[asterisk-bugs] [Asterisk 0014815]: DTMF Appears to be broken from certain sources on asterisk 1.4.24 - double digit.
Asterisk Bug Tracker
noreply at bugs.digium.com
Tue Apr 28 15:53:41 CDT 2009
A NOTE has been added to this issue.
======================================================================
http://bugs.digium.com/view.php?id=14815
======================================================================
Reported By: geoff2010
Assigned To:
======================================================================
Project: Asterisk
Issue ID: 14815
Category: Core/RTP
Reproducibility: always
Severity: block
Priority: normal
Status: new
Target Version: 1.4.25
Asterisk Version: 1.4.24
Regression: Yes
SVN Branch (only for SVN checkouts, not tarball releases): N/A
SVN Revision (number only!):
Request Review:
======================================================================
Date Submitted: 2009-04-02 15:38 CDT
Last Modified: 2009-04-28 15:53 CDT
======================================================================
Summary: DTMF Appears to be broken from certain sources on
asterisk 1.4.24 - double digit.
Description:
I am having some trouble with 1.4.24. This appears to be a regression
since 1.4.21.1 as I have just recently upgraded and started to experience
the problem.
When calling my asterisk box from a cell phone the system detects double
DTMF digits. When calling from a landline or pure SIP device DTMF
detection works fine. I have determined that the cell phone is sending the
RTP DTMF payload about 2x more than the other devices, but as far as I can
tell it should still be considered a single digit as per the RFC.
Attached are two TXT files of pcap exports which show the dump for a
working DTMF interaction, and one for a failure situation.
Please let me know if I can provide any further information.
Thanks,
Geoff
======================================================================
Relationships ID Summary
----------------------------------------------------------------------
related to 0014460 Asterisk plays a continuous tone foreve...
======================================================================
----------------------------------------------------------------------
(0103894) geoff2010 (reporter) - 2009-04-28 15:53
http://bugs.digium.com/view.php?id=14815#c103894
----------------------------------------------------------------------
You can see very clearly in the following example that asterisk internally
decided to terminate the DTMF before the RFC2833 terminated with the end
flag. This caused it to immediately start a new sequence which ended when
the original sequence was actually terminated.
Got RTP RFC2833 from 209.244.16.207:60296 (type 101, seq 012948, ts
1043001391, len 000004, mark 1, event 00000008, end 0, duration 00160)
[Apr 23 09:37:54] DTMF[7588]: channel.c:2297 __ast_read: DTMF begin '8'
received on SIP/4.68.250.148-ac071000
[Apr 23 09:37:54] DTMF[7588]: channel.c:2301 __ast_read: DTMF begin
ignored '8' on SIP/4.68.250.148-ac071000
Got RTP packet from 209.244.16.207:60296 (type 00, seq 012949, ts
1043001391, len 000160)
Got RTP packet from 209.244.16.207:60296 (type 101, seq 012950, ts
1043001391, len 000004)
Got RTP RFC2833 from 209.244.16.207:60296 (type 101, seq 012950, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 00279)
Got RTP packet from 209.244.16.207:60296 (type 00, seq 012951, ts
1043001551, len 000160)
Got RTP packet from 209.244.16.207:60296 (type 101, seq 012952, ts
1043001391, len 000004)
Got RTP RFC2833 from 209.244.16.207:60296 (type 101, seq 012952, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 00439)
Got RTP packet from 209.244.16.207:60296 (type 00, seq 012953, ts
1043001711, len 000160)
Got RTP packet from 209.244.16.207:60296 (type 101, seq 012954, ts
1043001391, len 000004)
Got RTP RFC2833 from 209.244.16.207:60296 (type 101, seq 012954, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 00596)
Got RTP packet from 209.244.16.207:60296 (type 00, seq 012955, ts
1043001871, len 000160)
Got RTP packet from 209.244.16.207:60296 (type 101, seq 012956, ts
1043001391, len 000004)
Got RTP RFC2833 from 209.244.16.207:60296 (type 101, seq 012956, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 00764)
Got RTP packet from 209.244.16.207:60296 (type 00, seq 012957, ts
1043002031, len 000160)
Got RTP packet from 209.244.16.207:60296 (type 101, seq 012958, ts
1043001391, len 000004)
Got RTP RFC2833 from 209.244.16.207:60296 (type 101, seq 012958, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 00906)
Got RTP packet from 209.244.16.207:60296 (type 00, seq 012959, ts
1043002191, len 000160)
Got RTP packet from 209.244.16.207:60296 (type 101, seq 012960, ts
1043001391, len 000004)
Got RTP RFC2833 from 209.244.16.207:60296 (type 101, seq 012960, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 01080)
Got RTP packet from 209.244.16.207:60296 (type 00, seq 012961, ts
1043002351, len 000160)
Got RTP packet from 209.244.16.207:60296 (type 101, seq 012962, ts
1043001391, len 000004)
Got RTP RFC2833 from 209.244.16.207:60296 (type 101, seq 012962, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 01219)
Got RTP packet from 209.244.16.207:60296 (type 00, seq 012963, ts
1043002511, len 000160)
Got RTP packet from 209.244.16.207:60296 (type 101, seq 012964, ts
1043001391, len 000004)
Got RTP RFC2833 from 209.244.16.207:60296 (type 101, seq 012964, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 01383)
Got RTP packet from 209.244.16.207:60296 (type 00, seq 012965, ts
1043002671, len 000160)
Got RTP packet from 209.244.16.207:60296 (type 101, seq 012966, ts
1043001391, len 000004)
Got RTP RFC2833 from 209.244.16.207:60296 (type 101, seq 012966, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 01544)
Got RTP packet from 209.244.16.207:60296 (type 00, seq 012967, ts
1043002831, len 000160)
Got RTP packet from 209.244.16.207:60296 (type 101, seq 012968, ts
1043001391, len 000004)
Got RTP RFC2833 from 209.244.16.207:60296 (type 101, seq 012968, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 01713)
Got RTP packet from 209.244.16.207:60296 (type 00, seq 012969, ts
1043002991, len 000160)
Got RTP packet from 209.244.16.207:60296 (type 101, seq 012970, ts
1043001391, len 000004)
Got RTP RFC2833 from 209.244.16.207:60296 (type 101, seq 012970, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 01861)
Got RTP packet from 209.244.16.207:60296 (type 00, seq 012971, ts
1043003151, len 000160)
Got RTP packet from 209.244.16.207:60296 (type 101, seq 012972, ts
1043001391, len 000004)
Got RTP RFC2833 from 209.244.16.207:60296 (type 101, seq 012972, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 02019)
Got RTP packet from 209.244.16.207:60296 (type 00, seq 012973, ts
1043003311, len 000160)
Got RTP packet from 209.244.16.207:60296 (type 101, seq 012974, ts
1043001391, len 000004)
Got RTP RFC2833 from 209.244.16.207:60296 (type 101, seq 012974, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 02180)
Got RTP packet from 209.244.16.207:60296 (type 00, seq 012975, ts
1043003471, len 000160)
Got RTP packet from 209.244.16.207:60296 (type 101, seq 012976, ts
1043001391, len 000004)
Got RTP RFC2833 from 209.244.16.207:60296 (type 101, seq 012976, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 02356)
Got RTP packet from 209.244.16.207:60296 (type 00, seq 012977, ts
1043003631, len 000160)
Got RTP packet from 209.244.16.207:60296 (type 101, seq 012978, ts
1043001391, len 000004)
Got RTP RFC2833 from 209.244.16.207:60296 (type 101, seq 012978, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 02518)
Got RTP packet from 209.244.16.207:60296 (type 00, seq 012979, ts
1043003791, len 000160)
Got RTP packet from 209.244.16.207:60296 (type 101, seq 012980, ts
1043001391, len 000004)
Got RTP RFC2833 from 209.244.16.207:60296 (type 101, seq 012980, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 02676)
Got RTP packet from 209.244.16.207:60296 (type 00, seq 012981, ts
1043003951, len 000160)
Got RTP packet from 209.244.16.207:60296 (type 101, seq 012982, ts
1043001391, len 000004)
Got RTP RFC2833 from 209.244.16.207:60296 (type 101, seq 012982, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 02825)
Got RTP packet from 209.244.16.207:60296 (type 00, seq 012983, ts
1043004111, len 000160)
Got RTP packet from 209.244.16.207:60296 (type 101, seq 012984, ts
1043001391, len 000004)
Got RTP RFC2833 from 209.244.16.207:60296 (type 101, seq 012984, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 02978)
Got RTP packet from 209.244.16.207:60296 (type 00, seq 012985, ts
1043004271, len 000160)
[Apr 23 09:37:54] DTMF[7588]: channel.c:2229 __ast_read: DTMF end '8'
received on SIP/4.68.250.148-ac071000, duration 20 ms
[Apr 23 09:37:54] DTMF[7588]: channel.c:2282 __ast_read: DTMF end
passthrough '8' on SIP/4.68.250.148-ac071000
Got RTP packet from 209.244.16.207:60296 (type 101, seq 012986, ts
1043001391, len 000004)
Got RTP RFC2833 from 209.244.16.207:60296 (type 101, seq 012986, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 03166)
[Apr 23 09:37:54] DTMF[7588]: channel.c:2297 __ast_read: DTMF begin '8'
received on SIP/4.68.250.148-ac071000
[Apr 23 09:37:54] DTMF[7588]: channel.c:2301 __ast_read: DTMF begin
ignored '8' on SIP/4.68.250.148-ac071000
Got RTP packet from 209.244.16.207:60296 (type 00, seq 012987, ts
1043004431, len 000160)
Got RTP packet from 209.244.16.207:60296 (type 101, seq 012988, ts
1043001391, len 000004)
Got RTP RFC2833 from 209.244.16.207:60296 (type 101, seq 012988, ts
1043001391, len 000004, mark 0, event 00000008, end 0, duration 03322)
Got RTP packet from 209.244.16.207:60296 (type 101, seq 012989, ts
1043001391, len 000004)
Got RTP RFC2833 from 209.244.16.207:60296 (type 101, seq 012989, ts
1043001391, len 000004, mark 0, event 00000008, end 1, duration 03360)
[Apr 23 09:37:54] DTMF[7588]: channel.c:2229 __ast_read: DTMF end '8'
received on SIP/4.68.250.148-ac071000, duration 420 ms
[Apr 23 09:37:54] DTMF[7588]: channel.c:2282 __ast_read: DTMF end
passthrough '8' on SIP/4.68.250.148-ac071000
Got RTP packet from 209.244.16.207:60296 (type 101, seq 012990, ts
1043001391, len 000004)
Got RTP RFC2833 from 209.244.16.207:60296 (type 101, seq 012990, ts
1043001391, len 000004, mark 0, event 00000008, end 1, duration 03360)
Got RTP packet from 209.244.16.207:60296 (type 101, seq 012991, ts
1043001391, len 000004)
Got RTP RFC2833 from 209.244.16.207:60296 (type 101, seq 012991, ts
1043001391, len 000004, mark 0, event 00000008, end 1, duration 03360)
Got RTP packet from 209.244.16.207:60296 (type 101, seq 012992, ts
1043001391, len 000004)
Got RTP RFC2833 from 209.244.16.207:60296 (type 101, seq 012992, ts
1043001391, len 000004, mark 0, event 00000008, end 1, duration 03360)
Issue History
Date Modified Username Field Change
======================================================================
2009-04-28 15:53 geoff2010 Note Added: 0103894
======================================================================
More information about the asterisk-bugs
mailing list