There is a sip server which is doing the call control. Kamilio just act as a
proxy. So refer is handled by the sip server. Everything work if no media on
hold enabled for subscribers in sip server.
 Basically when we turn on the media on hold, then the SDP will be modified
with media server's IP and rtp proxy's apply it correctly. We can listen to
media on hold when party A alternate between B and C. Finally when we do the
complete transfer, the RTP proxy is not prefilling the modified ip of  Party
B's RTP proxy IP or vice versa. RTP proxy is sending the packet to old IP,
which is media server's IP. So i believe if we modify the connection IP in
SDP multiple times, then rtp proxy is not applying it correctly.

What is the use of untrusted IP address (spa->untrusted_addr[pidx])?/

Thanks
Jijo


On Fri, Jul 16, 2010 at 2:59 AM, Klaus Darilion <
[email protected]> wrote:

> I wonder why there can be a problem at all. An attended transfer results in
> A sending a REFER with Replaces header either to B or C. Then, B or C
> (whoever received the REFER) will create a new INVITE request to the other
> party.
>
> Maybe this new INVITE request does have the same callid and
> nathelper/rtpproxy reuse an old sessions instead of creating a new session.
>
> regards
> Klaus
>
> Am 16.07.2010 04:21, schrieb Jijo:
>
>>
>> Hi All,
>>
>> While testing consult transfer with kamilio and rtp proxy, i observed
>> that the rtp proxy is not pre-filling caller's address. This is causing
>> no media path. The scenario is as described below.
>>
>> Phone A in private network
>> Phone B and C in the public network.
>>
>> B calls A. A put B on hold and music on hold will be provided by the
>> media server to B. Now A Connect to C and Put C on hold with MOH and now
>> A and B back in conversation. Now A completes the transfer , So B and C
>> suppose to have media path. But no media path.
>> When i looked at the trace i observed that, normally if any change in
>> the media IP address, then rtpproxy will have a log called "prefilling
>> callers IP address" This is missing in this case. Actually rtp proxy is
>> still sending to the old address. Actually in this case we tried to
>> modify the SDP for same endpoint 3 times. If i don't do media on hold,
>> then everything works. This means RTPproxy have some issue if the
>> connection IP of SDP has modified multiple times.
>>
>> I believe this is failing in the code below
>>
>> writeport:
>>     if (pidx >= 0) {
>> if (ia[0] != NULL && ia[1] != NULL) {
>>    /*
>>     * Unless the address provided by client historically
>>     * cannot be trusted and address is different from one
>>     * that we recorded update it.
>>     */
>>    if (spa->untrusted_addr[pidx] == 0 && !(spa->addr[pidx] != NULL &&
>>      SA_LEN(ia[0]) == SA_LEN(spa->addr[pidx]) &&
>>      memcmp(ia[0], spa->addr[pidx], SA_LEN(ia[0])) == 0)) {
>> rtpp_log_write(RTPP_LOG_INFO, spa->log, "pre-filling %s's address "
>> "with %s:%s", (pidx == 0) ? "callee" : "caller", addr, port);
>> if (spa->addr[pidx] != NULL)
>>    free(spa->addr[pidx]);
>> spa->addr[pidx] = ia[0];
>> ia[0] = NULL;
>>    }
>>
>>
>> What is the use of untrusted address?
>>
>> Please let me know your valuable comment to solve this issue.
>>
>> Please find the debug traces below.
>>
>>
>> 2010-07-15T20:36:14+0100 [debug] rtpproxy[9019]: (0) received command
>> \"UAIE [email protected]
>> <mailto:[email protected]> 199.174.112.19
>>
>> 32504 1878081229-1279222555597-;1\"
>> 2010-07-15T20:36:14+0100 [info] rtpproxy[9019]: (0) new session
>> [email protected]
>> <mailto:[email protected]>, tag
>>
>> 1878081229-1279222555597-;1 requested, type strong
>> 2010-07-15T20:36:14+0100 [debug] rtpproxy[9019]: (7) logging call_id:
>> [email protected]
>> <mailto:[email protected]>
>>
>> 2010-07-15T20:36:14+0100 [debug] rtpproxy[9019]: (0) hash_table_append:
>> hash([email protected]
>> <mailto:[email protected]>) = 233
>>
>> 2010-07-15T20:36:14+0100 [info] rtpproxy[9019]: (7) new session on a
>> port 32012 created, tag 1878081229-1279222555597-;1
>> 2010-07-15T20:36:14+0100 [info] rtpproxy[9019]: (7) pre-filling
>> caller\'s address with 199.174.112.19:32504 <http://199.174.112.19:32504>
>>
>> 2010-07-15T20:36:14+0100 [debug] rtpproxy[9019]: (0) sending reply
>> \"32012 10.234.1.51 \"
>>
>> 2010-07-15T20:36:16+0100 [debug] rtpproxy[9019]: (0) received command
>> \"LEIS [email protected]
>> <mailto:[email protected]> 10.234.1.236 5004
>>
>> 1878081229-1279222555597-;1 SEC11-6602ea0a-6602ea0a-1-CrI2U0iyBrZH;1\"
>> 2010-07-15T20:36:16+0100 [info] rtpproxy[9019]: (7) lookup on ports
>> 32012/32012, session timer restarted
>> 2010-07-15T20:36:16+0100 [info] rtpproxy[9019]: (7) pre-filling
>> callee\'s address with 10.234.1.236:5004 <http://10.234.1.236:5004>
>>
>> 2010-07-15T20:36:16+0100 [debug] rtpproxy[9019]: (0) sending reply
>> \"32012 65.222.74.99 \"
>>
>> 2010-07-15T20:36:16+0100 [debug] rtpproxy[9019]: (0) received command
>> \"LEIS [email protected]
>> <mailto:[email protected]> 10.234.1.236 5004
>>
>> 1878081229-1279222555597-;1 SEC11-6602ea0a-6602ea0a-1-CrI2U0iyBrZH;1\"
>> 2010-07-15T20:36:16+0100 [info] rtpproxy[9019]: (7) lookup on ports
>> 32012/32012, session timer restarted
>> 2010-07-15T20:36:16+0100 [debug] rtpproxy[9019]: (0) sending reply
>> \"32012 65.222.74.99 \"
>>
>> 2010-07-15T20:36:21+0100 [debug] rtpproxy[9019]: (0) received command
>> \"UAIE [email protected]
>> <mailto:[email protected]> 199.174.112.19
>>
>> 32504 1878081229-1279222555597-;1
>> SEC11-6602ea0a-6602ea0a-1-CrI2U0iyBrZH;1\"
>> 2010-07-15T20:36:21+0100 [info] rtpproxy[9019]: (7) adding strong flag
>> to existing session, new=1/0/0
>> 2010-07-15T20:36:21+0100 [info] rtpproxy[9019]: (7) lookup on ports
>> 32012/32012, session timer restarted
>> 2010-07-15T20:36:21+0100 [debug] rtpproxy[9019]: (0) sending reply
>> \"32012 10.234.1.51 \"
>> 2010-07-15T20:36:21+0100 [info] rtpproxy[9019]: (7) callee\'s address
>> filled in: 10.234.2.95:20170 <http://10.234.2.95:20170> (RTP)
>>
>> 2010-07-15T20:36:21+0100 [info] rtpproxy[9019]: (7) guessing RTCP port
>> for callee to be 20171
>>
>> 2010-07-15T20:36:21+0100 [debug] rtpproxy[9019]: (0) received command
>> \"LEIS [email protected]
>> <mailto:[email protected]> 10.234.2.95 20170
>>
>> 1878081229-1279222555597-;1 SEC11-6602ea0a-6602ea0a-1-CrI2U0iyBrZH;1\"
>> 2010-07-15T20:36:21+0100 [info] rtpproxy[9019]: (7) lookup on ports
>> 32012/32012, session timer restarted
>> 2010-07-15T20:36:21+0100 [debug] rtpproxy[9019]: (0) sending reply
>> \"32012 65.222.74.99 \"
>>
>> 2010-07-15T20:36:21+0100 [debug] rtpproxy[9019]: (0) received command
>> \"UAIE [email protected]
>> <mailto:[email protected]> 199.174.112.19
>>
>> 32504 1878081229-1279222555597-;1
>> SEC11-6602ea0a-6602ea0a-1-CrI2U0iyBrZH;1\"
>> 2010-07-15T20:36:21+0100 [info] rtpproxy[9019]: (7) adding strong flag
>> to existing session, new=1/0/0
>> 2010-07-15T20:36:21+0100 [info] rtpproxy[9019]: (7) lookup on ports
>> 32012/32012, session timer restarted
>> 2010-07-15T20:36:21+0100 [debug] rtpproxy[9019]: (0) sending reply
>> \"32012 10.234.1.51 \"
>> 2010-07-15T20:36:21+0100 [info] rtpproxy[9019]: (7) callee\'s address
>> filled in: 10.234.1.236:5004 <http://10.234.1.236:5004> (RTP)
>>
>> 2010-07-15T20:36:21+0100 [info] rtpproxy[9019]: (7) guessing RTCP port
>> for callee to be 5005
>>
>> 2010-07-15T20:36:21+0100 [debug] rtpproxy[9019]: (0) received command
>> \"LEIS [email protected]
>> <mailto:[email protected]> 10.234.2.95 20170
>>
>> 1878081229-1279222555597-;1 SEC11-6602ea0a-6602ea0a-1-CrI2U0iyBrZH;1\"
>> 2010-07-15T20:36:21+0100 [info] rtpproxy[9019]: (7) lookup on ports
>> 32012/32012, session timer restarted
>> 2010-07-15T20:36:21+0100 [debug] rtpproxy[9019]: (0) sending reply
>> \"32012 65.222.74.99 \"
>> 2010-07-15T20:36:21+0100 [info] rtpproxy[9019]: (7) callee\'s address
>> filled in: 10.234.2.95:20170 <http://10.234.2.95:20170> (RTP)
>>
>> 2010-07-15T20:36:24+0100 [info] rtpproxy[9019]: (7) callee\'s address
>> filled in: 10.234.1.236:5005 <http://10.234.1.236:5005> (RTCP)
>>
>>
>> 2010-07-15T20:36:28+0100 [debug] rtpproxy[9019]: (0) received command
>> \"UEIS SEC11-6602ea0a-6602ea0a-1-6f2ROxKd7tqv 10.234.1.236 5006
>> snl_0o4UU0B1gV;1\"
>> 2010-07-15T20:36:28+0100 [info] rtpproxy[9019]: (0) new session
>> SEC11-6602ea0a-6602ea0a-1-6f2ROxKd7tqv, tag snl_0o4UU0B1gV;1 requested,
>> type strong
>> 2010-07-15T20:36:28+0100 [debug] rtpproxy[9019]: (8) logging call_id:
>> SEC11-6602ea0a-6602ea0a-1-6f2ROxKd7tqv
>> 2010-07-15T20:36:28+0100 [debug] rtpproxy[9019]: (0) hash_table_append:
>> hash(SEC11-6602ea0a-6602ea0a-1-6f2ROxKd7tqv) = 33
>> 2010-07-15T20:36:28+0100 [info] rtpproxy[9019]: (8) new session on a
>> port 32014 created, tag snl_0o4UU0B1gV;1
>> 2010-07-15T20:36:28+0100 [info] rtpproxy[9019]: (8) pre-filling
>> caller\'s address with 10.234.1.236:5006 <http://10.234.1.236:5006>
>>
>> 2010-07-15T20:36:28+0100 [debug] rtpproxy[9019]: (0) sending reply
>> \"32014 65.222.74.99 \"
>>
>> 2010-07-15T20:36:33+0100 [debug] rtpproxy[9019]: (0) received command
>> \"LAIE SEC11-6602ea0a-6602ea0a-1-6f2ROxKd7tqv 199.174.112.13 32080
>> snl_0o4UU0B1gV;1 1809150064-1279222574336;1\"
>> 2010-07-15T20:36:33+0100 [info] rtpproxy[9019]: (8) lookup on ports
>> 32014/32014, session timer restarted
>> 2010-07-15T20:36:33+0100 [info] rtpproxy[9019]: (8) pre-filling
>> callee\'s address with 199.174.112.13:32080 <http://199.174.112.13:32080>
>>
>> 2010-07-15T20:36:33+0100 [debug] rtpproxy[9019]: (0) sending reply
>> \"32014 10.234.1.51 \"
>>
>> 2010-07-15T20:36:38+0100 [debug] rtpproxy[9019]: (0) received command
>> \"LAIE SEC11-6602ea0a-6602ea0a-1-6f2ROxKd7tqv 199.174.112.13 32080
>> snl_0o4UU0B1gV;1 1809150064-1279222574336;1\"
>> 2010-07-15T20:36:38+0100 [info] rtpproxy[9019]: (8) lookup on ports
>> 32014/32014, session timer restarted
>> 2010-07-15T20:36:38+0100 [debug] rtpproxy[9019]: (0) sending reply
>> \"32014 10.234.1.51 \"
>>
>> 2010-07-15T20:36:38+0100 [debug] rtpproxy[9019]: (0) received command
>> \"LAIE SEC11-6602ea0a-6602ea0a-1-6f2ROxKd7tqv 199.174.112.13 32080
>> snl_0o4UU0B1gV;1 1809150064-1279222574336;1\"
>> 2010-07-15T20:36:38+0100 [info] rtpproxy[9019]: (8) lookup on ports
>> 32014/32014, session timer restarted
>> 2010-07-15T20:36:38+0100 [debug] rtpproxy[9019]: (0) sending reply
>> \"32014 10.234.1.51 \"
>>
>> 2010-07-15T20:36:40+0100 [debug] rtpproxy[9019]: (0) received command
>> \"UAIE SEC11-6602ea0a-6602ea0a-1-6f2ROxKd7tqv 199.174.112.13 32080
>> 1809150064-1279222574336;1 snl_0o4UU0B1gV;1\"
>> 2010-07-15T20:36:40+0100 [info] rtpproxy[9019]: (8) adding strong flag
>> to existing session, new=1/0/0
>> 2010-07-15T20:36:40+0100 [info] rtpproxy[9019]: (8) lookup on ports
>> 32014/32014, session timer restarted
>> 2010-07-15T20:36:40+0100 [debug] rtpproxy[9019]: (0) sending reply
>> \"32014 10.234.1.51 \"
>> 2010-07-15T20:36:40+0100 [info] rtpproxy[9019]: (8) caller\'s address
>> filled in: 10.234.2.95:20168 <http://10.234.2.95:20168> (RTP)
>>
>> 2010-07-15T20:36:40+0100 [info] rtpproxy[9019]: (8) guessing RTCP port
>> for caller to be 20169
>>
>> 2010-07-15T20:36:41+0100 [debug] rtpproxy[9019]: (0) received command
>> \"LEIS SEC11-6602ea0a-6602ea0a-1-6f2ROxKd7tqv 10.234.2.95 20168
>> 1809150064-1279222574336;1 snl_0o4UU0B1gV;1\"
>> 2010-07-15T20:36:41+0100 [info] rtpproxy[9019]: (8) lookup on ports
>> 32014/32014, session timer restarted
>> 2010-07-15T20:36:41+0100 [debug] rtpproxy[9019]: (0) sending reply
>> \"32014 65.222.74.99 \"
>> 2010-07-15T20:36:41+0100 [info] rtpproxy[9019]: (8) caller\'s address
>> filled in: 10.234.1.236:5006 <http://10.234.1.236:5006> (RTP)
>>
>> 2010-07-15T20:36:41+0100 [info] rtpproxy[9019]: (8) guessing RTCP port
>> for caller to be 5007
>>
>> 2010-07-15T20:36:41+0100 [debug] rtpproxy[9019]: (0) received command
>> \"UAIE SEC11-6602ea0a-6602ea0a-1-6f2ROxKd7tqv 199.174.112.13 32080
>> 1809150064-1279222574336;1 snl_0o4UU0B1gV;1\"
>> 2010-07-15T20:36:41+0100 [info] rtpproxy[9019]: (8) adding strong flag
>> to existing session, new=1/0/0
>> 2010-07-15T20:36:41+0100 [info] rtpproxy[9019]: (8) lookup on ports
>> 32014/32014, session timer restarted
>> 2010-07-15T20:36:41+0100 [debug] rtpproxy[9019]: (0) sending reply
>> \"32014 10.234.1.51 \"
>>
>> 2010-07-15T20:36:41+0100 [debug] rtpproxy[9019]: (0) received command
>> \"LEIS [email protected]
>> <mailto:[email protected]> 10.234.1.236 5004
>>
>> 1878081229-1279222555597-;1 SEC11-6602ea0a-6602ea0a-1-CrI2U0iyBrZH;1\"
>> 2010-07-15T20:36:41+0100 [info] rtpproxy[9019]: (7) lookup on ports
>> 32012/32012, session timer restarted
>> 2010-07-15T20:36:41+0100 [debug] rtpproxy[9019]: (0) sending reply
>> \"32012 65.222.74.99 \"
>>
>> 2010-07-15T20:36:41+0100 [debug] rtpproxy[9019]: (0) received command
>> \"LEIS SEC11-6602ea0a-6602ea0a-1-6f2ROxKd7tqv 10.234.2.95 20168
>> 1809150064-1279222574336;1 snl_0o4UU0B1gV;1\"
>> 2010-07-15T20:36:41+0100 [info] rtpproxy[9019]: (8) lookup on ports
>> 32014/32014, session timer restarted
>> 2010-07-15T20:36:41+0100 [debug] rtpproxy[9019]: (0) sending reply
>> \"32014 65.222.74.99 \"
>> 2010-07-15T20:36:41+0100 [info] rtpproxy[9019]: (8) caller\'s address
>> filled in: 10.234.2.95:20168 <http://10.234.2.95:20168> (RTP)
>>
>> 2010-07-15T20:36:41+0100 [info] rtpproxy[9019]: (7) callee\'s address
>> filled in: 10.234.1.236:5004 <http://10.234.1.236:5004> (RTP)
>>
>>
>> 2010-07-15T20:36:42+0100 [debug] rtpproxy[9019]: (0) received command
>> \"UAIE [email protected]
>> <mailto:[email protected]> 199.174.112.19
>>
>> 32504 1878081229-1279222555597-;1
>> SEC11-6602ea0a-6602ea0a-1-CrI2U0iyBrZH;1\"
>> 2010-07-15T20:36:42+0100 [info] rtpproxy[9019]: (7) adding strong flag
>> to existing session, new=1/0/0
>> 2010-07-15T20:36:42+0100 [info] rtpproxy[9019]: (7) lookup on ports
>> 32012/32012, session timer restarted
>> 2010-07-15T20:36:42+0100 [debug] rtpproxy[9019]: (0) sending reply
>> \"32012 10.234.1.51 \"
>>
>> 2010-07-15T20:36:42+0100 [debug] rtpproxy[9019]: (0) received command
>> \"UAIE [email protected]
>> <mailto:[email protected]> 199.174.112.19
>>
>> 32504 1878081229-1279222555597-;1
>> SEC11-6602ea0a-6602ea0a-1-CrI2U0iyBrZH;1\"
>> 2010-07-15T20:36:42+0100 [info] rtpproxy[9019]: (7) adding strong flag
>> to existing session, new=1/0/0
>> 2010-07-15T20:36:42+0100 [info] rtpproxy[9019]: (7) lookup on ports
>> 32012/32012, session timer restarted
>> 2010-07-15T20:36:42+0100 [debug] rtpproxy[9019]: (0) sending reply
>> \"32012 10.234.1.51 \"
>> 2010-07-15T20:36:43+0100 [info] rtpproxy[9019]: (8) caller\'s address
>> filled in: 10.234.1.236:5007 <http://10.234.1.236:5007> (RTCP)
>>
>>
>> 2010-07-15T20:36:48+0100 [debug] rtpproxy[9019]: (0) received command
>> \"D SEC11-6602ea0a-6602ea0a-1-cRuK6E0f3J8W snl_6cpg71xjqm 1198478112\"
>> 2010-07-15T20:36:48+0100 [info] rtpproxy[9019]: (0) delete request
>> failed: session SEC11-6602ea0a-6602ea0a-1-cRuK6E0f3J8W, tags
>> snl_6cpg71xjqm/1198478112 not found
>> 2010-07-15T20:36:48+0100 [debug] rtpproxy[9019]: (0) sending reply \"E8 \"
>> 2010-07-15T20:36:48+0100 [debug] rtpproxy[9019]: (0) received command
>> \"D e919090d7583a3e0 SEC11-6602ea0a-6602ea0a-1-8y652FWVIvt6 3133a08f1d\"
>> 2010-07-15T20:36:48+0100 [info] rtpproxy[9019]: (0) delete request
>> failed: session e919090d7583a3e0, tags
>> SEC11-6602ea0a-6602ea0a-1-8y652FWVIvt6/3133a08f1d not found
>> 2010-07-15T20:36:48+0100 [debug] rtpproxy[9019]: (0) sending reply \"E8 \"
>>
>> 2010-07-15T20:36:49+0100 [debug] rtpproxy[9019]: (0) received command
>> \"UAIE SEC11-6602ea0a-6602ea0a-1-6f2ROxKd7tqv 199.174.112.13 32080
>> 1809150064-1279222574336;1 snl_0o4UU0B1gV;1\"
>> 2010-07-15T20:36:49+0100 [info] rtpproxy[9019]: (8) adding strong flag
>> to existing session, new=1/0/0
>> 2010-07-15T20:36:49+0100 [info] rtpproxy[9019]: (8) lookup on ports
>> 32014/32014, session timer restarted
>> 2010-07-15T20:36:49+0100 [debug] rtpproxy[9019]: (0) sending reply
>> \"32014 10.234.1.51 \"
>>
>> 2010-07-15T20:36:49+0100 [debug] rtpproxy[9019]: (0) received command
>> \"LEIS [email protected]
>> <mailto:[email protected]> 10.234.1.51 32014
>>
>> 1878081229-1279222555597-;1 SEC11-6602ea0a-6602ea0a-1-CrI2U0iyBrZH;1\"
>> 2010-07-15T20:36:49+0100 [info] rtpproxy[9019]: (7) lookup on ports
>> 32012/32012, session timer restarted
>> 2010-07-15T20:36:49+0100 [debug] rtpproxy[9019]: (0) sending reply
>> \"32012 65.222.74.99 \"
>>
>> 2010-07-15T20:36:49+0100 [debug] rtpproxy[9019]: (0) received command
>> \"UAIE SEC11-6602ea0a-6602ea0a-1-6f2ROxKd7tqv 199.174.112.13 32080
>> 1809150064-1279222574336;1 snl_0o4UU0B1gV;1\"
>> 2010-07-15T20:36:49+0100 [info] rtpproxy[9019]: (8) adding strong flag
>> to existing session, new=1/0/0
>> 2010-07-15T20:36:49+0100 [info] rtpproxy[9019]: (8) lookup on ports
>> 32014/32014, session timer restarted
>> 2010-07-15T20:36:49+0100 [debug] rtpproxy[9019]: (0) sending reply
>> \"32014 10.234.1.51 \"
>>
>> 2010-07-15T20:36:50+0100 [debug] rtpproxy[9019]: (0) received command
>> \"UAIE [email protected]
>> <mailto:[email protected]> 199.174.112.19
>>
>> 32504 1878081229-1279222555597-;1
>> SEC11-6602ea0a-6602ea0a-1-CrI2U0iyBrZH;1\"
>> 2010-07-15T20:36:50+0100 [info] rtpproxy[9019]: (7) adding strong flag
>> to existing session, new=1/0/0
>> 2010-07-15T20:36:50+0100 [info] rtpproxy[9019]: (7) lookup on ports
>> 32012/32012, session timer restarted
>> 2010-07-15T20:36:50+0100 [debug] rtpproxy[9019]: (0) sending reply
>> \"32012 10.234.1.51 \"
>>
>> 2010-07-15T20:36:50+0100 [debug] rtpproxy[9019]: (0) received command
>> \"LEIS SEC11-6602ea0a-6602ea0a-1-6f2ROxKd7tqv 10.234.1.51 32012
>> 1809150064-1279222574336;1 snl_0o4UU0B1gV;1\"
>> 2010-07-15T20:36:50+0100 [info] rtpproxy[9019]: (8) lookup on ports
>> 32014/32014, session timer restarted
>> 2010-07-15T20:36:50+0100 [debug] rtpproxy[9019]: (0) sending reply
>> \"32014 65.222.74.99 \"
>>
>> 2010-07-15T20:36:50+0100 [debug] rtpproxy[9019]: (0) received command
>> \"UAIE [email protected]
>> <mailto:[email protected]> 199.174.112.19
>>
>> 32504 1878081229-1279222555597-;1
>> SEC11-6602ea0a-6602ea0a-1-CrI2U0iyBrZH;1\"
>> 2010-07-15T20:36:50+0100 [info] rtpproxy[9019]: (7) adding strong flag
