[Freeswitch-users] SAVPF and a=crypto
peter at uringme.com
peter at uringme.com
Tue May 22 17:52:58 MSD 2012
Is there anyone who knows anything about FreeSwitch and SAVPF? Should this be on the dev group instead?
Thanks
Peter
--- On Mon, 5/21/12, peter at uringme.com <peter at uringme.com> wrote:
> From: peter at uringme.com <peter at uringme.com>
> Subject: SAVPF and a=crypto
> To: freeswitch-users at lists.freeswitch.org
> Date: Monday, May 21, 2012, 2:57 PM
> I'm trying out sipML5 ( http://code.google.com/p/sipml5/ ) with FS and I had a
> problem with their demo. Their code uses a=crypto
> lines on RTP/SAVPF and FS is bouncing it with:
>
> 2012-05-21 13:04:47.754843 [ERR] sofia_glue.c:4478 a=crypto
> in RTP/AVP, refer to rfc3711
>
> The crypto line is in RTP/SAVPF, though, not RTP/AVP.
> Is this line coming up because it's not RTP/SAVP? Am I
> missing a module for RTP/SAVPF, or is this even supported?
>
> Following is a trace -- I'm calling x7779 on my server which
> just plays a voice prompt.
>
>
> INVITE sip:7779 at x.x.x.x SIP/2.0
> Via: SIP/2.0/UDP
> 87.106.69.240:4060;branch=z9hG4bK-524287-1---a56eca302b8d6412;rport
> Via: SIP/2.0/TCP
> y.y.y.y:62676;branch=z9hG4bK1P36uFnLdbzHiEzWdVAd0G6nk6kdOdEt;rport=62676;received=y.y.y.y
> Max-Forwards: 69
> Contact: "Peter
> Krause"<sip:7777 at 87.106.69.240:4060;transport=udp;ws-src-ip=y.y.y.y;ws-src-port=62676>;+sip.ice
> To: <sip:7779 at x.x.x.x>
> From:
> <sip:7777 at uringme>;tag=gz6bNBeAkHM7eAR2eoJG
> Call-ID:
> 434d70e1-5cc1-d096-442c-499c8cd600ad
> CSeq: 6437 INVITE
> Content-Type: application/sdp
> Organization: Doubango Telecom
> User-Agent: IM-client/OMA1.0
> sipML5/v0.0.0000.0
> Content-Length: 3483
>
> v=0
> o=- 275367574 1 IN IP4 127.0.0.1
> s=webrtc (chrome 20.0.1127.0) - Doubango
> Telecom (sipML5 r000)
> t=0 0
> m=audio 54450 RTP/SAVPF 103 104 0 8 106
> 105 13 126
> c=IN IP4 y.y.y.y
> a=rtcp:54451 IN IP4 y.y.y.y
> a=candidate:0 1 udp 2130706432 192.168.1.8
> 50256 typ host network_name
> {D1FD878A-47C6-4B01-B940-ECA38C8D0617} username
> 2C/PMnZyAP2pLbP0 password 0xigYC8ZZibTPCejG5JKwjBN
> generation 0
> a=candidate:0 2 udp 2130706432 192.168.1.8
> 50257 typ host network_name
> {D1FD878A-47C6-4B01-B940-ECA38C8D0617} username
> 2BPqrxt6Vp+wJNL3 password UEWxx9yByE/JlsmFHa0zkbTs
> generation 0
> a=candidate:0 1 udp 1912602624 y.y.y.y
> 54450 typ srflx network_name
> {D1FD878A-47C6-4B01-B940-ECA38C8D0617} username
> 2C/PMnZyAP2pLbP0 password 0xigYC8ZZibTPCejG5JKwjBN
> generation 0
> a=candidate:0 2 udp 1912602624 y.y.y.y
> 54451 typ srflx network_name
> {D1FD878A-47C6-4B01-B940-ECA38C8D0617} username
