亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? socks5.conf.5

?? sock5代理服務器源代碼
?? 5
字號:
.TH socks5.conf 5 "02 May 1997".SH NAMEsocks5.conf \- Configuration file for the socks5 daemon.SH SYNOPSISThe socks5 daemon usually reads the configuration file in /etc/socks5.conf. When you configure and build socks5 with the.PP.RS 5--with-srvconffile=\fIfilename\fP.RE.PPoption, you can change the directory. Under FreeBSD's UNIX port, the configuration file resides in /usr/local/etc/socks5.conf..SH DESCRIPTIONThe socks5 daemon reads the configuration file when it starts and each time it receives an HUP signal. The configuration file contains the information the server needs to determine:.RS 5- the interface to use to reach an address.br - when the server should connect directly to an address.br- when the server should use another proxy server.br- the necessary requirements to make a proxy connection.RE.PPThe configuration file contains six sections:.RS 5- ban host .br- authentication.br - interfaces.br- variables and flags.br- proxies.br- access control.RE.PPIn each section, the socks5 daemon sequentially reads each line until it encounters a matching line for that section. The order of sections and the order of lines within a section are crucial to achieving the desired result. Every entry in a line must match..SH BAN HOST ENTRIESBan host entries identify hosts from which the socks5 daemon should not accept connections and use the syntax:.PP.RS 5ban \fIsource-host source-port\fP.RE.TP 15.B banIndicates not to attempt authentication.TP.B \fIsource-host\fPMust be a valid \fIhostpattern\fP.TP\fIsource-port\fPMust be a valid \fIportpattern\fP.PPThe socks5 daemon refuses connections originating from clients on \fIsource-port\fP at \fIsource-host\fP..SH AUTHENTICATION ENTRIESAuthentication entries identify the types of authentication the socks5 daemon can use. Authentication lines use the syntax:.PP.RS 5auth \fIsource-host source-port auth-methods\fP.RE.TP 15.B authIdentifies the entry as an authentication entry.TP.B \fIsource-host\fPMust be a valid \fIhostpattern\fP.TP\fIsource-port\fPMust be a valid \fIportpattern\fP.TP .B \fIauth-methods\fPMust be a valid \fIauthpattern\fP.PPThe socks5 daemon authenicates clients that originate on \fIsource-port\fP at \fIsource-host\fP using \fIauth-methods\fP..PPWhen the configuration file does not contain \fB auth\fP lines, any authentication works. Omitting auth lines is the same as specifying an \fIauthpattern\fP containing -, any authentication.  If \fBauth\fP lines are used, clients not matching will be refused..PPWhen the socks5 daemon does not require authentication, it receives no user information unless socks5 configuration requires ident responses. Use the SOCKS5_DEMAND_IDENT environment variable to require ident responses. See socks5(1) for a complete description of socks5 environment variables.To ensure that the socks5 daemon receives usernames from the client, and to allow socks4 clients to use the server, set the \fIauthpattern\fP order to n,u. With socks5 clients, the socks daemon chooses Username/Password authentication before no authentication..PPThe socks5 daemon checks \fIauth-methods\fP in reverse order, beginning with the last \fIauth-method\fP in \fIauthpattern\fP. .PP.SH INTERFACE ENTRIESOn machines with multiple interfaces, and therefore multiple IP addresses, frequently administrators want to ensure that socks5 uses certain interfaces with certain addresses. This prevents outside machines from impersonating inside machines by requiring inside machines to use the inside interface and outside machines to use the outside interface. It also allows socks5 to determine on which interface to bind when accepting a bind request, or when issuing a sendto request. .PPWhen socks5 fails to find a match in the configuration file, it uses INADDR_ANY to bind, and receives a connection on any interface. .PPSingle-homed hosts do not require interface entries. Only machines with more than one interface should use interface entries..PP Use this format for interface entries in the socks5.conf file:.RS 5.TP interface \fIhostpattern portpattern interface-address\fP.RE.TP 18.B interfaceIdentifies interface entries.TP\fIhostpattern\fPContains a source or destination host for a connection.TP\fIportpattern\fPContains a source or destination port for a connectionpattern\fP.TP.B \fIinterface-address\fPIdentifies the IP address of an interface card or the name of the interface, for example le0..PPWhen \fIhostpattern\fP or \fIportpattern\fP specify a source address, the patterns define the \fIinterface-address\fP clients must use to connect to the socks5 server when connecting from the host defined in \fIhostpattern\fP or the port defined in \fIportpattern\fP. Connection attempts from interface addresses other than \fIinterface-address\fP fail.When \fIhostpattern\fP or \fIportpattern\fP specify a destination address, the patterns define the interface address the socks5 daemon uses to connect to the host defined in \fIhostpattern\fP or the port defined in \fIportpattern\fP.The \fIinterface\fP entry replaces the \fIroute\fP entry of previous releases.  For the current release, the entries are equivalent.  In future releases, support for \fIroute\fP entries may be removed. .pp.PP.SH VARIABLE ENTRIESVariables and flags in the configuration file control the amount and types of logging and information messages. The configuration file syntax for initializing variables is:.RS 5.TPset \fIvariable\fP \fIvalue\fP.RE.PP.TP 10setIdentifies entries that initialize environment variables for internal use..PRefer to the socks5(1) ENVIRONMENT section for complete details about socks5 environment variables and values..PP.SH PROXY ENTRIESProxy entries describe the addresses clients can only reach through other SOCKS servers and identify how the daemon contacts the host. The daemon contacts the host directly when the configuration file does not contain an entry for that host..RS 5.PP.I proxy-type dest-host dest-port proxy-list.RE.PP.TP 15\fIproxy-type\fPSpecifies the type of proxy server. Valid entries include: .RS 20.TP 10socks5SOCKSv5.TPsocks4SOCKS version 4.TPnoproxyMake direct connection.RE.TP 15.B \fIdest-host\fPMust be a valid \fIhostpattern\fP.TP.B \fIdest-port\fPMust be a valid \fIportpattern\fP.TP.B \fIproxy-list\fPMust be a valid \fIproxypattern\fP and identifies the proxy server(s) to use. .PPThe daemon uses the servers in \fIproxy-list\fP to connect to \fIdest-port\fP on \fIdest-host\fP. The servers is \fIproxy-list\fP must be the same type servers as \fIproxy-type\fP..PP.SH ACCESS CONTROL ENTRIESThe access control section determines when the server permits or denies a request to establish a connection. The socks5 daemon denies a request if an access control line does not match the request, even after it has authenticated the host. .PPThere are two types of lines, permit lines and deny lines, with this syntax:.PP.RS 5permit \fIauth cmd src-host dest-host\fP \\.RE.RS 8\fIsrc-port dest-port [user-list]\fP.RE.PP.RS 5deny \fIauth cmd src-host dest-host\fP \\.RE.RS 8\fI src-port dest-port [user-list]\fP.RE.PP.TP 12.B \fIauth\fPMust be a valid \fIauthpattern\fP and specifies a list of authentication methods..TP.B \fIcmd\fPMust be a valid \fIcommandpattern\fP and specifies the commands clients on \fIsrc-host\fP can execute on \fIdest-host\fP..TP.B \fIsrc-host\fPMust be a valid \fIhostpattern\fP.TP.B \fIdest-host\fPMust be a valid \fIhostpattern\fP.TP.B \fIsrc-port\fPMust be a valid \fIportpattern\fP.TP.B \fIdest-port\fPMust be a valid \fIportpattern\fP .TP .B \fIuser-list\fPMust be a valid \fIuserpattern\fP..PPThe entire line matches only when all the entries match..PP.SH PATTERNS.SH \fIhostpattern\fPsocks5 requires host addresses and netmasks to determine the hosts that apply to a socks5.conf entry. Specify the host/mask pair as a \fIhostpattern\fP, using the format: .TP 15.B hostip/maskMatches when a host address bitwise anded with the mask equals the hostip anded with the mask. Use the hostip/mask to mask the host portion of the address from the network or subnetwork portion..TP.B -all hosts match.TP.B n1.equivalent to n1.0.0.0/255.0.0.0.TP.B n1.n2.equivalent to n1.n2.0.0/255.255.0.0.TP.B n1.n2.n3.equivalent to n1.n2.n3.0/255.255.255.0.TP.B .domain.namehostname must end with .domain.name.TP.B a.host.namehostname must match exactly with a.host.name..PPIf domain names are used, SOCKS5_REVERSEMAP must be set.  Because hostnames and domains depend on DNS, using IP addresses and netmasks is recommended.  In many cases, reverse DNS maps are not implemented or incorrect..PPAlthough socks5.conf supports older \fIhostpattern\fP syntax, we recommend using the newer method. The newer method is also easier to read. The older \fIhostpattern\fP syntax is:.RS 5.TP 15.B hostip/aall hosts match, same as "-".TP.B hostip/nnetwork match. Masks the host and subnet portions of the address, leaving the network portion. The IP address class for hostip determines the mask..TP.B hostip/ssubnet match. Masks the host portion of the address, leaving the subnetwork and network portion. The IP address class for hostip determines the mask..TP.B hostip/hhost match, the same as hostip.RE.PP.SH \fIportpattern\fPSpecify ports in a \fIportpattern\fP as a service name, number, or range. Enclose ranges in brackets to indicate the range is inclusive, or parentheses to indicate the range is non-inclusive. Specify the range as two port names or numbers, separated by a comma, with no white space..RS 5.TP 15.B tftpthe service port for tftp, usually port 69.TP.B 80port 80.TP.B -all ports.TP.B [100,1000]ports 100 through 1000.TP.B (100,1000)ports 101 through 999.TP.B (100,1000]ports 101 through 1000.RE.PP.SH \fIauthpattern\fPSpecify authentication methods in an \fIauthpattern\fP as a comma separated list of letters, with no white space. The socks5 daemon checks \fI auth-methods\fP in reverse order, beginning with the last \fIauth-method\fP in \fI authpattern\fP. socks5.conf recognizes these authentication methods:.RS 5.TP.B nNo authentication. If you built the socks5 daemon with ident, the server authenticates UNIX users..TP.B uUsername/Password.TP.B kKerberos 5 (GSS-API).TP.B -any authentication method .RE.PPThe last \fIauth-method\fP listed takes precedence over the methods listed first. For example, if you list:.RS 5.PPn,u,k .PP.REthe server requests Kerberos authentication for socks5 clients. If the socks5 client is not set up to use Kerberos, the server uses Username/Password authentication. .PPSince SOCKS4 clients can not use Kerberos or Username/Password authentication, the server does not require authentication for SOCKS4 clients. .PPIf you list:.RS 5.PPn,k,u.PP.REthe server requests Username/Password authentication for socks5 clients. Since SOCKS4 clients can not use Username/Password or Kerberos authentication, the server does not require authentication for SOCKS4 clients. .PP.SH \fIcommandpattern\fPSpecify commands in a \fIcommandpattern\fP as a comma separated list of letters, with no white space. socks5.conf recognizes these commands:.RS 5.TP.B cconnect.TP.B bbind.TP.B uUDP.TP.B pping.TP.B ttraceroute.TP.B -all commands.RE.PP.SH \fIuserpattern\fPSpecify multiple users in a \fIuserpattern\fP as a comma separated list of individual users, with no white space and no wild card patterns..PPThe user type must match the authentication method. For example, when you specify Username/Password authentication, the socks5 daemon expects socks5 users. When you specify Kerberos authentication, the socks5 daemon expects Kerberos users. A dash, -, matches all users.When you specify u and k in the \fIauthpattern\fP, \fIuserpattern\fP can contain valid Kerberos and socks5 users..PP.SH \fIproxypattern\fPSpecify socks5 daemons in a \fIproxypattern\fP as a comma separated list of \fIserver-entries\fP, with no white space. .PPSpecify servers in order of preference. The client attempts to connect to servers in the order in which they are listed in the \fIproxypattern\fP. It only attempts connections to a server when the preceeding server is not available. .PP.SH \fIserver-entries\fPA server entry is a hostname or IP address, optionally followed by a colon and the port number, with no white space. When you omit the port number, socks5 uses the default port..RS 5.TP 15.B hosthostname, default port.TP.B host:porthostname, specified port.PP.RE.PP.SH EXAMPLESRefer to the examples directory for more complete examples..PP.RS 5auth - - k.brpermit k - 111.111.111. - - -.RE.PPOnly kerberos authenticated users from the class C network 111.111.111.0 can use the server..PP.RS 5socks5 - - s5srv1,s5srv2.brpermit - - .mydomain.com - - -.RE.PPAll socks5 requests connect through s5srv1. If s5srv1 is not available, all socks5 requests connect through s5srv2.  Only clients from .mydomain.com can use the server..PP.RS 5auth otherserver - k.brnoproxy .internal.net.com -.brsocks5 - - otherserver.brpermit - - .internal.net.com - - -.brpermit k - otherserver - - -.br.RE.PPClients from .internal.net.com can use the server without kerberos authentication.The socks5 server will connect directly to .internal.net.com hosts and proxy throughanother socks5 server, otherserver, for other hosts.  For the other socks5 server,otherserver, to proxy through this socks5 server, it must authenticate with kerberos..PP.SH POOR CONFIGURATIONSAs with any software that has security issues, proper configuration is a \fBmust\fP.  The line.PPpermit - - - - - -.PPshould never be used.  With this configuration, malicious users could use the socks5server to hide their attack of other systems.  Always try to restrict based on sourceor destination host..PP.SH SEE ALSOsocks5(1), libsocks5.conf(5), sockd4_to_5.pl(1).PP.SH AUTHORSNWSL SOCKS5 Development Team.PPSend comments to socks5-comments@socks.nec.com

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日本不卡一二三区黄网| 国产成人激情av| 国产精品系列在线观看| 91精彩视频在线观看| 欧美精品一区二区三区在线 | 另类小说一区二区三区| 不卡的电影网站| 精品日韩欧美在线| 天天av天天翘天天综合网| www.亚洲国产| 国产欧美视频在线观看| 日本亚洲天堂网| 欧美性xxxxxxxx| 欧美国产乱子伦 | 亚洲国产一区视频| 99精品黄色片免费大全| 久久女同精品一区二区| 日本大胆欧美人术艺术动态| 在线亚洲一区二区| 国产精品久久久久久久浪潮网站 | 国产日本欧美一区二区| 亚洲电影在线免费观看| 91亚洲国产成人精品一区二区三 | a4yy欧美一区二区三区| 久久人人超碰精品| 国产资源精品在线观看| 日韩欧美中文字幕精品| 日本欧美在线观看| 欧美一级片在线看| 美美哒免费高清在线观看视频一区二区 | 日本一区二区三区四区在线视频 | 欧美性一二三区| 亚洲图片另类小说| 99久久精品免费| 综合av第一页| 色综合天天做天天爱| 亚洲免费在线电影| 欧美三级日韩在线| 日日欢夜夜爽一区| 精品sm在线观看| 盗摄精品av一区二区三区| 国产精品污www在线观看| av电影在线观看完整版一区二区| 中文字幕一区二区三区蜜月| av成人老司机| 亚洲国产三级在线| 欧美一级电影网站| 国产麻豆一精品一av一免费| 国产精品天干天干在线综合| 91蝌蚪porny| 午夜精品福利一区二区蜜股av| 欧美日本韩国一区二区三区视频| 日本不卡的三区四区五区| 26uuu国产在线精品一区二区| 国产99久久精品| 亚洲激情中文1区| 欧美一区二区三区精品| 国产成人精品影院| 一区二区高清在线| 日韩一区二区三| 99久久久国产精品| 婷婷国产在线综合| 国产亚洲短视频| 在线观看一区二区精品视频| 日韩中文字幕1| 久久人人爽人人爽| 在线免费视频一区二区| 激情另类小说区图片区视频区| 国产午夜亚洲精品羞羞网站| 欧美无砖专区一中文字| 国产九色sp调教91| 亚洲一区二区中文在线| 久久精品亚洲一区二区三区浴池| 91视频xxxx| 另类专区欧美蜜桃臀第一页| 亚洲色欲色欲www在线观看| 日韩女优制服丝袜电影| 色综合久久综合| 国产一区二区影院| 午夜精品视频在线观看| 国产精品乱人伦| 精品久久久久久久久久久院品网| 色综合网站在线| 国产成人精品一区二区三区四区 | 高清国产一区二区三区| 日本特黄久久久高潮| 国产精品免费久久| 精品美女在线观看| 欧美日韩国产不卡| 99国产麻豆精品| 国产福利一区在线观看| 免费观看一级欧美片| 亚洲日本在线a| 国产午夜精品一区二区三区视频 | 国产精品嫩草影院av蜜臀| 日韩女同互慰一区二区| 欧美在线观看禁18| jlzzjlzz欧美大全| 蜜臀av一区二区| 性欧美疯狂xxxxbbbb| 一区二区三区四区视频精品免费| 欧美国产日产图区| 亚洲国产精品二十页| 欧美精品一区二区三区蜜桃视频| 欧美精品免费视频| 欧美日韩在线免费视频| 色狠狠桃花综合| av中文一区二区三区| 不卡一区二区三区四区| caoporen国产精品视频| 国产成人精品亚洲日本在线桃色| 国产在线一区观看| 国产尤物一区二区| 国产精品亚洲专一区二区三区| 国产一区二区三区免费在线观看| 麻豆国产欧美日韩综合精品二区| 美女视频黄免费的久久| 麻豆国产精品官网| 国内精品在线播放| 国产精品一级黄| 成人精品国产福利| 成人黄色在线视频| 91首页免费视频| 在线观看成人免费视频| 欧美日韩日本视频| 日韩小视频在线观看专区| 精品国产乱码久久久久久免费 | 91精品国产高清一区二区三区蜜臀 | 免费成人美女在线观看.| 奇米影视一区二区三区| 黑人巨大精品欧美一区| 国产成人自拍网| 成人精品国产一区二区4080| 在线观看精品一区| 欧美男男青年gay1069videost| 欧美一级理论性理论a| 精品国产免费一区二区三区四区 | 日韩精品一区二区三区在线| 久久九九久久九九| 国产精品成人免费在线| 亚洲自拍偷拍av| 久久国产乱子精品免费女| 成人免费看黄yyy456| 欧美伊人久久大香线蕉综合69 | 日韩免费高清av| wwww国产精品欧美| 亚洲区小说区图片区qvod| 秋霞午夜av一区二区三区| 成人精品视频.| 在线播放日韩导航| 久久精品这里都是精品| 亚洲柠檬福利资源导航| 麻豆传媒一区二区三区| 成人免费毛片片v| 制服丝袜日韩国产| 亚洲欧洲日本在线| 蜜臂av日日欢夜夜爽一区| 一本色道**综合亚洲精品蜜桃冫| 51精品视频一区二区三区| 国产精品久久福利| 蜜桃视频免费观看一区| 色综合天天综合网国产成人综合天 | 在线一区二区三区四区| 久久网站热最新地址| 亚洲成人av资源| 成人av资源站| 欧美变态口味重另类| 亚洲一区二区三区不卡国产欧美 | 1024成人网| 精品午夜一区二区三区在线观看| 一本到不卡免费一区二区| 久久综合99re88久久爱| 日韩一区欧美二区| 一本大道综合伊人精品热热| 久久精品夜色噜噜亚洲aⅴ| 人人精品人人爱| 欧美日韩国产在线播放网站| 亚洲情趣在线观看| 成人免费视频一区| 国产清纯美女被跳蛋高潮一区二区久久w | 欧美影院精品一区| 一区二区三区国产精品| 国产 欧美在线| 精品剧情在线观看| 日本91福利区| 日韩视频一区二区在线观看| 亚洲一区二区欧美| 欧美亚洲图片小说| 樱花草国产18久久久久| 一本色道a无线码一区v| 亚洲精品一二三| 91视频观看免费| 国产精品电影一区二区三区| 波多野结衣欧美| 国产精品二区一区二区aⅴ污介绍| 国产不卡高清在线观看视频| 国产午夜亚洲精品羞羞网站| 国产成人综合网站| 欧美韩日一区二区三区四区| 成人毛片在线观看|