The "No Network is 100% Secure" series
- Proxy Servers -
A White Paper
All rights reserved - may not be copied without permission
Easyrider LAN Pro, NOC Design Consultants
Contact Us
What is a proxy server?: A proxy server is a computer system or an application
program that acts as a go-between for requests from clients seeking resources from
other servers. A proxy server has two primary purposes. First, to keep machines
behind it anonymous mainly for security reasons. And second, to speed up access to a
resource via caching and other methods. Proxy servers are commonly used to cache web
pages from a web server and to provide a safer web surfing experience.
Caching proxy servers: A caching proxy server accelerates service requests
by retrieving content saved from a previous request made by the same or other clients.
Caching proxies keep local copies of frequently requested resources, allowing large
organizations to significantly reduce their upstream bandwidth usage and cost, while
significantly increasing performance. Another important use of the proxy server is
to reduce the hardware cost. An organization may have many workstations on the same
network
prohibiting the possibility of an individual connection to the Internet for each
system. In such a case, the individual workstations can be connected to one proxy
server, with the proxy server making all of the Internet web page requests.
A caching proxy server that focuses on WWW traffic is called a "web proxy".
Most proxy programs provide a means to deny access to certain URLs in
a blacklist, thus providing content filtering.
Content filtering proxy servers: A content-filtering web proxy server provides
administrative control over the content that may be relayed through the proxy. It is
commonly used in commercial and non-commercial organizations (especially schools) to
ensure that Internet usage conforms to acceptable use policy. A content filtering
proxy will often support user authentication, to control web access. It also usually
produces logs, either to give detailed information about the URLs accessed by specific
users, or to monitor bandwidth usage statistics. It may also
provide security against viruses and other malware by scanning
incoming content in real time before it enters the network.
Anonymous proxy servers: An anonymous proxy server is used to anonymize web
surfing. There are different types of anonymizers. One of the more common
variations is the open proxy. Because they are typically difficult to track, open
proxies are especially useful to those seeking online anonymity such as political
dissidents and computer criminals. Firefox has an anonymous surfing plug-in that is
readily available. There are also commercially hosted proxy servers.
Hostile and intercepting proxy servers: Proxies exist that can
eavesdrop on data communications between client machines and the web. All accessed pages,
as well as all forms submitted, can be captured and analyzed by the proxy operator.
For this reason, passwords to online services such as webmail and banking should
always be exchanged over a cryptographically secured connection, such as SSL.
An intercepting proxy (aka "transparent proxy") redirects client browser requests
through the proxy without client-side configuration or knowledge. Intercepting
proxies are commonly used in businesses to prevent avoidance of acceptable use policy,
and to ease administrative burden, since no client browser configuration is required.
The term "transparent proxy" is most often used incorrectly to mean "intercepting
proxy" because the client does not need to configure a proxy and cannot directly
detect that its requests are being proxied. Transparent proxies can be implemented
using Cisco's WCCP (Web Cache Control Protocol). This proprietary protocol resides
on the router and is configured from the cache, allowing the cache to determine what
ports and traffic is sent to it via transparent redirection from the router. This
redirection can occur in one of two ways: GRE Tunneling (OSI Layer 3) or MAC rewrites
(OSI Layer 2).
Circumventors: A circumventor is a method of defeating blocking policies
implemented using proxy servers which have policy bypass capabilities.
A circumventor is a web-based page that takes a site that is blocked and "circumvents"
it through to an unblocked web site, allowing the user to view blocked pages. A
famous example is elgooG, which allowed users in China to use Google after it had
been blocked there. elgooG differs from most circumventors in that it circumvents
only one block.
Content filtering: Many businesses and schools restrict the web sites and
online services that are made available in their buildings. This is done either with
a specialized proxy, called a content filter (both commercial and free products are
available), or by using a cache-extension protocol such as ICAP, that allows plug-in
extensions to an open caching architecture. Requests made to the internet must
first pass through an outbound proxy filter. The web-filtering company provides
a database of URL patterns (regular expressions) with associated content attributes.
This database is updated frequently much like virus definitions are. The administrator
instructs the web filter to ban broad classes of content such as sports, pornography,
online shopping, gambling, or social networking. Requests that match a banned URL
pattern are rejected. Assuming the requested URL is acceptable, the content is then
fetched by the proxy. At this point a dynamic filter may be applied on the return path.
For example, JPEG files could be blocked based on fleshtone matches, or language
filters could dynamically detect unwanted language. If the content is rejected then
an HTTP fetch error is returned and nothing is cached. Most web filtering companies
use an internet crawling robot that assesses the likelihood that a content is a certain
type (i.e. "This content is 70% chance of porn, 40% chance of sports, and 30% chance
of news" could be the outcome for one web page). The resultant database is then
corrected manually based on complaints or known flaws in the content-matching
algorithms. Web filtering proxies are not able to peer inside secure sockets HTTP
transactions. As a result, users wanting to bypass web filtering will typically
search the internet for an open and anonymous HTTPS transparent proxy. They will
then program their browser to proxy all requests through the web filter to this
anonymous proxy. Those requests will be encrypted with https. The web filter cannot
distinguish these transactions from legitimate access to an acceptable website. Thus,
content filters are only effective against unsophisticated users.
A special case of web proxies is "CGI proxies". These are web sites that allow a user
to access a site through them. They generally use PHP or CGI to implement the proxy
functionality. These types of proxies are frequently used to gain access to web sites
blocked by corporate or school proxies. Since they also hide the user's own IP address
from the web sites they access through the proxy, they are sometimes also used to gain
a degree of anonymity, called "Proxy Avoidance".
Anonymous proxy server use risks:
In using a proxy server such as an anonymizing HTTP proxy, all sent data
must pass through the proxy server before being sent to the actual web site, mostly
in unencrypted form. It is therefore a feasible risk that a malicious proxy server may
record everything sent including unencrypted logins and passwords.
Therefore, be wary when using anonymising proxy servers and only use proxy servers
of known integrity. If there is no choice but to use unknown proxy servers, do not
pass any private information unless it is over an encrypted connection.
In what is more of an inconvenience than a risk, proxy users may find themselves being
blocked from certain Web sites, as numerous forums and Web sites block IP addresses
from proxies known to have spammed or trolled the site.
Free and open source proxy software:
- The Apache HTTP Server can be configured to act as a proxy server.
- Delegate is a proxy server which runs on multiple platforms.
- I2P is a proxy-like decentralized network for anonymizing Internet data transfers.
- Nginx Web and Reverse proxy server can also act as POP3 proxy server.
- PHProxy is one of the oldest proxy scripts in use on the Internet.
- Pound is a reverse proxy, load balancer and HTTPS front-end for Web server(s).
- Privoxy is a web proxy with privacy and ad-blocking features.
- Squid is a popular UNIX/Linux HTTP proxy server.
- Tor is a proxy-based anonymizing Internet communication system.
- Varnish is designed to be a high-performance caching reverse proxy.
Next in the security white paper series:
How Cyber Criminals will mature over the next ten years
Are you vulnerable to drive-by exploits?
High value sites recent hacks
IT employment challenges of the 21st century
Employment reference checking white paper
Competency Certifications White Paper
Firewall White Paper
Virus White Paper
GhostNet White Paper
Password White Paper
Digital Identification Certificates White Paper
Cryptography White Paper
OpenID White Paper
Intrusion Detection Systems IDS White Paper
Rootkit White Paper
Unnecessary Windows XP Services White Paper
Scareware White Paper
Exaflood Internet Brownout White Paper
Cloud Computing White Paper
Personal Computer PC Security White Paper
Phishing White Paper
DNS Poisoning White Paper
Conficker White Paper
SPAM White Paper
Best Practices White Paper
Denial of Service DoS White Paper
Trojan Virus Attacks White Paper
Port Scanning White Paper
Monitoring Basics 101 White Paper
Monitoring Basics 102 White Paper
Monitoring Basics 103 White Paper
Virtual Machine Security White Paper
Aurora vulnerability White Paper
Shelfware White Paper
Outsourced IT White Paper
Easyrider LAN Pro Consulting services:
Network Security Audit and PC Tune-up service
- Proxy server installation and configuration
- Enterprise security consultations
- Disaster recovery planning
- Disaster recovery services
- Capacity, migration and upgrade planning
- Build and deploy central syslog server
- Build trouble ticket systems
- Design and build monitoring environments
- Design and build Network Operations Centers (NOC)
- HP Openview, BMC Patrol consulting
Last modified March 25, 2009
Copyright 1990-2009 Easyrider LAN Pro