Hi Hosnieh,

Just out of curiosity, is there any particular reason you want to use SOCKS? 
Did you consider other protocols such as:

·         https://tools.ietf.org/html/rfc6887

·         https://tools.ietf.org/html/rfc7652

Thank you.

Cheers,
Med

De : Int-area [mailto:[email protected]] De la part de Hosnieh Rafiee
Envoyé : mercredi 5 juillet 2017 21:21
À : [email protected]
Objet : [Int-area] Review> SOCKS 6 Draft


Hello,

I quickly reviewed Socks6 document as I was waiting for any initiation to 
improve socks 5. I found it a good document, however, unfortunately the 
security is still weak and this document also did not address that but made it 
worse. I am looking for new methods of authentication as what is available in 
socks5 is just plain text and cannot protect against active attacker and also 
passive attacker if and if there is a fixed value used as a username and 
password.

Further, DDoS attack mentioned also in the draft cannot be addressed as easily 
as explained, IMHO. since the proxy server supposed to receive higher size 
messages and the attacker client can only overwhelm the socks server easier by 
less messages from different IP address that sounds to be a new client.  
Further, for constrained devices, there is a limitation in size of the message, 
therefore, dissimilar to socks5 that could be used also for such devices, socks 
6 cannot be used otherwise there will be limit in the information supposed to 
be sent in one message.

https://tools.ietf.org/html/draft-intarea-olteanu-socks-6-00.html

But in general, that is a good effort, keep going on!

Best,

Hosnieh


_______________________________________________
Int-area mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/int-area

Reply via email to