Created
November 23, 2015 10:01
-
-
Save vance-od/53e70b36d625e034d600 to your computer and use it in GitHub Desktop.
rtpengine Issue-182. attempt with via-branch parameter (does not help)
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Nov 23 10:43:24 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Received command 'offer' from 127.0.0.1:38836 | |
Nov 23 10:43:24 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Dump for 'offer' from 127.0.0.1:38836: { "sdp": "v=0#015#012o=root 2063634125 2063634125 IN IP4 127.0.0.1#015#012s=Callweaver 30280#015#012c=IN IP4 127.0.0.1#015#012t=0 0#015#012m=audio 12898 RTP/AVP 18 8 0#015#012a=rtpmap:18 G729/8000#015#012a=fmtp:18 annexb=no#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:0 PCMU/8000#015#012a=ptime:20#015#012a=sendrecv#015#012", "ICE": "force", "flags": [ "trust-address" ], "replace": [ "origin", "session-connection" ], "transport-protocol": "RTP/SAVPF", "rtcp-mux": [ "offer" ], "call-id": "006d73de61c31c5163163e101c929baa@127.0.0.1 ... | |
Nov 23 10:43:24 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] ... :6050", "via-branch": "z9hG4bK5f660d85", "received-from": [ "IP4", "127.0.0.1" ], "from-tag": "as1679b510", "command": "offer" } | |
Nov 23 10:43:24 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Creating new call | |
Nov 23 10:43:24 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Opened ports 14056..14057 for media relay | |
Nov 23 10:43:24 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Opened ports 14076..14077 for media relay | |
Nov 23 10:43:24 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Replying to 'offer' from 127.0.0.1:38836 | |
Nov 23 10:43:24 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Response dump for 'offer' to 127.0.0.1:38836: { "sdp": "v=0#015#012o=root 2063634125 2063634125 IN IP4 10.240.154.52#015#012s=Callweaver 30280#015#012c=IN IP4 10.240.154.52#015#012t=0 0#015#012m=audio 14056 RTP/SAVPF 18 8 0#015#012a=rtpmap:18 G729/8000#015#012a=fmtp:18 annexb=no#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:0 PCMU/8000#015#012a=ptime:20#015#012a=sendrecv#015#012a=rtcp:14057#015#012a=rtcp-mux#015#012a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:KXkhzZJzyK8+Unt3jf0Q730U/jQcd1f1H8iXruAA#015#012a=setup:actpass#015#012a=fingerprint:sha-1 8E:F3:B3:9F:1C:E8:02:C6:27:C4:DF:1B:08:DF:51:F ... | |
Nov 23 10:43:24 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] ... F:41:77:13:5C#015#012a=ice-ufrag:Jobs4NM5#015#012a=ice-pwd:G1J0qH2RrZKFIIr1rxopVPqCdB#015#012a=candidate:FOwyX1N5R7oLwAmh 1 UDP 2130706431 10.240.154.52 14056 typ host#015#012a=candidate:FOwyX1N5R7oLwAmh 2 UDP 2130706430 10.240.154.52 14057 typ host#015#012a=candidate:XBrcoH0MXtwM6yAL 1 UDP 2130706175 server_real_ip 14056 typ host#015#012a=candidate:XBrcoH0MXtwM6yAL 2 UDP 2130706174 server_real_ip 14057 typ host#015#012", "result": "ok" } | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Created candidate pair FOwyX1N5R7oLwAmh:00ffff0000a264ee5531:1 between 10.240.154.52 and UA_real_ip:31987, type prflx | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Triggering check for FOwyX1N5R7oLwAmh:00ffff0000a264ee5531:1 | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Successful STUN binding request from UA_real_ip:31987 | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Received command 'answer' from 127.0.0.1:36137 | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Dump for 'answer' from 127.0.0.1:36137: { "sdp": "v=0#015#012o=- 5382731171423468384 2 IN IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=msid-semantic: WMS xDK4adpOfFyp1YGDMX321SWzFQxZkXK4dHrk#015#012m=audio 9595 UDP/TLS/RTP/SAVPF 8 0#015#012c=IN IP4 UA_real_ip#015#012a=rtcp:9 IN IP4 192.0.2.42#015#012a=candidate:2609552855 1 udp 2122260223 10.100.1.218 62460 typ host generation 0#015#012a=candidate:1838867459 1 udp 1686052607 UA_real_ip 9595 typ srflx raddr 10.100.1.218 rport 62460 generation 0#015#012a=candidate:1838867459 1 udp 1686052607 85.2 ... | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] ... 