Dear P2P hackers,

In order to more thoroughly answer figure out which variant of a new NAT 
traversal method works best (for GNUnet primarily, but generally for anyone 
interested in P2P), a group of people (including Andreas Mueller, Samy Kamkar, 
Nate Evans and myself) would like your help.  

We've written a piece of software that will test your NAT implementation to 
determine how well various NAT hole punching techniques work.  The tester (at 
least the version with the tests we're interested in right now) currently only 
runs on W32 and requires that you first install http://www.winpcap.org/ (and 
possibly deactivate your host firewall). Then, please download, unzip and run 
the NAT tester from http://nattest.net.in.tum.de/.

At the end, the tester will launch a browser to report the results back to the 
NAT tester website for evaluation.  The collected data is made public, and our 
evaluation report will also be public; finally, whatever method we end up 
implementing for GNUnet based on this will be reasonably modular so that other 
implementations can choose to build on our code.

Thanks for your help in advance!

Best regards,

Christian
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to