Moderators: gerski, enjay, williamconley, Op3r, Staydog, gardo, mflorell, MJCoate, mcargile, Kumba, Michael_N
[Dec 5 18:02:06] VERBOSE[2595][C-00000f7b] netsock2.c: [Dec 5 18:02:06] == Using SIP RTP CoS mark 5
[Dec 5 18:02:06] VERBOSE[2595][C-00000f7b] res_rtp_asterisk.c: [Dec 5 18:02:06] > 0x7f458340faa0 -- Strict RTP learning after remote address set to: X.X.X.X:19166
[Dec 5 18:02:07] VERBOSE[9780][C-00000f7b] res_rtp_asterisk.c: [Dec 5 18:02:07] > 0x7f458340faa0 -- Strict RTP switching to RTP remote address X.X.X.X:19166 as source
[Dec 5 18:02:08] VERBOSE[9780][C-00000f7b] res_rtp_asterisk.c: [Dec 5 18:02:08] > 0x7f458340faa0 -- Strict RTP learning complete - Locking on source address X.X.X.X:19166
[Dec 6 10:58:11] VERBOSE[2593][C-00001a70] res_rtp_asterisk.c: [Dec 6 10:58:11] > 0x7fa81801ccb0 -- Strict RTP learning after remote address set to: 192.168.0.114:8000
[Dec 6 10:58:11] VERBOSE[30477][C-00001a70] res_rtp_asterisk.c: [Dec 6 10:58:11] Sent RTP packet to 192.168.0.114:8000 (type 18, seq 005824, ts 000160, len 000020)
[Dec 6 10:58:11] VERBOSE[30477][C-00001a70] res_rtp_asterisk.c: [Dec 6 10:58:11] Sent RTP packet to 192.168.0.114:8000 (type 18, seq 005825, ts 000320, len 000020)
[Dec 6 10:58:11] VERBOSE[30477][C-00001a70] res_rtp_asterisk.c: [Dec 6 10:58:11] Sent RTP packet to 192.168.0.114:8000 (type 18, seq 005826, ts 000480, len 000020)
[Dec 6 10:58:11] VERBOSE[30477][C-00001a70] res_rtp_asterisk.c: [Dec 6 10:58:11] Sent RTP packet to 192.168.0.114:8000 (type 18, seq 005827, ts 000640, len 000020)
[Dec 6 10:58:11] VERBOSE[30477][C-00001a70] res_rtp_asterisk.c: [Dec 6 10:58:11] Sent RTP packet to 192.168.0.114:8000 (type 18, seq 005828, ts 000800, len 000020)
[Dec 6 10:58:11] VERBOSE[30477][C-00001a70] res_rtp_asterisk.c: [Dec 6 10:58:11] Sent RTP packet to 192.168.0.114:8000 (type 18, seq 005829, ts 000960, len 000020)
[Dec 6 10:58:11] VERBOSE[30477][C-00001a70] res_rtp_asterisk.c: [Dec 6 10:58:11] Sent RTP packet to 192.168.0.114:8000 (type 18, seq 005830, ts 001120, len 000020)
With RTP debug enabled
tarikzz wrote:There is no firewall,
tarikzz wrote:And SIP ALG has been disabled on the router.
tarikzz wrote:Problematic no-audio calls do actually have RTP stream in both ways (showed by sngrep)
tarikzz wrote:Also, there is no particular difference between the INVITE of a no-sound all and INVITE of a normal call.
tarikzz wrote:Same thing with SDP part: nothing particularly different.
tarikzz wrote:Sometimes - very rare - the agent hear his own voice just like an echo. I didn’t mention it because it happens only on 1/500 calls, but it might be a clue ...
tarikzz wrote:I didn’t mention either that agents are always connected : they are called by the server when they login, then the server send them calls by making the clients join the agent conference. So when there is a no audio call, either the agent or the client hangs up, and the agent is then atill connected to the server, he gets the next call.
tarikzz wrote:The agents being always connected, and waiting for client in their conference, makes me think that this should not be a firewall problem...
So you're on a public IP, this traffic does not pass through a router, and iptables is off?
Have you tried a different carrier?
How's your server load during this?
Do you have any networking errors on the server during this? (Not firewall, networking)
Udp:
7390407 packets received
7282 packets to unknown port received.
499 packet receive errors
7418231 packets sent
RcvbufErrors: 499
SndbufErrors: 0
InCsumErrors: 0
IgnoredMulti: 0
if this is all true
An overloaded server or one running out of ports or sockets OR audio drop between servers are my only guesses if this is all true.
vicibox8:~ # uptime
11:32am up 3:16, 5 users, load average: 0.55, 0.71, 0.95
vicibox8:~ # netstat -natp | wc -l
231
vicibox8:~ # lsof | wc -l
112919
vicibox8:~ # cat /proc/sys/fs/file-max
3261783
What reason is given for the disconnected call if you run a test and don't hang up? RTP timeout?
The theoretical breakdown is during the bridge of the call to the meetme room
Users browsing this forum: Google [Bot] and 46 guests