4 Matching Annotations
  1. Nov 2020
    1. There might be many reasons due to which a person might be interested in learning Spanish. In the current technological world

      This is a test annotation to check if non logged in people can read it

    2. be many reasons due to which a person might be interested in learning Spanish. In the curren

      This is a test annotation to check if non logged in people can read it.

  2. Aug 2020
    1. Then, the peers start sending UDP packets to each other. They must expect some of these packets to get lost, so they can’t carry any precious information unless you’re prepared to retransmit them

      Here each node experience the following:

      1. I send an "packet" to the other node
      2. My hello packet will be refused by the other node (per its statefull firewall)
      3. Any packet coming from this node will now be accepted by my firewall!
      4. My following packets to the other node will be accepted (Because the other node has probably sent me a hello packet and has thus open its firewall for my answers)
    2. For robust NAT traversal, you need the following ingredients: A UDP-based protocol to augment Direct access to a socket in your program A communication side channel with your peers A couple of STUN servers A network of fallback relays (optional, but highly recommended) Then, you need to: Enumerate all the ip:ports for your socket on your directly connected interfaces Query STUN servers to discover WAN ip:ports and the “difficulty” of your NAT, if any Try using the port mapping protocols to find more WAN ip:ports Check for NAT64 and discover a WAN ip:port through that as well, if applicable Exchange all those ip:ports with your peer through your side channel, along with some cryptographic keys to secure everything. Begin communicating with your peer through fallback relays (optional, for quick connection establishment) Probe all of your peer’s ip:ports for connectivity and if necessary/desired, also execute birthday attacks to get through harder NATs As you discover connectivity paths that are better than the one you’re currently using, transparently upgrade away from the previous paths. If the active path stops working, downgrade as needed to maintain connectivity. Make sure everything is encrypted and authenticated end-to-end.

      Summary of NAT Traversal technics: What to do to ensure NAT traversal and in which order.