You are on page 1of 7

From Wikipedia, the free encyclopedia Proxy server

Proxy server

Types and functions


Proxy servers implement one or more of the
following functions:

Caching proxy server


A caching proxy server accelerates service
Schematic representation of a proxy server, requests by retrieving content saved from a
where the computer in the middle acts as the previous request made by the same client or
proxy server between the other two. even other clients. Caching proxies keep loc-
al copies of frequently requested resources,
In computer networks, a proxy server is a allowing large organizations to significantly
server (a computer system or an application reduce their upstream bandwidth usage and
program) that acts as a go-between for re- cost, while significantly increasing perform-
quests from clients seeking resources from ance. Most ISPs and large businesses have a
other servers. A client connects to the proxy caching proxy. These machines are built to
server, requesting some service, such as a deliver superb file system performance (often
file, connection, web page, or other resource, with RAID and journaling) and also contain
available from a different server. The proxy hot-rodded versions of TCP. Caching proxies
server evaluates the request according to its were the first kind of proxy server.
filtering rules. For example, it may filter The HTTP 1.0 and later protocols contain
traffic by IP address or protocol. If the re- many types of headers for declaring static
quest is validated by the filter, the proxy (cacheable) content and verifying content
provides the resource by connecting to the freshness with an original server, e.g. ETAG
relevant server and requesting the service on (validation tags), If-Modified-Since (date-
behalf of the client. A proxy server may op- based validation), Expiry (timeout-based in-
tionally alter the client’s request or the serv- validation), etc. Other protocols such as DNS
er’s response, and sometimes it may serve support expiry only and contain no support
the request without contacting the specified for validation.
server. In this case, it ’caches’ responses Some poorly-implemented caching proxies
from the remote server, and returns sub- have had downsides (e.g., an inability to use
sequent requests for the same content user authentication). Some problems are de-
directly. scribed in RFC 3143 (Known HTTP Proxy/
A proxy server has two purposes: Caching Problems).
• To keep machines behind it anonymous Another important use of the proxy server
(mainly for security).[1] is to reduce the hardware cost. An organiza-
• To speed up access to a resource (via tion may have many systems on the same net-
caching). It is commonly used to cache work or under control of a single server, pro-
web pages from a web server.[2] hibiting the possibility of an individual con-
A proxy server that passes requests and nection to the Internet for each system. In
replies unmodified is usually called a gate- such a case, the individual systems can be
way or sometimes tunneling proxy. connected to one proxy server, and the proxy
A proxy server can be placed in the user’s server connected to the main server.
local computer or at various points between
the user and the destination servers or the Web proxy
Internet. A reverse proxy is a proxy used as a A proxy that focuses on WWW traffic is called
front-end to accelerate and cache in-demand a "web proxy". The most common use of a
resources. (such as a web page) web proxy is to serve as a web cache. Most
proxy programs (e.g. Squid) provide a means

