Green Sky
227425b90e
git-subtree-dir: external/toxcore/c-toxcore git-subtree-split: 67badf69416a74e74f6d7eb51dd96f37282b8455
44 lines
1.2 KiB
Markdown
44 lines
1.2 KiB
Markdown
Notes:
|
|
|
|
Friend requests need to be routed.
|
|
|
|
The current DHT should be capable of punching all NATs except symmetric ones.
|
|
|
|
######
|
|
|
|
Symmetric NAT hole punching:
|
|
|
|
If we are not connected to the friend and if the DHT is queried and ips
|
|
returned for the friend are the same but the port is different, the friend is
|
|
assumed to be behind a symmetric NAT.
|
|
|
|
Before attempting the procedure we first send a routed ping request to the
|
|
friend. This request is to be routed through the nodes who returned the ip of
|
|
the peer.
|
|
|
|
As soon as we receive one routed ping request from the other peer, we respond
|
|
with a ping response.
|
|
|
|
Ping request/response packet:
|
|
See: Crypto request packets in [[Crypto]]
|
|
|
|
Message:
|
|
For the ping request:
|
|
[char with a value of 254][char with 0][8 byte random number]
|
|
|
|
For the ping response:
|
|
[char with a value of 254][char with 1][8 byte random number (The same that was sent in the request)]
|
|
|
|
As soon as we get a proper ping response from the other we run the different
|
|
ports returned by the DHT through our port guessing algorithm.
|
|
|
|
######
|
|
|
|
Port guessing algorithm:
|
|
|
|
Right now it just tries all the ports directly beside the known ports.(A better one is needed)
|
|
|
|
######
|
|
|
|
We send DHT ping requests to all the guessed ports, only a couple at a time.
|