On 12/16/2014 11:58 AM, Carlos E. R. wrote:
Firewall/nat traversal is done with the help from stun servers.
http://en.wikipedia.org/wiki/STUN
That direct conversation happens is obvious when you setup the whole thing yourself, and the server simply does not have the internet pipe to hold all the bandwidth of the simultaneous conversations it handles. Being a private setup, you control it fully.
I'm aware of STUN, but haven't investigated WebRTC enough to see what it uses. However, STUN is a hack made necessary by NAT. With IPv6 and it's incredible number of public unicast addresses, NAT & STUN are not needed. One thing I have noticed is that, at least with the Firefox implementation, IPv6 is not used, even though other traffic on my local network normally uses it. I don't know if this is due to the Hello server currently having only an IPv4 address. One would expect, with Google and Mozilla pushing WebRTC, IPv6 would be supported. They both support IPv6 on their other sites. -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org