简体   繁体   English

有没有办法在不禁用 webrtc 的情况下点击/拦截 webrtc 检测以防止 ip 泄漏?

[英]Is there a way to tap/intercept a webrtc detection to prevent ip leak without disabling webrtc?

So I am working on preventing ip leak through webrtc detection , but most of the solution I can find is disabling webrtc, or using an extension.所以我正在努力通过 webrtc 检测来防止 ip 泄漏,但我能找到的大多数解决方案是禁用 webrtc 或使用扩展。 But I'm avoiding to do that, is there a way I can intercept the webrtc detection and send back a fake ip address instead of my actual ip address?但是我避免这样做,有没有办法可以拦截 webrtc 检测并发回假 IP 地址而不是我的实际 IP 地址?

*I've read that even if you use vpn or proxy, it can still detect your actual ip address. *我读过即使您使用 vpn 或代理,它仍然可以检测到您的实际 IP 地址。

Yoiu should check whether what you read is the truth.你应该检查你读到的是否是真的。

With current versions of browsers, no local ip addresses will be exposed to Javascript, they're obfuscated as mdns hostnames like this:使用当前版本的浏览器,没有本地 ip 地址会暴露给 Javascript,它们被混淆为 mdns 主机名,如下所示:

candidate:0 1 UDP 2122187007 a809bdf8-19c0-4af1-bfdb-9d432d40ecd5.local 57583 typ host

(note that within the same local network, this can still be resolved) (注意在同一个局域网内,这个还是可以解决的)

If the peerconnection is using a STUN server, a public ip address may be gathered.如果 peerconnection 正在使用 STUN 服务器,则可能会收集公共 IP 地址。 A properly configured VPN will prevent that.正确配置的 VPN 将阻止这种情况。 A HTTP proxy being sold as a "VPN" may not.作为“VPN”出售的 HTTP 代理可能不会。 That is a defect in such products.这是此类产品的缺陷。 See https://webrtchacks.com/so-your-vpn-is-leaking-because-of-webrtc/ for a lengthy rant on this.请参阅https://webrtchacks.com/so-your-vpn-is-leaking-because-of-webrtc/对此进行冗长的咆哮。

声明:本站的技术帖子网页,遵循CC BY-SA 4.0协议,如果您需要转载,请注明本站网址或者原文地址。任何问题请咨询:yoyou2525@163.com.

 
粤ICP备18138465号  © 2020-2024 STACKOOM.COM