Confirmed users
147
edits
(update uplift info) |
(Added comparison table) |
||
Line 13: | Line 13: | ||
** This can be used to block all local (LAN) and external IP addresses from being generated as candidates. | ** This can be used to block all local (LAN) and external IP addresses from being generated as candidates. | ||
** An example use-case would be avoiding exposing your external IP address to a caller (such as when avoiding disclosing you're in town Xxxxx when having a call with someone you have a protection order against; roughly the equivalent of blocking outgoing caller-id on the PSTN bug *-whatever) | ** An example use-case would be avoiding exposing your external IP address to a caller (such as when avoiding disclosing you're in town Xxxxx when having a call with someone you have a protection order against; roughly the equivalent of blocking outgoing caller-id on the PSTN bug *-whatever) | ||
** NOTE: does not hide your external IP address from the TURN server itself. | ** NOTE: does not hide your external IP address from the TURN server itself (see use_document_iceservers and default_iceservers to restrict to a TURN of your choice). | ||
* '''media.peerconnection.use_document_iceservers''' -- boolean (default true) -- use STUN/TURN servers provided by the page (all recent Firefox versions) | * '''media.peerconnection.use_document_iceservers''' -- boolean (default true) -- use STUN/TURN servers provided by the page (all recent Firefox versions) | ||
** If set to false and '''media.peerconnection.default_iceservers''' is set to the server(s) you want to use, only those servers will be used, and no server provided by the page will be used. | ** If set to false and '''media.peerconnection.default_iceservers''' is set to the server(s) you want to use, only those servers will be used, and no server provided by the page will be used. | ||
Line 21: | Line 21: | ||
** LAN IP addresses are not generated, the external IP address for that interface is (for a VPN, the exit portal of the VPN) | ** LAN IP addresses are not generated, the external IP address for that interface is (for a VPN, the exit portal of the VPN) | ||
** If your router does not support 'hairpinning', a within-LAN call will end up being routed through an external TURN server | ** If your router does not support 'hairpinning', a within-LAN call will end up being routed through an external TURN server | ||
** '''NOT supported with e10s | ** '''NOT supported with e10s''' (only available in Nightly and DevEdition) yet (see {{bug|1194259}}) | ||
* '''media.peerconnection.enabled''' -- boolean (default true) -- enables/disabled ability to create RTCPeerConnection objects (all recent Firefox versions) | * '''media.peerconnection.enabled''' -- boolean (default true) -- enables/disabled ability to create RTCPeerConnection objects (all recent Firefox versions) | ||
For easier comparison of the different options: | |||
{| class="wikitable" | |||
|- | |||
! Pref !! Local candidates !! External candidates !! Relay candidates !! No candidates !! Interfaces gathered | |||
|- | |||
| force_interface || Yes || Yes || Yes || If pointing to non-existing interface || Only the configured interface | |||
|- | |||
| relay_only || No || No || Yes || If no TURN server is provided || All interfaces will be used to try to connect to the relay | |||
|- | |||
| use_document_iceservers || Yes || Yes || Yes || N/A || All interface will be used to try to connect to the relay | |||
|- | |||
| default_address_only || No || Yes || Yes || N/A || Only the interface with the default route | |||
|- | |||
| peerconnection.enabled || No || No || No || Always || N/A | |||
|} | |||
Note 1: the comments in the table assume that the pref in each row has been altered from its default value.<br /> | |||
Note 2: 'External candidates = Yes' always requires a STUN server to be configured. <br /> | |||
Note 3: 'Relay candidate = Yes' always a TURN server to be configured. <br /> | |||
===Hooks to control access to createOffer/createAnswer=== | ===Hooks to control access to createOffer/createAnswer=== |