Without Janus everything seems to work. Does the Janus server need to be reachable directly from the Internet? Our Docker containers are all placed behind a traefik reverse proxy and can communicate over a docker network.
I was also playing with the high performance backend and made my own containers of nats and signaling and placed them behind a traefik proxy. However, I would like to have a complete understanding, which ports of which services need to be available to the public and how the communication flow between services is.
Can anyone provide an example network map or flowchart for the high performance backend?
I finally got it running. The WebSockets port of the Janus server just needs to be reachable by the signaling server, but you have to expose some UDP ports (adjust the configuration in janus.jcfg to the same port range) to the internet.
As weāre using Docker Swarm with Portainer and Traefik as a reverse proxy, I donāt know how much I could help you with my docker-compose stack.
But basically I built the Docker images with the Dockerfiles from gary-kimās Github repository. By now, I have switched to some other images (see: https://github.com/lnobach/nctalk-backend-cloud-config). We already had a coturn server running, so i re-used it.
Got it, thanks. It is still unclear to me, based on the description from lnobachās site if that means there is a MITM vulnerability or not? I cannot tell, but am interested. Docker has vulnerabilities, and Docker + MITM combined would be excessive IMO, but if it is not an actual MITM threat then I am simply being too cautious
Hereās the description of the parameter from the janus.jcfg.example file regarding self-signed DTLS certificates:
Notice that self-signed certificates are fine for the purpose of WebRTC DTLS connectivity, for the time being, at least until Identity Providers are standardized and implemented in browsers. If for some reason you want to enforce the DTLS stack in Janus to enforce valid certificates from peers, though, you can do that setting ādtls_accept_selfsignedā to āfalseā below: DO NOT TOUCH THAT IF YOU DO NOT KNOW WHAT YOUāRE DOING!
Following the above link, DTLS-MITM-attacks can easily be successful, if the signaling server is not secured well. So as I understand, the problem is not using DTLS with self-signed certificates itself. Itās only a problem, if someone manages to compromise your signaling server.