Skip to content

Instantly share code, notes, and snippets.

@vance-od
Created November 23, 2015 10:01
Show Gist options
  • Save vance-od/53e70b36d625e034d600 to your computer and use it in GitHub Desktop.
Save vance-od/53e70b36d625e034d600 to your computer and use it in GitHub Desktop.
rtpengine Issue-182. attempt with via-branch parameter (does not help)
Nov 23 10:43:24 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Received command 'offer' from 127.0.0.1:38836
Nov 23 10:43:24 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Dump for 'offer' from 127.0.0.1:38836: { "sdp": "v=0#015#012o=root 2063634125 2063634125 IN IP4 127.0.0.1#015#012s=Callweaver 30280#015#012c=IN IP4 127.0.0.1#015#012t=0 0#015#012m=audio 12898 RTP/AVP 18 8 0#015#012a=rtpmap:18 G729/8000#015#012a=fmtp:18 annexb=no#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:0 PCMU/8000#015#012a=ptime:20#015#012a=sendrecv#015#012", "ICE": "force", "flags": [ "trust-address" ], "replace": [ "origin", "session-connection" ], "transport-protocol": "RTP/SAVPF", "rtcp-mux": [ "offer" ], "call-id": "006d73de61c31c5163163e101c929baa@127.0.0.1 ...
Nov 23 10:43:24 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] ... :6050", "via-branch": "z9hG4bK5f660d85", "received-from": [ "IP4", "127.0.0.1" ], "from-tag": "as1679b510", "command": "offer" }
Nov 23 10:43:24 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Creating new call
Nov 23 10:43:24 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Opened ports 14056..14057 for media relay
Nov 23 10:43:24 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Opened ports 14076..14077 for media relay
Nov 23 10:43:24 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Replying to 'offer' from 127.0.0.1:38836
Nov 23 10:43:24 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Response dump for 'offer' to 127.0.0.1:38836: { "sdp": "v=0#015#012o=root 2063634125 2063634125 IN IP4 10.240.154.52#015#012s=Callweaver 30280#015#012c=IN IP4 10.240.154.52#015#012t=0 0#015#012m=audio 14056 RTP/SAVPF 18 8 0#015#012a=rtpmap:18 G729/8000#015#012a=fmtp:18 annexb=no#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:0 PCMU/8000#015#012a=ptime:20#015#012a=sendrecv#015#012a=rtcp:14057#015#012a=rtcp-mux#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:KXkhzZJzyK8+Unt3jf0Q730U/jQcd1f1H8iXruAA#015#012a=setup:actpass#015#012a=fingerprint:sha-1 8E:F3:B3:9F:1C:E8:02:C6:27:C4:DF:1B:08:DF:51:F ...
Nov 23 10:43:24 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] ... F:41:77:13:5C#015#012a=ice-ufrag:Jobs4NM5#015#012a=ice-pwd:G1J0qH2RrZKFIIr1rxopVPqCdB#015#012a=candidate:FOwyX1N5R7oLwAmh 1 UDP 2130706431 10.240.154.52 14056 typ host#015#012a=candidate:FOwyX1N5R7oLwAmh 2 UDP 2130706430 10.240.154.52 14057 typ host#015#012a=candidate:XBrcoH0MXtwM6yAL 1 UDP 2130706175 server_real_ip 14056 typ host#015#012a=candidate:XBrcoH0MXtwM6yAL 2 UDP 2130706174 server_real_ip 14057 typ host#015#012", "result": "ok" }
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Created candidate pair FOwyX1N5R7oLwAmh:00ffff0000a264ee5531:1 between 10.240.154.52 and UA_real_ip:31987, type prflx
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Triggering check for FOwyX1N5R7oLwAmh:00ffff0000a264ee5531:1
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Successful STUN binding request from UA_real_ip:31987
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Received command 'answer' from 127.0.0.1:36137
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Dump for 'answer' from 127.0.0.1:36137: { "sdp": "v=0#015#012o=- 5382731171423468384 2 IN IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=msid-semantic: WMS xDK4adpOfFyp1YGDMX321SWzFQxZkXK4dHrk#015#012m=audio 9595 UDP/TLS/RTP/SAVPF 8 0#015#012c=IN IP4 UA_real_ip#015#012a=rtcp:9 IN IP4 192.0.2.42#015#012a=candidate:2609552855 1 udp 2122260223 10.100.1.218 62460 typ host generation 0#015#012a=candidate:1838867459 1 udp 1686052607 UA_real_ip 9595 typ srflx raddr 10.100.1.218 rport 62460 generation 0#015#012a=candidate:1838867459 1 udp 1686052607 85.2 ...
