Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

SOCKS and DMZ

Posted on 2014-04-23
1
Medium Priority
?
443 Views
Last Modified: 2014-04-23
Can I assume taht a SOCKS server is normally placed within a DMZ

Can I also assume that SOCKS normally operates as a reverse proxy

Does SOCKS have the ability to turn on or off the tunneling (and in effect act  as port forwarding

Can SOCKS reject IP's

Thanks
0
Comment
Question by:Anthony Lucia
1 Comment
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 2000 total points
ID: 40018326
It's not part of the RFC, so yes and no. This is the same for most protocols, TCP for example has no mandate for IP or MAC address filtering, but it's a feature of many products.
SOCKS is a protocol, and when you create a server based on that protocol you can tack on other features.
SOCKS proxies are typically, I think anyway, FWD proxies, when you are attempting to get out on one protocol to avoid being detected or seen as another protocol. SOCKS is a tunnel, and if you tunnel out port 80 to a SOCKS proxy on the internet, you are doing the FWD motion. If someone connect to a SOCKS proxy to get into your network, then it's a reverse proxy. The FWD/REV thing is relative, they are the same thing, only direction dictates the name. SOCKS proxies are mainly used as anonymizers, or restriction by-passes.
The other difference between a SOCKS and an HTTP proxy is that http doesn't wrap the requests in a secure tunnel, a socks connection is encrypted end to end so it can't be sniffed, unlike an http proxy.
-rich
0

Featured Post

New Tabletop Appliances Blow Competitors Away!

WatchGuard’s new T15, T35 and T55 tabletop UTMs provide the highest-performing security inspection in their class, allowing users at small offices, home offices and distributed enterprises to experience blazing-fast Internet speeds without sacrificing enterprise-grade security.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Considering today’s continual security threats, which affect Information technology networks and systems worldwide, it is very important to practice basic security awareness. A normal system user can secure himself or herself by following these simp…
When you put your credit card number into a website for an online transaction, surely you know to look for signs of a secure website such as the padlock icon in the web browser or the green address bar.  This is one way to protect yourself from oth…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

824 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question