Session Traversal Utilities for NAT (STUN)

Session Traversal Utilities for NAT (STUN) is a protocol that serves as a tool for other protocols in dealing with Network Address Translator (NAT) traversal. It can be used by an endpoint to determine the IP address and port allocated to it by a NAT. It can also be used to check connectivity between two endpoints, and as a keep-alive protocol to maintain NAT bindings. STUN works with many existing NATs, and does not require any special behavior from them. STUN is not a NAT traversal solution by itself. Rather, it is a tool to be used in the context of a NAT traversal solution. This is an important change from the previous version of this specification (RFC 3489), which presented STUN as a complete solution. This document obsoletes RFC 3489. [STANDARDS-TRACK]

[1]  Robert T. Braden,et al.  Requirements for Internet Hosts - Communication Layers , 1989, RFC.

[2]  Ari Keränen,et al.  TCP Candidates with Interactive Connectivity Establishment (ICE) , 2012, RFC.

[3]  Christian Huitema,et al.  STUN - Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs) , 2003, RFC.

[4]  Steven M. Bellovin,et al.  Guidelines for Cryptographic Key Management , 2005, RFC.

[5]  Roy T. Fielding,et al.  Hypertext Transfer Protocol - HTTP/1.1 , 1997, RFC.

[6]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[7]  Lawrence C. Stewart,et al.  HTTP Authentication: Basic and Digest Access Authentication , 1999 .

[8]  Francois Yergeau UTF-8, a transformation format of ISO 10646 , 1998, RFC.

[9]  Vern Paxson,et al.  Computing TCP's Retransmission Timer , 2000, RFC.

[10]  Mark Handley,et al.  SIP: Session Initiation Protocol , 1999, RFC.

[11]  Internet Architecture Board,et al.  IAB Considerations for UNilateral Self-Address Fixing (UNSAF) Across Network Address Translation , 2002, RFC.

[12]  Stephen E. Deering,et al.  Internet Protocol, Version 6 (IPv6) Specification , 1995, RFC.

[13]  Jon Postel,et al.  Internet Protocol , 1981, RFC.

[14]  Bruce B. Lowekamp,et al.  NAT Behavior Discovery Using STUN , 2006 .

[15]  Paul Vixie,et al.  A DNS RR for specifying the location of services (DNS SRV) , 1996, RFC.

[16]  Henning Schulzrinne,et al.  An Offer/Answer Model with Session Description Protocol (SDP) , 2002, RFC.

[17]  Jonathan D. Rosenberg,et al.  Interactive Connectivity Establishment (ICE): A Protocol for Network Address Translator (NAT) Traversal for Offer/Answer Protocols , 2010, RFC.

[18]  Cullen Jennings,et al.  Managing Client-Initiated Connections in the Session Initiation Protocol (SIP) , 2009, RFC.

[19]  Philip Matthews,et al.  Traversal Using Relays around NAT (TURN): Relay Extensions to Session Traversal Utilities for NAT (STUN) , 2020 .

[20]  Thomas Narten,et al.  Guidelines for Writing an IANA Considerations Section in RFCs , 1998, RFC.

[21]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[22]  Eric Rescorla,et al.  HTTP Over TLS , 2000, RFC.

[23]  Kurt D. Zeilenga,et al.  SASLprep: Stringprep Profile for User Names and Passwords , 2005, RFC.

[24]  Scott O. Bradner,et al.  Key words for use in RFCs to Indicate Requirement Levels , 1997, RFC.