ВидеоКонф(ВКС)  ::   FAQ  ::   Поиск  ::   Регистрация  ::   Вход

Sipml5 + Asterisk 11.6 cert

Новичком считается только что прочитавший «Астериск - будущее телефонии»
http://asterisk.ru/knowledgebase/books
и пытающийся сделать большее

Модераторы: april22, Zavr2008

Sipml5 + Asterisk 11.6 cert

Сообщение aleksandr_star » 29 апр 2017, 08:41

Добрый день.

Есть необходимость к Asterisk 11.6-16cert прикрутить WebRTC(Sipml5). Все настройки выполняю как указано в инструкции - https://wiki.asterisk.org/wiki/display/ ... ing+SIPML5. Продукт Web-софтфона скачивал с https://github.com/DoubangoTelecom/sipml5. Веб-сервер для звонилки использую встроенный в Asterisk-е. Проблема заключается в том что при исходящем вызове на эхо-тесть не слышно записи о том что это "режим это теста" + после записи когда проговариваешь что либо нечего не слышно. При использовании команды rtp set debug on видно что есть to, а вот from почему-то нет и после того как включается эхо-тест rtp пакеты пропадают. Звонки совершаю с браузера Fifefox 53.0 (64-бит) на ОС Ubuntu

Лог при включенном sip set debug on
[Показать] Спойлер:
<--- SIP read from WS:192.168.0.108:33706 --->
INVITE sip:1000@192.168.0.10 SIP/2.0
Via: SIP/2.0/WS df7jal23ls0d.invalid;branch=z9hG4bKVvTTbIGDdTiyASO9cdk92o5df5OACoIU;rport
From: "6001"<sip:6001@192.168.0.10>;tag=fS7pkDOhDzX2bsiALVVP
To: <sip:1000@192.168.0.10>
Contact: "6001"<sip:6001@df7jal23ls0d.invalid;rtcweb-breaker=no;click2call=no;transport=ws>;+g.oma.sip-im;language="en,fr"
Call-ID: 296de08e-48fd-0a96-0b70-939613fd5b10
CSeq: 1556 INVITE
Content-Type: application/sdp
Content-Length: 1085
Max-Forwards: 70
User-Agent: IM-client/OMA1.0 sipML5-v1.2016.03.04
Organization: Doubango Telecom

v=0
o=mozilla...THIS_IS_SDPARTA-53.0 5793145816107311000 0 IN IP4 127.0.0.1
s=Doubango Telecom - firefox
t=0 0
a=sendrecv
a=fingerprint:sha-256 8F:1C:DD:40:CF:95:E0:94:4C:D4:F4:FE:31:E6:17:C2:48:CF:8A:CA:7C:1D:D8:11:CB:D9:C8:DC:A5:0A:56:89
a=ice-options:trickle
a=msid-semantic:WMS *
m=audio 41192 UDP/TLS/RTP/SAVPF 109 9 0 8 101
c=IN IP4 192.168.0.108
a=candidate:0 1 UDP 2122252543 192.168.0.108 41192 typ host
a=candidate:0 2 UDP 2122252542 192.168.0.108 51723 typ host
a=sendrecv
a=end-of-candidates
a=extmap:1/sendonly urn:ietf:params:rtp-hdrext:ssrc-audio-level
a=fmtp:109 maxplaybackrate=48000;stereo=1;useinbandfec=1
a=fmtp:101 0-15
a=ice-pwd:cdc8a5f1a740ea3ffe28d8215269c431
a=ice-ufrag:889ff25b
a=mid:sdparta_0
a=msid:{818e03f3-1bd8-4083-8459-152b63d8a660} {4fd5d8cd-8368-45b1-b8eb-1876ecb89ebd}
a=rtcp:51723 IN IP4 192.168.0.108
a=rtcp-mux
a=rtpmap:109 opus/48000/2
a=rtpmap:9 G722/8000/1
a=rtpmap:0 PCMU/8000
a=rtpmap:8 PCMA/8000
a=rtpmap:101 telephone-event/8000
a=setup:actpass
a=ssrc:2701269435 cname:{69bd75a4-ba81-41d0-a834-6c400c65266f}
<------------->
--- (12 headers 30 lines) ---
Using INVITE request as basis request - 296de08e-48fd-0a96-0b70-939613fd5b10
Found peer '6001' for '6001' from 192.168.0.108:33706

<--- Reliably Transmitting (no NAT) to 192.168.0.108:5060 --->
SIP/2.0 401 Unauthorized
Via: SIP/2.0/WS df7jal23ls0d.invalid;branch=z9hG4bKVvTTbIGDdTiyASO9cdk92o5df5OACoIU;rport;received=192.168.0.108
From: "6001"<sip:6001@192.168.0.10>;tag=fS7pkDOhDzX2bsiALVVP
To: <sip:1000@192.168.0.10>;tag=as618b5503
Call-ID: 296de08e-48fd-0a96-0b70-939613fd5b10
CSeq: 1556 INVITE
Server: Asterisk PBX certified/11.6-cert16
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH
Supported: replaces, timer
WWW-Authenticate: Digest algorithm=MD5, realm="192.168.0.10", nonce="6c9017db"
Content-Length: 0


<------------>
Scheduling destruction of SIP dialog '296de08e-48fd-0a96-0b70-939613fd5b10' in 32000 ms (Method: INVITE)

<--- SIP read from WS:192.168.0.108:33706 --->
ACK sip:1000@192.168.0.10 SIP/2.0
Via: SIP/2.0/WS df7jal23ls0d.invalid;branch=z9hG4bKVvTTbIGDdTiyASO9cdk92o5df5OACoIU;rport
From: "6001"<sip:6001@192.168.0.10>;tag=fS7pkDOhDzX2bsiALVVP
To: <sip:1000@192.168.0.10>;tag=as618b5503
Call-ID: 296de08e-48fd-0a96-0b70-939613fd5b10
CSeq: 1556 ACK
Content-Length: 0
Max-Forwards: 70

<------------->
--- (8 headers 0 lines) ---

<--- SIP read from WS:192.168.0.108:33706 --->
INVITE sip:1000@192.168.0.10 SIP/2.0
Via: SIP/2.0/WS df7jal23ls0d.invalid;branch=z9hG4bKCZHZD02090z4LV2aOUZAvnA30CFUn9TZ;rport
From: "6001"<sip:6001@192.168.0.10>;tag=fS7pkDOhDzX2bsiALVVP
To: <sip:1000@192.168.0.10>
Contact: "6001"<sip:6001@df7jal23ls0d.invalid;rtcweb-breaker=no;click2call=no;transport=ws>;+g.oma.sip-im;language="en,fr"
Call-ID: 296de08e-48fd-0a96-0b70-939613fd5b10
CSeq: 1557 INVITE
Content-Type: application/sdp
Content-Length: 1085
Max-Forwards: 70
Authorization: Digest username="6001",realm="192.168.0.10",nonce="6c9017db",uri="sip:1000@192.168.0.10",response="e629d515a58f9fdf3ef98401ca31258e",algorithm=MD5
User-Agent: IM-client/OMA1.0 sipML5-v1.2016.03.04
Organization: Doubango Telecom

v=0
o=mozilla...THIS_IS_SDPARTA-53.0 5793145816107311000 0 IN IP4 127.0.0.1
s=Doubango Telecom - firefox
t=0 0
a=sendrecv
a=fingerprint:sha-256 8F:1C:DD:40:CF:95:E0:94:4C:D4:F4:FE:31:E6:17:C2:48:CF:8A:CA:7C:1D:D8:11:CB:D9:C8:DC:A5:0A:56:89
a=ice-options:trickle
a=msid-semantic:WMS *
m=audio 41192 UDP/TLS/RTP/SAVPF 109 9 0 8 101
c=IN IP4 192.168.0.108
a=candidate:0 1 UDP 2122252543 192.168.0.108 41192 typ host
a=candidate:0 2 UDP 2122252542 192.168.0.108 51723 typ host
a=sendrecv
a=end-of-candidates
a=extmap:1/sendonly urn:ietf:params:rtp-hdrext:ssrc-audio-level
a=fmtp:109 maxplaybackrate=48000;stereo=1;useinbandfec=1
a=fmtp:101 0-15
a=ice-pwd:cdc8a5f1a740ea3ffe28d8215269c431
a=ice-ufrag:889ff25b
a=mid:sdparta_0
a=msid:{818e03f3-1bd8-4083-8459-152b63d8a660} {4fd5d8cd-8368-45b1-b8eb-1876ecb89ebd}
a=rtcp:51723 IN IP4 192.168.0.108
a=rtcp-mux
a=rtpmap:109 opus/48000/2
a=rtpmap:9 G722/8000/1
a=rtpmap:0 PCMU/8000
a=rtpmap:8 PCMA/8000
a=rtpmap:101 telephone-event/8000
a=setup:actpass
a=ssrc:2701269435 cname:{69bd75a4-ba81-41d0-a834-6c400c65266f}
<------------->
--- (13 headers 30 lines) ---
Using INVITE request as basis request - 296de08e-48fd-0a96-0b70-939613fd5b10
Found peer '6001' for '6001' from 192.168.0.108:33706
== Using SIP RTP CoS mark 5
Found RTP audio format 109
Found RTP audio format 9
Found RTP audio format 0
Found RTP audio format 8
Found RTP audio format 101
Found unknown media description format opus for ID 109
Found audio description format G722 for ID 9
Found audio description format PCMU for ID 0
Found audio description format PCMA for ID 8
Found audio description format telephone-event for ID 101
Capabilities: us - (ulaw), peer - audio=(ulaw|alaw|g722)/video=(nothing)/text=(nothing), combined - (ulaw)
Non-codec capabilities (dtmf): us - 0x1 (telephone-event|), peer - 0x1 (telephone-event|), combined - 0x1 (telephone-event|)
Peer audio RTP is at port 192.168.0.108:41192
Looking for 1000 in from-internal (domain 192.168.0.10)
list_route: hop: <sip:6001@df7jal23ls0d.invalid;rtcweb-breaker=no;click2call=no;transport=ws>

<--- Transmitting (no NAT) to 192.168.0.108:5060 --->
SIP/2.0 100 Trying
Via: SIP/2.0/WS df7jal23ls0d.invalid;branch=z9hG4bKCZHZD02090z4LV2aOUZAvnA30CFUn9TZ;rport;received=192.168.0.108
From: "6001"<sip:6001@192.168.0.10>;tag=fS7pkDOhDzX2bsiALVVP
To: <sip:1000@192.168.0.10>
Call-ID: 296de08e-48fd-0a96-0b70-939613fd5b10
CSeq: 1557 INVITE
Server: Asterisk PBX certified/11.6-cert16
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH
Supported: replaces, timer
Contact: <sip:1000@192.168.0.10:5060;transport=WS>
Content-Length: 0


<------------>
-- Executing [1000@from-internal:1] Answer("SIP/6001-00000001", "") in new stack
Audio is at 16108
Adding codec 100003 (ulaw) to SDP
Adding non-codec 0x1 (telephone-event) to SDP

<--- Reliably Transmitting (no NAT) to 192.168.0.108:5060 --->
SIP/2.0 200 OK
Via: SIP/2.0/WS df7jal23ls0d.invalid;branch=z9hG4bKCZHZD02090z4LV2aOUZAvnA30CFUn9TZ;rport;received=192.168.0.108
From: "6001"<sip:6001@192.168.0.10>;tag=fS7pkDOhDzX2bsiALVVP
To: <sip:1000@192.168.0.10>;tag=as4ca44a20
Call-ID: 296de08e-48fd-0a96-0b70-939613fd5b10
CSeq: 1557 INVITE
Server: Asterisk PBX certified/11.6-cert16
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH
Supported: replaces, timer
Contact: <sip:1000@192.168.0.10:5060;transport=WS>
Content-Type: application/sdp
Content-Length: 432

v=0
o=root 1614946769 1614946769 IN IP4 192.168.0.10
s=Asterisk PBX certified/11.6-cert16
c=IN IP4 192.168.0.10
t=0 0
m=audio 16108 RTP/SAVPF 0 101
a=rtpmap:0 PCMU/8000
a=rtpmap:101 telephone-event/8000
a=fmtp:101 0-16
a=silenceSupp:off - - - -
a=ptime:20
a=connection:new
a=setup:active
a=fingerprint:SHA-256 82:24:EE:61:3B:3C:C8:73:5D:CD:F7:DE:F8:D7:76:18:CB:67:06:53:AF:28:BC:62:33:FF:03:31:F3:F0:32:02
a=sendrecv

<------------>

<--- SIP read from WS:192.168.0.108:33706 --->
ACK sip:1000@192.168.0.10:5060;transport=WS SIP/2.0
Via: SIP/2.0/WS df7jal23ls0d.invalid;branch=z9hG4bKTpUCyceZursTWBVgalir;rport
From: "6001"<sip:6001@192.168.0.10>;tag=fS7pkDOhDzX2bsiALVVP
To: <sip:1000@192.168.0.10>;tag=as4ca44a20
Contact: "6001"<sip:6001@df7jal23ls0d.invalid;rtcweb-breaker=no;click2call=no;transport=ws>;+g.oma.sip-im;language="en,fr"
Call-ID: 296de08e-48fd-0a96-0b70-939613fd5b10
CSeq: 1557 ACK
Content-Length: 0
Max-Forwards: 70
Authorization: Digest username="6001",realm="192.168.0.10",nonce="6c9017db",uri="sip:1000@192.168.0.10:5060;transport=WS",response="8fb9b1bce847ba99b57b7a4744917c87",algorithm=MD5
User-Agent: IM-client/OMA1.0 sipML5-v1.2016.03.04
Organization: Doubango Telecom

<------------->
--- (12 headers 0 lines) ---
-- Executing [1000@from-internal:2] Playback("SIP/6001-00000001", "demo-echotest") in new stack
-- <SIP/6001-00000001> Playing 'demo-echotest.ulaw' (language 'en')
ubuntu*CLI>
ubuntu*CLI>
ubuntu*CLI>
ubuntu*CLI>
ubuntu*CLI>
ubuntu*CLI>
ubuntu*CLI>
ubuntu*CLI>
ubuntu*CLI>
ubuntu*CLI>
ubuntu*CLI>
ubuntu*CLI>
ubuntu*CLI>
ubuntu*CLI>
ubuntu*CLI>
ubuntu*CLI>
-- Executing [1000@from-internal:3] Echo("SIP/6001-00000001", "") in new stack
ubuntu*CLI>
ubuntu*CLI>
ubuntu*CLI>

<--- SIP read from WS:192.168.0.108:33706 --->
REGISTER sip:192.168.0.10 SIP/2.0
Via: SIP/2.0/WS df7jal23ls0d.invalid;branch=z9hG4bKTxomR7o68HaIWDGImshNPTr270UJJlrl;rport
From: "6001"<sip:6001@192.168.0.10>;tag=4v5fI9Glv0lhVsVSqO5K
To: "6001"<sip:6001@192.168.0.10>
Contact: "6001"<sip:6001@df7jal23ls0d.invalid;rtcweb-breaker=no;transport=ws>;expires=200;click2call=no;+g.oma.sip-im;+audio;language="en,fr"
Call-ID: 16f4fbd9-5338-72a5-3f2f-677373aa1de0
CSeq: 61301 REGISTER
Content-Length: 0
Max-Forwards: 70
Authorization: Digest username="6001",realm="192.168.0.10",nonce="0d1486ee",uri="sip:192.168.0.10",response="33d94f0680c5940efb26f707269b2411",algorithm=MD5
User-Agent: IM-client/OMA1.0 sipML5-v1.2016.03.04
Organization: Doubango Telecom

<------------->
--- (12 headers 0 lines) ---

<--- Transmitting (no NAT) to 192.168.0.108:5060 --->
SIP/2.0 401 Unauthorized
Via: SIP/2.0/WS df7jal23ls0d.invalid;branch=z9hG4bKTxomR7o68HaIWDGImshNPTr270UJJlrl;rport;received=192.168.0.108
From: "6001"<sip:6001@192.168.0.10>;tag=4v5fI9Glv0lhVsVSqO5K
To: "6001"<sip:6001@192.168.0.10>;tag=as459d4107
Call-ID: 16f4fbd9-5338-72a5-3f2f-677373aa1de0
CSeq: 61301 REGISTER
Server: Asterisk PBX certified/11.6-cert16
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH
Supported: replaces, timer
WWW-Authenticate: Digest algorithm=MD5, realm="192.168.0.10", nonce="03805d1e"
Content-Length: 0


<------------>
Scheduling destruction of SIP dialog '16f4fbd9-5338-72a5-3f2f-677373aa1de0' in 32000 ms (Method: REGISTER)

<--- SIP read from WS:192.168.0.108:33706 --->
REGISTER sip:192.168.0.10 SIP/2.0
Via: SIP/2.0/WS df7jal23ls0d.invalid;branch=z9hG4bKd1lOOWrBIccWC6Lo19b4QxIfVWvA2Mic;rport
From: "6001"<sip:6001@192.168.0.10>;tag=4v5fI9Glv0lhVsVSqO5K
To: "6001"<sip:6001@192.168.0.10>
Contact: "6001"<sip:6001@df7jal23ls0d.invalid;rtcweb-breaker=no;transport=ws>;expires=200;click2call=no;+g.oma.sip-im;+audio;language="en,fr"
Call-ID: 16f4fbd9-5338-72a5-3f2f-677373aa1de0
CSeq: 61302 REGISTER
Content-Length: 0
Max-Forwards: 70
Authorization: Digest username="6001",realm="192.168.0.10",nonce="03805d1e",uri="sip:192.168.0.10",response="7a124a066cfe5fa87c92dad4c31341a6",algorithm=MD5
User-Agent: IM-client/OMA1.0 sipML5-v1.2016.03.04
Organization: Doubango Telecom

<------------->
--- (12 headers 0 lines) ---

<--- Transmitting (no NAT) to 192.168.0.108:5060 --->
SIP/2.0 200 OK
Via: SIP/2.0/WS df7jal23ls0d.invalid;branch=z9hG4bKd1lOOWrBIccWC6Lo19b4QxIfVWvA2Mic;rport;received=192.168.0.108
From: "6001"<sip:6001@192.168.0.10>;tag=4v5fI9Glv0lhVsVSqO5K
To: "6001"<sip:6001@192.168.0.10>;tag=as459d4107
Call-ID: 16f4fbd9-5338-72a5-3f2f-677373aa1de0
CSeq: 61302 REGISTER
Server: Asterisk PBX certified/11.6-cert16
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH
Supported: replaces, timer
Expires: 200
Contact: <sip:6001@df7jal23ls0d.invalid;rtcweb-breaker=no;transport=ws>;expires=200
Date: Sat, 29 Apr 2017 04:28:38 GMT
Content-Length: 0


<------------>
Scheduling destruction of SIP dialog '16f4fbd9-5338-72a5-3f2f-677373aa1de0' in 32000 ms (Method: REGISTER)

<--- SIP read from WS:192.168.0.108:33706 --->
BYE sip:1000@192.168.0.10:5060;transport=WS SIP/2.0
Via: SIP/2.0/WS df7jal23ls0d.invalid;branch=z9hG4bKcy23B2RrbArCP3NnLwD351gqTmDe9Kry;rport
From: "6001"<sip:6001@192.168.0.10>;tag=fS7pkDOhDzX2bsiALVVP
To: <sip:1000@192.168.0.10>;tag=as4ca44a20
Call-ID: 296de08e-48fd-0a96-0b70-939613fd5b10
CSeq: 1558 BYE
Content-Length: 0
Max-Forwards: 70
Accept-Contact: *;+g.oma.sip-im
Accept-Contact: *;language="en,fr"
Authorization: Digest username="6001",realm="192.168.0.10",nonce="6c9017db",uri="sip:1000@192.168.0.10:5060;transport=WS",response="b90871f1e0411088cc2f37bacb39c969",algorithm=MD5
User-Agent: IM-client/OMA1.0 sipML5-v1.2016.03.04
Organization: Doubango Telecom

<------------->
--- (13 headers 0 lines) ---
== Spawn extension (from-internal, 1000, 3) exited non-zero on 'SIP/6001-00000001'
Scheduling destruction of SIP dialog '296de08e-48fd-0a96-0b70-939613fd5b10' in 32000 ms (Method: BYE)

<--- Transmitting (no NAT) to 192.168.0.108:5060 --->
SIP/2.0 200 OK
Via: SIP/2.0/WS df7jal23ls0d.invalid;branch=z9hG4bKcy23B2RrbArCP3NnLwD351gqTmDe9Kry;rport;received=192.168.0.108
From: "6001"<sip:6001@192.168.0.10>;tag=fS7pkDOhDzX2bsiALVVP
To: <sip:1000@192.168.0.10>;tag=as4ca44a20
Call-ID: 296de08e-48fd-0a96-0b70-939613fd5b10
CSeq: 1558 BYE
Server: Asterisk PBX certified/11.6-cert16
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH
Supported: replaces, timer
Content-Length: 0



Лог при включенном rtp set debug on
[Показать] Спойлер:
-- <SIP/6001-00000002> Playing 'demo-echotest.ulaw' (language 'en')
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048352, ts 131200, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048353, ts 131360, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048354, ts 131520, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048355, ts 131680, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048356, ts 131840, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048357, ts 132000, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048358, ts 132160, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048359, ts 132320, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048360, ts 132480, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048361, ts 132640, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048362, ts 132800, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048363, ts 132960, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048364, ts 133120, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048365, ts 133280, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048366, ts 133440, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048367, ts 133600, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048368, ts 133760, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048369, ts 133920, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048370, ts 134080, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048371, ts 134240, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048372, ts 134400, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048373, ts 134560, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048374, ts 134720, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048375, ts 134880, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048376, ts 135040, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048377, ts 135200, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048378, ts 135360, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048379, ts 135520, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048380, ts 135680, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048381, ts 135840, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048382, ts 136000, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048383, ts 136160, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048384, ts 136320, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048385, ts 136480, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048386, ts 136640, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048387, ts 136800, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048388, ts 136960, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048389, ts 137120, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048390, ts 137280, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048391, ts 137440, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048392, ts 137600, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048393, ts 137760, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048394, ts 137920, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048395, ts 138080, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048396, ts 138240, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048397, ts 138400, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048398, ts 138560, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048399, ts 138720, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048400, ts 138880, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048401, ts 139040, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048402, ts 139200, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048403, ts 139360, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048404, ts 139520, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048405, ts 139680, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048406, ts 139840, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048407, ts 140000, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048408, ts 140160, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048409, ts 140320, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048410, ts 140480, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048411, ts 140640, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048412, ts 140800, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048413, ts 140960, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048414, ts 141120, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048415, ts 141280, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048416, ts 141440, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048417, ts 141600, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048418, ts 141760, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048419, ts 141920, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048420, ts 142080, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048421, ts 142240, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048422, ts 142400, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048423, ts 142560, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048424, ts 142720, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048425, ts 142880, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048426, ts 143040, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048427, ts 143200, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048428, ts 143360, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048429, ts 143520, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048430, ts 143680, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048431, ts 143840, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048432, ts 144000, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048433, ts 144160, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048434, ts 144320, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048435, ts 144480, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048436, ts 144640, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048437, ts 144800, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048438, ts 144960, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048439, ts 145120, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048440, ts 145280, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048441, ts 145440, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048442, ts 145600, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048443, ts 145760, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048444, ts 145920, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048445, ts 146080, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048446, ts 146240, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048447, ts 146400, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048448, ts 146560, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048449, ts 146720, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048450, ts 146880, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048451, ts 147040, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048452, ts 147200, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048453, ts 147360, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048454, ts 147520, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048455, ts 147680, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048456, ts 147840, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048457, ts 148000, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048458, ts 148160, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048459, ts 148320, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048460, ts 148480, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048461, ts 148640, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048462, ts 148800, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048463, ts 148960, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048464, ts 149120, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048465, ts 149280, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048466, ts 149440, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048467, ts 149600, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048468, ts 149760, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048469, ts 149920, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048470, ts 150080, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048471, ts 150240, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048472, ts 150400, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048473, ts 150560, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048474, ts 150720, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048475, ts 150880, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048476, ts 151040, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048477, ts 151200, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048478, ts 151360, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048479, ts 151520, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048480, ts 151680, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048481, ts 151840, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048482, ts 152000, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048483, ts 152160, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048484, ts 152320, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048485, ts 152480, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048486, ts 152640, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048487, ts 152800, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048488, ts 152960, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048489, ts 153120, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048490, ts 153280, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048491, ts 153440, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048492, ts 153600, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048493, ts 153760, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048494, ts 153920, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048495, ts 154080, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048496, ts 154240, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048497, ts 154400, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048498, ts 154560, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048499, ts 154720, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048500, ts 154880, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048501, ts 155040, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048502, ts 155200, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048503, ts 155360, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048504, ts 155520, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048505, ts 155680, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048506, ts 155840, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048507, ts 156000, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048508, ts 156160, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048509, ts 156320, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048510, ts 156480, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048511, ts 156640, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048512, ts 156800, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048513, ts 156960, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048514, ts 157120, len 000160)
Sent RTP packet to 192.168.0.108:53890 (type 00, seq 048515, ts 157280, len 000160)
-- Executing [1000@from-internal:3] Echo("SIP/6001-00000002", "") in new stack
ubuntu*CLI>
ubuntu*CLI>
ubuntu*CLI>
ubuntu*CLI>
ubuntu*CLI>


