Hi Jeffrey,
As you can see the incoming packets in the tshark or wireshark, your EC2's firewall rule should be ok.
To response STUN binding request, co-turn server needs no configuration at all. Just need to ensure that server is running on desired port.
`netstat -nap | grep 3478` command will show co-turn's process name if it is already listening on that port.
If you find that con-turn is listening on desired port then the issue may be related to local firewall settings.
`iptables -F` will clear firewall rules then you can test again.
It is good to test using some test client ( like test client provided with co-turn or libnice ) running on the same instance first then using trickle ICE
If first works but not the second then the issue is related to firewall settings of EC2.
If all these don't work then you may be running the corrupt or wrong binary. ( probability is very low. ) Try to install from latest stable source code on latest OS.
Thanks,
Shakeeb