Difference between revisions of "Educaship Jitsi"
(→Product specification) |
|||
Line 15: | Line 15: | ||
===Security=== | ===Security=== | ||
: For security, we use [[Fail2ban]] because it operates by monitoring log files (e.g. /var/log/auth.log, /var/log/apache/access.log, etc.) for selected entries and running scripts based on them. Most commonly this is used to block selected IP addresses that may belong to hosts that are trying to breach the system's security. It can ban any host IP address that makes too many login attempts or performs any other unwanted action within a time frame defined by the administrator. Includes support for both IPv4 and IPv6. | : For security, we use [[Fail2ban]] because it operates by monitoring log files (e.g. /var/log/auth.log, /var/log/apache/access.log, etc.) for selected entries and running scripts based on them. Most commonly this is used to block selected IP addresses that may belong to hosts that are trying to breach the system's security. It can ban any host IP address that makes too many login attempts or performs any other unwanted action within a time frame defined by the administrator. Includes support for both IPv4 and IPv6. | ||
+ | :Calls use the P2P mode, which is end-to-end encrypted via DTLS-SRTP between the two participants for encrypted communication (secure communication). Group calls also use DTLS-SRTP encryption, but rely on the Jitsi Videobridge (JVB) as video router, where packets are decrypted temporarily. All data is transmitted only through our server, and comprehensive TLS encryption provides protection against interception and unauthorized eavesdropping. | ||
====Malware protection==== | ====Malware protection==== |
Revision as of 18:36, 21 February 2023
CNM Jitsi (hereinafter, the Soft) is a CNM stable app built with Jitsi. At this moment, it is unclear where and how this app will be finally installed since its HA and storage solutions haven't been designed yet.
Development of the Soft occurs under the Jitsi for CNM Cloud project.
Contents
Product specification
- The Product specifications are:
Database system
- It deploys non-MariaDB as its database management system.
Software instances
- The software instance that powers core, hands-on training, and experiential systems and applications is Jitsi. Jitsi is a free and open-source multiplatform voice (VoIP), video conferencing and instant messaging application for the web platform used primarily for video conferencing. In addition to audio and video, screen sharing is available, and new members can be invited via a generated link. These functions are also available on CNM Jitsi. The CNM Jitsi interface is accessible via only a web browser and is similar to Jitsi meet.
- CNM Jitsi has LDAP authentication and is hosted on a Proxmox cluster that ensures its high stability.
Security
- For security, we use Fail2ban because it operates by monitoring log files (e.g. /var/log/auth.log, /var/log/apache/access.log, etc.) for selected entries and running scripts based on them. Most commonly this is used to block selected IP addresses that may belong to hosts that are trying to breach the system's security. It can ban any host IP address that makes too many login attempts or performs any other unwanted action within a time frame defined by the administrator. Includes support for both IPv4 and IPv6.
- Calls use the P2P mode, which is end-to-end encrypted via DTLS-SRTP between the two participants for encrypted communication (secure communication). Group calls also use DTLS-SRTP encryption, but rely on the Jitsi Videobridge (JVB) as video router, where packets are decrypted temporarily. All data is transmitted only through our server, and comprehensive TLS encryption provides protection against interception and unauthorized eavesdropping.
Malware protection
- Previously, CNM Cloud developers struggled with the viruses, so an effective anti-virus strategy must be found -- what was the solution?
Standard Operation Procedures
- How to install & Configure Jitsi: https://drive.google.com/file/d/14ynvD3wqliwynQr7TrBf6B-slxqmsDnn/view?usp=sharing
Hands-on assignments
- Hands-on assignments that CNM learners can use to get accustomed to the software while using its hands-on training systems and applications.
Presentations
- Presentations that present the software to its new users in multimedia, video, just audio, and/or just graphic formats.
User group
- CNM Social user group has not yet been created; the group may organize software-related events and produce newsletters.
Related lectios
- Lectios that provide CNM learners with knowledge about the deployed software.