[Ekiga-devel-list] pwnat - punch holes in firewalls and NAT



Dear developers and ekiga-devel-list mailing list members,

I have found a project called "pwnat" that has made a good impression
on me and is seem to be very interesting. This may be a good addition
to Ekiga behind NAT scenario.

pwnat punches holes in firewalls and NATs allowing any numbers of
clients behind NATs to directly connect to a server behind a different
NAT with no 3rd party, port forwarding, DMZ or spoofing involved

https://github.com/samyk/pwnat

 pwnat, pronounced "poe-nat", is a tool that allows any
 number of clients behind NATs to communicate with a
 server behind a separate NAT with *no* port forwarding
 and *no* DMZ setup on any routers in order to directly
 communicate with each other. The server does not need
 to know anything about the clients trying to connect.

 Simply put, this is a proxy server that works behind a NAT,
 even when the client is behind a NAT, without any 3rd party.

 Read the paper, "Autonomous NAT Traversal", joint work with
 Christian Grothoff, Nathan S. Evans, and Andreas Müller
 published by IEEE at the IEEE P2P'10 Conference (bib, pdf)

 There is no middle man, no proxy, no 3rd party,
 no UPnP/STUN/ICE required, no spoofing, and no DNS tricks.

 More importantly, the client can then connect to any
 host or port on any remote host or to a fixed host and
 port decided by the server.

 pwnat is based off of the UDP tunneling software by
 Daniel Meekins, udptunnel, and chownat by Samy Kamkar.

http://samy.pl/pwnat/

-- 
Defending the constitution is expensive!
Help Lavabit.com by donating to the Lavabit Legal Defense Fund
http://lavabit.com/ <support lavabit com>


[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]