Created
June 15, 2016 10:46
-
-
Save vance-od/fc9e4609496301b2b1b65824f56cf5f7 to your computer and use it in GitHub Desktop.
issue-244 - rtpengine GOOD case in case of server in cloud
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Jun 15 12:42:03 rtpengine[5914]: Adding a proxy for control ng stats:127.0.0.1 | |
Jun 15 12:42:03 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] Received command 'offer' from 127.0.0.1:42897 | |
Jun 15 12:42:03 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] Dump for 'offer' from 127.0.0.1:42897: { "sdp": "v=0#015#012o=- 1667981451757923244 2 IN IP4 127.0.0.1#015#012s=-#015#012t=0 0#015#012a=group:BUNDLE audio#015#012a=msid-semantic: WMS zkRmLRFvthOYyRFXBRFD6gcWaNxAgFV8YUxX#015#012m=audio 52535 UDP/TLS/RTP/SAVPF 111 103 104 9 0 8 106 105 13 126#015#012c=IN IP4 client_extern_ip#015#012a=rtcp:6657 IN IP4 client_extern_ip#015#012a=candidate:2609552855 1 udp 2122260223 10.100.1.218 58275 typ host generation 0 network-id 1#015#012a=candidate:2609552855 2 udp 2122260222 10.100.1.218 51788 typ host generation 0 network ... | |
Jun 15 12:42:03 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] ... -id 1#015#012a=candidate:1838867459 1 udp 1686052607 client_extern_ip 52535 typ srflx raddr 10.100.1.218 rport 58275 generation 0 network-id 1#015#012a=candidate:1838867459 1 udp 1686052607 client_extern_ip 36586 typ srflx raddr 10.100.1.218 rport 58275 generation 0 network-id 1#015#012a=candidate:1838867459 2 udp 1686052606 client_extern_ip 6657 typ srflx raddr 10.100.1.218 rport 51788 generation 0 network-id 1#015#012a=candidate:1838867459 2 udp 1686052606 client_extern_ip 48363 typ srflx raddr 10.100.1.218 rport 51788 gener ... | |
Jun 15 12:42:03 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] ... ation 0 network-id 1#015#012a=candidate:3574161703 1 tcp 1518280447 10.100.1.218 9 typ host tcptype active generation 0 network-id 1#015#012a=candidate:3574161703 2 tcp 1518280446 10.100.1.218 9 typ host tcptype active generation 0 network-id 1#015#012a=ice-ufrag:hXA6bZc63wZVjOhe#015#012a=ice-pwd:qxa33uTxqedYeBlwyHfp+BFj#015#012a=fingerprint:sha-256 B7:8F:13:4C:36:98:FC:66:2F:8F:55:68:D9:14:E0:CB:B2:4F:EA:DF:AE:A9:E1:69:BF:71:C3:68:81:EC:ED:F4#015#012a=setup:actpass#015#012a=mid:audio#015#012a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-le ... | |
Jun 15 12:42:03 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] ... vel#015#012a=extmap:3 http://www.webrtc.org/experiments/rtp-hdrext/abs-send-time#015#012a=sendrecv#015#012a=rtcp-mux#015#012a=rtpmap:111 opus/48000/2#015#012a=rtcp-fb:111 transport-cc#015#012a=fmtp:111 minptime=10;useinbandfec=1#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:9 G722/8000#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:106 CN/32000#015#012a=rtpmap:105 CN/16000#015#012a=rtpmap:13 CN/8000#015#012a=rtpmap:126 telephone-event/8000#015#012a=ssrc:1818022325 cname:pqa/TMOjv7CDWaTb#015#012a=ssrc:1818022325 msid:zkRmLRFvthOYyRFXBRFD6gc ... | |
Jun 15 12:42:03 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] ... WaNxAgFV8YUxX cef2bb19-a886-4058-83a0-b0a13d48b7bb#015#012a=ssrc:1818022325 mslabel:zkRmLRFvthOYyRFXBRFD6gcWaNxAgFV8YUxX#015#012a=ssrc:1818022325 label:cef2bb19-a886-4058-83a0-b0a13d48b7bb#015#012", "ICE": "remove", "direction": [ "ext", "ext" ], "flags": [ "trust-address" ], "replace": [ "origin", "session-connection" ], "transport-protocol": "RTP/AVPF", "rtcp-mux": [ "demux" ], "call-id": "smgj3dh5h8qmrcnvt5ke", "received-from": [ "IP4", "127.0.0.1" ], "from-tag": "podmh2vrc4", "command": "offer" } | |
Jun 15 12:42:03 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] Creating new call | |
Jun 15 12:42:03 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] set FILLED flag for stream client_extern_ip:52535 | |
Jun 15 12:42:03 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] set FILLED flag for stream (null):0 | |
Jun 15 12:42:03 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] Learning new ICE candidate 2609552855:1 | |
Jun 15 12:42:03 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] Created candidate pair Nk1aUTyA3MTTaUHL:2609552855:1 between 10.240.154.52 and 10.100.1.218:58275, type host | |
Jun 15 12:42:03 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] Learning new ICE candidate 2609552855:2 | |
