[asterisk-bugs] [Asterisk 0014815]: DTMF Appears to be broken from certain sources on asterisk 1.4.24 - double digit.

Asterisk Bug Tracker noreply at bugs.digium.com
Tue Apr 28 15:53:41 CDT 2009


A NOTE has been added to this issue. 
====================================================================== 
http://bugs.digium.com/view.php?id=14815 
====================================================================== 
Reported By:                geoff2010
Assigned To:                
====================================================================== 
Project:                    Asterisk
Issue ID:                   14815
Category:                   Core/RTP
Reproducibility:            always
Severity:                   block
Priority:                   normal
Status:                     new
Target Version:             1.4.25
Asterisk Version:           1.4.24 
Regression:                 Yes 
SVN Branch (only for SVN checkouts, not tarball releases): N/A 
SVN Revision (number only!):  
Request Review:              
====================================================================== 
Date Submitted:             2009-04-02 15:38 CDT
Last Modified:              2009-04-28 15:53 CDT
====================================================================== 
Summary:                    DTMF Appears to be broken from certain sources on
asterisk 1.4.24 - double digit.
Description: 
I am having some trouble with 1.4.24.  This appears to be a regression
since 1.4.21.1 as I have just recently upgraded and started to experience
the problem.

When calling my asterisk box from a cell phone the system detects double
DTMF digits.  When calling from a landline or pure SIP device DTMF
detection works fine.  I have determined that the cell phone is sending the
RTP DTMF payload about 2x more than the other devices, but as far as I can
tell it should still be considered a single digit as per the RFC.

Attached are two TXT files of pcap exports which show the dump for a
working DTMF interaction, and one for a failure situation.

Please let me know if I can provide any further information.

Thanks,
Geoff
======================================================================
Relationships       ID      Summary
----------------------------------------------------------------------
related to          0014460 Asterisk plays a continuous tone foreve...
====================================================================== 

---------------------------------------------------------------------- 
 (0103894) geoff2010 (reporter) - 2009-04-28 15:53
 http://bugs.digium.com/view.php?id=14815#c103894 
---------------------------------------------------------------------- 
You can see very clearly in the following example that asterisk internally
decided to terminate the DTMF before the RFC2833 terminated with the end
flag.  This caused it to immediately start a new sequence which ended when
the original sequence was actually terminated.

Got  RTP RFC2833 from   209.244.16.207:60296 (type 101, seq 012948, ts
1043001391, len 000004, mark 1, event 00000008, end 0, duration 00160)
[Apr 23 09:37:54] DTMF[7588]: channel.c:2297 __ast_read: DTMF begin '8'
received on SIP/4.68.250.148-ac071000
[Apr 23 09:37:54] DTMF[7588]: channel.c:2301 __ast_read: DTMF begin
ignored '8' on SIP/4.68.250.148-ac071000
Got  RTP packet from    209.244.16.207:60296 (type 00, seq 012949, ts
1043001391, len 000160)
Got  RTP packet from    209.244.16.207:60296 (type 101, seq 012950, ts
1043001391, len 000004)
Got  RTP RFC2833 from   209.244.16.207:60296 (type 101, seq 012950, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 00279)
Got  RTP packet from    209.244.16.207:60296 (type 00, seq 012951, ts
1043001551, len 000160)
Got  RTP packet from    209.244.16.207:60296 (type 101, seq 012952, ts
1043001391, len 000004)
Got  RTP RFC2833 from   209.244.16.207:60296 (type 101, seq 012952, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 00439)
Got  RTP packet from    209.244.16.207:60296 (type 00, seq 012953, ts
1043001711, len 000160)
Got  RTP packet from    209.244.16.207:60296 (type 101, seq 012954, ts
1043001391, len 000004)
Got  RTP RFC2833 from   209.244.16.207:60296 (type 101, seq 012954, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 00596)
Got  RTP packet from    209.244.16.207:60296 (type 00, seq 012955, ts
1043001871, len 000160)
Got  RTP packet from    209.244.16.207:60296 (type 101, seq 012956, ts
1043001391, len 000004)
Got  RTP RFC2833 from   209.244.16.207:60296 (type 101, seq 012956, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 00764)
Got  RTP packet from    209.244.16.207:60296 (type 00, seq 012957, ts
1043002031, len 000160)
Got  RTP packet from    209.244.16.207:60296 (type 101, seq 012958, ts
1043001391, len 000004)
Got  RTP RFC2833 from   209.244.16.207:60296 (type 101, seq 012958, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 00906)
Got  RTP packet from    209.244.16.207:60296 (type 00, seq 012959, ts
1043002191, len 000160)
Got  RTP packet from    209.244.16.207:60296 (type 101, seq 012960, ts
1043001391, len 000004)
Got  RTP RFC2833 from   209.244.16.207:60296 (type 101, seq 012960, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 01080)
Got  RTP packet from    209.244.16.207:60296 (type 00, seq 012961, ts
1043002351, len 000160)
Got  RTP packet from    209.244.16.207:60296 (type 101, seq 012962, ts
1043001391, len 000004)
Got  RTP RFC2833 from   209.244.16.207:60296 (type 101, seq 012962, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 01219)
Got  RTP packet from    209.244.16.207:60296 (type 00, seq 012963, ts
1043002511, len 000160)
Got  RTP packet from    209.244.16.207:60296 (type 101, seq 012964, ts
1043001391, len 000004)
Got  RTP RFC2833 from   209.244.16.207:60296 (type 101, seq 012964, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 01383)
Got  RTP packet from    209.244.16.207:60296 (type 00, seq 012965, ts
1043002671, len 000160)
Got  RTP packet from    209.244.16.207:60296 (type 101, seq 012966, ts
1043001391, len 000004)
Got  RTP RFC2833 from   209.244.16.207:60296 (type 101, seq 012966, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 01544)
Got  RTP packet from    209.244.16.207:60296 (type 00, seq 012967, ts
1043002831, len 000160)
Got  RTP packet from    209.244.16.207:60296 (type 101, seq 012968, ts
1043001391, len 000004)
Got  RTP RFC2833 from   209.244.16.207:60296 (type 101, seq 012968, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 01713)
Got  RTP packet from    209.244.16.207:60296 (type 00, seq 012969, ts
1043002991, len 000160)
Got  RTP packet from    209.244.16.207:60296 (type 101, seq 012970, ts
1043001391, len 000004)
Got  RTP RFC2833 from   209.244.16.207:60296 (type 101, seq 012970, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 01861)
Got  RTP packet from    209.244.16.207:60296 (type 00, seq 012971, ts
1043003151, len 000160)
Got  RTP packet from    209.244.16.207:60296 (type 101, seq 012972, ts
1043001391, len 000004)
Got  RTP RFC2833 from   209.244.16.207:60296 (type 101, seq 012972, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 02019)
Got  RTP packet from    209.244.16.207:60296 (type 00, seq 012973, ts
1043003311, len 000160)
Got  RTP packet from    209.244.16.207:60296 (type 101, seq 012974, ts
1043001391, len 000004)
Got  RTP RFC2833 from   209.244.16.207:60296 (type 101, seq 012974, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 02180)
Got  RTP packet from    209.244.16.207:60296 (type 00, seq 012975, ts
1043003471, len 000160)
Got  RTP packet from    209.244.16.207:60296 (type 101, seq 012976, ts
1043001391, len 000004)
Got  RTP RFC2833 from   209.244.16.207:60296 (type 101, seq 012976, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 02356)
Got  RTP packet from    209.244.16.207:60296 (type 00, seq 012977, ts
1043003631, len 000160)
Got  RTP packet from    209.244.16.207:60296 (type 101, seq 012978, ts
1043001391, len 000004)
Got  RTP RFC2833 from   209.244.16.207:60296 (type 101, seq 012978, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 02518)
Got  RTP packet from    209.244.16.207:60296 (type 00, seq 012979, ts
1043003791, len 000160)
Got  RTP packet from    209.244.16.207:60296 (type 101, seq 012980, ts
1043001391, len 000004)
Got  RTP RFC2833 from   209.244.16.207:60296 (type 101, seq 012980, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 02676)
Got  RTP packet from    209.244.16.207:60296 (type 00, seq 012981, ts
1043003951, len 000160)
Got  RTP packet from    209.244.16.207:60296 (type 101, seq 012982, ts
1043001391, len 000004)
Got  RTP RFC2833 from   209.244.16.207:60296 (type 101, seq 012982, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 02825)
Got  RTP packet from    209.244.16.207:60296 (type 00, seq 012983, ts
1043004111, len 000160)
Got  RTP packet from    209.244.16.207:60296 (type 101, seq 012984, ts
1043001391, len 000004)
Got  RTP RFC2833 from   209.244.16.207:60296 (type 101, seq 012984, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 02978)
Got  RTP packet from    209.244.16.207:60296 (type 00, seq 012985, ts
1043004271, len 000160)
[Apr 23 09:37:54] DTMF[7588]: channel.c:2229 __ast_read: DTMF end '8'
received on SIP/4.68.250.148-ac071000, duration 20 ms
[Apr 23 09:37:54] DTMF[7588]: channel.c:2282 __ast_read: DTMF end
passthrough '8' on SIP/4.68.250.148-ac071000
Got  RTP packet from    209.244.16.207:60296 (type 101, seq 012986, ts
1043001391, len 000004)
Got  RTP RFC2833 from   209.244.16.207:60296 (type 101, seq 012986, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 03166)
[Apr 23 09:37:54] DTMF[7588]: channel.c:2297 __ast_read: DTMF begin '8'
received on SIP/4.68.250.148-ac071000
[Apr 23 09:37:54] DTMF[7588]: channel.c:2301 __ast_read: DTMF begin
ignored '8' on SIP/4.68.250.148-ac071000
Got  RTP packet from    209.244.16.207:60296 (type 00, seq 012987, ts
1043004431, len 000160)
Got  RTP packet from    209.244.16.207:60296 (type 101, seq 012988, ts
1043001391, len 000004)
Got  RTP RFC2833 from   209.244.16.207:60296 (type 101, seq 012988, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 03322)
Got  RTP packet from    209.244.16.207:60296 (type 101, seq 012989, ts
1043001391, len 000004)
Got  RTP RFC2833 from   209.244.16.207:60296 (type 101, seq 012989, ts
1043001391, len 000004, mark 0, event 00000008, end 1, duration 03360)
[Apr 23 09:37:54] DTMF[7588]: channel.c:2229 __ast_read: DTMF end '8'
received on SIP/4.68.250.148-ac071000, duration 420 ms
[Apr 23 09:37:54] DTMF[7588]: channel.c:2282 __ast_read: DTMF end
passthrough '8' on SIP/4.68.250.148-ac071000
Got  RTP packet from    209.244.16.207:60296 (type 101, seq 012990, ts
1043001391, len 000004)
Got  RTP RFC2833 from   209.244.16.207:60296 (type 101, seq 012990, ts
1043001391, len 000004, mark 0, event 00000008, end 1, duration 03360)
Got  RTP packet from    209.244.16.207:60296 (type 101, seq 012991, ts
1043001391, len 000004)
Got  RTP RFC2833 from   209.244.16.207:60296 (type 101, seq 012991, ts
1043001391, len 000004, mark 0, event 00000008, end 1, duration 03360)
Got  RTP packet from    209.244.16.207:60296 (type 101, seq 012992, ts
1043001391, len 000004)
Got  RTP RFC2833 from   209.244.16.207:60296 (type 101, seq 012992, ts
1043001391, len 000004, mark 0, event 00000008, end 1, duration 03360) 

Issue History 
Date Modified    Username       Field                    Change               
====================================================================== 
2009-04-28 15:53 geoff2010      Note Added: 0103894                          
======================================================================




More information about the asterisk-bugs mailing list