Method for realizing TCP proxy complete transparency
A completely transparent and transparent technology, applied in the field of network security, can solve problems such as problems, and achieve the effect of port field transparency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0056] The present invention is realized through the following technical solutions, as Figure 1-Figure 3 As shown, a method for realizing the complete transparency of the TCP agent includes the following steps:
[0057] Step F1: The TCP proxy server implements MAC address transparency by intercepting and caching the TCP Syn message from the Client to the Server;
[0058] Step F2: The TCP proxy server checks and copies the header fields of the mutually sent messages between the Client and the Server, so as to realize the transparency of the TOS / TTL field of the IP header;
[0059] Step F3: The TCP proxy server establishes a network namespace for the Client to realize TCP port transparency.
[0060] It should be noted that, through the above improvements, the Client is a proxied TCP client, and the Server is a proxied server. The invention provides a method for realizing the complete transparency of the TCP proxy. The principle is to use the Tcp Syn message cache to delay the...
Embodiment 2
[0065] This embodiment is further optimized on the basis of the above embodiments, such as figure 1 As shown, the TCP proxy server includes an interconnected TCP proxy module, Syn_handler module, Bridge, and the TCP proxy module includes Tcpproxy_client, Tcpproxy_server, Fd_binder;
[0066] The step F1 specifically includes the following steps:
[0067] Step F101: Client sends a Tcp Syn message request, trying to establish a connection with Server, Bridge learns and records the source MAC address of Client;
[0068] Step F102: The Tcp Syn message sent by the Client arrives at the TCP proxy server, is intercepted and cached by the Syn_handler module;
[0069] Step F103: the Syn_handler module sends a message to the TCP proxy module, notifies the TCP proxy module to record the intercepted Tcp Syn message quintuple information and initiates a TCP connection with the Server;
[0070] Step F104: the Tcpproxy_client in the TCP proxy module sends a Tcp Syn message to the Server thr...
Embodiment 3
[0087] This embodiment is further optimized on the basis of the above embodiments, such as figure 2 As shown, the step F2 specifically includes the following steps:
[0088] Step F201: the TCP proxy server checks the header field of the message sent by the Client to the Server;
[0089] Step F202: the TOS and TTL values of the message header field in the step F201 are copied by Tcpproxy_client to the request message sent to the Server by the TCP proxy server;
[0090] Step F203: the TCP proxy server checks the header field of the message sent by the Server to the Client;
[0091] Step F204: The TOS and TTL values of the message header field in the step F203 are copied by the Tcpproxy_server to the request message sent from the TCP proxy server to the Client.
[0092] It should be noted that, through the above improvements, the method to realize the transparency of the TOS and TTL fields is that the Client sends a message to the Server through the TCP proxy server, the T...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


