linux可以架socks5 server嗎?

這個版面主要討論 debian 在 server 端的應用問題, server 種類繁多..舉凡 Web Server 、 File Server、 DHCP Server..等等。

版主: 阿信

linux可以架socks5 server嗎?

文章THQ » 週六 1月 14, 2006 10:01 pm

linux可以架socks5 server嗎
thx
THQ
活潑的高中生
活潑的高中生
 
文章: 492
註冊時間: 週二 1月 04, 2005 9:11 pm

文章訪客 » 週日 1月 15, 2006 1:45 am

可以,試試
tsocks
proxychains

此外,似乎還有其他選擇, 您google多找找囉.
訪客
 

文章THQ » 週日 1月 15, 2006 2:19 pm

我裝了socks4-server 在aptitude裡有這個檔案
可是我找半天,都沒有一個可執行檔
我該如何使用呢?
thx
THQ
活潑的高中生
活潑的高中生
 
文章: 492
註冊時間: 週二 1月 04, 2005 9:11 pm

文章d2207197 » 週日 1月 15, 2006 5:08 pm

哪裡沒有執行檔?
代碼: 選擇全部
$ apt-file list socks4-server |grep bin/
socks4-server: usr/sbin/dump_sockdfc
socks4-server: usr/sbin/dump_sockdfr
socks4-server: usr/sbin/make_sockdfc
socks4-server: usr/sbin/make_sockdfr
socks4-server: usr/sbin/rsockd
socks4-server: usr/sbin/sockd


先學會用 dpkg -L 吧~~
頭像
d2207197
鑽研的研究生
鑽研的研究生
 
文章: 1763
註冊時間: 週二 5月 27, 2003 9:57 pm
來自: 火星

文章THQ » 週日 1月 15, 2006 8:40 pm

剛有找了一些線上的教學,改了一些設定檔
雖然可以連到linux那台,但似乎拒絕連線..
不知有誰有實作過socks server這部份?
THQ
活潑的高中生
活潑的高中生
 
文章: 492
註冊時間: 週二 1月 04, 2005 9:11 pm

文章訪客 » 週日 1月 15, 2006 9:22 pm

THQ 寫:剛有找了一些線上的教學,改了一些設定檔
雖然可以連到linux那台,但似乎拒絕連線..
不知有誰有實作過socks server這部份?


我做過...
不過太簡單, 忘了是怎麼做的. 猜想大概是這樣.
apt-get install dante-server
/etc/danted.conf隨便設一下.
done...

--
好像講的比做起來更簡單...
--
danted.conf長的像這樣:


logoutput: /var/log/danted
internal: eth2 port = 1080
internal: 127.0.0.1 port = 1080
external: 168.95.123.123
method: none
clientmethod: none
user.notprivileged: nobody
user.libwrap: nobody
client pass {
from: 203.204.205.206/32 port 1-65535 to: 0.0.0.0/0
log: connect error
}

client pass {
from: 127.0.0.0/8 port 1-65535 to: 0.0.0.0/0
}

# drop everyone else as soon as we can and log the connect, they are not
# on our net and have no business connecting to us. This is the default
# but if you give the rule yourself, you can specify details.
client block {
from: 0.0.0.0/0 to: 0.0.0.0/0
log: connect error
}
block {
from: 0.0.0.0/0 to: 127.0.0.0/8
log: connect error
}

pass {
from: 203.204.205.206/32 to: 0.0.0.0/0
protocol: tcp udp
}

pass {
from: 127.0.0.0/8 to: 0.0.0.0/0
protocol: tcp udp
}

block {
from: 0.0.0.0/0 to: 0.0.0.0/0
log: connect error
}
訪客
 

文章THQ » 週日 1月 15, 2006 10:54 pm

試了danted一樣會拒絶連線
我的danted.conf
代碼: 選擇全部
# $Id: sockd.conf,v 1.41 2001/12/12 13:56:41 karls Exp $
#
# A sample sockd.conf
#
#
# The configfile is divided into two parts; first serversettings,
# then the rules.
#
# The recommended order is:
#   Serversettings:
#               logoutput
#               internal
#               external
#               method
#               clientmethod
#               users
#               compatibility
#               extension
#               connecttimeout
#               iotimeout
#      srchost
#
#  Rules:
#   client block/pass
#      from to
#      libwrap
#      log
#
#     block/pass
#      from to
#      method
#      command
#      libwrap
#      log
#      protocol
#      proxyprotocol

# the server will log both via syslog, to stdout and to /var/log/lotsoflogs
#logoutput: syslog stdout /var/log/lotsoflogs
logoutput: stderr

# The server will bind to the address 10.1.1.1, port 1080 and will only
# accept connections going to that address.
#internal: 10.1.1.1 port = 1080
# Alternatively, the interface name can be used instead of the address.
internal: eth0 port = 1080

# all outgoing connections from the server will use the IP address
# 195.168.1.1
external:ppp0

# list over acceptable methods, order of preference.
# A method not set here will never be selected.
#
# If the method field is not set in a rule, the global
# method is filled in for that rule.


# methods for socks-rules.
# method: username none #rfc931
# methods for client-rules.
#clientmethod: none
#clientmethond: none
#or if you want to allow rfc931 (ident) too
method: username none
method: none
#or for PAM authentification
#method: pam

#
# An important section, pay attention.
#

# when doing something that can require privilege, it will use the
# userid:
#user.privileged: proxy

# when running as usual, it will use the unprivileged userid of:
user.notprivileged: nobody

# If you compiled with libwrap support, what userid should it use
# when executing your libwrap commands?  "libwrap".
user.libwrap: nobody


#
# some options to help clients with compatibility:
#

# when a client connection comes in the socksserver will try to use
# the same port as the client is using, when the socksserver
# goes out on the clients behalf (external: IP address).
# If this option is set, Dante will try to do it for reserved ports aswell.
# This will usually require user.privileged to be set to "root".
#compatibility: sameport

# If you are using the bind extension and have trouble running servers
# via the server, you might try setting this.  The consequences of it
# are unknown.
#compatibility: reuseaddr

#
# The Dante server supports some extensions to the socks protocol.
# These require that the socks client implements the same extension and
# can be enabled using the "extension" keyword.
#
# enable the bind extension.
#extension: bind


#
#
# misc options.
#

# how many seconds can pass from when a client connects til it has
# sent us it's request?  Adjust according to your network performance
# and methods supported.
#connecttimeout: 30   # on a lan, this should be enough if method is "none".

# how many seconds can the client and it's peer idle without sending
# any data before we dump it?  Unless you disable tcp keep-alive for
# some reason, it's probably best to set this to 0, which is
# "forever".
#iotimeout: 0 # or perhaps 86400, for a day.

# do you want to accept connections from addresses without
# dns info?  what about addresses having a mismatch in dnsinfo?
#srchost: nounknown nomismatch

#
# The actual rules.  There are two kinds and they work at different levels.
#
# The rules prefixed with "client" are checked first and say who is allowed
# and who is not allowed to speak/connect to the server.  I.e the
# ip range containing possibly valid clients.
# It is especially important that these only use IP addresses, not hostnames,
# for security reasons.
#
# The rules that do not have a "client" prefix are checked later, when the
# client has sent its request and are used to evaluate the actual
# request.
#
# The "to:" in the "client" context gives the address the connection
# is accepted on, i.e the address the socksserver is listening on, or
# just "0.0.0.0/0" for any address the server is listening on.
#
# The "to:" in the non-"client" context gives the destination of the clients
# socksrequest.
#
# "from:" is the source address in both contexts.
#


