{"draft":"draft-ietf-behave-p2p-state-06","doc_id":"RFC5128","title":"State of Peer-to-Peer (P2P) Communication across Network Address Translators (NATs)","authors":["P. Srisuresh","B. Ford","D. Kegel"],"format":["ASCII","HTML"],"page_count":"32","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"Behavior Engineering for Hindrance Avoidance","abstract":"This memo documents the various methods known to be in use by\r\napplications to establish direct communication in the presence\r\nof Network Address Translators (NATs) at the current time. Although\r\nthis memo is intended to be mainly descriptive, the Security\r\nConsiderations section makes some purely advisory recommendations\r\nabout how to deal with security vulnerabilities the applications\r\ncould inadvertently create when using the methods described. This\r\nmemo covers NAT traversal approaches used by both TCP- and UDP-based\r\napplications. This memo is not an endorsement of the methods\r\ndescribed, but merely an attempt to capture them in a document. This memo provides information for the Internet community.","pub_date":"March 2008","keywords":[],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC5128","errata_url":"https:\/\/www.rfc-editor.org\/errata\/rfc5128"}