mirror of
https://salsa.debian.org/pkg-voip-team/coturn.git
synced 2025-11-25 10:29:26 +01:00
coturn (4.5.2-1) unstable; urgency=high
.
* [49df393] New upstream release (4.5.2)
- fix null pointer dereference in case of out of memory.(by Thomas Moeller)
- merge PR #517 (by wolmi)
add prometheus metrics
- merge PR #637 (by David Florness)
Delete trailing whitespace in example configuration files
- merge PR #631 (by Debabrata Deka)
Add architecture ppc64le to travis build
- merge PR #627 (by Samuel)
Fix misleading option in doc (prometheus)
- merge PR #643 (by tupelo-schneck)
Allow RFC6062 TCP relay data to look like TLS
- merge PR #655 (by plinss)
Add support for proxy protocol V1
- merge PR #618 (by Paul Wayper)
Print full date and time in logs
Add new options:
"new-log-timestamp" and "new-log-timestamp-format"
- merge PR #599 (by Cédric Krier)
Do not use FIPS and remove hardcode OPENSSL_VERSION_NUMBER with LibreSSL
- update Docker mongoDB and fix with workaround the missing systemctl
- merge PR #660 (by Camden Narzt)
fix compilation on macOS Big Sur
- merge PR #546 #551 #672 (by jelmd)
Add support of --acme-redirect <URL>
fix acme security, redundancy, consistency
- Disable binding request logging to avoid DoS attacks.(Breaking change!)
Add new --log-binding option to enable binding request logging
- Fix stale-nonce documentation. Resolves #604
- Version numbering is changed to semver 2.0
- Merge PR #288 (by Hristo Venev)
pkg-config, and various cleanups in configure file
- Add systemd notification for better systemd integration
- Fix Issue #621 (by ycaibb)
Null pointer dereference on tcp_client_input_handler_rfc6062data function
- Fix Issue #600 (by ycaibb)
use-after-free vulnerability on write_to_peerchannel function
- Fix Issue #601 (by ycaibb)
use-after-free vulnerability on write_client_connection function
- Little refactoring prometheus
Fix c++ support
Simplify (as agreed in Issue #666)
Remove session id/allocation labels
Remove per session metrics. We should later add more counters.
- Fix CVE-2020-26262 (credits: Enable-Security)
Fix ipv6 ::1 loopback check
Not allow allocate peer address 0.0.0.0/8 and ::/128
For more details see the github security advisory:
https://github.com/coturn/coturn/security/advisories/GHSA-6g6j-r9rf-cm7p
* [f0c1753] Change coturn service type to systemd notify (Closes: #934513)
* [f9b9547] Add libsystemd-dev to build dependency
* [5a811b1] Update watch version to 4
* [c0a645e] Update Debian Standards to 4.5.1
* [e429100] Patch not-needed to forwarded to upstream
* [bc56267] Add pkg-config to build dependency
* [bd98206] Postrm remove dir /var/lib/turn
* [8c58afe] Change sqlite db permissions.
Change owner to turnserver:turnserver and mode 660 (Closes: #930097)
* [b9a4a8b] Change config file permissions.
Change owner to root:turnserver and mode 640 (Closes: #954379)
* [3e85092] init.d script drop root privileges (Closes: 904415)
* [24eb87a] Add info about binding privileged ports (Closes: #964009)
* [136a8a2] Disable pid file creation
16 lines
350 B
Desktop File
16 lines
350 B
Desktop File
[Unit]
|
|
Description=coTURN STUN/TURN Server
|
|
Documentation=man:coturn(1) man:turnadmin(1) man:turnserver(1)
|
|
After=network.target
|
|
|
|
[Service]
|
|
User=turnserver
|
|
Group=turnserver
|
|
Type=notify
|
|
ExecStart=/usr/bin/turnserver -c /etc/turnserver.conf --pidfile=
|
|
Restart=on-failure
|
|
InaccessibleDirectories=/home
|
|
PrivateTmp=yes
|
|
|
|
[Install]
|
|
WantedBy=multi-user.target
|