Shidong:

        Heya. Apologies for dragging you a bit off-topic: the name
"EchoServer" is one that I use for our TCP relay product that
facilitates "firewall friendly" EchoVNC connections. It doesn't
actually use holepunching, just completely uninteresting packet
relaying. From your email, I think someone might be reusing our
product name; if you can point me to the project owner, I'd like
to clear up the potential confusion.

cheers,
Scott

On Nov 5, 2008, at 2:06 PM, shidong chen wrote:

> Hello everyone,
>
> I'm doing tcp holepunching experiments based on Bryan Ford's paper  
> and test code. So far I've not succeded at all. I verifed the tested  
> PC/NAT translate the private port into same public port. I suppose  
> I'm making some mistake in my test code. This topic may sound too  
> basic for you guys but I'd appreciate any help.
>
> here is what I'm doing
> I developped my test code from a simple TCP echo client and echo  
> server program. Let client and server share and bound to same port.  
> On local linux PC behind a NAT/firewall, I run both EchoClient and  
> EchoServer. On remote Linux PC( a server on internet, not behind  
> NAT), I run EchoClient only. I expect remote EchoClient can build a  
> connection into my local EchoServer through "holepunching". But it  
> never succedes.
>
> Here is screen print:
>
> [local_host]$ ./EchoClient remote_host 6881
> argc=3, Echo Server = remote_host:6881
> setreuse() #63: Local TCP port: 6881
> Sleeping finished.
> Connect failed: Connection refused
> Connect failed: Connection refused
>
> [local_host]$ ./EchoServer 6881
>
> [[remote_host]$ ./EchoClient local_host 6881
> argc=3, Echo Server = local_host:6881
> setreuse() #64: Bound to local TCP port: 6881
> Connect failed: Operation now in progress
> Connect failed: Operation already in progress
> Connect failed: Operation already in progress
> Connect failed: Operation already in progress
>
> Thanks a lot
> Shidong
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to