[2022-05-16 13:06:27] VERBOSE[662915] res_pjsip_logger.c: <--- Received SIP request (10046 bytes) from WSS::49386 ---> INVITE sip:192.168.1.210:4062;transport=ws SIP/2.0 Via: SIP/2.0/WSS 3vtdi9kk68fl.invalid;branch=z9hG4bK1424262 Max-Forwards: 69 To: ;tag=96708346-e6ca-4e71-b940-adb2ab32a463 From: ;tag=3tvt9ueofa Call-ID: mrvuvb54flmhbci2kkae CSeq: 8611 INVITE Contact: Content-Type: application/sdp Session-Expires: 1800;refresher=uac Allow: INVITE,ACK,CANCEL,BYE,UPDATE,MESSAGE,OPTIONS,REFER,INFO,NOTIFY Supported: timer,ice,replaces,outbound User-Agent: JsSIP 3.9.0 Content-Length: 9445 v=0 o=- 689086411737540011 4 IN IP4 127.0.0.1 s=- t=0 0 a=group:BUNDLE 0 1 video-2 a=extmap-allow-mixed a=msid-semantic: WMS 6yu212ibTSBAgnVmUhxUqkIvQ1fsL4vBzeKb m=audio 63360 UDP/TLS/RTP/SAVPF 111 9 8 0 126 63 103 104 106 105 13 110 112 113 c=IN IP4 a=rtcp:9 IN IP4 0.0.0.0 a=candidate:1466007278 1 udp 2122260223 63358 typ host generation 0 network-id 1 a=candidate:49843329 1 udp 2122194687 172.24.64.1 63359 typ host generation 0 network-id 2 a=candidate:2894319779 1 udp 2122129151 192.168.1.52 63360 typ host generation 0 network-id 3 a=candidate:3374666510 1 udp 2122063615 192.168.244.1 63361 typ host generation 0 network-id 4 a=candidate:111037495 1 udp 2121998079 192.168.187.1 63362 typ host generation 0 network-id 5 a=candidate:1519626615 1 udp 1685921535 63360 typ srflx raddr 192.168.1.52 rport 63360 generation 0 network-id 3 a=candidate:434274846 1 tcp 1518280447 9 typ host tcptype active generation 0 network-id 1 a=candidate:1283158129 1 tcp 1518214911 172.24.64.1 9 typ host tcptype active generation 0 network-id 2 a=candidate:3791662163 1 tcp 1518149375 192.168.1.52 9 typ host tcptype active generation 0 network-id 3 a=candidate:2275848190 1 tcp 1518083839 192.168.244.1 9 typ host tcptype active generation 0 network-id 4 a=candidate:1209905351 1 tcp 1518018303 192.168.187.1 9 typ host tcptype active generation 0 network-id 5 a=ice-ufrag:PGoN a=ice-pwd:+VCRET4cl5EG2Hl/JrJkdvU/ a=ice-options:trickle a=fingerprint:sha-256 85:A0:A8:EC:B6:AD:73:45:DF:26:3E:8B:88:B5:91:26:CA:DB:3A:94:54:30:19:C2:B1:43:33:4E:43:15:24:08 a=setup:actpass a=mid:0 a=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level a=extmap:2 http://www.webrtc.org/experiments/rtp-hdrext/abs-send-time a=extmap:3 http://www.ietf.org/id/draft-holmer-rmcat-transport-wide-cc-extensions-01 a=extmap:4 urn:ietf:params:rtp-hdrext:sdes:mid a=sendrecv a=msid:6yu212ibTSBAgnVmUhxUqkIvQ1fsL4vBzeKb dfd8e450-010b-4230-b1aa-033f6bd13409 a=rtcp-mux a=rtpmap:111 opus/48000/2 a=rtcp-fb:111 transport-cc a=fmtp:111 minptime=10;useinbandfec=1 a=rtpmap:9 G722/8000 a=rtpmap:8 PCMA/8000 a=rtpmap:0 PCMU/8000 a=rtpmap:126 telephone-event/8000 a=rtpmap:63 red/48000/2 a=fmtp:63 111/111 a=rtpmap:103 ISAC/16000 a=rtpmap:104 ISAC/32000 a=rtpmap:106 CN/32000 a=rtpmap:105 CN/16000 a=rtpmap:13 CN/8000 a=rtpmap:110 telephone-event/48000 a=rtpmap:112 telephone-event/32000 a=rtpmap:113 telephone-event/16000 a=ssrc:3014469604 cname:tl2avefrONbiEV9h a=ssrc:3014469604 msid:6yu212ibTSBAgnVmUhxUqkIvQ1fsL4vBzeKb dfd8e450-010b-4230-b1aa-033f6bd13409 a=ssrc:3014469604 mslabel:6yu212ibTSBAgnVmUhxUqkIvQ1fsL4vBzeKb a=ssrc:3014469604 label:dfd8e450-010b-4230-b1aa-033f6bd13409 m=video 63365 UDP/TLS/RTP/SAVPF 98 96 97 99 100 101 121 107 109 120 119 36 41 42 115 116 117 118 c=IN IP4 b=AS:1000 a=rtcp:9 IN IP4 0.0.0.0 a=candidate:1466007278 1 udp 2122260223 63363 typ host generation 0 network-id 1 a=candidate:49843329 1 udp 2122194687 172.24.64.1 63364 typ host generation 0 network-id 2 a=candidate:2894319779 1 udp 2122129151 192.168.1.52 63365 typ host generation 0 network-id 3 a=candidate:3374666510 1 udp 2122063615 192.168.244.1 63366 typ host generation 0 network-id 4 a=candidate:111037495 1 udp 2121998079 192.168.187.1 63367 typ host generation 0 network-id 5 a=candidate:1519626615 1 udp 1685921535 63365 typ srflx raddr 192.168.1.52 rport 63365 generation 0 network-id 3 a=candidate:434274846 1 tcp 1518280447 9 typ host tcptype active generation 0 network-id 1 a=candidate:1283158129 1 tcp 1518214911 172.24.64.1 9 typ host tcptype active generation 0 network-id 2 a=candidate:3791662163 1 tcp 1518149375 192.168.1.52 9 typ host tcptype active generation 0 network-id 3 a=candidate:2275848190 1 tcp 1518083839 192.168.244.1 9 typ host tcptype active generation 0 network-id 4 a=candidate:1209905351 1 tcp 1518018303 192.168.187.1 9 typ host tcptype active generation 0 network-id 5 a=ice-ufrag:PGoN a=ice-pwd:+VCRET4cl5EG2Hl/JrJkdvU/ a=ice-options:trickle a=fingerprint:sha-256 85:A0:A8:EC:B6:AD:73:45:DF:26:3E:8B:88:B5:91:26:CA:DB:3A:94:54:30:19:C2:B1:43:33:4E:43:15:24:08 a=setup:actpass a=mid:1 a=extmap:2 http://www.webrtc.org/experiments/rtp-hdrext/abs-send-time a=extmap:3 http://www.ietf.org/id/draft-holmer-rmcat-transport-wide-cc-extensions-01 a=extmap:14 urn:ietf:params:rtp-hdrext:toffset a=extmap:13 urn:3gpp:video-orientation a=extmap:5 http://www.webrtc.org/experiments/rtp-hdrext/playout-delay a=extmap:6 http://www.webrtc.org/experiments/rtp-hdrext/video-content-type a=extmap:7 http://www.webrtc.org/experiments/rtp-hdrext/video-timing a=extmap:8 http://www.webrtc.org/experiments/rtp-hdrext/color-space a=extmap:4 urn:ietf:params:rtp-hdrext:sdes:mid a=extmap:10 urn:ietf:params:rtp-hdrext:sdes:rtp-stream-id a=extmap:11 urn:ietf:params:rtp-hdrext:sdes:repaired-rtp-stream-id a=sendrecv a=msid:6yu212ibTSBAgnVmUhxUqkIvQ1fsL4vBzeKb 4dc8d7d7-0468-4f97-b3b2-bbebce5f0f2a a=rtcp-mux a=rtcp-rsize a=rtpmap:98 VP9/90000 a=rtcp-fb:98 transport-cc a=rtcp-fb:98 ccm fir a=rtcp-fb:98 nack a=fmtp:98 profile-id=0 a=rtpmap:96 VP8/90000 a=rtcp-fb:96 goog-remb a=rtcp-fb:96 transport-cc a=rtcp-fb:96 ccm fir a=rtcp-fb:96 nack a=rtcp-fb:96 nack pli a=rtpmap:97 rtx/90000 a=fmtp:97 apt=96 a=rtpmap:99 rtx/90000 a=fmtp:99 apt=98 a=rtpmap:100 VP9/90000 a=rtcp-fb:100 goog-remb a=rtcp-fb:100 transport-cc a=rtcp-fb:100 ccm fir a=rtcp-fb:100 nack a=rtcp-fb:100 nack pli a=fmtp:100 profile-id=2 a=rtpmap:101 rtx/90000 a=fmtp:101 apt=100 a=rtpmap:121 rtx/90000 a=fmtp:121 apt=127 a=rtpmap:107 rtx/90000 a=fmtp:107 apt=125 a=rtpmap:109 rtx/90000 a=fmtp:109 apt=108 a=rtpmap:120 rtx/90000 a=fmtp:120 apt=124 a=rtpmap:119 rtx/90000 a=fmtp:119 apt=123 a=rtpmap:36 rtx/90000 a=fmtp:36 apt=35 a=rtpmap:41 AV1/90000 a=rtcp-fb:41 goog-remb a=rtcp-fb:41 transport-cc a=rtcp-fb:41 ccm fir a=rtcp-fb:41 nack a=rtcp-fb:41 nack pli a=rtpmap:42 rtx/90000 a=fmtp:42 apt=41 a=rtpmap:115 rtx/90000 a=fmtp:115 apt=114 a=rtpmap:116 red/90000 a=rtpmap:117 rtx/90000 a=fmtp:117 apt=116 a=rtpmap:118 ulpfec/90000 a=ssrc-group:FID 2542253625 3698766722 a=ssrc:2542253625 cname:tl2avefrONbiEV9h a=ssrc:2542253625 msid:6yu212ibTSBAgnVmUhxUqkIvQ1fsL4vBzeKb 4dc8d7d7-0468-4f97-b3b2-bbebce5f0f2a a=ssrc:2542253625 mslabel:6yu212ibTSBAgnVmUhxUqkIvQ1fsL4vBzeKb a=ssrc:2542253625 label:4dc8d7d7-0468-4f97-b3b2-bbebce5f0f2a a=ssrc:3698766722 cname:tl2avefrONbiEV9h a=ssrc:3698766722 msid:6yu212ibTSBAgnVmUhxUqkIvQ1fsL4vBzeKb 4dc8d7d7-0468-4f97-b3b2-bbebce5f0f2a a=ssrc:3698766722 mslabel:6yu212ibTSBAgnVmUhxUqkIvQ1fsL4vBzeKb a=ssrc:3698766722 label:4dc8d7d7-0468-4f97-b3b2-bbebce5f0f2a m=video 9 UDP/TLS/RTP/SAVPF 98 96 97 99 100 101 121 107 109 120 119 36 41 42 115 116 117 118 c=IN