>> to existing session, new=1/0/0
>> 2010-07-15T20:36:50+0100 [info] rtpproxy[9019]: (7) lookup on ports
>> 32012/32012, session timer restarted
>> 2010-07-15T20:36:50+0100 [debug] rtpproxy[9019]: (0) sending reply
>> \"32012 10.234.1.51 \"
>>
>> 2010-07-15T20:37:20+0100 [debug] rtpproxy[9019]: (0) received command
>> \"D [email protected]
>> <mailto:[email protected]>
>>
>> 1878081229-1279222555597- SEC11-6602ea0a-6602ea0a-1-CrI2U0iyBrZH\"
>> 2010-07-15T20:37:20+0100 [info] rtpproxy[9019]: (7) forcefully deleting
>> session 1 on ports 32012/32012
>> 2010-07-15T20:37:20+0100 [info] rtpproxy[9019]: (7) RTP stats: 1607 in
>> from callee, 3158 in from caller, 4765 relayed, 0 dropped
>> 2010-07-15T20:37:20+0100 [info] rtpproxy[9019]: (7) RTCP stats: 6 in
>> from callee, 0 in from caller, 6 relayed, 0 dropped
>> 2010-07-15T20:37:20+0100 [info] rtpproxy[9019]: (7) session on ports
>> 32012/32012 is cleaned up
>> 2010-07-15T20:37:20+0100 [debug] rtpproxy[9019]: (0) sending reply \"0 \"
>> 2010-07-15T20:37:20+0100 [debug] rtpproxy[9019]: (0) received command
>> \"D SEC11-6602ea0a-6602ea0a-1-6f2ROxKd7tqv snl_0o4UU0B1gV
>> 1809150064-1279222574336\"
>> 2010-07-15T20:37:20+0100 [info] rtpproxy[9019]: (8) forcefully deleting
>> session 1 on ports 32014/32014
>> 2010-07-15T20:37:20+0100 [info] rtpproxy[9019]: (8) RTP stats: 2265 in
>> from callee, 743 in from caller, 3008 relayed, 0 dropped
>> 2010-07-15T20:37:20+0100 [info] rtpproxy[9019]: (8) RTCP stats: 0 in
>> from callee, 3 in from caller, 3 relayed, 0 dropped
>> 2010-07-15T20:37:20+0100 [info] rtpproxy[9019]: (8) session on ports
>> 32014/32014 is cleaned up
>> 2010-07-15T20:37:20+0100 [debug] rtpproxy[9019]: (0) sending reply \"0 \"
>> 2010-07-15T20:37:21+0100 [debug] rtpproxy[9019]: (0) received command
>> \"D [email protected]
>> <mailto:[email protected]>
>>
>> 1878081229-1279222555597- SEC11-6602ea0a-6602ea0a-1-CrI2U0iyBrZH\"
>> 2010-07-15T20:37:21+0100 [info] rtpproxy[9019]: (0) delete request
>> failed: session [email protected]
>> <mailto:[email protected]>, tags
>>
>> 1878081229-1279222555597-/SEC11-6602ea0a-6602ea0a-1-CrI2U0iyBrZH not found
>> 2010-07-15T20:37:21+0100 [debug] rtpproxy[9019]: (0) sending reply \"E8 \"
>> 2010-07-15T20:37:21+0100 [debug] rtpproxy[9019]: (0) received command
>> \"D SEC11-6602ea0a-6602ea0a-1-6f2ROxKd7tqv snl_0o4UU0B1gV
>> 1809150064-1279222574336\"
>> 2010-07-15T20:37:21+0100 [info] rtpproxy[9019]: (0) delete request
>> failed: session SEC11-6602ea0a-6602ea0a-1-6f2ROxKd7tqv, tags
>> snl_0o4UU0B1gV/1809150064-1279222574336 not found
>> 2010-07-15T20:37:21+0100 [debug] rtpproxy[9019]: (0) sending reply \"E8 \"
>>
>>
>>
>>
>>
>> _______________________________________________
>> Devel mailing list
>> [email protected]
>> http://lists.rtpproxy.org/mailman/listinfo/devel
>>
>
_______________________________________________
Devel mailing list
[email protected]
http://lists.rtpproxy.org/mailman/listinfo/devel

Reply via email to