中国移动 NAT 是随机对称型 NAT? 两台移动设备之间是否有办法进行 UDP 打洞?

查看 35|回复 1
作者:githmb   
同一个 local_addr, 对不同 remote_addr 进行访问, 某些对称型 NAT 是可以猜测出口地址的, 比如电信家宽:
访问 xxxx:1234:
2023-08-27 17:25:56 - server/src/main.rs:76 -> Server started on xxxx:1234
2023-08-27 17:25:59 - core/src/server.rs:77 -> [STUN] connection accepted: addr=x.113.51.76:2100
2023-08-27 17:25:59 - core/src/server.rs:77 -> [STUN] connection accepted: addr=x.113.51.76:2100
2023-08-27 17:26:01 - core/src/server.rs:77 -> [STUN] connection accepted: addr=x.113.51.76:2103
访问 xxxx:9999:
2023-08-27 17:25:52 - server/src/main.rs:76 -> Server started on xxxx:9999
2023-08-27 17:25:59 - core/src/server.rs:77 -> [STUN] connection accepted: addr=x.113.51.76:2101
2023-08-27 17:26:01 - core/src/server.rs:77 -> [STUN] connection accepted: addr=x.113.51.76:2104
2023-08-27 17:26:02 - core/src/server.rs:77 -> [STUN] connection accepted: addr=x.113.51.76:2108
但是中国移动测试下来, 似乎是对 remote_addr 进行了哈希, 随机分区:
访问 xxxx:1234:
2023-08-27 17:29:01 - server/src/main.rs:76 -> Server started on xxxx:1234
2023-08-27 17:29:37 - core/src/server.rs:77 -> [STUN] connection accepted: addr=x.136.53.79:6039
2023-08-27 17:29:41 - core/src/server.rs:77 -> [STUN] connection accepted: addr=x.136.53.79:6039
2023-08-27 17:29:42 - core/src/server.rs:77 -> [STUN] connection accepted: addr=x.136.53.79:6040
访问 xxxx:9999:
2023-08-27 17:28:18 - server/src/main.rs:76 -> Server started on xxxx:9999
2023-08-27 17:29:39 - core/src/server.rs:77 -> [STUN] connection accepted: addr=x.136.53.79:51701
2023-08-27 17:29:42 - core/src/server.rs:77 -> [STUN] connection accepted: addr=x.136.53.79:51702
2023-08-27 17:29:44 - core/src/server.rs:77 -> [STUN] connection accepted: addr=x.136.53.79:51703
这就导致 STUN 不起作用, 如何破敌?

Server, 2023-08-27, src, stun

pagxir   
不是有 IPv6 么
您需要登录后才可以回帖 登录 | 立即注册

返回顶部