-
无恶意, 只是说出发现.
如果 使用RFC 5780, 然后再立刻对 RFC 3489 Test 会导致程序闪退
运行环境: Windows 10
-
After untaking research it seems that the best route is to implement this spec and then refactor into RFC 5389
-
Can you add missing RFCs?
There are for STUN:
- RFC 3489 - "classic" STUN
- RFC 5389 - base "new" STUN specs
- RFC 5769 - test vectors for STUN protocol testing
- RFC 5780 - NAT behavior discov…
-
Currently we're trying to make https://github.com/giantswarm/rfc/pull/96/ production ready as quick as possible. In order to enable that, we need to do two things:
```[tasklist]
### Tasks
- [ ] https:…
-
sir,why a test used 20 seconds?can it be faster?
NAT Type: Port restricted NAT
External IP Family: 1
External IP: 121.7.13.88
External Port: 10065
Time taken: 22.4233083
-
## Precommit CI Run information
Logs can be found in the associated Github Actions run: https://github.com/ewlu/gcc-precommit-ci/actions/runs/10786616991
## Patch information
Applied patches: 1 -> 1
A…
-
For example google ones:
> stun.l.google.com:19302
> stun1.l.google.com:19302
> stun2.l.google.com:19302
> stun3.l.google.com:19302
> stun4.l.google.com:19302
Test1 fails with "No changed address." …
-
When I check the wireshark code for stun, I see some more RFC's
This is more a feature request.
* Please refer to the following specs for protocol detail:
* - RFC 3489 (Addition of deprecated at…
-
## 问题发现
因为一直都是在路由器上用 natmap 打洞, 通过打洞出来的 tcp/udp 端口连回家里或访问开放的服务
最近一次远程回家, 要测试点东西. 就把 homeproxy 的 `Bypass CN traffic` 给关了. 结果远程连接直接就断了, 其他的服务也都挂了
## 初步检查
回家后检查是 keep-alive 服务器命中了 Direct 规则, (natma…
muink updated
4 months ago
-
Our AutoNAT spec currently says:
> In order to prevent attacks like the one described in [RFC 3489, Section 12.1.1](https://www.rfc-editor.org/rfc/rfc3489#section-12.1.1) (see excerpt below), impleme…