Open tcr opened 9 years ago
Alternately, we could advertise in "promiscuous" mode by looking at what mDNS packets are being picked up on the network and then advertising Tessel on all of them. I'd recommend that approach, since it's most amenable to hackathons.
The long-term solution is a website registry for events, keyed by a unique ID, that saves the IP of devices on that network. mDNS-by-proxy
Looks like the wifi at fullstack blocks all mdns traffic. :(
mDNS can be blocked by wifi networks. But there are a bunch that aren't. Among the ones available at this $RANDOM_OFFICE_LOCATION:
_airplay._tcp
_raop._tcp
(AirTunes)_ipp._tcp
(Internet Printing Protocol)_printer._tcp
I don't know a comprehensive list, and I'd need a prohibitive WiFi network to ensure this, but I suggest googling around for some.
One idea is that we advertise under unconventional networks, just like how all IP is unfortunately routed through only UDP and TCP these days:
dns-sd -R "johnnyman" "_airplay._tcp" local 22 tessel=1
This works on this prohibitive network, as well as
_printer._tcp
. What do we think? 1) benefits the user 2) might hurt people on the network 3) but not by much?