Browse Source

TT#172650 add missing options in docs and sample config

Change-Id: If49c3c9a78272b9b9cdf6e5bef888c0c855cf0ad
pull/1487/head
Richard Fuchs 4 years ago
parent
commit
25bf0036eb
2 changed files with 22 additions and 1 deletions
  1. +20
    -0
      daemon/rtpengine.pod
  2. +2
    -1
      etc/rtpengine.conf

+ 20
- 0
daemon/rtpengine.pod View File

@ -925,6 +925,26 @@ guaranteed that only a single thread will ever read from a particular socket,
thus maintaining the order of the packets. Might help when having issues with
DTMF packets (RFC 2833).
=item B<--dtls-signature=>B<SHA-256>|B<SHA-1>
Choose the hash algorithm to use for the signature used by the self-signed
certificate used for DTLS. The default is B<SHA-256>. Not to be confused with
the hash algorithm used for the certificate fingerprint inserted into the SDP
(B<a=fingerprint:>), which is independent of the certificate's signature and
can be selected during runtime.
=item B<--dtls-rsa-key-size=>I<INT>
Size in bits of the RSA key used by the DTLS certificate, if RSA is in use.
Default is 2048 bits.
=item B<--dtls-ciphers=>I<STRING>
Ciphers allowed during the DTLS key exchange (not to be confused with the
cipher used by the DTLS certificate). The format of this string is an OpenSSL
cipher list. The default is
B<DEFAULT:!NULL:!aNULL:!SHA256:!SHA384:!aECDH:!AESGCM+AES256:!aPSK>
=item B<--dtls-mtu>
Set DTLS MTU to enable fragmenting of large DTLS packets. Defaults to 1200.


+ 2
- 1
etc/rtpengine.conf View File

@ -85,7 +85,8 @@ recording-method = proc
# log-srtp-keys = false
# dtls-rsa-key-size = 2048
# dtls-mtu = 1200
# dtls-signature = 256
# dtls-signature = sha-256
# dtls-ciphers = DEFAULT:!NULL:!aNULL:!SHA256:!SHA384:!aECDH:!AESGCM+AES256:!aPSK
# graphite = 127.0.0.1:9006
# graphite-interval = 60


Loading…
Cancel
Save