You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on May 11, 2022. It is now read-only.
pwnat uses a completely different method to punch holes in the nat. The node would just need to send ping packages to a randomly chosen address which is not routable. This address would need to be published in the DHT and other nodes can start to send UDP packages to this node. There's no middle man required - which reduces the security implications (see paper for details):
It's worth noting that since peers will likely (although it's not the only option) learn about peer addresses via the DHT we could have DHT nodes act as the coordinating parties for hole punching without really adding any more risk. Still it would obviously be great if a third party wasn't required.
If you have any evidence of a non-third party scheme working here that'd be useful in building a proposal.
pwnat uses a completely different method to punch holes in the nat. The node would just need to send ping packages to a randomly chosen address which is not routable. This address would need to be published in the DHT and other nodes can start to send UDP packages to this node. There's no middle man required - which reduces the security implications (see paper for details):
http://samy.pl/pwnat/pwnat.pdf
The text was updated successfully, but these errors were encountered: