WebRtcHideLocalIpsWithMdns remove from Chrome://flags

瀏覽次數:800 次
跳到第一則未讀訊息

Shachar

未讀,
2021年7月4日 中午12:15:382021/7/4
收件者:discuss-webrtc
In M91 the "WebRtcHideLocalIpsWithMdns" flag was remove from chrome://flags.
We have some deployment relying on disabling the feature via the CLI arguments:
"--disable-features=WebRtcHideLocalIpsWithMdns"

The cli argument still seem to function - is the intention to keep it or remove that as well ?

Thanks in advance

Harald Alvestrand

未讀,
2021年7月4日 下午3:26:202021/7/4
收件者:discuss...@googlegroups.com
Can you give some more info on your use case? We have been discussing how to deal with scenarios where mdns is problematic in the past, but none of the scenarios have been compelling enough to consider this an urgent matter.

--

---
You received this message because you are subscribed to the Google Groups "discuss-webrtc" group.
To unsubscribe from this group and stop receiving emails from it, send an email to discuss-webrt...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/discuss-webrtc/02a0130d-be45-4ee6-a2b3-f16abaa5dfaan%40googlegroups.com.

Roman Shpount

未讀,
2021年7月4日 晚上11:47:052021/7/4
收件者:discuss-webrtc
A peer-to-peer delivery network, which is designed to work inside the corporate environments would be one such use case.

Harald Alvestrand

未讀,
2021年7月5日 凌晨12:47:112021/7/5
收件者:discuss...@googlegroups.com
The obvious use case is a peer to peer application in a routed network without an external uplink and without MDNS bridging (think Burning Man). In that case, mdns would be really unhelpful.
For the corporate case where there's enough capacity to the NAT unit, hairpinning STUN-derived addresses at the NAT may be workable.

But: I was specifically asking for Shachar's use case, because there's usually more things under the sun than what we've already discussed.


Roman Shpount

未讀,
2021年7月5日 中午12:15:272021/7/5
收件者:discuss-webrtc
Shachar is working for Peer5. They are using datachannel peer-to-peer connections to stream large video events to corporate customers. During these events, they typically set the WebRtcHideLocalIpsWithMdns flag using enterprise policy to disable mDNS. The main reason is to minimize delays and reduce the load on the corporate routers. I think they described their use case in great detail when MDNS was originally proposed.

Shachar

未讀,
2021年7月6日 清晨5:46:082021/7/6
收件者:discuss-webrtc
Right,
The idea is to use this CLI flag in the enterprise use-case in order to remove the mDNS obfuscation and expose the IP. This way the peers can connect via host in a segmented network. 
p.s: hairpinning usually isn't supported.

Shachar

未讀,
2021年7月8日 凌晨4:54:062021/7/8
收件者:discuss-webrtc
btw, we're also using it in tests

Harald Alvestrand

未讀,
2021年7月8日 清晨5:37:022021/7/8
收件者:discuss...@googlegroups.com、Guido Urdaneta
Guido, do you know if removing this from chrome://flags was deliberate?
Shachar, can you file a bug in crbug.com indicating a desire to have it back?


Shachar

未讀,
2021年7月11日 凌晨2:11:592021/7/11
收件者:discuss-webrtc

Philipp Hancke

未讀,
2021年7月13日 凌晨4:47:132021/7/13
收件者:discuss...@googlegroups.com
flags expire. I've just merged an extension until M100 to M92.

訊息已遭刪除

Shachar

未讀,
2022年7月8日 凌晨12:18:052022/7/8
收件者:discuss-webrtc
Hi,

We've passed M100, the flag is still used in tests.
Can we extend it further or unexpire it ?

Harald Alvestrand

未讀,
2022年7月8日 上午8:26:362022/7/8
收件者:discuss...@googlegroups.com
Fippo and I have extended it to 120.


回覆所有人
回覆作者
轉寄
0 則新訊息