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] ... 38.100.162 14677 typ srflx raddr 10.100.1.218 rport 62460 generation 0#015#012a=candidate:3574161703 1 tcp 1518280447 10.100.1.218 0 typ host tcptype active generation 0#015#012a=ice-ufrag:UU1ZRO07an+XbPn/#015#012a=ice-pwd:PfC6M5DS0AZLcGRSnTuKdhoY#015#012a=fingerprint:sha-256 5F:C2:19:3D:98:4F:F2:6A:7F:88:4D:1F:49:52:81:85:07:8C:79:87:93:DF:1D:3C:FE:02:FC:5B:65:6B:57:79#015#012a=setup:active#015#012a=mid:audio#015#012a=sendrecv#015#012a=rtcp-mux#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:0 PCMU/8000#015#012a=ssrc:262513561 cname:kh8ErK/bucTKzEzh#015#012a=ssrc:26251 ...
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] ... 3561 msid:xDK4adpOfFyp1YGDMX321SWzFQxZkXK4dHrk 2e239e5f-6f77-4152-b3e7-573068a7d4e3#015#012a=ssrc:262513561 mslabel:xDK4adpOfFyp1YGDMX321SWzFQxZkXK4dHrk#015#012a=ssrc:262513561 label:2e239e5f-6f77-4152-b3e7-573068a7d4e3#015#012", "ICE": "remove", "flags": [ "trust-address" ], "replace": [ "origin", "session-connection" ], "transport-protocol": "RTP/AVP", "call-id": "006d73de61c31c5163163e101c929baa@127.0.0.1:6050", "via-branch": "z9hG4bK5f660d85", "received-from": [ "IP4", "127.0.0.1" ], "from-tag": "as1679b510", ...
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] ... "to-tag": "pgg49icb47", "command": "answer" }
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Learning new ICE candidate 2609552855:1
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Created candidate pair FOwyX1N5R7oLwAmh:2609552855:1 between 10.240.154.52 and 10.100.1.218:62460, type host
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Created candidate pair XBrcoH0MXtwM6yAL:2609552855:1 between server_real_ip and 10.100.1.218:62460, type host
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Learning new ICE candidate 1838867459:1
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Created candidate pair FOwyX1N5R7oLwAmh:1838867459:1 between 10.240.154.52 and UA_real_ip:9595, type srflx
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Created candidate pair XBrcoH0MXtwM6yAL:1838867459:1 between server_real_ip and UA_real_ip:9595, type srflx
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Learning new ICE candidate 1838867459:1
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Created candidate pair FOwyX1N5R7oLwAmh:1838867459:1 between 10.240.154.52 and UA_real_ip:14677, type srflx
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Created candidate pair XBrcoH0MXtwM6yAL:1838867459:1 between server_real_ip and UA_real_ip:14677, type srflx
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:00ffff0000a264ee5531:1 from 10.240.154.52 to UA_real_ip:31987
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:2609552855:1 from 10.240.154.52 to 10.100.1.218:62460
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Replying to 'answer' from 127.0.0.1:36137
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Response dump for 'answer' to 127.0.0.1:36137: { "sdp": "v=0#015#012o=- 5382731171423468384 2 IN IP4 10.240.154.52#015#012s=-#015#012t=0 0#015#012a=msid-semantic: WMS xDK4adpOfFyp1YGDMX321SWzFQxZkXK4dHrk#015#012m=audio 14076 RTP/AVP 8 0#015#012c=IN IP4 10.240.154.52#015#012a=mid:audio#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:0 PCMU/8000#015#012a=ssrc:262513561 cname:kh8ErK/bucTKzEzh#015#012a=ssrc:262513561 msid:xDK4adpOfFyp1YGDMX321SWzFQxZkXK4dHrk 2e239e5f-6f77-4152-b3e7-573068a7d4e3#015#012a=ssrc:262513561 mslabel:xDK4adpOfFyp1YGDMX321SWzFQxZkXK4dHrk#015#012a=ssrc:262 ...
