From 2bb6782beea7b12940cc2b5d5d7fffb7955b4418 Mon Sep 17 00:00:00 2001 From: "Romain DEP." Date: Wed, 28 Mar 2018 23:17:43 +0200 Subject: [PATCH] config: move section about direct-tls for c2s just under regular c2s config (to ease parameters comparison) --- ejabberd.yml.example | 28 ++++++++++++++-------------- 1 file changed, 14 insertions(+), 14 deletions(-) diff --git a/ejabberd.yml.example b/ejabberd.yml.example index 738fa3017..fe146946c 100644 --- a/ejabberd.yml.example +++ b/ejabberd.yml.example @@ -169,6 +169,20 @@ listen: max_stanza_size: 65536 shaper: c2s_shaper access: c2s + ## + ## Direct-TLS for C2S (XEP-0368). A good practice is to forward + ## traffic from port 443 to this port, possibly multiplexing it + ## with HTTP using e.g. sslh [https://wiki.xmpp.org/web/Tech_pages/XEP-0368], + ## so modern clients can bypass restrictive firewalls (in airports, hotels, etc.). + ## + ## - + ## port: 5223 + ## ip: "::" + ## module: ejabberd_c2s + ## tls: true + ## max_stanza_size: 65536 + ## shaper: c2s_shaper + ## access: c2s - port: 5269 ip: "::" @@ -185,20 +199,6 @@ listen: web_admin: true ## register: true captcha: true - ## - ## Direct-TLS for C2S (XEP-0368). A good practice is to forward - ## traffic from port 443 to this port, possibly multiplexing it - ## with HTTP using e.g. sslh [https://wiki.xmpp.org/web/Tech_pages/XEP-0368], - ## so modern clients can bypass restrictive firewalls (in airports, hotels, etc.). - ## - ## - - ## port: 5223 - ## ip: "::" - ## module: ejabberd_c2s - ## tls: true - ## max_stanza_size: 65536 - ## shaper: c2s_shaper - ## access: c2s ## ## ejabberd_service: Interact with external components (transports, ...)