TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Pwnat – Autonomous Nat Traversal (2010)

97 pointsby jgeralnikover 5 years ago

7 comments

jgeralnikover 5 years ago
The really cool part about this is that the server does not need to know the client's ip address. Instead a new original form of ICMP hole punching is used to allow any client to punch the NAT so that the server can dynamically learn the client ip, and then regular UDP hole punching is used.
评论 #20995248 未加载
noname120over 5 years ago
&gt; This will work behind many NATs and firewalls, but not all.<p>While this is an interesting concept, the hard part in NAT traversal is getting it to work on all the possible NAT types. In particular, I believe that this method doesn&#x27;t work for symmetric NAT devices[1], which are widespread in corporate environments. It&#x27;s not a surprise that this idea from 2010 didn&#x27;t take off, ICE&#x2F;TURN are still kings.<p>[1] These devices assign a different port for each destination address, and this ICMP method doesn&#x27;t help predict the port that will be assigned.
评论 #20994282 未加载
评论 #20992637 未加载
armitronover 5 years ago
This is old technique from early 2000 and flawed as others have described. Outgoing ICMP is blocked in every corporate environment I have ever been to and never makes it to the Internet facing gateway.
评论 #20998398 未加载
oriettaxxover 5 years ago
I had a quick test, not working for me many previous comments about this script <a href="https:&#x2F;&#x2F;hn.algolia.com&#x2F;?q=pwnat" rel="nofollow">https:&#x2F;&#x2F;hn.algolia.com&#x2F;?q=pwnat</a>
评论 #20994290 未加载
评论 #20993109 未加载
farisjarrahover 5 years ago
So is this a tool or an exploit? Or both? Is this something likely to get patched by the major software&#x2F;hardware vendors? Would this be a tool that would be safe to use at home if I wanted to connect to a private network on AWS or GCP and did not want to poke a hole through my nat gateway at home?
评论 #20997301 未加载
zerocool2750over 5 years ago
I think you might have a typo in your FAQ.<p>&quot;Does the server have to specify the client host? No!..... The server does need to have any unique prior knowledge about the client. &quot;<p>Should that read, &quot;The server does NOT need to have any unique....&quot; ?
hopplaover 5 years ago
Cool, I used to do this by spoofing udp packets from 3.3.3.3 from the client to the servers public up, but was unreliable due to anti spoofing filter. This way is better