Mitm Attack on WebRtc

前端 未结 1 957
独厮守ぢ
独厮守ぢ 2020-12-12 01:39

i have a problem. I\'ve developed a web-app using WebRtc for one-to-one videocall via browser using WebRtc with signalling server on node js (listening e.g. on 8181 port).

相关标签:
1条回答
  • 2020-12-12 02:38

    Man in the middle refers to interception during transmission, which WebRTC itself is secured against using DTLS and key exchange, so the weak point is usually the signaling server chosen by an application instead.

    But what you describe however sounds like Man on both ends. You have to trust the service (the server) to guarantee whom you're being connected to. If that server is compromised, or either client is compromised - say by injection - then there's no guarantee whom you're talking to, since a client can easily forward a transmission to another party.

    0 讨论(0)
提交回复
热议问题