|
|
|
|
@ -87,7 +87,7 @@ User database settings: |
|
|
|
|
-e, --psql-userdb User database connection string for PostgreSQL. |
|
|
|
|
This database can be used for long-term credentials mechanism, |
|
|
|
|
and it can store the secret value |
|
|
|
|
for secret-based timed authentication in TURN RESP API. |
|
|
|
|
for secret-based timed authentication in TURN REST API. |
|
|
|
|
The connection string format is like that: |
|
|
|
|
|
|
|
|
|
"host=<host> dbname=<dbname> user=<db-user> password=<db-user-password> connect_timeout=<seconds>" |
|
|
|
|
@ -105,7 +105,7 @@ User database settings: |
|
|
|
|
-M, --mysql-userdb User database connection string for MySQL or MariaDB. |
|
|
|
|
This database can be used for long-term credentials mechanism, |
|
|
|
|
and it can store the secret value for |
|
|
|
|
secret-based timed authentication in TURN RESP API. |
|
|
|
|
secret-based timed authentication in TURN REST API. |
|
|
|
|
The connection string format is like that: |
|
|
|
|
|
|
|
|
|
"host=<host> dbname=<dbname> user=<db-user> password=<db-user-password> connect_timeout=<seconds> read_timeout=<seconds>" |
|
|
|
|
@ -128,7 +128,7 @@ User database settings: |
|
|
|
|
-J, --mongo-userdb User database connection string for MongoDB. |
|
|
|
|
This database can be used for long-term credentials mechanism, |
|
|
|
|
and it can store the secret value |
|
|
|
|
for secret-based timed authentication in TURN RESP API. |
|
|
|
|
for secret-based timed authentication in TURN REST API. |
|
|
|
|
The connection string format is like that: |
|
|
|
|
|
|
|
|
|
"mongodb://username:password@host:port/database?options" |
|
|
|
|
@ -141,7 +141,7 @@ User database settings: |
|
|
|
|
-N, --redis-userdb User database connection string for Redis. |
|
|
|
|
This database can be used for long-term credentials mechanism, |
|
|
|
|
and it can store the secret |
|
|
|
|
value for secret-based timed authentication in TURN RESP API. |
|
|
|
|
value for secret-based timed authentication in TURN REST API. |
|
|
|
|
The connection string format is like that: |
|
|
|
|
|
|
|
|
|
"ip=<ip-addr> dbname=<db-number> password=<db-password> connect_timeout=<seconds>" |
|
|
|
|
@ -653,7 +653,7 @@ The temporary user is generated as: |
|
|
|
|
temporary-username="timestamp" + ":" + "username" |
|
|
|
|
|
|
|
|
|
where username is the persistent user name, and the timestamp format is just |
|
|
|
|
seconds sinse 1970 - the same value as time(NULL) function returns. |
|
|
|
|
seconds since 1970 - the same value as time(NULL) function returns. |
|
|
|
|
|
|
|
|
|
The temporary password is obtained as HMAC-SHA1 function over the temporary |
|
|
|
|
username, with shared secret as the HMAC key, and then the result is encoded: |
|
|
|
|
@ -717,7 +717,7 @@ The TURN server may use "--stale-nonce" option for extra security: in |
|
|
|
|
some time, the nonce expires and the client will obtain 438 error response |
|
|
|
|
with the new nonce, and the client will have to start using the new nonce. |
|
|
|
|
|
|
|
|
|
In subsequent communications, the sever and the client will always assume |
|
|
|
|
In subsequent communications, the server and the client will always assume |
|
|
|
|
the same password - the original password becomes the session parameter and |
|
|
|
|
is never expiring. So the password is not changing while the session is valid |
|
|
|
|
and unexpired. So, if the session is properly maintained, it may go forever, |
|
|
|
|
|