• coturn服务器配置中英对比


    coturn服务器配置中英对比

    默认配置位置

    /etc/turnserver.conf

    # RFC5766-TURN-SERVER configuration file
    # RFC5766-TURN-SERVER配置文件
    #
    # Boolean values note: where boolean value is supposed to be used,
    # you can use '0', 'off', 'no', 'false', 'f' as 'false,
    # and you can use '1', 'on', 'yes', 'true', 't' as 'true'
    # If the value is missed, then it means 'true'.
    #
    # 布尔值注意: 布尔值应该被使用,
    # 您可以使用'0', 'off', 'no', 'false', 'f' 相当于 'false,
    # 还有你可以用'1', 'on', 'yes', 'true', 't' 相当于 'true'
    # 如果没有值,相当于'true'.
    #
    
    # Listener interface device (optional, Linux only).
    # NOT RECOMMENDED.
    #
    # 侦听器接口设备(仅可选,Linux)。
    # 不推荐。
    #
    #listening-device=eth0
    
    # TURN listener port for UDP and TCP (Default: 3478).
    # Note: actually, TLS & DTLS sessions can connect to the
    # "plain" TCP & UDP port(s), too - if allowed by configuration.
    #
    # TURN为UDP和TCP的侦听器端口(默认: 3478)。
    # 注:实际上,TLS和DTLS会话可以连接到"清晰的"TCP和UDP端口,——如果允许配置。
    #
    #listening-port=3478
    listening-port=3478
    
    # TURN listener port for TLS (Default: 5349).
    # Note: actually, "plain" TCP & UDP sessions can connect to the TLS & DTLS
    # port(s), too - if allowed by configuration. The TURN server
    # "automatically" recognizes the type of traffic. Actually, two listening
    # endpoints (the "plain" one and the "tls" one) are equivalent in terms of
    # functionality; but we keep both endpoints to satisfy the RFC 5766 specs.
    # For secure TCP connections, we currently support SSL version 3 and
    # TLS version 1.0, 1.1 and 1.2. SSL2 "encapculation mode" is also supported.
    # For secure UDP connections, we support DTLS version 1.
    #
    # TURN为TLS的侦听器端口(默认: 5349)。
    # 注意:事实上,"清晰的"TCP和UDP会话可以连接到TLS和DTLS端口,如果允许配置。
    # TURN服务器"自动"识别传输类型。实际上,两个监听终端点("清晰的"端和"TLS"端)是
    # 对等的功能;但我们保持两个端点来满足RFC 5766规范。
    # 对于安全的TCP连接,我们目前支持SSL的3个版本,是TLS 1.0版本,1.1版本和1.2版本。
    # SSL2还支持"encapculation模式"。对于安全的UDP连接,我们支持DTLS版本1。
    #
    #tls-listening-port=5349
    tls-listening-port=5349
    
    # Alternative listening port for UDP and TCP listeners;
    # default (or zero) value means "listening port plus one".
    # This is needed for RFC 5780 support
    # (STUN extension specs, NAT behavior discovery). The TURN Server
    # supports RFC 5780 only if it is started with more than one
    # listening IP address of the same family (IPv4 or IPv6).
    # RFC 5780 is supported only by UDP protocol, other protocols
    # are listening to that endpoint only for "symmetry".
    #
    # 选择UDP和TCP监听器监听端口;
    # 默认(或者0)是表示监听的端口加1.
    # 这是必须的,为了RFC 5780的支持(STUN的扩展规范, NAT后端的发现)。
    # TURN服务器支持RFC 5780只有启动与多个监听同一族的IP地址(IPv4或IPv6).
    # RFC 5780只有UDP协议,支持其他协议是监听"对称"型端口的。
    #
    #alt-listening-port=0
                                       
    # Alternative listening port for TLS and DTLS protocols.
    # Default (or zero) value means "TLS listening port plus one".
    #
    # 选择监听端口TLS和DTLS协议。
    # 默认(或者0)是表示TLS监听的端口加1.
    #
    #alt-tls-listening-port=0
        
    # Listener IP address of relay server. Multiple listeners can be specified.
    # If no IP(s) specified in the config file or in the command line options,
    # then all IPv4 and IPv6 system IPs will be used for listening.
    #
    # 侦听器中继服务器的IP地址。可以指定多个侦听器。
    # 如果没有在配置文件或者命令选项中指定监听的IP,
    # 那么所有的IPv4和IPv6所有的IP将被监听
    #
    #listening-ip=172.17.19.101
    #listening-ip=10.207.21.238
    #listening-ip=2607:f0d0:1002:51::4
    listening-ip=<IP>
    
