-
Notifications
You must be signed in to change notification settings - Fork 63
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
NACK responder always responding with most recent packet #84
Comments
👍 We can also add an option to the interceptor to |
Do you think people actually want the old behavior? Since it's not actually doing what it's claiming to do. Any network with reasonable latency will probably see NACKs responding to wrong packets. I do think it'd be great to avoid the copy though. |
I agree that it would be nice to avoid the copy, but on the other hand, I think it is the best we can do. Since The same goes for Maybe we should also carefully check the other interceptors for similar issues. |
Keeps a copy of packet in responder_interceptor, fixes #84
Keeps a copy of packet in responder_interceptor, fixes #84
Keeps a copy of packet in responder_interceptor, fixes #84
Keeps a copy of packet in responder_interceptor, fixes #84
Keeps a copy of packet in responder_interceptor, fixes #84
Keeps a copy of packet in responder_interceptor, fixes #84
Keeps a copy of packet in responder_interceptor, fixes #84
In the NACK responder, it tries to cache sent packets in order to respond to NACKs. However, it's storing a pointer to the rtp.Packet struct, which may be re-used by the sender process without the knowledge of NackResponder.
Adam from the community has observed symptoms where retransmitted packets contained payload that did not match the sequence number that was requested. (but a later sequence number that overrode the earlier one).
We need to be storing a copy of the packet to ensure that nack responder has full ownership over its data.
The text was updated successfully, but these errors were encountered: