A host must of course not forward any guest’s traffic to any arbitrary remote station—thus, a central question remains:
how can a host verify that it is safe to forward traffic between a guest and an IP address on the Internet which this guest claims to be her remote station?