[asterisk-bugs] [JIRA] (ASTERISK-28843) Duplicate detection of DTMF - Widebank codec / MS customisation

Joshua C. Colp (JIRA) noreply at issues.asterisk.org
Sun Apr 19 08:24:26 CDT 2020


     [ https://issues.asterisk.org/jira/browse/ASTERISK-28843?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Joshua C. Colp updated ASTERISK-28843:
--------------------------------------

    Assignee: David Herselman
      Status: Waiting for Feedback  (was: Triage)

Please attach a packet capture so the DTMF events can be analyzed before hitting Asterisk.

> Duplicate detection of DTMF - Widebank codec / MS customisation
> ---------------------------------------------------------------
>
>                 Key: ASTERISK-28843
>                 URL: https://issues.asterisk.org/jira/browse/ASTERISK-28843
>             Project: Asterisk
>          Issue Type: Bug
>      Security Level: None
>          Components: Resources/res_rtp_asterisk
>    Affects Versions: 16.9.0
>         Environment: CentOS 7.5
> Sangoma 7 FreePBX Distro on KVM guest
> PJSIP trunk to Microsoft Teams
> IAX2 trunk to Office PBX
>            Reporter: David Herselman
>            Assignee: David Herselman
>            Severity: Minor
>         Attachments: iax2_forwarded.png, [MS-DTMF].pdf, teams-dtmf-g729-compact-nodebug.txt, teams-dtmf-g729-debug.txt, teams-dtmf-silk16-compact-nodebug.txt, teams-dtmf-silk16-debug.txt
>
>
> Asterisk interprets double DTMF rfc2833 key presses, only when using a wide band (16 KHz) audio codec such as slik16. A comparative narrow band (8 khZ) g729 call works perfectly.
> \\
> I couldn't find an existing bug report in JIRA but did find the following discussion on the IETF mailing list back in 2006. It, in my limited understanding, appears to debates some of the nuances around handling calls where audio and telephone-event messages negotiate different timestamp frequencies:
> https://mailarchive.ietf.org/arch/msg/avt/Hx8rEwIQr9FYrTjP8D-TK41XCag/
> \\
> \\
> Microsoft's implementation amends rfc4733 but I couldn't discern anything in the document which explains why digits would get recognised twice. I've uploaded Microsoft's documentation as part of this report.
> \\
> \\
> One possible clue in the debug log may be that encoding is trying to run at 320 samples/second instead of 160 and therefor may interpret a single dtmf tone as two events.
> \\
> \\
> \\
> Problem summary:
> {quote}
> Duplicate rfc2833 DTMF events detected when using wideband codec {{SILK/16000}} together with {{telephone-event/8000}}
> {quote}
> \\
> \\
> In both of the following examples an incoming Teams Direct Route call from +27115551904 arrives on Asterisk for a destination of 1980 which is reachable via IAX2. A single '8' key press is sent a couple seconds after call establishment.
> \\
> \\
> {panel:title=Duplicate DTMF with wide band codec}
> {noformat}
> SIP/2.0 200 OK
> Via: SIP/2.0/TLS 52.114.76.76:5061;rport=8256;received=52.114.76.76;branch=z9hG4bK7bd2d1d3
> Call-ID: 10b73fc68209572abdd9757dfc509e5f
> From: "David Herselman" <sip:+27115551904 at sip.pstnhub.microsoft.com;user=phone>;tag=7ac926eb533041e79123af4a702621b6
> To: <sip:1980 at asterisk.company.co.za>;tag=1ff1ddc8-3608-46ec-a353-9cac40ca8098;user=phone
> CSeq: 2 INVITE
> Contact: <sip:asterisk.company.co.za:5061;transport=TLS>
> Allow: OPTIONS, REGISTER, SUBSCRIBE, NOTIFY, PUBLISH, INVITE, ACK, BYE, CANCEL, UPDATE, PRACK, MESSAGE, REFER
> Supported: 100rel, timer, replaces, norefersub
> Server: FPBX-15.0.16.49(16.9.0)
> Content-Type: application/sdp
> Content-Length:   826
> v=0
> o=- 0 3 IN IP4 196.1.1.1
> s=Asterisk
> c=IN IP4 196.1.1.1
> t=0 0
> m=audio 13124 RTP/SAVP 104 18 0 8 101
> a=crypto:1 AES_CM_128_HMAC_SHA1_32 inline:lnIADcidXdqNLxecqAZc/5LUEGleofDQ1x951fe6
> a=ice-ufrag:40c679ae5ecfef5e43f0fb86063d6fed
> a=ice-pwd:2349eab80869ed7f7be1d42f3eff26d8
> a=candidate:Hc0a81407 1 UDP 2130706431 192.168.20.7 13124 typ host
> a=candidate:S294f175b 1 UDP 1694498815 196.1.1.1 13124 typ srflx raddr 192.168.20.7 rport 13124
> a=candidate:Hc0a81407 2 UDP 2130706430 192.168.20.7 13125 typ host
> a=candidate:S294f175b 2 UDP 1694498814 196.1.1.1 13125 typ srflx raddr 192.168.20.7 rport 13125
> a=rtpmap:104 SILK/16000
> a=rtpmap:18 G729/8000
> a=fmtp:18 annexb=no
> a=rtpmap:0 PCMU/8000
> a=rtpmap:8 PCMA/8000
> a=rtpmap:101 telephone-event/8000
> a=fmtp:101 0-16
> a=ptime:20
> a=maxptime:100
> a=sendrecv
> Lots of these:
> [2020-04-19 09:12:49] VERBOSE[22952][C-00000004] res_rtp_asterisk.c: Got  RTP packet from    192.168.10.53:50010 (type 104, seq 015233, ts 48369872, len 000064)
> [2020-04-19 09:12:49] DEBUG[22953][C-00000004] audiohook.c: Failed to get 320 samples from write factory 0x7fa6800729c8
> [2020-04-19 09:12:49] DEBUG[22953][C-00000004] audiohook.c: Read factory 0x7fa680071f88 and write factory 0x7fa6800729c8 both fail to provide 320 samples
> [2020-04-19 09:12:49] DEBUG[22954][C-00000004] translate.c: Sample size different 320 vs 160
> Makes it super confusing that debug messages appear twice but the RTP type 101 packets are detected twice as well:
> [2020-04-19 09:12:48] DEBUG[22952][C-00000004] dahdi/bridge_native_dahdi.c: Channel 'IAX2/Office-28115' has DTMF hooks.
> [2020-04-19 09:12:49] DEBUG[22952][C-00000004] dahdi/bridge_native_dahdi.c: Channel 'IAX2/Office-28115' has DTMF hooks.
> [2020-04-19 09:12:49] DEBUG[22952][C-00000004] dahdi/bridge_native_dahdi.c: Channel 'IAX2/Office-28115' has DTMF hooks.
> [2020-04-19 09:12:50] VERBOSE[22952][C-00000004] res_rtp_asterisk.c: Got  RTP packet from    192.168.10.53:50010 (type 101, seq 015285, ts 48386209, len 000008)
> [2020-04-19 09:12:50] VERBOSE[22952][C-00000004] res_rtp_asterisk.c: Got  RTP RFC2833 from   192.168.10.53:50010 (type 101, seq 015285, ts 48386209, len 000004, mark 1, event 00000008, end 0, duration 00160)
> [2020-04-19 09:12:50] DEBUG[22952][C-00000004] res_rtp_asterisk.c: - RTP 2833 Event: 00000008 (len = 4)
> [2020-04-19 09:12:50] DEBUG[22952][C-00000004] res_rtp_asterisk.c: Creating BEGIN DTMF Frame: 56 (8), at 192.168.10.53:50010
> [2020-04-19 09:12:50] DTMF[22952][C-00000004] channel.c: DTMF begin '8' received on PJSIP/msteams_sip1-00000003
> [2020-04-19 09:12:50] DTMF[22952][C-00000004] channel.c: DTMF begin '8' received on PJSIP/msteams_sip1-00000003
> [2020-04-19 09:12:50] DTMF[22952][C-00000004] channel.c: DTMF begin passthrough '8' on PJSIP/msteams_sip1-00000003
> [2020-04-19 09:12:50] DTMF[22952][C-00000004] channel.c: DTMF begin passthrough '8' on PJSIP/msteams_sip1-00000003
> [2020-04-19 09:12:50] VERBOSE[22952][C-00000004] res_rtp_asterisk.c: Got  RTP packet from    192.168.10.53:50010 (type 101, seq 015287, ts 48386209, len 000008)
> [2020-04-19 09:12:50] VERBOSE[22952][C-00000004] res_rtp_asterisk.c: Got  RTP RFC2833 from   192.168.10.53:50010 (type 101, seq 015287, ts 48386209, len 000004, mark 0, event 00000008, end 0, duration 00320)
> [2020-04-19 09:12:50] DEBUG[22952][C-00000004] res_rtp_asterisk.c: - RTP 2833 Event: 00000008 (len = 4)
> [2020-04-19 09:12:50] VERBOSE[22952][C-00000004] res_rtp_asterisk.c: Got  RTP packet from    192.168.10.53:50010 (type 101, seq 015288, ts 48386209, len 000008)
> [2020-04-19 09:12:50] VERBOSE[22952][C-00000004] res_rtp_asterisk.c: Got  RTP RFC2833 from   192.168.10.53:50010 (type 101, seq 015288, ts 48386209, len 000004, mark 0, event 00000008, end 0, duration 00480)
> [2020-04-19 09:12:50] DEBUG[22952][C-00000004] res_rtp_asterisk.c: - RTP 2833 Event: 00000008 (len = 4)
> [2020-04-19 09:12:50] VERBOSE[22952][C-00000004] res_rtp_asterisk.c: Got  RTP packet from    192.168.10.53:50010 (type 101, seq 015290, ts 48386209, len 000008)
> [2020-04-19 09:12:50] VERBOSE[22952][C-00000004] res_rtp_asterisk.c: Got  RTP RFC2833 from   192.168.10.53:50010 (type 101, seq 015290, ts 48386209, len 000004, mark 0, event 00000008, end 0, duration 00640)
> [2020-04-19 09:12:50] DEBUG[22952][C-00000004] res_rtp_asterisk.c: - RTP 2833 Event: 00000008 (len = 4)
> [2020-04-19 09:12:50] VERBOSE[22952][C-00000004] res_rtp_asterisk.c: Got  RTP packet from    192.168.10.53:50010 (type 101, seq 015293, ts 48386209, len 000008)
> [2020-04-19 09:12:50] VERBOSE[22952][C-00000004] res_rtp_asterisk.c: Got  RTP RFC2833 from   192.168.10.53:50010 (type 101, seq 015293, ts 48386209, len 000004, mark 0, event 00000008, end 0, duration 00800)
> [2020-04-19 09:12:50] DEBUG[22952][C-00000004] res_rtp_asterisk.c: - RTP 2833 Event: 00000008 (len = 4)
> [2020-04-19 09:12:50] VERBOSE[22952][C-00000004] res_rtp_asterisk.c: Got  RTP packet from    192.168.10.53:50010 (type 101, seq 015294, ts 48386209, len 000008)
> [2020-04-19 09:12:50] VERBOSE[22952][C-00000004] res_rtp_asterisk.c: Got  RTP RFC2833 from   192.168.10.53:50010 (type 101, seq 015294, ts 48386209, len 000004, mark 0, event 00000008, end 0, duration 00960)
> [2020-04-19 09:12:50] DEBUG[22952][C-00000004] res_rtp_asterisk.c: - RTP 2833 Event: 00000008 (len = 4)
> [2020-04-19 09:12:50] VERBOSE[22952][C-00000004] res_rtp_asterisk.c: Got  RTP packet from    192.168.10.53:50010 (type 101, seq 015297, ts 48386209, len 000008)
> [2020-04-19 09:12:50] VERBOSE[22952][C-00000004] res_rtp_asterisk.c: Got  RTP RFC2833 from   192.168.10.53:50010 (type 101, seq 015297, ts 48386209, len 000004, mark 0, event 00000008, end 0, duration 01120)
> [2020-04-19 09:12:50] DEBUG[22952][C-00000004] res_rtp_asterisk.c: - RTP 2833 Event: 00000008 (len = 4)
> [2020-04-19 09:12:50] VERBOSE[22952][C-00000004] res_rtp_asterisk.c: Got  RTP packet from    192.168.10.53:50010 (type 101, seq 015298, ts 48386209, len 000008)
> [2020-04-19 09:12:50] VERBOSE[22952][C-00000004] res_rtp_asterisk.c: Got  RTP RFC2833 from   192.168.10.53:50010 (type 101, seq 015298, ts 48386209, len 000004, mark 0, event 00000008, end 0, duration 01280)
> [2020-04-19 09:12:50] DEBUG[22952][C-00000004] res_rtp_asterisk.c: - RTP 2833 Event: 00000008 (len = 4)
> [2020-04-19 09:12:50] DEBUG[22952][C-00000004] res_rtp_asterisk.c: Creating END DTMF Frame: 56 (8), at 192.168.10.53:50010
> [2020-04-19 09:12:50] DTMF[22952][C-00000004] channel.c: DTMF end '8' received on PJSIP/msteams_sip1-00000003, duration 80 ms
> [2020-04-19 09:12:50] DTMF[22952][C-00000004] channel.c: DTMF end '8' received on PJSIP/msteams_sip1-00000003, duration 80 ms
> [2020-04-19 09:12:50] DTMF[22952][C-00000004] channel.c: DTMF end accepted with begin '8' on PJSIP/msteams_sip1-00000003
> [2020-04-19 09:12:50] DTMF[22952][C-00000004] channel.c: DTMF end accepted with begin '8' on PJSIP/msteams_sip1-00000003
> [2020-04-19 09:12:50] DTMF[22952][C-00000004] channel.c: DTMF end passthrough '8' on PJSIP/msteams_sip1-00000003
> [2020-04-19 09:12:50] DTMF[22952][C-00000004] channel.c: DTMF end passthrough '8' on PJSIP/msteams_sip1-00000003
> [2020-04-19 09:12:50] VERBOSE[22952][C-00000004] res_rtp_asterisk.c: Got  RTP packet from    192.168.10.53:50010 (type 101, seq 015301, ts 48386209, len 000008)
> [2020-04-19 09:12:50] VERBOSE[22952][C-00000004] res_rtp_asterisk.c: Got  RTP RFC2833 from   192.168.10.53:50010 (type 101, seq 015301, ts 48386209, len 000004, mark 0, event 00000008, end 0, duration 01440)
> [2020-04-19 09:12:50] DEBUG[22952][C-00000004] res_rtp_asterisk.c: - RTP 2833 Event: 00000008 (len = 4)
> [2020-04-19 09:12:50] DEBUG[22952][C-00000004] res_rtp_asterisk.c: Creating BEGIN DTMF Frame: 56 (8), at 192.168.10.53:50010
> [2020-04-19 09:12:50] DTMF[22952][C-00000004] channel.c: DTMF begin '8' received on PJSIP/msteams_sip1-00000003
> [2020-04-19 09:12:50] DTMF[22952][C-00000004] channel.c: DTMF begin '8' received on PJSIP/msteams_sip1-00000003
> [2020-04-19 09:12:50] DTMF[22952][C-00000004] channel.c: DTMF begin ignored '8' on PJSIP/msteams_sip1-00000003
> [2020-04-19 09:12:50] DTMF[22952][C-00000004] channel.c: DTMF begin ignored '8' on PJSIP/msteams_sip1-00000003
> [2020-04-19 09:12:50] VERBOSE[22952][C-00000004] res_rtp_asterisk.c: Got  RTP packet from    192.168.10.53:50010 (type 101, seq 015302, ts 48386209, len 000008)
> [2020-04-19 09:12:50] VERBOSE[22952][C-00000004] res_rtp_asterisk.c: Got  RTP RFC2833 from   192.168.10.53:50010 (type 101, seq 015302, ts 48386209, len 000004, mark 0, event 00000008, end 1, duration 01600)
> [2020-04-19 09:12:50] DEBUG[22952][C-00000004] res_rtp_asterisk.c: - RTP 2833 Event: 00000008 (len = 4)
> [2020-04-19 09:12:50] DEBUG[22952][C-00000004] res_rtp_asterisk.c: Creating END DTMF Frame: 56 (8), at 192.168.10.53:50010
> [2020-04-19 09:12:50] DTMF[22952][C-00000004] channel.c: DTMF end '8' received on PJSIP/msteams_sip1-00000003, duration 100 ms
> [2020-04-19 09:12:50] DTMF[22952][C-00000004] channel.c: DTMF end '8' received on PJSIP/msteams_sip1-00000003, duration 100 ms
> [2020-04-19 09:12:50] DTMF[22952][C-00000004] channel.c: DTMF end '8' received on PJSIP/msteams_sip1-00000003, duration 100 ms
> [2020-04-19 09:12:50] DTMF[22952][C-00000004] channel.c: DTMF end '8' received on PJSIP/msteams_sip1-00000003, duration 100 ms
> [2020-04-19 09:12:50] DTMF[22952][C-00000004] channel.c: DTMF begin emulation of '8' with duration 100 queued on PJSIP/msteams_sip1-00000003
> [2020-04-19 09:12:50] DTMF[22952][C-00000004] channel.c: DTMF begin emulation of '8' with duration 100 queued on PJSIP/msteams_sip1-00000003
> [2020-04-19 09:12:50] VERBOSE[22952][C-00000004] res_rtp_asterisk.c: Got  RTP packet from    192.168.10.53:50010 (type 101, seq 015303, ts 48386209, len 000008)
> [2020-04-19 09:12:50] VERBOSE[22952][C-00000004] res_rtp_asterisk.c: Got  RTP RFC2833 from   192.168.10.53:50010 (type 101, seq 015303, ts 48386209, len 000004, mark 0, event 00000008, end 1, duration 01600)
> [2020-04-19 09:12:50] DEBUG[22952][C-00000004] res_rtp_asterisk.c: - RTP 2833 Event: 00000008 (len = 4)
> [2020-04-19 09:12:50] DEBUG[22952][C-00000004] res_rtp_asterisk.c: Dropping duplicate or out of order DTMF END frame (seqno: 15303, ts 48386209, digit 8)
> [2020-04-19 09:12:50] VERBOSE[22952][C-00000004] res_rtp_asterisk.c: Got  RTP packet from    192.168.10.53:50010 (type 101, seq 015304, ts 48386209, len 000008)
> [2020-04-19 09:12:50] VERBOSE[22952][C-00000004] res_rtp_asterisk.c: Got  RTP RFC2833 from   192.168.10.53:50010 (type 101, seq 015304, ts 48386209, len 000004, mark 0, event 00000008, end 1, duration 01600)
> [2020-04-19 09:12:50] DEBUG[22952][C-00000004] res_rtp_asterisk.c: - RTP 2833 Event: 00000008 (len = 4)
> [2020-04-19 09:12:50] DEBUG[22952][C-00000004] res_rtp_asterisk.c: Dropping duplicate or out of order DTMF END frame (seqno: 15304, ts 48386209, digit 8)
> [2020-04-19 09:12:51] DTMF[22952][C-00000004] channel.c: DTMF end emulation of '8' queued on PJSIP/msteams_sip1-00000003
> [2020-04-19 09:12:51] DTMF[22952][C-00000004] channel.c: DTMF end emulation of '8' queued on PJSIP/msteams_sip1-00000003
> {noformat}
> {panel}
> \\
> {panel:title=Normal DTMF with narrow band codec}
> {noformat}
> SIP/2.0 200 OK
> Via: SIP/2.0/TLS 52.114.76.76:5061;rport=5128;received=52.114.76.76;branch=z9hG4bKc8bff66f
> Call-ID: dd815213b70b54f089971b041274c997
> From: "David Herselman" <sip:+27115551904 at sip.pstnhub.microsoft.com;user=phone>;tag=61b1845891d0438eaee84bc79a046d45
> To: <sip:1980 at asterisk.company.co.za>;tag=6c64f330-1893-4017-9bc7-873c17c91ffd;user=phone
> CSeq: 2 INVITE
> Contact: <sip:asterisk.company.co.za:5061;transport=TLS>
> Allow: OPTIONS, REGISTER, SUBSCRIBE, NOTIFY, PUBLISH, INVITE, ACK, BYE, CANCEL, UPDATE, PRACK, MESSAGE, REFER
> Supported: 100rel, timer, replaces, norefersub
> Server: FPBX-15.0.16.49(16.9.0)
> Content-Type: application/sdp
> Content-Length:   797
> v=0
> o=- 0 3 IN IP4 196.1.1.1
> s=Asterisk
> c=IN IP4 196.1.1.1
> t=0 0
> m=audio 13458 RTP/SAVP 18 0 8 101
> a=crypto:1 AES_CM_128_HMAC_SHA1_32 inline:2/fmRbQY0aix4uUxrTe8KqtxP6R/JJaUUGBNMuvP
> a=ice-ufrag:416688807842f6a42f605d0975eeae8a
> a=ice-pwd:3420f1fc1acc461f1c018dc41640f589
> a=candidate:Hc0a81407 1 UDP 2130706431 192.168.20.7 13458 typ host
> a=candidate:S294f175b 1 UDP 1694498815 196.1.1.1 13458 typ srflx raddr 192.168.20.7 rport 13458
> a=candidate:Hc0a81407 2 UDP 2130706430 192.168.20.7 13459 typ host
> a=candidate:S294f175b 2 UDP 1694498814 196.1.1.1 13459 typ srflx raddr 192.168.20.7 rport 13459
> a=rtpmap:18 G729/8000
> a=fmtp:18 annexb=no
> a=rtpmap:0 PCMU/8000
> a=rtpmap:8 PCMA/8000
> a=rtpmap:101 telephone-event/8000
> a=fmtp:101 0-16
> a=ptime:20
> a=maxptime:150
> a=sendrecv
> DTMF works perfectly and isn't detected twice, although debug lines still print things twice:
> [root at sipteams ~]# grep -e 'type 101' -e 2833 -e DTMF teams-dtmf-g729-debug.txt
> [2020-04-19 09:32:45] DEBUG[26873][C-00000006] dahdi/bridge_native_dahdi.c: Channel 'IAX2/Office-28327' has DTMF hooks.
> [2020-04-19 09:32:45] DEBUG[26873][C-00000006] dahdi/bridge_native_dahdi.c: Channel 'IAX2/Office-28327' has DTMF hooks.
> [2020-04-19 09:32:47] VERBOSE[26873][C-00000006] res_rtp_asterisk.c: Got  RTP packet from    192.168.10.53:50006 (type 101, seq 012003, ts 480000275, len 000008)
> [2020-04-19 09:32:47] VERBOSE[26873][C-00000006] res_rtp_asterisk.c: Got  RTP RFC2833 from   192.168.10.53:50006 (type 101, seq 012003, ts 480000275, len 000004, mark 1, event 00000008, end 0, duration 00160)
> [2020-04-19 09:32:47] DEBUG[26873][C-00000006] res_rtp_asterisk.c: - RTP 2833 Event: 00000008 (len = 4)
> [2020-04-19 09:32:47] DEBUG[26873][C-00000006] res_rtp_asterisk.c: Creating BEGIN DTMF Frame: 56 (8), at 192.168.10.53:50006
> [2020-04-19 09:32:47] DTMF[26873][C-00000006] channel.c: DTMF begin '8' received on PJSIP/msteams_sip1-00000005
> [2020-04-19 09:32:47] DTMF[26873][C-00000006] channel.c: DTMF begin '8' received on PJSIP/msteams_sip1-00000005
> [2020-04-19 09:32:47] DTMF[26873][C-00000006] channel.c: DTMF begin passthrough '8' on PJSIP/msteams_sip1-00000005
> [2020-04-19 09:32:47] DTMF[26873][C-00000006] channel.c: DTMF begin passthrough '8' on PJSIP/msteams_sip1-00000005
> [2020-04-19 09:32:47] VERBOSE[26873][C-00000006] res_rtp_asterisk.c: Got  RTP packet from    192.168.10.53:50006 (type 101, seq 012005, ts 480000275, len 000008)
> [2020-04-19 09:32:47] VERBOSE[26873][C-00000006] res_rtp_asterisk.c: Got  RTP RFC2833 from   192.168.10.53:50006 (type 101, seq 012005, ts 480000275, len 000004, mark 0, event 00000008, end 0, duration 00320)
> [2020-04-19 09:32:47] DEBUG[26873][C-00000006] res_rtp_asterisk.c: - RTP 2833 Event: 00000008 (len = 4)
> [2020-04-19 09:32:47] VERBOSE[26873][C-00000006] res_rtp_asterisk.c: Got  RTP packet from    192.168.10.53:50006 (type 101, seq 012007, ts 480000275, len 000008)
> [2020-04-19 09:32:47] VERBOSE[26873][C-00000006] res_rtp_asterisk.c: Got  RTP RFC2833 from   192.168.10.53:50006 (type 101, seq 012007, ts 480000275, len 000004, mark 0, event 00000008, end 0, duration 00480)
> [2020-04-19 09:32:47] DEBUG[26873][C-00000006] res_rtp_asterisk.c: - RTP 2833 Event: 00000008 (len = 4)
> [2020-04-19 09:32:47] VERBOSE[26873][C-00000006] res_rtp_asterisk.c: Got  RTP packet from    192.168.10.53:50006 (type 101, seq 012009, ts 480000275, len 000008)
> [2020-04-19 09:32:47] VERBOSE[26873][C-00000006] res_rtp_asterisk.c: Got  RTP RFC2833 from   192.168.10.53:50006 (type 101, seq 012009, ts 480000275, len 000004, mark 0, event 00000008, end 0, duration 00640)
> [2020-04-19 09:32:47] DEBUG[26873][C-00000006] res_rtp_asterisk.c: - RTP 2833 Event: 00000008 (len = 4)
> [2020-04-19 09:32:47] VERBOSE[26873][C-00000006] res_rtp_asterisk.c: Got  RTP packet from    192.168.10.53:50006 (type 101, seq 012011, ts 480000275, len 000008)
> [2020-04-19 09:32:47] VERBOSE[26873][C-00000006] res_rtp_asterisk.c: Got  RTP RFC2833 from   192.168.10.53:50006 (type 101, seq 012011, ts 480000275, len 000004, mark 0, event 00000008, end 0, duration 00800)
> [2020-04-19 09:32:47] DEBUG[26873][C-00000006] res_rtp_asterisk.c: - RTP 2833 Event: 00000008 (len = 4)
> [2020-04-19 09:32:47] VERBOSE[26873][C-00000006] res_rtp_asterisk.c: Got  RTP packet from    192.168.10.53:50006 (type 101, seq 012013, ts 480000275, len 000008)
> [2020-04-19 09:32:47] VERBOSE[26873][C-00000006] res_rtp_asterisk.c: Got  RTP RFC2833 from   192.168.10.53:50006 (type 101, seq 012013, ts 480000275, len 000004, mark 0, event 00000008, end 0, duration 00960)
> [2020-04-19 09:32:47] DEBUG[26873][C-00000006] res_rtp_asterisk.c: - RTP 2833 Event: 00000008 (len = 4)
> [2020-04-19 09:32:47] VERBOSE[26873][C-00000006] res_rtp_asterisk.c: Got  RTP packet from    192.168.10.53:50006 (type 101, seq 012015, ts 480000275, len 000008)
> [2020-04-19 09:32:47] VERBOSE[26873][C-00000006] res_rtp_asterisk.c: Got  RTP RFC2833 from   192.168.10.53:50006 (type 101, seq 012015, ts 480000275, len 000004, mark 0, event 00000008, end 0, duration 01120)
> [2020-04-19 09:32:47] DEBUG[26873][C-00000006] res_rtp_asterisk.c: - RTP 2833 Event: 00000008 (len = 4)
> [2020-04-19 09:32:47] VERBOSE[26873][C-00000006] res_rtp_asterisk.c: Got  RTP packet from    192.168.10.53:50006 (type 101, seq 012017, ts 480000275, len 000008)
> [2020-04-19 09:32:47] VERBOSE[26873][C-00000006] res_rtp_asterisk.c: Got  RTP RFC2833 from   192.168.10.53:50006 (type 101, seq 012017, ts 480000275, len 000004, mark 0, event 00000008, end 0, duration 01280)
> [2020-04-19 09:32:47] DEBUG[26873][C-00000006] res_rtp_asterisk.c: - RTP 2833 Event: 00000008 (len = 4)
> [2020-04-19 09:32:47] VERBOSE[26873][C-00000006] res_rtp_asterisk.c: Got  RTP packet from    192.168.10.53:50006 (type 101, seq 012019, ts 480000275, len 000008)
> [2020-04-19 09:32:47] VERBOSE[26873][C-00000006] res_rtp_asterisk.c: Got  RTP RFC2833 from   192.168.10.53:50006 (type 101, seq 012019, ts 480000275, len 000004, mark 0, event 00000008, end 0, duration 01440)
> [2020-04-19 09:32:47] DEBUG[26873][C-00000006] res_rtp_asterisk.c: - RTP 2833 Event: 00000008 (len = 4)
> [2020-04-19 09:32:47] VERBOSE[26873][C-00000006] res_rtp_asterisk.c: Got  RTP packet from    192.168.10.53:50006 (type 101, seq 012021, ts 480000275, len 000008)
> [2020-04-19 09:32:47] VERBOSE[26873][C-00000006] res_rtp_asterisk.c: Got  RTP RFC2833 from   192.168.10.53:50006 (type 101, seq 012021, ts 480000275, len 000004, mark 0, event 00000008, end 1, duration 01600)
> [2020-04-19 09:32:47] DEBUG[26873][C-00000006] res_rtp_asterisk.c: - RTP 2833 Event: 00000008 (len = 4)
> [2020-04-19 09:32:47] DEBUG[26873][C-00000006] res_rtp_asterisk.c: Creating END DTMF Frame: 56 (8), at 192.168.10.53:50006
> [2020-04-19 09:32:47] DTMF[26873][C-00000006] channel.c: DTMF end '8' received on PJSIP/msteams_sip1-00000005, duration 200 ms
> [2020-04-19 09:32:47] DTMF[26873][C-00000006] channel.c: DTMF end '8' received on PJSIP/msteams_sip1-00000005, duration 200 ms
> [2020-04-19 09:32:47] DTMF[26873][C-00000006] channel.c: DTMF end accepted with begin '8' on PJSIP/msteams_sip1-00000005
> [2020-04-19 09:32:47] DTMF[26873][C-00000006] channel.c: DTMF end accepted with begin '8' on PJSIP/msteams_sip1-00000005
> [2020-04-19 09:32:47] DTMF[26873][C-00000006] channel.c: DTMF end passthrough '8' on PJSIP/msteams_sip1-00000005
> [2020-04-19 09:32:47] DTMF[26873][C-00000006] channel.c: DTMF end passthrough '8' on PJSIP/msteams_sip1-00000005
> [2020-04-19 09:32:47] VERBOSE[26873][C-00000006] res_rtp_asterisk.c: Got  RTP packet from    192.168.10.53:50006 (type 101, seq 012022, ts 480000275, len 000008)
> [2020-04-19 09:32:47] VERBOSE[26873][C-00000006] res_rtp_asterisk.c: Got  RTP RFC2833 from   192.168.10.53:50006 (type 101, seq 012022, ts 480000275, len 000004, mark 0, event 00000008, end 1, duration 01600)
> [2020-04-19 09:32:47] DEBUG[26873][C-00000006] res_rtp_asterisk.c: - RTP 2833 Event: 00000008 (len = 4)
> [2020-04-19 09:32:47] DEBUG[26873][C-00000006] res_rtp_asterisk.c: Dropping duplicate or out of order DTMF END frame (seqno: 12022, ts 480000275, digit 8)
> [2020-04-19 09:32:47] VERBOSE[26873][C-00000006] res_rtp_asterisk.c: Got  RTP packet from    192.168.10.53:50006 (type 101, seq 012023, ts 480000275, len 000008)
> [2020-04-19 09:32:47] VERBOSE[26873][C-00000006] res_rtp_asterisk.c: Got  RTP RFC2833 from   192.168.10.53:50006 (type 101, seq 012023, ts 480000275, len 000004, mark 0, event 00000008, end 1, duration 01600)
> [2020-04-19 09:32:47] DEBUG[26873][C-00000006] res_rtp_asterisk.c: - RTP 2833 Event: 00000008 (len = 4)
> [2020-04-19 09:32:47] DEBUG[26873][C-00000006] res_rtp_asterisk.c: Dropping duplicate or out of order DTMF END frame (seqno: 12023, ts 480000275, digit 8)
> {noformat}
> {panel}



--
This message was sent by Atlassian JIRA
(v6.2#6252)



More information about the asterisk-bugs mailing list