https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=219803

--- Comment #2 from Damjan Jovanovic <[email protected]> ---
In its current state, the patch provides application with a NAT hole punching
capability. Unlike in a symmetric NAT, in any cone-type NAT, an internal UDP
application can negotiate to receive packets from a known peer, by using STUN
to create a external IP:port for its UDP socket and discover what they are,
communicating them to its peer and learning what external IP:port its peer is
using, and even if it's behind the most restrictive "ported-restricted cone"
NAT, it can just send 1 packet to its peer's IP:port to create a connection and
allow that peer to send packets back.

This works even if both peers are NATed, as long as at least 1 (the server) is
not a symmetric NAT.

-- 
You are receiving this mail because:
You are the assignee for the bug.
_______________________________________________
[email protected] mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-pf
To unsubscribe, send any mail to "[email protected]"

Reply via email to