[tor-bugs] #28942 [Circumvention/Snowflake]: Evaluate pion WebRTC
Tor Bug Tracker & Wiki
blackhole at torproject.org
Thu Jul 4 20:01:08 UTC 2019
#28942: Evaluate pion WebRTC
-------------------------------------+-------------------------------
Reporter: backkem | Owner: cohosh
Type: enhancement | Status: accepted
Priority: Medium | Milestone:
Component: Circumvention/Snowflake | Version:
Severity: Normal | Resolution:
Keywords: ex-sponsor-19 | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor: Sponsor28-can
-------------------------------------+-------------------------------
Comment (by backkem):
I wanted to quickly reiterate that this is one of the reasons for
existence of our (Pion WebRTC) detach API. It provides you with an
io.ReadWriter. With this pattern the upper layer protocol (your protocol)
can supply the buffer for reading/writing. This means, since you likely
know what the appropriate buffer size is for your use-case, you can
allocate it accordingly. There is actually a [https://github.com/w3c
/webrtc-pc/issues/1732 long running issue] to expose this in the WebRTC
API. More modern web APIs are modeled in a similar way, E.g.:
[https://wicg.github.io/web-transport/#incoming-stream* incoming-stream] &
[https://wicg.github.io/web-transport/#outgoing-stream* outgoing-stream].
To ensure compatibility with other WebRTC implementations it is of-course
still recommended to respect the buffer-size limits mentioned in Lennart's
blog post.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/28942#comment:32>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list