Jun 15 12:42:03 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] Learning new ICE candidate 1838867459:1 | |
Jun 15 12:42:03 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] Created candidate pair Nk1aUTyA3MTTaUHL:1838867459:1 between 10.240.154.52 and client_extern_ip:52535, type srflx | |
Jun 15 12:42:03 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] Learning new ICE candidate 1838867459:1 | |
Jun 15 12:42:03 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] Created candidate pair Nk1aUTyA3MTTaUHL:1838867459:1 between 10.240.154.52 and client_extern_ip:36586, type srflx | |
Jun 15 12:42:03 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] Learning new ICE candidate 1838867459:2 | |
Jun 15 12:42:03 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] Learning new ICE candidate 1838867459:2 | |
Jun 15 12:42:03 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] Sending ICE/STUN request for candidate pair Nk1aUTyA3MTTaUHL:2609552855:1 from 10.240.154.52 to 10.100.1.218:58275 | |
Jun 15 12:42:03 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] offer time = 0.000985 sec | |
Jun 15 12:42:03 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] Replying to 'offer' from 127.0.0.1:42897 | |
Jun 15 12:42:03 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] Response dump for 'offer' to 127.0.0.1:42897: { "sdp": "v=0#015#012o=- 1667981451757923244 2 IN IP4 server_extern_ip#015#012s=-#015#012t=0 0#015#012a=msid-semantic: WMS zkRmLRFvthOYyRFXBRFD6gcWaNxAgFV8YUxX#015#012m=audio 12750 RTP/AVPF 111 103 104 9 0 8 106 105 13 126#015#012c=IN IP4 server_extern_ip#015#012a=rtpmap:111 opus/48000/2#015#012a=rtcp-fb:111 transport-cc#015#012a=fmtp:111 minptime=10;useinbandfec=1#015#012a=rtpmap:103 ISAC/16000#015#012a=rtpmap:104 ISAC/32000#015#012a=rtpmap:9 G722/8000#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=rtpmap:106 CN/32000#015#012a=rt ... | |
Jun 15 12:42:03 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] ... pmap:105 CN/16000#015#012a=rtpmap:13 CN/8000#015#012a=rtpmap:126 telephone-event/8000#015#012a=ssrc:1818022325 cname:pqa/TMOjv7CDWaTb#015#012a=ssrc:1818022325 msid:zkRmLRFvthOYyRFXBRFD6gcWaNxAgFV8YUxX cef2bb19-a886-4058-83a0-b0a13d48b7bb#015#012a=ssrc:1818022325 mslabel:zkRmLRFvthOYyRFXBRFD6gcWaNxAgFV8YUxX#015#012a=ssrc:1818022325 label:cef2bb19-a886-4058-83a0-b0a13d48b7bb#015#012a=sendrecv#015#012a=rtcp:12751#015#012", "result": "ok" } | |
Jun 15 12:42:03 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke/podmh2vrc4/1] Sending ICE/STUN request for candidate pair Nk1aUTyA3MTTaUHL:1838867459:1 from 10.240.154.52 to client_extern_ip:36586 | |
Jun 15 12:42:04 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke/podmh2vrc4/1] Sending ICE/STUN request for candidate pair Nk1aUTyA3MTTaUHL:2609552855:1 from 10.240.154.52 to 10.100.1.218:58275 | |
Jun 15 12:42:04 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke/podmh2vrc4/1] Sending ICE/STUN request for candidate pair Nk1aUTyA3MTTaUHL:1838867459:1 from 10.240.154.52 to client_extern_ip:36586 | |
Jun 15 12:42:04 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke/podmh2vrc4/1] Sending ICE/STUN request for candidate pair Nk1aUTyA3MTTaUHL:2609552855:1 from 10.240.154.52 to 10.100.1.218:58275 | |
Jun 15 12:42:04 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke/podmh2vrc4/1] Sending ICE/STUN request for candidate pair Nk1aUTyA3MTTaUHL:1838867459:1 from 10.240.154.52 to client_extern_ip:36586 | |
Jun 15 12:42:04 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke/podmh2vrc4/1] Sending ICE/STUN request for candidate pair Nk1aUTyA3MTTaUHL:2609552855:1 from 10.240.154.52 to 10.100.1.218:58275 | |
Jun 15 12:42:04 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke/podmh2vrc4/1] Sending ICE/STUN request for candidate pair Nk1aUTyA3MTTaUHL:1838867459:1 from 10.240.154.52 to client_extern_ip:36586 | |
Jun 15 12:42:05 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke/podmh2vrc4/1] Sending ICE/STUN request for candidate pair Nk1aUTyA3MTTaUHL:2609552855:1 from 10.240.154.52 to 10.100.1.218:58275 | |
Jun 15 12:42:05 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke/podmh2vrc4/1] Sending ICE/STUN request for candidate pair Nk1aUTyA3MTTaUHL:1838867459:1 from 10.240.154.52 to client_extern_ip:36586 | |
Jun 15 12:42:05 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] Received command 'answer' from 127.0.0.1:46709 | |
Jun 15 12:42:05 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] Dump for 'answer' from 127.0.0.1:46709: { "sdp": "v=0#015#012o=root 201403870 201403870 IN IP4 127.0.0.1#015#012s=Callweaver 31943#015#012c=IN IP4 127.0.0.1#015#012t=0 0#015#012m=audio 10080 RTP/AVPF 0 8#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=ptime:20#015#012a=sendrecv#015#012", "ICE": "force", "flags": [ "trust-address" ], "replace": [ "origin", "session-connection" ], "transport-protocol": "RTP/SAVPF", "call-id": "smgj3dh5h8qmrcnvt5ke", "received-from": [ "IP4", "127.0.0.1" ], "from-tag": "podmh2vrc4", "to-tag": "as06f83f2e", ... | |
Jun 15 12:42:05 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] ... "command": "answer" } | |
Jun 15 12:42:05 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] set FILLED flag for stream 127.0.0.1:10080 | |
Jun 15 12:42:05 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] set FILLED flag for stream 127.0.0.1:10081 | |
Jun 15 12:42:05 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] answer time = 0.000112 sec | |
Jun 15 12:42:05 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] Replying to 'answer' from 127.0.0.1:46709 | |
Jun 15 12:42:05 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] Response dump for 'answer' to 127.0.0.1:46709: { "sdp": "v=0#015#012o=root 201403870 201403870 IN IP4 server_extern_ip#015#012s=Callweaver 31943#015#012c=IN IP4 server_extern_ip#015#012t=0 0#015#012m=audio 12760 RTP/SAVPF 0 8#015#012a=rtpmap:0 PCMU/8000#015#012a=rtpmap:8 PCMA/8000#015#012a=ptime:20#015#012a=sendrecv#015#012a=rtcp:12760#015#012a=rtcp-mux#015#012a=setup:active#015#012a=fingerprint:sha-1 91:4D:22:C2:97:1D:8E:6E:68:54:6B:9A:25:7B:B4:45:9B:E9:2D:6B#015#012a=ice-ufrag:7k81dEzg#015#012a=ice-pwd:rr8zlPkcLAV6YfrXF4ePQxLXRT#015#012a=candidate:Nk1aUTyA3MTTaUHL 1 UDP 2130706431 104.155.70 ... | |
Jun 15 12:42:05 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] ... .164 12760 typ host#015#012", "result": "ok" } | |
Jun 15 12:42:05 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] Unknown STUN attribute: 0xc057 | |
Jun 15 12:42:05 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] Created candidate pair Nk1aUTyA3MTTaUHL:aa4e422c30:1 between 10.240.154.52 and client_extern_ip:55897, type prflx | |
Jun 15 12:42:05 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] Triggering check for Nk1aUTyA3MTTaUHL:aa4e422c30:1 | |
Jun 15 12:42:05 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] ICE pair Nk1aUTyA3MTTaUHL:aa4e422c30:1 has been nominated by peer | |
Jun 15 12:42:05 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] ICE not completed yet | |
Jun 15 12:42:05 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] Successful STUN binding request from client_extern_ip:55897 | |
Jun 15 12:42:05 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke/podmh2vrc4/1] Sending ICE/STUN request for candidate pair Nk1aUTyA3MTTaUHL:aa4e422c30:1 from 10.240.154.52 to client_extern_ip:55897 | |
Jun 15 12:42:06 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] Unknown STUN attribute: 0xc057 | |
Jun 15 12:42:06 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] Triggering check for Nk1aUTyA3MTTaUHL:aa4e422c30:1 | |
Jun 15 12:42:06 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] Successful STUN binding request from client_extern_ip:55897 | |
Jun 15 12:42:06 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke/podmh2vrc4/1] Sending ICE/STUN request for candidate pair Nk1aUTyA3MTTaUHL:aa4e422c30:1 from 10.240.154.52 to client_extern_ip:55897 | |
Jun 15 12:42:06 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] Received ICE/STUN response code 0 for candidate pair Nk1aUTyA3MTTaUHL:aa4e422c30:1 from client_extern_ip:55897 to 10.240.154.52 | |
Jun 15 12:42:06 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] Setting ICE candidate pair Nk1aUTyA3MTTaUHL:aa4e422c30:1 as succeeded | |
Jun 15 12:42:06 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] Best succeeded ICE pair with all components is Nk1aUTyA3MTTaUHL:aa4e422c30:1 | |
