New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
update WebRTC #1282
Comments
What exactly is pointless? I am browsing behind the same public IP that about 3-5k users are. |
in a nutshell
here is a post from earlier: fxbrit said
|
Sure, there will always be edge cases, But IF you leak a private IP address, that will add to fingerprinting - but leaking your public IP is going to be far more damaging IMO - it depends on how unique your private IP is vs your public one. It's pointless in the context of being worried about leaking a private IP but not the public one - you've got your priorities back to front. Edit: I changed the draft it to "mostly pointless". My point is that if you're trying to be anonymous, you need to protect the IP. Another example is what I said about FPing - you're still returning an IP, even if it's a large VPN and you constantly hop, they can still be linked |
so it works like this:
|
shouldn't that be |
|
it isn't a very understandable description, but it could be passable for lack of a better one I guess. |
I suggest |
/* 2005: only generate relay (TURN) candidates for ICE
* [SETUP-HARDEN] Not all WebRTC services support this
* ^^ but you can set your own with
* media.peerconnection.use_document_iceservers=false media.peerconnection.default_iceservers=… AFAIK
* [1] https://wiki.mozilla.org/Media/WebRTC/Privacy ***/
// user_pref("media.peerconnection.ice.relay_only", true); // [FF42+] <- confirm |
Indeed, not all WebRTC services support this, but a lot of web conferencing services support this, e.g. Google Meet |
https://gitlab.com/librewolf-community/settings/-/issues/108 I'm proposing zero breakage and that |
it would fuck over win7 and 8.x users. |
would you really want to leave these users out of this protection for one pref flip tho? we also don't have a clear indication of how much breakage that causes in the real world, maybe it's only a zoom/meet thing. |
@fxbrit do we need to change the win7/8 info (see last PR edit) based on that comment .. and looking at sparkling glitter-gitter disco LW room -> is this what you're referring to ? https://searchfox.org/mozilla-central/source/dom/media/webrtc/transport/mdns_service/src/lib.rs#447 |
yes, that's the mDNS implementation in Firefox which covers the fact that older Win versions do not support mDNS natively. so we can remove the edit: forgot to mention that the above was confirmed on Mozilla's Matrix room so I 100% trust they are correct and my initial assumption was wrong. |
if I remove the |
^ just want to get the wording correct, suggest away |
it uses Firefox's own implementation of mDNS, so it's still correct. I would write:
so remove the win7/8 bit and the the other webrtc prefs descriptions still apply. |
fuck, I added desktop when it was already there ... this is what happens when you snort sugar |
with a lot of help from @fxbrit - this issue is to lay out the info for the changes for the commit to refer to
🔹 final patch
🔹 not in patch, just FYI
🔹 logic/reasons
All desktop users (ignoring win7/8) will NEVER leak their private IP unless they grant access: i.e it is a TRUSTED scenario, and even then it may not be used (test): it's not as if you are providing that info for all sites you visit - i.e not a tracking vector or stable FP metric. And none of this makes any sense unless your are protecting your public IP
The API itself will be inactive: with a setup harden for win7/8 users, who should test first: and obviously they wouldn't be WebRTC users if they want to kill the API - but again, it's rather (I say completely) pointless if they're not masking their public IP
That leaves how to harden the private IP when using a proxy. Of the three prefs, one is likely to cause breakage, so that can be inactive with a setup harden. Again, this is only ever going to be in a few trusted scenarios - users can test first and harden if they wish
The text was updated successfully, but these errors were encountered: