I wonder why there can be a problem at all. An attended transfer results
in A sending a REFER with Replaces header either to B or C. Then, B or C
(whoever received the REFER) will create a new INVITE request to the
other party.
Maybe this new INVITE request does have the same callid and
nathelper/rtpproxy reuse an old sessions instead of creating a new session.
regards
Klaus
Am 16.07.2010 04:21, schrieb Jijo:
>
> Hi All,
>
> While testing consult transfer with kamilio and rtp proxy, i observed
> that the rtp proxy is not pre-filling caller's address. This is causing
> no media path. The scenario is as described below.
>
> Phone A in private network
> Phone B and C in the public network.
>
> B calls A. A put B on hold and music on hold will be provided by the
> media server to B. Now A Connect to C and Put C on hold with MOH and now
> A and B back in conversation. Now A completes the transfer , So B and C
> suppose to have media path. But no media path.
> When i looked at the trace i observed that, normally if any change in
> the media IP address, then rtpproxy will have a log called "prefilling
> callers IP address" This is missing in this case. Actually rtp proxy is
> still sending to the old address. Actually in this case we tried to
> modify the SDP for same endpoint 3 times. If i don't do media on hold,
> then everything works. This means RTPproxy have some issue if the
> connection IP of SDP has modified multiple times.
>
> I believe this is failing in the code below
>
> writeport:
> if (pidx >= 0) {
> if (ia[0] != NULL && ia[1] != NULL) {
> /*
> * Unless the address provided by client historically
> * cannot be trusted and address is different from one
> * that we recorded update it.
> */
> if (spa->untrusted_addr[pidx] == 0 && !(spa->addr[pidx] != NULL &&
> SA_LEN(ia[0]) == SA_LEN(spa->addr[pidx]) &&
> memcmp(ia[0], spa->addr[pidx], SA_LEN(ia[0])) == 0)) {
> rtpp_log_write(RTPP_LOG_INFO, spa->log, "pre-filling %s's address "
> "with %s:%s", (pidx == 0) ? "callee" : "caller", addr, port);
> if (spa->addr[pidx] != NULL)
> free(spa->addr[pidx]);
> spa->addr[pidx] = ia[0];
> ia[0] = NULL;
> }
>
>
> What is the use of untrusted address?
>
> Please let me know your valuable comment to solve this issue.
>
> Please find the debug traces below.
>
>
> 2010-07-15T20:36:14+0100 [debug] rtpproxy[9019]: (0) received command
> \"UAIE [email protected]
> <mailto:[email protected]> 199.174.112.19
> 32504 1878081229-1279222555597-;1\"
> 2010-07-15T20:36:14+0100 [info] rtpproxy[9019]: (0) new session
> [email protected]
> <mailto:[email protected]>, tag
> 1878081229-1279222555597-;1 requested, type strong
> 2010-07-15T20:36:14+0100 [debug] rtpproxy[9019]: (7) logging call_id:
> [email protected]
> <mailto:[email protected]>
> 2010-07-15T20:36:14+0100 [debug] rtpproxy[9019]: (0) hash_table_append:
> hash([email protected]
> <mailto:[email protected]>) = 233
> 2010-07-15T20:36:14+0100 [info] rtpproxy[9019]: (7) new session on a
> port 32012 created, tag 1878081229-1279222555597-;1
> 2010-07-15T20:36:14+0100 [info] rtpproxy[9019]: (7) pre-filling
> caller\'s address with 199.174.112.19:32504 <http://199.174.112.19:32504>
> 2010-07-15T20:36:14+0100 [debug] rtpproxy[9019]: (0) sending reply
> \"32012 10.234.1.51 \"
>
> 2010-07-15T20:36:16+0100 [debug] rtpproxy[9019]: (0) received command
> \"LEIS [email protected]
> <mailto:[email protected]> 10.234.1.236 5004
> 1878081229-1279222555597-;1 SEC11-6602ea0a-6602ea0a-1-CrI2U0iyBrZH;1\"
> 2010-07-15T20:36:16+0100 [info] rtpproxy[9019]: (7) lookup on ports
> 32012/32012, session timer restarted
> 2010-07-15T20:36:16+0100 [info] rtpproxy[9019]: (7) pre-filling
> callee\'s address with 10.234.1.236:5004 <http://10.234.1.236:5004>
> 2010-07-15T20:36:16+0100 [debug] rtpproxy[9019]: (0) sending reply
> \"32012 65.222.74.99 \"
>
> 2010-07-15T20:36:16+0100 [debug] rtpproxy[9019]: (0) received command
> \"LEIS [email protected]
> <mailto:[email protected]> 10.234.1.236 5004
> 1878081229-1279222555597-;1 SEC11-6602ea0a-6602ea0a-1-CrI2U0iyBrZH;1\"
> 2010-07-15T20:36:16+0100 [info] rtpproxy[9019]: (7) lookup on ports
> 32012/32012, session timer restarted
> 2010-07-15T20:36:16+0100 [debug] rtpproxy[9019]: (0) sending reply
> \"32012 65.222.74.99 \"
>
> 2010-07-15T20:36:21+0100 [debug] rtpproxy[9019]: (0) received command
> \"UAIE [email protected]
> <mailto:[email protected]> 199.174.112.19
> 32504 1878081229-1279222555597-;1 SEC11-6602ea0a-6602ea0a-1-CrI2U0iyBrZH;1\"
> 2010-07-15T20:36:21+0100 [info] rtpproxy[9019]: (7) adding strong flag
> to existing session, new=1/0/0
> 2010-07-15T20:36:21+0100 [info] rtpproxy[9019]: (7) lookup on ports
> 32012/32012, session timer restarted
> 2010-07-15T20:36:21+0100 [debug] rtpproxy[9019]: (0) sending reply
> \"32012 10.234.1.51 \"
> 2010-07-15T20:36:21+0100 [info] rtpproxy[9019]: (7) callee\'s address
> filled in: 10.234.2.95:20170 <http://10.234.2.95:20170> (RTP)
> 2010-07-15T20:36:21+0100 [info] rtpproxy[9019]: (7) guessing RTCP port
> for callee to be 20171
>
> 2010-07-15T20:36:21+0100 [debug] rtpproxy[9019]: (0) received command
> \"LEIS [email protected]
> <mailto:[email protected]> 10.234.2.95 20170
> 1878081229-1279222555597-;1 SEC11-6602ea0a-6602ea0a-1-CrI2U0iyBrZH;1\"
> 2010-07-15T20:36:21+0100 [info] rtpproxy[9019]: (7) lookup on ports
> 32012/32012, session timer restarted
> 2010-07-15T20:36:21+0100 [debug] rtpproxy[9019]: (0) sending reply
> \"32012 65.222.74.99 \"
>
> 2010-07-15T20:36:21+0100 [debug] rtpproxy[9019]: (0) received command
> \"UAIE [email protected]
> <mailto:[email protected]> 199.174.112.19
