Home page logo
/

basics logo Security Basics mailing list archives

RE: socks 5
From: "Rivera Alonso, David" <drivera () iberdrola es>
Date: Tue, 23 Mar 2004 17:41:07 +0100


Who called it a tunnel?

I said it's a protocol (it is, actually) to build application tunnels (call
it application proxy if you want, but SOCKS is a protocol, with its own
specifications.

thanks,

DAVID

-----Mensaje original-----
De: Shawn Jackson [mailto:sjackson () horizonusa com] 
Enviado el: martes, 23 de marzo de 2004 17:28
Para: Rivera Alonso, David; Kenzo; security-basics () securityfocus com
Asunto: RE: socks 5


Socks is a protocol to build kind of tunnels for TCP/IP applications

Socks is a application (OSI) level proxy and is used to exert control
over data flowing through it. Companies setup SOCK proxies to have more
fine grain control over the data that flows in and out of their network.

Calling SOCKS a tunnel is extremely misleading, it's just a application
proxy.

Shawn Jackson
Systems Administrator
Horizon USA
1190 Trademark Dr #107
Reno NV 89521

www.horizonusa.com
Email: sjackson () horizonusa com
Phone: (775) 858-2338
       (800) 325-1199 x338




=============================
Este mensaje se dirige exclusivamente a su destinatario.
Puede contener informacion confidencial sometida a secreto profesional o cuya divulgacion
este prohibida, en virtud de la legislacion vigente. No esta permitida su divulgacion,
copia o distribucion a terceros sin la autorizacion previa y por escrito de Iberdrola.
Si ha recibido este mensaje por error, le rogamos nos lo comunique inmediatamente
por esta misma via y proceda a su destruccion.

This e-mail is intended exclusively for the individual or entity to which it is addressed
and may contain confidential or legally privileged information, which may not be disclosed
under current legislation. Any form of disclosure, copying or distribution of this e-mail
is strictly prohibited, save with written authorisation from Iberdrola.
If you have received this message in error, please notify the sender immediately by e-mail
and delete all copies of the message.
=============================

---------------------------------------------------------------------------
Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off 
any course! All of our class sizes are guaranteed to be 10 students or less 
to facilitate one-on-one interaction with one of our expert instructors. 
Attend a course taught by an expert instructor with years of in-the-field 
pen testing experience in our state of the art hacking lab. Master the skills 
of an Ethical Hacker to better assess the security of your organization. 
Visit us at: 
http://www.infosecinstitute.com/courses/ethical_hacking_training.html
----------------------------------------------------------------------------


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]