JItsi COnference FOcus is a server side focus component used in Jitsi Meet conferences. Conference focus is mandatory component of Jitsi Meet conferencing system next to the videobridge. It is responsible for managing media sessions between each of the participants and the videobridge. Whenever new conference is about to start an IQ is sent to the component to allocate new focus instance. After that special focus participant joins Multi User Chat room. It will be creating Jingle session between Jitsi videobridge and the participant. Although the session in terms of XMPP is between focus user and participant the media will flow between participant and the videobridge. That's because focus user will allocate Colibri channels on the bridge and use them as its own Jingle transport.
OS | Architecture | Version |
---|---|---|
NetBSD 10.0 | aarch64 | jicofo-2.0.8252.tgz |
NetBSD 10.0 | aarch64 | jicofo-2.0.8252.tgz |
NetBSD 10.0 | earmv6hf | jicofo-2.0.8252.tgz |
NetBSD 10.0 | earmv6hf | jicofo-2.0.8252.tgz |
NetBSD 10.0 | earmv6hf | jicofo-2.0.8252.tgz |
NetBSD 10.0 | earmv7hf | jicofo-2.0.8252.tgz |
NetBSD 10.0 | earmv7hf | jicofo-2.0.8252.tgz |
NetBSD 10.0 | earmv7hf | jicofo-2.0.8252.tgz |
NetBSD 10.0 | i386 | jicofo-2.0.8252.tgz |
NetBSD 10.0 | i386 | jicofo-2.0.8252.tgz |
NetBSD 10.0 | x86_64 | jicofo-2.0.8252.tgz |
NetBSD 10.0 | x86_64 | jicofo-2.0.8252.tgz |
NetBSD 9.0 | i386 | jicofo-2.0.8252.tgz |
NetBSD 9.0 | i386 | jicofo-2.0.8252.tgz |
NetBSD 9.0 | x86_64 | jicofo-2.0.8252.tgz |
NetBSD 9.0 | x86_64 | jicofo-2.0.8252.tgz |
NetBSD 9.3 | x86_64 | jicofo-2.0.8252.tgz |
Binary packages can be installed with the high-level tool pkgin (which can be installed with pkg_add) or pkg_add(1) (installed by default). The NetBSD packages collection is also designed to permit easy installation from source.
The pkg_admin audit command locates any installed package which has been mentioned in security advisories as having vulnerabilities.
Please note the vulnerabilities database might not be fully accurate, and not every bug is exploitable with every configuration.
Problem reports, updates or suggestions for this package should be reported with send-pr.