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] ... 513561 label:2e239e5f-6f77-4152-b3e7-573068a7d4e3#015#012a=sendrecv#015#012a=rtcp:14077#015#012", "result": "ok" }
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:2609552855:1 from server_real_ip to 10.100.1.218:62460
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:1838867459:1 from 10.240.154.52 to UA_real_ip:14677
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] DTLS: Peer certificate accepted
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] DTLS handshake successful
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] DTLS-SRTP successfully negotiated
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] SRTP keys, incoming:
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] --- AES_CM_128_HMAC_SHA1_80 key Uj0fskQXMbBrz2QcHbrgcA== salt 9ZkfcMhvX42yFBttzcI=
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] SRTP keys, outgoing:
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] --- AES_CM_128_HMAC_SHA1_80 key J/AlIJTgW36WVJpP52nvBA== salt /md3bY0WKYSyqLKxeno=
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] DTLS-SRTP successfully negotiated
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] SRTP keys, incoming:
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] --- AES_CM_128_HMAC_SHA1_80 key Uj0fskQXMbBrz2QcHbrgcA== salt 9ZkfcMhvX42yFBttzcI=
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] SRTP keys, outgoing:
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] --- AES_CM_128_HMAC_SHA1_80 key J/AlIJTgW36WVJpP52nvBA== salt /md3bY0WKYSyqLKxeno=
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Received ICE/STUN response code 0 for candidate pair FOwyX1N5R7oLwAmh:00ffff0000a264ee5531:1 from UA_real_ip:31987 to 10.240.154.52
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Setting ICE candidate pair FOwyX1N5R7oLwAmh:00ffff0000a264ee5531:1 as succeeded
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Best succeeded ICE pair with all components is FOwyX1N5R7oLwAmh:00ffff0000a264ee5531:1
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:1838867459:1 from server_real_ip to UA_real_ip:14677
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:2609552855:1 from 10.240.154.52 to 10.100.1.218:62460
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:2609552855:1 from server_real_ip to 10.100.1.218:62460
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:1838867459:1 from 10.240.154.52 to UA_real_ip:14677
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Start nominating ICE pairs
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Nominating ICE pair FOwyX1N5R7oLwAmh:00ffff0000a264ee5531:1
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending nominating ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:00ffff0000a264ee5531:1 from 10.240.154.52 to UA_real_ip:31987
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:1838867459:1 from server_real_ip to UA_real_ip:14677
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Received ICE/STUN response code 0 for candidate pair FOwyX1N5R7oLwAmh:00ffff0000a264ee5531:1 from UA_real_ip:31987 to 10.240.154.52
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Setting nominated ICE candidate pair FOwyX1N5R7oLwAmh:00ffff0000a264ee5531:1 as valid
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] ICE completed, using pair FOwyX1N5R7oLwAmh:00ffff0000a264ee5531:1
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:2609552855:1 from 10.240.154.52 to 10.100.1.218:62460
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14076] RTP packet with unknown payload type 18 received
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:2609552855:1 from server_real_ip to 10.100.1.218:62460
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14076] SSRC changed, updating SRTP crypto contexts
Nov 23 10:43:40 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Successful STUN binding request from UA_real_ip:31987
Nov 23 10:43:40 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:2609552855:1 from 10.240.154.52 to 10.100.1.218:62460
Nov 23 10:43:40 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:2609552855:1 from server_real_ip to 10.100.1.218:62460
Nov 23 10:43:40 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:2609552855:1 from 10.240.154.52 to 10.100.1.218:62460
Nov 23 10:43:40 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:2609552855:1 from server_real_ip to 10.100.1.218:62460
Nov 23 10:43:41 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Successful STUN binding request from UA_real_ip:31987
Nov 23 10:43:42 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Successful STUN binding request from UA_real_ip:31987
Nov 23 10:43:42 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:2609552855:1 from 10.240.154.52 to 10.100.1.218:62460
Nov 23 10:43:42 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:2609552855:1 from server_real_ip to 10.100.1.218:62460
Nov 23 10:43:43 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14076] Confirmed peer address as 10.240.154.52:12898
Nov 23 10:43:43 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Confirmed peer address as UA_real_ip:31987
Nov 23 10:43:43 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Successful STUN binding request from UA_real_ip:31987
Nov 23 10:43:44 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Successful STUN binding request from UA_real_ip:31987
Nov 23 10:43:44 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14077] Confirmed peer address as 10.240.154.52:12899
Nov 23 10:43:45 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Successful STUN binding request from UA_real_ip:31987
Nov 23 10:43:45 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:2609552855:1 from 10.240.154.52 to 10.100.1.218:62460
Nov 23 10:43:45 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:2609552855:1 from server_real_ip to 10.100.1.218:62460
Nov 23 10:43:46 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Successful STUN binding request from UA_real_ip:31987
Nov 23 10:43:47 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Successful STUN binding request from UA_real_ip:31987
Nov 23 10:43:48 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Successful STUN binding request from UA_real_ip:31987
Nov 23 10:43:48 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14076] SSRC changed, updating SRTP crypto contexts
Nov 23 10:43:49 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Successful STUN binding request from UA_real_ip:31987
Nov 23 10:43:50 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Successful STUN binding request from UA_real_ip:31987
Nov 23 10:43:50 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14076] SSRC changed, updating SRTP crypto contexts
Nov 23 10:43:51 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Successful STUN binding request from UA_real_ip:31987
Nov 23 10:43:52 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Successful STUN binding request from UA_real_ip:31987
Nov 23 10:43:52 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:2609552855:1 from 10.240.154.52 to 10.100.1.218:62460
Nov 23 10:43:52 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:2609552855:1 from server_real_ip to 10.100.1.218:62460
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Successful STUN binding request from UA_real_ip:31987
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Received command 'offer' from 127.0.0.1:56462
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Dump for 'offer' from 127.0.0.1:56462: { "sdp": "v=0#015#012o=root 2063634125 2063634125 IN IP4 127.0.0.1#015#012s=Callweaver 30280#015#012c=IN IP4 127.0.0.1#015#012t=0 0#015#012m=audio 12898 RTP/AVP 0 8#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=ptime:20#015#012a=sendrecv#015#012", "ICE": "force", "flags": [ "trust-address" ], "replace": [ "origin", "session-connection" ], "transport-protocol": "RTP/SAVPF", "rtcp-mux": [ "offer" ], "call-id": "006d73de61c31c5163163e101c929baa@127.0.0.1:6050", "via-branch": "z9hG4bK11a8a15b", "recei ...
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] ... ved-from": [ "IP4", "127.0.0.1" ], "from-tag": "as1679b510", "to-tag": "pgg49icb47", "command": "offer" }
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Created candidate pair XBrcoH0MXtwM6yAL:00ffff0000a264ee5531:1 between server_real_ip and UA_real_ip:31987, type prflx
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Replying to 'offer' from 127.0.0.1:56462
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Response dump for 'offer' to 127.0.0.1:56462: { "sdp": "v=0#015#012o=root 2063634125 2063634125 IN IP4 10.240.154.52#015#012s=Callweaver 30280#015#012c=IN IP4 10.240.154.52#015#012t=0 0#015#012m=audio 14056 RTP/SAVPF 0 8#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=ptime:20#015#012a=sendrecv#015#012a=rtcp:14057#015#012a=rtcp-mux#015#012a=setup:actpass#015#012a=fingerprint:sha-1 8E:F3:B3:9F:1C:E8:02:C6:27:C4:DF:1B:08:DF:51:FF:41:77:13:5C#015#012a=ice-ufrag:Jobs4NM5#015#012a=ice-pwd:G1J0qH2RrZKFIIr1rxopVPqCdB#015#012a=candidate:FOwyX1N5R7oLwAmh 1 UDP 2130706431 10.240.154 ...