38.100.162 14677 typ srflx raddr 10.100.1.218 rport 62460 generation 0#015#012a=candidate:3574161703 1 tcp 1518280447 10.100.1.218 0 typ host tcptype active generation 0#015#012a=ice-ufrag:UU1ZRO07an+XbPn/#015#012a=ice-pwd:PfC6M5DS0AZLcGRSnTuKdhoY#015#012a=fingerprint:sha-256 5F:C2:19:3D:98:4F:F2:6A:7F:88:4D:1F:49:52:81:85:07:8C:79:87:93:DF:1D:3C:FE:02:FC:5B:65:6B:57:79#015#012a=setup:active#015#012a=mid:audio#015#012a=sendrecv#015#012a=rtcp-mux#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:0 PCMU/8000#015#012a=ssrc:262513561 cname:kh8ErK/bucTKzEzh#015#012a=ssrc:26251 ... | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] ... 3561 msid:xDK4adpOfFyp1YGDMX321SWzFQxZkXK4dHrk 2e239e5f-6f77-4152-b3e7-573068a7d4e3#015#012a=ssrc:262513561 mslabel:xDK4adpOfFyp1YGDMX321SWzFQxZkXK4dHrk#015#012a=ssrc:262513561 label:2e239e5f-6f77-4152-b3e7-573068a7d4e3#015#012", "ICE": "remove", "flags": [ "trust-address" ], "replace": [ "origin", "session-connection" ], "transport-protocol": "RTP/AVP", "call-id": "006d73de61c31c5163163e101c929baa@127.0.0.1:6050", "via-branch": "z9hG4bK5f660d85", "received-from": [ "IP4", "127.0.0.1" ], "from-tag": "as1679b510", ... | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] ... "to-tag": "pgg49icb47", "command": "answer" } | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Learning new ICE candidate 2609552855:1 | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Created candidate pair FOwyX1N5R7oLwAmh:2609552855:1 between 10.240.154.52 and 10.100.1.218:62460, type host | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Created candidate pair XBrcoH0MXtwM6yAL:2609552855:1 between server_real_ip and 10.100.1.218:62460, type host | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Learning new ICE candidate 1838867459:1 | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Created candidate pair FOwyX1N5R7oLwAmh:1838867459:1 between 10.240.154.52 and UA_real_ip:9595, type srflx | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Created candidate pair XBrcoH0MXtwM6yAL:1838867459:1 between server_real_ip and UA_real_ip:9595, type srflx | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Learning new ICE candidate 1838867459:1 | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Created candidate pair FOwyX1N5R7oLwAmh:1838867459:1 between 10.240.154.52 and UA_real_ip:14677, type srflx | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Created candidate pair XBrcoH0MXtwM6yAL:1838867459:1 between server_real_ip and UA_real_ip:14677, type srflx | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:00ffff0000a264ee5531:1 from 10.240.154.52 to UA_real_ip:31987 | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:2609552855:1 from 10.240.154.52 to 10.100.1.218:62460 | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Replying to 'answer' from 127.0.0.1:36137 | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Response dump for 'answer' to 127.0.0.1:36137: { "sdp": "v=0#015#012o=- 5382731171423468384 2 IN IP4 10.240.154.52#015#012s=-#015#012t=0 0#015#012a=msid-semantic: WMS xDK4adpOfFyp1YGDMX321SWzFQxZkXK4dHrk#015#012m=audio 14076 RTP/AVP 8 0#015#012c=IN IP4 10.240.154.52#015#012a=mid:audio#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:0 PCMU/8000#015#012a=ssrc:262513561 cname:kh8ErK/bucTKzEzh#015#012a=ssrc:262513561 msid:xDK4adpOfFyp1YGDMX321SWzFQxZkXK4dHrk 2e239e5f-6f77-4152-b3e7-573068a7d4e3#015#012a=ssrc:262513561 mslabel:xDK4adpOfFyp1YGDMX321SWzFQxZkXK4dHrk#015#012a=ssrc:262 ... | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] ... 513561 label:2e239e5f-6f77-4152-b3e7-573068a7d4e3#015#012a=sendrecv#015#012a=rtcp:14077#015#012", "result": "ok" } | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:2609552855:1 from server_real_ip to 10.100.1.218:62460 | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:1838867459:1 from 10.240.154.52 to UA_real_ip:14677 | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] DTLS: Peer certificate accepted | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] DTLS handshake successful | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] DTLS-SRTP successfully negotiated | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] SRTP keys, incoming: | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] --- AES_CM_128_HMAC_SHA1_80 key Uj0fskQXMbBrz2QcHbrgcA== salt 