Connection through turn-relay

I’m setting up a jitsi instance for access behind a corporate firewall.
After reading a bunch on git and here, and doing my own tests on meet.jit.si, I manage to force my ubuntu box with firefox to use the turn relay (by using some ufw rules).

But on my own install, I can’t.

I’m using firefox, I fint it easier to debug, and this will be the target usage.
I see the turn-relay in the about-webrtc page under Raw Local Candidates.
But then, it is not in the ICE stats Local Candidate.

I checked coturn logs, and things look ok.

coturn logs
1456: IPv4. tcp or tls connected to: 146.88.240.19:53074
1466: session 003000000000000002: TLS/TCP socket disconnected: 146.88.240.19:53074
1466: session 003000000000000002: usage: realm=<turn6.indie.host>, username=<>, rp=0, rb=0, sp=0, sb=0
1466: session 003000000000000002: peer usage: realm=<turn6.indie.host>, username=<>, rp=0, rb=0, sp=0, sb=0
1466: session 003000000000000002: closed (2nd stage), user <> realm <turn6.indie.host> origin <>, local 46.4.224.83:443, remote 146.88.240.19:53074, reason: TLS/TCP socket buffer operation error (callback)
1556: IPv4. tcp or tls connected to: 77.185.125.60:37293
1556: session 006000000000000001: TLS/TCP socket disconnected: 77.185.125.60:37293
1556: session 006000000000000001: usage: realm=<turn6.indie.host>, username=<>, rp=0, rb=0, sp=0, sb=0
1556: session 006000000000000001: peer usage: realm=<turn6.indie.host>, username=<>, rp=0, rb=0, sp=0, sb=0
1556: session 006000000000000001: closed (2nd stage), user <> realm <turn6.indie.host> origin <>, local 46.4.224.83:443, remote 77.185.125.60:37293, reason: TLS/TCP socket buffer operation error (callback)
1559: IPv4. tcp or tls connected to: 77.185.125.60:60564
1560: session 001000000000000002: realm <turn6.indie.host> user <>: incoming packet message processed, error 401: Unauthorized
1561: IPv4. Local relay addr: 46.4.224.83:49159
1561: session 001000000000000002: new, realm=<turn6.indie.host>, username=<1583515677>, lifetime=3600, cipher=ECDHE-RSA-AES256-GCM-SHA384, method=TLSv1.2
1561: session 001000000000000002: realm <turn6.indie.host> user <1583515677>: incoming packet ALLOCATE processed, success
1674: session 001000000000000002: TLS/TCP socket closed remotely 77.185.125.60:60564
1674: session 001000000000000002: usage: realm=<turn6.indie.host>, username=<1583515677>, rp=2, rb=168, sp=2, sb=236
1674: session 001000000000000002: peer usage: realm=<turn6.indie.host>, username=<1583515677>, rp=0, rb=0, sp=0, sb=0
1674: session 001000000000000002: closed (2nd stage), user <1583515677> realm <turn6.indie.host> origin <>, local 46.4.224.83:443, remote 77.185.125.60:60564, reason: TLS/TCP connection closed by client (callback)
1674: session 001000000000000002: SSL shutdown received, socket to be closed (local 46.4.224.83:443, remote 77.185.125.60:60564)
1674: session 001000000000000002: delete: realm=<turn6.indie.host>, username=<1583515677>
1713: IPv4. tcp or tls connected to: 77.185.125.60:41975
1713: session 006000000000000002: TLS/TCP socket disconnected: 77.185.125.60:41975
1713: session 006000000000000002: usage: realm=<turn6.indie.host>, username=<>, rp=0, rb=0, sp=0, sb=0
1713: session 006000000000000002: peer usage: realm=<turn6.indie.host>, username=<>, rp=0, rb=0, sp=0, sb=0
1713: session 006000000000000002: closed (2nd stage), user <> realm <turn6.indie.host> origin <>, local 46.4.224.83:443, remote 77.185.125.60:41975, reason: TLS/TCP socket buffer operation error (callback)
1716: IPv4. tcp or tls connected to: 77.185.125.60:60577
1717: session 001000000000000003: realm <turn6.indie.host> user <>: incoming packet message processed, error 401: Unauthorized
1717: IPv4. Local relay addr: 46.4.224.83:49158
1717: session 001000000000000003: new, realm=<turn6.indie.host>, username=<1583515854>, lifetime=3600, cipher=ECDHE-RSA-AES256-GCM-SHA384, method=TLSv1.2

On the js console, I see the turn relay candidate as well:

JS console logs
[modules/xmpp/JingleSessionPC.js] <value/</<>:  addRemoteStream - OK, SDPs:  
{…}
​
media: Array(3) [ "m=audio 59790 RTP/SAVPF 111 126\r\nc=IN IP4 192.168.1.51\r\na=rtpmap:111 opus/48000/2\r\na=rtpmap:126 telephone-event/8000\r\na=fmtp:111 maxplaybackrate=48000;stereo=1;useinbandfec=1\r\na=fmtp:126 0-15\r\na=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level\r\na=setup:active\r\na=mid:audio\r\na=sendrecv\r\na=ice-ufrag:ddda20d2\r\na=ice-pwd:74d6abb51de936381ef41e8d3e0f5d0c\r\na=candidate:0 1 UDP 2122121471 192.168.1.51 59790 typ host\r\na=candidate:1 1 UDP 2122187007 2a01:c22:cc23:5100:8cc:a6f5:b645:b247 59791 typ host\r\na=candidate:2 1 UDP 2122252543 2a01:c22:cc23:5100:6d22:b14b:ef2d:8d6f 59792 typ host\r\na=candidate:3 1 TCP 2105393407 192.168.1.51 9 typ host tcptype active\r\na=candidate:5 1 TCP 2105458943 2a01:c22:cc23:5100:8cc:a6f5:b645:b247 9 typ host tcptype active\r\na=candidate:7 1 TCP 2105524479 2a01:c22:cc23:5100:6d22:b14b:ef2d:8d6f 9 typ host tcptype active\r\na=ssrc:2310066077 cname:{bce40b03-559b-8f47-a3a3-ab1e9ceefa1d}-1\r\na=ssrc:2310066077 msid:{30920029-fe0b-d745-89af-e0ce74f54505}-1 {7f6be779-4fe3-df49-b6da-da40f24280f9}-1\r\na=ssrc:3866428189 cname:{bce40b03-559b-8f47-a3a3-ab1e9ceefa1d}-1\r\na=rtcp-mux\r\n", "m=video 59790 RTP/SAVPF 100 107 101\r\nc=IN IP4 192.168.1.51\r\na=rtpmap:100 VP8/90000\r\na=rtpmap:107 H264/90000\r\na=rtpmap:101 VP9/90000\r\na=fmtp:107 profile-level-id=42e01f;level-asymmetry-allowed=1;packetization-mode=1\r\na=fmtp:100 max-fs=12288;max-fr=60\r\na=fmtp:101 max-fs=12288;max-fr=60\r\na=rtcp-fb:100 nack\r\na=rtcp-fb:100 nack pli\r\na=rtcp-fb:100 ccm fir\r\na=rtcp-fb:107 nack\r\na=rtcp-fb:107 nack pli\r\na=rtcp-fb:107 ccm fir\r\na=rtcp-fb:101 nack\r\na=rtcp-fb:101 nack pli\r\na=rtcp-fb:101 ccm fir\r\na=extmap:3 http://www.webrtc.org/experiments/rtp-hdrext/abs-send-time\r\na=setup:active\r\na=mid:video\r\na=sendrecv\r\na=ice-ufrag:ddda20d2\r\na=ice-pwd:74d6abb51de936381ef41e8d3e0f5d0c\r\na=ssrc:1504030541 cname:{bce40b03-559b-8f47-a3a3-ab1e9ceefa1d}-1\r\na=ssrc:1560776733 cname:{bce40b03-559b-8f47-a3a3-ab1e9ceefa1d}-1\r\na=ssrc:1560776733 msid:{23968544-6ea9-db43-908d-025ee026a0ee}-1 {34c834ee-b465-e447-a6ab-e60267726d80}-1\r\na=rtcp-mux\r\n", "m=application 59790 DTLS/SCTP 5000\r\nc=IN IP4 192.168.1.51\r\na=setup:active\r\na=mid:data\r\na=sendrecv\r\na=ice-ufrag:ddda20d2\r\na=ice-pwd:74d6abb51de936381ef41e8d3e0f5d0c\r\na=rtcp-mux\r\na=sctpmap:5000 webrtc-datachannel 256\r\na=max-message-size:1073741823\r\n" ]
​
raw: "v=0\r\no=mozilla...THIS_IS_SDPARTA-73.0 1234870830367647225 0 IN IP4 0.0.0.0\r\ns=-\r\nt=0 0\r\na=sendrecv\r\na=fingerprint:sha-256 DA:98:51:F1:28:2B:F0:27:E3:44:4A:79:47:8D:59:A5:A1:4A:20:FC:CC:1B:F2:4C:BA:C0:3D:1A:5E:D1:63:FF\r\na=ice-options:trickle\r\na=msid-semantic: WMS *\r\na=group:BUNDLE audio video data\r\nm=audio 59790 RTP/SAVPF 111 126\r\nc=IN IP4 192.168.1.51\r\na=rtpmap:111 opus/48000/2\r\na=rtpmap:126 telephone-event/8000\r\na=fmtp:111 maxplaybackrate=48000;stereo=1;useinbandfec=1\r\na=fmtp:126 0-15\r\na=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level\r\na=setup:active\r\na=mid:audio\r\na=sendrecv\r\na=ice-ufrag:ddda20d2\r\na=ice-pwd:74d6abb51de936381ef41e8d3e0f5d0c\r\na=candidate:0 1 UDP 2122121471 192.168.1.51 59790 typ host\r\na=candidate:1 1 UDP 2122187007 2a01:c22:cc23:5100:8cc:a6f5:b645:b247 59791 typ host\r\na=candidate:2 1 UDP 2122252543 2a01:c22:cc23:5100:6d22:b14b:ef2d:8d6f 59792 typ host\r\na=candidate:3 1 TCP 2105393407 192.168.1.51 9 typ host tcptype active\r\na=candidate:5 1 TCP 2105458943 2a01:c22:cc23:5100:8cc:a6f5:b645:b247 9 typ host tcptype active\r\na=candidate:7 1 TCP 2105524479 2a01:c22:cc23:5100:6d22:b14b:ef2d:8d6f 9 typ host tcptype active\r\na=ssrc:2310066077 cname:{bce40b03-559b-8f47-a3a3-ab1e9ceefa1d}-1\r\na=ssrc:2310066077 msid:{30920029-fe0b-d745-89af-e0ce74f54505}-1 {7f6be779-4fe3-df49-b6da-da40f24280f9}-1\r\na=ssrc:3866428189 cname:{bce40b03-559b-8f47-a3a3-ab1e9ceefa1d}-1\r\na=rtcp-mux\r\nm=video 59790 RTP/SAVPF 100 107 101\r\nc=IN IP4 192.168.1.51\r\na=rtpmap:100 VP8/90000\r\na=rtpmap:107 H264/90000\r\na=rtpmap:101 VP9/90000\r\na=fmtp:107 profile-level-id=42e01f;level-asymmetry-allowed=1;packetization-mode=1\r\na=fmtp:100 max-fs=12288;max-fr=60\r\na=fmtp:101 max-fs=12288;max-fr=60\r\na=rtcp-fb:100 nack\r\na=rtcp-fb:100 nack pli\r\na=rtcp-fb:100 ccm fir\r\na=rtcp-fb:107 nack\r\na=rtcp-fb:107 nack pli\r\na=rtcp-fb:107 ccm fir\r\na=rtcp-fb:101 nack\r\na=rtcp-fb:101 nack pli\r\na=rtcp-fb:101 ccm fir\r\na=extmap:3 http://www.webrtc.org/experiments/rtp-hdrext/abs-send-time\r\na=setup:active\r\na=mid:video\r\na=sendrecv\r\na=ice-ufrag:ddda20d2\r\na=ice-pwd:74d6abb51de936381ef41e8d3e0f5d0c\r\na=ssrc:1504030541 cname:{bce40b03-559b-8f47-a3a3-ab1e9ceefa1d}-1\r\na=ssrc:1560776733 cname:{bce40b03-559b-8f47-a3a3-ab1e9ceefa1d}-1\r\na=ssrc:1560776733 msid:{23968544-6ea9-db43-908d-025ee026a0ee}-1 {34c834ee-b465-e447-a6ab-e60267726d80}-1\r\na=rtcp-mux\r\nm=application 59790 DTLS/SCTP 5000\r\nc=IN IP4 192.168.1.51\r\na=setup:active\r\na=mid:data\r\na=sendrecv\r\na=ice-ufrag:ddda20d2\r\na=ice-pwd:74d6abb51de936381ef41e8d3e0f5d0c\r\na=rtcp-mux\r\na=sctpmap:5000 webrtc-datachannel 256\r\na=max-message-size:1073741823\r\n"
​
session: "v=0\r\no=mozilla...THIS_IS_SDPARTA-73.0 1234870830367647225 0 IN IP4 0.0.0.0\r\ns=-\r\nt=0 0\r\na=sendrecv\r\na=fingerprint:sha-256 DA:98:51:F1:28:2B:F0:27:E3:44:4A:79:47:8D:59:A5:A1:4A:20:FC:CC:1B:F2:4C:BA:C0:3D:1A:5E:D1:63:FF\r\na=ice-options:trickle\r\na=msid-semantic: WMS *\r\na=group:BUNDLE audio video data\r\n"
​
<prototype>: Object { failICE: false, removeTcpCandidates: false, removeUdpCandidates: false, … }
 
{…}
​
media: Array(3) [ "m=audio 59790 RTP/SAVPF 111 126\r\nc=IN IP4 192.168.1.51\r\na=rtpmap:111 opus/48000/2\r\na=rtpmap:126 telephone-event/8000\r\na=fmtp:111 maxplaybackrate=48000;stereo=1;useinbandfec=1\r\na=fmtp:126 0-15\r\na=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level\r\na=setup:active\r\na=mid:audio\r\na=sendrecv\r\na=ice-ufrag:ddda20d2\r\na=ice-pwd:74d6abb51de936381ef41e8d3e0f5d0c\r\na=candidate:0 1 UDP 2122121471 192.168.1.51 59790 typ host\r\na=candidate:1 1 UDP 2122187007 2a01:c22:cc23:5100:8cc:a6f5:b645:b247 59791 typ host\r\na=candidate:2 1 UDP 2122252543 2a01:c22:cc23:5100:6d22:b14b:ef2d:8d6f 59792 typ host\r\na=candidate:3 1 TCP 2105393407 192.168.1.51 9 typ host tcptype active\r\na=candidate:5 1 TCP 2105458943 2a01:c22:cc23:5100:8cc:a6f5:b645:b247 9 typ host tcptype active\r\na=candidate:7 1 TCP 2105524479 2a01:c22:cc23:5100:6d22:b14b:ef2d:8d6f 9 typ host tcptype active\r\na=ssrc:2310066077 cname:{bce40b03-559b-8f47-a3a3-ab1e9ceefa1d}-1\r\na=ssrc:2310066077 msid:{30920029-fe0b-d745-89af-e0ce74f54505}-1 {7f6be779-4fe3-df49-b6da-da40f24280f9}-1\r\na=ssrc:3866428189 cname:{bce40b03-559b-8f47-a3a3-ab1e9ceefa1d}-1\r\na=rtcp-mux\r\n", "m=video 9 RTP/SAVPF 100 107 101\r\nc=IN IP4 0.0.0.0\r\na=rtpmap:100 VP8/90000\r\na=rtpmap:107 H264/90000\r\na=rtpmap:101 VP9/90000\r\na=fmtp:107 profile-level-id=42e01f;level-asymmetry-allowed=1;packetization-mode=1\r\na=fmtp:100 max-fs=12288;max-fr=60\r\na=fmtp:101 max-fs=12288;max-fr=60\r\na=rtcp-fb:100 nack\r\na=rtcp-fb:100 nack pli\r\na=rtcp-fb:100 ccm fir\r\na=rtcp-fb:107 nack\r\na=rtcp-fb:107 nack pli\r\na=rtcp-fb:107 ccm fir\r\na=rtcp-fb:101 nack\r\na=rtcp-fb:101 nack pli\r\na=rtcp-fb:101 ccm fir\r\na=extmap:3 http://www.webrtc.org/experiments/rtp-hdrext/abs-send-time\r\na=setup:active\r\na=mid:video\r\na=sendrecv\r\na=ice-ufrag:ddda20d2\r\na=ice-pwd:74d6abb51de936381ef41e8d3e0f5d0c\r\na=ssrc:1504030541 cname:{bce40b03-559b-8f47-a3a3-ab1e9ceefa1d}-1\r\na=ssrc:1560776733 cname:{bce40b03-559b-8f47-a3a3-ab1e9ceefa1d}-1\r\na=ssrc:1560776733 msid:{23968544-6ea9-db43-908d-025ee026a0ee}-1 {34c834ee-b465-e447-a6ab-e60267726d80}-1\r\na=rtcp-mux\r\n", "m=application 9 DTLS/SCTP 5000\r\nc=IN IP4 0.0.0.0\r\na=setup:active\r\na=mid:data\r\na=sendrecv\r\na=ice-ufrag:ddda20d2\r\na=ice-pwd:74d6abb51de936381ef41e8d3e0f5d0c\r\na=rtcp-mux\r\na=sctpmap:5000 webrtc-datachannel 256\r\na=max-message-size:1073741823\r\n" ]
​
raw: "v=0\r\no=mozilla...THIS_IS_SDPARTA-73.0 1234870830367647225 1 IN IP4 0.0.0.0\r\ns=-\r\nt=0 0\r\na=sendrecv\r\na=fingerprint:sha-256 DA:98:51:F1:28:2B:F0:27:E3:44:4A:79:47:8D:59:A5:A1:4A:20:FC:CC:1B:F2:4C:BA:C0:3D:1A:5E:D1:63:FF\r\na=ice-options:trickle\r\na=msid-semantic: WMS *\r\na=group:BUNDLE audio video data\r\nm=audio 59790 RTP/SAVPF 111 126\r\nc=IN IP4 192.168.1.51\r\na=rtpmap:111 opus/48000/2\r\na=rtpmap:126 telephone-event/8000\r\na=fmtp:111 maxplaybackrate=48000;stereo=1;useinbandfec=1\r\na=fmtp:126 0-15\r\na=extmap:1 urn:ietf:params:rtp-hdrext:ssrc-audio-level\r\na=setup:active\r\na=mid:audio\r\na=sendrecv\r\na=ice-ufrag:ddda20d2\r\na=ice-pwd:74d6abb51de936381ef41e8d3e0f5d0c\r\na=candidate:0 1 UDP 2122121471 192.168.1.51 59790 typ host\r\na=candidate:1 1 UDP 2122187007 2a01:c22:cc23:5100:8cc:a6f5:b645:b247 59791 typ host\r\na=candidate:2 1 UDP 2122252543 2a01:c22:cc23:5100:6d22:b14b:ef2d:8d6f 59792 typ host\r\na=candidate:3 1 TCP 2105393407 192.168.1.51 9 typ host tcptype active\r\na=candidate:5 1 TCP 2105458943 2a01:c22:cc23:5100:8cc:a6f5:b645:b247 9 typ host tcptype active\r\na=candidate:7 1 TCP 2105524479 2a01:c22:cc23:5100:6d22:b14b:ef2d:8d6f 9 typ host tcptype active\r\na=ssrc:2310066077 cname:{bce40b03-559b-8f47-a3a3-ab1e9ceefa1d}-1\r\na=ssrc:2310066077 msid:{30920029-fe0b-d745-89af-e0ce74f54505}-1 {7f6be779-4fe3-df49-b6da-da40f24280f9}-1\r\na=ssrc:3866428189 cname:{bce40b03-559b-8f47-a3a3-ab1e9ceefa1d}-1\r\na=rtcp-mux\r\nm=video 9 RTP/SAVPF 100 107 101\r\nc=IN IP4 0.0.0.0\r\na=rtpmap:100 VP8/90000\r\na=rtpmap:107 H264/90000\r\na=rtpmap:101 VP9/90000\r\na=fmtp:107 profile-level-id=42e01f;level-asymmetry-allowed=1;packetization-mode=1\r\na=fmtp:100 max-fs=12288;max-fr=60\r\na=fmtp:101 max-fs=12288;max-fr=60\r\na=rtcp-fb:100 nack\r\na=rtcp-fb:100 nack pli\r\na=rtcp-fb:100 ccm fir\r\na=rtcp-fb:107 nack\r\na=rtcp-fb:107 nack pli\r\na=rtcp-fb:107 ccm fir\r\na=rtcp-fb:101 nack\r\na=rtcp-fb:101 nack pli\r\na=rtcp-fb:101 ccm fir\r\na=extmap:3 http://www.webrtc.org/experiments/rtp-hdrext/abs-send-time\r\na=setup:active\r\na=mid:video\r\na=sendrecv\r\na=ice-ufrag:ddda20d2\r\na=ice-pwd:74d6abb51de936381ef41e8d3e0f5d0c\r\na=ssrc:1504030541 cname:{bce40b03-559b-8f47-a3a3-ab1e9ceefa1d}-1\r\na=ssrc:1560776733 cname:{bce40b03-559b-8f47-a3a3-ab1e9ceefa1d}-1\r\na=ssrc:1560776733 msid:{23968544-6ea9-db43-908d-025ee026a0ee}-1 {34c834ee-b465-e447-a6ab-e60267726d80}-1\r\na=rtcp-mux\r\nm=application 9 DTLS/SCTP 5000\r\nc=IN IP4 0.0.0.0\r\na=setup:active\r\na=mid:data\r\na=sendrecv\r\na=ice-ufrag:ddda20d2\r\na=ice-pwd:74d6abb51de936381ef41e8d3e0f5d0c\r\na=rtcp-mux\r\na=sctpmap:5000 webrtc-datachannel 256\r\na=max-message-size:1073741823\r\n"
​
session: "v=0\r\no=mozilla...THIS_IS_SDPARTA-73.0 1234870830367647225 1 IN IP4 0.0.0.0\r\ns=-\r\nt=0 0\r\na=sendrecv\r\na=fingerprint:sha-256 DA:98:51:F1:28:2B:F0:27:E3:44:4A:79:47:8D:59:A5:A1:4A:20:FC:CC:1B:F2:4C:BA:C0:3D:1A:5E:D1:63:FF\r\na=ice-options:trickle\r\na=msid-semantic: WMS *\r\na=group:BUNDLE audio video data\r\n"
​
<prototype>: Object { failICE: false, removeTcpCandidates: false, removeUdpCandidates: false, … }
Logger.js:125:17
[modules/xmpp/JingleSessionPC.js] <value>:  removal not necessary Logger.js:125:17
[modules/xmpp/JingleSessionPC.js] <value>:  addition not necessary Logger.js:125:17
[modules/xmpp/JingleSessionPC.js] <value/this.peerconnection.oniceconnectionstatechange>:  (TIME) ICE connected P2P? false:	 12365 Logger.js:125:17
[JitsiMeetJS.js] <getGlobalOnErrorHandler>:  UnhandledError: TypeError: t[2] is undefined Script: https://jitsi.indie.host/libs/lib-jitsi-meet.min.js?v=3577 Line: 6 Column: 253228 StackTrace:  TypeError: "t[2] is undefined"
    parseCandidate sdp.js:65
    RTCIceCandidate common_shim.js:85
    shimRTCIceCandidate common_shim.js:106
    o common_shim.js:27
Logger.js:125:17
[JitsiMeetJS.js] <getGlobalOnErrorHandler>:  UnhandledError: TypeError: t[2] is undefined Script: https://jitsi.indie.host/libs/lib-jitsi-meet.min.js?v=3577 Line: 6 Column: 253228 StackTrace:  TypeError: "t[2] is undefined"
    parseCandidate sdp.js:65
    RTCIceCandidate common_shim.js:85
    shimRTCIceCandidate common_shim.js:106
    o common_shim.js:27
Logger.js:125:17
[modules/xmpp/JingleSessionPC.js] <value>:  sendIceCandidate: last candidate. Logger.js:125:17
TypeError: t[2] is undefined
2 sdp.js:65:4
[modules/RTC/JitsiRemoteTrack.js] <value>:  "onunmute" event(1583429463745): RemoteTrack[userID: d5209f92, type: video, ssrc: 3276124661, p2p: false, status: readyState: live, muted: false, enabled: true] Logger.js:125:17
[modules/RTC/JitsiRemoteTrack.js] <value>:  loadedmetadata handler was called for a container with attached RemoteTrack[userID: d5209f92, type: video, ssrc: 3276124661, p2p: false, status: readyState: live, muted: false, enabled: true] Logger.js:125:17
[modules/RTC/JitsiRemoteTrack.js] <value>:  loadeddata handler was called for a container with attached RemoteTrack[userID: d5209f92, type: video, ssrc: 3276124661, p2p: false, status: readyState: live, muted: false, enabled: true] Logger.js:125:17
[modules/RTC/JitsiRemoteTrack.js] <value>:  canplay handler was called for a container with attached RemoteTrack[userID: d5209f92, type: video, ssrc: 3276124661, p2p: false, status: readyState: live, muted: false, enabled: true]

Is this Type error relveant?

If you want, you can also test here:

I tried with https://test.webrtc.org, in firefox, I see some errors, but on chrome, udp and tcp works.
Relay doesn’t work on neither…

I think there is a problem with my coturn, but I can’t figure out what is going wrong.

Here is the coturn configuration:

Coturn configuration
tls-listening-port=443

fingerprint
static-auth-secret=ea10a840ae6495687a76be9be2fa363ffb99956e3a937d811a6497ff932dc668

realm=turn6.indie.host
server-name=turn6.indie.host

external-ip=46.4.224.83

total-quota=100
stale-nonce=600

cert=/etc/certs/tls.crt
pkey=/etc/certs/tls.key
#cipher-list="ECDHE-RSA-AES256-GCM-SHA512:DHE-RSA-AES256-GCM-SHA512:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-SHA384"

#no-sslv3
#no-tlsv1
#no-tlsv1_1

#no-multicast-peers

proc-user=turnserver
proc-group=turnserver

no-cli

min-port=49152
max-port=49160
verbose
dh2066
listening-ip=46.4.224.83
relay-ip=46.4.224.83

I’ll change the secret once I resolved my issue.

If you have any hint, I’d be really glad! Thanks a lot for your help!

Are you running with valid cert, it doesn’t work with self-signed certs?

You can compare your config with the one that comes with jitsi-meet https://github.com/jitsi/jitsi-meet/blob/master/doc/debian/jitsi-meet-turn/turnserver.conf

Actually, my certificate is correct, and the one from meet jitsi has issues :wink:

OpenSSL cert verification
openssl s_client -connect turn6.indie.host:443
CONNECTED(00000005)
depth=2 O = Digital Signature Trust Co., CN = DST Root CA X3
verify return:1
depth=1 C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
verify return:1
depth=0 CN = turn6.indie.host
verify return:1
---
Certificate chain
 0 s:/CN=turn6.indie.host
   i:/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3
 1 s:/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3
   i:/O=Digital Signature Trust Co./CN=DST Root CA X3
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=/CN=turn6.indie.host
issuer=/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3
---
No client certificate CA names sent
Server Temp Key: ECDH, X25519, 253 bits
---
SSL handshake has read 3168 bytes and written 293 bytes
---
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-GCM-SHA384
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
    Protocol  : TLSv1.2
    Cipher    : ECDHE-RSA-AES256-GCM-SHA384
    Session-ID: AC624B6BD9B6C76ACEF0D88C008BF9C3271BF34683CE66EAE57D80A3AB615349
    Session-ID-ctx:
    Master-Key: 60824AE2C52A4616B1568C758639E4F4025236AFC7D97648692AD458D17DF3CEB62247AB5E9461F30262415250145487
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - 04 35 3c 4e 6e 8f e5 1f-6f f3 9c ab 34 77 e5 b3   .5<Nn...o...4w..
    0010 - f3 60 d4 79 ac 68 69 e7-cf 95 10 21 b8 32 94 ef   .`.y.hi....!.2..
    0020 - dc 74 a2 ca b6 08 51 db-e2 d5 cb a4 08 a0 a0 4e   .t....Q........N
    0030 - 8d 8b f0 2c e8 48 df b8-2c 04 de 5f 7a 3d c1 2c   ...,.H..,.._z=.,
    0040 - 9e 20 00 be b9 6c 9a aa-74 51 b3 ab 49 6e f0 ce   . ...l..tQ..In..
    0050 - e6 b9 73 ba 6e 7f d0 07-f9 33 42 4f 89 34 f4 31   ..s.n....3BO.4.1
    0060 - b5 8f bb c7 f1 21 94 31-30 71 6c be 48 87 d4 ba   .....!.10ql.H...
    0070 - 55 84 d0 6c 50 13 88 d3-bf 5a 9a 0a 20 f4 90 2e   U..lP....Z.. ...
    0080 - c5 b7 7e 32 3a b3 66 49-39 1b 21 1a 3a db b0 b5   ..~2:.fI9.!.:...
    0090 - c9 27 7d 6b 38 63 66 8c-56 ac 75 15 b2 93 2b 28   .'}k8cf.V.u...+(

    Start Time: 1583488284
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
---
^C
 ✘ pierreozoux@Pierres-MacBook-Pro  ~  openssl s_client -connect all-turnrelay.jitsi.net:443                                                                                                                    <default><standard>
CONNECTED(00000005)
depth=0 C = US, ST = California, L = San Jose, O = "8x8, Inc.", CN = *.jitsi.net
verify error:num=20:unable to get local issuer certificate
verify return:1
depth=0 C = US, ST = California, L = San Jose, O = "8x8, Inc.", CN = *.jitsi.net
verify error:num=21:unable to verify the first certificate
verify return:1
---
Certificate chain
 0 s:/C=US/ST=California/L=San Jose/O=8x8, Inc./CN=*.jitsi.net
   i:/C=US/O=DigiCert Inc/CN=DigiCert SHA2 Secure Server CA
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=/C=US/ST=California/L=San Jose/O=8x8, Inc./CN=*.jitsi.net
issuer=/C=US/O=DigiCert Inc/CN=DigiCert SHA2 Secure Server CA
---
No client certificate CA names sent
Server Temp Key: ECDH, X25519, 253 bits
---
SSL handshake has read 2311 bytes and written 293 bytes
---
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-GCM-SHA384
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
    Protocol  : TLSv1.2
    Cipher    : ECDHE-RSA-AES256-GCM-SHA384
    Session-ID: C7D17C92D190459308E06E4EB768B69FBDBABC16BE40CDF672E221C2F95DD1A7
    Session-ID-ctx:
    Master-Key: A8EAB85CFD981AEBEEA6F3F874646DF8B06509F65D929E22602ED303CFFEF5C145B88D8A9FADBA9130F7E7D6F25CEB3F
    TLS session ticket lifetime hint: 7200 (seconds)
    TLS session ticket:
    0000 - bb 05 68 2f 9e a9 ff 72-54 b3 27 ee 04 dd fb 86   ..h/...rT.'.....
    0010 - 52 e0 98 2e ab 53 6c 85-b0 6f d7 e7 0d 45 b9 85   R....Sl..o...E..
    0020 - c3 b9 6a 1c 63 19 07 2d-02 30 a3 dc 73 ad 1c 9e   ..j.c..-.0..s...
    0030 - 61 f9 3c 9b 31 5d 53 87-5e f3 f0 40 51 f4 67 ab   a.<.1]S.^..@Q.g.
    0040 - a6 a9 81 3f ba 69 c8 1d-99 72 ed 6d cf f5 f2 e8   ...?.i...r.m....
    0050 - b4 10 64 65 4f 7c 18 e5-85 8b 41 51 57 82 43 2e   ..deO|....AQW.C.
    0060 - 30 1d 3a f6 39 3f d4 c0-25 de 63 df 0b a9 a9 d2   0.:.9?..%.c.....
    0070 - 1f f0 43 37 d3 f7 68 c8-12 2c 46 6b 98 88 28 cb   ..C7..h..,Fk..(.
    0080 - 5c a9 b3 81 c5 6a 3f ef-5a 39 15 7f 85 7f 8d de   \....j?.Z9......
    0090 - 16 eb 90 f8 a4 94 9f e3-36 e0 0a b7 31 55 e2 4c   ........6...1U.L

    Start Time: 1583488380
    Timeout   : 7200 (sec)
    Verify return code: 21 (unable to verify the first certificate)
---

Another detail, I tried my coturn server with Nextcloud talk, and this time it appeared in the candidate. (I’ll try tonight if it actually works when I block the ports, but at least in is in the list).

I managed to install a coturn on a VM, works perfectly. But, I’d like to deploy on kuberntes.

Here are the logs on the coturn that is working:

Logs coturn that is working
Mar 06 17:13:50 rendezvous-test turnserver[29469]: 7622: session 001000000000000045: realm <rendezvous-test.indie.host> user <>: incoming packet message processed, error 401: Unauthorized
Mar 06 17:13:50 rendezvous-test turnserver[29469]: 7622: session 001000000000000045: new, realm=<rendezvous-test.indie.host>, username=<1583597627>, lifetime=3600, cipher=ECDHE-RSA-AES256-GCM-SHA384, method=TLSv1.2
Mar 06 17:13:50 rendezvous-test turnserver[29469]: 7622: session 001000000000000045: realm <rendezvous-test.indie.host> user <1583597627>: incoming packet ALLOCATE processed, success
Mar 06 17:13:50 rendezvous-test turnserver[29469]: 7622: IPv4. Local relay addr: 94.130.59.250:65392
Mar 06 17:13:50 rendezvous-test turnserver[29469]: 7622: session 001000000000000045: peer 94.130.59.250 lifetime updated: 300
Mar 06 17:13:50 rendezvous-test turnserver[29469]: 7622: session 001000000000000045: realm <rendezvous-test.indie.host> user <1583597627>: incoming packet CREATE_PERMISSION processed, success

Mar 06 17:14:13 rendezvous-test turnserver[29469]: 7644: session 001000000000000045: TLS/TCP socket closed remotely 62.214.6.98:65001
Mar 06 17:14:13 rendezvous-test turnserver[29469]: 7644: session 001000000000000045: usage: realm=<rendezvous-test.indie.host>, username=<1583597627>, rp=5, rb=564, sp=5, sb=708
Mar 06 17:14:13 rendezvous-test turnserver[29469]: 7644: session 001000000000000045: closed (2nd stage), user <1583597627> realm <rendezvous-test.indie.host> origin <>, local 94.130.59.250:4445, remote 62.214.6.98:65001, reason: T
Mar 06 17:14:13 rendezvous-test turnserver[29469]: 7644: session 001000000000000045: SSL shutdown received, socket to be closed (local 94.130.59.250:4445, remote 62.214.6.98:65001)
Mar 06 17:14:13 rendezvous-test turnserver[29469]: 7644: session 001000000000000045: delete: realm=<rendezvous-test.indie.host>, username=<1583597627>
Mar 06 17:14:13 rendezvous-test turnserver[29469]: 7644: session 001000000000000045: peer 94.130.59.250 deleted
Logs coturn that is not working
83593: IPv4. tcp or tls connected to: 62.214.6.98:65017
83593: IPv4. tcp or tls connected to: 62.214.6.98:65017
83594: session 005000000000000098: realm <turn6.indie.host> user <>: incoming packet message processed, error 401: Unauthorized
83594: session 005000000000000098: realm <turn6.indie.host> user <>: incoming packet message processed, error 401: Unauthorized
83594: IPv4. Local relay addr: 46.4.224.83:49158
83594: IPv4. Local relay addr: 46.4.224.83:49158
83594: session 005000000000000098: new, realm=<turn6.indie.host>, username=<1583597735>, lifetime=3600, cipher=ECDHE-RSA-AES256-GCM-SHA384, method=TLSv1.2
83594: session 005000000000000098: new, realm=<turn6.indie.host>, username=<1583597735>, lifetime=3600, cipher=ECDHE-RSA-AES256-GCM-SHA384, method=TLSv1.2
83594: session 005000000000000098: realm <turn6.indie.host> user <1583597735>: incoming packet ALLOCATE processed, success
83594: session 005000000000000098: realm <turn6.indie.host> user <1583597735>: incoming packet ALLOCATE processed, success
83595: session 005000000000000098: TLS/TCP socket closed remotely 62.214.6.98:65017
83595: session 005000000000000098: TLS/TCP socket closed remotely 62.214.6.98:65017
83595: session 005000000000000098: usage: realm=<turn6.indie.host>, username=<1583597735>, rp=2, rb=168, sp=2, sb=236
83595: session 005000000000000098: usage: realm=<turn6.indie.host>, username=<1583597735>, rp=2, rb=168, sp=2, sb=236
83595: session 005000000000000098: peer usage: realm=<turn6.indie.host>, username=<1583597735>, rp=0, rb=0, sp=0, sb=0
83595: session 005000000000000098: peer usage: realm=<turn6.indie.host>, username=<1583597735>, rp=0, rb=0, sp=0, sb=0
83595: session 005000000000000098: closed (2nd stage), user <1583597735> realm <turn6.indie.host> origin <>, local 46.4.224.83:443, remote 62.214.6.98:65017, reason: TLS/TCP connection closed by client (callback)
83595: session 005000000000000098: closed (2nd stage), user <1583597735> realm <turn6.indie.host> origin <>, local 46.4.224.83:443, remote 62.214.6.98:65017, reason: TLS/TCP connection closed by client (callback)
83595: session 005000000000000098: SSL shutdown received, socket to be closed (local 46.4.224.83:443, remote 62.214.6.98:65017)
83595: session 005000000000000098: SSL shutdown received, socket to be closed (local 46.4.224.83:443, remote 62.214.6.98:65017)
83595: session 005000000000000098: delete: realm=<turn6.indie.host>, username=<1583597735>
83595: session 005000000000000098: delete: realm=<turn6.indie.host>, username=<1583597735>

I miss the message:
realm <rendezvous-test.indie.host> user <1583597627>: incoming packet CREATE_PERMISSION processed, success

And here are the bworser logs:

Logs browser working

STUN-CLIENT(relay(IP4:192.168.101.47:0/TLS|rendezvous-test.indie.host:4445)::TURN): Received response; processing

STUN-CLIENT(relay(IP4:192.168.101.47:0/TLS|rendezvous-test.indie.host:4445)::TURN): nr_stun_process_error_response failed

STUN-CLIENT(relay(IP4:192.168.101.47:0/TLS|rendezvous-test.indie.host:4445)::TURN): Error processing response: Retry may be possible, stun error code 401.

STUN-CLIENT(relay(IP4:192.168.101.47:0/TLS|rendezvous-test.indie.host:4445)::TURN): Received response; processing

STUN-CLIENT(relay(IP4:192.168.101.47:0/TLS|rendezvous-test.indie.host:4445)::TURN): nr_stun_process_error_response failed

STUN-CLIENT(relay(IP4:192.168.101.47:0/TLS|rendezvous-test.indie.host:4445)::TURN): Error processing response: Retry may be possible, stun error code 401.

ICE-PEER(PC:1583511230159898 (id=51539610317 url=https://rendezvous-test.indie.host/test):default): no FROZEN/WAITING pairs for PC:1583511230159898 (id=51539610317 url=https://rendezvous-test.indie.host/test) transport-id=transport_0 - 97bf6d95:c58d16b547d4674f7c242b21b32c3b26

STUN-CLIENT(relay(IP4:192.168.101.47:0/TLS|rendezvous-test.indie.host:4445)::TURN): Received response; processing

TURN(relay(IP4:192.168.101.47:0/TLS|rendezvous-test.indie.host:4445)): Succesfully allocated addr IP4:94.130.59.250:65392/UDP lifetime=3600

ICE(PC:1583511230159898 (id=51539610317 url=https://rendezvous-test.indie.host/test)): peer (PC:1583511230159898 (id=51539610317 url=https://rendezvous-test.indie.host/test):default) pairing local trickle ICE candidate turn-relay(IP4:192.168.101.47:0/TLS|IP4:94.130.59.250:65392/UDP)

ICE-PEER(PC:1583511230159898 (id=51539610317 url=https://rendezvous-test.indie.host/test):default)/CAND-PAIR(jSO0): setting pair to state FROZEN: jSO0|IP4:94.130.59.250:65392/UDP|IP4:94.130.59.250:10000/UDP(turn-relay(IP4:192.168.101.47:0/TLS|IP4:94.130.59.250:65392/UDP)|candidate:4 1 udp 2113932031 94.130.59.250 10000 typ host generation 0)

ICE(PC:1583511230159898 (id=51539610317 url=https://rendezvous-test.indie.host/test))/CAND-PAIR(jSO0): Pairing candidate IP4:94.130.59.250:65392/UDP (7f1fff):IP4:94.130.59.250:10000/UDP (7e000aff) priority=35782506347238911 (7f1ffffc0015ff)

ICE-PEER(PC:1583511230159898 (id=51539610317 url=https://rendezvous-test.indie.host/test):default)/ICE-STREAM(PC:1583511230159898 (id=51539610317 url=https://rendezvous-test.indie.host/test) transport-id=transport_0 - 97bf6d95:c58d16b547d4674f7c242b21b32c3b26): Starting check timer for stream.

ICE-PEER(PC:1583511230159898 (id=51539610317 url=https://rendezvous-test.indie.host/test):default)/CAND-PAIR(jSO0): setting pair to state WAITING: jSO0|IP4:94.130.59.250:65392/UDP|IP4:94.130.59.250:10000/UDP(turn-relay(IP4:192.168.101.47:0/TLS|IP4:94.130.59.250:65392/UDP)|candidate:4 1 udp 2113932031 94.130.59.250 10000 typ host generation 0)

ICE-PEER(PC:1583511230159898 (id=51539610317 url=https://rendezvous-test.indie.host/test):default)/CAND-PAIR(jSO0): setting pair to state IN_PROGRESS: jSO0|IP4:94.130.59.250:65392/UDP|IP4:94.130.59.250:10000/UDP(turn-relay(IP4:192.168.101.47:0/TLS|IP4:94.130.59.250:65392/UDP)|candidate:4 1 udp 2113932031 94.130.59.250 10000 typ host generation 0)

TURN(relay(IP4:192.168.101.47:0/TLS|rendezvous-test.indie.host:4445)): Creating permission for IP4:94.130.59.250:10000/UDP

STUN-CLIENT(relay(IP4:192.168.101.47:0/TLS|rendezvous-test.indie.host:4445)::TURN): Received response; processing

TURN(relay(IP4:192.168.101.47:0/TLS|rendezvous-test.indie.host:4445)): Succesfully allocated addr IP4:94.130.59.250:59655/UDP lifetime=3600

ICE(PC:1583511230159898 (id=51539610317 url=https://rendezvous-test.indie.host/test)): peer (PC:1583511230159898 (id=51539610317 url=https://rendezvous-test.indie.host/test):default) pairing local trickle ICE candidate turn-relay(IP4:192.168.101.47:0/TLS|IP4:94.130.59.250:59655/UDP)

ICE-PEER(PC:1583511230159898 (id=51539610317 url=https://rendezvous-test.indie.host/test):default)/CAND-PAIR(FLqh): setting pair to state FROZEN: FLqh|IP4:94.130.59.250:59655/UDP|IP4:94.130.59.250:10000/UDP(turn-relay(IP4:192.168.101.47:0/TLS|IP4:94.130.59.250:59655/UDP)|candidate:4 1 udp 2113932031 94.130.59.250 10000 typ host generation 0)

ICE(PC:1583511230159898 (id=51539610317 url=https://rendezvous-test.indie.host/test))/CAND-PAIR(FLqh): Pairing candidate IP4:94.130.59.250:59655/UDP (7f1fff):IP4:94.130.59.250:10000/UDP (7e000aff) priority=35782506347238911 (7f1ffffc0015ff)

ICE(PC:1583511230159898 (id=51539610317 url=https://rendezvous-test.indie.host/test)): All candidates initialized

STUN-CLIENT(ymPj|IP4:192.168.101.47:57172/TCP|IP4:94.130.59.250:4443/TCP(host(IP4:192.168.101.47:57172/TCP) active|candidate:2 1 tcp 2130706431 94.130.59.250 4443 typ host tcptype passive generation 0)): Received response; processing

ICE-PEER(PC:1583511230159898 (id=51539610317 url=https://rendezvous-test.indie.host/test):default)/CAND-PAIR(TK58): setting pair to state FROZEN: TK58|IP4:62.214.6.98:57172/TCP|IP4:94.130.59.250:4443/TCP(prflx active|candidate:2 1 tcp 2130706431 94.130.59.250 4443 typ host tcptype passive generation 0)

ICE(PC:1583511230159898 (id=51539610317 url=https://rendezvous-test.indie.host/test))/CAND-PAIR(TK58): Pairing candidate IP4:62.214.6.98:57172/TCP (6d7f80ff):IP4:94.130.59.250:4443/TCP (7effffff) priority=7890166909142827007 (6d7f80fffdffffff)

ICE-PEER(PC:1583511230159898 (id=51539610317 url=https://rendezvous-test.indie.host/test):default)/CAND-PAIR(ymPj): setting pair to state FAILED: ymPj|IP4:192.168.101.47:57172/TCP|IP4:94.130.59.250:4443/TCP(host(IP4:192.168.101.47:57172/TCP) active|candidate:2 1 tcp 2130706431 94.130.59.250 4443 typ host tcptype passive generation 0)

ICE-PEER(PC:1583511230159898 (id=51539610317 url=https://rendezvous-test.indie.host/test):default)/CAND-PAIR(TK58): setting pair to state SUCCEEDED: TK58|IP4:62.214.6.98:57172/TCP|IP4:94.130.59.250:4443/TCP(prflx active|candidate:2 1 tcp 2130706431 94.130.59.250 4443 typ host tcptype passive generation 0)

STUN-CLIENT(relay(IP4:192.168.101.47:0/TLS|rendezvous-test.indie.host:4445)::TURN): Received response; processing

STUN-CLIENT(jSO0|IP4:94.130.59.250:65392/UDP|IP4:94.130.59.250:10000/UDP(turn-relay(IP4:192.168.101.47:0/TLS|IP4:94.130.59.250:65392/UDP)|candidate:4 1 udp 2113932031 94.130.59.250 10000 typ host generation 0)): Received response; processing

ICE-PEER(PC:1583511230159898 (id=51539610317 url=https://rendezvous-test.indie.host/test):default)/CAND-PAIR(jSO0): setting pair to state SUCCEEDED: jSO0|IP4:94.130.59.250:65392/UDP|IP4:94.130.59.250:10000/UDP(turn-relay(IP4:192.168.101.47:0/TLS|IP4:94.130.59.250:65392/UDP)|candidate:4 1 udp 2113932031 94.130.59.250 10000 typ host generation 0)

ICE-PEER(PC:1583511230159898 (id=51539610317 url=https://rendezvous-test.indie.host/test):default)/CAND-PAIR(FLqh): setting pair to state WAITING: FLqh|IP4:94.130.59.250:59655/UDP|IP4:94.130.59.250:10000/UDP(turn-relay(IP4:192.168.101.47:0/TLS|IP4:94.130.59.250:59655/UDP)|candidate:4 1 udp 2113932031 94.130.59.250 10000 typ host generation 0)

ICE-PEER(PC:1583511230159898 (id=51539610317 url=https://rendezvous-test.indie.host/test):default)/CAND-PAIR(FLqh): setting pair to state IN_PROGRESS: FLqh|IP4:94.130.59.250:59655/UDP|IP4:94.130.59.250:10000/UDP(turn-relay(IP4:192.168.101.47:0/TLS|IP4:94.130.59.250:59655/UDP)|candidate:4 1 udp 2113932031 94.130.59.250 10000 typ host generation 0)

TURN(relay(IP4:192.168.101.47:0/TLS|rendezvous-test.indie.host:4445)): Creating permission for IP4:94.130.59.250:10000/UDP

STUN-CLIENT(relay(IP4:192.168.101.47:0/TLS|rendezvous-test.indie.host:4445)::TURN): Received response; processing

STUN-CLIENT(FLqh|IP4:94.130.59.250:59655/UDP|IP4:94.130.59.250:10000/UDP(turn-relay(IP4:192.168.101.47:0/TLS|IP4:94.130.59.250:59655/UDP)|candidate:4 1 udp 2113932031 94.130.59.250 10000 typ host generation 0)): Received response; processing

ICE-PEER(PC:1583511230159898 (id=51539610317 url=https://rendezvous-test.indie.host/test):default)/CAND-PAIR(FLqh): setting pair to state SUCCEEDED: FLqh|IP4:94.130.59.250:59655/UDP|IP4:94.130.59.250:10000/UDP(turn-relay(IP4:192.168.101.47:0/TLS|IP4:94.130.59.250:59655/UDP)|candidate:4 1 udp 2113932031 94.130.59.250 10000 typ host generation 0)

Logs browser not working

/builds/worker/workspace/build/src/media/mtransport/third_party/nICEr/src/net/nr_socket_multi_tcp.c:617 function nr_socket_multi_tcp_listen failed with error 3

ICE(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test)): failed to create passive TCP host candidate: 3

ICE(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test)): peer (PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test):default) has no stream matching stream PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test) transport-id=transport_0 - a7ff3a8c:00df86ff4fa061933d78cf1113469560

ICE(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test)): peer (PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test):default) no streams with non-empty check lists

ICE(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test)): peer (PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test):default) no streams with pre-answer requests

ICE(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test)): peer (PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test):default) no checks to start

ICE(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test)): peer (PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test):default) pairing local trickle ICE candidate host(IP4:192.168.101.47:51051/UDP)

ICE(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test)): peer (PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test):default) pairing local trickle ICE candidate host(IP4:192.168.101.47:64881/TCP) active

ICE-PEER(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test):default)/CAND-PAIR(Zue1): setting pair to state FROZEN: Zue1|IP4:192.168.101.47:64881/TCP|IP4:46.4.224.82:4443/TCP(host(IP4:192.168.101.47:64881/TCP) active|candidate:2 1 tcp 2130706431 46.4.224.82 4443 typ host tcptype passive generation 0)

ICE(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test))/CAND-PAIR(Zue1): Pairing candidate IP4:192.168.101.47:64881/TCP (7d7fc0ff):IP4:46.4.224.82:4443/TCP (7effffff) priority=9043158782493851647 (7d7fc0fffdffffff)

ICE-PEER(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test):default)/ICE-STREAM(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test) transport-id=transport_0 - a7ff3a8c:00df86ff4fa061933d78cf1113469560): Starting check timer for stream.

ICE-PEER(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test):default)/CAND-PAIR(Zue1): setting pair to state WAITING: Zue1|IP4:192.168.101.47:64881/TCP|IP4:46.4.224.82:4443/TCP(host(IP4:192.168.101.47:64881/TCP) active|candidate:2 1 tcp 2130706431 46.4.224.82 4443 typ host tcptype passive generation 0)

ICE-PEER(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test):default)/CAND-PAIR(Zue1): setting pair to state IN_PROGRESS: Zue1|IP4:192.168.101.47:64881/TCP|IP4:46.4.224.82:4443/TCP(host(IP4:192.168.101.47:64881/TCP) active|candidate:2 1 tcp 2130706431 46.4.224.82 4443 typ host tcptype passive generation 0)

Write buffer not empty for IP4:46.4.224.82:4443/TCP 102 - already armed (@0x1804631f4), not connected

ICE(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test)): peer (PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test):default) is now checking

ICE-PEER(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test):default): no FROZEN/WAITING pairs for PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test) transport-id=transport_0 - a7ff3a8c:00df86ff4fa061933d78cf1113469560

Write buffer not empty for IP4:46.4.224.83:443/TCP 44 - already armed (@0x18045f9f4), not connected

Invoking writable_cb on connected (102)

Writable_cb IP4:46.4.224.82:4443/TCP (0 (0x1804631f4) pending)

Invoking writable_cb on connected (44)

Writable_cb IP4:46.4.224.83:443/TCP (0 (0x18045f9f4) pending)

STUN-CLIENT(Zue1|IP4:192.168.101.47:64881/TCP|IP4:46.4.224.82:4443/TCP(host(IP4:192.168.101.47:64881/TCP) active|candidate:2 1 tcp 2130706431 46.4.224.82 4443 typ host tcptype passive generation 0)): Received response; processing

ICE-PEER(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test):default)/CAND-PAIR(WhJf): setting pair to state FROZEN: WhJf|IP4:62.214.6.98:64881/TCP|IP4:46.4.224.82:4443/TCP(prflx active|candidate:2 1 tcp 2130706431 46.4.224.82 4443 typ host tcptype passive generation 0)

ICE(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test))/CAND-PAIR(WhJf): Pairing candidate IP4:62.214.6.98:64881/TCP (6d7f80ff):IP4:46.4.224.82:4443/TCP (7effffff) priority=7890166909142827007 (6d7f80fffdffffff)

ICE-PEER(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test):default)/ICE-STREAM(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test) transport-id=transport_0 - a7ff3a8c:00df86ff4fa061933d78cf1113469560): Starting check timer for stream.

ICE-PEER(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test):default)/CAND-PAIR(WhJf): setting pair to state WAITING: WhJf|IP4:62.214.6.98:64881/TCP|IP4:46.4.224.82:4443/TCP(prflx active|candidate:2 1 tcp 2130706431 46.4.224.82 4443 typ host tcptype passive generation 0)

ICE-PEER(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test):default)/CAND-PAIR(WhJf): setting pair to state IN_PROGRESS: WhJf|IP4:62.214.6.98:64881/TCP|IP4:46.4.224.82:4443/TCP(prflx active|candidate:2 1 tcp 2130706431 46.4.224.82 4443 typ host tcptype passive generation 0)

ICE-PEER(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test):default)/CAND-PAIR(Zue1): setting pair to state FAILED: Zue1|IP4:192.168.101.47:64881/TCP|IP4:46.4.224.82:4443/TCP(host(IP4:192.168.101.47:64881/TCP) active|candidate:2 1 tcp 2130706431 46.4.224.82 4443 typ host tcptype passive generation 0)

ICE-PEER(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test):default)/CAND-PAIR(WhJf): setting pair to state SUCCEEDED: WhJf|IP4:62.214.6.98:64881/TCP|IP4:46.4.224.82:4443/TCP(prflx active|candidate:2 1 tcp 2130706431 46.4.224.82 4443 typ host tcptype passive generation 0)

ICE-PEER(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test):default)/CAND-PAIR(Zue1): triggered check on Zue1|IP4:192.168.101.47:64881/TCP|IP4:46.4.224.82:4443/TCP(host(IP4:192.168.101.47:64881/TCP) active|candidate:2 1 tcp 2130706431 46.4.224.82 4443 typ host tcptype passive generation 0)

ICE-PEER(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test):default)/CAND-PAIR(Zue1): received STUN check on failed pair, resurrecting: Zue1|IP4:192.168.101.47:64881/TCP|IP4:46.4.224.82:4443/TCP(host(IP4:192.168.101.47:64881/TCP) active|candidate:2 1 tcp 2130706431 46.4.224.82 4443 typ host tcptype passive generation 0)

ICE-PEER(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test):default)/CAND-PAIR(Zue1): setting pair to state WAITING: Zue1|IP4:192.168.101.47:64881/TCP|IP4:46.4.224.82:4443/TCP(host(IP4:192.168.101.47:64881/TCP) active|candidate:2 1 tcp 2130706431 46.4.224.82 4443 typ host tcptype passive generation 0)

ICE-PEER(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test):default)/CAND-PAIR(Zue1): Inserting pair to trigger check queue: Zue1|IP4:192.168.101.47:64881/TCP|IP4:46.4.224.82:4443/TCP(host(IP4:192.168.101.47:64881/TCP) active|candidate:2 1 tcp 2130706431 46.4.224.82 4443 typ host tcptype passive generation 0)

STUN-CLIENT(relay(IP4:192.168.101.47:0/TLS|turn6.indie.host:443)::TURN): Received response; processing

STUN-CLIENT(relay(IP4:192.168.101.47:0/TLS|turn6.indie.host:443)::TURN): nr_stun_process_error_response failed

STUN-CLIENT(relay(IP4:192.168.101.47:0/TLS|turn6.indie.host:443)::TURN): Error processing response: Retry may be possible, stun error code 401.

ICE-PEER(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test):default)/CAND-PAIR(Zue1): setting pair to state IN_PROGRESS: Zue1|IP4:192.168.101.47:64881/TCP|IP4:46.4.224.82:4443/TCP(host(IP4:192.168.101.47:64881/TCP) active|candidate:2 1 tcp 2130706431 46.4.224.82 4443 typ host tcptype passive generation 0)

ICE-PEER(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test):default): no FROZEN/WAITING pairs for PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test) transport-id=transport_0 - a7ff3a8c:00df86ff4fa061933d78cf1113469560

STUN-CLIENT(WhJf|IP4:62.214.6.98:64881/TCP|IP4:46.4.224.82:4443/TCP(prflx active|candidate:2 1 tcp 2130706431 46.4.224.82 4443 typ host tcptype passive generation 0)): Received response; processing

STUN-CLIENT(relay(IP4:192.168.101.47:0/TLS|turn6.indie.host:443)::TURN): Received response; processing

TURN(relay(IP4:192.168.101.47:0/TLS|turn6.indie.host:443)): Succesfully allocated addr IP4:46.4.224.83:49158/UDP lifetime=3600

ICE(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test)): peer (PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test):default) pairing local trickle ICE candidate turn-relay(IP4:192.168.101.47:0/TLS|IP4:46.4.224.83:49158/UDP)

ICE(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test)): All candidates initialized

ICE-PEER(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test):default)/STREAM(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test) transport-id=transport_0 - a7ff3a8c:00df86ff4fa061933d78cf1113469560)/COMP(1)/CAND-PAIR(WhJf): nominated pair is WhJf|IP4:62.214.6.98:64881/TCP|IP4:46.4.224.82:4443/TCP(prflx active|candidate:2 1 tcp 2130706431 46.4.224.82 4443 typ host tcptype passive generation 0)

ICE-PEER(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test):default)/STREAM(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test) transport-id=transport_0 - a7ff3a8c:00df86ff4fa061933d78cf1113469560)/COMP(1)/CAND-PAIR(WhJf): cancelling all pairs but WhJf|IP4:62.214.6.98:64881/TCP|IP4:46.4.224.82:4443/TCP(prflx active|candidate:2 1 tcp 2130706431 46.4.224.82 4443 typ host tcptype passive generation 0)

ICE-PEER(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test):default)/ICE-STREAM(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test) transport-id=transport_0 - a7ff3a8c:00df86ff4fa061933d78cf1113469560): all active components have nominated candidate pairs

ICE-PEER(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test):default): all checks completed success=1 fail=0

STUN-CLIENT(Zue1|IP4:192.168.101.47:64881/TCP|IP4:46.4.224.82:4443/TCP(host(IP4:192.168.101.47:64881/TCP) active|candidate:2 1 tcp 2130706431 46.4.224.82 4443 typ host tcptype passive generation 0)): Received response; processing

ICE-PEER(PC:1583511338509339 (id=51539610320 url=https://jitsi.indie.host/test):default)/CAND-PAIR(WhJf): setting pair to state SUCCEEDED: WhJf|IP4:62.214.6.98:64881/TCP|IP4:46.4.224.82:4443/TCP(prflx active|candidate:2 1 tcp 2130706431 46.4.224.82 4443 typ host tcptype passive generation 0)

TURN(relay(IP4:192.168.101.47:0/TLS|turn6.indie.host:443)): deallocating

NrTcpSocket::OnClose 0x180462c00 reason=2147500037 name=NS_ERROR_FAILURE

+++++++ END ++++++++

It looks like the connection get dropped at one point on the kubernetes server.

I’ll have to investigate a bit more…