diff --git a/configuration/services/conduit/default.nix b/configuration/services/conduit/default.nix
index a9987ed..4ba5271 100644
--- a/configuration/services/conduit/default.nix
+++ b/configuration/services/conduit/default.nix
@@ -34,22 +34,22 @@ in
           server = "${domain}:443";
         };
 
-        # turn_uris =
-        #   let
-        #     address = "${config.services.coturn.realm}:${toString config.services.coturn.listening-port}";
-        #     tls-address = "${config.services.coturn.realm}:${toString config.services.coturn.tls-listening-port}";
-        #   in
-        #   [
-        #     "turn:${address}?transport=udp"
-        #     "turn:${address}?transport=tcp"
-        #     "turns:${tls-address}?transport=udp"
-        #     "turns:${tls-address}?transport=tcp"
-        #   ];
+        turn_uris =
+          let
+            address = "${config.services.coturn.realm}:${toString config.services.coturn.listening-port}";
+            tls-address = "${config.services.coturn.realm}:${toString config.services.coturn.tls-listening-port}";
+          in
+          [
+            "turn:${address}?transport=udp"
+            "turn:${address}?transport=tcp"
+            "turns:${tls-address}?transport=udp"
+            "turns:${tls-address}?transport=tcp"
+          ];
       };
     };
 
     coturn = {
-      enable = false;
+      enable = true;
       no-cli = true;
       use-auth-secret = true;
       static-auth-secret-file = config.sops.secrets."turn/secret".path;
@@ -173,7 +173,7 @@ in
     # upstream module currently.
     #
     # See also https://gitlab.com/famedly/conduit/-/issues/314
-    # EnvironmentFile = config.sops.secrets."turn/env".path;
+    EnvironmentFile = config.sops.secrets."turn/env".path;
   };
 
   systemd.services.coturn.serviceConfig.SupplementaryGroups = [
diff --git a/configuration/sops.nix b/configuration/sops.nix
index bc59df8..0337438 100644
--- a/configuration/sops.nix
+++ b/configuration/sops.nix
@@ -67,16 +67,16 @@
       "steam/tlater" = { };
 
       # Turn
-      # "turn/env" = { };
-      # "turn/secret" = {
-      #   owner = "turnserver";
-      # };
-      # "turn/ssl-key" = {
-      #   owner = "turnserver";
-      # };
-      # "turn/ssl-cert" = {
-      #   owner = "turnserver";
-      # };
+      "turn/env" = { };
+      "turn/secret" = {
+        owner = "turnserver";
+      };
+      "turn/ssl-key" = {
+        owner = "turnserver";
+      };
+      "turn/ssl-cert" = {
+        owner = "turnserver";
+      };
 
       # Wireguard
       "wireguard/server-key" = {