialogue with": "", "medias": [ { "index": 1, "type": "audio", "protocol": "UDP/TLS/RTP/SAVPF", "streams": [ { "local port": 30054, "endpoint": { "family": "IPv4", "address": "192.168.1.214", "port": 63476 }, "advertised endpoint": { "family": "IPv4", "address": "192.168.1.214", "port": 63476 }, "last pack ...
Apr 15 15:07:59 spce rtpengine[12271]: [05ecf083-4d38-55bc-8064-8f1087e0366a] ... et": 1429103279, "flags": [ "RTP", "RTCP", "filled" ], "stats": { "packets": 0, "bytes": 0, "errors": 0 } }, { "local port": 30055, "endpoint": { "family": "IPv6", "address": "::", "port": 0 }, "advertised endpoint": { "family": "IPv6", "address": "::", "port": 0 }, "last packet": 1429103279, "flags": [ "RTCP", "fallback RTCP", "filled" ], "stats": { "packets": 0, "bytes": 0, "errors": 0 } } ], "flags": [ "initialized", "send", "recv", "rtcp-mux", "DTLS-SRTP", "DTLS role active", "DTLS role pass ...
Apr 15 15:07:59 spce rtpengine[12271]: [05ecf083-4d38-55bc-8064-8f1087e0366a] ... ive", "ICE" ] } ] } }, "totals": { "RTP": { "packets": 0, "bytes": 0, "errors": 0 }, "RTCP": { "packets": 0, "bytes": 0, "errors": 0 } }, "result": "ok" }
Apr 15 15:07:59 spce rtpengine[12271]: [05ecf083-4d38-55bc-8064-8f1087e0366a/CoveKg3EytFc1g52H37F/1] Sending ICE/STUN request for candidate pair ylDG7pe3pRG6hWj3:2268300305:1 from 192.168.1.100 to 192.168.1.214:63476
Apr 15 15:07:59 spce rtpengine[12271]: [05ecf083-4d38-55bc-8064-8f1087e0366a/CoveKg3EytFc1g52H37F/1] Sending ICE/STUN request for candidate pair ylDG7pe3pRG6hWj3:2268300305:1 from 192.168.1.100 to 192.168.1.214:63476
Apr 15 15:08:00 spce rtpengine[12271]: [05ecf083-4d38-55bc-8064-8f1087e0366a/CoveKg3EytFc1g52H37F/1] Sending ICE/STUN request for candidate pair ylDG7pe3pRG6hWj3:2268300305:1 from 192.168.1.100 to 192.168.1.214:63476
Apr 15 15:08:01 spce rtpengine[12271]: [05ecf083-4d38-55bc-8064-8f1087e0366a/CoveKg3EytFc1g52H37F/1] Sending ICE/STUN request for candidate pair ylDG7pe3pRG6hWj3:2268300305:1 from 192.168.1.100 to 192.168.1.214:63476
Apr 15 15:08:02 spce rtpengine[12271]: [05ecf083-4d38-55bc-8064-8f1087e0366a/CoveKg3EytFc1g52H37F/1] Sending ICE/STUN request for candidate pair ylDG7pe3pRG6hWj3:2268300305:1 from 192.168.1.100 to 192.168.1.214:63476
Apr 15 15:08:05 spce rtpengine[12271]: [05ecf083-4d38-55bc-8064-8f1087e0366a/CoveKg3EytFc1g52H37F/1] Sending ICE/STUN request for candidate pair ylDG7pe3pRG6hWj3:2268300305:1 from 192.168.1.100 to 192.168.1.214:63476
Apr 15 15:08:10 spce rtpengine[12271]: [e9640eff-c708-a1e0-678d-0eb0900dd418/PPHJ4e98fcwfRo51N7d1/1] Sending ICE/STUN request for candidate pair ylDG7pe3pRG6hWj3:2268300305:1 from 192.168.1.100 to 192.168.1.214:63474
Apr 15 15:08:12 spce rtpengine[12271]: [05ecf083-4d38-55bc-8064-8f1087e0366a/CoveKg3EytFc1g52H37F/1] Sending ICE/STUN request for candidate pair ylDG7pe3pRG6hWj3:2268300305:1 from 192.168.1.100 to 192.168.1.214:63476
Apr 15 15:08:15 spce rtpengine[12271]: [e9640eff-c708-a1e0-678d-0eb0900dd418] Call branch 'PPHJ4e98fcwfRo51N7d1' deleted, no more branches remaining
Apr 15 15:08:15 spce rtpengine[12271]: [e9640eff-c708-a1e0-678d-0eb0900dd418] Final packet stats:
Apr 15 15:08:15 spce rtpengine[12271]: [e9640eff-c708-a1e0-678d-0eb0900dd418] --- Tag '', created 0:31 ago, in dialogue with '(none)'
Apr 15 15:08:15 spce rtpengine[12271]: [e9640eff-c708-a1e0-678d-0eb0900dd418] ------ Media #1 (audio over UDP/TLS/RTP/SAVPF) using unknown codec
Apr 15 15:08:15 spce rtpengine[12271]: [e9640eff-c708-a1e0-678d-0eb0900dd418] --------- Port 30000 <>            [::]:0    , 0 p, 0 b, 0 e, 1429103264 last_packet
Apr 15 15:08:15 spce rtpengine[12271]: [e9640eff-c708-a1e0-678d-0eb0900dd418] --------- Port 30001 <>            [::]:0     (RTCP), 0 p, 0 b, 0 e, 1429103264 last_packet
Apr 15 15:08:15 spce rtpengine[12271]: [e9640eff-c708-a1e0-678d-0eb0900dd418] --- Tag 'PPHJ4e98fcwfRo51N7d1', created 0:31 ago, in dialogue with ''
Apr 15 15:08:15 spce rtpengine[12271]: [e9640eff-c708-a1e0-678d-0eb0900dd418] ------ Media #1 (audio over UDP/TLS/RTP/SAVPF) using unknown codec
Apr 15 15:08:15 spce rtpengine[12271]: [e9640eff-c708-a1e0-678d-0eb0900dd418] --------- Port 30018 <>   192.168.1.214:63474, 0 p, 0 b, 0 e, 1429103264 last_packet



I use this settings for domain:Mode = Always with RTP proxy as only ICE candidate.Transport protocol = UDP/TLS/RTP/SAVP
and for peer:
Mode = Always with RTP proxy as only ICE candidate.Transport protocol = RTP/AVP

Regards,H. Yavari

 

     From: Andrew Pogrebennyk <apogrebennyk at sipwise.com>
 
   
Hi,
this works for us so you have provide some logs or do you have any idea
what exactly is not working?

For example, if i try to call from jssip to peer or legacy client, the
offer from jssip webrtc client has RTP/SAVPF:
> Apr 15 15:13:23 sp1 rtpengine[9260]: [09b5ibtgmeu8v24713iv] Dump for 'offer' from 127.0.0.1:37622: { "sdp": "v=0#015#012o=mozilla...THIS_IS_SDPARTA-37.0.1 4135386994961230335 0 IN IP4 0.0.0.0#015#012s=-#015#012t=0 0#015#012a=sendrecv#015#012a=fingerprint:sha-256 AE:B8:19:A2:CD:A7:E6:C9:91:EA:5A:2F:AD:0B:2B:1A:E7:EF:C9:48:33:3F:3D:DC:85:2B:85:C4:A9:46:F9:8A#015#012a=group:BUNDLE sdparta_0 sdparta_1#015#012a=ice-options:trickle#015#012m=audio 9 RTP/SAVPF 109 9 0 8#015#012c=IN IP4 0.0.0.0#015#012a=candidate:0 1 UDP 2122252543 10.15.20.121 47502 typ host#015#012a=candidate:2 1 UDP 2122055935 172.17.42.1 58678 typ host#015#012a=c ...
but the server changes it to RTP/AVP:
> Apr 15 15:13:23 sp1 rtpengine[9260]: [09b5ibtgmeu8v24713iv] Response dump for 'offer' to 127.0.0.1:37622: { "sdp": "v=0#015#012o=mozilla...THIS_IS_SDPARTA-37.0.1 4135386994961230335 0 IN IP4 10.15.20.185#015#012s=-#015#012t=0 0#015#012m=audio 30538 RTP/AVP 109 9 0 8#015#012c=IN IP4 10.15.20.185#015#012a=rtpmap:109 opus/48000/2#015#012a=rtpmap:9 G722/8000/1#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=ssrc:4069823830 cname:{d6e19c01-43b4-4fa8-b841-7cc82c0e367d}#015#012a=sendrecv#015#012a=rtcp:30539#015#012m=video 30560 RTP/AVP 120 126 97#015#012c=IN IP4 10.15.20.185#015#012a=fmtp:120 max-fs=12288;max-fr=60#015#012a=fmtp:126 profi ...

In the parameters of the offer in /var/log/ngcp/rtp.log you will see
also the flag "transport-protocol": "RTP/AVP", which is telling
rtpengine to do that protocol change, provided that you have set the
transport_protocol preference on the asterisk peer correctly.

Try to read the log and find your configuration error and if you can't
please provide the output from:
select * from peer_preferences where attribute="transport_protocol";
/var/log/ngcp/rtp.log (with log_level=7 in
/etc/default/ngcp-rtpengine-daemon)
and /var/log/ngcp/kamailio-proxy.log

On 04/15/2015 06:40 AM, H Yavari wrote:
> Hi,
> 
> I can configure RTP setting for peers but this is not work for me. For
> example I have an asterisk as a peer and I selected RTP/AVP. but SDP in
> calls from webrtc clients to peer is : UDP/TLS/RTP/SAVP. So asterisk
> reject the calls.
> 
> 
> But about dynamically:
> why I can't make a call between sip extensions and webrtc clients that
> are registered on ngcp? I found in log that SDP for callee doesn't
> change automatically.

as i said in the previous email, if callee is on the websocket the proxy
tell rtpengine to transcode to "transport-protocol":
"UDP/TLS/RTP/SAVPF", even if the "transparent" is selected in the


preference.

Andrew


   
_______________________________________________
Spce-user mailing list
Spce-user at lists.sipwise.com
https://lists.sipwise.com/listinfo/spce-user


  
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.sipwise.com/pipermail/spce-user_lists.sipwise.com/attachments/20150418/a262fab1/attachment-0001.html>


More information about the Spce-user mailing list