Additional eturnal whitelist option #3395
-
Hi there, I'm currently using Nextcloud on premise, behind a NAT. I know it's not fully recommended for Talk STUN/TURN setup, but I believe it works with the right config on NAT, firewall and DNS. In my opinion it's an ok setup when most of the time the call participants are actually on premise, and occasionally some participants connect from the Internet. The problem I'm currently facing is with TURN server for call participants that are "inside" of the network, meaning they are connecting behind the same firewall as the Nextcloud server (although on different subnets). I have found it works properly when I add the LAN network CIDR in the "whitelist" section of eturnal configuration file, to override the corresponding In my scenario, it would be very useful to have an additional line in the I'm also open to know if I'm missing any alternative solution to add a whitelist option to eturnal in the nextcloud-aio-talk container. Cheers |
Beta Was this translation helpful? Give feedback.
Replies: 4 comments 12 replies
-
Hi, I am wondering since when is this necessary? Since we switchted to eturnal? How long are you using AIO already?
Thanks, this is great to hear! |
Beta Was this translation helpful? Give feedback.
-
I was checking the Dockerfile for Talk container in Nextcloud AIO repository. In 7.0.0 it uses I believe the adoption of eTurnal and the default blacklist for all private network addresses is very likely the cause of the issues of Talk calls with Nextcloud behind the same firewall as the call participants, as others are reporting in #3350 I also added more information on my current setup (with Talk calls working) here: |
Beta Was this translation helpful? Give feedback.
-
This is now fixed with v7.4.0 Beta. Testing and feedback is welcome! See https://github.com/nextcloud/all-in-one#how-to-switch-the-channel |
Beta Was this translation helpful? Give feedback.
-
When i get home from work in about 5 hours i will test this on my local install and report back.
…-------- Original Message --------
On Feb 16, 2024, 9:33 AM, Oliver Roed Schøler wrote:
Hi ***@***.***(https://github.com/szaimen).
I am running v7.12.1 and is still facing this issue.
/conf # cat eturnal.yml
eturnal:
listen:
- ip: "::"
port: 3478
transport: udp
- ip: "::"
port: 3478
transport: tcp
log_dir: stdout
log_level: warning
secret: "verysecret"
relay_ipv4_addr: "172.20.0.2"
blacklist_peers:
- recommended
whitelist_peers:
- 127.0.0.1
- ::1
- "172.20.0.2"
I simply cannot use it locally, on 192.168.0.0/24. It seems everything is read-only or reset upon restart. Do you have any suggestions? Otherwise i might need a new discussion?
Thanks in advance.
—
Reply to this email directly, [view it on GitHub](#3395 (reply in thread)), or [unsubscribe](https://github.com/notifications/unsubscribe-auth/ADDTIG3MQ3GTXWM6GFLDTZTYT6J57AVCNFSM6AAAAAA5B2PWPKVHI2DSMVQWIX3LMV43SRDJONRXK43TNFXW4Q3PNVWWK3TUHM4DIOJVGM3DO).
You are receiving this because you commented.Message ID: ***@***.***>
|
Beta Was this translation helpful? Give feedback.
This is now fixed with v7.4.0 Beta. Testing and feedback is welcome! See https://github.com/nextcloud/all-in-one#how-to-switch-the-channel