Proxy server
|
A proxy server is a computer network service which allows clients to make indirect network connections to other network services. A client connects to the proxy server, then requests a connection, file, or other resource available on a different server. The proxy provides the resource, possibly by connecting to the specified server, or by serving it from a cache. In some cases, the proxy may alter the client's request or the server's response for various purposes.
Contents |
Web proxies
A common proxy application is a caching Web proxy. This provides a nearby cache of Web pages and files available on remote Web servers, allowing local network clients to access them more quickly or reliably.
When it receives a request for a Web resource (specified by a URL), a caching proxy looks for the resulting URL in its local cache. If found, it returns the document immediately. Otherwise it fetches it from the remote server, returns it to the requester and saves a copy in the cache. The cache usually uses an expiry algorithm to remove documents from the cache, according to their age, size, and access history. Two simple cache algorithms are Least Recently Used (LRU) and Least Frequently Used (LFU). LRU removes the least-recently used documents, and LFU removes the least-frequently used documents.
Web proxies can also filter the content of Web pages served. Some censorware applications — which attempt to block offensive Web content — are implemented as Web proxies. Other web proxies reformat web pages for a specific purpose or audience; for example, Skweezer reformats web pages for cell phones and PDAs. Network operators can also deploy proxies to intercept computer viruses and other hostile content served from remote Web pages.
Network address translation proxies
UDP datagram exchanges. NAT is also known as IP masquerading.
Proxy transparency
Many organizations — including corporations, schools, and families — use proxy servers to enforce network use policies (see censorware) or provide security and caching services. Usually, the web or NAT proxy is not transparent to the client application: it must be configured to use the proxy, manually or with a configuration script. Thus, the user can evade the proxy by simply resetting the client configuration. A transparent proxy or transproxy combines a proxy server with NAT so that connections are routed into the proxy without client-side configuration. However RFC 3040 (http://www.ietf.org/rfc/rfc3040.txt) define this type as intercepting proxy.
Both NAT and transproxies are somewhat controversial in the Internet technical community, since both violate the end-to-end principle upon which TCP/IP was designed.
The term proxy is also used in a different sense in the Session Initiation Protocol (SIP) used in many modern voice over IP systems. A SIP Proxy, unlike a Web proxy, does not handle the content of client data.
Open proxies, abuse, and detection
An open proxy is a proxy server which will accept client connections from any IP address and make connections to any Internet resource. Abuse of open proxies is currently implicated in a significant portion of e-mail spam delivery. Spammers frequently install open proxies on unwitting end users' Microsoft Windows computers by means of computer viruses designed for this purpose. Internet Relay Chat (IRC) abusers also frequently use open proxies to cloak their identities.
Because proxies could be implicated in abuse, system administrators have developed a number of ways to refuse service to open proxies. IRC networks such as the Blitzed network automatically test client systems for known types of open proxy [1] (http://www.blitzed.org/bopm/). Likewise, an email server may be configured to automatically test e-mail senders for open proxies, using software such as Michael Tokarev's proxycheck
[2] (http://www.corpit.ru/mjt/proxycheck.html).
Groups of IRC and electronic mail operators run DNSBLs publishing lists of the IP addresses of known open proxies, such as Blitzed OPM [3] (http://opm.blitzed.org/info) and CBL [4] (http://cbl.abuseat.org/).
The ethics of automatically testing clients for open proxies are controversial. Some experts, such as Vernon Schryver, consider such testing to be equivalent to an attacker portscanning the client host. [5] (http://groups.google.com/groups?selm=brd5b4%242kv3%241%40calcite.rhyolite.com&output=gplain) Others consider the client to have solicited the scan by connecting to a server whose terms of service include testing.
Reverse Proxies
A reverse proxy is a proxy server that is installed in the neighborhood of one or more webservers. All traffic coming from the Internet and with destination one of the webservers is going through the proxy server. There are several reasons for installing reverse proxy servers:
- Security: the proxy server is an additional layer of defense and therefore protects the webservers further up the chain
- Encryption / SSL acceleration: when secure websites are created, the SSL encryption is often not done by the webserver itself, but by a reverse proxy that is equipped with SSL acceleration hardware. See Secure Sockets Layer.
