SOCKS (SOCKet Secure) Presentation by: Group KangKong
Download
Report
Transcript SOCKS (SOCKet Secure) Presentation by: Group KangKong
SOCKS
(SOCKET SECURE)
PRESENTATION BY:
GROUP KANGKONG
CMPE209
Members:
Eddy Kang
Leo Kong
SOCKS AGENDA
What
is SOCKS?
Characteristic/Advantages of SOCKS
Applications
Security
Case Study
Reference
Q&A
2
WHAT IS SOCKS?
SOCKS
= Secured Over Credential-based
Kerberos Services
Proxy
definition: Server that relays request
from a client to a server
SOCKS
is protocol that defines the
communication from user to the proxy
SOCKS
relays a user’s TCP/UDP session
over a firewall.
Allow
users.
transparent access for the application
3
WHAT IS SOCKS?
Similar to a HTTP Proxy
User
Web Server
Internet
SOCKS Proxy
4
CHARACTERISTICS AND ADVANTAGES OF
SOCKS
SOCKS is part of Session
layer.
Transparent support for
any protocols above of
Session layers.
5
CHARACTERISTICS AND ADVANTAGES OF
SOCKS
Two versions of SOCKS
SOCKSv4
SOCKSv5
How does it work: 3 steps
Generation of connection requests
Establishment of proxy circuits
Relaying applicative data
Authentication (only in version 5)
6
CHARACTERISTICS AND ADVANTAGES OF
SOCKS
Any applications can use SOCKS
Support UDP (version 5)
Proxy bi-directional
Use domain name (DNS) instead of IP address
Authentication is available in version 5 to assure
user identity and its privileges.
7
APPLICATIONS
SOCKS
can be use by anyone, companies or
individual
Sample
SS5 Socks Server
OpenSSH (support SOCKS)
WinSocks - Socks Proxy Server
Sample
Servers available online:
Clients available online:
WideCap
HTTP-Tunnel Client
ProxyCap
8
SECURITY ABOUT SOCKS
ONLY a protocol that routes network packets
between client and the SOCKS proxy server
No built-in security feature besides
Authentication in Version 5
Needs to pair with security protocol to secure
communication: ex, SSH, HTTPS, etc.
Security Goal
Features
Confidentiality
None
Integrity
None
Authentication
Available in V5
9
SOCKS CASE STUDY:
HTTP PROXY WITH FIREWALL
User
FireWall
Web Server
Internet
Web/HTTP
Proxy
Control by Administrator
Contents are readable by Administrator.
Use for controlling user access to external sites.
10
SOCKS CASE STUDY:
SOCKS PROXY WITH FIREWALL
User
FireWall
Unapproved
Web Server
Internet
Web/HTTP
Proxy
SOCKS Proxy
Use SSH to connect with
SOCKS Proxy to prevent
snooping by Administor
11
SOCKS Proxy overview behind firewall
SOCKS CASE STUDY:
SOCKS PROXY
User
Web Server
Internet
SOCKS Proxy
SOCKS only provides limited anonymity.
Mask traffic-source with socks proxy.
=> Information sent are still NOT secured.
Data sent between User and SOCKS Proxy are not secured.
No Confidentiality/Integrity is guaranteed
Authentication is available in Version 5 only.
Recommend to use SSH Tunnel between User and SOCKS Proxy.
HTTP Request still in clear text leaving SOCKS Proxy => Use HTTPS.
12
SOCKS CASE STUDY:
ANONYMITY SOFTWARE USING SOCKS
Remote
Server
User
Node
SOCKS Proxy
Node
Node
Node
Node
Node
TOR uses SOCKS proxy to provide anonymity to
users.
13
REFERENCE
Wikipedia:
RFC 1929
Username/Password Authentication for SOCKS ver 5
RFC1928
http://en.wikipedia.org/wiki/SOCKS
SOCKS Protocol ver 5
RFC 1961
GSS-API Authentication Method for SOCKS ver 5
14
?
15