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] ... .52 14056 typ host#015#012a=candidate:FOwyX1N5R7oLwAmh 2 UDP 2130706430 10.240.154.52 14057 typ host#015#012a=remote-candidates:1 UA_real_ip 31987#015#012", "result": "ok" }
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14076] SSRC changed, updating SRTP crypto contexts
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Received command 'answer' from 127.0.0.1:36137
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Dump for 'answer' from 127.0.0.1:36137: { "sdp": "v=0#015#012o=- 807051876575904576 2 IN IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=msid-semantic: WMS 8kTpLeuggfAfc03tdcDb2Rg6J0CTGPLJaFvG#015#012m=audio 27645 UDP/TLS/RTP/SAVPF 0 8#015#012c=IN IP4 UA_real_ip#015#012a=rtcp:9 IN IP4 192.0.2.23#015#012a=candidate:2609552855 1 udp 2122260223 10.100.1.218 62954 typ host generation 0#015#012a=candidate:1838867459 1 udp 1686052607 UA_real_ip 27645 typ srflx raddr 10.100.1.218 rport 62954 generation 0#015#012a=candidate:1838867459 1 udp 1686052607 85. ...
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] ... 238.100.162 26125 typ srflx raddr 10.100.1.218 rport 62954 generation 0#015#012a=candidate:3574161703 1 tcp 1518280447 10.100.1.218 0 typ host tcptype active generation 0#015#012a=ice-ufrag:gAkqQjK19jYH8/oO#015#012a=ice-pwd:wWSYJdEYx39wtbN00URT8Ak/#015#012a=fingerprint:sha-256 5F:C2:19:3D:98:4F:F2:6A:7F:88:4D:1F:49:52:81:85:07:8C:79:87:93:DF:1D:3C:FE:02:FC:5B:65:6B:57:79#015#012a=setup:active#015#012a=mid:audio#015#012a=sendrecv#015#012a=rtcp-mux#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=ssrc:675618909 cname:BTK8T8Z2YJZ2m8nx#015#012a=ssrc:6756 ...
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] ... 18909 msid:8kTpLeuggfAfc03tdcDb2Rg6J0CTGPLJaFvG 4119310f-6299-488b-bdc6-2ece39ff4ebe#015#012a=ssrc:675618909 mslabel:8kTpLeuggfAfc03tdcDb2Rg6J0CTGPLJaFvG#015#012a=ssrc:675618909 label:4119310f-6299-488b-bdc6-2ece39ff4ebe#015#012", "ICE": "remove", "flags": [ "trust-address" ], "replace": [ "origin", "session-connection" ], "transport-protocol": "RTP/AVP", "call-id": "006d73de61c31c5163163e101c929baa@127.0.0.1:6050", "via-branch": "z9hG4bK11a8a15b", "received-from": [ "IP4", "127.0.0.1" ], "from-tag": "as1679b510" ...
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] ... , "to-tag": "pgg49icb47", "command": "answer" }
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Opened ports 14084..14085 for media relay
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] ICE restart, resetting ICE agent
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Learning new ICE candidate 2609552855:1
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Created candidate pair FOwyX1N5R7oLwAmh:2609552855:1 between 10.240.154.52 and 10.100.1.218:62954, type host
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Created candidate pair XBrcoH0MXtwM6yAL:2609552855:1 between server_real_ip and 10.100.1.218:62954, type host
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Learning new ICE candidate 1838867459:1
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Created candidate pair FOwyX1N5R7oLwAmh:1838867459:1 between 10.240.154.52 and UA_real_ip:27645, type srflx
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Created candidate pair XBrcoH0MXtwM6yAL:1838867459:1 between server_real_ip and UA_real_ip:27645, type srflx
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Learning new ICE candidate 1838867459:1
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Created candidate pair FOwyX1N5R7oLwAmh:1838867459:1 between 10.240.154.52 and UA_real_ip:26125, type srflx
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Created candidate pair XBrcoH0MXtwM6yAL:1838867459:1 between server_real_ip and UA_real_ip:26125, type srflx
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:2609552855:1 from 10.240.154.52 to 10.100.1.218:62954
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Replying to 'answer' from 127.0.0.1:36137
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Response dump for 'answer' to 127.0.0.1:36137: { "sdp": "v=0#015#012o=- 807051876575904576 2 IN IP4 10.240.154.52#015#012s=-#015#012t=0 0#015#012a=msid-semantic: WMS 8kTpLeuggfAfc03tdcDb2Rg6J0CTGPLJaFvG#015#012m=audio 14084 RTP/AVP 0 8#015#012c=IN IP4 10.240.154.52#015#012a=mid:audio#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=ssrc:675618909 cname:BTK8T8Z2YJZ2m8nx#015#012a=ssrc:675618909 msid:8kTpLeuggfAfc03tdcDb2Rg6J0CTGPLJaFvG 4119310f-6299-488b-bdc6-2ece39ff4ebe#015#012a=ssrc:675618909 mslabel:8kTpLeuggfAfc03tdcDb2Rg6J0CTGPLJaFvG#015#012a=ssrc:6756 ...
