[tor-bugs] #5578 [Flashproxy]: Investigate WebRTC for flash proxy NAT punching
    Tor Bug Tracker & Wiki 
    blackhole at torproject.org
       
    Fri Jan 25 20:30:29 UTC 2013
    
    
  
#5578: Investigate WebRTC for flash proxy NAT punching
------------------------+---------------------------------------------------
 Reporter:  dcf         |          Owner:  dcf
     Type:  task        |         Status:  new
 Priority:  minor       |      Milestone:     
Component:  Flashproxy  |        Version:     
 Keywords:              |         Parent:     
   Points:              |   Actualpoints:     
------------------------+---------------------------------------------------
Comment(by dcf):
 We will probably have to add some metadata to client registrations to
 indicate what kind of connections the client supports. Registrations
 currently look like this:
 {{{
 client=1.2.3.4:9000
 }}}
 We can augment them so:
 {{{
 client=1.2.3.4:9000&transports=websocket,webrtc
 }}}
 Maybe that doesn't make sense, as `webrtc` needs its own port number, or
 something. Perhaps something like
 {{{
 client-1.2.3.4:9000&client-webrtc=1.2.3.4:10000
 }}}
 Where `client` is implictly `client-websocket`.
 Flash proxies would also advise the facilitator of the types of connection
 they can serve. So a Chrome browser arrives supporting `websocket` and
 `webrtc`, and the facilitator is free to give it a client that supports
 either of those two.
 Having a `raw` transport separate from `websocket` would also be nice for
 #6284+#7721 (plain sockets in Chrome addons, browser addon) and #7944
 (standalone flash proxy). When we're not limited by a browser, then we
 shouldn't have to pay the WebSocket overhead.
-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5578#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
    
    
More information about the tor-bugs
mailing list