Keep in mind STUN is a pretty basic protocol that doesn't do much work. ICE does the real heavy lifting in the standards-based NAT traversal approach, although it leverages STUN all over the place.
Everyone almost surely uses a STUN-like protocol, as you need to know your public address in any scheme. -Adam On 8/19/07, arvind singh <[EMAIL PROTECTED]> wrote: > > I have heard of three approaches for NAT traversal > > 1. Stun > 2. Skype > 3. Hamachi > > > Does anyone know if Skype & Hamachi just use protocol based on STUN logic > or are they doing anything smarter. Has anyone tried to decipher network > traffic of Skype or Hamachi and found any interesting patterns/logic ? > > I tried to use network sniffer today on Skype traffic and found UDP > packets to open large number of ports on my home router. > > Can anything be done using ICMP packets for NAT traversal? > > Look forward to good discussion on this topic > > Arvind > > ------------------------------ > Choose the right car based on your needs. Check out Yahoo! Autos new Car > Finder > tool.<http://us.rd.yahoo.com/evt=48518/*http://autos.yahoo.com/carfinder/;_ylc=X3oDMTE3NWsyMDd2BF9TAzk3MTA3MDc2BHNlYwNtYWlsdGFncwRzbGsDY2FyLWZpbmRlcg--+> > > > _______________________________________________ > p2p-hackers mailing list > [email protected] > http://lists.zooko.com/mailman/listinfo/p2p-hackers > >
_______________________________________________ p2p-hackers mailing list [email protected] http://lists.zooko.com/mailman/listinfo/p2p-hackers