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] ... 18909 label:4119310f-6299-488b-bdc6-2ece39ff4ebe#015#012a=sendrecv#015#012a=rtcp:14085#015#012", "result": "ok" }
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:2609552855:1 from server_real_ip to 10.100.1.218:62954
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14084] SRTP output wanted, but no crypto suite was negotiated
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:1838867459:1 from 10.240.154.52 to UA_real_ip:26125
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:1838867459:1 from server_real_ip to UA_real_ip:26125
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:2609552855:1 from 10.240.154.52 to 10.100.1.218:62954
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:2609552855:1 from server_real_ip to 10.100.1.218:62954
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:1838867459:1 from 10.240.154.52 to UA_real_ip:26125
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:1838867459:1 from server_real_ip to UA_real_ip:26125
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:2609552855:1 from 10.240.154.52 to 10.100.1.218:62954
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:2609552855:1 from server_real_ip to 10.100.1.218:62954
Nov 23 10:43:54 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:1838867459:1 from 10.240.154.52 to UA_real_ip:26125
Nov 23 10:43:54 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:1838867459:1 from server_real_ip to UA_real_ip:26125
Nov 23 10:43:54 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:2609552855:1 from 10.240.154.52 to 10.100.1.218:62954
Nov 23 10:43:54 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:2609552855:1 from server_real_ip to 10.100.1.218:62954
Nov 23 10:43:54 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:1838867459:1 from 10.240.154.52 to UA_real_ip:26125
Nov 23 10:43:54 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:1838867459:1 from server_real_ip to UA_real_ip:26125
Nov 23 10:43:55 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:2609552855:1 from 10.240.154.52 to 10.100.1.218:62954
Nov 23 10:43:55 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:2609552855:1 from server_real_ip to 10.100.1.218:62954
Nov 23 10:43:55 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:1838867459:1 from 10.240.154.52 to UA_real_ip:26125
Nov 23 10:43:55 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:1838867459:1 from server_real_ip to UA_real_ip:26125
Nov 23 10:43:56 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:2609552855:1 from 10.240.154.52 to 10.100.1.218:62954
Nov 23 10:43:56 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:2609552855:1 from server_real_ip to 10.100.1.218:62954
Nov 23 10:43:56 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:1838867459:1 from 10.240.154.52 to UA_real_ip:26125
Nov 23 10:43:56 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:1838867459:1 from server_real_ip to UA_real_ip:26125
Nov 23 10:43:57 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14084] Confirmed peer address as 10.240.154.52:12898
Nov 23 10:43:59 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14085] Confirmed peer address as 10.240.154.52:12899
Nov 23 10:43:59 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:2609552855:1 from 10.240.154.52 to 10.100.1.218:62954
Nov 23 10:43:59 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:2609552855:1 from server_real_ip to 10.100.1.218:62954
Nov 23 10:44:00 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:1838867459:1 from 10.240.154.52 to UA_real_ip:26125
Nov 23 10:44:00 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:1838867459:1 from server_real_ip to UA_real_ip:26125
Nov 23 10:44:06 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:2609552855:1 from 10.240.154.52 to 10.100.1.218:62954
