[SR-Users] RTPproxy on Kamailio 3.2.1 difficulty.
nunu abe
nunu_abe at yahoo.com
Mon Jan 9 16:39:40 CET 2012
Hi,
Thank you for your swift response Sammy:)
I am not sure what you meant about the tcpdump, but what I am doing is capturing packets with wireshark on the pseudo-device to get packets from both interfaces. So here is what I captured. I chopped off the messages I thought are irrelevant. This is a call from IPv4 client to IPv6 client.
INVITE sip:300 at 10.10.10.10;user=phone SIP/2.0
Via: SIP/2.0/UDP 30.30.30.3:1029;rport;branch=z9hG4bK-gwwnwsm8l1bu
From: "IPv4 Client" <sip:200 at 10.10.10.10>;tag=p043g0591e
To: <sip:300 at 10.10.10.10;user=phone>
Call-ID: 3c267bf62be0-7ffgdvptawad
CSeq: 1 INVITE
Max-Forwards: 70
Contact: <sip:200 at 30.30.30.3:1029;line=nv9lxq4g>;reg-id=1
P-Key-Flags: resolution="31x13", keys="4"
User-Agent: snom370/7.3-boco-test
Accept: application/sdp
Allow: INVITE, ACK, CANCEL, BYE, REFER, OPTIONS, NOTIFY, SUBSCRIBE, PRACK, MESSAGE, INFO
Allow-Events: talk, hold, refer, call-info
Supported: timer, replaces, from-change
Session-Expires: 3600;refresher=uas
Min-SE: 90
Content-Type: application/sdp
Content-Length: 678
v=0
o=root 991959232 991959232 IN IP4 30.30.30.3
s=call
c=IN IP4 30.30.30.3
t=0 0
m=audio 55512 RTP/SAVP 8 9 99 3 18 4 101
a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:z2sV7JQKuY0lQ9+6pwyMw9v9g7/ExmM1oVxKiMAM
a=rtpmap:8 pcma/8000
a=rtpmap:9 g722/8000
a=rtpmap:99 g726-32/8000
a=rtpmap:3 gsm/8000
a=rtpmap:18 g729/8000
a=rtpmap:4 g723/8000
a=rtpmap:101 telephone-event/8000
a=fmtp:101 0-16
a=ptime:20
a=sendrecv
m=audio 55512 RTP/AVP 8 9 99 3 18 4 101
a=rtpmap:8 pcma/8000
a=rtpmap:9 g722/8000
a=rtpmap:99 g726-32/8000
a=rtpmap:3 gsm/8000
a=rtpmap:18 g729/8000
a=rtpmap:4 g723/8000
a=rtpmap:101 telephone-event/8000
a=fmtp:101 0-16
a=ptime:20
a=sendrecv
INVITE sip:300@[3001:0:0:4:0:0:0:4]:5060;line=fb0371cc0525bb2 SIP/2.0
Record-Route: <sip:[3001:0:0:1:0:0:0:10];r2=on;lr=on;nat=v46>
Record-Route: <sip:10.10.10.10;r2=on;lr=on;nat=v46>
Via: SIP/2.0/UDP [3001:0:0:1:0:0:0:10];branch=z9hG4bK6e01.90956496.0
Via: SIP/2.0/UDP 30.30.30.3:1029;rport=1028;branch=z9hG4bK-uzp7y9vq7nma
From: "IPv4 Client" <sip:200 at 10.10.10.10>;tag=p043g0591e
To: <sip:300 at 10.10.10.10;user=phone>
Call-ID: 3c267bf62be0-7ffgdvptawad
CSeq: 2 INVITE
Max-Forwards: 69
Contact: <sip:200 at 30.30.30.3:1028;line=nv9lxq4g>;reg-id=1
P-Key-Flags: resolution="31x13", keys="4" ******here expanding the wireshark message, I see "Unrecognised SIP header" ******
User-Agent: snom370/7.3-boco-test
Accept: application/sdp
Allow: INVITE, ACK, CANCEL, BYE, REFER, OPTIONS, NOTIFY, SUBSCRIBE, PRACK, MESSAGE, INFO
Allow-Events: talk, hold, refer, call-info
Supported: timer, replaces, from-change
Session-Expires: 3600;refresher=uas
Min-SE: 90
Content-Type: application/sdp
Content-Length: 704
v=0
o=root 991959232 991959232 IN IP6 3001:0:0:1::10
s=call
c=IN IP6 3001:0:0:1::10
t=0 0
m=audio 38450 RTP/SAVP 8 9 99 3 18 4 101
a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:z2sV7JQKuY0lQ9+6pwyMw9v9g7/ExmM1oVxKiMAM
.
a=sendrecv
a=nortpproxy:yes
********************This is an ICMPv6 message type 2 = "Too big".***************
INVITE sip:300@[3001:0:0:4:0:0:0:4]:5060;line=fb0371cc0525bb2 SIP/2.0
Record-Route: <sip:[3001:0:0:1:0:0:0:10];r2=on;lr=on;nat=v46>
Record-Route: <sip:10.10.10.10;r2=on;lr=on;nat=v46>
Via: SIP/2.0/UDP [3001:0:0:1:0:0:0:10];branch=z9hG4bK6e01.90956496.0
Via: SIP/2.0/UDP 30.30.30.3:1029;rport=1028;branch=z9hG4bK-uzp7y9vq7nma
From: "IPv4 Client" <sip:200 at 10.10.10.10>;tag=p043g0591e
To: <sip:300 at 10.10.10.10;user=phone>
Call-ID: 3c267bf62be0-7ffgdvptawad
CSeq: 2 INVITE
Max-Forwards: 69
Contact: <sip:200 at 30.30.30.3:1028;line=nv9lxq4g>;reg-id=1
P-Key-Flags: resolution="31x13", keys="4" ******here expanding the wireshark message, I see "Unrecognised SIP header".******
User-Agent: snom370/7.3-boco-test
Accept: application/sdp
Allow: INVITE, ACK, CANCEL, BYE, REFER, OPTIONS, NOTIFY, SUBSCRIBE, PRACK, MESSAGE, INFO
Allow-Events: talk, hold, refer, call-info
Supported: timer, replaces, from-change
Session-Expires: 3600;refresher=uas
Min-SE: 90
Content-Type: applicat
These messages keep repeating until the caller receives request timeout response from kamailio.
Thank you for your help :)
Regards,
Maedot.
________________________________
From: Sammy Govind <govoiper at gmail.com>
To: nunu abe <nunu_abe at yahoo.com>
Cc: SIP Router - Kamailio (OpenSER) and SIP Express Router (SER) - Users Mailing List <sr-users at lists.sip-router.org>
Sent: Monday, January 9, 2012 3:43 PM
Subject: Re: [SR-Users] RTPproxy on Kamailio 3.2.1 difficulty.
Hi again,
How are you taking traces on Kamailio+rtpproxy server !?
Since it has multiple interfaces and SIP packets maybe too big for default packet length in capture so what i do is.
#tcpdump -i any -s 0 -w maycapture.pcap -vvvvv
-i any [listens to both interfaces for traffic]
-s 0 [let the length of each packet captured reach infinity :) ]
Also check for tcpdump params for IPv6 special flags if any.
Paste the new SIP traces.
Regards.
Sammy.
More information about the sr-users
mailing list