> 2BPqrxt6Vp+wJNL3 password UEWxx9yByE/JlsmFHa0zkbTs
> generation 0
> a=candidate:0 1 tcp 1694498816 192.168.1.8
> 62677 typ host network_name
> {D1FD878A-47C6-4B01-B940-ECA38C8D0617} username
> 2C/PMnZyAP2pLbP0 password 0xigYC8ZZibTPCejG5JKwjBN
> generation 0
> a=candidate:0 2 tcp 1694498816 192.168.1.8
> 62678 typ host network_name
> {D1FD878A-47C6-4B01-B940-ECA38C8D0617} username
> 2BPqrxt6Vp+wJNL3 password UEWxx9yByE/JlsmFHa0zkbTs
> generation 0
> a=mid:audio
> a=rtcp-mux
> a=crypto:0 AES_CM_128_HMAC_SHA1_32
> inline:33ayFPGAoi+nni8kbYZfBO7tH3qI1SaH7ilFU7GT
> a=crypto:1 AES_CM_128_HMAC_SHA1_80
> inline:Hd6rAXtyms1rJgC4OTJk/K4AGpnwLUn9Aqdx1sbd
> a=rtpmap:103 ISAC/16000
> a=rtpmap:104 ISAC/32000
> a=rtpmap:0 PCMU/8000
> a=rtpmap:8 PCMA/8000
> a=rtpmap:106 CN/32000
> a=rtpmap:105 CN/16000
> a=rtpmap:13 CN/8000
> a=rtpmap:126 telephone-event/8000
> a=ssrc:2075114348 cname:vcjaT0z7bAvF1TL3
> a=ssrc:2075114348
> mslabel:TOAV4oLn6QD7CfJieQ90FAEQB06orMEVm2na
> a=ssrc:2075114348
> label:TOAV4oLn6QD7CfJieQ90FAEQB06orMEVm2na0
> a=sendrecv
> m=video 54452 RTP/SAVPF 100 101 102
> c=IN IP4 y.y.y.y
> a=rtcp:54453 IN IP4 y.y.y.y
> a=candidate:0 1 udp 2130706432 192.168.1.8
> 50258 typ host network_name
> {D1FD878A-47C6-4B01-B940-ECA38C8D0617} username
> PlVs0WI8o1Q05fcc password eakcTlAsBYwpmZvTc58E1thy
> generation 0
> a=candidate:0 2 udp 2130706432 192.168.1.8
> 50259 typ host network_name
> {D1FD878A-47C6-4B01-B940-ECA38C8D0617} username
> gUagDr7SY/5Jxned password 6J+08YaMdKaer/95B9lfxCEM
> generation 0
> a=candidate:0 1 udp 1912602624 y.y.y.y
> 54452 typ srflx network_name
> {D1FD878A-47C6-4B01-B940-ECA38C8D0617} username
> PlVs0WI8o1Q05fcc password eakcTlAsBYwpmZvTc58E1thy
> generation 0
> a=candidate:0 2 udp 1912602624 y.y.y.y
> 54453 typ srflx network_name
> {D1FD878A-47C6-4B01-B940-ECA38C8D0617} username
> gUagDr7SY/5Jxned password 6J+08YaMdKaer/95B9lfxCEM
> generation 0
> a=candidate:0 1 tcp 1694498816 192.168.1.8
> 62679 typ host network_name
> {D1FD878A-47C6-4B01-B940-ECA38C8D0617} username
> PlVs0WI8o1Q05fcc password eakcTlAsBYwpmZvTc58E1thy
> generation 0
> a=candidate:0 2 tcp 1694498816 192.168.1.8
> 62680 typ host network_name
> {D1FD878A-47C6-4B01-B940-ECA38C8D0617} username
> gUagDr7SY/5Jxned password 6J+08YaMdKaer/95B9lfxCEM
> generation 0
> a=mid:video
> a=rtcp-mux
> a=crypto:0 AES_CM_128_HMAC_SHA1_80
> inline:RIxXHNE/5GtDfkXnAV4CLXBQGxPzlzBg3Xyg3Lfs
> a=rtpmap:100 VP8/90000
> a=rtpmap:101 red/90000
> a=rtpmap:102 ulpfec/90000
> a=ssrc:2075114348 cname:vcjaT0z7bAvF1TL3
> a=ssrc:2075114348
> mslabel:TOAV4oLn6QD7CfJieQ90FAEQB06orMEVm2na
> a=ssrc:2075114348
> label:TOAV4oLn6QD7CfJieQ90FAEQB06orMEVm2na0
> a=sendrecv
> ------------------------------------------------------------------------
> send 448 bytes to udp/[87.106.69.240]:4060 at
> 17:04:47.774032:
> ------------------------------------------------------------------------
> SIP/2.0 100 Trying
> Via: SIP/2.0/UDP
> 87.106.69.240:4060;branch=z9hG4bK-524287-1---a56eca302b8d6412;rport=4060
> Via: SIP/2.0/TCP
> y.y.y.y:62676;branch=z9hG4bK1P36uFnLdbzHiEzWdVAd0G6nk6kdOdEt;rport=62676;received=y.y.y.y
> From:
> <sip:7777 at uringme>;tag=gz6bNBeAkHM7eAR2eoJG
> To: <sip:7779 at x.x.x.x>
> Call-ID:
> 434d70e1-5cc1-d096-442c-499c8cd600ad
> CSeq: 6437 INVITE
> User-Agent:
> FreeSWITCH-mod_sofia/1.0.head-git-
> Content-Length: 0
>
> ------------------------------------------------------------------------
> 2012-05-21 13:04:47.754843 [NOTICE] switch_channel.c:816 New
> Channel sofia/external/7777 at uringme
> [120f19be-a367-11e1-b22e-57011ca30f08]
> 2012-05-21 13:04:47.754843 [DEBUG] sofia.c:4770 Channel
> sofia/external/7777 at uringme entering state [received][100]
> 2012-05-21 13:04:47.754843 [DEBUG] sofia.c:4781 Remote SDP:
> v=0
> o=- 275367574 1 IN IP4 127.0.0.1
> s=webrtc (chrome 20.0.1127.0) - Doubango Telecom (sipML5
> r000)
> t=0 0
> m=audio 54450 RTP/SAVPF 103 104 0 8 106 105 13 126
> c=IN IP4 y.y.y.y
> a=rtcp:54451 IN IP4 y.y.y.y
> a=candidate:0 1 udp 2130706432 192.168.1.8 50256 typ host
> network_name {D1FD878A-47C6-4B01-B940-ECA38C8D0617} username
> 2C/PMnZyAP2pLbP0 password 0xigYC8ZZibTPCejG5JKwjBN
> generation 0
> a=candidate:0 2 udp 2130706432 192.168.1.8 50257 typ host
> network_name {D1FD878A-47C6-4B01-B940-ECA38C8D0617} username
> 2BPqrxt6Vp+wJNL3 password UEWxx9yByE/JlsmFHa0zkbTs
> generation 0
> a=candidate:0 1 udp 1912602624 y.y.y.y 54450 typ srflx
> network_name {D1FD878A-47C6-4B01-B940-ECA38C8D0617} username
> 2C/PMnZyAP2pLbP0 password 0xigYC8ZZibTPCejG5JKwjBN
> generation 0
> a=candidate:0 2 udp 1912602624 y.y.y.y 54451 typ srflx
> network_name {D1FD878A-47C6-4B01-B940-ECA38C8D0617} username
> 2BPqrxt6Vp+wJNL3 password UEWxx9yByE/JlsmFHa0zkbTs
> generation 0
> a=candidate:0 1 tcp 1694498816 192.168.1.8 62677 typ host
> network_name {D1FD878A-47C6-4B01-B940-ECA38C8D0617} username
> 2C/PMnZyAP2pLbP0 password 0xigYC8ZZibTPCejG5JKwjBN
> generation 0
> a=candidate:0 2 tcp 1694498816 192.168.1.8 62678 typ host
> network_name {D1FD878A-47C6-4B01-B940-ECA38C8D0617} username
> 2BPqrxt6Vp+wJNL3 password UEWxx9yByE/JlsmFHa0zkbTs
> generation 0
> a=mid:audio
> a=rtcp-mux
> a=crypto:0 AES_CM_128_HMAC_SHA1_32
> inline:33ayFPGAoi+nni8kbYZfBO7tH3qI1SaH7ilFU7GT
> a=crypto:1 AES_CM_128_HMAC_SHA1_80
> inline:Hd6rAXtyms1rJgC4OTJk/K4AGpnwLUn9Aqdx1sbd
> a=rtpmap:103 ISAC/16000
> a=rtpmap:104 ISAC/32000
> a=rtpmap:0 PCMU/8000
> a=rtpmap:8 PCMA/8000
> a=rtpmap:106 CN/32000
> a=rtpmap:105 CN/16000
> a=rtpmap:13 CN/8000
> a=rtpmap:126 telephone-event/8000
> a=ssrc:2075114348 cname:vcjaT0z7bAvF1TL3
> a=ssrc:2075114348
> mslabel:TOAV4oLn6QD7CfJieQ90FAEQB06orMEVm2na
> a=ssrc:2075114348
> label:TOAV4oLn6QD7CfJieQ90FAEQB06orMEVm2na0
> m=video 54452 RTP/SAVPF 100 101 102
> c=IN IP4 y.y.y.y
> a=rtcp:54453 IN IP4 y.y.y.y
> a=candidate:0 1 udp 2130706432 192.168.1.8 50258 typ host
> network_name {D1FD878A-47C6-4B01-B940-ECA38C8D0617} username
> PlVs0WI8o1Q05fcc password eakcTlAsBYwpmZvTc58E1thy
> generation 0
> a=candidate:0 2 udp 2130706432 192.168.1.8 50259 typ host
> network_name {D1FD878A-47C6-4B01-B940-ECA38C8D0617} username
> gUagDr7SY/5Jxned password 6J+08YaMdKaer/95B9lfxCEM
> generation 0
> a=candidate:0 1 udp 1912602624 y.y.y.y 54452 typ srflx
> network_name {D1FD878A-47C6-4B01-B940-ECA38C8D0617} username
> PlVs0WI8o1Q05fcc password eakcTlAsBYwpmZvTc58E1thy
> generation 0
> a=candidate:0 2 udp 1912602624 y.y.y.y 54453 typ srflx
> network_name {D1FD878A-47C6-4B01-B940-ECA38C8D0617} username
> gUagDr7SY/5Jxned password 6J+08YaMdKaer/95B9lfxCEM
> generation 0
> a=candidate:0 1 tcp 1694498816 192.168.1.8 62679 typ host
> network_name {D1FD878A-47C6-4B01-B940-ECA38C8D0617} username
> PlVs0WI8o1Q05fcc password eakcTlAsBYwpmZvTc58E1thy
> generation 0
> a=candidate:0 2 tcp 1694498816 192.168.1.8 62680 typ host
> network_name {D1FD878A-47C6-4B01-B940-ECA38C8D0617} username
> gUagDr7SY/5Jxned password 6J+08YaMdKaer/95B9lfxCEM
> generation 0
> a=mid:video
> a=rtcp-mux
> a=crypto:0 AES_CM_128_HMAC_SHA1_80
> inline:RIxXHNE/5GtDfkXnAV4CLXBQGxPzlzBg3Xyg3Lfs
> a=rtpmap:100 VP8/90000
> a=rtpmap:101 red/90000
> a=rtpmap:102 ulpfec/90000
> a=ssrc:2075114348 cname:vcjaT0z7bAvF1TL3
> a=ssrc:2075114348
> mslabel:TOAV4oLn6QD7CfJieQ90FAEQB06orMEVm2na
> a=ssrc:2075114348
> label:TOAV4oLn6QD7CfJieQ90FAEQB06orMEVm2na0
>
> 2012-05-21 13:04:47.754843 [ERR] sofia_glue.c:4478 a=crypto
> in RTP/AVP, refer to rfc3711
> 2012-05-21 13:04:47.754843 [DEBUG] switch_channel.c:2592
> (sofia/external/7777 at uringme) Callstate Change DOWN ->
> HANGUP
> 2012-05-21 13:04:47.754843 [NOTICE] sofia.c:4998 Hangup
> sofia/external/7777 at uringme [CS_NEW]
> [INCOMPATIBLE_DESTINATION]
>
>
>
Join us at ClueCon 2011 Aug 9-11, 2011
More information about the FreeSWITCH-users
mailing list