9ZkfcMhvX42yFBttzcI= | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] SRTP keys, outgoing: | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] --- AES_CM_128_HMAC_SHA1_80 key J/AlIJTgW36WVJpP52nvBA== salt /md3bY0WKYSyqLKxeno= | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] DTLS-SRTP successfully negotiated | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] SRTP keys, incoming: | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] --- AES_CM_128_HMAC_SHA1_80 key Uj0fskQXMbBrz2QcHbrgcA== salt 9ZkfcMhvX42yFBttzcI= | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] SRTP keys, outgoing: | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] --- AES_CM_128_HMAC_SHA1_80 key J/AlIJTgW36WVJpP52nvBA== salt /md3bY0WKYSyqLKxeno= | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Received ICE/STUN response code 0 for candidate pair FOwyX1N5R7oLwAmh:00ffff0000a264ee5531:1 from UA_real_ip:31987 to 10.240.154.52 | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Setting ICE candidate pair FOwyX1N5R7oLwAmh:00ffff0000a264ee5531:1 as succeeded | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Best succeeded ICE pair with all components is FOwyX1N5R7oLwAmh:00ffff0000a264ee5531:1 | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:1838867459:1 from server_real_ip to UA_real_ip:14677 | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:2609552855:1 from 10.240.154.52 to 10.100.1.218:62460 | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:2609552855:1 from server_real_ip to 10.100.1.218:62460 | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:1838867459:1 from 10.240.154.52 to UA_real_ip:14677 | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Start nominating ICE pairs | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Nominating ICE pair FOwyX1N5R7oLwAmh:00ffff0000a264ee5531:1 | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending nominating ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:00ffff0000a264ee5531:1 from 10.240.154.52 to UA_real_ip:31987 | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:1838867459:1 from server_real_ip to UA_real_ip:14677 | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Received ICE/STUN response code 0 for candidate pair FOwyX1N5R7oLwAmh:00ffff0000a264ee5531:1 from UA_real_ip:31987 to 10.240.154.52 | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Setting nominated ICE candidate pair FOwyX1N5R7oLwAmh:00ffff0000a264ee5531:1 as valid | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] ICE completed, using pair FOwyX1N5R7oLwAmh:00ffff0000a264ee5531:1 | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:2609552855:1 from 10.240.154.52 to 10.100.1.218:62460 | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14076] RTP packet with unknown payload type 18 received | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:2609552855:1 from server_real_ip to 10.100.1.218:62460 | |
Nov 23 10:43:39 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14076] SSRC changed, updating SRTP crypto contexts | |
Nov 23 10:43:40 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Successful STUN binding request from UA_real_ip:31987 | |
Nov 23 10:43:40 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:2609552855:1 from 10.240.154.52 to 10.100.1.218:62460 | |
Nov 23 10:43:40 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:2609552855:1 from server_real_ip to 10.100.1.218:62460 | |
Nov 23 10:43:40 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:2609552855:1 from 10.240.154.52 to 10.100.1.218:62460 | |
Nov 23 10:43:40 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:2609552855:1 from server_real_ip to 10.100.1.218:62460 | |
Nov 23 10:43:41 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Successful STUN binding request from UA_real_ip:31987 | |
Nov 23 10:43:42 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Successful STUN binding request from UA_real_ip:31987 | |
Nov 23 10:43:42 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:2609552855:1 from 10.240.154.52 to 10.100.1.218:62460 | |
Nov 23 10:43:42 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:2609552855:1 from server_real_ip to 10.100.1.218:62460 | |
Nov 23 10:43:43 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14076] Confirmed peer address as 10.240.154.52:12898 | |
Nov 23 10:43:43 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Confirmed peer address as UA_real_ip:31987 | |
Nov 23 10:43:43 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Successful STUN binding request from UA_real_ip:31987 | |
Nov 23 10:43:44 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Successful STUN binding request from UA_real_ip:31987 | |
Nov 23 10:43:44 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14077] Confirmed peer address as 10.240.154.52:12899 | |
Nov 23 10:43:45 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Successful STUN binding request from UA_real_ip:31987 | |
Nov 23 10:43:45 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:2609552855:1 from 10.240.154.52 to 10.100.1.218:62460 | |
Nov 23 10:43:45 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:2609552855:1 from server_real_ip to 10.100.1.218:62460 | |
Nov 23 10:43:46 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Successful STUN binding request from UA_real_ip:31987 | |
Nov 23 10:43:47 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Successful STUN binding request from UA_real_ip:31987 | |
Nov 23 10:43:48 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Successful STUN binding request from UA_real_ip:31987 | |
Nov 23 10:43:48 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14076] SSRC changed, updating SRTP crypto contexts | |
Nov 23 10:43:49 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Successful STUN binding request from UA_real_ip:31987 | |
Nov 23 10:43:50 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Successful STUN binding request from UA_real_ip:31987 | |
Nov 23 10:43:50 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14076] SSRC changed, updating SRTP crypto contexts | |
Nov 23 10:43:51 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Successful STUN binding request from UA_real_ip:31987 | |
Nov 23 10:43:52 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Successful STUN binding request from UA_real_ip:31987 | |
Nov 23 10:43:52 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:2609552855:1 from 10.240.154.52 to 10.100.1.218:62460 | |
Nov 23 10:43:52 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:2609552855:1 from server_real_ip to 10.100.1.218:62460 | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14056] Successful STUN binding request from UA_real_ip:31987 | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Received command 'offer' from 127.0.0.1:56462 | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Dump for 'offer' from 127.0.0.1:56462: { "sdp": "v=0#015#012o=root 2063634125 2063634125 IN IP4 127.0.0.1#015#012s=Callweaver 30280#015#012c=IN IP4 127.0.0.1#015#012t=0 0#015#012m=audio 12898 RTP/AVP 0 8#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=ptime:20#015#012a=sendrecv#015#012", "ICE": "force", "flags": [ "trust-address" ], "replace": [ "origin", "session-connection" ], "transport-protocol": "RTP/SAVPF", "rtcp-mux": [ "offer" ], "call-id": "006d73de61c31c5163163e101c929baa@127.0.0.1:6050", "via-branch": "z9hG4bK11a8a15b", "recei ... | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] ... ved-from": [ "IP4", "127.0.0.1" ], "from-tag": "as1679b510", "to-tag": "pgg49icb47", "command": "offer" } | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Created candidate pair XBrcoH0MXtwM6yAL:00ffff0000a264ee5531:1 between server_real_ip and UA_real_ip:31987, type prflx | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Replying to 'offer' from 127.0.0.1:56462 | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Response dump for 'offer' to 127.0.0.1:56462: { "sdp": "v=0#015#012o=root 2063634125 2063634125 IN IP4 10.240.154.52#015#012s=Callweaver 30280#015#012c=IN IP4 10.240.154.52#015#012t=0 0#015#012m=audio 14056 RTP/SAVPF 0 8#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=ptime:20#015#012a=sendrecv#015#012a=rtcp:14057#015#012a=rtcp-mux#015#012a=setup:actpass#015#012a=fingerprint:sha-1 8E:F3:B3:9F:1C:E8:02:C6:27:C4:DF:1B:08:DF:51:FF:41:77:13:5C#015#012a=ice-ufrag:Jobs4NM5#015#012a=ice-pwd:G1J0qH2RrZKFIIr1rxopVPqCdB#015#012a=candidate:FOwyX1N5R7oLwAmh 1 UDP 2130706431 10.240.154 ... | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] ... .52 14056 typ host#015#012a=candidate:FOwyX1N5R7oLwAmh 2 UDP 2130706430 10.240.154.52 14057 typ host#015#012a=remote-candidates:1 UA_real_ip 31987#015#012", "result": "ok" } | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14076] SSRC changed, updating SRTP crypto contexts | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Received command 'answer' from 127.0.0.1:36137 | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Dump for 'answer' from 127.0.0.1:36137: { "sdp": "v=0#015#012o=- 807051876575904576 2 IN IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=msid-semantic: WMS 8kTpLeuggfAfc03tdcDb2Rg6J0CTGPLJaFvG#015#012m=audio 27645 UDP/TLS/RTP/SAVPF 0 8#015#012c=IN IP4 UA_real_ip#015#012a=rtcp:9 IN IP4 192.0.2.23#015#012a=candidate:2609552855 1 udp 2122260223 10.100.1.218 62954 typ host generation 0#015#012a=candidate:1838867459 1 udp 1686052607 UA_real_ip 27645 typ srflx raddr 10.100.1.218 rport 62954 generation 0#015#012a=candidate:1838867459 1 udp 1686052607 85. ... | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] ... 238.100.162 26125 typ srflx raddr 10.100.1.218 rport 62954 generation 0#015#012a=candidate:3574161703 1 tcp 1518280447 10.100.1.218 0 typ host tcptype active generation 0#015#012a=ice-ufrag:gAkqQjK19jYH8/oO#015#012a=ice-pwd:wWSYJdEYx39wtbN00URT8Ak/#015#012a=fingerprint:sha-256 5F:C2:19:3D:98:4F:F2:6A:7F:88:4D:1F:49:52:81:85:07:8C:79:87:93:DF:1D:3C:FE:02:FC:5B:65:6B:57:79#015#012a=setup:active#015#012a=mid:audio#015#012a=sendrecv#015#012a=rtcp-mux#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=ssrc:675618909 cname:BTK8T8Z2YJZ2m8nx#015#012a=ssrc:6756 ... | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] ... 18909 msid:8kTpLeuggfAfc03tdcDb2Rg6J0CTGPLJaFvG 4119310f-6299-488b-bdc6-2ece39ff4ebe#015#012a=ssrc:675618909 mslabel:8kTpLeuggfAfc03tdcDb2Rg6J0CTGPLJaFvG#015#012a=ssrc:675618909 label:4119310f-6299-488b-bdc6-2ece39ff4ebe#015#012", "ICE": "remove", "flags": [ "trust-address" ], "replace": [ "origin", "session-connection" ], "transport-protocol": "RTP/AVP", "call-id": "006d73de61c31c5163163e101c929baa@127.0.0.1:6050", "via-branch": "z9hG4bK11a8a15b", "received-from": [ "IP4", "127.0.0.1" ], "from-tag": "as1679b510" ... | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] ... , "to-tag": "pgg49icb47", "command": "answer" } | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Opened ports 14084..14085 for media relay | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] ICE restart, resetting ICE agent | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Learning new ICE candidate 2609552855:1 | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Created candidate pair FOwyX1N5R7oLwAmh:2609552855:1 between 10.240.154.52 and 10.100.1.218:62954, type host | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Created candidate pair XBrcoH0MXtwM6yAL:2609552855:1 between server_real_ip and 10.100.1.218:62954, type host | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Learning new ICE candidate 1838867459:1 | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Created candidate pair FOwyX1N5R7oLwAmh:1838867459:1 between 10.240.154.52 and UA_real_ip:27645, type srflx | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Created candidate pair XBrcoH0MXtwM6yAL:1838867459:1 between server_real_ip and UA_real_ip:27645, type srflx | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Learning new ICE candidate 1838867459:1 | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Created candidate pair FOwyX1N5R7oLwAmh:1838867459:1 between 10.240.154.52 and UA_real_ip:26125, type srflx | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Created candidate pair XBrcoH0MXtwM6yAL:1838867459:1 between server_real_ip and UA_real_ip:26125, type srflx | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:2609552855:1 from 10.240.154.52 to 10.100.1.218:62954 | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Replying to 'answer' from 127.0.0.1:36137 | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Response dump for 'answer' to 127.0.0.1:36137: { "sdp": "v=0#015#012o=- 807051876575904576 2 IN IP4 10.240.154.52#015#012s=-#015#012t=0 0#015#012a=msid-semantic: WMS 8kTpLeuggfAfc03tdcDb2Rg6J0CTGPLJaFvG#015#012m=audio 14084 RTP/AVP 0 8#015#012c=IN IP4 10.240.154.52#015#012a=mid:audio#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=ssrc:675618909 cname:BTK8T8Z2YJZ2m8nx#015#012a=ssrc:675618909 msid:8kTpLeuggfAfc03tdcDb2Rg6J0CTGPLJaFvG 4119310f-6299-488b-bdc6-2ece39ff4ebe#015#012a=ssrc:675618909 mslabel:8kTpLeuggfAfc03tdcDb2Rg6J0CTGPLJaFvG#015#012a=ssrc:6756 ... | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] ... 