简评使用http代理服务器的安全性简评(On the safety of HTTP proxy server)

http代理服务器  时间:2021-03-03  阅读:()

使用http代理服务器的安全性简评On the safety of HTTP proxyserver

Due to various reasons, in the domestic Internet, it isunavoidable to deal with HTTP proxy server. HTTP proxy serveris divided into encrypted proxy server and general proxy server.If we run some software on your computer can access before cannot access the site, then it may be encrypted proxy; if we setthe proxy server in the browser, without running any software,so this type of proxy server is the general agent. In general,encryption agent security is better than ordinary proxy ifthere is no problem with encryption agent software. Here, thisarticle is mainly about the security of ordinary agents.Brief introduction of 1 and HTTP proxy agreement

The communication between the browser and the HTTP proxy serveris through the HTTP proxy protocol. If we do not use theencrypted proxy running on your computer, but directly in thebrowser settings on the internet proxy server address, thensend between the browser and proxy server communication to theInternet will. The common requests of proxy server are GET, POSTand CONNECT, and the following are introduced respectively:

1. 1, GE T

If we access aweb page of a HTTP protocol through a proxy server,then the browser sends the GET request to the HTTP proxy server.For example, when we access http://www.microsoft.com/ througha proxy server, the browser sends data to the HTTP proxy server:

. . . . . .

After the proxy server gets the data, the web page is returnedto the browser:

HTTP/1. 1 200 OK

. . . . . .

<html>

. . . . . .

We did not use and comparison of the proxy server, if not usinga proxy server, then we visit http://www.microsoft.com/, thebrowser will send a request to the server underwww.microsoft.com:

GET / HTTP/1. 1

. . . . . .

Server return:

HTTP/1. 1 200 OK

. . . . . .

<html>

. . . . . .

We see that after using the proxy server, the format of the GETrequest and return is almost unchanged, and there is nodifference in the security of using the proxy server.

1.2, POST

When we submit the form in the use of the HTTP protocol on thesite (such as the website user login form, fill in the user nameand password, and then log in, the form is submitted to theserver) , if the form type is POST (most of the type of form isPOST, but the search engine search form seemed to be GET type) ,then the browser will send a POST request to the proxy server.Comments such as inhttp://www.williamlong. info/archives/2209.html, the datawill be submitted to the http://www.williamlong. info/cmd.asp?Act=cmt&key=a666b083, if we use the HTTP proxy server, therequest will be sent to the proxy server:

POST http://www.williamlong. info/cmd.asp?

Act=cmt&key=a666b083 HTTP/1. 1

. . . . . .

[submission of comment data]

If the proxy server is not used, the following POST requestsare sent directly to the www.williamlong. info server:

POST /cmd.asp? Act=cmt&key=a666b083 HTTP/1. 1

. . . . . .

[submission of comment data]

The results returned using proxy server and without proxyserver are basically the same. So POST requests are basicallyno different in terms of the security of using proxy servers.

1.3, CONNECT

When we visit the HTTPS protocol web site, the browser sendsthe CONNECT request to the proxy server. For example, we visithttps://mail.google.

When com/mail/? Shva=1#inbox, the browser sends the followingrequest to the proxy server:

CONNECT mail.google.com:443 HTTP/1.0

. . . . . .

Then the server returns:

HTTP/1. 1 200 Connection established

. . . . . .

Then the browser starts sending encrypted data to the proxyserver, using the mail.google. com SSL certificate. The proxy

server to encrypt data as mail.google. com returns back to thebrowser.

If you don't use a proxy server, the browser connects directlyto the mail.google. com:443, and then starts sending andreceiving encrypted data.

We see that the use of the HTTP proxy server, HTTPS protocolcontent still end-to-end encryption, HTTPS still maintains thetransmission of any content will not be responsible for datatransmission equipment (including proxy server) to see thecharacteristics. Whether the proxy server is used does notchange the security of the HTTPS protocol.

2. Discuss in depth

Q: we see, after using the proxy server will need to access thedomain name of the website (including HTTPS) sent to the proxyserver, so that if the network being monitored, you will knowwhat sites we visit (but not HTTPS protocol to monitor thecontents of the transmission, only know that we visited thewebsite) , this is reduce security?

A: if our network is monitored, all network data packets arerecorded, so if you don't use a proxy server, the browser willfirst send a query to the corresponding domain name IP DNSrequest, IP will also be sent after the TCP connection requestto the need to visit the site, they can knowwhat sites we visitby network packet monitor.

Q: some proxy server products claim to be able to record the

contents of HTTPS transmission. How do they do that?

A: using the SSL hijacking means. These proxy server products,without exception, need to install the corresponding client,once you install these clients, you can control the clientcomputer, and then install the proxy server' s own certificate,SSL hijacking. Some products do not need to install the client,but the client browser access all the HTTPS web site, but thebrowser SSL certificate validation, the browser will give thecertificate invalid warning.

Q: if we were not able to access a website, use a proxy servercan be put on the website, this website is the HTTP protocol,so that access to this site all actions are logged in themonitored network environment?

A: yes. Because the proxy server does not change the securityof the HTTP protocol, all the contents of the plaintexttransmission can be recorded by the monitoring system. So, weuse a proxy server to submit important information (such as username and password) , you must select the HTTPS protocol, enterthe user name and password in the need to pay attention to thebrowser' s address bar is not to begin with https.

Q: after using aproxy server, theway the network packet passesis not different from that of the proxy server. What' s theimpact on the security?

A: it depends on every node in the road that was used beforeand after the proxy server was used. Even if you do not use aproxy server, the Internet still face a variety of human network

fault, using a proxy server because of the path is different,so there may still need to face these artificial networkfailures, there may be no need to face these people a networkfailure (if the proxy server itself specifically addressesthese failures) .

3, s umm ary

The above, using a remote HTTP proxy server security and do notuse a proxy server basic does not have what difference, thehuman network problems we face in using a proxy server theremay still exist, but also may reduce or even disappear.If someone offers artificial network failure to resolve theproxy server in the country, not to use or inability to useencryption software agents used, combined with the "proxyserver" and how to use AutoProxy, the agent of the era mightcome oh.

ZJI全新上架香港站群服务器,4C段238个IP月付1400元起

ZJI本月新上线了香港葵湾机房站群服务器,提供4个C段238个IPv4,支持使用8折优惠码,优惠后最低每月1400元起。ZJI是原Wordpress圈知名主机商家:维翔主机,成立于2011年,2018年9月更名为ZJI,提供中国香港、台湾、日本、美国独立服务器(自营/数据中心直营)租用及VDS、虚拟主机空间、域名注册等业务,所选数据中心均为国内普遍访问速度不错的机房。葵湾二型(4C站群)CPU:I...

Vultr VPS新增第18个数据中心 瑞典斯德哥尔摩欧洲VPS主机机房

前几天还在和做外贸业务的网友聊着有哪些欧洲机房的云服务器、VPS商家值得选择的。其中介绍他选择的还是我们熟悉的Vultr VPS服务商,拥有比较多达到17个数据中心,这不今天在登录VULTR商家的时候看到消息又新增一个新的机房。这算是第18个数据中心,也是欧洲VPS主机,地区是瑞典斯德哥尔摩。如果我们有需要欧洲机房的朋友现在就可以看到开通的机房中有可以选择瑞典机房。目前欧洲已经有五个机房可以选择,...

百纵科技(19元/月),美国洛杉矶10G防御服务器/洛杉矶C3机房 带金盾高防

百纵科技官网:https://www.baizon.cn/百纵科技:美国云服务器活动重磅来袭,洛杉矶C3机房 带金盾高防,会员后台可自助管理防火墙,添加黑白名单 CC策略开启低中高.CPU全系列E52680v3 DDR4内存 三星固态盘列阵。另有高防清洗!美国洛杉矶 CN2 云服务器CPU内存带宽数据盘防御价格1H1G10M10G10G19元/月 购买地址2H1G10M10G10G29元/月 购买...

http代理服务器为你推荐
湖南商标注册湖南商标注册最好的公司中小企业信息化中小企业信息化途径有哪些iphone越狱后怎么恢复苹果手机越狱后怎么恢复硬盘人硬盘是指什么人开机滚动条如何关闭开机滚动条?开机滚动条谁会调开机的滚动条ios7固件下载ios7发布当天是否有固件下载lockdowndiphone4s 完美越狱5.1.1时出现Could not connect to lockdownd。求救啊!!二层交换机集线器和二层交换机,三层交换机的区别虚拟专用网intranet,extranet,虚拟专用网与internet有什么区别与联系
西安虚拟主机 代理域名备案 阿里云搜索 56折 老左博客 双11抢红包攻略 lighttpd 远程登陆工具 512m内存 长沙服务器 韩国网名大全 dd444 web服务器架设 bgp双线 柚子舍官网 工信部icp备案号 工作站服务器 卡巴斯基试用版 qq对话框 河南移动网 更多