socks sock et s ecure presentation by group kangkong n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
SOCKS (SOCK ET S ECURE ) PRESENTATION BY: GROUP KANGKONG PowerPoint Presentation
Download Presentation
SOCKS (SOCK ET S ECURE ) PRESENTATION BY: GROUP KANGKONG

Loading in 2 Seconds...

play fullscreen
1 / 15

SOCKS (SOCK ET S ECURE ) PRESENTATION BY: GROUP KANGKONG - PowerPoint PPT Presentation


  • 138 Views
  • Uploaded on

SOCKS (SOCK ET S ECURE ) PRESENTATION BY: GROUP KANGKONG. CMPE209. Members: Eddy Kang Leo Kong. SOCKS Agenda. What is SOCKS? Characteristic/Advantages of SOCKS Applications Security Case Study Reference Q&A. WHAT IS SOCKS?. SOCKS = Secured Over Credential-based Kerberos Services

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'SOCKS (SOCK ET S ECURE ) PRESENTATION BY: GROUP KANGKONG' - Patman


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
socks sock et s ecure presentation by group kangkong

SOCKS (SOCKET SECURE)PRESENTATION BY:GROUP KANGKONG

CMPE209

Members: Eddy Kang

Leo Kong

socks agenda
SOCKS Agenda
  • What is SOCKS?
  • Characteristic/Advantages of SOCKS
  • Applications
  • Security
  • Case Study
  • Reference
  • Q&A
what is socks
WHAT IS SOCKS?
  • SOCKS = Secured Over Credential-based Kerberos Services
  • Proxy definition: Server that relays request from a client to a server
  • SOCKS is protocol that defines the communication from user to the proxy
  • SOCKS relays a user’s TCP/UDP session over a firewall.
  • Allow transparent access for the application users.
what is socks1
WHAT IS SOCKS?
  • Similar to a HTTP Proxy
characteristics and advantages of socks
Characteristics and advantages of SOCKS
  • SOCKS is part of Session layer.
  • Transparent support for any protocols above of Session layers.
characteristics and advantages of socks1
Characteristics and advantages of SOCKS
  • Two versions of SOCKS
    • SOCKSv4
    • SOCKSv5
  • How does it work: 3 steps
    • Generation of connection requests
    • Establishment of proxy circuits
    • Relaying applicative data
    • Authentication (only in version 5)
characteristics and advantages of socks2
Characteristics and advantages of SOCKS
  • Any applications can use SOCKS
  • Support UDP (version 5)
  • Proxy bi-directional
    • Use domain name (DNS) instead of IP address
  • Authentication is available in version 5 to assure user identity and its privileges.
applications
Applications
  • SOCKS can be use by anyone, companies or individual
  • Sample Servers available online:
    • SS5 Socks Server
    • OpenSSH (support SOCKS)
    • WinSocks - Socks Proxy Server
  • Sample Clients available online:
    • WideCap
    • HTTP-Tunnel Client
    • ProxyCap
security about socks
Security about SOCKS
  • ONLY a protocol that routes network packets between client and the SOCKS proxy server
  • No built-in security feature besides Authentication in Version 5
  • Needs to pair with security protocol to secure communication: ex, SSH, HTTPS, etc.
socks case study socks proxy with firewall
SOCKS Case Study: SOCKS Proxy with Firewall
  • SOCKS Proxy overview behind firewall
socks case study socks proxy
SOCKS Case Study: SOCKS Proxy
  • Data sent between User and SOCKS Proxy are not secured.
  • No Confidentiality/Integrity is guaranteed
  • Authentication is available in Version 5 only.
  • Recommend to use SSH Tunnel between User and SOCKS Proxy.
  • HTTP Request still in clear text leaving SOCKS Proxy => Use HTTPS.
socks case study anonymity software using socks
SOCKS Case Study: Anonymity Software using SOCKS
  • TOR uses SOCKS proxy to provide anonymity to users.
reference
Reference
  • Wikipedia:
    • http://en.wikipedia.org/wiki/SOCKS
  • RFC 1929
    • Username/Password Authentication for SOCKS ver 5
  • RFC1928
    • SOCKS Protocol ver 5
  • RFC 1961
    •  GSS-API Authentication Method for SOCKS ver 5