# the "client" rules.  All our clients come from the net 10.0.0.0/8.
#

# Allow our clients, also provides an example of the port range command.
client pass {
   from:192.168.0.0/16 port 1-65535 to: 0.0.0.0/0
#   method: rfc931 # match all idented users that also are in passwordfile
}

# This is identical to above, but allows clients without a rfc931 (ident)
# too.  In practise this means the socksserver will try to get a rfc931
# reply first (the above rule), if that fails, it tries this rule.
client pass {
   from:127.0.0.0/8 port 1-65535 to: 0.0.0.0/0
}


# drop everyone else as soon as we can and log the connect, they are not
# on our net and have no business connecting to us.  This is the default
# but if you give the rule yourself, you can specify details.
client block {
   from: 0.0.0.0/0 to: 0.0.0.0/0
   log: connect error
}


# the rules controlling what clients are allowed what requests
#

# you probably don't want people connecting to loopback addresses,
# who knows what could happen then.
#block {
#   from: 0.0.0.0/0 to: 127.0.0.0/8
#   log: connect error
#}

# the people at the 172.16.0.0/12 are bad, no one should talk to them.
# log the connect request and also provide an example on how to
# interact with libwrap.
#block {
#   from: 0.0.0.0/0 to: 172.16.0.0/12
#   libwrap: spawn finger @%a
#   log: connect error
#}

# unless you need it, you could block any bind requests.
#block {
#   from: 0.0.0.0/0 to: 0.0.0.0/0
#   command: bind
#   log: connect error
#}

# or you might want to allow it, for instance "active" ftp uses it.
# Note that a "bindreply" command must also be allowed, it
# should usually by from "0.0.0.0/0", i.e if a client of yours
# has permission to bind, it will also have permission to accept
# the reply from anywhere.
#pass {
#   from: 10.0.0.0/8 to: 0.0.0.0/0
#   command: bind
#   log: connect error
#}

# some connections expect some sort of "reply", this might be
# the reply to a bind request or it may be the reply to a
# udppacket, since udp is packetbased.
# Note that nothing is done to verify that it's a "genuine" reply,
# that is in general not possible anyway.  The below will allow
# all "replies" in to your clients at the 10.0.0.0/8 net.
#pass {
#   from: 0.0.0.0/0 to: 10.0.0.0/8
#   command: bindreply udpreply
#   log: connect error
#}


# pass any http connects to the example.com domain if they
# authenticate with username.
# This matches "example.com" itself and everything ending in ".example.com".
#pass {
#   from: 10.0.0.0/8 to: .example.com port = http
#   log: connect error
#   method: username
#}

# block any other http connects to the example.com domain.
#block {
#   from: 0.0.0.0/0 to: .example.com port = http
#   log: connect error
#}

# everyone from our internal network, 10.0.0.0/8 is allowed to use
# tcp and udp for everything else.
pass {
   from: 192.168.0.0/16 to: 0.0.0.0/0
   protocol: tcp udp
}

pass {
   from: 127.0.0.0/8 to: 0.0.0.0/0
   protocol: tcp udp
}
# last line, block everyone else.  This is the default but if you provide
# one  yourself you can specify your own logging/actions
block {
   from: 0.0.0.0/0 to: 0.0.0.0/0
   log: connect error
}

