[OpenSIPS-Users] rtpengine_block_dtmf
Alberto
alberto.rinaudo at gmail.com
Tue Jan 21 23:27:56 UTC 2025
Hi Răzvan,
Thanks, but then I don't know what I'm doing wrong.
Here's a piece of my config:
branch_route[invite_branch_route] {
if (has_body("application/sdp")) {
xlog("L_NOTICE", "[ln $cfg_line] [$ci | $si | $rm] Start rtp
streams\n");
rtpengine_manage("directional RTP/AVP trust-address replace-origin
replace-session-connection codec-strip-all codec-except-telephone-event
codec-except-CN codec-except-PCMA");
}
}
onreply_route[invite_onreply_route] {
$acc_extra(callee_domain) = $si;
if (has_body("application/sdp")) {
xlog("L_NOTICE", "[ln $cfg_line] [$ci | $si | $rm | $rs] Update rtp
streams\n");
rtpengine_manage();
xlog("L_NOTICE", "[ln $cfg_line] [$ci | $si | $rm | $rs] Block DTMF
from $tt\n");
rtpengine_block_dtmf("directional from-tag=$tt");
}
}
I wasn't sure where to put the directional flag, so I tried first in
rtpengine_manage, then in rtpengine_block_dtmf, then in both. Result is the
same, DTMF are always blocked for the entire call.
Logs from opensips:
Jan 21 23:22:26 local-opensips opensips[2027]: Jan 21 23:22:26 [2027]
NOTICE:[ln 361] [ef0c76ea-adbc-4a09-bf2d-9df7f6f872bc | 10.0.0.69 | INVITE]
t_relay
Jan 21 23:22:26 local-opensips opensips[2027]: Jan 21 23:22:26 [2027]
NOTICE:[ln 371] [ef0c76ea-adbc-4a09-bf2d-9df7f6f872bc | 10.0.0.69 | INVITE]
Start rtp streams
Jan 21 23:22:26 local-opensips opensips[2029]: Jan 21 23:22:26 [2029]
NOTICE:[ln 380] [ef0c76ea-adbc-4a09-bf2d-9df7f6f872bc | 10.0.0.46 | INVITE
| 200] Update rtp streams
Jan 21 23:22:26 local-opensips opensips[2029]: Jan 21 23:22:26 [2029]
NOTICE:[ln 383] [ef0c76ea-adbc-4a09-bf2d-9df7f6f872bc | 10.0.0.46 | INVITE
| 200] Block DTMF from a369dd65-3212-4728-a22d-4bcdd0857b39
Jan 21 23:22:26 local-opensips opensips[2029]: Jan 21 23:22:26 [2029]
NOTICE:[ln 271] [ef0c76ea-adbc-4a09-bf2d-9df7f6f872bc | 10.0.0.69 | ACK]
topology_hiding_match OK
Jan 21 23:22:26 local-opensips opensips[2029]: Jan 21 23:22:26 [2029]
NOTICE:[ln 300] [ef0c76ea-adbc-4a09-bf2d-9df7f6f872bc | 10.0.0.69 | ACK]
t_relay
Jan 21 23:22:33 local-opensips opensips[2027]: Jan 21 23:22:33 [2027]
NOTICE:[ln 271] [ef0c76ea-adbc-4a09-bf2d-9df7f6f872bc | 10.0.0.69 | BYE]
topology_hiding_match OK
Jan 21 23:22:33 local-opensips opensips[2027]: Jan 21 23:22:33 [2027]
NOTICE:[ln 296] [ef0c76ea-adbc-4a09-bf2d-9df7f6f872bc | 10.0.0.69 | BYE]
Close rtp streams if any
Jan 21 23:22:33 local-opensips opensips[2027]: Jan 21 23:22:33 [2027]
NOTICE:[ln 300] [ef0c76ea-adbc-4a09-bf2d-9df7f6f872bc | 10.0.0.69 | BYE]
t_relay
Logs from rtpengine:
Jan 21 23:22:26 local-opensips rtpengine[1254]: INFO:
[ef0c76ea-adbc-4a09-bf2d-9df7f6f872bc]: [control] Received command 'offer'
from 127.0.0.1:52434
Jan 21 23:22:26 local-opensips rtpengine[1254]: INFO:
[ef0c76ea-adbc-4a09-bf2d-9df7f6f872bc]: [core] replace-session-connection
flag encountered, but not supported anymore.
Jan 21 23:22:26 local-opensips rtpengine[1254]: NOTICE:
[ef0c76ea-adbc-4a09-bf2d-9df7f6f872bc]: [core] Creating new call
Jan 21 23:22:26 local-opensips rtpengine[1254]: INFO:
[ef0c76ea-adbc-4a09-bf2d-9df7f6f872bc]: [control] Replying to 'offer' from
127.0.0.1:52434 (elapsed time 0.000364 sec)
Jan 21 23:22:26 local-opensips rtpengine[1254]: INFO:
[ef0c76ea-adbc-4a09-bf2d-9df7f6f872bc]: [control] Received command 'answer'
from 127.0.0.1:38934
Jan 21 23:22:26 local-opensips rtpengine[1254]: INFO:
[ef0c76ea-adbc-4a09-bf2d-9df7f6f872bc]: [control] Replying to 'answer' from
127.0.0.1:38934 (elapsed time 0.000505 sec)
Jan 21 23:22:26 local-opensips rtpengine[1254]: INFO:
[ef0c76ea-adbc-4a09-bf2d-9df7f6f872bc]: [control] Received command 'block
DTMF' from 127.0.0.1:38934
Jan 21 23:22:26 local-opensips rtpengine[1254]: INFO:
[ef0c76ea-adbc-4a09-bf2d-9df7f6f872bc]: [core] Blocking DTMF (entire call)
Jan 21 23:22:26 local-opensips rtpengine[1254]: INFO:
[ef0c76ea-adbc-4a09-bf2d-9df7f6f872bc]: [control] Replying to 'block DTMF'
from 127.0.0.1:38934 (elapsed time 0.000037 sec)
Jan 21 23:22:30 local-opensips rtpengine[1254]: INFO:
[ef0c76ea-adbc-4a09-bf2d-9df7f6f872bc/63c659c2-ff03-4673-a4f9-96a145ec6d45/1
port 28640]: [core] Confirmed peer address as 10.0.0.69:19446
Jan 21 23:22:30 local-opensips rtpengine[1254]: INFO:
[ef0c76ea-adbc-4a09-bf2d-9df7f6f872bc/63c659c2-ff03-4673-a4f9-96a145ec6d45/1
port 28640]: [core] Kernelizing media stream: 10.0.0.69:19446 ->
10.0.0.18:28640 | 10.0.0.18:31230 -> 10.0.0.46:19502
Jan 21 23:22:31 local-opensips rtpengine[1254]: INFO:
[ef0c76ea-adbc-4a09-bf2d-9df7f6f872bc/63c659c2-ff03-4673-a4f9-96a145ec6d45/1
port 28641]: [core] Confirmed peer address as 10.0.0.69:19447
Jan 21 23:22:31 local-opensips rtpengine[1254]: INFO:
[ef0c76ea-adbc-4a09-bf2d-9df7f6f872bc/63c659c2-ff03-4673-a4f9-96a145ec6d45/1
port 28641]: [core] Kernelizing media stream: 10.0.0.69:19447 ->
10.0.0.18:28641 | 10.0.0.18:31231 -> 10.0.0.46:19503
Jan 21 23:22:31 local-opensips rtpengine[1254]: INFO:
[ef0c76ea-adbc-4a09-bf2d-9df7f6f872bc/a369dd65-3212-4728-a22d-4bcdd0857b39/1
port 31231]: [core] Confirmed peer address as 10.0.0.46:19503
Jan 21 23:22:31 local-opensips rtpengine[1254]: INFO:
[ef0c76ea-adbc-4a09-bf2d-9df7f6f872bc/a369dd65-3212-4728-a22d-4bcdd0857b39/1
port 31231]: [core] Kernelizing media stream: 10.0.0.46:19503 ->
10.0.0.18:31231 | 10.0.0.18:28641 -> 10.0.0.69:19447
Jan 21 23:22:33 local-opensips rtpengine[1254]: INFO:
[ef0c76ea-adbc-4a09-bf2d-9df7f6f872bc]: [control] Received command 'query'
from 127.0.0.1:52434
Jan 21 23:22:33 local-opensips rtpengine[1254]: INFO:
[ef0c76ea-adbc-4a09-bf2d-9df7f6f872bc]: [control] Replying to 'query' from
127.0.0.1:52434 (elapsed time 0.000230 sec)
Jan 21 23:22:33 local-opensips rtpengine[1254]: INFO:
[ef0c76ea-adbc-4a09-bf2d-9df7f6f872bc]: [control] Received command 'delete'
from 127.0.0.1:52434
Jan 21 23:22:33 local-opensips rtpengine[1254]: INFO:
[ef0c76ea-adbc-4a09-bf2d-9df7f6f872bc]: [core] Scheduling deletion of call
branch '63c659c2-ff03-4673-a4f9-96a145ec6d45' (via-branch '') in 30 seconds
Jan 21 23:22:33 local-opensips rtpengine[1254]: INFO:
[ef0c76ea-adbc-4a09-bf2d-9df7f6f872bc]: [core] Scheduling deletion of call
branch 'a369dd65-3212-4728-a22d-4bcdd0857b39' (via-branch '') in 30 seconds
Jan 21 23:22:33 local-opensips rtpengine[1254]: INFO:
[ef0c76ea-adbc-4a09-bf2d-9df7f6f872bc]: [core] Scheduling deletion of
entire call in 30 seconds
Jan 21 23:22:33 local-opensips rtpengine[1254]: INFO:
[ef0c76ea-adbc-4a09-bf2d-9df7f6f872bc]: [control] Replying to 'delete' from
127.0.0.1:52434 (elapsed time 0.000232 sec)
On Tue, 21 Jan 2025 at 15:10, Răzvan Crainea <razvan at opensips.org> wrote:
> Hi, Alberto!
>
> Nothing to do explicitely in opensips, simply pass the "directional"
> flag to the command.
>
> Best regards,
>
> Răzvan Crainea
> OpenSIPS Core Developer / SIPhub CTO
> http://www.opensips-solutions.com / https://www.siphub.com
>
> On 1/21/25 1:47 AM, Alberto wrote:
> > Hi,
> >
> > In short, I was using opensips 3.4.8 and rtpengine 11.5 until a few days
> > ago, and rtpengine_block_dtmf was able to block DTMF in a single
> direction.
> > Recently I updated rtpengine to 12.5 and that stopped working, now DTMF
> are
> > always blocked in both directions.
> >
> > Can someone please take a look at
> > https://groups.google.com/g/rtpengine/c/4dFexHvFmeo/m/YxTxXylXDAAJ ?
> > Is this something that needs to be implemented in opensips?
> >
> > Thanks
> >
> >
> > Hi,
> >
> > In short, I was using opensips 3.4.8 and rtpengine 11.5 until a few days
> > ago, and rtpengine_block_dtmf was able to block DTMF in a single
> direction.
> > Recently I updated rtpengine to 12.5 and that stopped working, now DTMF
> > are always blocked in both directions.
> >
> > Can someone please take a look at https://groups.google.com/g/rtpengine/
> > c/4dFexHvFmeo/m/YxTxXylXDAAJ <https://groups.google.com/g/rtpengine/
> > c/4dFexHvFmeo/m/YxTxXylXDAAJ> ?
> > Is this something that needs to be implemented in opensips?
> >
> > Thanks
> >
> > _______________________________________________
> > Users mailing list
> > Users at lists.opensips.org
> > http://lists.opensips.org/cgi-bin/mailman/listinfo/users
>
>
> _______________________________________________
> Users mailing list
> Users at lists.opensips.org
> http://lists.opensips.org/cgi-bin/mailman/listinfo/users
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.opensips.org/pipermail/users/attachments/20250121/64a7b45e/attachment-0001.html>
More information about the Users
mailing list