Sie sind auf Seite 1von 5

Proxy Server

A proxy server is a computer system or router that functions as a relay between client
and server.
It helps prevent an attacker from invading a private network and is one of several tools
used to build a firewall.
The word proxy means "to act on behalf of another," and a proxy server acts on behalf
of the user.
Internet clients and internal resources: Proxy servers also act as a shield for an
internal network against the request coming from a client to access the data on that
server. The original IP address of the node remains hidden while accessing data from
that server.
Protects true host identity: Outgoing traffic appears to come from the proxy server.
It must be configured to the specific application e.g. HTTPs or FTP.

For example, as a client to MNC, a client can use a proxy to observe the traffic of its contract employees
to get the work efficiently done. It can also be used to keep a check on any leakage of internal highly
confidential data. Some can also use it to increase their websites rank and get the traffic diverted
anonymously.

Some of the need for a private proxy is mentioned below:


• Defeat Hackers
Every organization has its own personal data that need to protect from malicious use. Thus passwords
are used and different architects are setup, but still, there is a possiblity that this information can be
hacked in case the IP address is accessible easily. To prevent such kind of misuse Proxy servers are set
up to prevent tracking of original IP address instead data is shown to come from a different IP address.

• Filtering of the Content


Proxy servers also help to filter out the content that doesn’t follow the policies of the web application or
server required. It provides a facility to authenticate the user as well as provides the logs of URL of
users requests made through that proxies.

• Content can be Cached


The proxy also helps in caching the content of the websites. This helps in fast access to the data that has
been accessed oftenly.
ypes of Proxy Servers
Different types of proxy servers:

1. Reverse Proxy

This represents the server. In case there are multiple websites on different servers then it is the job of a
reverse proxy server to listen to the request made by the client and redirect to the particular web
server.

Example – Listen for TCP port 80 website connections. These are normally placed in a DMZ zone for
publicly accessible services but also protect the true
identity of the host. It is transparent to the external users as
external users will not be able to identify the actual number
of internal servers. It is the duty of reverse proxy to redirect
the flow depending on the configurations of internal servers.
The request made to pass through the private network
protected by firewalls need a proxy server that does not
abide by any of the local policies. This type of request from
the clients are completed using reverse proxy servers. This
is also used to restrict the access of the clients to the sensitive data residing on the particular servers.

2. Web Proxy Server

This type of proxies forward the HTTP requests. This request is same as HTTP requests, only URL is
passed instead of a path. Request is sent to which the proxy server responds. Examples of such proxies
are Apache, HAPProxy.

The solution to the problems of multiple proxy servers is solved by the client-server Proxy auto-config
protocol.

3. Anonymous Proxy

This is the type of proxy server that does not makes an original IP address. Although these servers are
detectable still provides rational anonymity to the client device.

4. High Anonymity Proxy

This type of proxy server does not allow the original IP address to be detected and also no one can
detect it as proxy server.

5. Transparent Proxy

This type of proxy server never provides any anonymity to the client, instead, original IP address can be
easily detected using this proxy. Still, it is being used to act as a cache for the websites.
A transparent proxy combined with gateway results in a proxy server where the connection requests
sent by the client IP are redirected. This redirection occurs without the client IP address configuration.
This redirection can be easily detected by the HTTP headers present on the server-side.

These are also known as intercepting proxies, inline proxy, and forged proxy.

Working: It intercepts the communication at the network level without the need of any configuration. It
also works as a gateway or router that just authenticates the communication without making any
changes to the requests or responses passing through the server.

Uses: These types of proxies are most commonly used at the business level to enforce the policy over
communication. It also tries to prevent any attack on TCP servers example – denial-of-service attack.

6. CGI Proxy

This type of proxies were developed to make the websites more accessible.

Working: It accepts the requests to target URLs using a web form, processes it and returns the result to
the web browser. It is less popular due to VPNs and other privacy policies but it still receives a lot of
requests these days also. Its usage reduces because of excessive traffic that can be caused to the
website after passing the local filtration and thus leads to collateral damage to the organization.

7. Suffix Proxy

This type of proxy server appends the name of the proxy to the URL to the content that has been
requested to the proxy. This type of proxy doesn’t preserve a higher level of anonymity.

Uses: It is used for bypassing the web filters. This proxy is easy to use and can be easily implemented
but is used less due to the more number or web filter present.

8. Distorting Proxy

Proxy servers can generate an incorrect original IP address of clients once being detected as a proxy
server. It uses HTTP headers to maintain the confidentiality of the Client IP address.

9. TOR Onion Proxy

It is a software that aims at online anonymity to the users personal information.

Working: It routes the traffic through various networks present worldwide to make it difficult to track
the users’ address and prevent the attack of any anonymous activities. It makes difficult for any person
who is performing traffic analysis to track the original address. For this, it uses ONION ROUTING.

In this type of routing, the information is encrypted in a multi-folds layer by layer to prevent it. At the
destination, each layer is decrypted one by one to prevent the information to scramble or get distorted.

This software is open source as well as free of cost to use.


10. I2P Anonymous Proxy

It is an anonymous network enhanced version of Tor onion proxy which uses encryption to hide all the
communications at various levels. This encrypted data is then relayed through various network routers
present in different locations. Thus I2P is a fully distributed proxy that aims at online anonymity. It also
implements garlic routing. (enhanced version of Tor’s pnion routing. It provides a proxy to all protocols.
This type of proxies can be run on the node.

I2P router finds other peers to build an anonymous identity to protect the user’s personal information.

This software and network are free of cost and open source to use, It also resists the censorship.

11. DNS Proxy

Unlike other proxies, this type of proxy take requests in the form of DNS queries and forward them to
the Domain server where it can also be cached and flow of request can also be redirected.

Different types of proxy servers protocols:

1. Socks Proxy Server: This type of proxy server provides a connection to a particular server.
Depending on Socks protocols, this type of server allows the multilayering of various types of
data such as TCS or UDP.
2. FTP Proxy Server: This type of proxy server caches the traffic of FTP requests and uses the
concept of relaying.
3. HTTP Proxy Server: This proxy was developed to process a one-way request to the web pages
using HTTP protocols.
4. SSL Proxy Server: This type of server was developed using the concept of TCP relaying being
used in SOCKS proxy protocol to allow the requests of Web Pages.

Tor Browser Proxy Settings


In Tor Browser Type about.config in url and need to accept risk parameters.

Then type javascript.enabled and modilfy the value from true to false.

By this task miscellaneous javascript programs didn’t run

Again type network.http.sendRefferheader to change the value from 2 to 0

By this task, no one can able to understand the network.

Next type Network.cookie.cookieBehaviour to change the value from 1 to 2.

By this task, Our data will stored in multiple cookies

For browser different IP’s shows by this proxy settings .

Das könnte Ihnen auch gefallen