On Mon, 11 Feb 2002, Bram Cohen wrote: > They're probably using http with some funky proprietary layer on top of > it. The napster clones aren't exactly notable for their engineering. > > The standard technique for handling peers behind firewalls is to have one > which is behind a firewall connect to one which isn't. Pairs which are > both behind firewalls generally don't communicate unless you do a whole > bunch of scary TTL trickery.
basically, what i want to know is how the hell they're initiating connections through my firewall/nat. my default rules block all incoming IP traffic with only a few specified ports open. anyone find anything on the web? i've googled myself out. =jay _______________________________________________ Bits mailing list [EMAIL PROTECTED] http://www.sugoi.org/mailman/listinfo/bits
