_____  

From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Adam Fisk
Sent: Friday, August 31, 2007 11:11 AM
To: theory and practice of decentralized computer networks
Subject: Re: [p2p-hackers] Best NAT traversal options

Keep in mind STUN is a pretty basic protocol that doesn't do much work.  ICE
does the real heavy lifting in the standards-based NAT traversal approach,
although it leverages STUN all over the place.

Everyone almost surely uses a STUN-like protocol, as you need to know your
public address in any scheme.  

Actually, you don't :)
 
Alex 
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to