[Ekiga-devel-list] pwnat - punch holes in firewalls and NAT
- From: "Genghis Khan" <genghiskhan gmx ca>
- To: ekiga-devel-list gnome org
- Subject: [Ekiga-devel-list] pwnat - punch holes in firewalls and NAT
- Date: Sat, 11 Jan 2014 02:50:11 -0500
Dear developers and ekiga-devel-list mailing list members,
I have found a project called "pwnat" that has made a good impression
on me and is seem to be very interesting. This may be a good addition
to Ekiga behind NAT scenario.
pwnat punches holes in firewalls and NATs allowing any numbers of
clients behind NATs to directly connect to a server behind a different
NAT with no 3rd party, port forwarding, DMZ or spoofing involved
https://github.com/samyk/pwnat
pwnat, pronounced "poe-nat", is a tool that allows any
number of clients behind NATs to communicate with a
server behind a separate NAT with *no* port forwarding
and *no* DMZ setup on any routers in order to directly
communicate with each other. The server does not need
to know anything about the clients trying to connect.
Simply put, this is a proxy server that works behind a NAT,
even when the client is behind a NAT, without any 3rd party.
Read the paper, "Autonomous NAT Traversal", joint work with
Christian Grothoff, Nathan S. Evans, and Andreas Müller
published by IEEE at the IEEE P2P'10 Conference (bib, pdf)
There is no middle man, no proxy, no 3rd party,
no UPnP/STUN/ICE required, no spoofing, and no DNS tricks.
More importantly, the client can then connect to any
host or port on any remote host or to a fixed host and
port decided by the server.
pwnat is based off of the UDP tunneling software by
Daniel Meekins, udptunnel, and chownat by Samy Kamkar.
http://samy.pl/pwnat/
--
Defending the constitution is expensive!
Help Lavabit.com by donating to the Lavabit Legal Defense Fund
http://lavabit.com/ <support lavabit com>
[
Date Prev][
Date Next] [
Thread Prev][
Thread Next]
[
Thread Index]
[
Date Index]
[
Author Index]