Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
On Fri, Oct 26, 2007 at 10:24:27AM -0400, Boland, John wrote: > how can nat be detected? > would you have to inspect the packet contents? > http://www.cs.columbia.edu/~smb/papers/fnat.pdf (Look at the OS-dependent characteristic TTL; this detects routers, rather than NAT, and can be disguised by a firewall that arbitrarily resets TTL.) (Look at grouping of IP sequence numbers. Count the number of groups. Now you have a probably lower bound on the number of hosts active behind the NAT. This can be defeated by the BSDs, which use randomized sequences, and Solaris, which uses a separate sequence for each connection.) -dsr- -- This message has been scanned for viruses and dangerous content by MailScanner, and is believed to be clean. _______________________________________________ Discuss mailing list [hidden email] http://lists.blu.org/mailman/listinfo/discuss
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |