Why my WebRTC connection doesn't works at some networks? - webrtc

I've customized Apprtc project (android version).
assume we have four internet connection (from different network connections):
NetA -- NetB
NetC -- NetD
I can connect from NetA to NetB, but i can't connect from NetC to NetD!
I have set turn server and stun server but i don't know what is wrong.
--
When connecting from NetA to NetB (success):
Offer SDP:
"v=0\r\no=- 632333030865012591 2 IN IP4 127.0.0.1\r\ns=-\r\nt=0 0\r\na=group:BUNDLE audio video\r\na=msid-semantic: WMS ARDAMS___\r\nm=audio 9 UDP/TLS/RTP/SAVPF 111 103 9 102 0 8 105 13 126\r\nc=IN IP4 0.0.0.0\r\na=rtcp:9 IN IP4 .............."
"candidate:2580031558 1 udp 2122260223 100.95.184.57 37422 typ host generation 0 ufrag NL4P network-id 3 network-cost 900"
"candidate:411053810 1 udp 1686052607 5.116.182.156 1026 typ srflx raddr 100.95.184.57 rport 37422 generation 0 ufrag NL4P network-id 3 network-cost 900"
"candidate:3902036248 1 udp 41885695 34.197.185.148 52061 typ relay raddr 5.116.182.156 rport 1026 generation 0 ufrag NL4P network-id 3 network-cost 900"
"candidate":"candidate:2786567656 1 udp 25108223 34.197.185.148 52062 typ relay raddr 5.116.182.156 rport 1032 generation 0 ufrag NL4P network-id 3 network-cost 900"
Answer SDP:
"v=0\r\no=- 3736097442176838392 2 IN IP4 127.0.0.1\r\ns=-\r\nt=0 0\r\na=group:BUNDLE audio video\r\na=msid-semantic: WMS ARDAMS___\r\nm=audio 9 UDP/TLS/RTP/SAVPF 111 103 9 102 0 8 105 13 126\r\nc=IN IP4 0.0.0.0\r\na=rtcp:9 IN IP4 0.0.0.0\r\na=ice-ufrag:7upj\r\na............"
"candidate:1892013251 1 udp 2122260223 192.168.7.7 37718 typ host generation 0 ufrag 7upj network-id 3 network-cost 10"
"candidate:3650771734 1 udp 1686052607 151.242.87.74 37718 typ srflx raddr 192.168.7.7 rport 37718 generation 0 ufrag 7upj network-id 3 network-cost 10"
"candidate:3902036248 1 udp 41885695 34.197.185.148 52063 typ relay raddr 151.242.87.74 rport 37718 generation 0 ufrag 7upj network-id 3 network-cost 10"
"candidate":"candidate:2786567656 1 udp 25108223 34.197.185.148 52064 typ relay raddr 151.242.87.74 rport 45889 generation 0 ufrag 7upj network-id 3 network-cost 10"
--
When connecting from NetC to NetD (failed):
Offer SDP:
"v=0\r\no=- 280763199112942253 2 IN IP4 127.0.0.1\r\ns=-\r\nt=0 0\r\na=group:BUNDLE audio video\r\na=msid-semantic: WMS ARDAMS___\r\nm=audio 9 UDP/TLS/RTP/SAVPF 111 103 9 102 0 8 105 13 126\r\nc=IN IP4 0.0.0.0\r\na=rtcp:9 IN IP4 0.0.0.0\r\na=ice-ufrag:UPpi\r\na=ice-pwd:Ow2J0AHuS86I0o0yZ5MOv6a/\r\na=ice-options:renomination\r\na=fingerprint:sha-256................."
"candidate":"candidate:2580031558 1 udp 2122260223 100.95.184.57 34267 typ host generation 0 ufrag UPpi network-id 3 network-cost 900"
"candidate":"candidate:411053810 1 udp 1686052607 5.116.182.156 1287 typ srflx raddr 100.95.184.57 rport 34267 generation 0 ufrag UPpi network-id 3 network-cost 900"
"candidate":"candidate:3902036248 1 udp 41885695 34.197.185.148 58779 typ relay raddr 5.116.182.156 rport 1287 generation 0 ufrag UPpi network-id 3 network-cost 900"
"candidate":"candidate:2786567656 1 udp 25108223 34.197.185.148 58780 typ relay raddr 5.116.182.156 rport 1201 generation 0 ufrag UPpi network-id 3 network-cost 900"
Answer SDP:
"v=0\r\no=- 6478139475592243492 2 IN IP4 127.0.0.1\r\ns=-\r\nt=0 0\r\na=group:BUNDLE audio video\r\na=msid-semantic: WMS ARDAMS___\r\nm=audio 9 UDP/TLS/RTP/SAVPF 111 103 9 102 0 8 105 13 126\r\nc=IN IP4 0.0.0.0\r\na=rtcp:9 IN IP4 0.0.0.0\r\na=ice-ufrag:Js6x\r\na=ice-pwd:5tyUT023mAERirumK7aal+9F\r\na=ice-options:renomination\r\na=fingerprint:sha-256 45:97:7F:BC:37:90:4D:B6:35:E5:23:C8:12:09:5A:43:D7:4B:03:EC:A0:7B:70:EB:E4:DB:12:B8:7B:1C:6E:5D\r\na=setup:active.............."
"candidate","label":0,"id":"audio","candidate":"candidate:1106113138 1 udp 2122260223 192.168.1.169 44238 typ host generation 0 ufrag Js6x network-id 3 network-cost 10"
"candidate":"candidate:3232101574 1 udp 1686052607 151.247.139.59 44238 typ srflx raddr 192.168.1.169 rport 44238 generation 0 ufrag Js6x network-id 3 network-cost 10"
"candidate":"candidate:3902036248 1 udp 41885695 34.197.185.148 58781 typ relay raddr 151.247.139.59 rport 44238 generation 0 ufrag Js6x network-id 3 network-cost 10"
"candidate":"candidate:2786567656 1 udp 25108223 34.197.185.148 58782 typ relay raddr 151.247.139.59 rport 36519 generation 0 ufrag Js6x network-id 3 network-cost 10"
"candidate":"candidate:238873586 1 udp 2122194687 100.116.182.76 48966 typ host generation 0 ufrag Js6x network-id 4 network-cost 900"
"candidate":"candidate:3266434145 1 udp 1685987071 91.251.147.158 16369 typ srflx raddr 100.116.182.76 rport 48966 generation 0 ufrag Js6x network-id 4 network-cost 900"
"candidate":"candidate:3902036248 1 udp 41820159 34.197.185.148 58783 typ relay raddr 91.251.147.158 rport 16369 generation 0 ufrag Js6x network-id 4 network-cost 900"
"candidate":"candidate:2786567656 1 udp 25042687 34.197.185.148 58784 typ relay raddr 91.251.147.158 rport 16222 generation 0 ufrag Js6x network-id 4 network-cost 900"
EDIT :
Thanks to all. I found my problem is from my turn server. I can connect in any situation when using appr.tc ice servers (google turn servers). but i can't connect with my turn server. please check question about my turn server at this page :
Why my turn server doesn't work?

Take a look at this article Introduction to WebRTC protocols.
You need to set up STUN and TURN server, to pass the firewall. If peer is behind a firewall or a router, by connecting only to IP address you will hit router not the requested peer device. etc etc.

I would begin to test my TURN server if it is really working.
Disable direct links on your firewall (between NetC and NetD or just block the peer IP) to see if it is working via TURN. If not, then fix your TURN server or it's configuration.

Related

coTURN unable to do a handshake in Mozilla Firefox

I have a web and standalone applications that use WebRTC.
I have my own coturn server on Amazon EC2. I configure everything based on that article (maybe it was a mistake?). I test my apps with this stun/turn server and everything works just fine for Chrome, Edge, Safari, but does not work for Mozilla Firefox (Offer and Answer were generated). I received the following error in a console:
ICE failed, your TURN server appears to be broken, see about:webrtc for more details
I assume that I misconfigure something, so this is why it doesn't work.
EC2 machine I used:
2x private IP,
2x public IP (Elastic IP),
tier: T2.micro,
UDP/TCP ports are open.
Configuration of coturn (/etc/turnserver.conf file):
listening-ip=0.0.0.0
external-ip={publicIP}:{privateIP}
external-port=3478
fingerprint
realm={publicIP}
lt-cred-mech
user={username}:{password}
log-file=/var/tmp/turn.log
verbose
Stun/Turn server configuration in a code:
RTCConfiguration.Create([|
RTCIceServer.Create([|
"stun:{publicIP}:3478"
"turn:{publicIP}:3478"
|], {userName}, {password}, RTCIceCredentialType.Password)
|])
And the transport policy set to all.
And the whole turn.log for only this request from Mozilla:
0: log file opened: /var/tmp/turn_2020-04-03.log
0: pid file created: /var/run/turnserver.pid
0: IO method (main listener thread): epoll (with changelist)
0: WARNING: I cannot support STUN CHANGE_REQUEST functionality because only one IP address is provided
0: Wait for relay ports initialization...
0: relay 0.0.0.0 initialization...
0: relay 0.0.0.0 initialization done
0: Relay ports initialization done
0: IO method (general relay thread): epoll (with changelist)
0: turn server id=1 created
0: IPv4. SCTP listener opened on : 0.0.0.0:3478
0: IPv4. TCP listener opened on : 0.0.0.0:3478
0: IO method (general relay thread): epoll (with changelist)
0: turn server id=0 created
0: IPv4. TCP listener opened on : 0.0.0.0:3478
0: IPv4. UDP listener opened on: 0.0.0.0:3478
0: Total General servers: 2
0: IO method (admin thread): epoll (with changelist)
0: IO method (auth thread): epoll (with changelist)
0: IO method (auth thread): epoll (with changelist)
0: SQLite DB connection success: /var/lib/turn/turndb
20: handle_udp_packet: New UDP endpoint: local addr 0.0.0.0:3478, remote addr {remoteIP}:59148
20: session 001000000000000001: realm <{publicIP}> user <>: incoming packet BINDING processed, success
20: handle_udp_packet: New UDP endpoint: local addr 0.0.0.0:3478, remote addr {remoteIP}:49200
20: session 001000000000000002: realm <{publicIP}> user <>: incoming packet message processed, error 401: Unauthorized
21: IPv4. Local relay addr: {privateIP}:15158
21: session 001000000000000002: new, realm=<{publicIP}>, username=<{username}>, lifetime=600
21: session 001000000000000002: realm <{publicIP}> user <{username}>: incoming packet ALLOCATE processed, success
48: handle_udp_packet: New UDP endpoint: local addr 0.0.0.0:3478, remote addr {remoteIP}:62186
48: session 001000000000000003: realm <{publicIP}> user <{username}>: incoming packet message processed, error 438: Wrong nonce
48: session 001000000000000003: realm <{publicIP}> user <{username}>: incoming packet REFRESH processed, error 437: Invalid allocation
48: session 001000000000000003: realm <{publicIP}> user <{username}>: incoming packet message processed, error 437: Invalid allocation
61: handle_udp_packet: New UDP endpoint: local addr 0.0.0.0:3478, remote addr {remoteIP}:49582
61: session 001000000000000004: realm <{publicIP}> user <{username}>: incoming packet message processed, error 438: Wrong nonce
61: session 001000000000000004: realm <{publicIP}> user <{username}>: incoming packet REFRESH processed, error 437: Invalid allocation
61: session 001000000000000004: realm <{publicIP}> user <{username}>: incoming packet message processed, error 437: Invalid allocation
66: session 001000000000000004: realm <{publicIP}> user <{username}>: incoming packet CREATE_PERMISSION processed, success
66: session 001000000000000004: realm <{publicIP}> user <{username}>: incoming packet message processed, error 400: Bad Request
and logs from about:webrtc:
/builds/worker/workspace/build/src/media/mtransport/third_party/nICEr/src/net/nr_socket_multi_tcp.c:173 function nr_socket_multi_tcp_create_stun_server_socket skipping UDP STUN server(addr:IP4:{localIP}:3478/UDP)
/builds/worker/workspace/build/src/media/mtransport/third_party/nICEr/src/net/nr_socket_multi_tcp.c:173 function nr_socket_multi_tcp_create_stun_server_socket skipping UDP STUN server(addr:IP4:{localIP}:3478/UDP)
/builds/worker/workspace/build/src/media/mtransport/third_party/nICEr/src/net/nr_socket_multi_tcp.c:617 function nr_socket_multi_tcp_listen failed with error 3
ICE(PC:21372137213721372 (id=214741111111 url=http://someurl)): failed to create passive TCP host candidate: 3
STUN-CLIENT(srflx(IP4:192.168.0.50:54084/UDP|IP4:{localIP}:3478/UDP)): Timed out
ICE(PC:21372137213721372 (id=214741111111 url=http://someurl))/CAND(srflx(IP4:192.168.0.50:54084/UDP|IP4:{localIP}:3478/UDP)): failed to initialize, 2 remaining
STUN-CLIENT(relay(IP4:192.168.0.50:54084/UDP|IP4:{localIP}:3478/UDP)::TURN): Timed out
TURN(relay(IP4:192.168.0.50:54084/UDP|IP4:{localIP}:3478/UDP)): mode 20, nr_turn_client_error_cb
TURN(relay(IP4:192.168.0.50:54084/UDP|IP4:{localIP}:3478/UDP)) failed
TURN(relay(IP4:192.168.0.50:54084/UDP|IP4:{localIP}:3478/UDP)): cancelling
ICE-CANDIDATE(relay(IP4:192.168.0.50:54084/UDP|IP4:{localIP}:3478/UDP)): nr_turn_allocated_cb called with state 4
ICE-CANDIDATE(relay(IP4:192.168.0.50:54084/UDP|IP4:{localIP}:3478/UDP)): nr_turn_allocated_cb failed
ICE(PC:21372137213721372 (id=214741111111 url=http://someurl))/CAND(srflx(IP4:192.168.0.50:54084/UDP|IP4:{localIP}:3478/UDP)): failed to initialize, 1 remaining
ICE(PC:21372137213721372 (id=214741111111 url=http://someurl))/CAND(relay(IP4:192.168.0.50:54084/UDP|IP4:{localIP}:3478/UDP)): failed to initialize, 0 remaining
ICE(PC:21372137213721372 (id=214741111111 url=http://someurl)): All candidates initialized
ICE(PC:21372137213721372 (id=214741111111 url=http://someurl)): peer (PC:21372137213721372 (id=214741111111 url=http://someurl):default) has no stream matching stream PC:21372137213721372 (id=214741111111 url=http://someurl) transport-id=transport_0 - 72a938a6:f1234561cb2blablabla0dc711160ac
ICE(PC:21372137213721372 (id=214741111111 url=http://someurl)): peer (PC:21372137213721372 (id=214741111111 url=http://someurl):default) no such component for candidate candidate:foundation 2 udp 2130706431 10.0.22.10 64477 typ host generation 0
ICE(PC:21372137213721372 (id=214741111111 url=http://someurl)): peer (PC:21372137213721372 (id=214741111111 url=http://someurl):default) no such component for candidate candidate:foundation 2 udp 2130706431 160.21.130.15 64478 typ host generation 0
ICE(PC:21372137213721372 (id=214741111111 url=http://someurl)): peer (PC:21372137213721372 (id=214741111111 url=http://someurl):default) no such component for candidate candidate:foundation 2 udp 1694498815 10.20.44.17 59873 typ srflx raddr 0.0.0.0 rport 64479 generation 0
ICE(PC:21372137213721372 (id=214741111111 url=http://someurl)): peer (PC:21372137213721372 (id=214741111111 url=http://someurl):default) no such component for candidate candidate:foundation 2 udp 16777215 {publicIP} 14332 typ relay raddr 0.0.0.0 rport 64480 generation 0
ICE-PEER(PC:21372137213721372 (id=214741111111 url=http://someurl):default)/CAND-PAIR(AUgV): setting pair to state FROZEN: AUgV|IP4:192.168.0.50:54084/UDP|IP4:10.0.22.10:64477/UDP(host(IP4:192.168.0.50:54084/UDP)|candidate:foundation 1 udp 2130706431 10.0.22.10 64477 typ host generation 0)
ICE(PC:21372137213721372 (id=214741111111 url=http://someurl))/CAND-PAIR(AUgV): Pairing candidate IP4:192.168.0.50:54084/UDP (7e7f00ff):IP4:10.0.22.10:64477/UDP (7effffff) priority=9115005270299246590 (7e7f00fffdfffffe)
ICE-PEER(PC:21372137213721372 (id=214741111111 url=http://someurl):default)/CAND-PAIR(LRw8): setting pair to state FROZEN: LRw8|IP4:192.168.0.50:54084/UDP|IP4:160.21.130.15:64478/UDP(host(IP4:192.168.0.50:54084/UDP)|candidate:foundation 1 udp 2130706431 160.21.130.15 64478 typ host generation 0)
ICE(PC:21372137213721372 (id=214741111111 url=http://someurl))/CAND-PAIR(LRw8): Pairing candidate IP4:192.168.0.50:54084/UDP (7e7f00ff):IP4:160.21.130.15:64478/UDP (7effffff) priority=9115005270299246590 (7e7f00fffdfffffe)
ICE-PEER(PC:21372137213721372 (id=214741111111 url=http://someurl):default)/CAND-PAIR(uAK4): setting pair to state FROZEN: uAK4|IP4:192.168.0.50:54084/UDP|IP4:10.20.44.17:59873/UDP(host(IP4:192.168.0.50:54084/UDP)|candidate:foundation 1 udp 1694498815 10.20.44.17 59873 typ srflx raddr 0.0.0.0 rport 64479 generation 0)
ICE(PC:21372137213721372 (id=214741111111 url=http://someurl))/CAND-PAIR(uAK4): Pairing candidate IP4:192.168.0.50:54084/UDP (7e7f00ff):IP4:10.20.44.17:59873/UDP (64ffffff) priority=7277816997780259327 (64fffffffcfe01ff)
ICE-PEER(PC:21372137213721372 (id=214741111111 url=http://someurl):default)/CAND-PAIR(ZzTX): setting pair to state FROZEN: ZzTX|IP4:192.168.0.50:54084/UDP|IP4:{publicIP}:14332/UDP(host(IP4:192.168.0.50:54084/UDP)|candidate:foundation 1 udp 16777215 {publicIP} 14332 typ relay raddr 0.0.0.0 rport 64480 generation 0)
ICE(PC:21372137213721372 (id=214741111111 url=http://someurl))/CAND-PAIR(ZzTX): Pairing candidate IP4:192.168.0.50:54084/UDP (7e7f00ff):IP4:{publicIP}:14332/UDP (ffffff) priority=72057593987465727 (fffffffcfe01ff)
ICE-PEER(PC:21372137213721372 (id=214741111111 url=http://someurl):default)/CAND-PAIR(AUgV): setting pair to state WAITING: AUgV|IP4:192.168.0.50:54084/UDP|IP4:10.0.22.10:64477/UDP(host(IP4:192.168.0.50:54084/UDP)|candidate:foundation 1 udp 2130706431 10.0.22.10 64477 typ host generation 0)
ICE-PEER(PC:21372137213721372 (id=214741111111 url=http://someurl):default)/ICE-STREAM(PC:21372137213721372 (id=214741111111 url=http://someurl) transport-id=transport_0 - 72a938a6:f1234561cb2blablabla0dc711160ac): Starting check timer for stream.
ICE-PEER(PC:21372137213721372 (id=214741111111 url=http://someurl):default)/CAND-PAIR(AUgV): setting pair to state IN_PROGRESS: AUgV|IP4:192.168.0.50:54084/UDP|IP4:10.0.22.10:64477/UDP(host(IP4:192.168.0.50:54084/UDP)|candidate:foundation 1 udp 2130706431 10.0.22.10 64477 typ host generation 0)
ICE(PC:21372137213721372 (id=214741111111 url=http://someurl)): peer (PC:21372137213721372 (id=214741111111 url=http://someurl):default) is now checking
ICE(PC:21372137213721372 (id=214741111111 url=http://someurl)): peer (PC:21372137213721372 (id=214741111111 url=http://someurl):default) no streams with pre-answer requests
ICE-PEER(PC:21372137213721372 (id=214741111111 url=http://someurl):default)/CAND-PAIR(LRw8): setting pair to state WAITING: LRw8|IP4:192.168.0.50:54084/UDP|IP4:160.21.130.15:64478/UDP(host(IP4:192.168.0.50:54084/UDP)|candidate:foundation 1 udp 2130706431 160.21.130.15 64478 typ host generation 0)
ICE-PEER(PC:21372137213721372 (id=214741111111 url=http://someurl):default)/CAND-PAIR(LRw8): setting pair to state IN_PROGRESS: LRw8|IP4:192.168.0.50:54084/UDP|IP4:160.21.130.15:64478/UDP(host(IP4:192.168.0.50:54084/UDP)|candidate:foundation 1 udp 2130706431 160.21.130.15 64478 typ host generation 0)
ICE-PEER(PC:21372137213721372 (id=214741111111 url=http://someurl):default)/CAND-PAIR(uAK4): setting pair to state WAITING: uAK4|IP4:192.168.0.50:54084/UDP|IP4:10.20.44.17:59873/UDP(host(IP4:192.168.0.50:54084/UDP)|candidate:foundation 1 udp 1694498815 10.20.44.17 59873 typ srflx raddr 0.0.0.0 rport 64479 generation 0)
ICE-PEER(PC:21372137213721372 (id=214741111111 url=http://someurl):default)/CAND-PAIR(uAK4): setting pair to state IN_PROGRESS: uAK4|IP4:192.168.0.50:54084/UDP|IP4:10.20.44.17:59873/UDP(host(IP4:192.168.0.50:54084/UDP)|candidate:foundation 1 udp 1694498815 10.20.44.17 59873 typ srflx raddr 0.0.0.0 rport 64479 generation 0)
ICE-PEER(PC:21372137213721372 (id=214741111111 url=http://someurl):default)/CAND-PAIR(ZzTX): setting pair to state WAITING: ZzTX|IP4:192.168.0.50:54084/UDP|IP4:{publicIP}:14332/UDP(host(IP4:192.168.0.50:54084/UDP)|candidate:foundation 1 udp 16777215 {publicIP} 14332 typ relay raddr 0.0.0.0 rport 64480 generation 0)
ICE-PEER(PC:21372137213721372 (id=214741111111 url=http://someurl):default)/CAND-PAIR(ZzTX): setting pair to state IN_PROGRESS: ZzTX|IP4:192.168.0.50:54084/UDP|IP4:{publicIP}:14332/UDP(host(IP4:192.168.0.50:54084/UDP)|candidate:foundation 1 udp 16777215 {publicIP} 14332 typ relay raddr 0.0.0.0 rport 64480 generation 0)
ICE-PEER(PC:21372137213721372 (id=214741111111 url=http://someurl):default): no FROZEN/WAITING pairs for PC:21372137213721372 (id=214741111111 url=http://someurl) transport-id=transport_0 - 72a938a6:f1234561cb2blablabla0dc711160ac
ICE(PC:21372137213721372 (id=214741111111 url=http://someurl)): peer (PC:21372137213721372 (id=214741111111 url=http://someurl):default) Trickle grace period is over; marking every component with only failed pairs as failed.
STUN-CLIENT(AUgV|IP4:192.168.0.50:54084/UDP|IP4:10.0.22.10:64477/UDP(host(IP4:192.168.0.50:54084/UDP)|candidate:foundation 1 udp 2130706431 10.0.22.10 64477 typ host generation 0)): Timed out
ICE-PEER(PC:21372137213721372 (id=214741111111 url=http://someurl):default)/CAND-PAIR(AUgV): setting pair to state FAILED: AUgV|IP4:192.168.0.50:54084/UDP|IP4:10.0.22.10:64477/UDP(host(IP4:192.168.0.50:54084/UDP)|candidate:foundation 1 udp 2130706431 10.0.22.10 64477 typ host generation 0)
STUN-CLIENT(LRw8|IP4:192.168.0.50:54084/UDP|IP4:160.21.130.15:64478/UDP(host(IP4:192.168.0.50:54084/UDP)|candidate:foundation 1 udp 2130706431 160.21.130.15 64478 typ host generation 0)): Timed out
ICE-PEER(PC:21372137213721372 (id=214741111111 url=http://someurl):default)/CAND-PAIR(LRw8): setting pair to state FAILED: LRw8|IP4:192.168.0.50:54084/UDP|IP4:160.21.130.15:64478/UDP(host(IP4:192.168.0.50:54084/UDP)|candidate:foundation 1 udp 2130706431 160.21.130.15 64478 typ host generation 0)
STUN-CLIENT(uAK4|IP4:192.168.0.50:54084/UDP|IP4:10.20.44.17:59873/UDP(host(IP4:192.168.0.50:54084/UDP)|candidate:foundation 1 udp 1694498815 10.20.44.17 59873 typ srflx raddr 0.0.0.0 rport 64479 generation 0)): Timed out
ICE-PEER(PC:21372137213721372 (id=214741111111 url=http://someurl):default)/CAND-PAIR(uAK4): setting pair to state FAILED: uAK4|IP4:192.168.0.50:54084/UDP|IP4:10.20.44.17:59873/UDP(host(IP4:192.168.0.50:54084/UDP)|candidate:foundation 1 udp 1694498815 10.20.44.17 59873 typ srflx raddr 0.0.0.0 rport 64479 generation 0)
STUN-CLIENT(ZzTX|IP4:192.168.0.50:54084/UDP|IP4:{publicIP}:14332/UDP(host(IP4:192.168.0.50:54084/UDP)|candidate:foundation 1 udp 16777215 {publicIP} 14332 typ relay raddr 0.0.0.0 rport 64480 generation 0)): Timed out
ICE-PEER(PC:21372137213721372 (id=214741111111 url=http://someurl):default)/CAND-PAIR(ZzTX): setting pair to state FAILED: ZzTX|IP4:192.168.0.50:54084/UDP|IP4:{publicIP}:14332/UDP(host(IP4:192.168.0.50:54084/UDP)|candidate:foundation 1 udp 16777215 {publicIP} 14332 typ relay raddr 0.0.0.0 rport 64480 generation 0)
ICE-PEER(PC:21372137213721372 (id=214741111111 url=http://someurl):default)/STREAM(PC:21372137213721372 (id=214741111111 url=http://someurl) transport-id=transport_0 - 72a938a6:f1234561cb2blablabla0dc711160ac)/COMP(1): All pairs are failed, and grace period has elapsed. Marking component as failed.
ICE(PC:21372137213721372 (id=214741111111 url=http://someurl))/STREAM(PC:21372137213721372 (id=214741111111 url=http://someurl) transport-id=transport_0 - 72a938a6:f1234561cb2blablabla0dc711160ac): state dump
ICE(PC:21372137213721372 (id=214741111111 url=http://someurl))/ICE-STREAM(PC:21372137213721372 (id=214741111111 url=http://someurl) transport-id=transport_0 - 72a938a6:f1234561cb2blablabla0dc711160ac): Local component 1 - dumping candidates
ICE(PC:21372137213721372 (id=214741111111 url=http://someurl))/ICE-STREAM(PC:21372137213721372 (id=214741111111 url=http://someurl) transport-id=transport_0 - 72a938a6:f1234561cb2blablabla0dc711160ac)/CAND(EJ0l): host(IP4:192.168.0.50:54084/UDP)
ICE(PC:21372137213721372 (id=214741111111 url=http://someurl))/ICE-STREAM(PC:21372137213721372 (id=214741111111 url=http://someurl) transport-id=transport_0 - 72a938a6:f1234561cb2blablabla0dc711160ac)/CAND(5pC7): srflx(IP4:192.168.0.50:54084/UDP|IP4:{localIP}:3478/UDP)
ICE(PC:21372137213721372 (id=214741111111 url=http://someurl))/ICE-STREAM(PC:21372137213721372 (id=214741111111 url=http://someurl) transport-id=transport_0 - 72a938a6:f1234561cb2blablabla0dc711160ac)/CAND(5pC7): srflx(IP4:192.168.0.50:54084/UDP|IP4:{localIP}:3478/UDP)
ICE(PC:21372137213721372 (id=214741111111 url=http://someurl))/ICE-STREAM(PC:21372137213721372 (id=214741111111 url=http://someurl) transport-id=transport_0 - 72a938a6:f1234561cb2blablabla0dc711160ac)/CAND(0hfs): relay(IP4:192.168.0.50:54084/UDP|IP4:{localIP}:3478/UDP)
ICE(PC:21372137213721372 (id=214741111111 url=http://someurl))/ICE-STREAM(PC:21372137213721372 (id=214741111111 url=http://someurl) transport-id=transport_0 - 72a938a6:f1234561cb2blablabla0dc711160ac)/CAND(HrQP): host(IP4:192.168.0.50:50811/TCP) active
ICE-PEER(PC:21372137213721372 (id=214741111111 url=http://someurl):default)/STREAM(PC:21372137213721372 (id=214741111111 url=http://someurl) transport-id=transport_0 - 72a938a6:f1234561cb2blablabla0dc711160ac): state dump
CAND-PAIR(AUgV): pair AUgV|IP4:192.168.0.50:54084/UDP|IP4:10.0.22.10:64477/UDP(host(IP4:192.168.0.50:54084/UDP)|candidate:foundation 1 udp 2130706431 10.0.22.10 64477 typ host generation 0): state=FAILED, priority=0x7e7f00fffdfffffe
CAND-PAIR(LRw8): pair LRw8|IP4:192.168.0.50:54084/UDP|IP4:160.21.130.15:64478/UDP(host(IP4:192.168.0.50:54084/UDP)|candidate:foundation 1 udp 2130706431 160.21.130.15 64478 typ host generation 0): state=FAILED, priority=0x7e7f00fffdfffffe
CAND-PAIR(uAK4): pair uAK4|IP4:192.168.0.50:54084/UDP|IP4:10.20.44.17:59873/UDP(host(IP4:192.168.0.50:54084/UDP)|candidate:foundation 1 udp 1694498815 10.20.44.17 59873 typ srflx raddr 0.0.0.0 rport 64479 generation 0): state=FAILED, priority=0x64fffffffcfe01ff
CAND-PAIR(ZzTX): pair ZzTX|IP4:192.168.0.50:54084/UDP|IP4:{publicIP}:14332/UDP(host(IP4:192.168.0.50:54084/UDP)|candidate:foundation 1 udp 16777215 {publicIP} 14332 typ relay raddr 0.0.0.0 rport 64480 generation 0): state=FAILED, priority=0xfffffffcfe01ff
ICE(PC:21372137213721372 (id=214741111111 url=http://someurl))/ICE-STREAM(PC:21372137213721372 (id=214741111111 url=http://someurl) transport-id=transport_0 - 72a938a6:f1234561cb2blablabla0dc711160ac): Remote component 1 in state 3 - dumping candidates
ICE(PC:21372137213721372 (id=214741111111 url=http://someurl))/ICE-STREAM(PC:21372137213721372 (id=214741111111 url=http://someurl) transport-id=transport_0 - 72a938a6:f1234561cb2blablabla0dc711160ac)/CAND(9Ozf): candidate:foundation 1 udp 2130706431 10.0.22.10 64477 typ host generation 0
ICE(PC:21372137213721372 (id=214741111111 url=http://someurl))/ICE-STREAM(PC:21372137213721372 (id=214741111111 url=http://someurl) transport-id=transport_0 - 72a938a6:f1234561cb2blablabla0dc711160ac)/CAND(N1wD): candidate:foundation 1 udp 2130706431 160.21.130.15 64478 typ host generation 0
ICE(PC:21372137213721372 (id=214741111111 url=http://someurl))/ICE-STREAM(PC:21372137213721372 (id=214741111111 url=http://someurl) transport-id=transport_0 - 72a938a6:f1234561cb2blablabla0dc711160ac)/CAND(YlFO): candidate:foundation 1 udp 1694498815 10.20.44.17 59873 typ srflx raddr 0.0.0.0 rport 64479 generation 0
ICE(PC:21372137213721372 (id=214741111111 url=http://someurl))/ICE-STREAM(PC:21372137213721372 (id=214741111111 url=http://someurl) transport-id=transport_0 - 72a938a6:f1234561cb2blablabla0dc711160ac)/CAND(8mKo): candidate:foundation 1 udp 16777215 {publicIP} 14332 typ relay raddr 0.0.0.0 rport 64480 generation 0
ICE-PEER(PC:21372137213721372 (id=214741111111 url=http://someurl):default): all checks completed success=0 fail=1
Any tips what I possibly do wrong would be appreciated!
You should double-check your internal routes defined in AWS for an EC2 instance and some global one about inbound traffic.
Mozilla Firefox would be the only one that would fail to do the "handshake" if the stun/turn server is not available outside of the internal network.
Chrome, EDGE, Safari would work in such a situation and establish a P2P (srflx) connection.
In my situation, there was some additional definition of inbound traffic to all of the AWS instances, which were blocking the traffic to the stun/turn server. I realize that when I was trying to test the WebRTC from one computer (connected to a VPN) to another (not connected to a VPN) and it fails while doing a "handshake".

Kurento RTSP to webRTC

Im a developping a Samsung Smart TV app with Samsung's TOAST and Caph-angular. I am on Windows 10.
When I call our server, I get an RSRP url encoded with H264 but, on smart TVs, RSRP is not supported. Then I have to "transform" the RSRP url to some webRTC one (I know very little about all this so sorry if the terms are incorrect).
I searched here and there and found Kurento which seems to be able to answer my needs.
Before trying Kurento within my app, I wanted to test it on a few demos.
I was able to test one2many example without any problem but I am having trouble running rtsp2webrtc demo.
I git cloned kms-windows and https://github.com/lulop-k/kurento-rtsp2webrtc and tried to run the demo but the player is not displaying anything.
1) I double-click kms-windows\bin\kurento-media-server
2) I launch http-server in kurento-rtsp2webrtc
3) I reach http://localhost:8080/, type my sample rtsp url (rtsp://wowzaec2demo.streamlock.net/vod/mp4:BigBuckBunny_115k.mov) and click on "start"
No error seems to happen, see console logs:
Local icecandidate {"candidate":"candidate:4033732497 1 udp 2113937151 192.168.0.104 62879 typ host generation 0 ufrag tZFB network-cost 50","sdpMid":"audio","sdpMLineIndex":0}
Local icecandidate {"candidate":"candidate:4033732497 2 udp 2113937150 192.168.0.104 62881 typ host generation 0 ufrag tZFB network-cost 50","sdpMid":"audio","sdpMLineIndex":0}
Local icecandidate {"candidate":"candidate:4033732497 1 udp 2113937151 192.168.0.104 62883 typ host generation 0 ufrag tZFB network-cost 50","sdpMid":"video","sdpMLineIndex":1}
Local icecandidate {"candidate":"candidate:4033732497 2 udp 2113937150 192.168.0.104 62885 typ host generation 0 ufrag tZFB network-cost 50","sdpMid":"video","sdpMLineIndex":1}
PlayerEndpoint-->WebRtcEndpoint connection established
oniceconnectionstatechange -> checking
icegatheringstate -> gathering
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:1 1 UDP 2013266431 192.168.0.104 61810 typ host","sdpMLineIndex":0,"sdpMid":"audio"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:1 1 UDP 2013266431 192.168.0.104 61810 typ host","sdpMLineIndex":1,"sdpMid":"video"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:2 1 TCP 1019216127 192.168.0.104 9 typ host tcptype active","sdpMLineIndex":0,"sdpMid":"audio"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:2 1 TCP 1019216127 192.168.0.104 9 typ host tcptype active","sdpMLineIndex":1,"sdpMid":"video"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:3 1 TCP 1015021823 192.168.0.104 52180 typ host tcptype passive","sdpMLineIndex":0,"sdpMid":"audio"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:3 1 TCP 1015021823 192.168.0.104 52180 typ host tcptype passive","sdpMLineIndex":1,"sdpMid":"video"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:4 1 UDP 2013266431 fe80::6403:eba1:c2a3:9605 61812 typ host","sdpMLineIndex":0,"sdpMid":"audio"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:4 1 UDP 2013266431 fe80::6403:eba1:c2a3:9605 61812 typ host","sdpMLineIndex":1,"sdpMid":"video"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:5 1 TCP 1019217663 fe80::6403:eba1:c2a3:9605 9 typ host tcptype active","sdpMLineIndex":0,"sdpMid":"audio"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:5 1 TCP 1019217663 fe80::6403:eba1:c2a3:9605 9 typ host tcptype active","sdpMLineIndex":1,"sdpMid":"video"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:6 1 TCP 1015023359 fe80::6403:eba1:c2a3:9605 52182 typ host tcptype passive","sdpMLineIndex":0,"sdpMid":"audio"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:6 1 TCP 1015023359 fe80::6403:eba1:c2a3:9605 52182 typ host tcptype passive","sdpMLineIndex":1,"sdpMid":"video"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:7 1 UDP 2013266431 fe80::f99b:72cd:cb28:1424 61814 typ host","sdpMLineIndex":0,"sdpMid":"audio"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:7 1 UDP 2013266431 fe80::f99b:72cd:cb28:1424 61814 typ host","sdpMLineIndex":1,"sdpMid":"video"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:8 1 TCP 1019217663 fe80::f99b:72cd:cb28:1424 9 typ host tcptype active","sdpMLineIndex":0,"sdpMid":"audio"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:8 1 TCP 1019217663 fe80::f99b:72cd:cb28:1424 9 typ host tcptype active","sdpMLineIndex":1,"sdpMid":"video"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:9 1 TCP 1015023359 fe80::f99b:72cd:cb28:1424 52184 typ host tcptype passive","sdpMLineIndex":0,"sdpMid":"audio"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:9 1 TCP 1015023359 fe80::f99b:72cd:cb28:1424 52184 typ host tcptype passive","sdpMLineIndex":1,"sdpMid":"video"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:10 1 UDP 2013266431 192.168.56.1 61816 typ host","sdpMLineIndex":0,"sdpMid":"audio"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:10 1 UDP 2013266431 192.168.56.1 61816 typ host","sdpMLineIndex":1,"sdpMid":"video"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:11 1 TCP 1019216895 192.168.56.1 9 typ host tcptype active","sdpMLineIndex":0,"sdpMid":"audio"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:11 1 TCP 1019216895 192.168.56.1 9 typ host tcptype active","sdpMLineIndex":1,"sdpMid":"video"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:12 1 TCP 1015022591 192.168.56.1 52186 typ host tcptype passive","sdpMLineIndex":0,"sdpMid":"audio"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:12 1 TCP 1015022591 192.168.56.1 52186 typ host tcptype passive","sdpMLineIndex":1,"sdpMid":"video"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:1 2 UDP 2013266430 192.168.0.104 61811 typ host","sdpMLineIndex":0,"sdpMid":"audio"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:1 2 UDP 2013266430 192.168.0.104 61811 typ host","sdpMLineIndex":1,"sdpMid":"video"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:2 2 TCP 1019216126 192.168.0.104 9 typ host tcptype active","sdpMLineIndex":0,"sdpMid":"audio"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:2 2 TCP 1019216126 192.168.0.104 9 typ host tcptype active","sdpMLineIndex":1,"sdpMid":"video"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:3 2 TCP 1015021822 192.168.0.104 52181 typ host tcptype passive","sdpMLineIndex":0,"sdpMid":"audio"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:3 2 TCP 1015021822 192.168.0.104 52181 typ host tcptype passive","sdpMLineIndex":1,"sdpMid":"video"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:4 2 UDP 2013266430 fe80::6403:eba1:c2a3:9605 61813 typ host","sdpMLineIndex":0,"sdpMid":"audio"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:4 2 UDP 2013266430 fe80::6403:eba1:c2a3:9605 61813 typ host","sdpMLineIndex":1,"sdpMid":"video"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:5 2 TCP 1019217662 fe80::6403:eba1:c2a3:9605 9 typ host tcptype active","sdpMLineIndex":0,"sdpMid":"audio"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:5 2 TCP 1019217662 fe80::6403:eba1:c2a3:9605 9 typ host tcptype active","sdpMLineIndex":1,"sdpMid":"video"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:6 2 TCP 1015023358 fe80::6403:eba1:c2a3:9605 52183 typ host tcptype passive","sdpMLineIndex":0,"sdpMid":"audio"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:6 2 TCP 1015023358 fe80::6403:eba1:c2a3:9605 52183 typ host tcptype passive","sdpMLineIndex":1,"sdpMid":"video"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:7 2 UDP 2013266430 fe80::f99b:72cd:cb28:1424 61815 typ host","sdpMLineIndex":0,"sdpMid":"audio"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:7 2 UDP 2013266430 fe80::f99b:72cd:cb28:1424 61815 typ host","sdpMLineIndex":1,"sdpMid":"video"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:8 2 TCP 1019217662 fe80::f99b:72cd:cb28:1424 9 typ host tcptype active","sdpMLineIndex":0,"sdpMid":"audio"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:8 2 TCP 1019217662 fe80::f99b:72cd:cb28:1424 9 typ host tcptype active","sdpMLineIndex":1,"sdpMid":"video"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:9 2 TCP 1015023358 fe80::f99b:72cd:cb28:1424 52185 typ host tcptype passive","sdpMLineIndex":0,"sdpMid":"audio"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:9 2 TCP 1015023358 fe80::f99b:72cd:cb28:1424 52185 typ host tcptype passive","sdpMLineIndex":1,"sdpMid":"video"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:10 2 UDP 2013266430 192.168.56.1 61817 typ host","sdpMLineIndex":0,"sdpMid":"audio"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:10 2 UDP 2013266430 192.168.56.1 61817 typ host","sdpMLineIndex":1,"sdpMid":"video"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:11 2 TCP 1019216894 192.168.56.1 9 typ host tcptype active","sdpMLineIndex":0,"sdpMid":"audio"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:11 2 TCP 1019216894 192.168.56.1 9 typ host tcptype active","sdpMLineIndex":1,"sdpMid":"video"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:12 2 TCP 1015022590 192.168.56.1 52187 typ host tcptype passive","sdpMLineIndex":0,"sdpMid":"audio"}
Remote icecandidate {"__module__":"kurento","__type__":"IceCandidate","candidate":"candidate:12 2 TCP 1015022590 192.168.56.1 52187 typ host tcptype passive","sdpMLineIndex":1,"sdpMid":"video"}
Player playing ...
oniceconnectionstatechange -> connected
icegatheringstate -> complete
oniceconnectionstatechange -> completed
icegatheringstate -> complete
But the player does not display anything. I still see the spinner.
I tried adding a STUN server (not sure what it is or if I even need one, just saw this in docs or other stackoverflow issues) and it did not solve anything.
Could you please help me?
Did I do anything wrong or forget something?
And, in the future, when I want to implement this into my tv web app, will I only need to include kurento-client.js and kurento-utils.js files or will there be other things to take care of?
Thanks in advance
Stun server cannot traverse symmetric NAT's so for that purpose if your server is behind NAT then you should try using TURN server
if you Kurento server is behind the NAT - you need to use TURN server for it

Apache HTTP Server port doesn't respond

I'm forging a packet to start a TCP connection with port 80 (so I'm sending a TCP-SYN) and the HTTP Server does not respond at all.
I've ran netstat -natu during the all process and no change on the port 80 state:
Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address Foreign Address State
tcp 0 0 192.168.1.7:41562 151.101.61.140:443 ESTABLISHED
tcp 0 0 192.168.1.7:45660 216.58.214.161:80 ESTABLISHED
tcp 0 0 192.168.1.7:50852 151.101.193.69:80 TIME_WAIT
tcp 0 0 192.168.1.7:36450 64.233.184.95:443 ESTABLISHED
tcp 1 0 192.168.1.7:46960 162.213.33.49:443 CLOSE_WAIT
tcp6 0 0 :::80 :::* LISTEN
tcp6 0 0 ::1:631 :::* LISTEN
tcp6 1 0 ::1:35050 ::1:631 CLOSE_WAIT
udp 0 0 0.0.0.0:631 0.0.0.0:*
udp 0 0 0.0.0.0:49933 0.0.0.0:*
udp 0 0 0.0.0.0:5287 0.0.0.0:*
The port is always on LISTEN state, and upon receiving a TCP-SYN it should change to SYN_RECV right?
If it helps, a Wireshark capture of the packet I send:
So I can't seem to see what the problem is.
Have you noticed that you're using tcp6 (mean IPv6) but trying to open up the session using IPv4?
I guess that's why it's not opening the session. Try to align to IPv4.

Slackware NFS issues

I'm having trouble accessing my NFS share. It's actually a Slackware boot disk "NFS" issue. When trying to access the share, I get the following message:
mount: RPC: Port mapper failure - RPC: Timed out
Here's some pertinent information:
catch22bbs:~ # rpcinfo -p
program vers proto port service
100000 4 tcp 111 portmapper
100000 3 tcp 111 portmapper
100000 2 tcp 111 portmapper
100000 4 udp 111 portmapper
100000 3 udp 111 portmapper
100000 2 udp 111 portmapper
100005 1 udp 20048 mountd
100005 1 tcp 20048 mountd
100005 2 udp 20048 mountd
100005 2 tcp 20048 mountd
100005 3 udp 20048 mountd
100005 3 tcp 20048 mountd
100003 2 tcp 2049 nfs
100003 3 tcp 2049 nfs
100003 4 tcp 2049 nfs
100227 2 tcp 2049 nfs_acl
100227 3 tcp 2049 nfs_acl
100003 2 udp 2049 nfs
100003 3 udp 2049 nfs
100003 4 udp 2049 nfs
100227 2 udp 2049 nfs_acl
100227 3 udp 2049 nfs_acl
100021 1 udp 53359 nlockmgr
100021 3 udp 53359 nlockmgr
100021 4 udp 53359 nlockmgr
100021 1 tcp 44247 nlockmgr
100021 3 tcp 44247 nlockmgr
100021 4 tcp 44247 nlockmgr
100011 1 udp 692 rquotad
100011 2 udp 692 rquotad
100011 1 tcp 693 rquotad
100011 2 tcp 693 rquotad
100024 1 udp 56306 status
100024 1 tcp 59686 status
catch22bbs:~ # showmount -e 192.168.1.26
Export list for 192.168.1.26:
/var/nfs 192.168.1.26/255.255.255.0
catch22bbs:~ # cat /etc/exports
/var/nfs 192.168.1.26/255.255.255.0(rw,sync,no_root_squash,no_subtree_check)
catch22bbs:~ # cat /etc/hosts.allow
portmap: 192.168.1.33
lockd: 192.168.1.33
rquotd: 192.168.1.33
mountd: 192.168.1.33
statd: 192.168.1.33
rpcbind: 127.0.0.1
catch22bbs:~ # cat /etc/hosts.deny
http-rman : ALL EXCEPT LOCAL
portmap:ALL
lockd:ALL
mountd:ALL
rquotad:ALL
statd:ALL
catch22bbs:~ # cat /etc/fstab
/dev/disk/by-id/ata-ST31000524AS_6VPH1GC5-part2 swap swap defaults 0 0
/dev/disk/by-id/ata-ST31000524AS_6VPH1GC5-part1 / ext4 defaults 1 1
192.168.1.26:/var/nfs /mnt/nfs nfs rw,sync,hard,intr 0 0
I apologize if i'm stepping on anyone's toes, but i've exhausted almost every other avenue.
TIA,
JL
It should go as a comment... Can you also please provide your iptables settings iptables -L?
Your configuration looks ok. In my case firewall rules were a root of this problem.

Apache Not Starting

I can't seem to start Apache 2.2 on Windows7 listening on ports 80 and 8443.
I get the following error:
(OS 10048)Only one usage of each socket address (protocol/network address/port) is normally permitted. : make_sock: could not bind to address 0.0.0.0:8443 .
This error is usually caused by another app listening on the same port but I definitely don't have another application listening on port 8443.
I get this error no matter what port I tell ssl to listen on.
Any ideas?
Netstat dump:
Active Connections
Proto Local Address Foreign Address State PID
TCP 0.0.0.0:80 0.0.0.0:0 LISTENING 4
Can not obtain ownership information
TCP 0.0.0.0:135 0.0.0.0:0 LISTENING 872
RpcSs
[svchost.exe]
TCP 0.0.0.0:443 0.0.0.0:0 LISTENING 3500
[magentproc.exe]
TCP 0.0.0.0:445 0.0.0.0:0 LISTENING 4
Can not obtain ownership information
TCP 0.0.0.0:1025 0.0.0.0:0 LISTENING 508
[wininit.exe]
TCP 0.0.0.0:1026 0.0.0.0:0 LISTENING 988
eventlog
[svchost.exe]
TCP 0.0.0.0:1027 0.0.0.0:0 LISTENING 472
Schedule
[svchost.exe]
TCP 0.0.0.0:1028 0.0.0.0:0 LISTENING 580
[lsass.exe]
TCP 0.0.0.0:1029 0.0.0.0:0 LISTENING 556
[services.exe]
TCP 0.0.0.0:5001 0.0.0.0:0 LISTENING 3500
[magentproc.exe]
TCP 0.0.0.0:5002 0.0.0.0:0 LISTENING 3500
[magentproc.exe]
TCP 0.0.0.0:5003 0.0.0.0:0 LISTENING 3500
[magentproc.exe]
TCP 0.0.0.0:5357 0.0.0.0:0 LISTENING 4
Can not obtain ownership information
TCP 0.0.0.0:8000 0.0.0.0:0 LISTENING 4
Can not obtain ownership information
TCP 0.0.0.0:50500 0.0.0.0:0 LISTENING 3500
[magentproc.exe]
TCP 0.0.0.0:54345 0.0.0.0:0 LISTENING 3500
[magentproc.exe]
TCP 10.125.247.11:139 0.0.0.0:0 LISTENING 4
Can not obtain ownership information
TCP 10.125.247.11:28530 172.19.41.40:8080 ESTABLISHED 4172
[OUTLOOK.EXE]
TCP 10.125.247.11:28532 172.19.41.40:8080 ESTABLISHED 4172
[OUTLOOK.EXE]
TCP 10.125.247.11:28555 172.19.41.40:8080 ESTABLISHED 4172
[OUTLOOK.EXE]
TCP 10.125.247.11:28556 172.19.41.40:8080 ESTABLISHED 4172
[OUTLOOK.EXE]
TCP 10.125.247.11:28560 172.19.41.40:8080 ESTABLISHED 4172
[OUTLOOK.EXE]
TCP 10.125.247.11:28563 172.19.41.40:8080 ESTABLISHED 4172
[OUTLOOK.EXE]
TCP 10.125.247.11:28564 172.19.41.40:8080 ESTABLISHED 3724
[communicator.exe]
TCP 10.125.247.11:28567 172.19.41.40:8080 ESTABLISHED 4172
[OUTLOOK.EXE]
TCP 10.125.247.11:28571 172.19.41.40:8080 ESTABLISHED 4172
[OUTLOOK.EXE]
TCP 10.125.247.11:28582 172.19.41.40:8080 ESTABLISHED 4172
[OUTLOOK.EXE]
TCP 10.125.247.11:28584 172.19.41.40:8080 ESTABLISHED 4172
[OUTLOOK.EXE]
TCP 10.125.247.11:28603 172.19.41.40:8080 ESTABLISHED 4172
[OUTLOOK.EXE]
TCP 10.125.247.11:28607 172.19.41.40:8080 ESTABLISHED 4172
[OUTLOOK.EXE]
TCP 10.125.247.11:28667 172.19.41.40:8080 ESTABLISHED 3724
[communicator.exe]
TCP 10.125.247.11:28669 172.19.41.40:8080 ESTABLISHED 3724
[communicator.exe]
TCP 10.125.247.11:29482 172.19.41.40:8080 ESTABLISHED 1692
[chrome.exe]
TCP 10.125.247.11:29486 172.19.41.40:8080 ESTABLISHED 1692
[ chrome.exe]
TCP 10.125.247.11:29489 172.19.41.40:8080 ESTABLISHED 1692
[chrome.exe]
TCP 10.125.247.11:29491 172.19.41.40:8080 ESTABLISHED 1692
[chrome.exe]
TCP 10.125.247.11:29493 172.19.41.40:8080 ESTABLISHED 1692
[chrome.exe]
TCP 10.125.247.11:29495 172.19.41.40:8080 ESTABLISHED 1692
[chrome.exe]
TCP 10.125.247.11:29498 172.19.41.40:8080 ESTABLISHED 1692
[chrome.exe]
TCP 10.125.247.11:29502 172.19.41.40:8080 ESTABLISHED 1692
[chrome.exe]
TCP 10.125.247.11:29505 172.19.41.40:8080 ESTABLISHED 1692
[chrome.exe]
TCP 10.125.247.11:29509 172.19.41.40:8080 ESTABLISHED 1692
[chrome.exe]
TCP 10.125.247.11:29513 172.19.41.40:8080 ESTABLISHED 1692
[chrome.exe]
TCP 10.125.247.11:29514 172.19.41.40:8080 ESTABLISHED 1692
[chrome.exe]
TCP 10.125.247.11:29515 172.19.41.40:8080 ESTABLISHED 1692
[chrome.exe]
TCP 127.0.0.1:1033 0.0.0.0:0 LISTENING 3212
[AccentureMobileMediaReminderClient.exe]
TCP [::]:80 [::]:0 LISTENING 4
Can not obtain ownership information
TCP [::]:135 [::]:0 LISTENING 872
RpcSs
[svchost.exe]
TCP [::]:445 [::]:0 LISTENING 4
Can not obtain ownership information
TCP [::]:1025 [::]:0 LISTENING 508
[wininit.exe]
TCP [::]:1026 [::]:0 LISTENING 988
eventlog
[svchost.exe]
TCP [::]:1027 [::]:0 LISTENING 472
Schedule
[svchost.exe]
TCP [::]:1028 [::]:0 LISTENING 580
[lsass.exe]
TCP [::]:1029 [::]:0 LISTENING 556
[services.exe]
TCP [::]:5357 [::]:0 LISTENING 4
Can not obtain ownership information
TCP [::]:8000 [::]:0 LISTENING 4
Can not obtain ownership information
UDP 0.0.0.0:123 *:* 1064
W32Time
[svchost.exe]
UDP 0.0.0.0:500 *:* 472
IKEEXT
[svchost.exe]
UDP 0.0.0.0:3702 *:* 1064
EventSystem
[svchost.exe]
UDP 0.0.0.0:3702 *:* 1064
EventSystem
[svchost.exe]
UDP 0.0.0.0:3702 *:* 2276
PeerDistSvc
[svchost.exe]
UDP 0.0.0.0:3702 *:* 1064
EventSystem
[svchost.exe]
UDP 0.0.0.0:3702 *:* 2276
PeerDistSvc
[svchost.exe]
UDP 0.0.0.0:3702 *:* 1064
EventSystem
[svchost.exe]
UDP 0.0.0.0:4500 *:* 472
IKEEXT
[svchost.exe]
UDP 0.0.0.0:5355 *:* 1228
Dnscache
[svchost.exe]
UDP 0.0.0.0:55306 *:* 1064
EventSystem
[svchost.exe]
UDP 0.0.0.0:55308 *:* 1064
EventSystem
[svchost.exe]
UDP 10.125.247.11:137 *:* 4
Can not obtain ownership information
UDP 10.125.247.11:138 *:* 4
Can not obtain ownership information
UDP 10.125.247.11:1900 *:* 3952
SSDPSRV
[svchost.exe]
UDP 10.125.247.11:62526 *:* 3952
SSDPSRV
[svchost.exe]
UDP 127.0.0.1:1900 *:* 3952
SSDPSRV
[svchost.exe]
UDP 127.0.0.1:53356 *:* 2644
[taskhost.exe]
UDP 127.0.0.1:56632 *:* 580
[lsass.exe]
UDP 127.0.0.1:57319 *:* 3724
[communicator.exe]
UDP 127.0.0.1:60703 *:* 3724
[communicator.exe]
UDP 127.0.0.1:62527 *:* 3952
SSDPSRV
[svchost.exe]
UDP 127.0.0.1:63140 *:* 4172
[OUTLOOK.EXE]
UDP [::]:123 *:* 1064
W32Time
[svchost.exe]
UDP [::]:500 *:* 472
IKEEXT
[svchost.exe]
UDP [::]:3702 *:* 1064
EventSystem
[svchost.exe]
UDP [::]:3702 *:* 2276
PeerDistSvc
[svchost.exe]
UDP [::]:3702 *:* 1064
EventSystem
[svchost.exe]
UDP [::]:3702 *:* 1064
EventSystem
[svchost.exe]
UDP [::]:3702 *:* 2276
PeerDistSvc
[svchost.exe]
UDP [::]:3702 *:* 1064
EventSystem
[svchost.exe]
UDP [::]:4500 *:* 472
IKEEXT
[svchost.exe]
UDP [::]:5355 *:* 1228
Dnscache
[svchost.exe]
UDP [::]:55307 *:* 1064
EventSystem
[svchost.exe]
UDP [::]:55309 *:* 1064
EventSystem
[svchost.exe]
UDP [::1]:1900 *:* 3952
SSDPSRV
[svchost.exe]
UDP [::1]:62525 *:* 3952
SSDPSRV
[svchost.exe]
UDP [fe80::cca:bedf:a696:8354%13]:546 *:* 988
Dhcp
[svchost.exe]
UDP [fe80::cca:bedf:a696:8354%13]:1900 *:* 3952
SSDPSRV
[svchost.exe]
UDP [fe80::cca:bedf:a696:8354%13]:62524 *:* 3952
SSDPSRV
[svchost.exe]
it cetainly looks that way .. now this is a long shot,, but check your /etc/services and see if the 8443 port is defined?
pcsync-https 8443/tcp # PCsync HTTPS
pcsync-https 8443/udp # PCsync HTTPS
pcsync-http 8444/tcp # PCsync HTTP
pcsync-http 8444/udp # PCsync HTTP
I was told by this:
If you are using the latest Skype, go to Tools -> Options -> Advanced -> connection. Disable the 'Use port 80 and 443 for alternatve.. '
Sign Out and Close all Skype windows.
Thanks for the advice. It Worked!!!