1.Introduction to Proxy Servers
Some home
networks, corporate intranets, and Internet Service Providers (ISPs) use proxy
servers (also known as proxies). Proxy servers act as a
"middleman" or broker between the two ends of a client/server network
connection by intercepting all requests to the real server to see if it can
fulfill the requests itself. If not, it forwards the request to the real
server. Proxy servers work well between Web browsers and servers, or other
applications, by supporting underlying network protocols like HTTP.Proxy
servers have two main purposes. One thing it
can do is that it can dramatically improve
performance for groups of users. This is because it saves the results of
all requests for a certain amount of time. Consider the case where both user X
and user Y access the World Wide Web through a proxy server. First user X
requests a certain Web page, which will be called Page 1. Sometime later, user
Y requests the same page. Instead of forwarding the request to the Web server
where Page 1 resides, which can be a time-consuming operation, the proxy server
simply returns the Page 1 that it already fetched for user X. Since the proxy
server is often on the same network as the user, this is a much faster
operation. Real proxy servers support hundreds or thousands of users. The major
online services such as America Online, MSN
and Yahoo, for example, employ an array of proxy servers.Another
feature of proxy servers is that it can filter requests. For example, a company might use a proxy server to
prevent its employees from accessing a specific set of Web sites.Proxies can do many other things. For example,
they could translate multiple languages. They could shrink the size of a
response so it fits on ones mobile phone webscreen. They could also filter
nasty language or subjects.
Proxy Servers, Firewalling and Filtering
Proxy servers work at
the Application layer (Layer 7) of the OSI
model. As such, they aren't as popular as ordinary firewalls that work at lower
layers and support application-independent filtering. Proxy servers are also
more difficult to install and maintain than firewalls, as proxy functionality
for each application protocol like HTTP, SMTP, or SOCKS must be configured
individually. But, a properly configured proxy server
improves network security and performance. Proxies have capability that
ordinary firewalls simply cannot provide.Some
network administrators deploy both firewalls and proxy servers to work in
together. To do this, they install both firewall and proxy server software on a
server gateway.Because
they function at the OSI
Application layer, the filtering capability of proxy servers is
relatively intelligent compared to that of ordinary routers. For example, proxy
Web servers can check the URL of outgoing requests for Web pages by inspecting
HTTP GET and POST messages. Using
this feature, network administrators can bar access to illegal domains but
allow access to other sites. Ordinary firewalls, in contrast, cannot see Web
domain names inside those messages. Likewise for incoming data traffic,
ordinary routers can filter by port number or network address, but proxy
servers can also filter based on application content inside the messages.
Connection Sharing with Proxy Servers
Various
software products for connection sharing on small home networks have appeared
in recent years. In medium- and large-sized networks, however, actual proxy
servers offer a more scalable and cost-effective alternative for shared
Internet access. Rather than give each client computer a direct Internet
connection, all internal connections can be funneled through one or more
proxies that in turn connect to the outside.
Proxy Servers and Caching

Types of Proxy servers
Web
Proxies that attempt to block offensive
web content are implemented as web proxies. Other web proxies reformat web
pages for a specific purpose or audience; for example, Skweezer
reformats web pages for cell phones and PDAs. Network operators can also deploy
proxies to intercept computer viruses and other hostile content served from
remote web pages.A special case of web proxies are "CGI proxies." These are web sites that allow a
user to access a site through them. They generally use PHP or CGI to implement the proxying functionality. CGI proxies are frequently used to gain access to
web sites blocked by corporate or school proxies. Since they also hide the
user's own IP address from the web sites they access through the proxy, they
are sometimes also used to gain a degree of anonymity, called "Proxy
Avoidance."
Intercepting
Many organizations — including
corporations, schools, and families — use a proxy server to enforce acceptable
network use policies (see content-control software) or to provide security,
anti-malware and/or caching services. A traditional web proxy is not
transparent to the client application, which must be configured to use the
proxy (manually or with a configuration script). In some cases, where
alternative means of connection to the Internet are available (e.g. a SOCKS
server or NAT connection), the
user may be able to avoid policy control by simply resetting the client
configuration and bypassing the proxy. Furthermore administration of browser
configuration can be a burden for network administrators. 

An intercepting proxy, often
incorrectly called transparent proxy (also known as a forced proxy)
combines a proxy server with NAT. Connections made by client browsers through
the NAT are intercepted and redirected to the proxy without client-side
configuration (or often knowledge).Intercepting proxies are commonly used in
businesses to prevent avoidance of acceptable use policy, and to ease
administrative burden, since no client browser configuration is required.Intercepting proxies are also commonly used
by Internet Service Providers in many countries in order to reduce upstream
link bandwidth requirements by providing a shared cache to their customers.It is often possible to detect the use of
an intercepting proxy server by comparing the external IP address to the
address seen by an external web server, or by examining the HTTP headers on the
server side.Some poorly implemented intercepting
proxies have historically had certain downsides, e.g. an inability to use user
authentication if the proxy does not recognize that the browser was not
intending to talk to a proxy. Some problems are described in RFC 3143 (Known
HTTP Proxy/Caching Problems). A well-implemented proxy should not inhibit
browser authentication at all.The term transparent proxy, often
incorrectly used instead of intercepting proxy to describe the same
behavior, is defined in RFC 2616 (Hypertext Transfer Protocol -- HTTP/1.1) as:
"[A] proxy that does not modify the request or response beyond what is
required for proxy authentication and identification."
Open

Reverse
A reverse proxy is a proxy server
that is installed in the neighborhood of one or more web servers. All traffic
coming from the Internet and with a destination of one of the web servers goes
through the proxy server. There are several reasons for installing reverse
proxy servers:
·
Security:
the proxy server is
·
An additional
layer of defense and therefore protects the web servers further up the chain.
·
Encryption
/ SSL acceleration: when secure web sites are created, the SSL encryption is
often not done by the web server itself, but by a reverse proxy that is
equipped with SSL acceleration hardware. See Secure Sockets Layer.
·
Load
balancing: the reverse proxy can distribute the load to several web servers,
each web server serving its own application area. In such a case, the reverse
proxy may need to rewrite the URLs in each web page (translation from
externally known URLs to the internal locations)
·
Serve/cache
static content: A reverse proxy can offload the web servers by caching static
content like pictures and other static graphical content
·
Spoon
feeding: reduces resource usage caused by slow clients on the web servers by
caching the content the web server sent and slowly "spoon feeds" it
to the client. This especially benefits dynamically generated pages.
·
Extranet
Publishing: a reverse proxy server facing the Internet can be used to
communicate to a firewalled server internal to an organization, providing
extranet access to some functions while keeping the servers behind the
firewalls.
Split
A split proxy is effectively a pair
of proxies installed across two computers. Since they are effectively two parts
of the same program, they can communicate with each other in a more efficient
way than they can communicate with a more standard resource or tool such as a
website or browser. This is ideal for compressing data over a slow link, such
as a wireless or mobile data service and also for reducing the issues regarding
high latency links (such as satellite internet) where establishing a TCP connection is
time consuming. Taking
the example of web browsing, the user's browser is pointed to a local proxy
which then communicates with its other half at some remote location. This
remote server fetches the requisite data, repackages it and sends it back to
the user's local proxy, which unpacks the data and presents it to the browser
in the standard fashion.
Anonymous
Proxy Servers

Circumventor
A circumventor is a web-based page
that takes a site that is blocked and "circumvents" it through to an
unblocked website, allowing the user to view blocked pages. A famous example is
'elgooG', which allowed users in China to use Google after it had
been blocked there. elgooG differs from most circumventors in that it
circumvents only one block.The most common use is in schools where
many blocking programs block by site rather than by code; students are able to
access blocked sites (games, chatrooms, messenger, weapons, racism, forbidden
knowledge, etc.) through a circumventor. As fast as the filtering software
blocks circumventors, others spring up. It should be noted, however, that in
some cases the filter may still intercept traffic to the circumventor, thus the
person who manages the filter can still see the sites that are being visited.Circumventors are also used by people who
have been blocked from a website. Another use of a circumventor is to allow
access to country-specific services, so that Internet users from other
countries may also make use of them. An example is country-restricted
reproduction of media and webcasting.The use of circumventors
is usually safe with the exception that circumventor sites run by an untrusted
third party can be run with hidden intentions, such as collecting personal
information, and as a result users are typically advised against running
personal data such as credit card numbers or passwords through a circumventor.
At Schools and in Offices
Many work places and schools are cracking
down on the websites and online services that are made available in their
buildings. Websites like Myspace, Yahoo Games, and other social websites have
become targets of mass banning.Proxy Web server creators have become more
clever allowing users to encrypt links, and any data going to and from other
web servers. This allows users to access websites that would otherwise have
been blocked.
Case Study: Lander College
for Men
A few years
ago, a Touro College
campus was built with the vision that one can combine Judaic and secular
studies on a college level, called the Lander College
for Men. Early on, the policy towards watching movies was that as long as it
didn’t interfere with ones studies, one could do so in ones free time. But, the
network back then was so primitive that there was no filter set up. Either this
was because it was complex to set up, or that it was assumed that Yeshiva guys
wouldn’t dare take advantage of this weakness (dumb mistake, but with Touro,
anything’s possible), or both. In any case, it’s known that Touro has many
campuses worldwide, known as Touro University International. Suffice to say,
students in the dorm used programs like Kazaa and Bearshare to relentlessly
download video games, movies, and music files through Touro’s T1 connection.
They also shared movies through an outside server which ten or twenty people
would chip in a total of five hundred dollars for. Soon it was discovered why
students from other campuses were complaining about Touro’s computer network
being so slow. A data analysis had revealed that 68% of Touro
University ’s bandwidth was being used
up by the Lander College for Men campus alone. Some
estimates actually were well over 80%. This may be broken down to, say, 42%
consumed from actual student usage, and the rest being used up from one of
Landers’ routers which reportedly had a virus in it from a student download.
Keep in mind that this was with less than seventy five students on campus, a
quarter of which actually had personal computers in their dorm.
Once this was discovered,
Touro’s MIS department sprang into action, hiring 8e6 technologies to clean up
the mess with their filtering program to affect various key ports. Rabbinical
faculty thereupon forbade students to watch movies or play video games in the
dormitory, since incidentally students stopped attending “Night Seder,” a
mandatory evening program where one independently studied Judaic topics. The
result of this madness was that many legitimate students couldn’t get into
various websites like Google, for example, to do academic research. This
created uproar among the students. Some of the more knowledgeable decided to
rebel and test out ports through a program,

References
Mitchell, Bradley. “Proxy Servers Tutorial - About Proxy Servers.” About.com:
Wireless/Networking. 2007. <http://compnetworking.about.com/cs/proxyservers/a/proxyservers.htm>
“Proxy Servers.” Wikipedia. 2007. <http://en.wikipedia.org/wiki/Proxy_servers>
“Proxy Server.” Webopedia. 2007. <http://www.webopedia.com/TERM/p/proxy_server.html>
“Public Proxy Servers.”< http://www.publicproxyservers.com/index.html>
No comments:
Post a Comment