InnovateAsterisk / Browser-Phone

A fully featured browser based WebRTC SIP phone for Asterisk
https://www.innovateasterisk.com
GNU Affero General Public License v3.0
494 stars 243 forks source link

failure to pass ACL '(BASELINE)' #430

Open prathibhacdac opened 1 year ago

prathibhacdac commented 1 year ago

[2023-02-09 14:55:55] NOTICE[12938]: acl.c:784 ast_apply_acl_internal: SIP ACL: Rejecting '51.89.204.137' due to a failure to pass ACL '(BASELINE)' [2023-02-09 14:55:55] WARNING[12938]: res_pjsip_acl.c:134 apply_acl: Incoming SIP message from 51.89.204.137:54303 did not pass ACL test

InnovateAsterisk commented 1 year ago

What are your ACL settings? Do you have the box open to the internet?

prathibhacdac commented 1 year ago

[acl] ; Opperates on all pjsip traffic (can also be in acl.conf) type=acl deny=0.0.0.0/0.0.0.0 permit=10.0.0.0/255.0.0.0 permit=172.16.0.0/255.240.0.0 permit=192.168.0.0/255.255.0.0

InnovateAsterisk commented 1 year ago

What are you not sure about?

51.89.204.137 Is not in the acl, it’s rejected the request and warned you about it.

prathibhacdac commented 1 year ago

How to resolve sip_inv.c .Error parsing/validating SDP body: Missing SDP rtpmap for dynamic payload type (PJMEDIA_SDP_EMISSINGRTPMAP) this error?

Starting Video Call... and the above error is displayed in the browser.

InnovateAsterisk commented 1 year ago

You will have to capture your invite on the asterisks server, as received. Put pjsip debug on, and copy the result (only the invite) here.

prathibhacdac commented 1 year ago

<--- Transmitting SIP response (424 bytes) to WSS:10.10.10.70:46718 ---> SIP/2.0 400 Bad Request Via: SIP/2.0/WSS 192.0.2.229;rport=46718;received=10.10.10.70;branch=z9hG4bK9361963 Call-ID: d18fks6a4givifd2jm3p From: "prathibhab" sip:101001@bp1.erss.in;tag=8155hus5kr To: sip:101002@bp1.erss.in;tag=z9hG4bK9361963 CSeq: 2 INVITE Warning: 399 SIP "Missing SDP rtpmap for dynamic payload type (PJMEDIA_SDP_EMISSINGRTPMAP)" Server: Asterisk PBX certified/18.9-cert3 Content-Length: 0

prathibhacdac commented 1 year ago

INVITE Rejected: Bad Request in browser console.

InnovateAsterisk commented 1 year ago

This is the response to the browser, I need to see the invite

prathibhacdac commented 1 year ago

There is no such command pjsip debug on

prathibhacdac commented 1 year ago

this is the o/p of pjsip set logger on

<--- Transmitting SIP response (424 bytes) to WSS:10.10.10.70:46718 ---> SIP/2.0 400 Bad Request Via: SIP/2.0/WSS 192.0.2.229;rport=46718;received=10.10.10.70;branch=z9hG4bK9361963 Call-ID: d18fks6a4givifd2jm3p From: "prathibhab" sip:101001@bp1.erss.in;tag=8155hus5kr To: sip:101002@bp1.erss.in;tag=z9hG4bK9361963 CSeq: 2 INVITE Warning: 399 SIP "Missing SDP rtpmap for dynamic payload type (PJMEDIA_SDP_EMISSINGRTPMAP)" Server: Asterisk PBX certified/18.9-cert3 Content-Length: 0

InnovateAsterisk commented 1 year ago

It will start with INVITE, just like the one above, but it would have been before that. And marked with <— Received… —>

If this is a production server, then you are making your life very difficult here. I would highly recommend spinning up a development box, and getting everything working correctly first.

prathibhacdac commented 1 year ago

This is only development server.

prathibhacdac commented 1 year ago

<--- Received SIP request (9445 bytes) from WSS:10.10.10.70:50758 ---> INVITE sip:101002@bp1.erss.in SIP/2.0 Via: SIP/2.0/WSS 192.0.2.254;branch=z9hG4bK9756702 To: sip:101002@bp1.erss.in From: "prathibhab" sip:101001@bp1.erss.in;tag=jud8opvn3c CSeq: 1 INVITE Call-ID: hs5dgk0n927dvgn1uaan Max-Forwards: 70 Contact: sip:mlb5ebc4@192.0.2.254;transport=wss;ob Allow: ACK,CANCEL,INVITE,MESSAGE,BYE,OPTIONS,INFO,NOTIFY,REFER Supported: outbound User-Agent: Browser Phone 0.3.20 (SIPJS - 0.20.0) Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36 Content-Type: application/sdp Content-Length: 8842

InnovateAsterisk commented 1 year ago

The invite has two parts, the header and the body. Can you see it says Content-Length: 8577, this means that the body will have 8577 bytes of data (after one line of empty space).

The error message is referring to something in the body of the message, so something in the 8577 bytes. You need to send the entire invite message.

prathibhacdac commented 1 year ago

v=0 o=- 1381334577221906819 2 IN IP4 127.0.0.1 s=- t=0 0 a=group:BUNDLE 0 1 a=extmap-allow-mixed a=msid-semantic: WMS f0cb88d3-b5f6-45ad-bf5e-2fc384cd5007 m=audio 63384 UDP/TLS/RTP/SAVPF 111 63 103 104 9 0 8 106 105 13 110 112 113 126 c=IN IP4 14.139.183.221 a=rtcp:9 IN IP4 0.0.0.0 a=candidate:2307628153 1 udp 2122260223 192.168.56.1 63383 typ host generation 0 network-id 1 a=candidate:1168475650 1 udp 2122194687 10.176.17.207 63384 typ host generation 0 network-id 2 a=candidate:1000382465 1 udp 2122129151 10.200.0.78 63385 typ host generation 0 network-id 3 a=candidate:2942053582 1 udp 2122063615 10.201.0.83 63386 typ host generation 0 network-id 4 a=candidate:2910989289 1 udp 2121998079 10.202.0.83 63387 typ host generation 0 network-id 5 a=candidate:2889340660 1 udp 2121932543 10.203.0.83 63388 typ host generation 0 network-id 6 a=candidate:2739288379 1 udp 2121867007 10.208.0.83 63389 typ host generation 0 network-id 7 a=candidate:1151726628 1 udp 1685987071 14.139.183.221 63384 typ srflx raddr 10.176.17.207 rport 63384 generation 0 network-id 2 a=candidate:4148461281 1 tcp 1518280447 192.168.56.1 9 typ host tcptype active generation 0 network-id 1 a=candidate:996828314 1 tcp 1518214911 10.176.17.207 9 typ host tcptype active generation 0 network-id 2 a=candidate:1164919449 1 tcp 1518149375 10.200.0.78 9 typ host tcptype active generation 0 network-id 3 a=candidate:3516124758 1 tcp 1518083839 10.201.0.83 9 typ host tcptype active generation 0 network-id 4 a=candidate:3545090417 1 tcp 1518018303 10.202.0.83 9 typ host tcptype active generation 0 network-id 5 a=candidate:3539481708 1 tcp 1517952767 10.203.0.83 9 typ host tcptype active generation 0 network-id 6 a=candidate:3716799395 1 tcp 1517887231 10.208.0.83 9 typ host tcptype active generation 0 network-id 7 a=ice-ufrag:58ia a=ice-pwd:JOJwFcXOQgB/BjvWBYeoVf+o a=ice-options:trickle