Occasionally trackers, DHT nodes, and PEX peers offer peer addresses with a port of 0. What does this mean? In the context of submitting one's own port to a tracker, or in DHT, sending a port of 0 means that the recipient should use the sender's apparent port, due to NAT or similar. But when receiving a list of possible peers for a torrent, how do you interpret a port of 0 then?
BitTorrent peers with zero ports
371 Views Asked by Matt Joiner At
2
There are 2 best solutions below
Related Questions in PORT
- C# FTP server never receives incoming transfer connection after processing EPRT command
- How to set 3306 port free after uninstalling MySQL?
- List all VM's by their port mirroring settings PowerShell
- How to make Puppet track TCP ports to avoid conflicts?
- Automatically forward ports from clients
- How to find port number of network connected device?
- Tcp Port connection shows incompatible value
- What are the port i can use to send email in java?
- Epson POS printer, ePOS Sdk. What's the default port?
- How to fix Tomcat has failed to start: the port X is already in used?
- Reference web projects from other web projects in solution
- How to run tomcat7 web app through https over port 8443?
- See data that an app is secretly sending to web server in the background
- The requested address is not valid in its context when I try to listen a port
- Send a open port request to router
Related Questions in NAT
- Docker/Boot2Docker: How to run multiple instances of a same container without port forwarding?
- How to change the subnet association from one route table to another route table using terraform?
- how to get tcp connection candidate from twilio stun/turn server?
- Trouble using python request module to make API post call within AWS lambda
- iptables: forward a single IP/Port to one interface, everything else to another
- NAT on Cisco Router between 2 external IP addresses
- Most secure way to run guest apps from host
- Node.js server on local Natted network
- How to Send A UDP packet via public IP through NAT?
- Why Java RMI Callback doesn't work behind NAT router?
- Azure VPN connection and public IP
- Docker's NAT table output chain rule
- Send TCP/UDP packets from the outside to a client behind a router
- DNS records for http web servers behind NAT with different external ports
- Need to use VPN tunnel for class C network using class A tunnel
Related Questions in BITTORRENT
- Torrent not downloading immediately after adding when only 1 seeding peer
- Implementing find node on torrent kademlia routing table
- magnet torrent by private server
- Android fragmented ProgressBar (like defrag or bittorrent)
- How to get responses to ut_metadata piece request ? (node.js Bit Torrent BEP 0009)
- How do I convert a base64 encoded torrent info_hash to a magnet link info_hash? (Linux)
- SHA1 Hash in BitTorrent is not text
- Cherry pick peers using Rasterbar libtorrent in Python
- How could a file be corrupted?
- How does the client divide the file?
- Can applications coexist within the same DHT?
- BitTorrent protocol: Why am I getting extra data with handshakes?
- parsing BEP9(ut_metadata) data message
- NullPointerException on unchanged bittorrent library of BitLet
- Significance of piece index in bittorrent file transfer?
Related Questions in DHT
- Implementing find node on torrent kademlia routing table
- Can applications coexist within the same DHT?
- How to find nodes with exact info_hash in Bittorrent DHT?
- How does a bittorent peer accquires info dictionary when magnet URI is provided?
- the make.sh for fastdht not work.When running it shows "nm: /usr/lib/libc_r.so:no such file"
- Consistent Hashing: what about rehashing?
- How does DHT torrent indexing sites scrape infoHashes efficiently?
- 'dht' does not name a type
- Similar to hash values but something that returns an int
- Chord protocol. Distribuited Hash Table (DHT). Peer to peer. (P2P)
- Algorithms for building a peer to peer search engine with distributed database
- Order-keeping queues that can be paused
- IPFS not announcing CIDs on indirect peers and unable to get through cmd as CID is not propagated using DHT
- Libtorrent Logging through python bindings, possible?
- DHT routing library for Java
Trending Questions
- UIImageView Frame Doesn't Reflect Constraints
- Is it possible to use adb commands to click on a view by finding its ID?
- How to create a new web character symbol recognizable by html/javascript?
- Why isn't my CSS3 animation smooth in Google Chrome (but very smooth on other browsers)?
- Heap Gives Page Fault
- Connect ffmpeg to Visual Studio 2008
- Both Object- and ValueAnimator jumps when Duration is set above API LvL 24
- How to avoid default initialization of objects in std::vector?
- second argument of the command line arguments in a format other than char** argv or char* argv[]
- How to improve efficiency of algorithm which generates next lexicographic permutation?
- Navigating to the another actvity app getting crash in android
- How to read the particular message format in android and store in sqlite database?
- Resetting inventory status after order is cancelled
- Efficiently compute powers of X in SSE/AVX
- Insert into an external database using ajax and php : POST 500 (Internal Server Error)
Popular Questions
- How do I undo the most recent local commits in Git?
- How can I remove a specific item from an array in JavaScript?
- How do I delete a Git branch locally and remotely?
- Find all files containing a specific text (string) on Linux?
- How do I revert a Git repository to a previous commit?
- How do I create an HTML button that acts like a link?
- How do I check out a remote Git branch?
- How do I force "git pull" to overwrite local files?
- How do I list all files of a directory?
- How to check whether a string contains a substring in JavaScript?
- How do I redirect to another webpage?
- How can I iterate over rows in a Pandas DataFrame?
- How do I convert a String to an int in Java?
- Does Python have a string 'contains' substring method?
- How do I check if a string contains a specific word?
I am curious from which specification you're deriving that.
Have you considered that it simply might be bogus data, not sanitized by the sender?
Rejecting port zero is not a requirement, since it's technically a valid port (although in practice not really usable) and even if it were you cannot rely on others to sanitize data for you.