Keep in mind STUN is a pretty basic protocol that doesn't do much work.  ICE
does the real heavy lifting in the standards-based NAT traversal approach,
although it leverages STUN all over the place.

Everyone almost surely uses a STUN-like protocol, as you need to know your
public address in any scheme.

-Adam


On 8/19/07, arvind singh <[EMAIL PROTECTED]> wrote:
>
> I have heard of three approaches for NAT traversal
>
> 1. Stun
> 2. Skype
> 3. Hamachi
>
>
> Does anyone know if Skype & Hamachi just use protocol based on STUN logic
> or are they doing anything smarter. Has anyone tried to decipher network
> traffic of Skype or Hamachi and found any interesting patterns/logic ?
>
> I tried to use network sniffer today on Skype traffic and found UDP
> packets to open large number of ports on my home router.
>
> Can anything be done using ICMP packets for NAT traversal?
>
> Look forward to good discussion on this topic
>
> Arvind
>
> ------------------------------
> Choose the right car based on your needs. Check out Yahoo! Autos new Car
> Finder 
> tool.<http://us.rd.yahoo.com/evt=48518/*http://autos.yahoo.com/carfinder/;_ylc=X3oDMTE3NWsyMDd2BF9TAzk3MTA3MDc2BHNlYwNtYWlsdGFncwRzbGsDY2FyLWZpbmRlcg--+>
>
>
> _______________________________________________
> p2p-hackers mailing list
> [email protected]
> http://lists.zooko.com/mailman/listinfo/p2p-hackers
>
>
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to