Solved

SOCKS and DMZ

Posted on 2014-04-23
1
423 Views
Last Modified: 2014-04-23
Can I assume taht a SOCKS server is normally placed within a DMZ

Can I also assume that SOCKS normally operates as a reverse proxy

Does SOCKS have the ability to turn on or off the tunneling (and in effect act  as port forwarding

Can SOCKS reject IP's

Thanks
0
Comment
Question by:Anthony Lucia
1 Comment
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 500 total points
ID: 40018326
It's not part of the RFC, so yes and no. This is the same for most protocols, TCP for example has no mandate for IP or MAC address filtering, but it's a feature of many products.
SOCKS is a protocol, and when you create a server based on that protocol you can tack on other features.
SOCKS proxies are typically, I think anyway, FWD proxies, when you are attempting to get out on one protocol to avoid being detected or seen as another protocol. SOCKS is a tunnel, and if you tunnel out port 80 to a SOCKS proxy on the internet, you are doing the FWD motion. If someone connect to a SOCKS proxy to get into your network, then it's a reverse proxy. The FWD/REV thing is relative, they are the same thing, only direction dictates the name. SOCKS proxies are mainly used as anonymizers, or restriction by-passes.
The other difference between a SOCKS and an HTTP proxy is that http doesn't wrap the requests in a secure tunnel, a socks connection is encrypted end to end so it can't be sniffed, unlike an http proxy.
-rich
0

Featured Post

Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this increasingly digital world, security hacks are no longer just a threat, but a reality. As we've witnessed with Target's big identity hack 2013, Heartbleed in 2015, and now Cloudbleed, companies and their leaders need to prepare for the unthi…
There's a lot of hype surrounding blockchain technology. Here's how it works and some of the novel ways it' s now being used - including for data protection.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

713 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question