1
From Wikipedia, the free encyclopedia Proxy server

to deny access to certain URLs in a blacklist, Because they are typically difficult to track,
thus providing content filtering. This is often open proxies are especially useful to those
used in a corporate, educational or library seeking online anonymity, from political dis-
environment, and anywhere else where con- sidents to computer criminals. Apart from
tent filtering is desired. Some web proxies re- these minorities, the majority of anonymity
format web pages for a specific purpose or aficionados will be disappointed by the spam-
audience (e.g., cell phones and PDAs). ming they’ll receive from "free" proxy
AOL dialup customers used to have their services.
requests routed through an extensible proxy Access control: Some proxy servers im-
that ’thinned’ or reduced the detail in JPEG plement a logon requirement. In large organ-
pictures. This sped up performance but izations, authorized users must log on to gain
caused problems, either when more resolu- access to the web. The organization can
tion was needed or when the thinning pro- thereby track usage to individuals.
gram produced incorrect results. This is why Some anonymizing proxy servers may for-
in the early days of the web many web pages ward data packets with header lines such as
would contain a link saying "AOL Users Click HTTP_VIA, HTTP_X_FORWARDED_FOR, or
Here" to bypass the web proxy and to avoid HTTP_FORWARDED, which may reveal the
the bugs in the thinning software. IP address of the client. Other anonymizing
proxy servers, known as elite or high an-
Content-filtering web proxy onymity proxies, only include the
Further information: Content-control REMOTE_ADDR header with the IP address
software of the proxy server, making it appear that the
A content-filtering web proxy server provides proxy server is the client. A website could
administrative control over the content that still suspect a proxy is being used if the client
may be relayed through the proxy. It is com- sends packets which include a cookie from a
monly used in commercial and non-commer- previous visit that did not use the high an-
cial organizations (especially schools) to en- onymity proxy server. Clearing cookies, and
sure that Internet usage conforms to accept- possibly the cache, would solve this problem.
able use policy. However often times mem-
bers who disagree with the policy will revolt Hostile proxy
by dowloading and using their own proxy. Proxies can also be installed in order to
Some common methods used for content eavesdrop upon the dataflow between client
filtering include: URL or DNS blacklists, URL machines and the web. All accessed pages, as
regex filtering, MIME filtering, or content well as all forms submitted, can be captured
keyword filtering. Some products have been and analyzed by the proxy operator. For this
known to employ content analysis techniques reason, passwords to online services (such as
to look for traits commonly used by certain webmail and banking) should always be ex-
types of content providers. changed over a cryptographically secured
A content filtering proxy will often support connection, such as SSL.
user authentication, to control web access. It
also usually produces logs, either to give de- Intercepting proxy server
tailed information about the URLs accessed An intercepting proxy (also known as a
by specific users, or to monitor bandwidth us- "transparent proxy") combines a proxy server
age statistics. It may also communicate to with a gateway. Connections made by client
daemon based and/or ICAP based antivirus browsers through the gateway are redirected
software to provide security against virus and through the proxy without client-side config-
other malware by scanning incoming content uration (or often knowledge).
in real time before it enters the network.. Intercepting proxies are commonly used in
businesses to prevent avoidance of accept-
Anonymizing proxy server able use policy, and to ease administrative
An anonymous proxy server (sometimes burden, since no client browser configuration
called a web proxy) generally attempts to an- is required.
onymize web surfing. There are different It is often possible to detect the use of an
varieties of anonymizers. One of the more intercepting proxy server by comparing the
common variations is the open proxy. external IP address to the address seen by an

2
From Wikipedia, the free encyclopedia Proxy server

external web server, or by examining the prohibits caching of responses where the re-
HTTP headers on the server side. quest contained an authorization header.

Transparent and non-transpar- Open proxy server


ent proxy server Because proxies might be used to abuse, sys-
The term "transparent proxy" is most often tem administrators have developed a number
used incorrectly to mean "intercepting proxy" of ways to refuse service to open proxies.
(because the client does not need to config- Many IRC networks automatically test client
ure a proxy and cannot directly detect that systems for known types of open proxy. Like-
its requests are being proxied). Transparent wise, an email server may be configured to
proxies can be implemented using Cisco’s automatically test e-mail senders for open
WCCP (Web Cache Control Protocol). This proxies.
proprietary protocol resides on the router Groups of IRC and electronic mail operat-
and is configured from the cache, allowing ors run DNSBLs publishing lists of the IP ad-
the cache to determine what ports and traffic dresses of known open proxies, such as
is sent to it via transparent redirection from AHBL, CBL, NJABL, and SORBS.
the router. This redirection can occur in one The ethics of automatically testing clients
of two ways: GRE Tunneling (OSI Layer 3) or for open proxies are controversial. Some ex-
MAC rewrites (OSI Layer 2). perts, such as Vernon Schryver, consider
However, RFC 2616 (Hypertext Transfer such testing to be equivalent to an attacker
Protocol -- HTTP/1.1) offers different portscanning the client host. [1] Others con-
definitions: sider the client to have solicited the scan by
"A ’transparent proxy’ is a proxy that connecting to a server whose terms of ser-
does not modify the request or response vice include testing.
beyond what is required for proxy
authentication and identification". Reverse proxy server
A reverse proxy is a proxy server that is in-
"A ’non-transparent proxy’ is a proxy stalled in the neighborhood of one or more
that modifies the request or response in web servers. All traffic coming from the In-
order to provide some added service to ternet and with a destination of one of the
the user agent, such as group annotation web servers goes through the proxy server.
services, media type transformation, There are several reasons for installing re-
protocol reduction, or anonymity verse proxy servers:
filtering". • Encryption / SSL acceleration: when
secure web sites are created, the SSL
Forced proxy encryption is often not done by the web
The term "forced proxy" is ambiguous. It server itself, but by a reverse proxy that is
means both "intercepting proxy" (because it equipped with SSL acceleration hardware.
filters all traffic on the only available gate- See Secure Sockets Layer. Furthermore, a
way to the Internet) and its exact opposite, host can provide a single "SSL proxy" to
"non-intercepting proxy" (because the user is provide SSL encryption for an arbitrary
forced to configure a proxy in order to access number of hosts; removing the need for a
the Internet). separate SSL Server Certificate for each
Forced proxy operation is sometimes ne- host, with the downside that all hosts
cessary due to issues with the interception of behind the SSL proxy have to share a
TCP connections and HTTP. For instance, in- common DNS name or IP address for SSL
terception of HTTP requests can affect the connections.
usability of a proxy cache, and can greatly af- • Load balancing: the reverse proxy can
fect certain authentication mechanisms. This distribute the load to several web servers,
is primarily because the client thinks it is each web server serving its own
talking to a server, and so request headers application area. In such a case, the
required by a proxy are unable to be distin- reverse proxy may need to rewrite the
guished from headers that may be required URLs in each web page (translation from
by an upstream server (esp authorization externally known URLs to the internal
headers). Also the HTTP specification locations).

