LWN: Comments on "Firefox 35.0" https://lwn.net/Articles/629502/ This is a special feed containing comments posted to the individual LWN article titled "Firefox 35.0". en-us Fri, 03 Oct 2025 12:18:21 +0000 Fri, 03 Oct 2025 12:18:21 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net Firefox 35.0 Hello Room Encryption https://lwn.net/Articles/631752/ https://lwn.net/Articles/631752/ ekj <div class="FormattedComment"> That's not how you use public-key crypto. Public-key crypto is typically CPU-intensive and sometimes also for other reasons unadvised to use on the actual data.<br> <p> What you do is, you pick a RANDOM session-key; then you encrypt this key with the recipients public key, and the rest of the actual stream with the random one-time session-key by way of conventional symetrical crypto.<br> <p> This gives you the speed and security of traditional crypto with the key-distribution-advantages of public-key crypto.<br> <p> It also means if you want to send LARGE_STREAM to 5 people you only need to encrypt the (very small) session-key 5 times with the slow PK-crypto, and the large stream itself is encrypted only once with fast symmetrical crypto.<br> <p> <p> </div> Wed, 04 Feb 2015 13:27:02 +0000 Firefox 35.0 Hello Room Encryption https://lwn.net/Articles/629806/ https://lwn.net/Articles/629806/ Vertana <div class="FormattedComment"> Thank you very much! I think that cleared up the last piece of this puzzle for me! <br> </div> Fri, 16 Jan 2015 14:42:08 +0000 Firefox 35.0 Hello Room Encryption https://lwn.net/Articles/629773/ https://lwn.net/Articles/629773/ peter-b <div class="FormattedComment"> Not correct. You can encrypt the video you're sending with a stream cipher, and then encrypt the stream cipher key with the public keys of each of your participants. So you only suffer the cost of encrypting the video once, and only the intended recipients can decrypt it *or retransmit it without fully reencrypting it*. This works okay with a central server, as long as you trust the central server. ;-)<br> </div> Fri, 16 Jan 2015 09:26:28 +0000 Firefox 35.0 Hello Room Encryption https://lwn.net/Articles/629706/ https://lwn.net/Articles/629706/ Lennie <div class="FormattedComment"> Ohh, that is unfortunate. But luckily it looks like it's being solved.<br> <p> "The key issue at this point is that this behavior would be out-of-spec (and I expect Chrome to begin deprecating it sometime soon-ish to match specified behavior). The most recent agreement about how to handle unannounced SSRCs is captured here: <a href="https://github.com/w3c/webrtc-pc/pull/29">https://github.com/w3c/webrtc-pc/pull/29</a><br> <p> Note that there has been substantial progress on Bug 784517 following our SDP rewrite, and the proper, spec-compliant mechanism for multistream handling should land very soon now."<br> <p> But I guess it's better to remove the wrong behaviour from the implementations now than later having to add some hacky workaround in the specifications.<br> </div> Thu, 15 Jan 2015 19:47:01 +0000 Firefox 35.0 Hello Room Encryption https://lwn.net/Articles/629703/ https://lwn.net/Articles/629703/ deepfire <div class="FormattedComment"> What about text chat?<br> </div> Thu, 15 Jan 2015 19:13:47 +0000 Firefox 35.0 Hello Room Encryption https://lwn.net/Articles/629692/ https://lwn.net/Articles/629692/ tzafrir <div class="FormattedComment"> which will redirect you to <a href="https://meet.jit.si/chromeonly.html">https://meet.jit.si/chromeonly.html</a> fi you connect from Firefox.<br> <p> Bugs in question:<br> <a href="https://github.com/jitsi/jitsi-meet/issues/4">https://github.com/jitsi/jitsi-meet/issues/4</a><br> <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=784517">https://bugzilla.mozilla.org/show_bug.cgi?id=784517</a><br> <p> or rather:<br> <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1095218">https://bugzilla.mozilla.org/show_bug.cgi?id=1095218</a><br> <p> which has seem some action lately.<br> </div> Thu, 15 Jan 2015 17:18:19 +0000 Firefox 35.0 Hello Room Encryption https://lwn.net/Articles/629687/ https://lwn.net/Articles/629687/ Vertana <div class="FormattedComment"> Thank you for your input. Your comment and the ensuing discussion is helping me piece this together much better than I could on my own. The encryption answer sounds like it's encrypted with DTLS between each direct connection in a peer-to-peer setup, so although it is encrypted, it has natural limits due to CPU load and network load and thus isn't scalable without the implementation of a video bridge as you suggested.