On Mon, Mar 12, 2007 at 05:04:44PM +0000, Michael Rogers wrote:
> Matthew Toseland wrote:
> > I was
> > under the impression that the difference between port restricted and
> > symmetric was precisely this - that a symmetric NAT would allocate a
> > new port for every { source port, source IP, dest port, dest IP },
> > whereas a port restricted cone will usually reuse the port, and just
> > ignore packets coming from IPs other than ones we have sent packets to?
> 
> That sounds right, but to muddy the waters even further some people have 
> abandoned the "full cone/restricted cone/port restricted cone/symmetric" 
> terminology because it doesn't cover all possible combinations of 
> mapping and filtering behaviour - see tables 6 and 8 of the STUNT paper:
> 
> http://nutss.gforge.cis.cornell.edu/pub/imc05-tcpnat.pdf
> 
> Roughly speaking, it looks like 70% of NATs can punch UDP holes to each 
> other, and some of the 70% can punch holes to some of the remaining 30%. 
>    This is much worse than I thought - the real world success rate could 
> be anywhere between 49% and 91%, depending on the value of "some".
> 
> Port prediction works for 94% of NATs after a few retries, but it 
> requires out-of-band communication...

Out-of-band communication is possible ... sometimes. :|
> 
> Cheers,
> Michael
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
URL: 
<https://emu.freenetproject.org/pipermail/tech/attachments/20070315/9011b972/attachment.pgp>

Reply via email to