3
From Wikipedia, the free encyclopedia Proxy server

• Serve/cache static content: A reverse and FreeGate,[8] or pay services Anonym-


proxy can offload the web servers by izer[9] and Ghost Surf.[10] Also listed were
caching static content like pictures and free application tunneling software Gpass[11]
other static graphical content. and HTTP Tunnel,[12] and pay application
• Compression: the proxy server can software Relakks[13] and Guardster.[3] Lastly,
optimize and compress the content to anonymous communication networks JAP
speed up the load time. ANON,[14] Tor,[15] and I2P[16] offer a range
• Spoon feeding: reduces resource usage of possibilities for secure publication and
caused by slow clients on the web servers browsing.[4]
by caching the content the web server Students are able to access blocked sites
sent and slowly "spoon feeding" it to the (games, chatrooms, messenger, offensive ma-
client. This especially benefits dynamically terial, internet pornography, social network-
generated pages. ing, etc.) through a circumventor. As fast as
• Security: the proxy server is an additional the filtering software blocks circumventors,
layer of defense and can protect against others spring up. However, in some cases the
some OS and WebServer specific attacks. filter may still intercept traffic to the circum-
However, it does not provide any ventor, thus the person who manages the fil-
protection to attacks against the web ter can still see the sites that are being
application or service itself, which is visited.
generally considered the larger threat. Circumventors are also used by people
• Extranet Publishing: a reverse proxy who have been blocked from a web site.
server facing the Internet can be used to Another use of a circumventor is to allow
communicate to a firewalled server access to country-specific services, so that In-
internal to an organization, providing ternet users from other countries may also
extranet access to some functions while make use of them. An example is country-re-
keeping the servers behind the firewalls. stricted reproduction of media and
If used in this way, security measures webcasting.
should be considered to protect the rest of The use of circumventors is usually safe
your infrastructure in case this server is with the exception that circumventor sites
compromised, as its web application is run by an untrusted third party can be run
exposed to attack from the Internet. with hidden intentions, such as collecting
personal information, and as a result users
Circumventor are typically advised against running person-
A circumventor is a method of defeating al data such as credit card numbers or pass-
blocking policies implemented using proxy words through a circumventor.
servers. Ironically, most circumventors are An example of one way to circumvent a
also proxy servers, of varying degrees of content-filtering proxy server is by tunnelling
sophistication, which effectively implement through to another proxy server, usually con-
"bypass policies". trolled by the user, which has unrestricted
A circumventor is a web-based page that access to the internet. This is often achieved
takes a site that is blocked and "circumvents" by using a VPN type tunnel, such as VPN it-
it through to an unblocked web site, allowing self or SSH, through a port left open by the
the user to view blocked pages. A famous ex- proxy server to be circumvented. Port 80 is
ample is elgooG, which allowed users in Ch- almost always open to allow the use of HTTP,
ina to use Google after it had been blocked as is Port 443 to allow the use of HTTPS.
there. elgooG differs from most circumvent- Through the use of encryption, tunnelling to
ors in that it circumvents only one block. a remote proxy server, provided the remote
A September 2007 report from Citizen Lab proxy server is itself secure, is not only diffi-
recommended Web based proxies Proxify[2], cult to detect, but also difficult to intercept.
StupidCensorship[3], and CGIProxy.[4] Altern- In some network configurations, clients at-
atively, users could partner with individuals tempting to access the proxy server are given
outside the censored country running Psi- different levels of access privilege on the
phon[5] or Peacefire/Circumventor.[6] A more grounds of their computer location or even
elaborate approach suggested was to run the MAC address of the network card.
free tunneling software such as UltraSurf[7], However, if one has access to a system with
higher access rights, they could use that

4
From Wikipedia, the free encyclopedia Proxy server

system as a proxy server for which the other encrypted with https. The web filter cannot
clients use to access the original proxy serv- distinguish these transactions from, say, a le-
er, consequently altering their access gitimate access to a financial website. Thus,
privileges. content filters are only effective against un-
sophisticated users.
Content filter A special case of web proxies is "CGI prox-
Many work places, schools, and colleges re- ies". These are web sites that allow a user to
strict the web sites and online services that access a site through them. They generally
are made available in their buildings. This is use PHP or CGI to implement the proxy func-
done either with a specialized proxy, called a tionality. These types of proxies are fre-
content filter (both commercial and free quently used to gain access to web sites
products are available), or by using a cache- blocked by corporate or school proxies. Since
extension protocol such as ICAP, that allows they also hide the user’s own IP address from
plug-in extensions to an open caching the web sites they access through the proxy,
architecture. they are sometimes also used to gain a de-
Requests made to the open internet must gree of anonymity, called "Proxy Avoidance".
first pass through an outbound proxy filter.
The web-filtering company provides a data- Suffix proxy
base of URL patterns (regular expressions) A suffix proxy server allows a user to ac-
with associated content attributes. This data- cess web content by appending the name of
base is updated weekly by site-wide subscrip- the proxy server to the URL of the requested
tion, much like a virus filter subscription. The content (e.g. "en.wikipedia.org.6a.nl").
administrator instructs the web filter to ban Suffix proxy servers are easier to use than
broad classes of content (such as sports, por- regular proxy servers. The concept appeared
nography, online shopping, gambling, or so- in 2003 in form of the IPv6Gate and in 2004
cial networking). Requests that match a in form of the Coral Content Distribution Net-
banned URL pattern are rejected work, but the term suffix proxy was only
immediately. coined in October 2008 by "6a.nl".
Assuming the requested URL is accept-
able, the content is then fetched by the
proxy. At this point a dynamic filter may be
Risks of using anonym-
applied on the return path. For example, ous proxy servers
JPEG files could be blocked based on
In using a proxy server (for example, an-
fleshtone matches, or language filters could
onymizing HTTP proxy), all data sent to the
dynamically detect unwanted language. If the
service being used (for example, HTTP server
content is rejected then an HTTP fetch error
in a website) must pass through the proxy
is returned and nothing is cached.
server before being sent to the service,
Most web filtering companies use an
mostly in unencrypted form. It is therefore a
internet-wide crawling robot that assesses
feasible risk that a malicious proxy server
the likelihood that a content is a certain type
may record everything sent: including unen-
(i.e. "This content is 70% chance of porn,
crypted logins and passwords.
40% chance of sports, and 30% chance of
By chaining proxies which do not reveal
news" could be the outcome for one web
data about the original requester, it is pos-
page). The resultant database is then correc-
sible to obfuscate activities from the eyes of
ted by manual labor based on complaints or
the user’s destination. However, more traces
known flaws in the content-matching
will be left on the intermediate hops, which
algorithms.
could be used or offered up to trace the
Web filtering proxies are not able to peer
user’s activities. If the policies and adminis-
inside secure sockets HTTP transactions. As
trators of these other proxies are unknown,
a result, users wanting to bypass web filter-
the user may fall victim to a false sense of se-
ing will typically search the internet for an
curity just because those details are out of
open and anonymous HTTPS transparent
sight and mind.
proxy. They will then program their browser
The bottom line of this is to be wary when
to proxy all requests through the web filter to
using anonymising proxy servers, and only
this anonymous proxy. Those requests will be
use proxy servers of known integrity (e.g.,

5
From Wikipedia, the free encyclopedia Proxy server

the owner is known and trusted, has a clear Proprietary software


privacy policy, etc.), and never use proxy
• 3proxy is a freeware proxy server,
servers of unknown integrity. If there is no
previously known as 3APA3A, and works
choice but to use unknown proxy servers, do
on Windows and Linux/Unix.
not pass any private information (unless it is
• AlchemyPoint is a user-programmable
over an encrypted connection) through the
mashup proxy server that can be used to
proxy.
re-write web pages, emails, instant
In what is more of an inconvenience than
messenger messages, and other network
a risk, proxy users may find themselves being
transmissions on the fly.
blocked from certain Web sites, as numerous
• Blue Coat’s (formerly Cacheflow’s)
forums and Web sites block IP addresses
purpose-built SGOS proxies 15 protocols
from proxies known to have spammed or
including HTTPS/SSL, has an extensive
trolled the site.
policy engine and runs on a range of
appliances from branch-office to
Proxy software enterprise.
• Charles is a Java-based user-configurable
Free and Open Source software HTTP proxy / HTTP monitor / Reverse
Proxy that can be used with Flash
• The Apache HTTP Server can be
Remoting (AMF0 and AMF3).
configured to act as a proxy server.
• CACHEbox is a high performance HTTP/
• Delegate (networking) is a multi-purpose
HTTPS/FTP caching proxy appliance
application level gateway, or a proxy
supporting forward and reverse
server which runs on multiple platforms.
deployment modes.
• I2P (multiple licenses) - A proxy-like
• CGIProxy, web based proxy script written
decentralized network for anonymizing
in Perl. Free for non-commercial use.
Internet data transfers.
• EZproxy is a URL-rewriting web proxy
• Nginx Web and Reverse proxy server, that
designed primarily for providing remote
can act as POP3 proxy server.
access to sites that authenticate users by
• PHProxy is one of the oldest and most
IP address.
customized proxy scripts in use on the
• HTTP-Tunnel is a freeware proxy client, to
Internet. Many of the newer proxy scripts
proxy any site, p2p, IM and game. Allow
were inspired by PHProxy.[5]
you to be monitor free. SOCK and HTTP
• Pound (networking) is a reverse proxy,
protocols.
load balancer and HTTPS front-end for
• Ideco Gateway - Linux based multi-
Web server(s).
protocol proxy server with GUI
• Privoxy is a free, open source web proxy
configuration tool and NAT/VPN support.
with privacy and ad-blocking features.
• JAP - A local proxy, web anonymizer
• SynapseCreated by the Apache
software connecting to proxy server
Foundation, it is a Enterprise Service Bus
chains of different organizations
that is capable of acting as a proxy.
• Microsoft ISA server is described by
• Squid is a popular HTTP proxy server in
Microsoft as an "integrated edge security
the UNIX/Linux world.
gateway"; it includes caching web proxy,
• Tinyproxy is a light-weight HTTP proxy
caching reverse proxy, Firewall, VPN,
daemon ideal for embedded use on POSIX
NAT, content filter, SSL encryption, and
operating systems.
other components.
• Tor - A proxy-based anonymizing Internet
• Novell BorderManager web proxy server,
communication system.
reverse proxy, Firewall and VPN end
• Varnish is designed to be a high-
point.
performance caching reverse proxy.
• Proxomitron - User-configurable web
• WWWOFFLE has been around since the
proxy used to re-write web pages on the
mid-1990s, and was developed for storing
fly. Most noted for blocking ads, but has
online data for offline use.
many other useful features.
• Ziproxy is a non-caching proxy for
• SafeSquid — Linux-based, complete
acceleration purposes. It recompresses
content filtering HTTP1.1 proxy, allows
pictures and optimizes HTML code.
distribution of ’profiled’ internet access.

6
From Wikipedia, the free encyclopedia Proxy server

• SSH Secure Shell can be configured to [2] Thomas, Keir (2006). Beginning Ubuntu
proxify a connection, by setting up a Linux: From Novice to Professional.
SOCKS proxy on the client, and tunneling Apress. "A proxy server helps speed up
the traffic through the SSH connection. Internet access by storing frequently
• Sun Java System Web Proxy Server is a accessed pages"
caching proxy server running on Solaris, [3] Site at www.guardster.com
Linux and Windows servers that supports [4] "Everyone’s Guide to By-Passing Internet
http://https, NSAPI I/O filters, dynamic Censorship". http://www.civisec.org/
reconfiguration, SOCKSv5 and reverse guides/everyones-guides.
proxy. [5] "Proxies". Tech-FAQ. http://www.tech-
• TcpCatcher is a free TCP and HTTP(S) faq.com/phproxy-proxies.shtml.
proxy server for educational and
development purposes. It allows you to
modify packets on the fly.
See also
• WinGate is a multi-protocol proxy server • Captive portal
and NAT solution that can be used to • Internet privacy
redirect any kind of traffic on a Microsoft • Proxy list
Windows host. • SOCKS
• yProxy is an NNTP proxy server that • Transparent SMTP proxy
converts yEnc encoded message • Web cache
attachments to UUEncoding, complete • HTTP
with SSL client support. • ICAP
• Zeus functions as both a forward and
reverse proxy server. It operates on
Solaris, FreeBSD and Linux.
External links
• Proxy software and scripts at the Open
Directory Project
References • Free web-based proxy services at the
[1] "How-to". Linux.org. Open Directory Project
http://www.linux.org/docs/ldp/howto/ • Free http proxy servers at the Open
Firewall-HOWTO-11.html#ss11.4. "The Directory Project
proxy server is, above all, a security
device."

Retrieved from "http://en.wikipedia.org/wiki/Proxy_server"

Categories: Computer networking, Network performance, Internet architecture, Internet pri-


vacy, Computer security software, Proxy servers

This page was last modified on 21 May 2009, at 12:31 (UTC). All text is available under the
terms of the GNU Free Documentation License. (See Copyrights for details.) Wikipedia® is a
registered trademark of the Wikimedia Foundation, Inc., a U.S. registered 501(c)(3) tax-
deductible nonprofit charity. Privacy policy About Wikipedia Disclaimers

You might also like