Am 13.07.2013 02:34, schrieb David Beveridge: > On Sat, Jul 13, 2013 at 8:55 AM, Reindl Harald <h.reindl@xxxxxxxxxxxxx> wrote: >> and the answer comes back to exactly this port >> https://en.wikipedia.org/wiki/Stateful_firewall >> > https://en.wikipedia.org/wiki/UDP_hole_punching > "On some routers where port randomization is performed on a > per-outbound host basis, the ports are not randomly selected, but > actually sequential, making it possible to establish a conversation > through guessing nearby ports." > > see also > https://en.wikipedia.org/wiki/TCP_hole_punching and *what* has a implementation mistake to do with your answer below which you stripped out as well as the context of my whole answer to let you look smarter? >> but for a moment lets assume that you allow "related" connections on >> your input. What this means is to allow anything you connect outbound >> to to be trusted to make a reverse connection back to you
Attachment:
signature.asc
Description: OpenPGP digital signature
-- users mailing list users@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe or change subscription options: https://admin.fedoraproject.org/mailman/listinfo/users Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines Have a question? Ask away: http://ask.fedoraproject.org