錯誤訊息
代碼: 選擇全部
Jan 15 22:35:47 danted[6434]: socks_seteuid(): old: 0, new: 65534
Jan 15 22:35:47 danted[6434]: socks_reseteuid(): current: 65534, new: 0
Jan 15 22:35:47 danted[6434]: socks_seteuid(): old: 0, new: 65534
Jan 15 22:35:47 danted[6434]: socks_reseteuid(): current: 65534, new: 0
Jan 15 22:35:47 danted[6434]: socks_seteuid(): old: 0, new: 0
Jan 15 22:35:47 danted[6434]: socks_reseteuid(): current: 0, new: 0
Jan 15 22:35:47 danted[6434]: internal addresses (1):
Jan 15 22:35:47 danted[6434]:    192.168.0.3.1080
Jan 15 22:35:47 danted[6434]: external addresses (1):
Jan 15 22:35:47 danted[6434]:    address: ppp0, tcp: 0, udp : 0, op: none, end: 0
Jan 15 22:35:47 danted[6434]: external address rotation: none
Jan 15 22:35:47 danted[6434]: compatibility options:
Jan 15 22:35:47 danted[6434]: extensions enabled:
Jan 15 22:35:47 danted[6434]: logoutput goes to: "/var/log/stderr",
Jan 15 22:35:47 danted[6434]: cmdline options:
"configfile": "/etc/danted.conf",
"daemon": "0",
"debug": "1",
"keepalive": "1",
"linebuffer": "1",
"servercount": "1",
Jan 15 22:35:47 danted[6434]: resolveprotocol: udp
Jan 15 22:35:47 danted[6434]: srchost:
"nomismatch": "0",
"nounknown": "0",
Jan 15 22:35:47 danted[6434]: negotiate timeout: 120s
Jan 15 22:35:47 danted[6434]: i/o timeout: 86400s
Jan 15 22:35:47 danted[6434]: euid: 0
Jan 15 22:35:47 danted[6434]: userid:
"privileged": "root",
"unprivileged": "nobody",
"libwrap": "nobody",
Jan 15 22:35:47 danted[6434]: child.maxidlenumber: 0
Jan 15 22:35:47 danted[6434]: method(s): none
Jan 15 22:35:47 danted[6434]: clientmethod(s): none
Jan 15 22:35:47 danted[6434]: client-rules (3):
Jan 15 22:35:47 danted[6434]: client-rule #1, line #0
Jan 15 22:35:47 danted[6434]: verdict: pass
Jan 15 22:35:47 danted[6434]: src: address: 192.168.0.0/16, tcp: 1, udp : 1, op: range, end: 65535
Jan 15 22:35:47 danted[6434]: dst: address: 0.0.0.0/0, tcp: 0, udp : 0, op: none, end: 0
Jan 15 22:35:47 danted[6434]: method(s): none,
Jan 15 22:35:47 danted[6434]: log: connect, disconnect, error, iooperation,
Jan 15 22:35:47 danted[6434]: client-rule #2, line #0
Jan 15 22:35:47 danted[6434]: verdict: pass
Jan 15 22:35:47 danted[6434]: src: address: 127.0.0.0/8, tcp: 1, udp : 1, op: range, end: 65535
Jan 15 22:35:47 danted[6434]: dst: address: 0.0.0.0/0, tcp: 0, udp : 0, op: none, end: 0
Jan 15 22:35:47 danted[6434]: method(s): none,
Jan 15 22:35:47 danted[6434]: log: connect, disconnect, error, iooperation,
Jan 15 22:35:47 danted[6434]: client-rule #3, line #0
Jan 15 22:35:47 danted[6434]: verdict: block
Jan 15 22:35:47 danted[6434]: src: address: 0.0.0.0/0, tcp: 0, udp : 0, op: none, end: 0
Jan 15 22:35:47 danted[6434]: dst: address: 0.0.0.0/0, tcp: 0, udp : 0, op: none, end: 0
Jan 15 22:35:47 danted[6434]: method(s): none,
Jan 15 22:35:47 danted[6434]: log: connect, disconnect, error, iooperation,
Jan 15 22:35:47 danted[6434]: socks-rules (3):
Jan 15 22:35:47 danted[6434]: socks-rule #1, line #0
Jan 15 22:35:47 danted[6434]: verdict: pass
Jan 15 22:35:47 danted[6434]: src: address: 192.168.0.0/16, tcp: 0, udp : 0, op: none, end: 0
Jan 15 22:35:47 danted[6434]: dst: address: 0.0.0.0/0, tcp: 0, udp : 0, op: none, end: 0
Jan 15 22:35:47 danted[6434]: redirect from: address: 0.0.0.0/0, tcp: 0, udp : 0, op: none, end: 0
Jan 15 22:35:47 danted[6434]: redirect to: address: 0.0.0.0/0, tcp: 0, udp : 0, op: none, end: 0
Jan 15 22:35:47 danted[6434]: command(s): bind, bindreply, connect, udpassociate, udpreply,
Jan 15 22:35:47 danted[6434]: extension(s):
Jan 15 22:35:47 danted[6434]: protocol(s): tcp, udp,
Jan 15 22:35:47 danted[6434]: method(s): none,
Jan 15 22:35:47 danted[6434]: proxyprotocol(s): socks v4, socks v5,
Jan 15 22:35:47 danted[6434]: log: connect, disconnect, error, iooperation,
Jan 15 22:35:47 danted[6434]: socks-rule #2, line #0
Jan 15 22:35:47 danted[6434]: verdict: pass
Jan 15 22:35:47 danted[6434]: src: address: 127.0.0.0/8, tcp: 0, udp : 0, op: none, end: 0
Jan 15 22:35:47 danted[6434]: dst: address: 0.0.0.0/0, tcp: 0, udp : 0, op: none, end: 0
Jan 15 22:35:47 danted[6434]: redirect from: address: 0.0.0.0/0, tcp: 0, udp : 0, op: none, end: 0
Jan 15 22:35:47 danted[6434]: redirect to: address: 0.0.0.0/0, tcp: 0, udp : 0, op: none, end: 0
Jan 15 22:35:47 danted[6434]: command(s): bind, bindreply, connect, udpassociate, udpreply,
Jan 15 22:35:47 danted[6434]: extension(s):
Jan 15 22:35:47 danted[6434]: protocol(s): tcp, udp,
Jan 15 22:35:47 danted[6434]: method(s): none,
Jan 15 22:35:47 danted[6434]: proxyprotocol(s): socks v4, socks v5,
Jan 15 22:35:47 danted[6434]: log: connect, disconnect, error, iooperation,
Jan 15 22:35:47 danted[6434]: socks-rule #3, line #0
Jan 15 22:35:47 danted[6434]: verdict: block
Jan 15 22:35:47 danted[6434]: src: address: 0.0.0.0/0, tcp: 0, udp : 0, op: none, end: 0
Jan 15 22:35:47 danted[6434]: dst: address: 0.0.0.0/0, tcp: 0, udp : 0, op: none, end: 0
Jan 15 22:35:47 danted[6434]: redirect from: address: 0.0.0.0/0, tcp: 0, udp : 0, op: none, end: 0
Jan 15 22:35:47 danted[6434]: redirect to: address: 0.0.0.0/0, tcp: 0, udp : 0, op: none, end: 0
Jan 15 22:35:47 danted[6434]: command(s): bind, bindreply, connect, udpassociate, udpreply,
Jan 15 22:35:47 danted[6434]: extension(s):
Jan 15 22:35:47 danted[6434]: protocol(s): tcp, udp,
Jan 15 22:35:47 danted[6434]: method(s): none,
Jan 15 22:35:47 danted[6434]: proxyprotocol(s): socks v4, socks v5,
Jan 15 22:35:47 danted[6434]: log: connect, disconnect, error, iooperation,
Jan 15 22:35:47 danted[6434]: socks_seteuid(): old: 0, new: 65534
Jan 15 22:35:47 danted[6434]: socks_seteuid(): old: 65534, new: 0
