Professional Documents
Culture Documents
Tiếng anh buổi 2
Tiếng anh buổi 2
Tiếng anh buổi 2
Architectures
SOCKS Servers
Group: 3
Define and history
Features of SOCK
Operation of SOCK
CONTENTS
Advantages of SOCKS
Disadvantages of SOCKS
Define and history
Define
History
Originally the protocol was developed and designed by David Koblas, system administrator of MIPS
computer systems. The protocol was extended to version 4 by Ying-Da Lee of NEC.
The reference SOCKS architecture and application client are owned by Permeo Technologies, a
spin-off from NEC.
The original SOCKS5 protocol was a security protocol that made firewalls and other security products
easier to manage. It was approved by the IETF in 1996 as RFC 1928. The protocol was developed in
association with Aventail Corporation, which markets the technology outside of Asia.
Features of SOCK
Socks Version 4
SOCKS5 is the latest and most preferred protocol. It delivers traffic through
UDP and Transmission Control Protocol (TCP) packets.
SOCKS5 offers better security and has three authentication methods
Socks Version 5 has the following major improvements:
· User authentication
· Name resolution
· Support of UDP packets
Operation of SOCK
SOCKS proxy work by passing traffic through a proxy server, which then
passes the information to the intended destination.
The SOCKS protocol achieves this by first establishing a TCP connection with the proxy
server. Then, your computer can send data to proxy server and transmit data to destination.
Operation of SOCK
For Example
The destination server will believe that the request came from the SOCKS5 proxy server.
The destination server will not be able to see the user’s original IP address. So, that’s how it
helps in hiding the location.
4. Main advantages of SOCKS
+ Features: SOCKS does not depend on a specific protocol,
it is not responsible for a specific set of network protocols
=> Gives flexibility to users when using this proxy anywhere
Access by Third-Party
Your proxy provider can still see yout IP. If you are dealing with a
questionable provider, they could expose you to cyberattacks.
Like all circuit level proxies the socks server proxy faces the same weakness
Access control is limited to ip address, port number and user authentication.
Thank you for
listening