diff --git a/daemon/rtpengine.pod b/daemon/rtpengine.pod index 809d24fa8..34a0feee6 100644 --- a/daemon/rtpengine.pod +++ b/daemon/rtpengine.pod @@ -925,6 +925,26 @@ guaranteed that only a single thread will ever read from a particular socket, thus maintaining the order of the packets. Might help when having issues with DTMF packets (RFC 2833). +=item B<--dtls-signature=>B|B + +Choose the hash algorithm to use for the signature used by the self-signed +certificate used for DTLS. The default is B. Not to be confused with +the hash algorithm used for the certificate fingerprint inserted into the SDP +(B), which is independent of the certificate's signature and +can be selected during runtime. + +=item B<--dtls-rsa-key-size=>I + +Size in bits of the RSA key used by the DTLS certificate, if RSA is in use. +Default is 2048 bits. + +=item B<--dtls-ciphers=>I + +Ciphers allowed during the DTLS key exchange (not to be confused with the +cipher used by the DTLS certificate). The format of this string is an OpenSSL +cipher list. The default is +B + =item B<--dtls-mtu> Set DTLS MTU to enable fragmenting of large DTLS packets. Defaults to 1200. diff --git a/etc/rtpengine.conf b/etc/rtpengine.conf index 9ad70b004..52914c8fb 100644 --- a/etc/rtpengine.conf +++ b/etc/rtpengine.conf @@ -85,7 +85,8 @@ recording-method = proc # log-srtp-keys = false # dtls-rsa-key-size = 2048 # dtls-mtu = 1200 -# dtls-signature = 256 +# dtls-signature = sha-256 +# dtls-ciphers = DEFAULT:!NULL:!aNULL:!SHA256:!SHA384:!aECDH:!AESGCM+AES256:!aPSK # graphite = 127.0.0.1:9006 # graphite-interval = 60