18909 label:4119310f-6299-488b-bdc6-2ece39ff4ebe#015#012a=sendrecv#015#012a=rtcp:14085#015#012", "result": "ok" } | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:2609552855:1 from server_real_ip to 10.100.1.218:62954 | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14084] SRTP output wanted, but no crypto suite was negotiated | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:1838867459:1 from 10.240.154.52 to UA_real_ip:26125 | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:1838867459:1 from server_real_ip to UA_real_ip:26125 | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:2609552855:1 from 10.240.154.52 to 10.100.1.218:62954 | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:2609552855:1 from server_real_ip to 10.100.1.218:62954 | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:1838867459:1 from 10.240.154.52 to UA_real_ip:26125 | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:1838867459:1 from server_real_ip to UA_real_ip:26125 | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:2609552855:1 from 10.240.154.52 to 10.100.1.218:62954 | |
Nov 23 10:43:53 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:2609552855:1 from server_real_ip to 10.100.1.218:62954 | |
Nov 23 10:43:54 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:1838867459:1 from 10.240.154.52 to UA_real_ip:26125 | |
Nov 23 10:43:54 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:1838867459:1 from server_real_ip to UA_real_ip:26125 | |
Nov 23 10:43:54 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:2609552855:1 from 10.240.154.52 to 10.100.1.218:62954 | |
Nov 23 10:43:54 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:2609552855:1 from server_real_ip to 10.100.1.218:62954 | |
Nov 23 10:43:54 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:1838867459:1 from 10.240.154.52 to UA_real_ip:26125 | |
Nov 23 10:43:54 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:1838867459:1 from server_real_ip to UA_real_ip:26125 | |
Nov 23 10:43:55 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:2609552855:1 from 10.240.154.52 to 10.100.1.218:62954 | |
Nov 23 10:43:55 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:2609552855:1 from server_real_ip to 10.100.1.218:62954 | |
Nov 23 10:43:55 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:1838867459:1 from 10.240.154.52 to UA_real_ip:26125 | |
Nov 23 10:43:55 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:1838867459:1 from server_real_ip to UA_real_ip:26125 | |
Nov 23 10:43:56 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:2609552855:1 from 10.240.154.52 to 10.100.1.218:62954 | |
Nov 23 10:43:56 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:2609552855:1 from server_real_ip to 10.100.1.218:62954 | |
Nov 23 10:43:56 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:1838867459:1 from 10.240.154.52 to UA_real_ip:26125 | |
Nov 23 10:43:56 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:1838867459:1 from server_real_ip to UA_real_ip:26125 | |
Nov 23 10:43:57 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14084] Confirmed peer address as 10.240.154.52:12898 | |
Nov 23 10:43:59 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14085] Confirmed peer address as 10.240.154.52:12899 | |
Nov 23 10:43:59 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:2609552855:1 from 10.240.154.52 to 10.100.1.218:62954 | |
Nov 23 10:43:59 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:2609552855:1 from server_real_ip to 10.100.1.218:62954 | |
Nov 23 10:44:00 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:1838867459:1 from 10.240.154.52 to UA_real_ip:26125 | |
