|
|
@@ -470,7 +470,7 @@ libevent2 from their web site. It was tested with older *NIXes
|
|
|
|
|
|
NOTE: SQLite must be of version 3.x.
|
|
|
|
|
|
-NOTE: For extra security features (DTLS and SHA256 and and SHA384 and SHA512)
|
|
|
+NOTE: For extra security features (like DTLS)
|
|
|
support, OpenSSL version 1.0.0a or newer is recommended. Older versions do
|
|
|
not support DTLS, reliably, in some cases. For example, the Debian 'Squeeze'
|
|
|
Linux supplies 0.9.8 version of OpenSSL, that does not work correctly with
|
|
|
@@ -683,10 +683,7 @@ security reasons. Storing only the HMAC key has its own implications -
|
|
|
if you change the realm, you will have to update the HMAC keys of all
|
|
|
users, because the realm is used for the HMAC key generation.
|
|
|
|
|
|
-The key must be up to 32 characters (HEX representation of 16 bytes) for SHA1,
|
|
|
-or up to 64 characters (HEX representation of 32 bytes) for SHA256,
|
|
|
-or up to 96 characters (HEX representation of 48 bytes) for SHA384,
|
|
|
-or up to 128 characters (HEX representation of 64 bytes) for SHA512:
|
|
|
+The key must be up to 32 characters (HEX representation of 16 bytes) for SHA1:
|
|
|
|
|
|
# Table holding shared secrets for secret-based authorization
|
|
|
# (REST API). Shared secret can be stored either in unsecure open
|
|
|
@@ -827,9 +824,6 @@ Fill in users, for example:
|
|
|
$ bin/turnadmin -a -b "/var/db/turndb" -u gorst -r north.gov -p hero
|
|
|
$ bin/turnadmin -a -b "/var/db/turndb" -u ninefingers -r north.gov -p youhavetoberealistic
|
|
|
|
|
|
- Long-term credentials mechanism with SHA256 extension:
|
|
|
- $ bin/turnadmin -a -b "/var/db/turndb" -u bethod -r north.gov -p king-of-north --sha256
|
|
|
-
|
|
|
Admin users:
|
|
|
|
|
|
$ bin/turnadmin -A -b "/var/db/turndb" -u gorst -p hero
|
|
|
@@ -954,9 +948,6 @@ Fill in users, for example:
|
|
|
$ bin/turnadmin -a -e "host=localhost dbname=coturn user=turn password=turn" -u gorst -r north.gov -p hero
|
|
|
$ bin/turnadmin -a -e "host=localhost dbname=coturn user=turn password=turn" -u ninefingers -r north.gov -p youhavetoberealistic
|
|
|
|
|
|
- Long-term credentials mechanism with SHA256 extension:
|
|
|
- $ bin/turnadmin -a -e "host=localhost dbname=coturn user=turn password=turn" -u bethod -r north.gov -p king-of-north --sha256
|
|
|
-
|
|
|
Admin users:
|
|
|
|
|
|
$ bin/turnadmin -A -e "host=localhost dbname=coturn user=turn password=turn" -u gorst -p hero
|
|
|
@@ -1009,9 +1000,6 @@ the root account.
|
|
|
$ bin/turnadmin -a -M "host=localhost dbname=coturn user=turn password=turn" -u gorst -r north.gov -p hero
|
|
|
$ bin/turnadmin -a -M "host=localhost dbname=coturn user=turn password=turn" -u ninefingers -r north.gov -p youhavetoberealistic
|
|
|
|
|
|
- Long-term credentials mechanism with SHA256 extension:
|
|
|
- $ bin/turnadmin -a -M "host=localhost dbname=coturn user=turn password=turn" -u bethod -r north.gov -p king-of-north --sha256
|
|
|
-
|
|
|
Admin users:
|
|
|
|
|
|
$ bin/turnadmin -A -M "host=localhost dbname=coturn user=turn password=turn" -u gorst -p hero
|
|
|
@@ -1138,9 +1126,6 @@ Redis TURN admin commands:
|
|
|
$ bin/turnadmin -a -N "host=localhost dbname=2 user=turn password=turn" -u gorst -r north.gov -p hero
|
|
|
$ bin/turnadmin -a -N "host=localhost dbname=2 user=turn password=turn" -u ninefingers -r north.gov -p youhavetoberealistic
|
|
|
|
|
|
- Long-term credentials mechanism with SHA256 extension:
|
|
|
- $ bin/turnadmin -a -N "host=localhost dbname=2 user=turn password=turn" -u bethod -r north.gov -p king-of-north --sha256
|
|
|
-
|
|
|
Admin users:
|
|
|
|
|
|
$ bin/turnadmin -A -N "host=localhost dbname=2 user=turn password=turn" -u gorst -p hero
|