Nov 23 10:44:06 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:2609552855:1 from server_real_ip to 10.100.1.218:62954
Nov 23 10:44:06 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:1838867459:1 from 10.240.154.52 to UA_real_ip:26125
Nov 23 10:44:06 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:1838867459:1 from server_real_ip to UA_real_ip:26125
Nov 23 10:44:08 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14084] SRTP output wanted, but no crypto suite was negotiated
Nov 23 10:44:12 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Received command 'delete' from 127.0.0.1:56462
Nov 23 10:44:12 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Dump for 'delete' from 127.0.0.1:56462: { "ICE": "force", "transport-protocol": "RTP/SAVPF", "call-id": "006d73de61c31c5163163e101c929baa@127.0.0.1:6050", "via-branch": "z9hG4bK24368bb8", "received-from": [ "IP4", "127.0.0.1" ], "from-tag": "as1679b510", "command": "delete" }
Nov 23 10:44:12 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Scheduling deletion of call branch 'as1679b510' in 60 seconds
Nov 23 10:44:12 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Replying to 'delete' from 127.0.0.1:56462
Nov 23 10:44:12 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Response dump for 'delete' to 127.0.0.1:56462: { "created": 1448271804, "last signal": 1448271833, "tags": { "as1679b510": { "tag": "as1679b510", "created": 1448271804, "in dialogue with": "pgg49icb47", "medias": [ { "index": 1, "type": "audio", "protocol": "RTP/AVP", "streams": [ { "local port": 14084, "endpoint": { "family": "IPv4", "address": "10.240.154.52", "port": 12898 }, "advertised endpoint": { "family": "IPv4", "address": "127.0.0.1", "port": 12898 }, "last packet": 1448271852, "flags" ...
Nov 23 10:44:12 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] ... : [ "RTP", "filled", "confirmed", "kernelized", "no kernel support" ], "stats": { "packets": 1584, "bytes": 278678, "errors": 3 } }, { "local port": 14085, "endpoint": { "family": "IPv4", "address": "10.240.154.52", "port": 12899 }, "advertised endpoint": { "family": "IPv4", "address": "127.0.0.1", "port": 12899 }, "last packet": 1448271849, "flags": [ "RTCP", "filled", "confirmed", "kernelized", "no kernel support" ], "stats": { "packets": 6, "bytes": 408, "errors": 0 } } ], "flags": [ "initial ...
Nov 23 10:44:12 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] ... ized", "send", "recv" ] } ] }, "pgg49icb47": { "tag": "pgg49icb47", "via-branch": "z9hG4bK5f660d85", "created": 1448271804, "in dialogue with": "as1679b510", "medias": [ { "index": 1, "type": "audio", "protocol": "UDP/TLS/RTP/SAVPF", "streams": [ { "local port": 14056, "endpoint": { "family": "IPv4", "address": "UA_real_ip", "port": 27645 }, "advertised endpoint": { "family": "IPv4", "address": "UA_real_ip", "port": 27645 }, "last packet": 1448271833, "flags": [ "RTP", "RTCP", "filled", ...
Nov 23 10:44:12 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] ... "kernelized", "no kernel support", "DTLS fingerprint verified" ], "stats": { "packets": 685, "bytes": 117380, "errors": 0 } }, { "local port": 14057, "endpoint": { "family": "IPv6", "address": "::", "port": 0 }, "advertised endpoint": { "family": "IPv6", "address": "::", "port": 0 }, "crypto suite": "AES_CM_128_HMAC_SHA1_80", "last packet": 1448271804, "flags": [ "RTCP", "fallback RTCP", "filled" ], "stats": { "packets": 0, "bytes": 0, "errors": 0 } } ], "flags": [ "initialized", "send", "recv", ...
Nov 23 10:44:12 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] ... "rtcp-mux", "DTLS-SRTP", "DTLS role passive", "ICE" ] } ] } }, "totals": { "RTP": { "packets": 2269, "bytes": 396058, "errors": 3 }, "RTCP": { "packets": 6, "bytes": 408, "errors": 0 } }, "result": "ok" }
^C
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment