[Home]

Summary:ASTERISK-04792: sip reload breaks dtmf via rfc2833
Reporter:Joe Antkowiak (antkojm1)Labels:
Date Opened:2005-08-07 20:28:58Date Closed:2011-06-07 14:10:30
Priority:MinorRegression?No
Status:Closed/CompleteComponents:Core/General
Versions:Frequency of
Occurrence
Related
Issues:
Environment:Attachments:
Description:Whenever we do a sip reload, rfc2833 from our cisco sip gateways breaks.  requires asterisk restart.  sip debug shows dtmf still being sent to * from the gateways.  let me know if you want a copy of the debug, or whatever else you need.
Comments:By: Russell Bryant (russell) 2005-08-07 20:31:16

sip.conf, please

By: Joe Antkowiak (antkojm1) 2005-08-07 20:38:56

[general]
context=default
allowguest=no
realm=jsci.net
bindport=5060
bindaddr=72.1.157.37
srvlookup=no
tos=184      
disallow=all
allow=g726
allow=speex
allow=ilbc
allow=gsm
allow=ulaw

language=en
relaxdtmf=no
rtptimeout=300
rtpholdtimeout=500
progressinband=always

dtmfmode=rfc2833

regcontext=sipregistrations

nat=yes        

rtcachefriends=yes
rtnoupdate=yes
rtautoclear=yes


[bwi1-cgw1]
type=peer
host=72.1.157.34
disallow=all
allow=ulaw
insecure=very
permit=72.1.157.34/255.255.255.255
auth=none
dtmfmode=rfc2833
qualify=yes
canreinvite=no
context=didswitching
nat=no

[bwi1-cgw2]
type=peer
host=72.1.157.35
disallow=all
allow=ulaw
insecure=very
permit=72.1.157.35/255.255.255.255
auth=none
dtmfmode=rfc2833
qualify=yes
canreinvite=no
context=didswitching
nat=no

By: Mark Spencer (markster) 2005-08-07 20:57:18

Does it break only for new calls or even for calls that are active at the time of reload?

By: Joe Antkowiak (antkojm1) 2005-08-07 22:11:27

only new calls.  I also just figured out that in addition to the reload, there has to be a config change to the peer affected for it to happen.  a simple reload doesn't seem to reproduce it.

By: Mark Spencer (markster) 2005-08-07 22:20:14

Okay, do you want to be more specific about what change is required to the peer definition to cause this issue then?

By: Joe Antkowiak (antkojm1) 2005-08-08 00:06:30

auth, host, context, and codec changes so far break it.  insecure and permit/deny don't seem to.

By: Mark Spencer (markster) 2005-08-08 02:36:12

Can you provide an example before/after config that breaks one?

By: Joe Antkowiak (antkojm1) 2005-08-09 12:25:13

before:

[bwi1-cgw2]
type=peer
host=72.1.157.35
disallow=all
allow=ulaw
insecure=very
permit=72.1.157.35/255.255.255.255
auth=none
dtmfmode=rfc2833
qualify=yes
canreinvite=no
context=switching
nat=no

after:

[bwi1-cgw2]
type=peer
host=72.1.157.35
disallow=all
allow=ulaw
insecure=very
permit=72.1.157.35/255.255.255.255
auth=none
dtmfmode=rfc2833
qualify=yes
canreinvite=no
context=didswitching
nat=no

By: Mark Spencer (markster) 2005-08-09 12:42:06

So to clarify, you're saying that by changing the context within a peer (and making no other changes whatsoever, not moving the peer to a different place within the config file or anything) you're able to make rfc2833 fail to receive properly on a reload?

By: Joe Antkowiak (antkojm1) 2005-08-11 12:53:08

Yes, that is correct.

By: Olle Johansson (oej) 2005-08-11 13:16:10

Please do a "sip show peer" on one peer before and after

By: Michael Jerris (mikej) 2005-08-18 07:11:57

unfortunately, we can not continue troublshooting this bug without your assistance.  I am going to suspend this bug for now, please re-open when you are able to provide the requested information.