On Mon, 11 Feb 2002, Bram Cohen wrote:

> They're probably using http with some funky proprietary layer on top of
> it. The napster clones aren't exactly notable for their engineering.
>
> The standard technique for handling peers behind firewalls is to have one
> which is behind a firewall connect to one which isn't. Pairs which are
> both behind firewalls generally don't communicate unless you do a whole
> bunch of scary TTL trickery.

basically, what i want to know is how the hell they're initiating
connections through my firewall/nat.  my default rules block all
incoming IP traffic with only a few specified ports open.
anyone find anything on the web?  i've googled myself out.

=jay


_______________________________________________
Bits mailing list
[EMAIL PROTECTED]
http://www.sugoi.org/mailman/listinfo/bits

Reply via email to