Jan 15 22:35:47 danted[6434]: socks_seteuid(): old: 0, new: 65534
Jan 15 22:35:47 danted[6435]: created new negotiatorchild
Jan 15 22:35:47 danted[6435]: selectn(), timeout = NULL
Jan 15 22:35:47 danted[6436]: created new requestchild
Jan 15 22:35:47 danted[6437]: created new requestchild
Jan 15 22:35:47 danted[6438]: created new requestchild
Jan 15 22:35:47 danted[6439]: created new requestchild
Jan 15 22:35:47 danted[6440]: created new iochild
Jan 15 22:35:47 danted[6440]: selectn(), timeout = NULL
Jan 15 22:35:47 danted[6434]: dante/server v1.1.14 running
Jan 15 22:36:48 danted[6434]: sockdexit(): terminating on signal 2
Jan 15 22:36:51 danted[6468]: created new negotiatorchild
Jan 15 22:36:51 danted[6469]: created new requestchild
Jan 15 22:36:51 danted[6470]: created new requestchild
Jan 15 22:36:51 danted[6471]: created new requestchild
Jan 15 22:36:51 danted[6472]: created new requestchild
Jan 15 22:36:51 danted[6473]: created new iochild
Jan 15 22:36:51 danted[6467]: dante/server v1.1.14 running
Jan 15 22:36:54 danted[6467]: sockdexit(): terminating on signal 2
Jan 15 22:38:29 danted[6535]: socks_seteuid(): old: 0, new: 65534
Jan 15 22:38:29 danted[6535]: socks_reseteuid(): current: 65534, new: 0
Jan 15 22:38:29 danted[6535]: socks_seteuid(): old: 0, new: 65534
Jan 15 22:38:29 danted[6535]: socks_reseteuid(): current: 65534, new: 0
Jan 15 22:38:29 danted[6535]: socks_seteuid(): old: 0, new: 0
Jan 15 22:38:29 danted[6535]: socks_reseteuid(): current: 0, new: 0
Jan 15 22:38:29 danted[6535]: internal addresses (1):
Jan 15 22:38:29 danted[6535]:    192.168.0.3.1080
Jan 15 22:38:29 danted[6535]: external addresses (1):
Jan 15 22:38:29 danted[6535]:    address: ppp0, tcp: 0, udp : 0, op: none, end: 0
Jan 15 22:38:29 danted[6535]: external address rotation: none
Jan 15 22:38:29 danted[6535]: compatibility options:
Jan 15 22:38:29 danted[6535]: extensions enabled:
Jan 15 22:38:29 danted[6535]: logoutput goes to: "/var/log/stderr",
Jan 15 22:38:29 danted[6535]: cmdline options:
"configfile": "/etc/danted.conf",
"daemon": "0",
"debug": "1",
"keepalive": "1",
"linebuffer": "1",
"servercount": "1",
Jan 15 22:38:29 danted[6535]: resolveprotocol: udp
Jan 15 22:38:29 danted[6535]: srchost:
"nomismatch": "0",
"nounknown": "0",
Jan 15 22:38:29 danted[6535]: negotiate timeout: 120s
Jan 15 22:38:29 danted[6535]: i/o timeout: 86400s
Jan 15 22:38:29 danted[6535]: euid: 0
Jan 15 22:38:29 danted[6535]: userid:
"privileged": "root",
"unprivileged": "nobody",
"libwrap": "nobody",
Jan 15 22:38:29 danted[6535]: child.maxidlenumber: 0
Jan 15 22:38:29 danted[6535]: method(s): none
Jan 15 22:38:29 danted[6535]: clientmethod(s): none
Jan 15 22:38:29 danted[6535]: client-rules (3):
Jan 15 22:38:29 danted[6535]: client-rule #1, line #0
Jan 15 22:38:29 danted[6535]: verdict: pass
Jan 15 22:38:29 danted[6535]: src: address: 192.168.0.0/16, tcp: 1, udp : 1, op: range, end: 65535
Jan 15 22:38:29 danted[6535]: dst: address: 0.0.0.0/0, tcp: 0, udp : 0, op: none, end: 0
Jan 15 22:38:29 danted[6535]: method(s): none,
Jan 15 22:38:29 danted[6535]: log: connect, disconnect, error, iooperation,
Jan 15 22:38:29 danted[6535]: client-rule #2, line #0
Jan 15 22:38:29 danted[6535]: verdict: pass
Jan 15 22:38:29 danted[6535]: src: address: 127.0.0.0/8, tcp: 1, udp : 1, op: range, end: 65535
Jan 15 22:38:29 danted[6535]: dst: address: 0.0.0.0/0, tcp: 0, udp : 0, op: none, end: 0
Jan 15 22:38:29 danted[6535]: method(s): none,
Jan 15 22:38:29 danted[6535]: log: connect, disconnect, error, iooperation,
Jan 15 22:38:29 danted[6535]: client-rule #3, line #0
Jan 15 22:38:29 danted[6535]: verdict: block
Jan 15 22:38:29 danted[6535]: src: address: 0.0.0.0/0, tcp: 0, udp : 0, op: none, end: 0
Jan 15 22:38:29 danted[6535]: dst: address: 0.0.0.0/0, tcp: 0, udp : 0, op: none, end: 0
Jan 15 22:38:29 danted[6535]: method(s): none,
Jan 15 22:38:29 danted[6535]: log: connect, disconnect, error, iooperation,
Jan 15 22:38:29 danted[6535]: socks-rules (3):
Jan 15 22:38:29 danted[6535]: socks-rule #1, line #0
Jan 15 22:38:29 danted[6535]: verdict: pass
Jan 15 22:38:29 danted[6535]: src: address: 192.168.0.0/16, tcp: 0, udp : 0, op: none, end: 0
Jan 15 22:38:29 danted[6535]: dst: address: 0.0.0.0/0, tcp: 0, udp : 0, op: none, end: 0
Jan 15 22:38:29 danted[6535]: redirect from: address: 0.0.0.0/0, tcp: 0, udp : 0, op: none, end: 0
Jan 15 22:38:29 danted[6535]: redirect to: address: 0.0.0.0/0, tcp: 0, udp : 0, op: none, end: 0
Jan 15 22:38:29 danted[6535]: command(s): bind, bindreply, connect, udpassociate, udpreply,
Jan 15 22:38:29 danted[6535]: extension(s):
Jan 15 22:38:29 danted[6535]: protocol(s): tcp, udp,
Jan 15 22:38:29 danted[6535]: method(s): none,
Jan 15 22:38:29 danted[6535]: proxyprotocol(s): socks v4, socks v5,
Jan 15 22:38:29 danted[6535]: log: connect, disconnect, error, iooperation,
Jan 15 22:38:29 danted[6535]: socks-rule #2, line #0
Jan 15 22:38:29 danted[6535]: verdict: pass
Jan 15 22:38:29 danted[6535]: src: address: 127.0.0.0/8, tcp: 0, udp : 0, op: none, end: 0
Jan 15 22:38:29 danted[6535]: dst: address: 0.0.0.0/0, tcp: 0, udp : 0, op: none, end: 0
Jan 15 22:38:29 danted[6535]: redirect from: address: 0.0.0.0/0, tcp: 0, udp : 0, op: none, end: 0
Jan 15 22:38:29 danted[6535]: redirect to: address: 0.0.0.0/0, tcp: 0, udp : 0, op: none, end: 0
Jan 15 22:38:29 danted[6535]: command(s): bind, bindreply, connect, udpassociate, udpreply,
Jan 15 22:38:29 danted[6535]: extension(s):
Jan 15 22:38:29 danted[6535]: protocol(s): tcp, udp,
Jan 15 22:38:29 danted[6535]: method(s): none,
Jan 15 22:38:29 danted[6535]: proxyprotocol(s): socks v4, socks v5,
Jan 15 22:38:29 danted[6535]: log: connect, disconnect, error, iooperation,
Jan 15 22:38:29 danted[6535]: socks-rule #3, line #0
Jan 15 22:38:29 danted[6535]: verdict: block
Jan 15 22:38:29 danted[6535]: src: address: 0.0.0.0/0, tcp: 0, udp : 0, op: none, end: 0
Jan 15 22:38:29 danted[6535]: dst: address: 0.0.0.0/0, tcp: 0, udp : 0, op: none, end: 0
Jan 15 22:38:29 danted[6535]: redirect from: address: 0.0.0.0/0, tcp: 0, udp : 0, op: none, end: 0
Jan 15 22:38:29 danted[6535]: redirect to: address: 0.0.0.0/0, tcp: 0, udp : 0, op: none, end: 0
Jan 15 22:38:29 danted[6535]: command(s): bind, bindreply, connect, udpassociate, udpreply,
Jan 15 22:38:29 danted[6535]: extension(s):
Jan 15 22:38:29 danted[6535]: protocol(s): tcp, udp,
Jan 15 22:38:29 danted[6535]: method(s): none,
Jan 15 22:38:29 danted[6535]: proxyprotocol(s): socks v4, socks v5,
Jan 15 22:38:29 danted[6535]: log: connect, disconnect, error, iooperation,
Jan 15 22:38:29 danted[6535]: socks_seteuid(): old: 0, new: 65534
Jan 15 22:38:29 danted[6535]: socks_seteuid(): old: 65534, new: 0
Jan 15 22:38:29 danted[6535]: socks_seteuid(): old: 0, new: 65534
Jan 15 22:38:29 danted[6536]: created new negotiatorchild
Jan 15 22:38:29 danted[6536]: selectn(), timeout = NULL
Jan 15 22:38:29 danted[6537]: created new requestchild
Jan 15 22:38:29 danted[6538]: created new requestchild
Jan 15 22:38:29 danted[6539]: created new requestchild
Jan 15 22:38:29 danted[6541]: created new iochild
Jan 15 22:38:29 danted[6541]: selectn(), timeout = NULL
Jan 15 22:38:29 danted[6535]: dante/server v1.1.14 running
Jan 15 22:38:29 danted[6540]: created new requestchild
Jan 15 22:38:43 danted[6535]: selectn(), tv_sec = 0, tv_usec = 0
Jan 15 22:38:43 danted[6535]: got accept(): 192.168.0.1.1895
Jan 15 22:38:43 danted[6536]: accessmatch(): method: none, 192.168.0.1.1895 -> 192.168.0.3.1080
Jan 15 22:38:43 danted[6536]: addressmatch(): address: 192.168.0.0/16, tcp: 1, udp : 1, op: range, end: 65535, 192.168.0.1.1895, tcp, 0
Jan 15 22:38:43 danted[6536]: addressmatch(): address: 0.0.0.0/0, tcp: 0, udp : 0, op: none, end: 0, 192.168.0.3.1080, tcp, 0
Jan 15 22:38:43 danted[6536]: pass(1): tcp/accept [: 192.168.0.1.1895 -> 192.168.0.3.1080
Jan 15 22:38:43 danted[6536]: selectn(), tv_sec = 120, tv_usec = 0
Jan 15 22:38:43 danted[6536]: recv_methods(): sending authentication reply: VER: 5 METHOD: 255
Jan 15 22:38:43 danted[6536]: pass(1): tcp/accept ]: 192.168.0.1.1895 -> 192.168.0.3.1080: client offered no acceptable authenticationmethod
Jan 15 22:38:43 danted[6536]: selectn(), timeout = NULL
Jan 15 22:42:40 danted[6535]: sockdexit(): terminating on signal 2

THQ
活潑的高中生
活潑的高中生
 
文章: 492
註冊時間: 週二 1月 04, 2005 9:11 pm

文章訪客 » 週一 1月 16, 2006 3:14 pm

跟你說怎麼做跟幫你做是兩回事.

這不是甚麼難事. 就是動手做罷了
訪客
 


回到 debian server

誰在線上

正在瀏覽這個版面的使用者:沒有註冊會員 和 1 位訪客

cron