[2 days left] What’s wrong with your cloud strategy? Learn why multicloud solutions matter with Nimble Storage.Register Now

x
?
Solved

Secure Socket (SOCKS)

Posted on 2014-04-22
1
Medium Priority
?
361 Views
Last Modified: 2014-04-23
Is SockS basically just a reverse proxy that can prevent unauthorized access.

If so, what API does it use to determine if the access is authorized
0
Comment
Question by:Anthony Lucia
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 2000 total points
ID: 40016094
A SOCKS proxy, is one that is protocol agnostic, it's more of a VPN in that way, SOCKS is a network protocol that allows connections to be made on behalf of a client.
The protocol is a tunnel, and whatever your asking for is relayed across and then the results back to you, and the proxy is pretty much unaware of what it just asked the destination.
http://etherealmind.com/fast-introduction-to-socks-proxy/
It should be called a SOCKS tunnel, although proxy is still accurate.
It (SOCKS) can be similar in operation to a reverse proxy, but a reverse proxy is often associated with HTTP/FTP protocols only. Forward and Reverse proxies are the same thing really, you just differentiate their placement or the direction of the requests.

200_Servers <-Reverse Proxy<- el-tuba-reno's
200_Users ->Fwd Proxy -> el-tuba-reno's
In the above, the server example, traffic comes in from the intertubes, some might be cached, scanned or possibly SSL decryption is being done at the proxy level. The requests come from outside to inside, the output from the server is probably going to cached so the proxy doesn't have to ask the servers for some popular content, it will already know the answer.
The second example, the users make the request to the outside world of the intertubes, and the results that come back in are cached, scanned or compressed. User_1 goes to ee.com, and user_2 goes to ee.com 10 minutes later, user_2 gets the cached version of that site or some of it's content.
Each proxy is the same, rev/fwd doesn't matter, the name changes based on who the proxy works for.
Reverse is a way into the private networks/dmz's, and a forward is way into the public spaces(typically). SOCKS can do both, it could let people into your network, and it can certainly let them out of it. Or it can sit on the internet, and others connect to it, and then to somewhere else on the internet, like a public (fwd) proxy can.
-rich
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Hey fellow admins! This time, I have a little fairy tale for you. As many tales do, it starts boring and then gets pretty gory. I hope you like it. TL;DR: It is about an important security matter, you should read it if you run or administer Windows …
This article covers the basics of data encryption, what it is, how it works, and why it's important. If you've ever wondered what goes on when you "encrypt" data, you can look here to build a good foundation for your personal learning.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

649 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question