IP4 0.0.0.0 a=rtcp:9 IN IP4 0.0.0.0 a=ice-ufrag:PGoN a=ice-pwd:+VCRET4cl5EG2Hl/JrJkdvU/ a=ice-options:trickle a=fingerprint:sha-256 85:A0:A8:EC:B6:AD:73:45:DF:26:3E:8B:88:B5:91:26:CA:DB:3A:94:54:30:19:C2:B1:43:33:4E:43:15:24:08 a=setup:actpass a=mid:video-2 a=extmap:2 http://www.webrtc.org/experiments/rtp-hdrext/abs-send-time a=extmap:3 http://www.ietf.org/id/draft-holmer-rmcat-transport-wide-cc-extensions-01 a=extmap:14 urn:ietf:params:rtp-hdrext:toffset a=extmap:13 urn:3gpp:video-orientation a=extmap:5 http://www.webrtc.org/experiments/rtp-hdrext/playout-delay a=extmap:6 http://www.webrtc.org/experiments/rtp-hdrext/video-content-type a=extmap:7 http://www.webrtc.org/experiments/rtp-hdrext/video-timing a=ex[2022-05-16 13:06:27] DEBUG[662915] res_pjsip_transport_websocket.c: Request msg INVITE/cseq=8611 (rdata0x7f903c0bdda8) re-writing Contact URI from 3vtdi9kk68fl.invalid:0;transport=ws to :49386;transport=ws [2022-05-16 13:06:27] DEBUG[662915] res_pjsip/pjsip_distributor.c: Searching for serializer associated with dialog dlg0x7f8fac0d7768 for Request msg INVITE/cseq=8611 (rdata0x7f903c0bdda8) [2022-05-16 13:06:27] DEBUG[662915] res_pjsip/pjsip_distributor.c: Found serializer pjsip/distributor-000000e0 associated with dialog dlg0x7f8fac0d7768 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044 Adding position 0 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: Reusing existing media session [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: Setting media session as default for audio [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: Done [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044 Adding position 1 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: Reusing existing media session [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: Setting media session as default for video [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: Done [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044 Adding position 2 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: Reusing existing media session [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: Done [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Media count: 3 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Processing stream 0 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Using existing pending stream 0:audio-0:audio:sendrecv (nothing) [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044 Adding position 0 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: Using existing media_session [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Negotiating incoming SDP media stream 0:audio-0:audio:sendrecv (nothing) using audio SDP handler [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: PJSIP/o_webrtc-00000044 [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: Splitting '' into... [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: ...host '' and port ''. [2022-05-16 13:06:27] DEBUG[662915] res_rtp_asterisk.c: (0x7f903c01a580) RTCP ignoring duplicate property [2022-05-16 13:06:27] DEBUG[662915] res_rtp_asterisk.c: (0x7f903c01a580) DTLS RTP setup [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: PJSIP/o_webrtc-00000044 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: PJSIP/o_webrtc-00000044 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Setting tx payload type 9 based on m type on 0x7f8fb160aef0 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Setting tx payload type 8 based on m type on 0x7f8fb160aef0 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Setting tx payload type 0 based on m type on 0x7f8fb160aef0 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Setting tx payload type 13 based on m type on 0x7f8fb160aef0 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session/pjsip_session_caps.c: 'PJSIP/o_webrtc-00000044' Caps for incoming audio call with pref 'local' - remote: (ulaw|alaw|g722|opus) local: (opus|g722|alaw|ulaw|vp9) joint: (opus|g722|alaw|ulaw) [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Crossover copying tx to rx payload mapping 0 (0x7f903c0ba908) from 0x7f8fb160aef0 to 0x7f8fb160aef0 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Crossover copying tx to rx payload mapping 8 (0x7f903c0132d8) from 0x7f8fb160aef0 to 0x7f8fb160aef0 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Crossover copying tx to rx payload mapping 9 (0x7f903c17b788) from 0x7f8fb160aef0 to 0x7f8fb160aef0 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Crossover copying tx to rx payload mapping 13 (0x5608bccf1e48) from 0x7f8fb160aef0 to 0x7f8fb160aef0 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Crossover copying tx to rx payload mapping 111 (0x7f903c0adf88) from 0x7f8fb160aef0 to 0x7f8fb160aef0 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Crossover copying tx to rx payload mapping 126 (0x7f903c0bcf08) from 0x7f8fb160aef0 to 0x7f8fb160aef0 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Copying rx payload mapping 0 (0x7f903c0ba908) from 0x7f8fb160aef0 to 0x7f903c01a758 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Copying rx payload mapping 8 (0x7f903c0132d8) from 0x7f8fb160aef0 to 0x7f903c01a758 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Copying rx payload mapping 9 (0x7f903c17b788) from 0x7f8fb160aef0 to 0x7f903c01a758 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Copying rx payload mapping 13 (0x5608bccf1e48) from 0x7f8fb160aef0 to 0x7f903c01a758 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Copying rx payload mapping 111 (0x7f903c0adf88) from 0x7f8fb160aef0 to 0x7f903c01a758 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Copying rx payload mapping 126 (0x7f903c0bcf08) from 0x7f8fb160aef0 to 0x7f903c01a758 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Copying tx payload mapping 0 (0x7f903c0ba908) from 0x7f8fb160aef0 to 0x7f903c01a758 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Copying tx payload mapping 8 (0x7f903c0132d8) from 0x7f8fb160aef0 to 0x7f903c01a758 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Copying tx payload mapping 9 (0x7f903c17b788) from 0x7f8fb160aef0 to 0x7f903c01a758 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Copying tx payload mapping 13 (0x5608bccf1e48) from 0x7f8fb160aef0 to 0x7f903c01a758 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Copying tx payload mapping 111 (0x7f903c0adf88) from 0x7f8fb160aef0 to 0x7f903c01a758 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Copying tx payload mapping 126 (0x7f903c0bcf08) from 0x7f8fb160aef0 to 0x7f903c01a758 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Media stream 0:audio-0:audio:sendrecv (opus|g722|alaw|ulaw) handled by audio [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Processing stream 1 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Using existing pending stream 1:video-1:video:sendrecv (nothing) [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044 Adding position 1 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: Using existing media_session [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Negotiating incoming SDP media stream 1:video-1:video:sendrecv (nothing) using video SDP handler [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: PJSIP/o_webrtc-00000044 [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: Splitting '' into... [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: ...host '' and port ''. [2022-05-16 13:06:27] DEBUG[662915] res_rtp_asterisk.c: (0x7f903c01bf70) RTCP ignoring duplicate property [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: PJSIP/o_webrtc-00000044 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: PJSIP/o_webrtc-00000044 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session/pjsip_session_caps.c: 'PJSIP/o_webrtc-00000044' Caps for incoming video call with pref 'local' - remote: (vp8|vp9) local: (opus|g722|alaw|ulaw|vp9) joint: (vp9) [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Crossover copying tx to rx payload mapping 96 (0x7f903c176878) from 0x7f8fb160ae50 to 0x7f8fb160ae50 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Crossover copying tx to rx payload mapping 98 (0x7f903c0fd878) from 0x7f8fb160ae50 to 0x7f8fb160ae50 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Copying rx payload mapping 96 (0x7f903c176878) from 0x7f8fb160ae50 to 0x7f903c01c148 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Copying rx payload mapping 98 (0x7f903c0fd878) from 0x7f8fb160ae50 to 0x7f903c01c148 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Copying tx payload mapping 96 (0x7f903c176878) from 0x7f8fb160ae50 to 0x7f903c01c148 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Copying tx payload mapping 98 (0x7f903c0fd878) from 0x7f8fb160ae50 to 0x7f903c01c148 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Media stream 1:video-1:video:sendrecv (vp9) handled by video [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Processing stream 2 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Using existing pending stream 2:softbridge_dest_PJSIP/s_webrtc-00000047_1:video:sendrecv (nothing) [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044 Adding position 2 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: Using existing media_session [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Negotiating incoming SDP media stream 2:softbridge_dest_PJSIP/s_webrtc-00000047_1:video:sendrecv (nothing) using video SDP handler [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: PJSIP/o_webrtc-00000044 [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: Splitting '0.0.0.0' into... [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: ...host '0.0.0.0' and port ''. [2022-05-16 13:06:27] DEBUG[662915] res_rtp_asterisk.c: (0x7f9014048990) RTCP ignoring duplicate property [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: PJSIP/o_webrtc-00000044 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: PJSIP/o_webrtc-00000044 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session/pjsip_session_caps.c: 'PJSIP/o_webrtc-00000044' Caps for incoming video call with pref 'local' - remote: (vp8|vp9) local: (opus|g722|alaw|ulaw|vp9) joint: (vp9) [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Crossover copying tx to rx payload mapping 96 (0x7f903c0b9bd8) from 0x7f8fb160ad60 to 0x7f8fb160ad60 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Crossover copying tx to rx payload mapping 98 (0x7f903c071828) from 0x7f8fb160ad60 to 0x7f8fb160ad60 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Copying rx payload mapping 96 (0x7f903c0b9bd8) from 0x7f8fb160ad60 to 0x7f9014048b68 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Copying rx payload mapping 98 (0x7f903c071828) from 0x7f8fb160ad60 to 0x7f9014048b68 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Copying tx payload mapping 96 (0x7f903c0b9bd8) from 0x7f8fb160ad60 to 0x7f9014048b68 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Copying tx payload mapping 98 (0x7f903c071828) from 0x7f8fb160ad60 to 0x7f9014048b68 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Media stream 2:softbridge_dest_PJSIP/s_webrtc-00000047_1:video:sendrecv (vp9) handled by video [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Handled? yes [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Processing streams [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Processing stream 0:audio-0:audio:sendrecv (opus|g722|alaw|ulaw) [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044 Adding position 0 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: Using existing media_session [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044 Stream: 0:audio-0:audio:sendrecv (opus|g722|alaw|ulaw) [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: PJSIP/o_webrtc-00000044 Type: audio 0:audio-0:audio:sendrecv (opus|g722|alaw|ulaw) [2022-05-16 13:06:27] DEBUG[662915] res_rtp_asterisk.c: (0x7f903c01a580) RTCP ignoring duplicate property [2022-05-16 13:06:27] DEBUG[662915] res_rtp_asterisk.c: (0x7f903c01a580) DTLS RTP setup [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: Stream msid: 0x7f903c0680b0 audio bf8db262-03f6-41c3-a3cd-01ede83a40db 3fd90f4f-f65c-4548-8d9a-1de625d20bf8 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: RC: 1 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: Had handler [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Stream 0:audio-0:audio:sendrecv (opus|g722|alaw|ulaw) added with mid 0 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Done with 0:audio-0:audio:sendrecv (opus|g722|alaw|ulaw) [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Processing stream 1:video-1:video:sendrecv (vp9) [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044 Adding position 1 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: Using existing media_session [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044 Stream: 1:video-1:video:sendrecv (vp9) [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: PJSIP/o_webrtc-00000044 Type: video 1:video-1:video:sendrecv (vp9) [2022-05-16 13:06:27] DEBUG[662915] res_rtp_asterisk.c: (0x7f903c01a580) DTLS RTP setup [2022-05-16 13:06:27] DEBUG[662915] res_rtp_asterisk.c: (0x7f903c01bf70) RTCP ignoring duplicate property [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: Stream msid: 0x7f903c062160 video bf8db262-03f6-41c3-a3cd-01ede83a40db c82b7825-d8bb-4262-bd93-c2257d54b186 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: RC: 1 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: Had handler [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Stream 1:video-1:video:sendrecv (vp9) added with mid 1 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Done with 1:video-1:video:sendrecv (vp9) [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Processing stream 2:softbridge_dest_PJSIP/s_webrtc-00000047_1:video:sendrecv (vp9) [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044 Adding position 2 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: Using existing media_session [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044 Stream: 2:softbridge_dest_PJSIP/s_webrtc-00000047_1:video:sendrecv (vp9) [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: PJSIP/o_webrtc-00000044 Type: video 2:softbridge_dest_PJSIP/s_webrtc-00000047_1:video:sendrecv (vp9) [2022-05-16 13:06:27] DEBUG[662915] res_rtp_asterisk.c: (0x7f903c01a580) DTLS RTP setup [2022-05-16 13:06:27] DEBUG[662915] res_rtp_asterisk.c: (0x7f9014048990) RTCP ignoring duplicate property [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: Stream msid: 0x7f903c058480 video dd25124b-b244-4043-bb15-eb06b19da91c b4c69c86-93cc-467a-a5a9-6a7b6cf3cd69 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: Stream Label: 0x7f903c058480 video 1652699056.185 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: RC: 1 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: Had handler [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Stream 2:softbridge_dest_PJSIP/s_webrtc-00000047_1:video:sendrecv (vp9) added with mid video-2 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Done with 2:softbridge_dest_PJSIP/s_webrtc-00000047_1:video:sendrecv (vp9) [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Adding bundle groups (if available) [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Copying connection details [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Processing media 0 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Media 0 reset [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Processing media 1 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Media 1 has good existing connection info [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Processing media 2 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Media 2 has good existing connection info [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Set SDP answer [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Applying negotiated SDP media stream 'audio' using audio SDP handler [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: PJSIP/o_webrtc-00000044 Stream: 0:audio-0:audio:sendrecv (opus|g722|alaw|ulaw) [2022-05-16 13:06:27] DEBUG[662915] res_rtp_asterisk.c: (0x7f903c01a580) RTCP ignoring duplicate property [2022-05-16 13:06:27] DEBUG[662915] res_rtp_asterisk.c: (0x7f903c01a580) DTLS RTP setup [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: Splitting '' into... [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: ...host '' and port ''. [2022-05-16 13:06:27] DEBUG[662915] acl.c: For destination '', our source address is '192.168.1.210'. [2022-05-16 13:06:27] DEBUG[662915] res_rtp_asterisk.c: (0x7f903c01a580) RTCP setting address on RTP instance [2022-05-16 13:06:27] DEBUG[662915] acl.c: For destination '', our source address is '192.168.1.210'. [2022-05-16 13:06:27] DEBUG[662915] res_rtp_asterisk.c: (0x7f903c01bf70) RTCP setting address on RTP instance [2022-05-16 13:06:27] VERBOSE[662915] res_rtp_asterisk.c: 0x7f903c081780 -- Strict RTP learning after remote address set to: :63360 [2022-05-16 13:06:27] DEBUG[662915] acl.c: For destination '', our source address is '192.168.1.210'. [2022-05-16 13:06:27] DEBUG[662915] res_rtp_asterisk.c: (0x7f9014048990) RTCP setting address on RTP instance [2022-05-16 13:06:27] VERBOSE[662915] res_rtp_asterisk.c: 0x7f901403bf10 -- Strict RTP learning after remote address set to: :63360 [2022-05-16 13:06:27] VERBOSE[662915] res_rtp_asterisk.c: 0x7f903c079120 -- Strict RTP learning after remote address set to: :63360 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: (0x7f903c01a580) ICE process attributes [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: Splitting '' into... [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: ...host '' and port ''. [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: Splitting '0' into... [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: ...host '0' and port ''. [2022-05-16 13:06:27] DEBUG[662915] res_rtp_asterisk.c: (0x7f903c01a580) ICE add remote candidate [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: Splitting '172.24.64.1' into... [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: ...host '172.24.64.1' and port ''. [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: Splitting '0' into... [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: ...host '0' and port ''. [2022-05-16 13:06:27] DEBUG[662915] res_rtp_asterisk.c: (0x7f903c01a580) ICE add remote candidate [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: Splitting '192.168.1.52' into... [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: ...host '192.168.1.52' and port ''. [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: Splitting '0' into... [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: ...host '0' and port ''. [2022-05-16 13:06:27] DEBUG[662915] res_rtp_asterisk.c: (0x7f903c01a580) ICE add remote candidate [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: Splitting '192.168.244.1' into... [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: ...host '192.168.244.1' and port ''. [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: Splitting '0' into... [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: ...host '0' and port ''. [2022-05-16 13:06:27] DEBUG[662915] res_rtp_asterisk.c: (0x7f903c01a580) ICE add remote candidate [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: Splitting '192.168.187.1' into... [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: ...host '192.168.187.1' and port ''. [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: Splitting '0' into... [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: ...host '0' and port ''. [2022-05-16 13:06:27] DEBUG[662915] res_rtp_asterisk.c: (0x7f903c01a580) ICE add remote candidate [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: Splitting '' into... [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: ...host '' and port ''. [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: Splitting '192.168.1.52' into... [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: ...host '192.168.1.52' and port ''. [2022-05-16 13:06:27] DEBUG[662915] res_rtp_asterisk.c: (0x7f903c01a580) ICE add remote candidate [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: Splitting '' into... [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: ...host '' and port ''. [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: Splitting 'active' into... [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: ...host 'active' and port ''. [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: Splitting '172.24.64.1' into... [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: ...host '172.24.64.1' and port ''. [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: Splitting 'active' into... [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: ...host 'active' and port ''. [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: Splitting '192.168.1.52' into... [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: ...host '192.168.1.52' and port ''. [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: Splitting 'active' into... [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: ...host 'active' and port ''. [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: Splitting '192.168.244.1' into... [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: ...host '192.168.244.1' and port ''. [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: Splitting 'active' into... [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: ...host 'active' and port ''. [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: Splitting '192.168.187.1' into... [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: ...host '192.168.187.1' and port ''. [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: Splitting 'active' into... [2022-05-16 13:06:27] DEBUG[662915] netsock2.c: ...host 'active' and port ''. [2022-05-16 13:06:27] DEBUG[662915] res_rtp_asterisk.c: (0x7f903c01a580) ICE not setting role because state is nominating [2022-05-16 13:06:27] DEBUG[662915] res_rtp_asterisk.c: (0x7f903c01a580) ICE proposed equals active candidates [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: PJSIP/o_webrtc-00000044 ANSWER [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: PJSIP/o_webrtc-00000044 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Setting tx payload type 9 based on m type on 0x7f8fb160afc0 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Setting tx payload type 8 based on m type on 0x7f8fb160afc0 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Setting tx payload type 0 based on m type on 0x7f8fb160afc0 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Setting tx payload type 13 based on m type on 0x7f8fb160afc0 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Copying tx payload mapping 0 (0x7f903c158318) from 0x7f8fb160afc0 to 0x7f903c01a758 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Copying tx payload mapping 8 (0x7f903c16c788) from 0x7f8fb160afc0 to 0x7f903c01a758 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Copying tx payload mapping 9 (0x7f903c004128) from 0x7f8fb160afc0 to 0x7f903c01a758 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Copying tx payload mapping 13 (0x5608bccf1e48) from 0x7f8fb160afc0 to 0x7f903c01a758 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Copying tx payload mapping 111 (0x7f903c0fd908) from 0x7f8fb160afc0 to 0x7f903c01a758 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Copying tx payload mapping 126 (0x7f903c161968) from 0x7f8fb160afc0 to 0x7f903c01a758 [2022-05-16 13:06:27] DEBUG[662915] channel_internal_api.c: PJSIP/o_webrtc-00000044: MultistreamFormats: (vp9|opus) [2022-05-16 13:06:27] DEBUG[662915] channel_internal_api.c: Set native formats but not topology [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] stasis_bridges.c: Update: 0x7f903801ae98 Old: 146b47ff-7c76-42ca-99c9-f0a73b36da3d New: 146b47ff-7c76-42ca-99c9-f0a73b36da3d [2022-05-16 13:06:27] DEBUG[285592] stasis_bridges.c: Update: 0x7f903801ae98 Old: 146b47ff-7c76-42ca-99c9-f0a73b36da3d New: 146b47ff-7c76-42ca-99c9-f0a73b36da3d [2022-05-16 13:06:27] DEBUG[285554] threadpool.c: Increasing threadpool stasis/pool's size by 1 [2022-05-16 13:06:27] DEBUG[285554] threadpool.c: Increasing threadpool stasis/pool's size by 1 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: Handled [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Applied negotiated SDP media stream 'audio' using audio SDP handler [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Applied negotiated SDP media stream 'audio' using audio SDP handler [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Applying negotiated SDP media stream 'video' using video SDP handler [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: PJSIP/o_webrtc-00000044 Stream: 1:video-1:video:sendrecv (vp9) [2022-05-16 13:06:27] DEBUG[662915] res_rtp_asterisk.c: (0x7f903c01bf70) RTCP ignoring duplicate property [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: PJSIP/o_webrtc-00000044 ANSWER [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: PJSIP/o_webrtc-00000044 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Copying tx payload mapping 96 (0x7f903c012bf8) from 0x7f8fb160afd0 to 0x7f903c01c148 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Copying tx payload mapping 98 (0x7f903c0b37b8) from 0x7f8fb160afd0 to 0x7f903c01c148 [2022-05-16 13:06:27] DEBUG[662915] channel_internal_api.c: PJSIP/o_webrtc-00000044: MultistreamFormats: (opus|vp9) [2022-05-16 13:06:27] DEBUG[662915] channel_internal_api.c: Set native formats but not topology [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: [2022-05-16 13:06:27] DEBUG[662915] res_rtp_asterisk.c: (0x7f903c01bf70) DTLS - ast_rtp_activate rtp=0x7f903c081780 - setup and perform DTLS' [2022-05-16 13:06:27] DEBUG[662915] res_rtp_asterisk.c: (0x7f903c081780) DTLS perform handshake - ssl = (nil), setup = 0 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: moh [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Applied negotiated SDP media stream 'video' using video SDP handler [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Applied negotiated SDP media stream 'video' using video SDP handler [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Applying negotiated SDP media stream 'video' using video SDP handler [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: PJSIP/o_webrtc-00000044 Stream: 2:softbridge_dest_PJSIP/s_webrtc-00000047_1:video:sendrecv (vp9) [2022-05-16 13:06:27] DEBUG[662915] res_rtp_asterisk.c: (0x7f9014048990) RTCP ignoring duplicate property [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: PJSIP/o_webrtc-00000044 ANSWER [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: PJSIP/o_webrtc-00000044 [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] stasis_bridges.c: Update: 0x7f903801c228 Old: 146b47ff-7c76-42ca-99c9-f0a73b36da3d New: 146b47ff-7c76-42ca-99c9-f0a73b36da3d [2022-05-16 13:06:27] DEBUG[285592] stasis_bridges.c: Update: 0x7f903801c228 Old: 146b47ff-7c76-42ca-99c9-f0a73b36da3d New: 146b47ff-7c76-42ca-99c9-f0a73b36da3d [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Copying tx payload mapping 96 (0x7f903c047bf8) from 0x7f8fb160afb0 to 0x7f9014048b68 [2022-05-16 13:06:27] DEBUG[662915] rtp_engine.c: Copying tx payload mapping 98 (0x7f903c14de18) from 0x7f8fb160afb0 to 0x7f9014048b68 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: [2022-05-16 13:06:27] DEBUG[662915] res_rtp_asterisk.c: (0x7f9014048990) DTLS - ast_rtp_activate rtp=0x7f901403bf10 - setup and perform DTLS' [2022-05-16 13:06:27] DEBUG[662915] res_rtp_asterisk.c: (0x7f901403bf10) DTLS perform handshake - ssl = (nil), setup = 0 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_sdp_rtp.c: moh [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Applied negotiated SDP media stream 'video' using video SDP handler [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Applied negotiated SDP media stream 'video' using video SDP handler [2022-05-16 13:06:27] DEBUG[662915] channel_internal_api.c: PJSIP/o_webrtc-00000044: <0:audio-0:audio:sendrecv (opus|g722|alaw|ulaw)> <1:video-1:video:sendrecv (vp9)> <2:softbridge_dest_PJSIP/s_webrtc-00000047_1:video:sendrecv (vp9)> [2022-05-16 13:06:27] DEBUG[662915] channel_internal_api.c: Used provided topology [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044 [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] bridge_softmix.c: PJSIP/o_webrtc-00000044: [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] bridge_softmix.c: PJSIP/o_webrtc-00000044: OT: <0:audio-0:audio:sendrecv (opus|g722|alaw|ulaw)> <1:video-1:video:sendrecv (vp9)> <2:softbridge_dest_PJSIP/s_webrtc-00000047_1:video:sendonly (vp9)> NT: <0:audio-0:audio:sendrecv (opus|g722|alaw|ulaw)> <1:video-1:video:sendrecv (vp9)> <2:softbridge_dest_PJSIP/s_webrtc-00000047_1:video:sendrecv (vp9)> [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] bridge_softmix.c: PJSIP/o_webrtc-00000044: Checking for state changes [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] bridge_softmix.c: PJSIP/o_webrtc-00000044: Slot: 0 Old stream: 0:audio-0:audio:sendrecv (opus|g722|alaw|ulaw) New stream: 0:audio-0:audio:sendrecv (opus|g722|alaw|ulaw) [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] bridge_softmix.c: PJSIP/o_webrtc-00000044: Stream 0 ignored [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] bridge_softmix.c: PJSIP/o_webrtc-00000044: Slot: 1 Old stream: 1:video-1:video:sendrecv (vp9) New stream: 1:video-1:video:sendrecv (vp9) [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] bridge_softmix.c: PJSIP/o_webrtc-00000044: Stream 1:video-1 didn't do anything [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] bridge_softmix.c: [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] bridge_softmix.c: PJSIP/o_webrtc-00000044: Slot: 2 Old stream: 2:softbridge_dest_PJSIP/s_webrtc-00000047_1:video:sendonly (vp9) New stream: 2:softbridge_dest_PJSIP/s_webrtc-00000047_1:video:sendrecv (vp9) [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] bridge_softmix.c: PJSIP/o_webrtc-00000044: Stream 2 ignored [2022-05-16 13:06:27] VERBOSE[662915] res_pjsip_logger.c: <--- Transmitting SIP response (3071 bytes) to WSS::49386 ---> SIP/2.0 200 OK Via: SIP/2.0/WSS 3vtdi9kk68fl.invalid;rport=49386;received=;branch=z9hG4bK1424262 Call-ID: mrvuvb54flmhbci2kkae From: ;tag=3tvt9ueofa To: ;tag=96708346-e6ca-4e71-b940-adb2ab32a463 CSeq: 8611 INVITE Session-Expires: 1800;refresher=uac Require: timer Contact: Allow: OPTIONS, REGISTER, SUBSCRIBE, NOTIFY, PUBLISH, INVITE, ACK, BYE, CANCEL, UPDATE, PRACK, MESSAGE, REFER Supported: 100rel, timer, replaces, norefersub Server: domain.com pbx Content-Type: application/sdp Content-Length: 2443 v=0 o=- 3341428139 6 IN IP4 192.168.1.210 s=domain.com pbx c=IN IP4 192.168.1.210 t=0 0 a=msid-semantic:WMS * a=group:BUNDLE 0 1 video-2 m=audio 4136 UDP/TLS/RTP/SAVPF 111 9 8 0 126 a=connection:existing a=setup:active a=fingerprint:SHA-256 A9:33:FB:CE:1C:15:4D:90:B1:85:92:8C:66:5B:6B:BA:86:30:45:79:56:01:6A:60:A1:92:41:ED:26:C9:AE:E5 a=ice-ufrag:57e29d8b5956a2e8291c697517bdb3e2 a=ice-pwd:400679b7133f17263cf840ee10d22f3a a=candidate:Hc0a801d2 1 UDP 2130706431 192.168.1.210 4136 typ host a=candidate:Sd4f70495 1 UDP 1694498815 4136 typ srflx raddr 192.168.1.210 rport 4136 a=rtpmap:111 opus/48000/2 a=fmtp:111 useinbandfec=1 a=rtpmap:9 G722/8000 a=rtpmap:8 PCMA/8000 a=rtpmap:0 PCMU/8000 a=rtpmap:126 telephone-event/8000 a=fmtp:126 0-16 a=ptime:20 a=maxptime:20 a=sendrecv a=rtcp-mux a=ssrc:1096272342 cname:f76cb9b7-3711-47c6-b2b0-6e290772ec29 a=msid:bf8db262-03f6-41c3-a3cd-01ede83a40db 3fd90f4f-f65c-4548-8d9a-1de625d20bf8 a=rtcp-fb:* transport-cc a=mid:0 m=video 4136 UDP/TLS/RTP/SAVPF 98 a=connection:existing a=setup:active a=fingerprint:SHA-256 A9:33:FB:CE:1C:15:4D:90:B1:85:92:8C:66:5B:6B:BA:86:30:45:79:56:01:6A:60:A1:92:41:ED:26:C9:AE:E5 a=ice-ufrag:57e29d8b5956a2e8291c697517bdb3e2 a=ice-pwd:400679b7133f17263cf840ee10d22f3a a=rtpmap:98 VP9/90000 a=sendrecv a=rtcp-mux a=ssrc:2085728958 cname:c3a506b9-2147-47d3-9816-004bad3311ae a=msid:bf8db262-03f6-41c3-a3cd-01ede83a40db c82b7825-d8bb-4262-bd93-c2257d54b186 a=rtcp-fb:* transport-cc a=rtcp-fb:* ccm fir a=rtcp-fb:* nack a=extmap:2 http://www.webrtc.org/experiments/rtp-hdrext/abs-send-time a=extmap:3 http://www.ietf.org/id/draft-holmer-rmcat-transport-wide-cc-extensions-01 a=mid:1 m=video 4136 UDP/TLS/RTP/SAVPF 98 a=connection:existing a=setup:active a=fingerprint:SHA-256 A9:33:FB:CE:1C:15:4D:90:B1:85:92:8C:66:5B:6B:BA:86:30:45:79:56:01:6A:60:A1:92:41:ED:26:C9:AE:E5 a=ice-ufrag:57e29d8b5956a2e8291c697517bdb3e2 a=ice-pwd:400679b7133f17263cf840ee10d22f3a a=rtpmap:98 VP9/90000 a=sendrecv a=rtcp-mux a=ssrc:949232644 cname:ad9c634c-f981-477e-beaf-059752325127 a=msid:dd25124b-b244-4043-bb15-eb06b19da91c b4c69c86-93cc-467a-a5a9-6a7b6cf3cd69 a=label:1652699056.185 a=rtcp-fb:* transport-cc a=rtcp-fb:* ccm fir a=rtcp-fb:* nack a=extmap:2 http://www.webrtc.org/experiments/rtp-hdrext/abs-send-time a=extmap:3 http://www.ietf.org/id/draft-holmer-rmcat-transport-wide-cc-extensions-01 a=mid:video-2 [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] bridge_softmix.c: PJSIP/o_webrtc-00000044: Checking for newly added streams [2022-05-16 13:06:27] DEBUG[662915] res_http_websocket.c: Writing websocket text frame, length 3071 [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] bridge_softmix.c: PJSIP/o_webrtc-00000044: Nothing added or removed [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] bridge_softmix.c: [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] bridge_softmix.c: PJSIP/o_webrtc-00000044 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044 TSX State: Completed Inv State: CONFIRMED [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: Function session_inv_on_tsx_state_changed called on event TSX_STATE [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: The state change pertains to the endpoint 'o_webrtc(PJSIP/o_webrtc-00000044)' [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: The inv session still has an invite_tsx (0x7f903c04c998) [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: The UAS INVITE transaction involved in this state change is 0x7f903c04c998 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: The current transaction state is Completed [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: The transaction state change event is TX_MSG [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: The current inv state is CONFIRMED [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: Nothing delayed [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044 TSX State: Completed Inv State: CONFIRMED [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: Topology: Pending: (null topology) Active: <0:audio-0:audio:sendrecv (opus|g722|alaw|ulaw)> <1:video-1:video:sendrecv (vp9)> <2:softbridge_dest_PJSIP/s_webrtc-00000047_1:video:sendrecv (vp9)> [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044 TSX State: Completed Inv State: CONFIRMED [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: Function session_inv_on_tsx_state_changed called on event TSX_STATE [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: The state change pertains to the endpoint 'o_webrtc(PJSIP/o_webrtc-00000044)' [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: The inv session still has an invite_tsx (0x7f903c04c998) [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: The UAS INVITE transaction involved in this state change is 0x7f903c04c998 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: The current transaction state is Completed [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: The transaction state change event is RX_MSG [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: The current inv state is CONFIRMED [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044: Method is INVITE [2022-05-16 13:06:27] DEBUG[662915] chan_pjsip.c: PJSIP/o_webrtc-00000044 [2022-05-16 13:06:27] DEBUG[662915] chan_pjsip.c: PJSIP/o_webrtc-00000044: No channel [2022-05-16 13:06:27] DEBUG[662915] chan_pjsip.c: PJSIP/o_webrtc-00000044 [2022-05-16 13:06:27] DEBUG[662915] chan_pjsip.c: Reinvite [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044 [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: Nothing delayed [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: PJSIP/o_webrtc-00000044 TSX State: Completed Inv State: CONFIRMED [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: Topology: Pending: (null topology) Active: <0:audio-0:audio:sendrecv (opus|g722|alaw|ulaw)> <1:video-1:video:sendrecv (vp9)> <2:softbridge_dest_PJSIP/s_webrtc-00000047_1:video:sendrecv (vp9)> [2022-05-16 13:06:27] DEBUG[662915] res_pjsip_session.c: [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] acl.c: For destination '192.168.1.52', our source address is '192.168.1.210'. [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] res_rtp_asterisk.c: (0x7f903c01bf70) RTCP setting address on RTP instance [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] res_rtp_asterisk.c: (0x7f903c01a580) RTCP got report of 20 bytes from 192.168.1.52:63360 [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] chan_pjsip.c: PJSIP/o_webrtc-00000044: Indicated Video Update [2022-05-16 13:06:27] DEBUG[1330567][C-6281d375] chan_pjsip.c: PJSIP/s_webrtc-00000047: Indicated Video Update [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] chan_pjsip.c: PJSIP/o_webrtc-00000044 [2022-05-16 13:06:27] DEBUG[1330567][C-6281d375] chan_pjsip.c: PJSIP/s_webrtc-00000047 [2022-05-16 13:06:27] DEBUG[285603] manager.c: Examining AMI event: Event: RTCPReceived Privilege: reporting,all Channel: PJSIP/o_webrtc-00000044 ChannelState: 6 ChannelStateDesc: Up CallerIDNum: 14 CallerIDName: o dev4 *** Ragnars Café ConnectedLineNum: ConnectedLineName: Language: se_pbx-1 AccountCode: Context: trunk2 Exten: case*563 Priority: 25 Uniqueid: 1652699046.174 Linkedid: 1652699046.174 To: 192.168.1.210:4136 From: 192.168.1.52:63360 RTT: 0.0015 SSRC: 0x81ce0002 PT: 201(RR) ReportCount: 0 [2022-05-16 13:06:27] DEBUG[285603] manager.c: Examining AMI event: Event: RTCPSent Privilege: reporting,all Channel: PJSIP/o_webrtc-00000044 ChannelState: 6 ChannelStateDesc: Up CallerIDNum: 14 CallerIDName: o dev4 *** Ragnars Café ConnectedLineNum: ConnectedLineName: Language: se_pbx-1 AccountCode: Context: trunk2 Exten: case*563 Priority: 25 Uniqueid: 1652699046.174 Linkedid: 1652699046.174 To: 192.168.1.52:63360 From: 192.168.1.210:4146 SSRC: 0x7c51b2be PT: 201(RR) ReportCount: 1 Report0SourceSSRC: 0x9787b639 Report0FractionLost: 0 Report0CumulativeLost: 0 Report0HighestSequence: 32405 Report0SequenceNumberCycles: 0 Report0IAJitter: 1833 Report0LSR: 0 Report0DLSR: 0.0000 [2022-05-16 13:06:27] DEBUG[285603] manager.c: Examining AMI event: Event: RTCPSent Privilege: reporting,all Channel: PJSIP/o_webrtc-00000044 ChannelState: 6 ChannelStateDesc: Up CallerIDNum: 14 CallerIDName: o dev4 *** Ragnars Café ConnectedLineNum: ConnectedLineName: Language: se_pbx-1 AccountCode: Context: trunk2 Exten: case*563 Priority: 25 Uniqueid: 1652699046.174 Linkedid: 1652699046.174 To: :63360 From: 192.168.1.210:4146 SSRC: 0x38942404 PT: 200(SR) ReportCount: 1 SentNTP: 1652699187.505295 SentRTP: 4191304558 SentPackets: 15062 SentOctets: 16184560 Report0SourceSSRC: 0x6f70f2e9 Report0FractionLost: 0 Report0CumulativeLost: 1 Report0HighestSequence: 0 Report0SequenceNumberCycles: 0 Report0IAJitter: 0 Report0LSR: 0 Report0DLSR: 0.0000 [2022-05-16 13:06:27] DEBUG[285603] manager.c: Examining AMI event: Event: RTCPSent Privilege: reporting,all Channel: PJSIP/s_webrtc-00000047 ChannelState: 6 ChannelStateDesc: Up CallerIDNum: 77 CallerIDName: ConnectedLineNum: case*563 ConnectedLineName: case*563 Language: se AccountCode: Context: conference-for-case Exten: case*563 Priority: 25 Uniqueid: 1652699056.185 Linkedid: 1652699056.177 To: 192.168.1.59:52807 From: 192.168.1.210:4096 SSRC: 0x497332ed PT: 201(RR) ReportCount: 1 Report0SourceSSRC: 0x01242955 Report0FractionLost: 0 Report0CumulativeLost: 0 Report0HighestSequence: 34531 Report0SequenceNumberCycles: 0 Report0IAJitter: 1496 Report0LSR: 0 Report0DLSR: 0.0000 [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] res_rtp_asterisk.c: (0x7f903c01a580) RTCP got report of 44 bytes from 192.168.1.52:63360 [2022-05-16 13:06:27] DEBUG[285603] manager.c: Examining AMI event: Event: RTCPReceived Privilege: reporting,all Channel: PJSIP/o_webrtc-00000044 ChannelState: 6 ChannelStateDesc: Up CallerIDNum: 14 CallerIDName: o dev4 *** Ragnars Café ConnectedLineNum: ConnectedLineName: Language: se_pbx-1 AccountCode: Context: trunk2 Exten: case*563 Priority: 25 Uniqueid: 1652699046.174 Linkedid: 1652699046.174 To: 192.168.1.210:4136 From: 192.168.1.52:63360 RTT: 0.0007 SSRC: 0x38942404 PT: 201(RR) ReportCount: 1 Report0SourceSSRC: 0x38942404 Report0FractionLost: 0 Report0CumulativeLost: 0 Report0HighestSequence: 22328 Report0SequenceNumberCycles: 0 Report0IAJitter: 0 Report0LSR: 0 Report0DLSR: 0.0000 [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] acl.c: For destination '192.168.1.52', our source address is '192.168.1.210'. [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] res_rtp_asterisk.c: (0x7f903c01bf70) RTCP setting address on RTP instance [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] acl.c: For destination '192.168.1.52', our source address is '192.168.1.210'. [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] res_rtp_asterisk.c: (0x7f903c01bf70) RTCP setting address on RTP instance [2022-05-16 13:06:27] VERBOSE[899713] res_pjsip_logger.c: <--- Received SIP request (443 bytes) from WSS::49386 ---> ACK sip:192.168.1.210:4062;transport=ws SIP/2.0 Via: SIP/2.0/WSS 3vtdi9kk68fl.invalid;branch=z9hG4bK8725597 Max-Forwards: 69 To: ;tag=96708346-e6ca-4e71-b940-adb2ab32a463 From: ;tag=3tvt9ueofa Call-ID: mrvuvb54flmhbci2kkae CSeq: 8611 ACK Allow: INVITE,ACK,CANCEL,BYE,UPDATE,MESSAGE,OPTIONS,REFER,INFO,NOTIFY Supported: outbound User-Agent: JsSIP 3.9.0 Content-Length: 0 [2022-05-16 13:06:27] DEBUG[899713] res_pjsip/pjsip_distributor.c: Searching for serializer associated with dialog dlg0x7f8fac0d7768 for Request msg ACK/cseq=8611 (rdata0x7f903c0bdda8) [2022-05-16 13:06:27] DEBUG[899713] res_pjsip/pjsip_distributor.c: Found serializer pjsip/distributor-000000e0 associated with dialog dlg0x7f8fac0d7768 [2022-05-16 13:06:27] DEBUG[899713] res_pjsip_session.c: PJSIP/o_webrtc-00000044 TSX State: Terminated Inv State: CONFIRMED [2022-05-16 13:06:27] DEBUG[899713] res_pjsip_session.c: Function session_inv_on_tsx_state_changed called on event TSX_STATE [2022-05-16 13:06:27] DEBUG[899713] res_pjsip_session.c: The state change pertains to the endpoint 'o_webrtc(PJSIP/o_webrtc-00000044)' [2022-05-16 13:06:27] DEBUG[899713] res_pjsip_session.c: The inv session does NOT have an invite_tsx [2022-05-16 13:06:27] DEBUG[899713] res_pjsip_session.c: The UAS INVITE transaction involved in this state change is 0x7f903c04c998 [2022-05-16 13:06:27] DEBUG[899713] res_pjsip_session.c: The current transaction state is Terminated [2022-05-16 13:06:27] DEBUG[899713] res_pjsip_session.c: The transaction state change event is USER [2022-05-16 13:06:27] DEBUG[899713] res_pjsip_session.c: The current inv state is CONFIRMED [2022-05-16 13:06:27] DEBUG[899713] res_pjsip_session.c: Nothing delayed [2022-05-16 13:06:27] DEBUG[899713] res_pjsip_session.c: PJSIP/o_webrtc-00000044 TSX State: Terminated Inv State: CONFIRMED [2022-05-16 13:06:27] DEBUG[899713] res_pjsip_session.c: Topology: Pending: (null topology) Active: <0:audio-0:audio:sendrecv (opus|g722|alaw|ulaw)> <1:video-1:video:sendrecv (vp9)> <2:softbridge_dest_PJSIP/s_webrtc-00000047_1:video:sendrecv (vp9)> [2022-05-16 13:06:27] DEBUG[899713] res_pjsip_session.c: [2022-05-16 13:06:27] DEBUG[899713] res_pjsip_session.c: PJSIP/o_webrtc-00000044 Request: ACK [2022-05-16 13:06:27] DEBUG[899713] res_pjsip_session.c: PJSIP/o_webrtc-00000044 Handled request ACK ? yes [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] acl.c: For destination '192.168.1.52', our source address is '192.168.1.210'. [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] res_rtp_asterisk.c: (0x7f903c01bf70) RTCP setting address on RTP instance [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] acl.c: For destination '192.168.1.52', our source address is '192.168.1.210'. [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] res_rtp_asterisk.c: (0x7f903c01bf70) RTCP setting address on RTP instance [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] res_rtp_asterisk.c: (0x7f903c01a580) RTCP got report of 68 bytes from 192.168.1.52:63360 [2022-05-16 13:06:27] DEBUG[285603] manager.c: Examining AMI event: Event: RTCPReceived Privilege: reporting,all Channel: PJSIP/o_webrtc-00000044 ChannelState: 6 ChannelStateDesc: Up CallerIDNum: 14 CallerIDName: o dev4 *** Ragnars Café ConnectedLineNum: ConnectedLineName: Language: se_pbx-1 AccountCode: Context: trunk2 Exten: case*563 Priority: 25 Uniqueid: 1652699046.174 Linkedid: 1652699046.174 To: 192.168.1.210:4136 From: 192.168.1.52:63360 RTT: 0.0015 SSRC: 0x81ca0006 PT: 201(RR) ReportCount: 0 [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] res_rtp_asterisk.c: (0x7f903c01a580) RTCP got report of 20 bytes from 192.168.1.52:63360 [2022-05-16 13:06:27] DEBUG[285603] manager.c: Examining AMI event: Event: RTCPReceived Privilege: reporting,all Channel: PJSIP/o_webrtc-00000044 ChannelState: 6 ChannelStateDesc: Up CallerIDNum: 14 CallerIDName: o dev4 *** Ragnars Café ConnectedLineNum: ConnectedLineName: Language: se_pbx-1 AccountCode: Context: trunk2 Exten: case*563 Priority: 25 Uniqueid: 1652699046.174 Linkedid: 1652699046.174 To: 192.168.1.210:4136 From: 192.168.1.52:63360 RTT: 0.0015 SSRC: 0x81ce0002 PT: 201(RR) ReportCount: 0 [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] res_rtp_asterisk.c: (0x7f903c01a580) RTCP got report of 44 bytes from 192.168.1.52:63360 [2022-05-16 13:06:27] DEBUG[285603] manager.c: Examining AMI event: Event: RTCPReceived Privilege: reporting,all Channel: PJSIP/o_webrtc-00000044 ChannelState: 6 ChannelStateDesc: Up CallerIDNum: 14 CallerIDName: o dev4 *** Ragnars Café ConnectedLineNum: ConnectedLineName: Language: se_pbx-1 AccountCode: Context: trunk2 Exten: case*563 Priority: 25 Uniqueid: 1652699046.174 Linkedid: 1652699046.174 To: 192.168.1.210:4136 From: 192.168.1.52:63360 RTT: 0.0009 SSRC: 0x38942404 PT: 201(RR) ReportCount: 1 Report0SourceSSRC: 0x38942404 Report0FractionLost: 0 Report0CumulativeLost: 0 Report0HighestSequence: 22335 Report0SequenceNumberCycles: 0 Report0IAJitter: 50 Report0LSR: 2930999643 Report0DLSR: 0.0507 [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] res_rtp_asterisk.c: (0x7f9014048990) RTP 0x7f901403bf10 -- Received packet from 192.168.1.52:63360, dropping due to strict RTP protection. Qualifying new stream. [2022-05-16 13:06:27] VERBOSE[1329917][C-6281d374] res_rtp_asterisk.c: 0x7f901403bf10 -- Strict RTP qualifying stream type: video [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] res_rtp_asterisk.c: (0x7f9014048990) RTP 0x7f901403bf10 -- Received packet from 192.168.1.52:63360, dropping due to strict RTP protection. Will switch to it in 3 packets. [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] res_rtp_asterisk.c: (0x7f9014048990) RTP 0x7f901403bf10 -- Received packet from 192.168.1.52:63360, dropping due to strict RTP protection. Will switch to it in 2 packets. [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] res_rtp_asterisk.c: (0x7f9014048990) RTP 0x7f901403bf10 -- Received packet from 192.168.1.52:63360, dropping due to strict RTP protection. Will switch to it in 1 packets. [2022-05-16 13:06:27] VERBOSE[1329917][C-6281d374] res_rtp_asterisk.c: 0x7f901403bf10 -- Strict RTP switching source address to 192.168.1.52:63360 [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] acl.c: For destination '192.168.1.52', our source address is '192.168.1.210'. [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] res_rtp_asterisk.c: (0x7f9014048990) RTCP setting address on RTP instance [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] acl.c: For destination '192.168.1.52', our source address is '192.168.1.210'. [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] res_rtp_asterisk.c: (0x7f9014048990) RTCP setting address on RTP instance [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] res_rtp_asterisk.c: (0x7f903c01a580) RTCP got report of 80 bytes from 192.168.1.52:63360 [2022-05-16 13:06:27] DEBUG[285603] manager.c: Examining AMI event: Event: RTCPReceived Privilege: reporting,all Channel: PJSIP/o_webrtc-00000044 ChannelState: 6 ChannelStateDesc: Up CallerIDNum: 14 CallerIDName: o dev4 *** Ragnars Café ConnectedLineNum: ConnectedLineName: Language: se_pbx-1 AccountCode: Context: trunk2 Exten: case*563 Priority: 25 Uniqueid: 1652699046.174 Linkedid: 1652699046.174 To: 192.168.1.210:4136 From: 192.168.1.52:63360 RTT: 0.0015 SSRC: 0xe62caeb3 PT: 200(SR) ReportCount: 0 SentNTP: 1652699187.103881 SentRTP: 4105008975 SentPackets: 0 SentOctets: 0 [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] acl.c: For destination '192.168.1.52', our source address is '192.168.1.210'. [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] res_rtp_asterisk.c: (0x7f903c01bf70) RTCP setting address on RTP instance [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] acl.c: For destination '192.168.1.52', our source address is '192.168.1.210'. [2022-05-16 13:06:27] DEBUG[1329917][C-6281d374] res_rtp_asterisk.c: (0x7f903c01bf70) RTCP setting address on RTP instance [2022-05-16 13:06:27] DEBUG[1330567][C-6281d375] res_rtp_asterisk.c: (0x7f8fdc026e40) RTCP got report of 80 bytes from 192.168.1.59:52807 [2022-05-16 13:06:27] DEBUG[285603] manager.c: Examining AMI event: Event: RTCPReceived Privilege: reporting,all Channel: PJSIP/s_webrtc-00000047 ChannelState: 6 ChannelStateDesc: Up CallerIDNum: 77 CallerIDName: ConnectedLineNum: case*563 ConnectedLineName: case*563 Language: se AccountCode: Context: conference-for-case Exten: case*563 Priority: 25 Uniqueid: 1652699056.185 Linkedid: 1652699056.177 To: 192.168.1.210:4156 From: 192.168.1.59:52807 RTT: 0.0008 SSRC: 0xe62caeba PT: 200(SR) ReportCount: 0 SentNTP: 1652699194.503281 SentRTP: 4191325528 SentPackets: 15101 SentOctets: 15946012