Session Traversal Utilities for NAT (STUN) is a standardized set of methods, including a . The STUN protocol and method were updated in RFC , retaining many of the original specifications as a subset of methods, but removing others. 21 Oct STUN was first defined in RFC (standards) back in , and then revised two times once in RFC (standards) in and again in. Session Traversal Utilities for NAT (STUN). This RFC was published in Abstract. Session Traversal Utilities for NAT (STUN) is a protocol that serves.

Author: Zulabar Tara
Country: Grenada
Language: English (Spanish)
Genre: Art
Published (Last): 20 January 2004
Pages: 141
PDF File Size: 11.46 Mb
ePub File Size: 7.48 Mb
ISBN: 694-4-19639-343-1
Downloads: 29901
Price: Free* [*Free Regsitration Required]
Uploader: Zulujar

However, experience since the publication rfc 5389 RFC has found that classic STUN simply does not work sufficiently well to be a deployable solution.

Session Traversal Utilities for NAT Rgc is a standardized set of methods, including a network protocol, for traversal of network address rfc 5389 NAT gateways in applications of real-time voice, video, messaging, and other interactive communications.

The password component of a rfc 5389 credential. It can also be used to check connectivity between two endpoints, and as a keep-alive protocol to maintain NAT bindings. Short-term credentials are obtained through some kind of protocol mechanism rfc 5389 the client and server, preceding the STUN exchange.

For other uses, see STUN disambiguation. The acronym remains STUN, rfc 5389 is all anyone rc remembers anyway. Retrieved from ” https: The STUN protocol and method were updated in RFCretaining many of the original specifications as a subset of methods, but rfc 5389 others. When there is an intervening NAT between 538 client and the other host, the reflexive transport address represents the mapped address allocated to the client on the public side of the NAT.

STUN servers do not implement any reliability mechanism for their responses. See Section 19 for a more rfc 5389 listing.

When a client has evaluated its external address, it can use this as a candidate for communicating with peers rfc 5389 sharing the external NAT address rather than the private address, which is not reachable from peers on the public network. Please refer to the 5839 edition of the “Internet Official Protocol Standards” STD 1 for the standardization state and status of this protocol.

A STUN server can also send indications. When the path through the diagram ends in a red box, UDP communication is not possible and when the path ends in a yellow or green box, communication is possible. Rtc are other, more minor changes. Network Working Group Rfc 5389. This document obsoletes RFC A rfc 5389 credential has an explicit temporal scope, which may be based on a specific amount of time such rfc 5389 5 minutes or on an event such as termination of a SIP dialog.

STUN – Wikipedia

From Wikipedia, the free encyclopedia. In the cases of restricted cone or port restricted cone NATs, the client must send out a packet to the endpoint before the NAT will allow packets from the endpoint through rfc 5389 the client.

rfc 5389

Since all STUN attributes are padded to a multiple of rfc 5389 bytes, the last 2 bits rfc 5389 this field are always zero. These mechanisms include DNS discovery, a redirection technique to an alternate server, a fingerprint attribute for demultiplexing, and two authentication and message-integrity exchanges.

Session Traversal Utilities for NAT (STUN)

By using this site, you agree to the Terms of Use and Privacy Policy. The authentication mechanisms revolve around rfc 5389 use of a username, password, and message-integrity value.

It provides a tool for hosts to discover the presence of a network address translator, rcc to rfc 5389 the mapped, usually public, Internet Protocol IP address and port number that the NAT has allocated for the application’s User Datagram Protocol UDP flows to remote hosts. In RFC [ RFC ], this field was part of the transaction ID; placing the magic rfc 5389 in this location allows a server to detect if the client will understand certain attributes that were added in this revised specification.

Each usage rfc 5389 the mechanisms allowed with that usage.

STUN, Simple Traversal of UDP Through NAT

The result is obfuscated through exclusive or XOR mapping to avoid translation of the packet content by application layer gateways ALGs that perform deep packet inspection in an attempt to perform alternate NAT traversal methods. The on-the-wire protocol described here is changed only rfc 5389 from classic Rfc 5389. A class of 0b00 rfc 5389 a request, a class of 0b01 is an indication, a class of 0b10 is a success response, and a class of 0b11 is an error response.

Same meaning as reflexive address. Processing an Error Response It also provides a way for an endpoint to keep a NAT binding alive.

Changes since RFC