83 lines
3.3 KiB
Plaintext
83 lines
3.3 KiB
Plaintext
##--------------------------------------------------------------------
|
||
## CoAP Gateway
|
||
##--------------------------------------------------------------------
|
||
|
||
## The IP and UDP port that CoAP bind with.
|
||
##
|
||
## Default: 0.0.0.0:5683
|
||
##
|
||
## Examples:
|
||
## coap.bind.udp.x = 0.0.0.0:5683 | :::5683 | 127.0.0.1:5683 | ::1:5683
|
||
##
|
||
coap.bind.udp.1 = 0.0.0.0:5683
|
||
##coap.bind.udp.2 = 0.0.0.0:6683
|
||
|
||
## Whether to enable statistics for CoAP clients.
|
||
##
|
||
## Value: on | off
|
||
coap.enable_stats = off
|
||
|
||
|
||
##------------------------------------------------------------------------------
|
||
## DTLS options
|
||
|
||
## The DTLS port that CoAP is listening on.
|
||
##
|
||
## Default: 0.0.0.0:5684
|
||
##
|
||
## Examples:
|
||
## coap.bind.dtls.x = 0.0.0.0:5684 | :::5684 | 127.0.0.1:5684 | ::1:5684
|
||
##
|
||
coap.bind.dtls.1 = 0.0.0.0:5684
|
||
##coap.bind.dtls.2 = 0.0.0.0:6684
|
||
|
||
## A server only does x509-path validation in mode verify_peer,
|
||
## as it then sends a certificate request to the client (this
|
||
## message is not sent if the verify option is verify_none).
|
||
## You can then also want to specify option fail_if_no_peer_cert.
|
||
## More information at: http://erlang.org/doc/man/ssl.html
|
||
##
|
||
## Value: verify_peer | verify_none
|
||
## coap.dtls.verify = verify_peer
|
||
|
||
## Private key file for DTLS
|
||
##
|
||
## Value: File
|
||
coap.dtls.keyfile = {{ platform_etc_dir }}/certs/key.pem
|
||
|
||
## Server certificate for DTLS.
|
||
##
|
||
## Value: File
|
||
coap.dtls.certfile = {{ platform_etc_dir }}/certs/cert.pem
|
||
|
||
## PEM-encoded CA certificates for DTLS
|
||
##
|
||
## Value: File
|
||
## coap.dtls.cacertfile = {{ platform_etc_dir }}/certs/cacert.pem
|
||
|
||
## Used together with {verify, verify_peer} by an SSL server. If set to true,
|
||
## the server fails if the client does not have a certificate to send, that is,
|
||
## sends an empty certificate.
|
||
##
|
||
## Value: true | false
|
||
## coap.dtls.fail_if_no_peer_cert = false
|
||
|
||
## This is the single most important configuration option of an Erlang SSL
|
||
## application. Ciphers (and their ordering) define the way the client and
|
||
## server encrypt information over the wire, from the initial Diffie-Helman
|
||
## key exchange, the session key encryption ## algorithm and the message
|
||
## digest algorithm. Selecting a good cipher suite is critical for the
|
||
## application’s data security, confidentiality and performance.
|
||
##
|
||
## The cipher list above offers:
|
||
##
|
||
## A good balance between compatibility with older browsers.
|
||
## It can get stricter for Machine-To-Machine scenarios.
|
||
## Perfect Forward Secrecy.
|
||
## No old/insecure encryption and HMAC algorithms
|
||
##
|
||
## Most of it was copied from Mozilla’s Server Side TLS article
|
||
##
|
||
## Value: Ciphers
|
||
coap.dtls.ciphers = ECDHE-ECDSA-AES256-GCM-SHA384,ECDHE-RSA-AES256-GCM-SHA384,ECDHE-ECDSA-AES256-SHA384,ECDHE-RSA-AES256-SHA384,ECDHE-ECDSA-DES-CBC3-SHA,ECDH-ECDSA-AES256-GCM-SHA384,ECDH-RSA-AES256-GCM-SHA384,ECDH-ECDSA-AES256-SHA384,ECDH-RSA-AES256-SHA384,DHE-DSS-AES256-GCM-SHA384,DHE-DSS-AES256-SHA256,AES256-GCM-SHA384,AES256-SHA256,ECDHE-ECDSA-AES128-GCM-SHA256,ECDHE-RSA-AES128-GCM-SHA256,ECDHE-ECDSA-AES128-SHA256,ECDHE-RSA-AES128-SHA256,ECDH-ECDSA-AES128-GCM-SHA256,ECDH-RSA-AES128-GCM-SHA256,ECDH-ECDSA-AES128-SHA256,ECDH-RSA-AES128-SHA256,DHE-DSS-AES128-GCM-SHA256,DHE-DSS-AES128-SHA256,AES128-GCM-SHA256,AES128-SHA256,ECDHE-ECDSA-AES256-SHA,ECDHE-RSA-AES256-SHA,DHE-DSS-AES256-SHA,ECDH-ECDSA-AES256-SHA,ECDH-RSA-AES256-SHA,AES256-SHA,ECDHE-ECDSA-AES128-SHA,ECDHE-RSA-AES128-SHA,DHE-DSS-AES128-SHA,ECDH-ECDSA-AES128-SHA,ECDH-RSA-AES128-SHA,AES128-SHA
|