- From: Kacper Waśniowski via GitHub <noreply@w3.org>
- Date: Tue, 18 Nov 2025 09:00:10 +0000
- To: public-webrtc-logs@w3.org
Let's assume that ICE TLS candidates would have following format: ``` a=candidate:3 1 TLS 2113933322 X.X.X.X 443 typ HOST tcptype passive fingerprint sha-1 XX:YY:ZZ ``` Should it require symmetric candidates in the way that both party needs to send it's fingerprint? Usually in establishing TLS connection only a fingerprint of the server is necessary to validate by the client. So that it could be not necessary for both party to send its fingerprint, only the answerer should provide it. -- GitHub Notification of comment by k-wasniowski Please view or discuss this issue at https://github.com/w3c/webrtc-extensions/issues/236#issuecomment-3546307399 using your GitHub account -- Sent via github-notify-ml as configured in https://github.com/w3c/github-notify-ml-config
Received on Tuesday, 18 November 2025 09:00:10 UTC