- Load distribution: the reverse proxy can distribute the load to several webservers, each webserver serving its own application area. In such a case, the reverse proxy may need to have to rewrite the URLs in each webpage (translation from externally known URLs to the internal locations)
- Serve/cache static content: A reverse proxy can offload the webservers by caching static content like pictures and other static graphical content
- Compression: the proxy server can optimize and compress the content to speed up the load time.
Split Proxies
A split proxy is essentially a pair of proxies installed across two computers. Since they are effectively two parts of the same program, they can communicate with each other in a more efficient way than they can communicate with a more standard resource or tool such as a website or browser. This is ideal for compressing data over a slow link, such as a wireless or mobile data service. Taking the example of web browsing, the user's browser is pointed to a local proxy which then communicates with its other half at some remote location. This remote server fetches the requisite data, repackages it and sends it back to the user's local proxy, which unpacks the data and presents it to the browser in the standard fashion.
Google's Web Accelerator is an example of a split proxy.
Popular proxy servers
- The Squid cache is the popular HTTP proxy server in UNIX/Linux world
- The Apache HTTP Server can be configured to act as a proxy server.
- Wingate is a small Internet Protocol proxy server that can be used to redirect any kind traffic on a Microsoft Windows host. A more free proxy server is AnalogX (http://www.analogx.com/)'s proxy (http://www.analogx.com/contents/download/network/proxy.htm)
- Windows 98se and other versions of Windows released later have Internet Connection Sharing (ICS) built-in. This gives NAT functionality to any Windows computer with an Internet connection and a LAN connection.
- The Linux kernel contains modules for NAT functionality as part of the ipchains and iptables packet filtering systems.
- OpenBSD's Packet Filter (http://www.openbsd.org/faq/pf/) is an extremely flexible interface for inspecting network traffic that can provide, among many other things, NAT functionality.
- The elhttp server (http://www.cr0.net:8040/code/network/) is a lightweight HTTP proxy for UNIX and Windows (GPL license)
- Microsoft's ISA Server (http://www.microsoft.com/isaserver) is a product that runs on Windows 2000/2003 servers and combines the functions of both a proxy server and a firewall. Appliance version available with Celestix Celestix ISA Appliance (http://www.celestix.com/products/isa/index.htm)
- This article was originally based on material from the Free On-line Dictionary of Computing, which is licensed under the GFDL.
See also
- Anonymity and Internet privacy
- SOCKS
- Web Proxy Autodiscovery Protocol WPAD
- Skweezer
- Firewall (networking)
External links
- Proxy (http://www.windowsnetworking.com/articles_tutorials/proxy.html) - An article on how proxies work
Web-based proxy servers & Proxy list
- Free Unblockable Proxy Server (http://uncensor.net/)
- ProxyBlind Free Proxy servers (http://www.proxyblind.org/)
- Free Proxy Server (http://uncensor.info)
- Anonymous Browsing Quick-Start Page (http://www.space.net.au/~thomas/quickbrowse.html)
- Proxy Lists (http://www.digitalcybersoft.com/ProxyList/)
- Proxy Server Lists (http://www.proxy-server.info/)
- http://proxify.com/
- http://www.anonymizer.com/
- http://www.the-cloak.com
- http://nonymouse.com/
- http://www.guardster.com/
- http://www.proxyone.com/
- http://www.proxyweb.net/
- http://webwarper.net/
- http://www.snoopblocker.com/
- http://www.megaproxy.com/
- http://proxy.whoislookup.de
- SpyNOT Free Next-Generation Proxy (http://www.spynot.com)
- Show your IP address (http://ip-number.com)cs:Proxy server
de:Proxy fr:Serveur proxy ko:프록시 서버 it:Proxy he:פרוקסי nl:Proxyserver ja:プロキシ pl:Serwer pośredniczący pt:Proxy