Summary: | A server-reflexive candidate is discarded when the host IPv4 address is public and obfuscated | ||||||
---|---|---|---|---|---|---|---|
Product: | WebKit | Reporter: | Kyutae Lee <gorisanson> | ||||
Component: | WebRTC | Assignee: | youenn fablet <youennf> | ||||
Status: | RESOLVED FIXED | ||||||
Severity: | Normal | CC: | webkit-bug-importer, youennf | ||||
Priority: | P2 | Keywords: | InRadar | ||||
Version: | Safari 15 | ||||||
Hardware: | Mac (Intel) | ||||||
OS: | macOS 12 | ||||||
Attachments: |
|
Description
Kyutae Lee
2021-11-21 22:28:54 PST
I want to clarify that, when I said "the host address is obfuscated", I mean host candidate IP address obfuscation by using mDNS. And, for your information, here's a link to the related question in Stack Overflow which I posted: https://stackoverflow.com/q/61629450/8581025 And it seems that Chromium and Firefox have the same bug now. For your information, the links of the bug reports are at the following. Chromium: https://bugs.chromium.org/p/webrtc/issues/detail?id=13426 FireFox: https://bugzilla.mozilla.org/show_bug.cgi?id=1742337 This bug is fixed by a patch in upstream (it's my contribution!): https://webrtc.googlesource.com/src/+/7eea6672285f765599fd883a5737f5cae8d20917 And the patch begins to be applied on Chromium with version 110.0.5452.0 (https://chromium.googlesource.com/chromium/src.git/+/refs/tags/110.0.5452.0%5E%21/). Pull request: https://github.com/WebKit/WebKit/pull/7203 Oh, I didn't know that a patch, onto a third party package, like this can be pull-requested to the public Webkit repository. Thank you! Committed 257481@main (8d4875ea0114): <https://commits.webkit.org/257481@main> Reviewed commits have been landed. Closing PR #7203 and removing active labels. |