    # Auxiliary STUN/TURN server listening endpoint.
    # Aux servers have almost full TURN and STUN functionality.
    # The (minor) limitations are:
    # 1) Auxiliary servers do not have alternative ports and
    # they do not support STUN RFC 5780 functionality (CHANGE REQUEST).
    # 2) Auxiliary servers also are never returning ALTERNATIVE-SERVER reply.
    # Valid formats are 1.2.3.4:5555 for IPv4 and [1:2::3:4]:5555 for IPv6.
    # There may be multiple aux-server options, each will be used for listening
    # to client requests.
    #
    # 辅助STUN/TURN服务器监听端口。
    # 辅助服务器几乎有齐TURN和STUN功能
    # (一些)局限性:
    # 1) 辅助服务器没有替代的端口并且他们不支持STUN RFC 5780功能(变更请求)。
    # 2) 辅助服务器也不会返回ALTERNATIVE-SERVER回复。
    # 有效格式,IPv4的1.2.3.4:5555 和IPv6的[1:2::3:4]:5555。
    # 可能会有多个aux-server选项,每个将用于监听客户端请求。
    #
    #aux-server=172.17.19.110:33478
    #aux-server=[2607:f0d0:1002:51::4]:33478
    
    # (recommended for older Linuxes only)
    # Automatically balance UDP traffic over auxiliary servers (if configured).
    # The load balancing is using the ALTERNATE-SERVER mechanism.
    # The TURN client must support 300 ALTERNATE-SERVER response for this
    # functionality.
    #
    # (仅推荐老的Linuxes)
    # 在辅助服务器自动均衡UDP流量(如果配置)。
    # 使用ALTERNATE-SERVER的负载均衡机制。
    # TURN客户端必须支持300个ALTERNATE-SERVER响应。
    #
    #udp-self-balance
    
    # Relay interface device for relay sockets (optional, Linux only).
    # NOT RECOMMENDED.
    #
    # 终极接口设备为中继套接字(可选, 仅Linux).
    # 不推荐。
    #
    #relay-device=eth1
    
    # Relay address (the local IP address that will be used to relay the
    # packets to the peer).
    # Multiple relay addresses may be used.
    # The same IP(s) can be used as both listening IP(s) and relay IP(s).
    # If no relay IP(s) specified, then the turnserver will apply the default
    # policy: it will decide itself which relay addresses to be used, and it
    # will always be using the client socket IP address as the relay IP address
    # of the TURN session (if the requested relay address family is the same
    # as the family of the client socket).
    #
    # 中继地址(本地IP地址将用于传递数据包的给每个端)
    # 可以使用多个中继地址。
    # 相同的IP可以用作监听IP和继电器IP。
    # 如果没有指定中继IP,那么turnserver将应用默认策略:它将自行决定使用那个中继
    # 地址,并且它总是会使用客户端套接字的IP地址作为中继的IP地址在TURN会话中(如果
    # 请求的中继地址族解决同族的客户端套接字)。
    #
    #relay-ip=172.17.19.105
    #relay-ip=2607:f0d0:1002:51::5
    relay-ip=<IP>
    
    # For Amazon EC2 users:#
    # TURN Server public/private address mapping, if the server is behind NAT.
    # In that situation, if a -X is used in form "-X <ip>" then that ip will be reported
    # as relay IP address of all allocations. This scenario works only in a simple case
    # when one single relay address is be used, and no RFC5780 functionality is required.
    # That single relay address must be mapped by NAT to the 'external' IP.
    # The "external-ip" value, if not empty, is returned in XOR-RELAYED-ADDRESS field.
    # For that 'external' IP, NAT must forward ports directly (relayed port 12345
    # must be always mapped to the same 'external' port 12345).
    # In more complex case when more than one IP address is involved,
    # that option must be used several times, each entry must
    # have form "-X <public-ip/private-ip>", to map all involved addresses.
    # RFC5780 NAT discovery STUN functionality will work correctly,
    # if the addresses are mapped properly, even when the TURN server itself
    # is behind A NAT.
    # By default, this value is empty, and no address mapping is used.
    #
    # Amazon EC2用户:
    # TURN服务器公开/私有的地址映射,假如服务器是在NAT后端。
    # 在这种情况下,如果一个表单中"-X <ip>"使用一个-X,然后该ip将被作为中继ip地址来使用。
    # 这种情况只适用于一个简单的例子,当一个中继的地址是被使用,和没有RFC5780功能是必需的。
    # 单个中继地址必须通过NAT映射到外部的IP。
    # 外部的IP值,假如不为空,通过XOR-RELAYED-ADDRESS字段返回。
    # 外部的IP,NAT必须直接转发端口(转发端口12345,必须总是映射到相同的外部端口12345)。
    # 在更复杂的情况下,当涉及到多个IP地址,这个选项必须使用几次,每个条目必须形
    # 成"-X <public-ip/private-ip>",将所有涉及到的地址。
    # RFC5780 NAT发现STUN功能正常工作,如果正确的地址映射,即使TURN服务器本身是
    # 在一个NAT后。
    # 默认,该值为空,并且没有使用地址映射。
    #
    #external-ip=60.70.80.91
    #
    #OR:
    #
    #external-ip=60.70.80.91/172.17.19.101
    #external-ip=60.70.80.92/172.17.19.102
    external-ip=<IP>
    
    
    # Number of relay threads to handle the established connections
    # (in addition to authentication thread and the listener thread).
    # If set to 0 then application runs relay process in a single thread,
    # in the same thread with the listener process (the authentication thread will
    # still be a separate thread).
    # In the older systems (Linux kernel before 3.9),
    # the number of UDP threads is always one thread per network listening endpoint -
    # including the auxiliary endpoints - unless 0 (zero) or 1 (one) value is set.
    #
    # 数量的中继线程处理建立连接(除了验证线程和侦听器线程)。
    # 如果设置为0,那么应用程序中继进程在一个线程中运行,在同一
    # 个线程中监听处理(身份验证线程仍然是一个单独的线程)。
    # 在旧系统(3.9 Linux内核之前),数量的UDP线程总是一个线程监听一个网络端点,包括辅助端点——除非设置0或1值。
    #
    #relay-threads=0
    relay-threads=10
    
    # Lower and upper bounds of the UDP relay endpoints:
    # (default values are 49152 and 65535)
    #
    # UDP中继端点的上下边界:
    # (默认是49152至65535)
    #
    #min-port=49152
    #max-port=65535
        
    # Uncomment to run TURN server in 'normal' 'moderate' verbose mode.
    # By default the verbose mode is off.
    #
    # 取消TURN服务器运行'normal' 'moderate'详细模式。
    # 默认情况下,详细模式是关闭的。
    #
    #verbose
        
    # Uncomment to run TURN server in 'extra' verbose mode.
    # This mode is very annoying and produces lots of output.
    # Not recommended under any normal circumstances.
    #
    # 取消TURN服务器运行'extra'详细模式。
    # 这种模式是非常恼人的,产生大量的输出。
    # 在任何正常情况下不建议。
    #
    #Verbose
    
    # Uncomment to use fingerprints in the TURN messages.
    # By default the fingerprints are off.
    #
    # 取消在TURN消息中使用指纹。
    # 默认情况下,指纹是关闭的。
    #
    #fingerprint
    
    # Uncomment to use long-term credential mechanism.
    # By default no credentials mechanism is used (any user allowed).
    # This option can be used with either flat file user database or
    # PostgreSQL DB or MySQL DB or Redis DB for user keys storage.
    #
    # 取消使用长期证书机制。
    # 默认情况下不使用凭证机制(允许任何用户)。
    # 这个选项可能使用用户数据文件或PostgreSQL或MySQL或Redis来存储用户密钥。
    #
    #lt-cred-mech
    lt-cred-mech
    
    # Uncomment to use short-term credential mechanism.
    # By default no credentials mechanism is used (any user allowed).
    # For short-term credential mechanism you have to use PostgreSQL or
    # MySQL or Redis database for user password storage.
    #
    # 取消使用短期证书机制。
    # 默认情况下不使用凭证机制(允许任何用户)。
    # 短期证书机制必须使用PostgreSQL或MySQL或Redis数据库来存储用户密码。
    #
    #st-cred-mech
    
    # This option is opposite to lt-cred-mech or st-cred-mech.
    # (TURN Server with no-auth option allows anonymous access).
    # If neither option is defined, and no users are defined,
    # then no-auth is default. If at least one user is defined,
    # in this file or in command line or in usersdb file, then
    # lt-cred-mech is default.
    #
    # 这个选项是lt-cred-mech或st-cred-mech相反。
    # (TURN服务器no-auth选项允许匿名访问)。
    # 如果没有选项定义,没有用户定义,那么no-auth默认。
    # 如果至少定义有一个用户,在这个文件中或在命令行或usersdb文件,
    # 那么lt-cred-mech默认。
    #
    #no-auth
    
    # TURN REST API flag.
    # Flag that sets a special authorization option that is based upon authentication secret.
    # This feature can be used with the long-term authentication mechanism, only.
    # This feature purpose is to support "TURN Server REST API", see
    # "TURN REST API" link in the project's page
    # http://code.google.com/p/rfc5766-turn-server/.
    # This option is used with timestamp:
    # usercombo -> "timestamp:userid"
    # turn user -> usercombo
    # turn password -> base64(hmac(secret key, usercombo))
    # This allows TURN credentials to be accounted for a specific user id.
    # If you don't have a suitable id, the timestamp alone can be used.
    # This option is just turning on secret-based authentication.
    # The actual value of the secret is defined either by option static-auth-secret,
    # or can be found in the turn_secret table in the database (see below).
    #
    # TURN REST API标志。
    # 标志是设置一个特殊的授权选项,是基于身份验证的私密。
    # 这个功能可以用于长期验证机制。
    # 这个功能的目的是支持"TURN Server REST API",看到"TURN Server REST API"项目的页面的链接
    # http://code.google.com/p/rfc5766-turn-server/。
    # 这个选项是使用时间戳:
    # usercombo -> "timestamp:userid"
    # turn user -> usercombo
    # turn password -> base64(hmac(secret key, usercombo))
    # 这允许TURN凭证占用一个特定的用户id。
    # 如果你没有一个合适的id,可以使用单独的时间戳。
    # 这个选项只是打开基于私密的身份验证。
    # 实际值定义的私密就是通过选择static-auth-secret,或可以在数据库中找到turn_secret表(见下文)。
    #
    #use-auth-secret
    
    # 'Static' authentication secret value (a string) for TURN REST API only.
    # If not set, then the turn server
    # will try to use the 'dynamic' value in turn_secret table
    # in user database (if present). The database-stored  value can be changed on-the-fly
    # by a separate program, so this is why that other mode is 'dynamic'.
    #
    # TURN REST API的'Static'身份验证的私密值(字符串)
    # 如果没有设置,那么turn服务器将尝试使用'dynamic'值在用户数据库的turn_secret表(如果存在)。
    # 数据库存储的值可以随时改变,通过单独的程序,所以这就是'dynamic'模式。
    #
    #static-auth-secret     
    
    # 'Static' user accounts for long term credentials mechanism, only.
    # This option cannot be used with TURN REST API or with short-term credentials
    # mechanism.
    # 'Static' user accounts are NOT dynamically checked by the turnserver process,
    # so that they can NOT be changed while the turnserver is running.
    #
    # 'Static'用户长期占凭证机制。
    # 这个选项不能用于TURN REST API或短期凭证机制。
    # 'Static'用户帐户不是turnserver程序动态检查,所以他们不能改变在turnserver运行时。
    #
    #user=username1:key1
    #user=username2:key2
    # OR:
    #user=username1:password1
    #user=username2:password2
    #
    # Keys must be generated by turnadmin utility. The key value depends
    # on user name, realm, and password:
    #
    # 钥匙必须由turnadmin实用程序生成。键值取决于用户名称、领域和密码:
    #
    # Example:
    # 例子,使用以下命令:
    #
    # $ turnadmin -k -u ninefingers -r north.gov -p youhavetoberealistic
    #
    # Output: 0xbc807ee29df3c9ffa736523fb2c4e8ee
    # 输出是: 0xbc807ee29df3c9ffa736523fb2c4e8ee
    #
    # ('0x' in the beginning of the key is what differentiates the key from
    # password. If it has 0x then it is a key, otherwise it is a password).
    # ('0x'开始的关键是区分从密码的关键。如果它有0x,那么它是一个关键,否则这是一个密码)。
    #
    # The corresponding user account entry in the config file will be:
    # 相应的配置文件中的用户帐户条目将:
    #
    #user=ninefingers:0xbc807ee29df3c9ffa736523fb2c4e8ee
    # Or, equivalently, with open clear password (less secure):
    #或者是这样,明文密码(不安全的):
    #user=ninefingers:youhavetoberealistic
    #
    user=<yourname:yourpsw>
    
    # 'Dynamic' user accounts database file name.
    # Only users for long-term mechanism can be stored in a flat file,
    # short-term mechanism will not work with option, the short-term
    # mechanism required PostgreSQL or MySQL or Redis database.
    # 'Dynamic' long-term user accounts are dynamically checked by the turnserver process,
    # so that they can be changed while the turnserver is running.
    # Default file name is turnuserdb.conf.
    #
    # 'Dynamic'用户帐户数据库文件名。
    # 只有用户长期机制可以存储在一个文件,短期机制不会处理选项,短期机制需要PostgreSQL或MySQL或
    # Redis数据库。
    # 'Dynamic'的长期用户帐户在turnserver程序中动态检查的,这样他们可以改变的在turnserver运行时。
    # 默认文件名是turnuserdb.conf.
    #
    #userdb=/usr/local/etc/turnuserdb.conf
    userdb=/etc/turnuserdb.conf
    
    # PostgreSQL database connection string in the case that we are using PostgreSQL
    # as the user database.
    # This database can be used for long-term and short-term credential mechanisms
    # and it can store the secret value for secret-based timed authentication in TURN RESP API.
    # See http://www.postgresql.org/docs/8.4/static/libpq-connect.html for 8.x PostgreSQL
    # versions connection string format, see
    # http://www.postgresql.org/docs/9.2/static/libpq-connect.html#LIBPQ-CONNSTRING
    # for 9.x and newer connection string formats.
    #
    # PostgreSQL数据库连接字符串,使用PostgreSQL作为用户数据库。
    # 该数据库可用于长期和短期证书机制,它可以存储的私密值,为基于私密身份验证的在TURN RESP API中。
    # 8.x PostgreSQL版本请参见http://www.postgresql.org/docs/8.4/static/libpq-connect.html的连接字符串
    # 格式,9.x和更新的请参阅http://www.postgresql.org/docs/9.2/static/libpq-connect.html LIBPQ-CONNSTRING
    # 的连接字符串格式。
    #
    #psql-userdb="host=<host> dbname=<database-name> user=<database-user> password=<database-user-password> connect_timeout=30"
    
    # MySQL database connection string in the case that we are using MySQL
    # as the user database.
    # This database can be used for long-term and short-term credential mechanisms
    # and it can store the secret value for secret-based timed authentication in TURN RESP API.
    # Use string format as below (space separated parameters, all optional):
    #
    # MySQL数据库连接字符串,使用MySQL作为用户数据库。
    # 该数据库可用于长期和短期证书机制,它可以存储的私密值,为基于私密身份验证的在TURN RESP API中。
    # 使用字符串格式如下(空间分离参数,所有可选):
    #
    #mysql-userdb="host=<host> dbname=<database-name> user=<database-user> password=<database-user-password> port=<port> connect_timeout=<seconds>"
    
    # Redis database connection string in the case that we are using Redis
    # as the user database.
    # This database can be used for long-term and short-term credential mechanisms
    # and it can store the secret value for secret-based timed authentication in TURN RESP API.
    # Use string format as below (space separated parameters, all optional):
    #
    # Redis数据库连接字符串,使用Redis作为用户数据库。
    # 该数据库可用于长期和短期证书机制,它可以存储的私密值,为基于私密身份验证的在TURN RESP API中。
    # 使用字符串格式如下(空间分离参数,所有可选):
    #
    #redis-userdb="ip=<ip-address> dbname=<database-number> password=<database-user-password> port=<port> connect_timeout=<seconds>"
    
    # Redis status and statistics database connection string, if used (default - empty, no Redis stats DB used).
    # This database keeps allocations status information, and it can be also used for publishing
    # and delivering traffic and allocation event notifications.
    # The connection string has the same parameters as redis-userdb connection string.
    # Use string format as below (space separated parameters, all optional):
    #
    # Redis状态和统计数据库连接字符串,如果使用(默认空,没有Redis统计数据库使用)。
    # 这个数据库保持分配状态信息,它也可以用于发布和交付传输和分配事件通知。
    # 连接字符串有相同的参数作为redis-userdb连接字符串。
    # 使用字符串格式如下(空间分离参数,所有可选):
    #
    #redis-statsdb="ip=<ip-address> dbname=<database-number> password=<database-user-password> port=<port> connect_timeout=<seconds>"
    
    # Realm for long-term credentials mechanism and for TURN REST API.
    #
    # TURN REST API的长期凭证机制范围。
    #
    #realm=mycompany.org
    
    # Per-user allocation quota.
    # default value is 0 (no quota, unlimited number of sessions per user).
    #
    # 每个用户分配配额。
    # 默认值为0(没有配额,每个用户无限数量的会话)。
    #
    #user-quota=0
    
    # Total allocation quota.
    # default value is 0 (no quota).
    #
    # 总分配配额。
    # 默认值为0(无配额)。
    #
    #total-quota=0
    
    # Max bytes-per-second bandwidth a TURN session is allowed to handle
    # (input and output network streams are treated separately). Anything above
    # that limit will be dropped or temporary suppressed (within
    # the available buffer limits).
    #
    # TURN会话允许最大的传输占用带宽(输入和输出网络流分别处理)。
    # 高于限制将被删除或暂时抑制(在可用的缓冲区范围内)。
    #
    #max-bps=0
    max-bps=1024
    
    # Uncomment if no UDP client listener is desired.
    # By default UDP client listener is always started.
    #
    # 如果没有UDP客户端监听器需要取消。
    # 默认情况下UDP客户端监听器总是启动。
    #
    #no-udp
    
    # Uncomment if no TCP client listener is desired.
    # By default TCP client listener is always started.
    #
    # 如果没有TCPP客户端监听器需要取消。
    # 默认情况下TCPP客户端监听器总是启动。
    #
    #no-tcp
    
    # Uncomment if no TLS client listener is desired.
    # By default TLS client listener is always started.
    #
    # 如果没有TLS客户端监听器需要取消。
    # 默认情况下TLS客户端监听器总是启动。
    #
    #no-tls
    
    # Uncomment if no DTLS client listener is desired.
    # By default DTLS client listener is always started.
    #
    # 如果没有DTLS客户端监听器需要取消。
    # 默认情况下DTLS客户端监听器总是启动。
    #
    #no-dtls
    
    # Uncomment if no UDP relay endpoints are allowed.
    # By default UDP relay endpoints are enabled (like in RFC 5766).
    #
    # 如果不允许UDP中继端点需要取消。
    # 默认情况下启用UDP继电器端点(如在RFC 5766)。
    #
    #no-udp-relay
    
    # Uncomment if no TCP relay endpoints are allowed.
    # By default TCP relay endpoints are enabled (like in RFC 6062).
    #
    # 如果不允许TCP中继端点需要取消。
    # 默认情况下启用TCP继电器端点(如在RFC 5766)。
    #
    #no-tcp-relay
    
    # Uncomment if extra security is desired,
    # with nonce value having limited lifetime (600 secs).
    # By default, the nonce value is unique for a session,
    # but it has unlimited lifetime. With this option,
    # the nonce lifetime is limited to 600 seconds, after that
    # the client will get 438 error and will have to re-authenticate itself.
    #
    # 取消如果需要额外的安全,现时已有有限的生命周期(600秒)。
    # 默认情况下,一个会话的唯一临界值,但它一般拥有无限的生命周期。这个选项,临界值
    # 仅限于600秒,之后,客户端将得到438错误,将不得不重新认证。
    #
    #stale-nonce
    
    # Certificate file.
    # Use an absolute path or path relative to the
    # configuration file.
    #
    # 证书文件。
    # 使用绝对路径或路径相对于配置文件。
    #
    #cert=/usr/local/etc/turn_server_cert.pem
    
    # Private key file.
    # Use an absolute path or path relative to the
    # configuration file.
    # Use PEM file format.
    #
    # 私钥文件。
    # 使用绝对路径或路径相对于配置文件。使用PEM文件格式。
    #
    #pkey=/usr/local/etc/turn_server_pkey.pem
    
    # Private key file password, if it is in encoded format.
    # This option has no default value.
    #
    # 私有密钥文件密码,如果是在编码格式。
    # 这个选项没有默认值。
    #
    #pkey-pwd=...
    
    # Allowed OpenSSL cipher list for TLS/DTLS connections.
    # Default value is "DEFAULT".
    #
    # 允许OpenSSL的密码列表为TLS/DTLS连接。
    # 默认值是"DEFAULT"
    #
    #cipher-list="DEFAULT"
    
    # CA file in OpenSSL format.
    # Forces TURN server to verify the client SSL certificates.
    # By default it is not set: there is no default value and the client
    # certificate is not checked.
    #
    # 在OpenSSL格式的CA文件。
    # 强制TURN服务器验证客户端SSL证书。
    # 默认情况下它没有设置:没有默认值,不检查的客户端证书。
    #
    # Example:
    #CA-file=/etc/ssh/id_rsa.cert
    
    # Curve name for EC ciphers, if supported by OpenSSL library (TLS and DTLS).
    # The default value is prime256v1.
    #
    # 曲线名称的EC密码,如果由OpenSSL库支持(TLS和DTLS)。
    # 默认值是prime256v1。
    #
    #ec-curve-name=prime256v1
    
    # Use 566 bits predefined DH TLS key. Default size of the key is 1066.
    #
    # 使用566位预定义DH TLS键。默认键大小是1066
    #
    #dh566
    
    # Use 2066 bits predefined DH TLS key. Default size of the key is 1066.
    #
    # 使用2066位预定义DH TLS键。默认键大小是1066
    #
    #dh2066
    
    # Use custom DH TLS key, stored in PEM format in the file.
    # Flags --dh566 and --dh2066 are ignored when the DH key is taken from a file.
    #
    # 使用惯例的DH TLS键,使用PEM格式存储在文件里
    # 当DH键从文件里加载,将忽略标志--dh566和--dh2066
    #
    #dh-file=<DH-PEM-file-name>
    
    # Flag to prevent stdout log messages.
    # By default, all log messages are going to both stdout and to
    # the configured log file. With this option everything will be
    # going to the configured log only (unless the log file itself is stdout).
    #
    # 标志防止输出日志信息
    # 默认情况下,所有日志消息将输出到配置的日志文件。采用这一选项都将只配置日志
    # (除非日志文件本身是输出的)。
    #
    #no-stdout-log
    
    # Option to set the log file name.
    # By default, the turnserver tries to open a log file in
    # /var/log, /var/tmp, /tmp and current directories directories
    # (which open operation succeeds first that file will be used).
    # With this option you can set the definite log file name.
    # The special names are "stdout" and "-" - they will force everything
    # to the stdout. Also, the "syslog" name will force everything to
    # the system log (syslog).
    # In the runtime, the logfile can be reset with the SIGHUP signal
    # to the turnserver process.
    #
    # 设置日志文件
    # 默认情况下,turnserver尝试一个日志文件在/var/log,/var/tmp,/tmp和
    # 当前目录(那个文件先打开成功,文件将被使用)。
    # 采用这一选项可以设置明确的日志文件名。
    # 特殊的名字是"stdout"和"-"——他们将强制所有的输出。同时,"syslog"名称将强制所有的系统日志(syslog)。
    # 在运行时,日志文件可以重置通过SIGHUP信号在turnserver程序中。
    #
    #log-file=/var/tmp/turn.log
    
    # Option to redirect all log output into system log (syslog).
    #
    # 选择重定向所有日志输出到系统日志(syslog)。
    #
    #syslog
    
    # This flag means that no log file rollover will be used, and the log file
    # name will be constructed as-is, without PID and date appendage.
    #
    # 这个标志意味着没有日志文件将使用翻转,并按原样将创建日志文件名称,没有PID和日期的附加。
    #
    #simple-log
    
    # Option to set the "redirection" mode. The value of this option
    # will be the address of the alternate server for UDP & TCP service in form of
    # <ip>[:<port>]. The server will send this value in the attribute
    # ALTERNATE-SERVER, with error 300, on ALLOCATE request, to the client.
    # Client will receive only values with the same address family
    # as the client network endpoint address family.
    # See RFC 5389 and RFC 5766 for ALTERNATE-SERVER functionality description.
    # The client must use the obtained value for subsequent TURN communications.
    # If more than one --alternate-server options are provided, then the functionality
    # can be more accurately described as "load-balancing" than a mere "redirection".
    # If the port number is omitted, then the default port
    # number 3478 for the UDP/TCP protocols will be used.
    # Colon ( characters in IPv6 addresses may conflict with the syntax of
    # the option. To alleviate this conflict, literal IPv6 addresses are enclosed
    # in square brackets in such resource identifiers, for example:
    # [2001:db8:85a3:8d3:1319:8a2e:370:7348]:3478 .
    # Multiple alternate servers can be set. They will be used in the
    # round-robin manner. All servers in the pool are considered of equal weight and
    # the load will be distributed equally. For example, if we have 4 alternate servers,
    # then each server will receive 25% of ALLOCATE requests. A alternate TURN server
    # address can be used more than one time with the alternate-server option, so this
    # can emulate "weighting" of the servers.
    #
    # 选项设置"redirection"模式。这个选项的值将备用服务器的地址UDP和TCP服务形式的<ip>[:<port>]。
    # 服务器将发送这个值属性ALTERNATE-SERVER,错误300,在ALLOCATE请求,客户端。
    # 客户端将只接收和自己相同的地址族的客户端的值。查看RFC 5389和RFC 5766为ALTERNATE-SERVER的功能描述。
    # 客户端必须使用获得的值为随后的TURN通信。如果不止一个——alternate-server选项提供,那么功能可以更准确
    # 地描述为"load-balancing",而不仅仅是一个"redirection"。如果端口号省略,那么为UDP/TCP协议,使用默认端
    # 口号是3478。冒号(在IPv6地址字符可能与选项的语法冲突。缓解这种冲突,文字IPv6地址包含在方括号在这种
    # 资源标识符,例如[2001:db8:85a3:8d3:1319:8a2e:370:7348]:3478 。
    # 可以设置多个备用服务器。他们将用于循环的方式。所有服务器池中被认为是平等的重量和载荷将平均分配的原则。
    # 例如,如果我们有4个备用服务器,每个服务器将获得25%的分配请求。备用TURN服务器地址可以使用超过一次
    # alternate-server选项,所以这可以效仿的"weighting"服务器。
    #
    # Examples:
    #alternate-server=1.2.3.4:5678
    #alternate-server=11.22.33.44:56789
    #alternate-server=5.6.7.8
    #alternate-server=[2001:db8:85a3:8d3:1319:8a2e:370:7348]:3478
                  
    # Option to set alternative server for TLS & DTLS services in form of
    # <ip>:<port>. If the port number is omitted, then the default port
    # number 5349 for the TLS/DTLS protocols will be used. See the previous
    # option for the functionality description.
    #
    # 选项设置替代服务器TLS和DTLS服务形式的<ip>:<port>。
    # 如果省略的端口号,那么默认端口号5349将使用TLS/DTLS协议。看到前面选择的功能描述。
    #
    # Examples:
    #tls-alternate-server=1.2.3.4:5678
    #tls-alternate-server=11.22.33.44:56789
    #tls-alternate-server=[2001:db8:85a3:8d3:1319:8a2e:370:7348]:3478
    
    # Option to suppress TURN functionality, only STUN requests will be processed.
    # Run as STUN server only, all TURN requests will be ignored.
    # By default, this option is NOT set.
    #
    # 选择抑制TURN功能,只有STUN的请求将被处理。
    # 作为STUN服务器,所有TURN请求将被忽略。
    # 默认情况下,没有设置这个选项。
    #
    #stun-only
    
    # Option to suppress STUN functionality, only TURN requests will be processed.
    # Run as TURN server only, all STUN requests will be ignored.
    # By default, this option is NOT set.
    #
    # 选择抑制STUN功能,只有TURN的请求将被处理。
    # 作为TURN服务器,所有STUN请求将被忽略。
    # 默认情况下,没有设置这个选项。
    #
    #no-stun
    
    # This is the timestamp/username separator symbol (character) in TURN REST API.
    # The default value is ':'.
    #
    # 这是时间戳/用户名分离器符号(字符)在TURN REST API。
    # 默认是使用':'
    #
    # rest-api-separator=:    
    
    # Flag that can be used to disallow peers on the loopback addresses (127.x.x.x and ::1).
    # This is an extra security measure.
    #
    # 标记用于不接受的端在环回地址(127.x.x.x 和 ::1)。
    # 这是一个额外的安全措施。
    #
    #no-loopback-peers
    
    # Flag that can be used to disallow peers on well-known broadcast addresses (224.0.0.0 and above, and FFXX:*).
    # This is an extra security measure.
    #
    # 标记用于不接受的端在广播地址(224.0.0.0和以上的,和FFXX:*)。
    # 这是一个额外的安全措施。
    #
    #no-multicast-peers
    
    # Option to set the max time, in seconds, allowed for full allocation establishment.
    # Default is 60 seconds.
    #
    # 选项设置的最大时间,以秒为单位,允许完整的分配。
    # 默认60秒
    #
    #max-allocate-timeout=60
    
    # Option to allow or ban specific ip addresses or ranges of ip addresses.
    # If an ip address is specified as both allowed and denied, then the ip address is
    # considered to be allowed. This is useful when you wish to ban a range of ip
    # addresses, except for a few specific ips within that range.
    # This can be used when you do not want users of the turn server to be able to access
    # machines reachable by the turn server, but would otherwise be unreachable from the
    # internet (e.g. when the turn server is sitting behind a NAT)
    #
    # 选择允许或禁止特定的ip地址或ip地址范围。
    # 如果指定一个ip地址允许和拒绝,那么ip地址被认为是允许的。这是有用的,当你希望禁止一个范
    # 围的ip地址,除了一些特定的ip范围内。
    # 这可以使用当你不希望turn服务器的用户能够访问机器通过turn服务器,但可能是另一方面从互联
    # 网上不能到达(例如,当turn服务器是在一个NAT后)
    #
    # Examples:
    # denied-peer-ip=83.166.64.0-83.166.95.255
    # allowed-peer-ip=83.166.68.45
    
    # File name to store the pid of the process.
    # Default is /var/run/turnserver.pid (if superuser account is used) or
    # /var/tmp/turnserver.pid .
    #
    # 存储进程pid的文件名。
    # 默认是/var/run/turnserver.pid(超级用户使用)或者是/var/tmp/turnserver.pid
    #
    #pidfile="/var/run/turnserver.pid"
    pidfile="/var/tmp/turnserver.pid"
    
    # Require authentication of the STUN Binding request.
    # By default, the clients are allowed anonymous access to the STUN Binding functionality.
    #
    # 需要STUN绑定请求的身份验证。
    # 默认情况下,客户允许匿名访问STUN绑定功能。
    #
    #secure-stun
    
    # Require SHA256 digest function to be used for the message integrity.
    # By default, the server uses SHA1 (as per TURN standard specs).
    # With this option, the server
    # always requires the stronger SHA256 function. The client application
    # must support SHA256 hash function if this option is used. If the server obtains
    # a message from the client with a weaker (SHA1) hash function then the
    # server returns error code 426.
    #
    # 需要SHA256采摘功能用于消息的完整性。
    # 默认情况下,服务器使用SHA1(按标准规格)。
    # 采用这一选项,服务器总是需要更强的SHA256功能。客户端应用程序必须支持SHA256散列函数
    # 如果使用这个选项。如果服务器获得消息从客户端较弱(SHA1)散列函数那么服务器返回错误代码426。
    #
    #sha256
    
    # Mobility with ICE (MICE) specs support.
    #
    # 移动的ICE(MICE)的规范支持。
    #
    #mobility
    
    # User name to run the process. After the initialization, the turnserver process
    # will make an attempt to change the current user ID to that user.
    #
    # 用户名运行程序。初始化后,turnserver程序将试图改变当前用户的用户ID。
    #
    #proc-user=<user-name>
    
    # Group name to run the process. After the initialization, the turnserver process
    # will make an attempt to change the current group ID to that group.
    #
    # 组名运行程序。初始化后,turnserver程序将试图改变当前组的组ID。
    #
    #proc-group=<group-name>
    
    # Turn OFF the CLI support.
    # By default it is always ON.
    # See also options cli-ip and cli-port.
    #
    # 关掉CLI的支持。
    # 默认情况下它总是ON。
    # 参阅选项cli-ip和cli-port。
    #
    #no-cli
    
    #Local system IP address to be used for CLI server endpoint. Default value
    # is 127.0.0.1.
    #
    # 本地系统的IP地址将用于CLI服务器端点。默认值是127.0.0.1。
    #
    #cli-ip=127.0.0.1
    
    # CLI server port. Default is 5766.
    #
    # CLI服务器端口。默认是5766。
    #
    #cli-port=5766
    
    # CLI access password. Default is empty (no password).
    #
    # CLI访问密码。默认是空的(没有密码)。
    #
    #cli-password=logen
    
    # Server relay. NON-STANDARD AND DANGEROUS OPTION.
    # Only for those applications when we want to run
    # server applications on the relay endpoints.
    # This option eliminates the IP permissions check on
    # the packets incoming to the relay endpoints.
    #
    # 中继服务器。NON-STANDARD和DANGEROUS的选择。
    # 只对这些应用程序时,我们想在中继服务器上运行服务器应用程序端点。
    # 这个选项可以消除IP权限检查传递的数据包传入的端点。
    #
    #server-relay
    
    # Maximum number of output sessions in ps CLI command.
    # This value can be changed on-the-fly in CLI. The default value is 256.
    #
    # 最大数量的输出会议在ps CLI命令。
    # 这个值可以动态改变在CLI。默认值是256。
    #
    #cli-max-output-sessions
    
    # Set network engine type for the process (for internal purposes).
    #
    # 设置网络引擎类型(用于内部目的)的过程。
    #
    #ne=[1|2|3]
    
    # Do not allow an SSL/TLS version of protocol
    #
    # 不允许一个SSL/TLS版本的协议
    #
    #no-sslv2
    #no-sslv3
    #no-tlsv1
    #no-tlsv1_1
    #no-tlsv1_2
  • 相关阅读:
    Huntor中国CRM评估报告连载(二)
    子曾经曰过:先有司,赦小过,举贤才
    Huntor中国CRM评估报告连载(一)
    开源.net微博组建维护团队
    汉拓中国CRM评估报告简介
    CHFMake代码生成器Beta版下载
    山寨版Windows.Forms用户控件
    [转]Team Foundation Server 2008 單一伺服器簡易安裝說明 (Win2003+SQL2005+TFS2008)
    黑马程序员——c语言学习心得——函数传递二维数组
    黑马程序员——oc语言学习心得—— 属性声明和赋值
  • 原文地址:https://www.cnblogs.com/idignew/p/7446121.html
Copyright © 2020-2023  润新知