Hmnn...OK, I admit it, I want to see your code.

On 8/31/07, Alex Pankratov <[EMAIL PROTECTED]> wrote:
>
>  ------------------------------
> *From:* [EMAIL PROTECTED] [mailto:
> [EMAIL PROTECTED] *On Behalf Of *Adam Fisk
> *Sent:* Friday, August 31, 2007 11:11 AM
> *To:* theory and practice of decentralized computer networks
> *Subject:* Re: [p2p-hackers] Best NAT traversal options
>
>  Keep in mind STUN is a pretty basic protocol that doesn't do much work.
> ICE does the real heavy lifting in the standards-based NAT traversal
> approach, although it leverages STUN all over the place.
>
> Everyone almost surely uses a STUN-like protocol, as you need to know your
> public address in any scheme.
>
> Actually, you don't :)
>
> Alex
>
> _______________________________________________
> p2p-hackers mailing list
> [email protected]
> http://lists.zooko.com/mailman/listinfo/p2p-hackers
>
>
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to