Конфигурационные файлы

sip.conf
Код: выделить все
[general]
udpbindaddr=0.0.0.0:5060
realm=192.168.0.10
transport=udp,ws,wss

[6001]
host=dynamic
secret=k2MuV97
context=from-internal
type=friend
encryption=yes
avpf=yes
force_avp=yes
icesupport=yes
directmedia=no
disallow=all
allow=ulaw
dtlsenable=yes
dtlsverify=fingerprint
dtlscertfile=/etc/asterisk/keys/asterisk.pem
dtlscafile=/etc/asterisk/keys/ca.crt
dtlssetup=actpass
rtcp_mux=yes


rtp.conf
Код: выделить все
[general]
rtpstart=10000
rtpend=20000
icesupport=yes
stunaddr=stun.l.google.com:19302


http.conf
Код: выделить все
[general]
enabled=yes
enablestatic=yes
bindaddr=0.0.0.0
bindport=8088
redirect = / /static/sipml5/call.htm


modules.conf
Код: выделить все
[modules]
autoload=yes
aleksandr_star
 
Сообщений: 17
Зарегистрирован: 24 фев 2015, 14:35

Re: Sipml5 + Asterisk 11.6 cert

Сообщение virus_net » 29 апр 2017, 09:28

проблема скорее всего связана с кодеками.
запретите все и перебирайте по одному. из вашего дебага видно, что использовался ulaw
Код: выделить все
Audio is at 16108
Adding codec 100003 (ulaw) to SDP

в SDP присутствует и alaw попробуйте его

так же надо открыть консоль в браузере и посмотреть нет ли там каких JS ошибок

так же тема WebRTC требует наличия некоего скила, скила как в VoIP так и в JS. Если скила нет, то шансы на успех невелики.
мой SIP URI sip:virus_net@asterisk.ru
bitname.ru - Домены .bit (namecoin) .emc .coin .lib .bazar (emercoin)

ENUMER - звони бесплатно и напрямую.
virus_net
 
Сообщений: 2337
Зарегистрирован: 05 июн 2013, 08:12
Откуда: Москва

Re: Sipml5 + Asterisk 11.6 cert

Сообщение whoim » 02 май 2017, 01:06

As a result it is recommended that you use the latest version of Asterisk (at least 13.15.0 or 14.4.0) and set the 'rtcp_mux' option to yes in either the endpoint entry in sip.conf or pjsip.conf.
облачные и локальные сервера asterisk/freepbx/a2billing/crm с полной техподдержкой. skype: whoim2, sipuri: whoim@asterisk.ru
whoim
 
Сообщений: 766
Зарегистрирован: 26 ноя 2013, 23:25
Откуда: Краснодар

Re: Sipml5 + Asterisk 11.6 cert

Сообщение aleksandr_star » 05 май 2017, 09:37

Спасибо.

Проблему решил.
Заключалась она в том не работал SRTP так как во время выполнения "./configure --with-crypto --with-ssl --with-srtp=/usr/local/lib" функция "checking for srtp_shutdown in -lsrtp... no" была отключена. После установки пакета libsrtp0-dev функция "checking for srtp_shutdown in -lsrtp... yes" стала доступна и звук появился.

Теперь же при установки на рабочий сервер появилась проблема с тем что при выполнении make появляется ошибка которая указана ниже и звука снова нет. Делал все по инструкции которую сам сделал, на новом тестовом сервере все работает если по ней выполнять если же на рабочем то возникает ошибка.
res_srtp.c: In function ‘res_srtp_shutdown’:
res_srtp.c:551:2: warning: implicit declaration of function ‘srtp_shutdown’ [-Wimplicit-function-declaration]
srtp_shutdown();

Может кто знает как ее решить?
aleksandr_star
 
Сообщений: 17
Зарегистрирован: 24 фев 2015, 14:35

Re: Sipml5 + Asterisk 11.6 cert

Сообщение aleksandr_star » 05 май 2017, 09:39

whoim писал(а):As a result it is recommended that you use the latest version of Asterisk (at least 13.15.0 or 14.4.0) and set the 'rtcp_mux' option to yes in either the endpoint entry in sip.conf or pjsip.conf.

Thank you. I still managed to run on Asterisk 11.6
aleksandr_star
 
Сообщений: 17
Зарегистрирован: 24 фев 2015, 14:35

Re: Sipml5 + Asterisk 11.6 cert

Сообщение aleksandr_star » 05 май 2017, 09:40

virus_net писал(а):проблема скорее всего связана с кодеками.
запретите все и перебирайте по одному. из вашего дебага видно, что использовался ulaw
Код: выделить все
Audio is at 16108
Adding codec 100003 (ulaw) to SDP

в SDP присутствует и alaw попробуйте его

так же надо открыть консоль в браузере и посмотреть нет ли там каких JS ошибок

так же тема WebRTC требует наличия некоего скила, скила как в VoIP так и в JS. Если скила нет, то шансы на успех невелики.



Спасибо. Проблема была связана с пакетом SRTP.
aleksandr_star
 
Сообщений: 17
Зарегистрирован: 24 фев 2015, 14:35

Re: Sipml5 + Asterisk 11.6 cert

Сообщение whoim » 06 май 2017, 02:01

aleksandr_star писал(а):Заключалась она в том не работал SRTP так как во время выполнения "./configure --with-crypto --with-ssl --with-srtp=/usr/local/lib" функция "checking for srtp_shutdown in -lsrtp... no" была отключена. После установки пакета libsrtp0-dev функция "checking for srtp_shutdown in -lsrtp... yes" стала доступна и звук появился.


За это - спасибо от нас всех!
облачные и локальные сервера asterisk/freepbx/a2billing/crm с полной техподдержкой. skype: whoim2, sipuri: whoim@asterisk.ru
whoim
 
Сообщений: 766
Зарегистрирован: 26 ноя 2013, 23:25
Откуда: Краснодар

Re: Sipml5 + Asterisk 11.6 cert

Сообщение aleksandr_star » 11 май 2017, 10:09

Проблему res_srtp.c: In function ‘res_srtp_shutdown’:
res_srtp.c:551:2: warning: implicit declaration of function ‘srtp_shutdown’ [-Wimplicit-function-declaration]
srtp_shutdown();

Решил, она была связана с тем что на сервере было установлено два разных пакета srtp и srtp2 которые находятся в папке /usr/local/include. Для решения ее необходимо удалить папки srtp, а так же удалить файл с папки /usr/local/lib/libsrtp* и затем заново установить скаченный пакет с https://github.com/cisco/libsrtp/archive/master.zip.
aleksandr_star
 
Сообщений: 17
Зарегистрирован: 24 фев 2015, 14:35


Вернуться в Вопросы новичков

Кто сейчас на форуме

Сейчас этот форум просматривают: Google [Bot] и гости: 30

© 2008 — 2024 Asterisk.ru
Digium, Asterisk and AsteriskNOW are registered trademarks of Digium, Inc.
Design and development by PostMet-Netzwerk GmbH