socks.8 2.0 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677
  1. .TH socks "8" "July 2009" "3proxy 0.7" "Universal proxy server"
  2. .SH NAME
  3. .B socks
  4. \- SOCKS 4/4.5/5 gateway service
  5. .SH SYNOPSIS
  6. .BR "socks " [ -d ]
  7. .IB \fR[ -l \fR[ \fR[ @ \fR] logfile \fR]]
  8. .IB \fR[ -p port\fR]
  9. .IB \fR[ -i internal_ip\fR]
  10. .IB \fR[ -e external_ip\fR]
  11. .SH DESCRIPTION
  12. .B socks
  13. is SOCKS server. It supports SOCKSv4, SOCKSv4.5 (extension to v4 for
  14. server side name resolution) and SOCKSv5. SOCKSv5 specification allows both
  15. outgoing and reverse TCP connections and UDP portmapping.
  16. .SH OPTIONS
  17. .TP
  18. .B -I
  19. Inetd mode. Standalone service only.
  20. .TP
  21. .B -d
  22. Daemonise. Detach service from console and run in the background.
  23. .TP
  24. .B -t
  25. Be silenT. Do not log start/stop/accept error records.
  26. .TP
  27. .B -u
  28. Never ask for username authentication
  29. .TP
  30. .B -e
  31. External address. IP address of interface proxy should initiate connections
  32. from. External IP must be specified if you need incoming connections.
  33. By default system will deside which address to use in accordance
  34. with routing table.
  35. .TP
  36. .B -i
  37. Internal address. IP address proxy accepts connections to.
  38. By default connection to any interface is accepted. It\'s usually unsafe.
  39. .TP
  40. .B -p
  41. Port. Port proxy listens for incoming connections. Default is 1080.
  42. .TP
  43. .B -l
  44. Log. By default logging is to stdout. If
  45. .I logfile
  46. is specified logging is to file. Under Unix, if
  47. .RI \' @ \'
  48. preceeds
  49. .IR logfile ,
  50. syslog is used for logging.
  51. .SH CLIENTS
  52. You should use client with SOCKS support or use some socksification support
  53. (for example
  54. .I SocksCAP
  55. or
  56. .IR FreeCAP ).
  57. Configure client to use
  58. .I internal_ip
  59. and
  60. .IR port .
  61. SOCKS allows to use almost any application protocol without limitation. This
  62. implementation also allows to open priviledged port on server (if socks has
  63. sufficient privileges). If you need to control access use
  64. .BR 3proxy (8)
  65. instead.
  66. .SH BUGS
  67. Report all bugs to
  68. .BR 3proxy@security.nnov.ru
  69. .SH SEE ALSO
  70. 3proxy(8), proxy(8), ftppr(8), pop3p(8), tcppm(8), udppm(8), syslogd(8),
  71. .br
  72. http://3proxy.ru/
  73. .SH AUTHORS
  74. 3proxy is designed by 3APA3A
  75. .RI ( 3APA3A@security.nnov.ru ),
  76. Vladimir Dubrovin
  77. .RI ( vlad@sandy.ru )