> 32504 1878081229-1279222555597-;1 SEC11-6602ea0a-6602ea0a-1-CrI2U0iyBrZH;1\"
> 2010-07-15T20:36:21+0100 [info] rtpproxy[9019]: (7) adding strong flag
> to existing session, new=1/0/0
> 2010-07-15T20:36:21+0100 [info] rtpproxy[9019]: (7) lookup on ports
> 32012/32012, session timer restarted
> 2010-07-15T20:36:21+0100 [debug] rtpproxy[9019]: (0) sending reply
> \"32012 10.234.1.51 \"
> 2010-07-15T20:36:21+0100 [info] rtpproxy[9019]: (7) callee\'s address
> filled in: 10.234.1.236:5004 <http://10.234.1.236:5004> (RTP)
> 2010-07-15T20:36:21+0100 [info] rtpproxy[9019]: (7) guessing RTCP port
> for callee to be 5005
>
> 2010-07-15T20:36:21+0100 [debug] rtpproxy[9019]: (0) received command
> \"LEIS [email protected]
> <mailto:[email protected]> 10.234.2.95 20170
> 1878081229-1279222555597-;1 SEC11-6602ea0a-6602ea0a-1-CrI2U0iyBrZH;1\"
> 2010-07-15T20:36:21+0100 [info] rtpproxy[9019]: (7) lookup on ports
> 32012/32012, session timer restarted
> 2010-07-15T20:36:21+0100 [debug] rtpproxy[9019]: (0) sending reply
> \"32012 65.222.74.99 \"
> 2010-07-15T20:36:21+0100 [info] rtpproxy[9019]: (7) callee\'s address
> filled in: 10.234.2.95:20170 <http://10.234.2.95:20170> (RTP)
> 2010-07-15T20:36:24+0100 [info] rtpproxy[9019]: (7) callee\'s address
> filled in: 10.234.1.236:5005 <http://10.234.1.236:5005> (RTCP)
>
> 2010-07-15T20:36:28+0100 [debug] rtpproxy[9019]: (0) received command
> \"UEIS SEC11-6602ea0a-6602ea0a-1-6f2ROxKd7tqv 10.234.1.236 5006
> snl_0o4UU0B1gV;1\"
> 2010-07-15T20:36:28+0100 [info] rtpproxy[9019]: (0) new session
> SEC11-6602ea0a-6602ea0a-1-6f2ROxKd7tqv, tag snl_0o4UU0B1gV;1 requested,
> type strong
> 2010-07-15T20:36:28+0100 [debug] rtpproxy[9019]: (8) logging call_id:
> SEC11-6602ea0a-6602ea0a-1-6f2ROxKd7tqv
> 2010-07-15T20:36:28+0100 [debug] rtpproxy[9019]: (0) hash_table_append:
> hash(SEC11-6602ea0a-6602ea0a-1-6f2ROxKd7tqv) = 33
> 2010-07-15T20:36:28+0100 [info] rtpproxy[9019]: (8) new session on a
> port 32014 created, tag snl_0o4UU0B1gV;1
> 2010-07-15T20:36:28+0100 [info] rtpproxy[9019]: (8) pre-filling
> caller\'s address with 10.234.1.236:5006 <http://10.234.1.236:5006>
> 2010-07-15T20:36:28+0100 [debug] rtpproxy[9019]: (0) sending reply
> \"32014 65.222.74.99 \"
>
> 2010-07-15T20:36:33+0100 [debug] rtpproxy[9019]: (0) received command
> \"LAIE SEC11-6602ea0a-6602ea0a-1-6f2ROxKd7tqv 199.174.112.13 32080
> snl_0o4UU0B1gV;1 1809150064-1279222574336;1\"
> 2010-07-15T20:36:33+0100 [info] rtpproxy[9019]: (8) lookup on ports
> 32014/32014, session timer restarted
> 2010-07-15T20:36:33+0100 [info] rtpproxy[9019]: (8) pre-filling
> callee\'s address with 199.174.112.13:32080 <http://199.174.112.13:32080>
> 2010-07-15T20:36:33+0100 [debug] rtpproxy[9019]: (0) sending reply
> \"32014 10.234.1.51 \"
>
> 2010-07-15T20:36:38+0100 [debug] rtpproxy[9019]: (0) received command
> \"LAIE SEC11-6602ea0a-6602ea0a-1-6f2ROxKd7tqv 199.174.112.13 32080
> snl_0o4UU0B1gV;1 1809150064-1279222574336;1\"
> 2010-07-15T20:36:38+0100 [info] rtpproxy[9019]: (8) lookup on ports
> 32014/32014, session timer restarted
> 2010-07-15T20:36:38+0100 [debug] rtpproxy[9019]: (0) sending reply
> \"32014 10.234.1.51 \"
>
> 2010-07-15T20:36:38+0100 [debug] rtpproxy[9019]: (0) received command
> \"LAIE SEC11-6602ea0a-6602ea0a-1-6f2ROxKd7tqv 199.174.112.13 32080
> snl_0o4UU0B1gV;1 1809150064-1279222574336;1\"
> 2010-07-15T20:36:38+0100 [info] rtpproxy[9019]: (8) lookup on ports
> 32014/32014, session timer restarted
> 2010-07-15T20:36:38+0100 [debug] rtpproxy[9019]: (0) sending reply
> \"32014 10.234.1.51 \"
>
> 2010-07-15T20:36:40+0100 [debug] rtpproxy[9019]: (0) received command
> \"UAIE SEC11-6602ea0a-6602ea0a-1-6f2ROxKd7tqv 199.174.112.13 32080
> 1809150064-1279222574336;1 snl_0o4UU0B1gV;1\"
> 2010-07-15T20:36:40+0100 [info] rtpproxy[9019]: (8) adding strong flag
> to existing session, new=1/0/0
> 2010-07-15T20:36:40+0100 [info] rtpproxy[9019]: (8) lookup on ports
> 32014/32014, session timer restarted
> 2010-07-15T20:36:40+0100 [debug] rtpproxy[9019]: (0) sending reply
> \"32014 10.234.1.51 \"
> 2010-07-15T20:36:40+0100 [info] rtpproxy[9019]: (8) caller\'s address
> filled in: 10.234.2.95:20168 <http://10.234.2.95:20168> (RTP)
> 2010-07-15T20:36:40+0100 [info] rtpproxy[9019]: (8) guessing RTCP port
> for caller to be 20169
>
> 2010-07-15T20:36:41+0100 [debug] rtpproxy[9019]: (0) received command
> \"LEIS SEC11-6602ea0a-6602ea0a-1-6f2ROxKd7tqv 10.234.2.95 20168
> 1809150064-1279222574336;1 snl_0o4UU0B1gV;1\"
> 2010-07-15T20:36:41+0100 [info] rtpproxy[9019]: (8) lookup on ports
> 32014/32014, session timer restarted
> 2010-07-15T20:36:41+0100 [debug] rtpproxy[9019]: (0) sending reply
> \"32014 65.222.74.99 \"
> 2010-07-15T20:36:41+0100 [info] rtpproxy[9019]: (8) caller\'s address
> filled in: 10.234.1.236:5006 <http://10.234.1.236:5006> (RTP)
> 2010-07-15T20:36:41+0100 [info] rtpproxy[9019]: (8) guessing RTCP port
> for caller to be 5007
>
> 2010-07-15T20:36:41+0100 [debug] rtpproxy[9019]: (0) received command
> \"UAIE SEC11-6602ea0a-6602ea0a-1-6f2ROxKd7tqv 199.174.112.13 32080
> 1809150064-1279222574336;1 snl_0o4UU0B1gV;1\"
> 2010-07-15T20:36:41+0100 [info] rtpproxy[9019]: (8) adding strong flag
> to existing session, new=1/0/0
> 2010-07-15T20:36:41+0100 [info] rtpproxy[9019]: (8) lookup on ports
> 32014/32014, session timer restarted
> 2010-07-15T20:36:41+0100 [debug] rtpproxy[9019]: (0) sending reply
> \"32014 10.234.1.51 \"
>
> 2010-07-15T20:36:41+0100 [debug] rtpproxy[9019]: (0) received command
> \"LEIS [email protected]
> <mailto:[email protected]> 10.234.1.236 5004
> 1878081229-1279222555597-;1 SEC11-6602ea0a-6602ea0a-1-CrI2U0iyBrZH;1\"
> 2010-07-15T20:36:41+0100 [info] rtpproxy[9019]: (7) lookup on ports
> 32012/32012, session timer restarted
> 2010-07-15T20:36:41+0100 [debug] rtpproxy[9019]: (0) sending reply
> \"32012 65.222.74.99 \"
>
> 2010-07-15T20:36:41+0100 [debug] rtpproxy[9019]: (0) received command
> \"LEIS SEC11-6602ea0a-6602ea0a-1-6f2ROxKd7tqv 10.234.2.95 20168
> 1809150064-1279222574336;1 snl_0o4UU0B1gV;1\"
> 2010-07-15T20:36:41+0100 [info] rtpproxy[9019]: (8) lookup on ports
> 32014/32014, session timer restarted
> 2010-07-15T20:36:41+0100 [debug] rtpproxy[9019]: (0) sending reply
> \"32014 65.222.74.99 \"
> 2010-07-15T20:36:41+0100 [info] rtpproxy[9019]: (8) caller\'s address
> filled in: 10.234.2.95:20168 <http://10.234.2.95:20168> (RTP)
> 2010-07-15T20:36:41+0100 [info] rtpproxy[9019]: (7) callee\'s address
> filled in: 10.234.1.236:5004 <http://10.234.1.236:5004> (RTP)
>
> 2010-07-15T20:36:42+0100 [debug] rtpproxy[9019]: (0) received command
> \"UAIE [email protected]
> <mailto:[email protected]> 199.174.112.19
> 32504 1878081229-1279222555597-;1 SEC11-6602ea0a-6602ea0a-1-CrI2U0iyBrZH;1\"
> 2010-07-15T20:36:42+0100 [info] rtpproxy[9019]: (7) adding strong flag
> to existing session, new=1/0/0
> 2010-07-15T20:36:42+0100 [info] rtpproxy[9019]: (7) lookup on ports
> 32012/32012, session timer restarted
> 2010-07-15T20:36:42+0100 [debug] rtpproxy[9019]: (0) sending reply
> \"32012 10.234.1.51 \"
>
> 2010-07-15T20:36:42+0100 [debug] rtpproxy[9019]: (0) received command
> \"UAIE [email protected]
> <mailto:[email protected]> 199.174.112.19
> 32504 1878081229-1279222555597-;1 SEC11-6602ea0a-6602ea0a-1-CrI2U0iyBrZH;1\"
> 2010-07-15T20:36:42+0100 [info] rtpproxy[9019]: (7) adding strong flag
> to existing session, new=1/0/0
> 2010-07-15T20:36:42+0100 [info] rtpproxy[9019]: (7) lookup on ports
> 32012/32012, session timer restarted
> 2010-07-15T20:36:42+0100 [debug] rtpproxy[9019]: (0) sending reply
> \"32012 10.234.1.51 \"
> 2010-07-15T20:36:43+0100 [info] rtpproxy[9019]: (8) caller\'s address
> filled in: 10.234.1.236:5007 <http://10.234.1.236:5007> (RTCP)
>
> 2010-07-15T20:36:48+0100 [debug] rtpproxy[9019]: (0) received command
> \"D SEC11-6602ea0a-6602ea0a-1-cRuK6E0f3J8W snl_6cpg71xjqm 1198478112\"
> 2010-07-15T20:36:48+0100 [info] rtpproxy[9019]: (0) delete request
> failed: session SEC11-6602ea0a-6602ea0a-1-cRuK6E0f3J8W, tags
> snl_6cpg71xjqm/1198478112 not found
> 2010-07-15T20:36:48+0100 [debug] rtpproxy[9019]: (0) sending reply \"E8 \"
> 2010-07-15T20:36:48+0100 [debug] rtpproxy[9019]: (0) received command
> \"D e919090d7583a3e0 SEC11-6602ea0a-6602ea0a-1-8y652FWVIvt6 3133a08f1d\"
> 2010-07-15T20:36:48+0100 [info] rtpproxy[9019]: (0) delete request
> failed: session e919090d7583a3e0, tags
> SEC11-6602ea0a-6602ea0a-1-8y652FWVIvt6/3133a08f1d not found
> 2010-07-15T20:36:48+0100 [debug] rtpproxy[9019]: (0) sending reply \"E8 \"
>
> 2010-07-15T20:36:49+0100 [debug] rtpproxy[9019]: (0) received command
> \"UAIE SEC11-6602ea0a-6602ea0a-1-6f2ROxKd7tqv 199.174.112.13 32080
> 1809150064-1279222574336;1 snl_0o4UU0B1gV;1\"
> 2010-07-15T20:36:49+0100 [info] rtpproxy[9019]: (8) adding strong flag
> to existing session, new=1/0/0
> 2010-07-15T20:36:49+0100 [info] rtpproxy[9019]: (8) lookup on ports
> 32014/32014, session timer restarted
> 2010-07-15T20:36:49+0100 [debug] rtpproxy[9019]: (0) sending reply
> \"32014 10.234.1.51 \"
>
> 2010-07-15T20:36:49+0100 [debug] rtpproxy[9019]: (0) received command
> \"LEIS [email protected]
> <mailto:[email protected]> 10.234.1.51 32014
> 1878081229-1279222555597-;1 SEC11-6602ea0a-6602ea0a-1-CrI2U0iyBrZH;1\"
> 2010-07-15T20:36:49+0100 [info] rtpproxy[9019]: (7) lookup on ports
> 32012/32012, session timer restarted
> 2010-07-15T20:36:49+0100 [debug] rtpproxy[9019]: (0) sending reply
> \"32012 65.222.74.99 \"
>
> 2010-07-15T20:36:49+0100 [debug] rtpproxy[9019]: (0) received command
> \"UAIE SEC11-6602ea0a-6602ea0a-1-6f2ROxKd7tqv 199.174.112.13 32080
> 1809150064-1279222574336;1 snl_0o4UU0B1gV;1\"
> 2010-07-15T20:36:49+0100 [info] rtpproxy[9019]: (8) adding strong flag
> to existing session, new=1/0/0
> 2010-07-15T20:36:49+0100 [info] rtpproxy[9019]: (8) lookup on ports
> 32014/32014, session timer restarted
> 2010-07-15T20:36:49+0100 [debug] rtpproxy[9019]: (0) sending reply
> \"32014 10.234.1.51 \"
>
> 2010-07-15T20:36:50+0100 [debug] rtpproxy[9019]: (0) received command
> \"UAIE [email protected]
> <mailto:[email protected]> 199.174.112.19
> 32504 1878081229-1279222555597-;1 SEC11-6602ea0a-6602ea0a-1-CrI2U0iyBrZH;1\"
> 2010-07-15T20:36:50+0100 [info] rtpproxy[9019]: (7) adding strong flag
> to existing session, new=1/0/0
> 2010-07-15T20:36:50+0100 [info] rtpproxy[9019]: (7) lookup on ports
> 32012/32012, session timer restarted
> 2010-07-15T20:36:50+0100 [debug] rtpproxy[9019]: (0) sending reply
> \"32012 10.234.1.51 \"
>
> 2010-07-15T20:36:50+0100 [debug] rtpproxy[9019]: (0) received command
> \"LEIS SEC11-6602ea0a-6602ea0a-1-6f2ROxKd7tqv 10.234.1.51 32012
> 1809150064-1279222574336;1 snl_0o4UU0B1gV;1\"
> 2010-07-15T20:36:50+0100 [info] rtpproxy[9019]: (8) lookup on ports
> 32014/32014, session timer restarted
> 2010-07-15T20:36:50+0100 [debug] rtpproxy[9019]: (0) sending reply
> \"32014 65.222.74.99 \"
>
> 2010-07-15T20:36:50+0100 [debug] rtpproxy[9019]: (0) received command
> \"UAIE [email protected]
> <mailto:[email protected]> 199.174.112.19
> 32504 1878081229-1279222555597-;1 SEC11-6602ea0a-6602ea0a-1-CrI2U0iyBrZH;1\"
> 2010-07-15T20:36:50+0100 [info] rtpproxy[9019]: (7) adding strong flag
> to existing session, new=1/0/0
> 2010-07-15T20:36:50+0100 [info] rtpproxy[9019]: (7) lookup on ports
> 32012/32012, session timer restarted
> 2010-07-15T20:36:50+0100 [debug] rtpproxy[9019]: (0) sending reply
> \"32012 10.234.1.51 \"
>
> 2010-07-15T20:37:20+0100 [debug] rtpproxy[9019]: (0) received command
> \"D [email protected]
> <mailto:[email protected]>
> 1878081229-1279222555597- SEC11-6602ea0a-6602ea0a-1-CrI2U0iyBrZH\"
> 2010-07-15T20:37:20+0100 [info] rtpproxy[9019]: (7) forcefully deleting
> session 1 on ports 32012/32012
> 2010-07-15T20:37:20+0100 [info] rtpproxy[9019]: (7) RTP stats: 1607 in
> from callee, 3158 in from caller, 4765 relayed, 0 dropped
> 2010-07-15T20:37:20+0100 [info] rtpproxy[9019]: (7) RTCP stats: 6 in
> from callee, 0 in from caller, 6 relayed, 0 dropped
> 2010-07-15T20:37:20+0100 [info] rtpproxy[9019]: (7) session on ports
> 32012/32012 is cleaned up
> 2010-07-15T20:37:20+0100 [debug] rtpproxy[9019]: (0) sending reply \"0 \"
> 2010-07-15T20:37:20+0100 [debug] rtpproxy[9019]: (0) received command
> \"D SEC11-6602ea0a-6602ea0a-1-6f2ROxKd7tqv snl_0o4UU0B1gV
> 1809150064-1279222574336\"
> 2010-07-15T20:37:20+0100 [info] rtpproxy[9019]: (8) forcefully deleting
> session 1 on ports 32014/32014
> 2010-07-15T20:37:20+0100 [info] rtpproxy[9019]: (8) RTP stats: 2265 in
> from callee, 743 in from caller, 3008 relayed, 0 dropped
> 2010-07-15T20:37:20+0100 [info] rtpproxy[9019]: (8) RTCP stats: 0 in
> from callee, 3 in from caller, 3 relayed, 0 dropped
> 2010-07-15T20:37:20+0100 [info] rtpproxy[9019]: (8) session on ports
> 32014/32014 is cleaned up
> 2010-07-15T20:37:20+0100 [debug] rtpproxy[9019]: (0) sending reply \"0 \"
> 2010-07-15T20:37:21+0100 [debug] rtpproxy[9019]: (0) received command
> \"D [email protected]
> <mailto:[email protected]>
> 1878081229-1279222555597- SEC11-6602ea0a-6602ea0a-1-CrI2U0iyBrZH\"
> 2010-07-15T20:37:21+0100 [info] rtpproxy[9019]: (0) delete request
> failed: session [email protected]
> <mailto:[email protected]>, tags
> 1878081229-1279222555597-/SEC11-6602ea0a-6602ea0a-1-CrI2U0iyBrZH not found
> 2010-07-15T20:37:21+0100 [debug] rtpproxy[9019]: (0) sending reply \"E8 \"
> 2010-07-15T20:37:21+0100 [debug] rtpproxy[9019]: (0) received command
> \"D SEC11-6602ea0a-6602ea0a-1-6f2ROxKd7tqv snl_0o4UU0B1gV
> 1809150064-1279222574336\"
> 2010-07-15T20:37:21+0100 [info] rtpproxy[9019]: (0) delete request
> failed: session SEC11-6602ea0a-6602ea0a-1-6f2ROxKd7tqv, tags
> snl_0o4UU0B1gV/1809150064-1279222574336 not found
> 2010-07-15T20:37:21+0100 [debug] rtpproxy[9019]: (0) sending reply \"E8 \"
>
>
>
>
>
> _______________________________________________
> Devel mailing list
> [email protected]
> http://lists.rtpproxy.org/mailman/listinfo/devel
_______________________________________________
Devel mailing list
[email protected]
http://lists.rtpproxy.org/mailman/listinfo/devel