1
0
Fork 0
mirror of https://github.com/YunoHost-Apps/synapse_ynh.git synced 2024-09-03 20:26:38 +02:00
synapse_ynh/conf/turnserver.conf

48 lines
1.3 KiB
Text
Raw Normal View History

2017-02-13 20:43:41 +01:00
use-auth-secret
static-auth-secret={{ turnserver_pwd }}
2024-06-22 17:39:59 +02:00
cli-password={{ turnserver_cli_pwd }}
realm={{ domain }}
2017-02-13 20:43:41 +01:00
tls-listening-port={{ port_turnserver_tls }}
alt-tls-listening-port={{ port_turnserver_alt_tls }}
min-port=49153
max-port=49193
cli-port={{ port_cli }}
2017-02-13 20:43:41 +01:00
cert=/etc/yunohost/certs/{{ domain }}/crt.pem
pkey=/etc/yunohost/certs/{{ domain }}/key.pem
2020-05-20 22:08:14 +02:00
dh-file=/etc/ssl/private/dh2048.pem
2017-02-13 20:43:41 +01:00
{% if enable_dtls_for_audio_video_turn_call == 'true' %}
# Block clear communication
no-udp
no-tcp
{% endif %}
2024-03-09 01:51:57 +01:00
# Block old protocols
2017-02-13 20:43:41 +01:00
no-sslv2
no-sslv3
no-tlsv1
2020-05-20 23:41:04 +02:00
no-tlsv1_1
log-file=/var/log/matrix-{{ app }}/turnserver.log
pidfile=/run/coturn-{{ app }}/turnserver.pid
simple-log
2024-02-26 22:35:05 +01:00
# consider whether you want to limit the quota of relayed streams per user (or total) to avoid risk of DoS.
user-quota=12 # 4 streams per video call, so 12 streams = 3 simultaneous relayed calls per user.
total-quota=1200
2024-03-09 01:51:57 +01:00
# recommended additional local peers to block, to mitigate external access to internal services.
# https://www.rtcsec.com/article/slack-webrtc-turn-compromise-and-bug-bounty/#how-to-fix-an-open-turn-relay-to-address-this-vulnerability
no-multicast-peers
denied-peer-ip=0.0.0.0-0.255.255.255
denied-peer-ip=127.0.0.0-127.255.255.255
2024-02-26 22:35:05 +01:00
# Max time 12h
max-allocate-lifetime=43200
{%- for ip in turn_external_ip.strip(',').split(',') %}
external-ip={{ ip }}
{%- endfor %}