there was an email from Konstantin Kuzov with bullet-proof 2 Coturn servers
and front-end Nginx
might be interesting to provide TURN at port 443 only for extremely secured
networks

On Tue, 22 Sep 2020 at 09:34, seba.wag...@gmail.com <seba.wag...@gmail.com>
wrote:

> Yeah love the SSL certificate magic :)
> Well I think the port 443 for CoTurn adds some advantages for certain
> types of networks.
>
> I will have a look if I find some time.
>
> Thanks,
> Seb
>
> Sebastian Wagner
> Director Arrakeen Solutions
> http://arrakeen-solutions.co.nz/
>
> <https://www.youracclaim.com/badges/da4e8828-743d-4968-af6f-49033f10d60a/public_url>
> <https://www.youracclaim.com/badges/b7e709c6-aa87-4b02-9faf-099038475e36/public_url>
>
>
> On Tue, 22 Sep 2020 at 13:20, Maxim Solodovnik <solomax...@gmail.com>
> wrote:
>
>> Nope,
>> it usually require some sort of SSL certificates magic, don't have time
>> for it
>>
>> On Tue, 22 Sep 2020 at 02:30, seba.wag...@gmail.com <
>> seba.wag...@gmail.com> wrote:
>>
>>> Have you tried configuring TLS ports for CoTurn ?
>>>
>>> Thanks
>>> Seb
>>>
>>> Sebastian Wagner
>>> Director Arrakeen Solutions
>>> http://arrakeen-solutions.co.nz/
>>>
>>> <https://www.youracclaim.com/badges/da4e8828-743d-4968-af6f-49033f10d60a/public_url>
>>> <https://www.youracclaim.com/badges/b7e709c6-aa87-4b02-9faf-099038475e36/public_url>
>>>
>>>
>>> On Mon, 21 Sep 2020 at 18:19, Maxim Solodovnik <solomax...@gmail.com>
>>> wrote:
>>>
>>>>
>>>>
>>>> On Mon, 21 Sep 2020 at 12:22, seba.wag...@gmail.com <
>>>> seba.wag...@gmail.com> wrote:
>>>>
>>>>> Hi
>>>>>
>>>>> I have a more advanced setup with CoTurn, OpenMeetings and Kurento on
>>>>> separate instances.
>>>>>
>>>>> Even in successful audio/video connections from one browser to another
>>>>> I can see logs in CoTurn:
>>>>>
>>>>> 541: session 001000000000000038: realm <somecomp.com> user
>>>>> <1600666426:3e9a27b2-4f1d-4852-95fe-c1a710d9bf59>: incoming packet
>>>>> CHANNEL_BIND processed, success
>>>>>
>>>>> 543: handle_udp_packet: New UDP endpoint: local addr 10.0.0.239:3478,
>>>>> remote addr 122.60.70.169:62901
>>>>>
>>>>> 543: session 000000000000000048: realm <somecomp.com> user <>:
>>>>> incoming packet message processed, error 401: Unauthorized
>>>>>
>>>>> 543: handle_udp_packet: New UDP endpoint: local addr 10.0.0.239:3478,
>>>>> remote addr 122.60.70.169:50666
>>>>>
>>>>> 543: session 000000000000000049: realm <somecomp.com> user <>:
>>>>> incoming packet message processed, error 401: Unauthorized
>>>>>
>>>>> 543: session 000000000000000048: realm <somecomp.com> user <>:
>>>>> incoming packet message processed, error 401: Unauthorized
>>>>>
>>>>> 543: session 000000000000000049: realm <somecomp.com> user <>:
>>>>> incoming packet message processed, error 401: Unauthorized
>>>>>
>>>>> 544: IPv4. Local relay addr: 10.0.0.239:64580
>>>>>
>>>>> 544: session 000000000000000048: new, realm=<somecomp.com>,
>>>>> username=<1600666423:3e9a27b2-4f1d-4852-95fe-c1a710d9bf59>, lifetime=3600
>>>>>
>>>>> 544: session 000000000000000048: realm <somecomp.com> user
>>>>> <1600666423:3e9a27b2-4f1d-4852-95fe-c1a710d9bf59>: incoming packet 
>>>>> ALLOCATE
>>>>> processed, success
>>>>>
>>>>> 544: session 001000000000000038: refreshed, realm=<somecomp.com>,
>>>>> username=<1600666426:3e9a27b2-4f1d-4852-95fe-c1a710d9bf59>, lifetime=0
>>>>>
>>>>> 544: session 001000000000000038: realm <somecomp.com> user
>>>>> <1600666426:3e9a27b2-4f1d-4852-95fe-c1a710d9bf59>: incoming packet REFRESH
>>>>> processed, success
>>>>>
>>>>> And
>>>>> => error 401: Unauthorized (among some success ones)
>>>>>
>>>>> When verifying via:
>>>>>
>>>>> https://webrtc.github.io/samples/src/content/peerconnection/trickle-ice/
>>>>> => There is a similar issue, it will check the first part fine but
>>>>> then can't trickle to the rest as the credentials are not correct
>>>>> Logs in CoTurn look somewhat similar:
>>>>>
>>>>> 2438: session 000000000000000054: realm <somecomp.com> user <>:
>>>>> incoming packet BINDING processed, success
>>>>>
>>>>> 2438: session 000000000000000054: realm <somecomp.com> user <>:
>>>>> incoming packet message processed, error 401: Unauthorized
>>>>>
>>>>>
>>>> I'm not sure how this app is working
>>>>
>>>>
>>>>
>>>>> Also in Kurento logs it still complains:
>>>>> 0:12:49.408639108     1 0x7f8340033c90 INFO
>>>>>  KurentoWebRtcEndpointImpl WebRtcEndpointImpl.cpp:571:WebRtcEndpointImpl:
>>>>> TURN server not found in config; remember that NAT traversal requires STUN
>>>>> or TURN
>>>>>
>>>>> => Even though it still seems to somehow work. But this error in
>>>>> Kurento docs indicate:
>>>>>
>>>>> https://doc-kurento.readthedocs.io/en/6.14.0/user/faq.html#faq-stun-configure
>>>>> A. configure turnURL in Kurento
>>>>> B. Use Java or JS API
>>>>> => I assume we opt for B? I can't see us using Java or JS API to
>>>>> supply those credentials though.
>>>>>
>>>>
>>>> we are not using TURN in KMS configs
>>>> I was unable to make it work :(((
>>>> We are passing TURN IT/credentials to client and then use it
>>>>
>>>>
>>>>>
>>>>> Also something is still wrong in the CoTurn auth. I'm sure it has to
>>>>> do with the use-auth-secret settings in CoTurn, but neither OpenMeetings
>>>>> nor myself seem to be able to calculate the correct pass.
>>>>> => Is there any way to debug this further or validate CoTurn ?
>>>>>
>>>>
>>>> This is the part I don't get :(
>>>> Why and what are calculating something?
>>>>
>>>> you need to
>>>> 1) specify `static-auth-secret=_some_pwd_`
>>>> 2) specify `p:turnSecret="_some_pwd_"` in applicationContext.xml (same
>>>> string, no changes) you can use arbitrary string as p:turnUser
>>>>
>>>>
>>>>>
>>>>> Thanks
>>>>> Seb
>>>>>
>>>>> Sebastian Wagner
>>>>> Director Arrakeen Solutions
>>>>> http://arrakeen-solutions.co.nz/
>>>>>
>>>>> <https://www.youracclaim.com/badges/da4e8828-743d-4968-af6f-49033f10d60a/public_url>
>>>>> <https://www.youracclaim.com/badges/b7e709c6-aa87-4b02-9faf-099038475e36/public_url>
>>>>>
>>>>
>>>>
>>>> --
>>>> Best regards,
>>>> Maxim
>>>>
>>>
>>
>> --
>> Best regards,
>> Maxim
>>
>

-- 
Best regards,
Maxim

Reply via email to