-p, --listening-port <port> TURN listener port for UDP and TCP listeners (Default: 3478). Note: actually, TLS & DTLS sessions can connect to the "plain" TCP & UDP port(s), too - if allowed by configuration.
# TURN listener port for TLS (Default: 5349).
# Note: actually, "plain" TCP & UDP sessions can connect to the TLS & DTLS
# port(s), too - if allowed by configuration. The TURN server
# "automatically" recognizes the type of traffic. Actually, two listening
# endpoints (the "plain" one and the "tls" one) are equivalent in terms of
# functionality; but we keep both endpoints to satisfy the RFC 5766 specs.
# For secure TCP connections, we currently support SSL version 3 and
# TLS version 1.0, 1.1 and 1.2.
# For secure UDP connections, we support DTLS version 1.
#
#tls-listening-port=5349I do not think that there is a way to achieve that. Create an issue in
the project page. I believe that --no_tcp and --no_udp options must do
just that. If they do not work that way, then this is a bug and it
has to be fixed.
On Thu, Jan 7, 2016 at 8:17 AM, Julio Carlos Barrera Juez
<juliocarl...@i2cat.net> wrote:
>
> I have a successful deployment with coturn as STUN/TURN server. I want to
> force all client connections to use SSL/TLS sockets. I tried disabling plain
> socket with no-tcp and no-udp flags, but it only stops listening on port
> 3478. It continue accepting plain connection on port 5349, and I want only
> accepting SSL/TLS connections.
>
> How can I force coturn to listen/accept only SSL/TLS connections?
>
> --
> You received this message because you are subscribed to the Google Groups
> "TURN Server (Open-Source project)" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to
> To post to this group, send email to