Dear P2P hackers, In order to more thoroughly answer figure out which variant of a new NAT traversal method works best (for GNUnet primarily, but generally for anyone interested in P2P), a group of people (including Andreas Mueller, Samy Kamkar, Nate Evans and myself) would like your help.
We've written a piece of software that will test your NAT implementation to determine how well various NAT hole punching techniques work. The tester (at least the version with the tests we're interested in right now) currently only runs on W32 and requires that you first install http://www.winpcap.org/ (and possibly deactivate your host firewall). Then, please download, unzip and run the NAT tester from http://nattest.net.in.tum.de/. At the end, the tester will launch a browser to report the results back to the NAT tester website for evaluation. The collected data is made public, and our evaluation report will also be public; finally, whatever method we end up implementing for GNUnet based on this will be reasonably modular so that other implementations can choose to build on our code. Thanks for your help in advance! Best regards, Christian _______________________________________________ p2p-hackers mailing list [email protected] http://lists.zooko.com/mailman/listinfo/p2p-hackers
