David, with loopback interface there may be hard-to-catch tricks. For example, a "peer A" in TURN communications is listening to address
0.0.0.0:12345 (all packets to port 12345 on all system addresses). Then, say, another peer B establishes a connection to the TURN server and through the TURN server sends a packet to the peer A on address
127.0.0.1:12345. Peer A accepts that packet and sends back the response through the socket bound to 0.0.0.0 interface. But the system may choose another local address, like, 10.1.2.3 as the source of the response packet from peer A to the TURN server. And the TURN server, because it has permissions established on 127.0.0.1 for peer A, will reject that packet, silently, as it has to do according to the specs.
I personally observed such a case. So I am just warning you that strange things are possible, locally. You can double-check that packets are getting sent/received on the right addresses.