coturn
Remotely
Our great sponsors
coturn | Remotely | |
---|---|---|
25 | 42 | |
10,499 | 4,121 | |
2.4% | 3.0% | |
8.6 | 9.1 | |
1 day ago | 17 days ago | |
C | C# | |
GNU General Public License v3.0 or later | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
coturn
-
Golang WebRTC. How to use Pion 🌐Remote Controller
Both TURN and STUN can be self hosted, the most popular project i have found is coturn
-
How to setup and configure TURN server using coTURN?
# TURN server name and realm realm=DOMAIN server-name=turnserver # Use fingerprint in TURN message fingerprint # IPs the TURN server listens to listening-ip=0.0.0.0 # External IP-Address of the TURN server external-ip=IP_ADDRESS # Main listening port listening-port=3478 # Further ports that are open for communication min-port=10000 max-port=20000 # Log file path log-file=/var/log/turnserver.log # Enable verbose logging verbose # Specify the user for the TURN authentification user=turnuser:turn456 # Enable long-term credential mechanism lt-cred-mech # If running coturn version older than 4.5.2, uncomment these rules and ensure # that you have listening-ip set to ipv4 addresses only. # Prevent Loopback bypass https://github.com/coturn/coturn/security/advisories/GHSA-6g6j-r9rf-cm7p #denied-peer-ip=0.0.0.0-0.255.255.255 #denied-peer-ip=127.0.0.0-127.255.255.255 #denied-peer-ip=::1
-
How to deploy TURN server(coturn) inside Kubernetes
I am trying to deploy coturn server in the Kubernetes cluster.
-
SIM card at home
That is an excellent use case for a webrtc server rather than an usual voice communication. If you decide to go that way, you don't need any sim card. You just need an internet access. You install a webrtc client (the usual one is coturn). I don't know if you also need to set up some kind of chat server in addition.
-
Nextcloud-AIO Backup error
I've found this issue for you: https://github.com/coturn/coturn/issues/492
-
Matrix 2.0: How we’re making Matrix go voom
If you host yourself on a VPS you can hook in coturn (it's enabled by the linked playbook by default):
https://github.com/spantaleev/matrix-docker-ansible-deploy/b...
https://github.com/coturn/coturn
-
WebRTC for p2p voice calling app?
You're welcome! If this is for mission-critical or commercial use, you will want to invest in a good TURN server to ensure a reliable connection between peers. You can either self-host your own Coturn server or pay for a service like Twilio. But if this is just a hobby project, you can just use the free Open Relay Project.
-
[coTurn] Add TURN users into a database
schema.sql - coturn - GitHub
-
[Xubuntu22.04] Try coTurn for WebRTC 1
I tried http://turnserver.open-sys.org/ and cloning the GitHub repository, but I got the same results.
-
NetBird - Open Source P2P overlay network with WireGuard, WebRTC, SSO, blackjack, and Zero Trust
NetBird and Netmaker are similar in their capabilities and mesh offering, the same goes for Tailscale, but if we compare technical implementations, Netbird relies on the ICE and STUN protocols to discover the best path for p2p connectivity between peers. These are open WebRTC protocols with battle-tested software around them. Similarly, we use TURN for securely relaying traffic, when a p2p connection isn't possible (hard NAT). This protocol also comes from the WebRTC world and has stable and popular implementations like Coturn.
Remotely
-
Github actions build does not prompt for Server URL
Following the comments in this thread, I should see an input for Server URL when building the client application with GitHub actions, however it's not there. Yes I forked the official GitHub repo.
-
I m looking this app it's very complicated for me if anyone can learn or install in my system it would be great i don't want free work I will pay as you wish thanks
Are you sure? It seems to be thriving under new management.
-
What do other people do?
Site to site VPN if you have access to your locations' firewalls, otherwise some raspberry pis and https://github.com/immense/Remotely or any RMM.
-
Remote connect tool
I have another suggestion, have a look at Remotely. I only just looked into this and spun up a container to play around with. It's very similar to TeamViewer in that:
- Best selfhosted remote managment software
- What's your favourite Docker Image, and why?
-
Free alternative to Tactical RMM?
The closets open source alternative to Tactical RMM, I would say it's Immense Networks Remotely. It offers unattended remote access, as well as quicksupport feature like Teamviewer. It also has limited support for running scripts on one or many hosts which in effect allows doing some functions like that of Tactical RMM, however it doesn't give your same detailed device inventory as Tactical RMM, it doesn't monitor performance and you can't setup alarms as you can in TRMM. https://github.com/immense/Remotely
-
Most basic remote software
if you feel comfortable self hosting: https://github.com/immense/Remotely
- TeamViewer Alternative with Hosted Address Book of Clients
-
v2022.12.31.1910 Release
Edit: For anyone who wants to follow: https://github.com/immense/Remotely/issues/553
What are some alternatives?
peerjs - Simple peer-to-peer with WebRTC.
rustdesk - An open-source remote desktop, and alternative to TeamViewer.
stunner - A Kubernetes media gateway for WebRTC. Contact: [email protected]
MeshCentral - A complete web-based remote monitoring and management web site. Once setup you can install agents and perform remote desktop session to devices on the local network or over the Internet.
ice - A Go implementation of ICE
rustdesk-server - RustDesk Server Program
awesome-compose - Awesome Docker Compose samples
jitsi-meet-electron - Jitsi Meet desktop application powered by :electron:
netbird - Connect your devices into a single secure private WireGuard®-based mesh network with SSO/MFA and simple access controls.
tailscale - The easiest, most secure way to use WireGuard and 2FA.
turn - A pure Rust implementation of TURN
noVNC - VNC client web application