libp2p_webrtc/
lib.rs

1// Copyright 2022 Parity Technologies (UK) Ltd.
2//
3// Permission is hereby granted, free of charge, to any person obtaining a
4// copy of this software and associated documentation files (the "Software"),
5// to deal in the Software without restriction, including without limitation
6// the rights to use, copy, modify, merge, publish, distribute, sublicense,
7// and/or sell copies of the Software, and to permit persons to whom the
8// Software is furnished to do so, subject to the following conditions:
9//
10// The above copyright notice and this permission notice shall be included in
11// all copies or substantial portions of the Software.
12//
13// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
14// OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
15// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
16// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
17// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
18// FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
19// DEALINGS IN THE SOFTWARE.
20
21//! Implementation of the [`libp2p_core::Transport`] trait for WebRTC protocol without a signaling
22//! server.
23//!
24//! # Overview
25//!
26//!  ## ICE
27//!
28//! RFCs: 8839, 8445 See also:
29//! <https://tools.ietf.org/id/draft-ietf-rtcweb-sdp-08.html#rfc.section.5.2.3>
30//!
31//! The WebRTC protocol uses ICE in order to establish a connection.
32//!
33//! In a typical ICE setup, there are two endpoints, called agents, that want to communicate. One
34//! of these two agents can be the local browser, while the other agent is the target of the
35//! connection.
36//!
37//! Even though in this specific context all we want is a simple client-server communication, it is
38//! helpful to keep in mind that ICE was designed to solve the problem of NAT traversal.
39//!
40//! The ICE workflow works as follows:
41//!
42//! - An "offerer" determines ways in which it could be accessible (either an IP address or through
43//!   a relay using a TURN server), which are called "candidates". It then generates a small text
44//!   payload in a format called SDP, that describes the request for a connection.
45//! - The offerer sends this SDP-encoded message to the answerer. The medium through which this
46//!   exchange is done is out of scope of the ICE protocol.
47//! - The answerer then finds its own candidates, and generates an answer, again in the SDP format.
48//!   This answer is sent back to the offerer.
49//! - Each agent then tries to connect to the remote's candidates.
50//!
51//! We pretend to send the offer to the remote agent (the target of the connection), then pretend
52//! that it has found a valid IP address for itself (i.e. a candidate), then pretend that the SDP
53//! answer containing this candidate has been sent back. This will cause the offerer to execute
54//! step 4: try to connect to the remote's candidate.
55//!
56//! ## TCP or UDP
57//!
58//! WebRTC by itself doesn't hardcode any specific protocol for media streams. Instead, it is the
59//! SDP message of the offerer that specifies which protocol to use. In our use case (one or more
60//! data channels), we know that the offerer will always request either TCP+DTLS+SCTP, or
61//! UDP+DTLS+SCTP.
62//!
63//! The implementation only supports UDP at the moment, so if the offerer requests TCP+DTLS+SCTP, it
64//! will not respond. Support for TCP may be added in the future (see
65//! <https://github.com/webrtc-rs/webrtc/issues/132>).
66//!
67//! ## DTLS+SCTP
68//!
69//! RFCs: 8841, 8832
70//!
71//! In both cases (TCP or UDP), the next layer is DTLS. DTLS is similar to the well-known TLS
72//! protocol, except that it doesn't guarantee ordering of delivery (as this is instead provided by
73//! the SCTP layer on top of DTLS). In other words, once the TCP or UDP connection is established,
74//! the browser will try to perform a DTLS handshake.
75//!
76//! During the ICE negotiation, each agent must include in its SDP packet a hash of the self-signed
77//! certificate that it will use during the DTLS handshake. In our use-case, where we try to
78//! hand-crate the SDP answer generated by the remote, this is problematic. A way to solve this
79//! is to make the hash a part of the remote's multiaddr. On the server side, we turn
80//! certificate verification off.
81
82#![cfg_attr(docsrs, feature(doc_cfg, doc_auto_cfg))]
83
84#[cfg(feature = "tokio")]
85pub mod tokio;