Nov 23 10:44:00 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:1838867459:1 from server_real_ip to UA_real_ip:26125 | |
Nov 23 10:44:06 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:2609552855:1 from 10.240.154.52 to 10.100.1.218:62954 | |
Nov 23 10:44:06 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:2609552855:1 from server_real_ip to 10.100.1.218:62954 | |
Nov 23 10:44:06 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair FOwyX1N5R7oLwAmh:1838867459:1 from 10.240.154.52 to UA_real_ip:26125 | |
Nov 23 10:44:06 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050/pgg49icb47/1] Sending ICE/STUN request for candidate pair XBrcoH0MXtwM6yAL:1838867459:1 from server_real_ip to UA_real_ip:26125 | |
Nov 23 10:44:08 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050 port 14084] SRTP output wanted, but no crypto suite was negotiated | |
Nov 23 10:44:12 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Received command 'delete' from 127.0.0.1:56462 | |
Nov 23 10:44:12 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Dump for 'delete' from 127.0.0.1:56462: { "ICE": "force", "transport-protocol": "RTP/SAVPF", "call-id": "006d73de61c31c5163163e101c929baa@127.0.0.1:6050", "via-branch": "z9hG4bK24368bb8", "received-from": [ "IP4", "127.0.0.1" ], "from-tag": "as1679b510", "command": "delete" } | |
Nov 23 10:44:12 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Scheduling deletion of call branch 'as1679b510' in 60 seconds | |
Nov 23 10:44:12 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Replying to 'delete' from 127.0.0.1:56462 | |
Nov 23 10:44:12 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] Response dump for 'delete' to 127.0.0.1:56462: { "created": 1448271804, "last signal": 1448271833, "tags": { "as1679b510": { "tag": "as1679b510", "created": 1448271804, "in dialogue with": "pgg49icb47", "medias": [ { "index": 1, "type": "audio", "protocol": "RTP/AVP", "streams": [ { "local port": 14084, "endpoint": { "family": "IPv4", "address": "10.240.154.52", "port": 12898 }, "advertised endpoint": { "family": "IPv4", "address": "127.0.0.1", "port": 12898 }, "last packet": 1448271852, "flags" ... | |
Nov 23 10:44:12 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] ... : [ "RTP", "filled", "confirmed", "kernelized", "no kernel support" ], "stats": { "packets": 1584, "bytes": 278678, "errors": 3 } }, { "local port": 14085, "endpoint": { "family": "IPv4", "address": "10.240.154.52", "port": 12899 }, "advertised endpoint": { "family": "IPv4", "address": "127.0.0.1", "port": 12899 }, "last packet": 1448271849, "flags": [ "RTCP", "filled", "confirmed", "kernelized", "no kernel support" ], "stats": { "packets": 6, "bytes": 408, "errors": 0 } } ], "flags": [ "initial ... | |
Nov 23 10:44:12 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] ... ized", "send", "recv" ] } ] }, "pgg49icb47": { "tag": "pgg49icb47", "via-branch": "z9hG4bK5f660d85", "created": 1448271804, "in dialogue with": "as1679b510", "medias": [ { "index": 1, "type": "audio", "protocol": "UDP/TLS/RTP/SAVPF", "streams": [ { "local port": 14056, "endpoint": { "family": "IPv4", "address": "UA_real_ip", "port": 27645 }, "advertised endpoint": { "family": "IPv4", "address": "UA_real_ip", "port": 27645 }, "last packet": 1448271833, "flags": [ "RTP", "RTCP", "filled", ... | |
Nov 23 10:44:12 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] ... "kernelized", "no kernel support", "DTLS fingerprint verified" ], "stats": { "packets": 685, "bytes": 117380, "errors": 0 } }, { "local port": 14057, "endpoint": { "family": "IPv6", "address": "::", "port": 0 }, "advertised endpoint": { "family": "IPv6", "address": "::", "port": 0 }, "crypto suite": "AES_CM_128_HMAC_SHA1_80", "last packet": 1448271804, "flags": [ "RTCP", "fallback RTCP", "filled" ], "stats": { "packets": 0, "bytes": 0, "errors": 0 } } ], "flags": [ "initialized", "send", "recv", ... | |
Nov 23 10:44:12 rtpengine[22148]: [006d73de61c31c5163163e101c929baa@127.0.0.1:6050] ... "rtcp-mux", "DTLS-SRTP", "DTLS role passive", "ICE" ] } ] } }, "totals": { "RTP": { "packets": 2269, "bytes": 396058, "errors": 3 }, "RTCP": { "packets": 6, "bytes": 408, "errors": 0 } }, "result": "ok" } | |
^C |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment