Call generates PJSIP_EMSGTOOLONG after upgrade from 1.0.3 to trunk

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello,

I'm working on upgrading our code to use the newer versions of pjsip.  I've updated pjsip to trunk and now my calls won't go through.

I think the problem has something to do with this line in the logs:

 19:01:29.003    tsx0xa20a64  Failed to send Request msg INVITE/cseq=8432 (tdta0x9f4600)! err=171023 (Message too long (PJSIP_EMSGTOOLONG))

Our message wasn't too long before.

There have been a lot of changes to pjsip so I'm not sure if we need to make a change in our code or if the issue is with pjsip.

Here is a snippet from our logs:

 19:01:28.076   tlsc0x9f7614  TLS client transport created
 19:01:28.077   tlsc0x9f7614  TLS transport 192.168.1.12:61320 is connecting to 174.129.118.8:5061...
 19:01:28.078   pjsua_core.c  TX 1809 bytes Request msg INVITE/cseq=8431 (tdta0x9f4600) to tls 174.129.118.8:5061:
INVITE sip:2233 at dial-proxy.rf.com:5061;transport=tls SIP/2.0
Via: SIP/2.0/TLS 192.168.1.12:61320;rport;branch=z9hG4bKPj.VhVhDvgge222WD2H1eX1OF61xsGG.nZ
Max-Forwards: 70
From: sip:75866584-6ce1-11de-8c1e-123139004e42@xxxxxxxxxxxxxxxxx;tag=lHW-deA0KzGncb3imfAWqawJHZFRgAEu
To: sip:2233 at dial-proxy.rf.com
Contact: <sip:75866584-6ce1-11de-8c1e-123139004e42 at 192.168.1.12:55061;transport=TLS>
Call-ID: XCxzsJjwE5aqMnzAv6.dSLO.77WscieY
CSeq: 8431 INVITE
Allow: PRACK, INVITE, ACK, BYE, CANCEL, UPDATE, SUBSCRIBE, NOTIFY, REFER, MESSAGE, OPTIONS
Supported: replaces, 100rel, timer, norefersub
Session-Expires: 1800
Min-SE: 90
User-Agent: RF Dial trunk (2224M)
Content-Type: application/sdp
Content-Length:  1088

v=0
o=- 3468106888 3468106888 IN IP4 76.102.29.139
s=pjmedia
c=IN IP4 76.102.29.139
t=0 0
a=X-nat:5
m=audio 49307 RTP/AVP 3 0 8 9 121 122 123 124 125 101
a=rtpmap:3 GSM/8000
a=rtpmap:0 PCMU/8000
a=rtpmap:8 PCMA/8000
a=rtpmap:9 G722/8000
a=rtpmap:121 G7221/16000
a=fmtp:121 bitrate=24000
a=rtpmap:122 G7221/16000
a=fmtp:122 bitrate=32000
a=rtpmap:123 G7221/32000
a=fmtp:123 bitrate=24000
a=rtpmap:124 G7221/32000
a=fmtp:124 bitrate=32000
a=rtpmap:125 G7221/32000
a=fmtp:125 bitrate=48000
a=sendrecv
a=rtpmap:101 telephone-event/8000
a=fmtp:101 0-15
a=ice-ufrag:3b22b81b
a=ice-pwd:646512f1
a=candidate:Sc0a8010c 1 UDP 2130706431 76.102.29.139 49307 typ srflx raddr 192.168.1.12 rport 49307
a=candidate:Hc0a8010c 1 UDP 1694498815 192.168.1.12 49307 typ host
a=candidate:Hafaab38 1 UDP 1694498815 10.250.171.56 49307 typ host
a=candidate:Sc0a8010c 2 UDP 2130706430 76.102.29.139 49308 typ srflx raddr 192.168.1.12 rport 49308
a=candidate:Hc0a8010c 2 UDP 1694498814 192.168.1.12 49308 typ host
a=candidate:Hafaab38 2 UDP 1694498814 10.250.171.56 49308 typ host

--end msg--
 19:01:28.091    tsx0x9f6664  State changed from Null to Calling, event=TX_MSG
 19:01:28.091    dlg0x9f0264  Transaction tsx0x9f6664 state changed to Calling
 19:01:28.093         call.m  Call 0 state=CALLING
2009-11-24 19:01:28.093 RF Dial[8158:207] call postCallStateNotification start
 19:01:28.785   tlsc0x9f7614  TLS transport 192.168.1.12:61320 is connected to 174.129.118.8:5061
 19:01:28.977 sip_endpoint.c  Processing incoming message: Response msg 401/INVITE/cseq=8431 (rdata0x9f77ac)
 19:01:28.977   pjsua_core.c  RX 573 bytes Response msg 401/INVITE/cseq=8431 (rdata0x9f77ac) from tls 174.129.118.8:5061:
SIP/2.0 401 Unauthorized
Via: SIP/2.0/TLS 192.168.1.12:61320;branch=z9hG4bKPj.VhVhDvgge222WD2H1eX1OF61xsGG.nZ;received=76.102.29.139;rport=61320
From: sip:75866584-6ce1-11de-8c1e-123139004e42@xxxxxxxxxxxxxxxxx;tag=lHW-deA0KzGncb3imfAWqawJHZFRgAEu
To: sip:2233 at dial-proxy.rf.com;tag=as7beafc40
Call-ID: XCxzsJjwE5aqMnzAv6.dSLO.77WscieY
CSeq: 8431 INVITE
Server: RF Dial
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO
Supported: replaces, timer
WWW-Authenticate: Digest algorithm=MD5, realm="RF.com", nonce="7cd8cd83"
Content-Length: 0


--end msg--
 19:01:28.978    tsx0x9f6664  Incoming Response msg 401/INVITE/cseq=8431 (rdata0x9f77ac) in state Calling
 19:01:28.983       endpoint  Request msg ACK/cseq=8431 (tdta0xa1ea00) created.
 19:01:28.983   pjsua_core.c  TX 400 bytes Request msg ACK/cseq=8431 (tdta0xa1ea00) to tls 174.129.118.8:5061:
ACK sip:2233 at dial-proxy.rf.com:5061;transport=tls SIP/2.0
Via: SIP/2.0/TLS 192.168.1.12:61320;rport;branch=z9hG4bKPj.VhVhDvgge222WD2H1eX1OF61xsGG.nZ
Max-Forwards: 70
From: sip:75866584-6ce1-11de-8c1e-123139004e42@xxxxxxxxxxxxxxxxx;tag=lHW-deA0KzGncb3imfAWqawJHZFRgAEu
To: sip:2233 at dial-proxy.rf.com;tag=as7beafc40
Call-ID: XCxzsJjwE5aqMnzAv6.dSLO.77WscieY
CSeq: 8431 ACK
Content-Length:  0


--end msg--
 19:01:28.985    tsx0x9f6664  State changed from Calling to Completed, event=RX_MSG
 19:01:28.985    dlg0x9f0264  Received Response msg 401/INVITE/cseq=8431 (rdata0x9f77ac)
 19:01:28.993    dlg0x9f0264  Transaction tsx0x9f6664 state changed to Completed
 19:01:28.995    inv0x9f0264  Sending Request msg INVITE/cseq=8431 (tdta0x9f4600)
 19:01:28.997    dlg0x9f0264  Sending Request msg INVITE/cseq=8431 (tdta0x9f4600)
 19:01:28.998    tsx0xa20a64  Transaction created for Request msg INVITE/cseq=8432 (tdta0x9f4600)
 19:01:28.999    tsx0xa20a64  Sending Request msg INVITE/cseq=8432 (tdta0x9f4600) in state Null
 19:01:29.000       endpoint  Request msg INVITE/cseq=8432 (tdta0x9f4600): skipping target resolution because address is already set
 19:01:29.003    tsx0xa20a64  Failed to send Request msg INVITE/cseq=8432 (tdta0x9f4600)! err=171023 (Message too long (PJSIP_EMSGTOOLONG))
 19:01:29.005    tsx0xa20a64  State changed from Null to Terminated, event=TRANSPORT_ERROR
 19:01:29.005    dlg0x9f0264  Transaction tsx0xa20a64 state changed to Terminated
 19:01:29.006         call.m  Call 0 state=DISCONNCTD
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.pjsip.org/pipermail/pjsip_lists.pjsip.org/attachments/20091124/f274c0ef/attachment-0001.html>


[Index of Archives]     [Asterisk Users]     [Asterisk App Development]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [Linux API]
  Powered by Linux