STUN - Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs)

Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs) (STUN) is a lightweight protocol that allows applications to discover the presence and types of NATs and firewalls between them and the public Internet. It also provides the ability for applications to determine the public Internet Protocol (IP) addresses allocated to them by the NAT. STUN works with many existing NATs, and does not require any special behavior from them. As a result, it allows a wide variety of applications to work through existing NAT infrastructure.

[1]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[2]  Daniel Senie,et al.  Network Address Translator (NAT)-Friendly Application Design Guidelines , 2002, RFC.

[3]  Roy T. Fielding,et al.  Hypertext Transfer Protocol - HTTP/1.1 , 1997, RFC.

[4]  T. Dierks,et al.  The TLS protocol , 1999 .

[5]  Matt Holdrege,et al.  Protocol Complications with the IP Network Address Translator , 2001, RFC.

[6]  Paul Ferguson,et al.  Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.

[7]  Jonathan D. Rosenberg,et al.  Middlebox communication architecture and framework , 2002, RFC.

[8]  Pete Chown,et al.  Advanced Encryption Standard (AES) Ciphersuites for Transport Layer Security (TLS) , 2002, RFC.

[9]  Mark Handley,et al.  SIP: Session Initiation Protocol , 1999, RFC.

[10]  Internet Architecture Board,et al.  IAB Considerations for UNilateral Self-Address Fixing (UNSAF) Across Network Address Translation , 2002, RFC.

[11]  Henning Schulzrinne,et al.  RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.

[12]  Eric Rescorla,et al.  HTTP Over TLS , 2000, RFC.

[13]  Baugher,et al.  The Secure Real-Time Transport Protocol , 2003 .

[14]  Paul Vixie,et al.  A DNS RR for specifying the location of services (DNS SRV) , 1996, RFC.

[15]  Rae Baxter,et al.  Acknowledgments.-The authors would like to , 1982 .

[16]  Christopher Allen,et al.  The TLS Protocol Version 1.0 , 1999, RFC.

[17]  Scott O. Bradner,et al.  Key words for use in RFCs to Indicate Requirement Levels , 1997, RFC.

[18]  Jürgen Falb,et al.  The Internet Protocol , 2005, The Industrial Information Technology Handbook.

[19]  John T. Kohl,et al.  The Kerberos Network Authentication Service (V5 , 2004 .