Jump to content
 







Main menu
   


Navigation  



Main page
Contents
Current events
Random article
About Wikipedia
Contact us
Donate
 




Contribute  



Help
Learn to edit
Community portal
Recent changes
Upload file
 








Search  

































Create account

Log in
 









Create account
 Log in
 




Pages for logged out editors learn more  



Contributions
Talk
 



















Contents

   



(Top)
 


1 Overview  





2 Flow  





3 See also  





4 References  





5 External links  














UDP hole punching






Čeština
فارسی
Français


 

Edit links
 









Article
Talk
 

















Read
Edit
View history
 








Tools
   


Actions  



Read
Edit
View history
 




General  



What links here
Related changes
Upload file
Special pages
Permanent link
Page information
Cite this page
Get shortened URL
Download QR code
Wikidata item
 




Print/export  



Download as PDF
Printable version
 
















Appearance
   

 






From Wikipedia, the free encyclopedia
 


UDP hole punching is a commonly used technique employed in network address translation (NAT) applications for maintaining User Datagram Protocol (UDP) packet streams that traverse the NAT. NAT traversal techniques are typically required for client-to-client networking applications on the Internet involving hosts connected in private networks, especially in peer-to-peer, Direct Client-to-Client (DCC) and Voice over Internet Protocol (VoIP) deployments.[1]

UDP hole punching establishes connectivity between two hosts communicating across one or more network address translators. Typically, third-party hosts on the public transit network are used to establish UDP port states that may be used for direct communications between the communicating hosts. Once port state has been successfully established and the hosts are communicating, port state may be maintained either by normal communications traffic, or in the prolonged absence thereof, by keep-alive packets, usually consisting of empty UDP packets or packets with minimal, non-intrusive content.

Overview[edit]

UDP hole punching is a method for establishing bidirectional UDP connections between Internet hosts in private networks using network address translators. The technique is not applicable in all scenarios or with all types of NATs, as NAT operating characteristics are not standardized.

Hosts with network connectivity inside a private network connected via a NAT to the Internet typically use the Session Traversal Utilities for NAT (STUN) method or Interactive Connectivity Establishment (ICE) to determine the public address of the NAT that its communications peers require. In this process another host on the public network is used to establish port mapping and other UDP port state that is assumed to be valid for direct communication between the application hosts. Since UDP state usually expires after short periods of time in the range of tens of seconds to a few minutes,[2] and the UDP port is closed in the process, UDP hole punching employs the transmission of periodic keep-alive packets, each renewing the life-time counters in the UDP state machine of the NAT.

UDP hole punching will not work with symmetric NAT devices (also known as bi-directional NAT) which tend to be found in large corporate networks. In symmetric NAT, the NAT's mapping associated with the connection to the known STUN server is restricted to receiving data from the known server, and therefore the NAT mapping the known server sees is not useful information to the endpoint.

In a somewhat more elaborate approach both hosts will start sending to each other, using multiple attempts. On a Restricted Cone NAT, the first packet from the other host will be blocked. After that the NAT device has a record of having sent a packet to the other machine, and will let any packets coming from this IP address and port number through. This technique is widely used in peer-to-peer software and Voice over Internet Protocol telephony. It can also be used to assist the establishment of virtual private networks operating over UDP. The same technique is sometimes extended to Transmission Control Protocol (TCP) connections, though with less success because TCP connection streams are controlled by the host OS, not the application, and sequence numbers are selected randomly; thus any NAT device that performs sequence-number checking will not consider the packets to be associated with an existing connection and drop them.

UDP Hole Punching message sequence chart
Message sequence chart with peers A and B, using server S to help establish communicaiton

Flow[edit]

Let A and B be the two hosts with internal IP addresses iAddrA and iAddrB respectively, each in its own private network; NA and NB are the two NAT devices with external IP addresses eAddrA and eAddrB respectively; S is a public server with a known IP address.

  1. A and B each begin a UDP conversation with S; the NAT devices NA and NB create UDP translation states and assign temporary external port numbers ePortA and ePortB.
  2. S examines the UDP packets to get the source port used by NA and NB (the external NAT ports ePortA and ePortB).
  3. S informs B about the values of eAddrA:ePortA and informs A about the values of eAddrB:ePortB.
  4. A sends a packet to eAddrB:ePortB and B sends a packet to eAddrA:ePortA (not necessarily at the same time nor in any particular order).
    • When those packets leave their private network, each NAT device adds an entry to its translation table:
      • NA examines A's packet and finds an entry already exists (iAddrA, iPortA, eAddrA, ePortA) but the destination is different (S) . NA will create a new entry with the same translation for traffic sourced from A ( iAddrA) to B (eAddrB).
      • NB examines B's packet and finds an entry already exists (iAddrB, iPortB, eAddrB, ePortB) but the destination is different (S). NB will create a new entry with the same translation for traffic sourced from B (iAddrB) to A (eAddrA).
    • Depending on the state of each NAT's translation table upon arrival of the remote's packet:
      • If the new entry was already added to NA's translation table before the arrival of B's packet, then NA passes B's packet, but otherwise drops it.
      • If the new entry was already added to NB's translation table before the arrival of A's packet, then NB passes A's packet, but otherwise drops it.
  5. Once both NAT's have those tuples added, then "holes" have been "punched" in the NATs, allowing both hosts to directly communicate.

See also[edit]

References[edit]

  1. ^ Ford, Bryan; Kegel, Dan; Srisuresh, Pyda (2008-03-01). "UDP Hole Punching, State of Peer-to-Peer (P2P) Communication across Network Address Translators (NATs)". ietf.org. Retrieved 2016-06-22.
  • ^ "Simple Security in IPv6 Gateway CPE". ietf.org. 2011-01-01. Retrieved 2016-06-22.
  • External links[edit]


    Retrieved from "https://en.wikipedia.org/w/index.php?title=UDP_hole_punching&oldid=1188112469"

    Category: 
    Computer network security
    Hidden categories: 
    Articles with short description
    Short description matches Wikidata
    Articles needing additional references from June 2016
    All articles needing additional references
     



    This page was last edited on 3 December 2023, at 11:45 (UTC).

    Text is available under the Creative Commons Attribution-ShareAlike License 4.0; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.



    Privacy policy

    About Wikipedia

    Disclaimers

    Contact Wikipedia

    Code of Conduct

    Developers

    Statistics

    Cookie statement

    Mobile view



    Wikimedia Foundation
    Powered by MediaWiki