It would be good to have an explicit list of allowed relay targets similar to the allowed-peer-ip feature in coturn. Depending on the network environment where the turn server is located, this is sometimes easier to specify than specifying complex blacklist rules.
It would be good to have an explicit list of allowed relay targets similar to the
allowed-peer-ip
feature in coturn. Depending on the network environment where the turn server is located, this is sometimes easier to specify than specifying complex blacklist rules.https://www.rtcsec.com/post/2020/04/how-we-abused-slacks-turn-servers-to-gain-access-to-internal-services/