<br> </div> Thu, 15 Jan 2015 16:48:45 +0000 Firefox 35.0 Hello Room Encryption https://lwn.net/Articles/629685/ https://lwn.net/Articles/629685/ Vertana <div class="FormattedComment"> So if this is using a peer-to-peer connection amongst each individual, then that means the encryption is only good between direct connections correct? Implying that with each connection you are increasing the CPU load which imposes a natural limit on how many participants can be in a room. Is there a server required to manage user states and such or is it really as "simple" as peer-to-peer DTLS connections where packet loss is not considered as much?<br> </div> Thu, 15 Jan 2015 16:46:31 +0000 Firefox 35.0 Hello Room Encryption https://lwn.net/Articles/629633/ https://lwn.net/Articles/629633/ drag <div class="FormattedComment"> Unfortunately SIP sucks for most 'ad-hoc' type things. Unless you have knowledgeable people to manage the network connections on either side the chances of getting SIP working well in a P2P fashion is pretty small. <br> <p> Even if you manage to get STUN setup and get people configured correctly things like 'bufferbloat' and such things play havoc with latency. Especially any sort of network tunneling that goes over tcp. <br> <p> If we lived in a better world were people had proper firewalls and IPv6 then SIP may of worked well, but we don't so it doesn't. <br> <p> Hopefully the ubiquity of chrome and firefox browsers can be leveraged to finally get realtime P2P communication to be a practical solution. <br> </div> Thu, 15 Jan 2015 15:08:20 +0000 Firefox 35.0 Hello Room Encryption https://lwn.net/Articles/629624/ https://lwn.net/Articles/629624/ Lennie <div class="FormattedComment"> WebRTC does peer-to-peer.<br> <p> Usually the rule of thumb for video is: no more than 4 people.<br> <p> If you want more, use a video bridge, Jitsi gets a lot of attention:<br> <a href="https://jitsi.org/Projects/JitsiVideobridge">https://jitsi.org/Projects/JitsiVideobridge</a><br> </div> Thu, 15 Jan 2015 13:52:03 +0000 Firefox 35.0 Hello Room Encryption https://lwn.net/Articles/629604/ https://lwn.net/Articles/629604/ josh <div class="FormattedComment"> In particular, if using a UX similar to Hangouts, where the person speaking takes up most of the screen and others show up very small, switching to low-resolution video for those small images would work.<br> </div> Thu, 15 Jan 2015 06:34:27 +0000 Firefox 35.0 Hello Room Encryption https://lwn.net/Articles/629592/ https://lwn.net/Articles/629592/ zlynx <div class="FormattedComment"> Could do it by only sending full resolution video when talking. Use a very low bandwidth stream the rest of the time. <br> </div> Thu, 15 Jan 2015 03:32:42 +0000 Firefox 35.0 Hello Room Encryption https://lwn.net/Articles/629591/ https://lwn.net/Articles/629591/ roc <div class="FormattedComment"> That sounds good for audio, but less good for video.<br> </div> Thu, 15 Jan 2015 03:24:25 +0000 Firefox 35.0 Hello Room Encryption https://lwn.net/Articles/629588/ https://lwn.net/Articles/629588/ Cyberax <div class="FormattedComment"> It can actually be pretty scalable, if participants can coordinate the send/receive periods. There can't be more than one (or two) speakers at the same time.<br> </div> Thu, 15 Jan 2015 02:30:55 +0000 Firefox 35.0 Hello Room Encryption https://lwn.net/Articles/629584/ https://lwn.net/Articles/629584/ roc <div class="FormattedComment"> Right, I don't think we support multiple video tracks from a single peer yet, so we only support the secure-but-not-scalable approach where every participant streams directly to every other participant.<br> </div> Thu, 15 Jan 2015 01:56:31 +0000 Firefox 35.0 Hello Room Encryption https://lwn.net/Articles/629553/ https://lwn.net/Articles/629553/ dowdle <div class="FormattedComment"> I couldn't find much info about the "rooms" feature so far as I can tell it is still just two participants max. If it did do more than two... I believe it would require n-1 inbound streams for each participant which really isn't doable for most people. That's why video-bridge type products exist... to aggregate the streams so that each participant is still only getting 1 inbound stream. Does that answer the encryption question?<br> </div> Wed, 14 Jan 2015 22:26:50 +0000 Firefox 35.0 Hello Room Encryption https://lwn.net/Articles/629526/ https://lwn.net/Articles/629526/ Vertana <div class="FormattedComment"> I was searching around the Internet and I can't seem to find anything substantial on this topic. I know Firefox Hello implements end-to-end encryption through the use of WebRTC, but does it maintain end-to-end encryption even while in a 'room' with multiple users? If so, how does it do this? I saw how WebRTC sends data using DTLS, but I'm not sure how that's maintained with multiple users. My apologies if this is easy to find, perhaps my Google-fu is just off today.<br> </div> Wed, 14 Jan 2015 21:20:42 +0000