a=fingerprint:sha-256 26:61:B0:1D:FF:98:02:A7:80:5D:E9:93:2F:9A:3D:81:9D:5F:4F:53:F9:11:2E:07:55:56:E8:A8:3B:88:9E:C2 a=setup:actpass a=mid:0 a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level a=extmap:2 http://www.webrtc.org/experiments/rtp-hdrext/abs-send-time a=extmap:3 http://www.ietf.org/id/draft-holmer-rmcat-transport-wide-cc-extensions-01 a=extmap:4 urn:ietf:params:rtp-hdrext:sdes:mid a=sendrecv a=msid:f0cb88d3-b5f6-45ad-bf5e-2fc384cd5007 7f4eb73f-b76b-44ee-97d3-896beca8bc44 a=rtcp-mux a=rtpmap:111 opus/48000/2 a=rtcp-fb:111 transport-cc a=fmtp:111 minptime=10;useinbandfec=1 a=rtpmap:63 red/48000/2 a=fmtp:63 111/111 a=rtpmap:103 ISAC/16000 a=rtpmap:104 ISAC/32000 a=rtpmap:9 G722/8000 a=rtpmap:0 PCMU/8000 a=rtpmap:8 PCMA/8000 a=rtpmap:106 CN/32000 a=rtpmap:105 CN/16000 a=rtpmap:13 CN/8000 a=rtpmap:110 telephone-event/48000 a=rtpmap:112 telephone-event/32000 a=rtpmap:113 telephone-event/16000 a=rtpmap:126 telephone-event/8000 a=ssrc:1375327883 cname:d6fR/l3DJldZt5eD a=ssrc:1375327883 msid:f0cb88d3-b5f6-45ad-bf5e-2fc384cd5007 7f4eb73f-b76b-44ee-97d3-896beca8bc44 m=video 63391 UDP/TLS/RTP/SAVPF 96 97 102 122 127 121 125 107 108 109 124 120 39 40 45 46 98 99 100 101 123 119 114 115 116 c=IN IP4 14.139.183.221 a=rtcp:9 IN IP4 0.0.0.0 a=candidate:2307628153 1 udp 2122260223 192.168.56.1 63390 typ host generation 0 network-id 1 a=candidate:1168475650 1 udp 2122194687 10.176.17.207 63391 typ host generation 0 network-id 2 a=candidate:1000382465 1 udp 2122129151 10.200.0.78 63392 typ host generation 0 network-id 3 a=candidate:2942053582 1 udp 2122063615 10.201.0.83 63393 typ host generation 0 network-id 4 a=candidate:2910989289 1 udp 2121998079 10.202.0.83 63394 typ host generation 0 network-id 5 a=candidate:2889340660 1 udp 2121932543 10.203.0.83 63395 typ host generation 0 network-id 6 a=candidate:2739288379 1 udp 2121867007 10.208.0.83 63396 typ host generation 0 network-id 7 a=candidate:1151726628 1 udp 1685987071 14.139.183.221 63391 typ srflx raddr 10.176.17.207 rport 63391 generation 0 network-id 2 a=candidate:4148461281 1 tcp 1518280447 192.168.56.1 9 typ host tcptype active generation 0 network-id 1 a=candidate:996828314 1 tcp 1518214911 10.176.17.207 9 typ host tcptype active generation 0 network-id 2 a=candidate:1164919449 1 tcp 1518149375 10.200.0.78 9 typ host tcptype active generation 0 network-id 3 a=candidate:3516124758 1 tcp 1518083839 10.201.0.83 9 typ host tcptype active generation 0 network-id 4 a=candidate:3545090417 1 tcp 1518018303 10.202.0.83 9 typ host tcptype active generation 0 network-id 5 a=candidate:3539481708 1 tcp 1517952767 10.203.0.83 9 typ host tcptype active generation 0 network-id 6 a=candidate:3716799395 1 tcp 1517887231 10.208.0.83 9 typ host tcptype active generation 0 network-id 7 a=ice-ufrag:58ia a=ice-pwd:JOJwFcXOQgB/BjvWBYeoVf+o a=ice-options:trickle a=fingerprint:sha-256 26:61:B0:1D:FF:98:02:A7:80:5D:E9:93:2F:9A:3D:81:9D:5F:4F:53:F9:11:2E:07:55:56:E8:A8:3B:88:9E:C2 