Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

UDP is treated fairly well by firewalls... at least compared to SCTP for example. QUIC/HTTP3 are UDP-based and even though there's usually a TCP/HTTP2 fallback they fare reasonably well.


I have various boxes which we send out to venues, on the whole outgoing connections are fine, but sometimes you get some really restrictive policies. I've had stuff that MITMs TCP/443, completely blocks UDP, etc.

My devices tend to try to connect back via

* UDP port 443, sometimes works

* an sstp vpn

* SSH to tcp/$highnumber, sometimes they blck/MITM port 80, 443, but leave the standard

* DNS

I can't think of a time that one of them didn't through.


It does make it through many firewalls these days, yes.

But all implementations I know use a much shorter timeout/keepalive period for UDP than they use for TCP because of firewalls/NATs. (I think the RFCs even recommend something like 300 seconds for TCP, but only 30 for UDP as a default?)

This has pretty significant implications on power consumption for mobile devices.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: