#14: WebRTC
Discussions
Comment by @mnot Sep 30, 2014 (See Github)
Discussed at London F2F; serious doubts about viability based upon testing at TAG F2F.
😠
@torgo to chase up current status of WebRTC, ORTC with Adrian.
Comment by @mnot Jan 8, 2015 (See Github)
Discussed in NYC; Dan still coordinating.
Comment by @torgo Apr 23, 2015 (See Github)
Discussed at April 2015 f2f - mostly considering rechartering - Dan to report back at next telco
Comment by @mnot Apr 23, 2015 (See Github)
Discussed in SF; still didn't work talking to Fluffy.
Hmm.
Had general discussion of re-charter. @torgo to report back.
Comment by @timbl Jul 16, 2015 (See Github)
This issue is a bit vague -- what about WebRTC? Charter? Technology? Privacy?
Comment by @travisleithead Jul 16, 2015 (See Github)
Related WebRTC issue. https://github.com/w3c/webrtc-pc/issues/179
Comment by @torgo Jul 16, 2015 (See Github)
Current topics of discussion at Berlin F2F are: WebRTC rechartering and privacy issues.
Comment by @chaals Jul 16, 2015 (See Github)
Proposed charter: http://www.w3.org/2015/06/webrtc-charter.html
Comment by @torgo Jul 16, 2015 (See Github)
As discussed at the Berlin f2f: if parties (e.g. ad networks) are using WebRTC technology to aid fingerprinting and not in service of actual services delivered over WebRTC then maybe this is an indication that an additional permission step should be required.
Comment by @torgo Jul 16, 2015 (See Github)
One threat model discussed: in the use of e.g. Tor browser or VPNs by activists who may want to conceal their source IP, WebRTC may enable attackers to determine those IP addresses.
Comment by @diracdeltas Jul 16, 2015 (See Github)
Comment by @diracdeltas Jul 16, 2015 (See Github)
Tor disables webrtc at FF compilation time currently but are thinking of re-enabling it with IP address hiding: https://trac.torproject.org/projects/tor/ticket/16221 (really interesting idea to use hidden services for ICE!)
Comment by @torgo Jul 16, 2015 (See Github)
Agreed today: Mark will report back on the privacy issue. We have no substantive feedback on the rechartering.
Comment by @torgo Sep 16, 2015 (See Github)
Picked up at Boston f2f: https://pad.w3ctag.org/p/09-16-2015-minutes
Comment by @torgo Sep 16, 2015 (See Github)
Comment by @torgo Sep 16, 2015 (See Github)
Comment by @torgo Sep 16, 2015 (See Github)
Comment by @torgo Sep 16, 2015 (See Github)
@mnot to provide a summary on the next call.
Comment by @plinss Sep 23, 2015 (See Github)
Discussed 2015-09-23 telcon follow up at TPAC
Comment by @triblondon Jan 12, 2016 (See Github)
Demo of local IP address discovery: https://diafygi.github.io/webrtc-ips/
Comment by @triblondon Jan 12, 2016 (See Github)
Potential positive use cases include stuff like https://www.sharedrop.io/
Comment by @torgo Jan 12, 2016 (See Github)
Discussed at Melbourne f2f: https://github.com/w3ctag/meetings/blob/gh-pages/2016/01-mel/agenda.md
Comment by @mnot Jan 12, 2016 (See Github)
Will continue to revisit this issue and get updates from WebRTC to assess potential privacy impact.
Comment by @mnot Jan 31, 2016 (See Github)
A preliminary analysis [5] of a 50,000 site pilot measurement from October 2015 suggests that WebRTC local IP discovery is used on the homepages of over 100 sites, from over 20 distinct scripts.
Chrome mitigation pref: https://chromium.googlesource.com/chromium/src/+/7c98bab02128ae9fdc4fcc9a9df38588af86290e%5E!/chrome/common/pref_names.cc
Firefox discussion: https://groups.google.com/forum/#!topic/mozilla.dev.media/L6Rx9ubSjMc
Comment by @torgo Mar 31, 2016 (See Github)
Ref: https://github.com/w3c/webrtc-pc/issues/179 it looks like they have closed this issue. @dontcallmedom can you elaborate here and explain how the issue was resolved so that we can close this issue off please?
Comment by @dontcallmedom Mar 31, 2016 (See Github)
The RTCWeb IP Handling draft describe the strategies that browsers are invited to adopt to avoid revealing sensitive IP addresses.
Essentially:
- by default, only "safe" IP addresses get exposed; this includes so called "private" IP addresses (e.g.
192.168.0.1
) since in practice they don't reveal much, but not hidden-by-VPN IP addresses - once camera/mic access has been granted, more IP addresses get exposed to find more network efficient paths
- browsers should provide a mechanism to never reveal any other IP address than the public one
Comment by @mnot Apr 11, 2016 (See Github)
Discussed at IETF 95; minutes here (search for "IP-address handling").
Comment by @slightlyoff Jul 20, 2016 (See Github)
Do we need to follow up at all here?
Comment by @mnot Jul 22, 2016 (See Github)
We can get someone (EKR or MT) to come in and update us in Stockholm on Thursday, if wanted. I'll need a heads up to ask them soon, though.
Comment by @torgo Jul 28, 2016 (See Github)
EKR presented at the Stockholm f2f, including new IETF Draft intended to address this issue.
OpenedOct 2, 2013
General feedback to the WebRTC working group; feedback on the rechartering process.