a=setup:actpass a=mid:1 a=extmap:14 urn:ietf:params:rtp-hdrext:toffset a=extmap:2 http://www.webrtc.org/experiments/rtp-hdrext/abs-send-time a=extmap:13 urn:3gpp:video-orientation a=extmap:3 http://www.ietf.org/id/draft-holmer-rmcat-transport-wide-cc-extensions-01 a=extmap:5 http://www.webrtc.org/experiments/rtp-hdrext/playout-delay a=extmap:6 http://www.webrtc.org/experiments/rtp-hdrext/video-content-type a=extmap:7 http://www.webrtc.org/experiments/rtp-hdrext/video-timing a=extmap:8 http://www.webrtc.org/experiments/rtp-hdrext/color-space a=extmap:4 urn:ietf:params:rtp-hdrext:sdes:mid a=extmap:10 urn:ietf:params:rtp-hdrext:sdes:rtp-stream-id a=extmap:11 urn:ietf:params:rtp-hdrext:sdes:repaired-rtp-stream-id a=sendrecv a=msid:f0cb88d3-b5f6-45ad-bf5e-2fc384cd5007 400a1efc-07aa-49e2-bd73-a607436762f0 a=rtcp-mux a=rtcp-rsize a=rtpmap:96 VP8/90000 a=rtcp-fb:96 goog-remb a=rtcp-fb:96 transport-cc a=rtcp-fb:96 ccm fir a=rtcp-fb:96 nack a=rtcp-fb:96 nack pli a=rtpmap:97 rtx/90000 a=fmtp:97 apt=96 a=rtpmap:102 H264/90000 a=rtcp-fb:102 goog-remb a=rtcp-fb:102 transport-cc a=rtcp-fb:102 ccm fir a=rtcp-fb:102 nack a=rtcp-fb:102 nack pli a=fmtp:102 level-asymmetry-allowed=1;packetization-mode=1;profile-level-id=42001f a=rtpmap:122 rtx/90000 a=fmtp:122 apt=102 a=rtpmap:127 H264/90000 a=rtcp-fb:127 goog-remb a=rtcp-fb:127 transport-cc a=rtcp-fb:127 ccm fir a=rtcp-fb:127 nack a=rtcp-fb:127 nack pli a=fmtp:127 level-asymmetry-allowed=1;packetization-mode=0;profile-level-id=42001f a=rtpmap:121 rtx/90000 a=fmtp:121 apt=127 a=rtpmap:125 H264/90000 a=rtcp-fb:125 goog-remb a=rtcp-fb:125 transport-cc a=rtcp-fb:125 ccm fir a=rtcp-fb:125 nack a=rtcp-fb:125 nack pli a=fmtp:125 level-asymmetry-allowed=1;packetization-mode=1;profile-level-id=42e01f a=rtpmap:107 rtx/90000 a=fmtp:107 apt=125 a=rtpmap:108 H264/90000 a=rtcp-fb:108 goog-remb a=rtcp-fb:108 transport-cc a=rtcp-fb:108 ccm fir a=rtcp-fb:108 nack a=rtcp-fb:108 nack pli a=fmtp:108 level-asymmetry-allowed=1;packetization-mode=0;profile-level-id=42e01f a=rtpmap:109 rtx/90000 a=fmtp:109 apt=108 a=rtpmap:124 H264/90000 a=rtcp-fb:124 goog-remb a=rtcp-fb:124 transport-cc a=rtcp-fb:124 ccm fir a=rtcp-fb:124 nack a=rtcp-fb:124 nack pli a=fmtp:124 level-asymmetry-allowed=1;packetization-mode=1;profile-level-id=4d001f a=rtpmap:120 rtx/90000 a=fmtp:120 apt=124 a=rtpmap:39 H264/90000 <--- Transmitting SIP response (478 bytes) to WSS:10.10.10.70:50758 ---> SIP/2.0 401 Unauthorized Via: SIP/2.0/WSS 192.0.2.254;rport=50758;received=10.10.10.70;branch=z9hG4bK9756702 Call-ID: hs5dgk0n927dvgn1uaan From: "prathibhab" sip:101001@bp1.erss.in;tag=jud8opvn3c To: sip:101002@bp1.erss.in;tag=z9hG4bK9756702 CSeq: 1 INVITE WWW-Authenticate: Digest realm="asterisk",nonce="1676011526/d744eed67b737a66150d7633ee6e4351",opaque="4f7ddd973ad2ff35",algorithm=md5,qop="auth" Server: Asterisk PBX certified/18.9-cert3 Content-Length: 0

InnovateAsterisk commented 1 year ago

So the reason for the error PJMEDIA_SDP_EMISSINGRTPMAP, is because the invite message is being truncated some how.

Notice how the line: m=video 63391 UDP/TLS/RTP/SAVPF 96 97 102 122 127 121 125 107 108 109 124 120 39 40 45 46 98 99 100 101 123 119 114 115 116 list all the codec options past 39, so 40 45 46 98 99 100 101 123 119 114 115 116 but there are no a=rtpmap: ... lines for all of these codecs from 40 onwards. After a=rtpmap:39 H264/90000 it stops. I believe this message is being truncated at the network level.

This is a big message/string, because of the video options. This probably doesn't happen with audio only, right? There could be fragmentation going on at the server level... or on any one of the apparently 6 nat routers on the way (this is also something you need to address!!).

You need to find out why the invite is being truncated, and where. This may be something that the Asterisk community can help with.

prathibhacdac commented 1 year ago

Yes. With audio only this issue is not there.

InnovateAsterisk commented 1 year ago

Also, note, your message data that you pasted above is 7177bytes long, so doesn't correspond to the Content-Length value.

prathibhacdac commented 1 year ago

In audio call, the following errors are displayed

Attempt 1 to send STUN request to '142.250.25.127' timed out. Attempt 2 to send STUN request to '142.250.25.127' timed out. Attempt 3 to send STUN request to '142.250.25.127' timed out.

Because of this notice, it takes 25secs for the connection to get established.

prathibhacdac commented 1 year ago

So the reason for the error PJMEDIA_SDP_EMISSINGRTPMAP, is because the invite message is being truncated some how.

Notice how the line: m=video 63391 UDP/TLS/RTP/SAVPF 96 97 102 122 127 121 125 107 108 109 124 120 39 40 45 46 98 99 100 101 123 119 114 115 116 list all the codec options past 39, so 40 45 46 98 99 100 101 123 119 114 115 116 but there are no a=rtpmap: ... lines for all of these codecs from 40 onwards. After a=rtpmap:39 H264/90000 it stops. I believe this message is being truncated at the network level.

This is a big message/string, because of the video options. This probably doesn't happen with audio only, right? There could be fragmentation going on at the server level... or on any one of the apparently 6 nat routers on the way (this is also something you need to address!!).

You need to find out why the invite is being truncated, and where. This may be something that the Asterisk community can help with.

Resolved this issue following: https://community.asterisk.org/t/invite-from-some-chrome-webrtc-clients-rejected-with-pjmedia-sdp-emissingrtpmap/92199

Solution In third-party/pjproject/patches/config_site.h, adjusted the line:

define PJMEDIA_MAX_SDP_ATTR (PJMEDIA_MAX_SDP_FMT*2 + 4)

To:

define PJMEDIA_MAX_SDP_ATTR (PJMEDIA_MAX_SDP_FMT*3 + 4)

then make and make install

prathibhacdac commented 1 year ago

there is no audio and video on both ends.

prathibhacdac commented 1 year ago

<--- Received SIP request (9449 bytes) from WSS:10.10.10.70:57376 ---> INVITE sip:9962466480@bp1.erss.in SIP/2.0 Via: SIP/2.0/WSS 192.0.2.212;branch=z9hG4bK6455491 To: sip:9962466480@bp1.erss.in From: "prathibhab" sip:101001@bp1.erss.in;tag=k4uvq57tmc CSeq: 1 INVITE Call-ID: h6tmhv6n7utilvplvgk6 Max-Forwards: 70 Contact: sip:utdm342p@192.0.2.212;transport=wss;ob Allow: ACK,CANCEL,INVITE,MESSAGE,BYE,OPTIONS,INFO,NOTIFY,REFER Supported: outbound User-Agent: Browser Phone 0.3.20 (SIPJS - 0.20.0) Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36 Content-Type: application/sdp Content-Length: 8838

v=0 o=- 1479699293580605357 2 IN IP4 127.0.0.1 s=- t=0 0 a=group:BUNDLE 0 1 a=extmap-allow-mixed a=msid-semantic: WMS 98b22887-96df-4b65-bea6-e4b709da9f94 m=audio 64881 UDP/TLS/RTP/SAVPF 111 63 103 104 9 0 8 106 105 13 110 112 113 126 c=IN IP4 14.139.183.221 a=rtcp:9 IN IP4 0.0.0.0 a=candidate:1360395460 1 udp 2122260223 192.168.56.1 64880 typ host generation 0 network-id 1 a=candidate:2637948607 1 udp 2122194687 10.176.17.207 64881 typ host generation 0 network-id 2 a=candidate:3812540604 1 udp 2122129151 10.200.0.78 64882 typ host generation 0 network-id 3 a=candidate:2009222259 1 udp 2122063615 10.201.0.83 64883 typ host generation 0 network-id 4 a=candidate:1964788564 1 udp 2121998079 10.202.0.83 64884 typ host generation 0 network-id 5 a=candidate:1957279305 1 udp 2121932543 10.203.0.83 64885 typ host generation 0 network-id 6 a=candidate:2077776262 1 udp 2121867007 10.208.0.83 64886 typ host generation 0 network-id 7 a=candidate:802823772 1 tcp 1518280447 192.168.56.1 9 typ host tcptype active generation 0 network-id 1 a=candidate:3824419879 1 tcp 1518214911 10.176.17.207 9 typ host tcptype active generation 0 network-id 2 a=candidate:2649825828 1 tcp 1518149375 10.200.0.78 9 typ host tcptype active generation 0 network-id 3 a=candidate:151891691 1 tcp 1518083839 10.201.0.83 9 typ host tcptype active generation 0 network-id 4 a=candidate:198420940 1 tcp 1518018303 10.202.0.83 9 typ host tcptype active generation 0 network-id 5 a=candidate:174478545 1 tcp 1517952767 10.203.0.83 9 typ host tcptype active generation 0 network-id 6 a=candidate:85441310 1 tcp 1517887231 10.208.0.83 9 typ host tcptype active generation 0 network-id 7 a=candidate:2621150361 1 udp 1685987071 14.139.183.221 64881 typ srflx raddr 10.176.17.207 rport 64881 generation 0 network-id 2 a=ice-ufrag:8UYS a=ice-pwd:5x/TfLtXOtAzOB3nVIOgB78d a=ice-options:trickle a=fingerprint:sha-256 35:B0:0F:81:7D:E1:7B:13:D9:98:89:81:0B:7D:F3:C6:01:8D:9E:60:78:03:95:6B:36:69:AB:7A:4B:37:5F:5D a=setup:actpass a=mid:0 a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level a=extmap:2 http://www.webrtc.org/experiments/rtp-hdrext/abs-send-time a=extmap:3 http://www.ietf.org/id/draft-holmer-rmcat-transport-wide-cc-extensions-01 a=extmap:4 urn:ietf:params:rtp-hdrext:sdes:mid a=sendrecv a=msid:98b22887-96df-4b65-bea6-e4b709da9f94 c4171ec9-1a6b-4168-b0ba-363949144cde a=rtcp-mux a=rtpmap:111 opus/48000/2 a=rtcp-fb:111 transport-cc a=fmtp:111 minptime=10;useinbandfec=1 a=rtpmap:63 red/48000/2 a=fmtp:63 111/111 a=rtpmap:103 ISAC/16000 a=rtpmap:104 ISAC/32000 a=rtpmap:9 G722/8000 a=rtpmap:0 PCMU/8000 a=rtpmap:8 PCMA/8000 a=rtpmap:106 CN/32000 a=rtpmap:105 CN/16000 a=rtpmap:13 CN/8000 a=rtpmap:110 telephone-event/48000 a=rtpmap:112 telephone-event/32000 a=rtpmap:113 telephone-event/16000 a=rtpmap:126 telephone-event/8000 a=ssrc:4177909100 cname:mR5nGmRuEIQJbATi a=ssrc:4177909100 msid:98b22887-96df-4b65-bea6-e4b709da9f94 c4171ec9-1a6b-4168-b0ba-363949144cde m=video 64888 UDP/TLS/RTP/SAVPF 96 97 102 122 127 121 125 107 108 109 124 120 39 40 45 46 98 99 100 101 123 119 114 115 116 c=IN IP4 14.139.183.221 a=rtcp:9 IN IP4 0.0.0.0 a=candidate:1360395460 1 udp 2122260223 192.168.56.1 64887 typ host generation 0 network-id 1 a=candidate:2637948607 1 udp 2122194687 10.176.17.207 64888 typ host generation 0 network-id 2 a=candidate:3812540604 1 udp 2122129151 10.200.0.78 64889 typ host generation 0 network-id 3 a=candidate:2009222259 1 udp 2122063615 10.201.0.83 64890 typ host generation 0 network-id 4 a=candidate:1964788564 1 udp 2121998079 10.202.0.83 64891 typ host generation 0 network-id 5 a=candidate:1957279305 1 udp 2121932543 10.203.0.83 64892 typ host generation 0 network-id 6 a=candidate:2077776262 1 udp 2121867007 10.208.0.83 64893 typ host generation 0 network-id 7 a=candidate:802823772 1 tcp 1518280447 192.168.56.1 9 typ host tcptype active generation 0 network-id 1 a=candidate:3824419879 1 tcp 1518214911 10.176.17.207 9 typ host tcptype active generation 0 network-id 2 a=candidate:2649825828 1 tcp 1518149375 10.200.0.78 9 typ host tcptype active generation 0 network-id 3 a=candidate:151891691 1 tcp 1518083839 10.201.0.83 9 typ host tcptype active generation 0 network-id 4 a=candidate:198420940 1 tcp 1518018303 10.202.0.83 9 typ host tcptype active generation 0 network-id 5 a=candidate:174478545 1 tcp 1517952767 10.203.0.83 9 typ host tcptype active generation 0 network-id 6 a=candidate:85441310 1 tcp 1517887231 10.208.0.83 9 typ host tcptype active generation 0 network-id 7 a=candidate:2621150361 1 udp 1685987071 14.139.183.221 64888 typ srflx raddr 10.176.17.207 rport 64888 generation 0 network-id 2 a=ice-ufrag:8UYS a=ice-pwd:5x/TfLtXOtAzOB3nVIOgB78d a=ice-options:trickle a=fingerprint:sha-256 35:B0:0F:81:7D:E1:7B:13:D9:98:89:81:0B:7D:F3:C6:01:8D:9E:60:78:03:95:6B:36:69:AB:7A:4B:37:5F:5D a=setup:actpass a=mid:1 a=extmap:14 urn:ietf:params:rtp-hdrext:toffset a=extmap:2 http://www.webrtc.org/experiments/rtp-hdrext/abs-send-time a=extmap:13 urn:3gpp:video-orientation a=extmap:3 http://www.ietf.org/id/draft-holmer-rmcat-transport-wide-cc-extensions-01 a=extmap:5 http://www.webrtc.org/experiments/rtp-hdrext/playout-delay a=extmap:6 http://www.webrtc.org/experiments/rtp-hdrext/video-content-type a=extmap:7 http://www.webrtc.org/experiments/rtp-hdrext/video-timing a=extmap:8 http://www.webrtc.org/experiments/rtp-hdrext/color-space a=extmap:4 urn:ietf:params:rtp-hdrext:sdes:mid a=extmap:10 urn:ietf:params:rtp-hdrext:sdes:rtp-stream-id a=extmap:11 urn:ietf:params:rtp-hdrext:sdes:repaired-rtp-stream-id a=sendrecv a=msid:98b22887-96df-4b65-bea6-e4b709da9f94 e6bba895-a609-4677-890d-6d2e254a90dc a=rtcp-mux a=rtcp-rsize a=rtpmap:96 VP8/90000 a=rtcp-fb:96 goog-remb a=rtcp-fb:96 transport-cc a=rtcp-fb:96 ccm fir a=rtcp-fb:96 nack a=rtcp-fb:96 nack pli a=rtpmap:97 rtx/90000 a=fmtp:97 apt=96 a=rtpmap:102 H264/90000 a=rtcp-fb:102 goog-remb a=rtcp-fb:102 transport-cc a=rtcp-fb:102 ccm fir a=rtcp-fb:102 nack a=rtcp-fb:102 nack pli a=fmtp:102 level-asymmetry-allowed=1;packetization-mode=1;profile-level-id=42001f a=rtpmap:122 rtx/90000 a=fmtp:122 apt=102 a=rtpmap:127 H264/90000 a=rtcp-fb:127 goog-remb a=rtcp-fb:127 transport-cc a=rtcp-fb:127 ccm fir a=rtcp-fb:127 nack a=rtcp-fb:127 nack pli a=fmtp:127 level-asymmetry-allowed=1;packetization-mode=0;profile-level-id=42001f a=rtpmap:121 rtx/90000 a=fmtp:121 apt=127 a=rtpmap:125 H264/90000 a=rtcp-fb:125 goog-remb a=rtcp-fb:125 transport-cc a=rtcp-fb:125 ccm fir a=rtcp-fb:125 nack a=rtcp-fb:125 nack pli a=fmtp:125 level-asymmetry-allowed=1;packetization-mode=1;profile-level-id=42e01f a=rtpmap:107 rtx/90000 a=fmtp:107 apt=125 a=rtpmap:108 H264/90000 a=rtcp-fb:108 goog-remb a=rtcp-fb:108 transport-cc a=rtcp-fb:108 ccm fir a=rtcp-fb:108 nack a=rtcp-fb:108 nack pli a=fmtp:108 level-asymmetry-allowed=1;packetization-mode=0;profile-level-id=42e01f a=rtpmap:109 rtx/90000 a=fmtp:109 apt=108 a=rtpmap:124 H264/90000 a=rtcp-fb:124 goog-remb a=rtcp-fb:124 transport-cc a=rtcp-fb:124 ccm fir a=rtcp-fb:124 nack a=rtcp-fb:124 nack pli a=fmtp:124 level-asymmetry-allowed=1;packetization-mode=1;profile-level-id=4d001f a=rtpmap:120 rtx/90000 a=fmtp:120 apt=124 a=rtpmap:39 H264/90000 a=rtcp-fb:39 goog-remb

but still it is showing only upto 39. But the call is getting connected after adding the patch.

prathibhacdac commented 1 year ago

ports 19302 and 3478 are opened in firewall. still getting the error:

Attempt 3 to send STUN request to '216.93.246.18' timed out. Check that the server address is correct and reachable.