Jun 15 12:42:06 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] ICE completed, using pair Nk1aUTyA3MTTaUHL:aa4e422c30:1 | |
Jun 15 12:42:06 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] ICE negotiated: peer for component 1 is client_extern_ip:55897 | |
Jun 15 12:42:06 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] ICE negotiated: local interface 10.240.154.52 | |
Jun 15 12:42:06 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] Sending DTLS packet | |
Jun 15 12:42:06 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] Received ICE/STUN response code 0 for candidate pair Nk1aUTyA3MTTaUHL:aa4e422c30:1 from client_extern_ip:55897 to 10.240.154.52 | |
Jun 15 12:42:06 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] Processing incoming DTLS packet | |
Jun 15 12:42:06 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] DTLS: Peer certificate accepted | |
Jun 15 12:42:06 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] Sending DTLS packet | |
Jun 15 12:42:06 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12750] SRTP output wanted, but no crypto suite was negotiated | |
Jun 15 12:42:06 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] Processing incoming DTLS packet | |
Jun 15 12:42:06 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] DTLS handshake successful | |
Jun 15 12:42:06 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] DTLS-SRTP successfully negotiated | |
Jun 15 12:42:06 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] SRTP keys, incoming: | |
Jun 15 12:42:06 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] --- AES_CM_128_HMAC_SHA1_32 key K2zF4hI+7KoRRp2yFqc03w== salt hYPRIKE4Vp8eeosW2oA= | |
Jun 15 12:42:06 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] SRTP keys, outgoing: | |
Jun 15 12:42:06 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] --- AES_CM_128_HMAC_SHA1_32 key u2oDWtEsGcNs40dKYQ6yuQ== salt 2CEEyge6fiOBudUknYc= | |
Jun 15 12:42:06 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] DTLS-SRTP successfully negotiated | |
Jun 15 12:42:06 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] SRTP keys, incoming: | |
Jun 15 12:42:06 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] --- AES_CM_128_HMAC_SHA1_32 key K2zF4hI+7KoRRp2yFqc03w== salt hYPRIKE4Vp8eeosW2oA= | |
Jun 15 12:42:06 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] SRTP keys, outgoing: | |
Jun 15 12:42:06 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] --- AES_CM_128_HMAC_SHA1_32 key u2oDWtEsGcNs40dKYQ6yuQ== salt 2CEEyge6fiOBudUknYc= | |
Jun 15 12:42:06 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] Unknown STUN attribute: 0xc057 | |
Jun 15 12:42:06 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] Successful STUN binding request from client_extern_ip:55897 | |
Jun 15 12:42:07 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke/podmh2vrc4/1] Sending ICE/STUN request for candidate pair Nk1aUTyA3MTTaUHL:2609552855:1 from 10.240.154.52 to 10.100.1.218:58275 | |
Jun 15 12:42:07 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] Unknown STUN attribute: 0xc057 | |
Jun 15 12:42:07 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] Successful STUN binding request from client_extern_ip:55897 | |
Jun 15 12:42:07 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] Unknown STUN attribute: 0xc057 | |
Jun 15 12:42:07 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] Successful STUN binding request from client_extern_ip:55897 | |
Jun 15 12:42:08 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] Unknown STUN attribute: 0xc057 | |
Jun 15 12:42:08 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] Successful STUN binding request from client_extern_ip:55897 | |
Jun 15 12:42:08 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] Unknown STUN attribute: 0xc057 | |
Jun 15 12:42:08 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] Successful STUN binding request from client_extern_ip:55897 | |
Jun 15 12:42:09 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12750] Confirmed peer address as server_extern_ip:10080 | |
Jun 15 12:42:09 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] Confirmed peer address as client_extern_ip:55897 | |
Jun 15 12:42:09 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] Unknown STUN attribute: 0xc057 | |
Jun 15 12:42:09 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] Successful STUN binding request from client_extern_ip:55897 | |
Jun 15 12:42:09 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] Unknown STUN attribute: 0xc057 | |
Jun 15 12:42:09 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] Successful STUN binding request from client_extern_ip:55897 | |
Jun 15 12:42:10 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] Unknown STUN attribute: 0xc057 | |
Jun 15 12:42:10 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] Successful STUN binding request from client_extern_ip:55897 | |
Jun 15 12:42:10 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] Received command 'delete' from 127.0.0.1:44131 | |
Jun 15 12:42:10 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] Dump for 'delete' from 127.0.0.1:44131: { "ICE": "force", "transport-protocol": "RTP/SAVPF", "call-id": "smgj3dh5h8qmrcnvt5ke", "received-from": [ "IP4", "127.0.0.1" ], "from-tag": "as06f83f2e", "command": "delete" } | |
Jun 15 12:42:10 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] Scheduling deletion of call branch 'as06f83f2e' (via-branch '') in 60 seconds | |
Jun 15 12:42:10 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] delete time = 0.000074 sec | |
Jun 15 12:42:10 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] Replying to 'delete' from 127.0.0.1:44131 | |
Jun 15 12:42:10 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] Response dump for 'delete' to 127.0.0.1:44131: { "created": 1465987323, "last signal": 1465987325, "tags": { "as06f83f2e": { "tag": "as06f83f2e", "created": 1465987323, "in dialogue with": "podmh2vrc4", "medias": [ { "index": 1, "type": "audio", "protocol": "RTP/AVPF", "streams": [ { "local port": 12750, "endpoint": { "family": "IPv4", "address": "server_extern_ip", "port": 10080 }, "advertised endpoint": { "family": "IPv4", "address": "127.0.0.1", "port": 10080 }, "last packet": 1465987330, "flag ... | |
Jun 15 12:42:10 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] ... s": [ "RTP", "filled", "confirmed", "kernelized", "no kernel support" ], "stats": { "packets": 200, "bytes": 35196, "errors": 0 } }, { "local port": 12751, "endpoint": { "family": "IPv4", "address": "127.0.0.1", "port": 10081 }, "advertised endpoint": { "family": "IPv4", "address": "127.0.0.1", "port": 10081 }, "last packet": 1465987323, "flags": [ "RTCP", "filled" ], "stats": { "packets": 0, "bytes": 0, "errors": 0 } } ], "flags": [ "initialized", "send", "recv" ] } ] }, "podmh2vrc4": { "tag": ... | |
Jun 15 12:42:10 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] ... "podmh2vrc4", "created": 1465987323, "in dialogue with": "as06f83f2e", "medias": [ { "index": 1, "type": "audio", "protocol": "RTP/SAVPF", "streams": [ { "local port": 12760, "endpoint": { "family": "IPv4", "address": "client_extern_ip", "port": 55897 }, "advertised endpoint": { "family": "IPv4", "address": "client_extern_ip", "port": 52535 }, "crypto suite": "AES_CM_128_HMAC_SHA1_32", "last packet": 1465987330, "flags": [ "RTP", "RTCP", "filled", "confirmed", "kernelized", "no kernel support", "DTL ... | |
Jun 15 12:42:10 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] ... S fingerprint verified" ], "stats": { "packets": 204, "bytes": 34724, "errors": 0 } }, { "local port": 12761, "endpoint": { }, "advertised endpoint": { }, "crypto suite": "AES_CM_128_HMAC_SHA1_32", "last packet": 1465987323, "flags": [ "RTCP", "fallback RTCP", "filled" ], "stats": { "packets": 0, "bytes": 0, "errors": 0 } } ], "flags": [ "initialized", "send", "recv", "rtcp-mux", "DTLS-SRTP", "DTLS role active", "ICE" ] } ] } }, "totals": { "RTP": { "packets": 404, "bytes": 69920, "errors": 0 ... | |
Jun 15 12:42:10 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke] ... }, "RTCP": { "packets": 0, "bytes": 0, "errors": 0 } }, "result": "ok" } | |
Jun 15 12:42:10 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke/podmh2vrc4/1] Sending ICE/STUN request for candidate pair Nk1aUTyA3MTTaUHL:2609552855:1 from 10.240.154.52 to 10.100.1.218:58275 | |
Jun 15 12:42:10 rtpengine[5914]: [smgj3dh5h8qmrcnvt5ke port 12760] Processing incoming DTLS packet | |
^C |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment