136 private links
That’s fundamentally all that the STUN protocol is: your machine sends a “what’s my endpoint from your point of view?” request to a STUN server, and the server replies with “here’s the ip:port that I saw your UDP packet coming from.”
For example, we’ve observed that the UC Berkeley guest WiFi blocks all outbound UDP except for DNS traffic. No amount of clever NAT tricks is going to get around the firewall eating your packets. So, we need some kind of reliable fallback no matter what.
You could implement relays in a variety of ways. The classic way is a protocol called TURN (Traversal Using Relays around NAT). We’ll skip the protocol details, but the idea is that you authenticate yourself to a TURN server on the internet, and it tells you “okay, I’ve allocated ip:port, and will relay packets for you.” You tell your peer the TURN ip:port, and we’re back to a completely trivial client/server communication scenario.
Interactive Connectivity Establishment (ICE) protocol. Like STUN and TURN, ICE has its roots in the telephony world, and so the RFC is full of SIP and SDP and signalling sessions and dialing and so forth. However, if you push past that, it also specifies a stunningly elegant algorithm for figuring out the best way to get a connection.
Ready? The algorithm is: try everything at once, and pick the best thing that works. That’s it. Isn’t that amazing?
Let’s look at this algorithm in a bit more detail. We’re going to deviate from the ICE spec here and there, so if you’re trying to implement an interoperable ICE client, you should go read RFC 8445 and implement that.
workadventure: A collaborative web application (virtual office) presented as a 16-bit RPG video game
Work Adventure is a web-based collaborative workspace for small to medium teams (2-100 people) presented in the form of a 16-bit video game.
In Work Adventure, you can move around your office and talk to your colleagues (using a video-chat feature that is triggered when you move next to a colleague).
The TURN Server is a VoIP media traffic NAT traversal server and gateway. It can be used as a general-purpose network traffic TURN server and gateway, too.
On-line management interface (over telnet or over HTTPS) for the TURN server is available.
The implementation also includes some extra experimental features.
Jitsi Meet: Server-Einstellungen für einen datenschutzfreundlichen Betrieb ⋆ Kuketz IT-Security Blog
Das STUN-Protokoll erkennt Clients, die sich bspw. hinter einem Router oder einer Firewall befinden und eine NAT-Adresse haben. Mit Hilfe des STUN-Servers können NAT-Clients ihre öffentliche IP-Adresse erfahren und sind anschließend in der Lage eine direkte Kommunikationsverbindung zwischen (zwei) Teilnehmern herzustellen. Um die Übermittlung der IP-Adresse an externe Anbieter zu vermeiden, könnt ihr einen eigenen STUN- / TURN-Server betreiben. Alternativ könnt ihr natürlich auch einfach bestehende STUN-Server wählen, die öffentlich zur Verfügung gestellt werden.
Jitsi is a set of Open Source projects that allows you to easily build and deploy secure videoconferencing solutions.
Jitsi Meet is a fully encrypted, 100% Open Source videoconferencing solution that you can use all day, every day, for free — with no account needed.
This repository contains the necessary tools to run a Jitsi Meet stack on Docker using Docker Compose.
Implementing Connections at a customer site, the databases were getting created in /home/db2inst1 instead of the dedicated filesystem set aside for it. This is how to change the default database directory for an instance.
The versionInfo tool displays important data about the product and its installed fix packs and interim fixes, such as the build version and build date. This tool is particularly useful when working with support personnel to determine the cause of any problem.
Want to try #IBM #Sametime 9 incl Audio & Vid? Incl Rich client, Browser & Mobile clients! Just use Greenhouse http://t.co/mDMl3g4SqS
Photos from the #Sametime / Unified Telephony workshop today ONLINE: http://t.co/xtlI00WqPd @IBM @UnifyCo @PolycomEurope @leyrer
The New #IBM #Sametime: Sametime 9 https://t.co/KuyLMLQxrU #sametime9 #ibmbcat #fb
Open Mic Webcast: Taking the Plunge into LDAP with #IBM #Sametime http://t.co/zfzTaRS52S #fb
Fix Central provides fixes and updates for your system's software, hardware, and operating system.
Another day at work – the social business way http://t.co/Kys1Q9cl #ibm #notes #connections #sametime #ibmconnected #fb
This tutorial explains how to set up and use IBM Global Security Kit (GSKit) for typical certificate management tasks such as self-signed certificate generation, creation of a Certificate Authority (CA), requesting a certificate from a third-party CA, and installing certificates for use in SSL protocols.
#IBM releases #Sametime 8.5.2.5 for Apple iOS http://t.co/n5aBRFNK #uccoms
#IBM #Sametime 8.5.2 IFR1: Updated security certificate for iOS Push Notifications http://t.co/0Sw4Iy1X #ibmconnected #fb
Best practices for using SSO with IBM #Sametime 8.5.x Community Server white paper http://t.co/iRVXCXW5
IBM Sametime Meetings Statistics Utility Technology Preview http://t.co/5eNziPby #ibm #sametime #socialbusiness #fb
RT @PacktEnterprise: Published! #IBM #Sametime 8.5.2 Administration Guide http://t.co/lTXMqf5 @gabturtle @duffbert @marie_scott