SlideShare una empresa de Scribd logo
1 de 15
Proxy Servers


   CS-480b
  Dick Steflik
Proxy Servers
• Part of an overall Firewall strategy
• Sits between the local network and the external network
    • Originally used primarily as a caching strategy to minimize outgoing URL
      requests and increase perceived browser performance
    • Primary mission is now to insure anonymity of internal users
        • Still used for caching of frequently requested files
        • Also used for content filtering
• Acts as a go-between, submitting your requests to the external network

    • Requests are translated from your IP address to the Proxy’s IP address
    • E-mail addresses of internal users are removed from request headers
    • Cause an actual break in the flow of communications
Security Advantages
• Terminates the TCP connection before relaying to target host (in and out)

• Hide internal clients from external network

• Blocking of dangerous URLs

• Filter dangerous content

• Check consistency of retrieved content

• Eliminate need for transport layer routing between networks

• Single point of access, control and logging
TCP Connection Termination
• Both the outgoing and incoming TCP connections are terminated
• prevents a hacker from hijacking a stale connection on a service that is
  being proxied
• ex . HTTP page request

                                                request packet’
            request packet
 User                                 Proxy                            Server


              response packet                     response packet’



        Connection left open until the        Connection only left open until
        proxy closes it after receiving       server closes the connection after
        response packet and sending it        sending the response packet
        back to user
TCP Connection Termination
• Transport layer packets don’t need to be routed because the entire
   request must be regenerated
    • Prevents transport layer exploits
         • source routing
         • fragmentation
         • several DoS attacks
• Since some protocols don’t have proxies available many admins will
  enable routing, this alleviates any benefit gained
• Most good proxy servers will allow you to create generic proxies
  using SOCKS or the redir utility
Performance Aspects
• Caching
   • By keeping local copies of frequently accessed file the proxy can serve
     those files back to a requesting browser without going to the external site
     each time, this dramatically improves the performance seen by the end
     user
   • Only makes sense to implement this at the ISP rather than the small
     business level because of the number of pages available
   • Because of dynamic content many pages are invalidated in the cache right
     away
• Load balancing
   • A proxy can be used in a reverse direction to balance the load amongst a
     set of identical servers (servers inside the firewall and users outside)
   • Used especially with web dynamic content (.asp, .php,.cfm,.jsp)
Proxy Liabilities
• Single point of failure
    • if the proxy dies , no one can get to the external network

• Client software must usually be designed to use a proxy

• Proxies must exist for each service

• Doesn’t protect the OS
    • proxies run at the application level

• Usually optimized for performance rather than security
    • WINGATE was installed to be easy to configure; opened a winsock proxy
       to the external interface, which let hackers essentially hijack the machine
• Create a service bottleneck
    • solved via parallelism (more proxies, and load balance)
Transparent / Opaque
• Transparent – both parties (local/remote) are unaware that the
   connection is being proxied
    • Zorp - application layer proxy is transparent

• Opaque – the local party must configure client software to use the
   proxy
    • client software must be proxy-aware software
    • Netscape proxy server is opaque

• With all of the things modern firewalls can do in the area of
   redirection you could configure the firewall to redirect all http requests
   to a proxy
    • no user configuration required (transparent)
Circuit Level Proxies
• Since some protocols require a real connection between the client
   and server, a regular proxy can’t be used
   • Windows Media Player, Internet Relay Chat (IRC), or Telnet
• Circuit-level proxy servers were devised to simplify matters.
   • Instead of operating at the Application layer, they work as a "shim" between the
       Application layer and the Transport layer, monitoring TCP handshaking between
       packets from trusted clients or servers to untrusted hosts, and vice versa. The
       proxy server is still an intermediary between the two parties, but this time it
       establishes a virtual circuit between them.
• By using SOCKS (RFC 1928) this can be done
    • SOCKS defines a cross-platform standard for accessing circuit-level proxies
    • SOCKS Version 5 also supports both username/password (RFC 1929) and API-
       based (RFC 1961) authentication. It also supports both public and private key
       encryption.
    • SOCKS 5 is capable of solving this problem by establishing TCP connections and
       then using these to relay UDP data.
SOCKS based Proxying
• RFC 1928
• Not a true application layer proxy
• SOCKS protocol provides a framework for developing secure
  communications by easily integrating other security technologies
• SOCKS includes two components
   • SOCKS server
       • implemented at the application layer
   • SOCKS client
       • implemented between the application and transport layers
• The basic purpose of the protocol is to enable hosts on one side of
  a SOCKS server to gain access to hosts on the other side of a
  SOCKS Server, without requiring direct IP-reachability .
• Copies packet payloads through the proxy
Socks Architecture
Socks Functionality
GNU ZORP Proxy Firewall Suite
• Protocol Analyzing Firewall
• core framework allows:
    • the administrator to fine tune proxy decisions (Python based)
    • fully analyze complex protocols with an application-level gateway:
        • SSH with several forwarded TCP connections
        • SSL with an embedded POP3 protocol).
        • FTP, TTP, finger, whois, SSL .
• Usually integrated into the network topology as routers, this means that they
   have an IP address in all their subnets, and hosts on different subnets use
   the firewall as their gateway to the outside world.
• Proxy based but uses a packet filter to preprocess the packet stream and
   provide transparency.
How Zorp Works
•   A TCP session is established in the following way:

•   client initiates a connection by sending a SYN packet destined to the server

•   the firewall behaves as a router between the client and the server, receives the SYN
    packet on one of its interfaces and consults the packet filter

•   the packet filter rulebase is checked whether the given packet is permitted
•   if the given connection is to be processed by a proxy, then the packet filter rulebase
    contains a REDIRECT (ipchains) or TPROXY (iptables) target. Both REDIRECT and
    TPROXY requires a port parameter which tells the local port of the firewall host
    where the proxy is listening.
•   Zorp accepts the connection, checks its own access control rules and starts the
    appropriate proxy
•   the proxy connects to the server on its own as needed (the server side connection is
    not necessarily established immediately)
•   the proxy mediates protocol requests and responses between the communicating hosts
    while analyzing the ongoing stream
Best Practices
• Use a Real Firewall

• Disable Routing

• Secure the Base Operating System
    • harden the OS

• Disable External Access

• Disable unneeded Services

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Firewall
FirewallFirewall
Firewall
 
Proxy
ProxyProxy
Proxy
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Wireshark
WiresharkWireshark
Wireshark
 
Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network main
 
Internet Cookies
Internet CookiesInternet Cookies
Internet Cookies
 
Proxy server
Proxy serverProxy server
Proxy server
 
Dos attack
Dos attackDos attack
Dos attack
 
Cyber Security Terms
Cyber Security TermsCyber Security Terms
Cyber Security Terms
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle Attack
 
Network security
Network securityNetwork security
Network security
 
Onion protocol
Onion protocolOnion protocol
Onion protocol
 
Firewall & types of Firewall
Firewall & types of Firewall Firewall & types of Firewall
Firewall & types of Firewall
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
 
Web security
Web securityWeb security
Web security
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
 
Firewall
FirewallFirewall
Firewall
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 

Destacado

How a Proxy Server Works
How a Proxy Server WorksHow a Proxy Server Works
How a Proxy Server WorksMer Joyce
 
seminar on proxyserver
seminar on proxyserverseminar on proxyserver
seminar on proxyserverNiraj Barnwal
 
Advantages of proxy server
Advantages of proxy serverAdvantages of proxy server
Advantages of proxy servergreatbury
 
WT - Firewall & Proxy Server
WT - Firewall & Proxy ServerWT - Firewall & Proxy Server
WT - Firewall & Proxy Servervinay arora
 
Linux11 Proxy Server
Linux11 Proxy ServerLinux11 Proxy Server
Linux11 Proxy ServerJainul Musani
 
Mail server on linux
Mail server on linux Mail server on linux
Mail server on linux Roshni17
 
Fin415 Week 4 Slides
Fin415 Week 4 SlidesFin415 Week 4 Slides
Fin415 Week 4 Slidessmarkbarnes
 
Optimizing Proxy Server Performance
Optimizing Proxy Server PerformanceOptimizing Proxy Server Performance
Optimizing Proxy Server PerformanceGeorge Coutsoumbidis
 
Dr Rosanne Hawarden's thesis on the networks of men and women board directors
Dr Rosanne Hawarden's thesis on the networks of men and women board directorsDr Rosanne Hawarden's thesis on the networks of men and women board directors
Dr Rosanne Hawarden's thesis on the networks of men and women board directorsRosanne Hawarden
 
Group18_Awesome4some:Proxy server.ppt
Group18_Awesome4some:Proxy server.pptGroup18_Awesome4some:Proxy server.ppt
Group18_Awesome4some:Proxy server.pptAnitha Selvan
 
2014-37. Membangun mail server dengan zimbra pada linux
2014-37.  Membangun mail server dengan zimbra pada linux2014-37.  Membangun mail server dengan zimbra pada linux
2014-37. Membangun mail server dengan zimbra pada linuxSyiroy Uddin
 
2014-25. Mail server menggunakan zimbra
2014-25. Mail server menggunakan zimbra2014-25. Mail server menggunakan zimbra
2014-25. Mail server menggunakan zimbraSyiroy Uddin
 
Panduan praktis membangun web server dan web mail lokal
Panduan praktis membangun web server dan web mail lokalPanduan praktis membangun web server dan web mail lokal
Panduan praktis membangun web server dan web mail lokalAbas Djumadi
 
Presentasi MSDK Mail Server
Presentasi MSDK Mail ServerPresentasi MSDK Mail Server
Presentasi MSDK Mail ServerApradiz Newcyber
 
PROJECT ARRANGED (FINAL)
PROJECT ARRANGED (FINAL)PROJECT ARRANGED (FINAL)
PROJECT ARRANGED (FINAL)Joseph Olumide
 

Destacado (20)

How a Proxy Server Works
How a Proxy Server WorksHow a Proxy Server Works
How a Proxy Server Works
 
seminar on proxyserver
seminar on proxyserverseminar on proxyserver
seminar on proxyserver
 
Advantages of proxy server
Advantages of proxy serverAdvantages of proxy server
Advantages of proxy server
 
Proxy Servers & Firewalls
Proxy Servers & FirewallsProxy Servers & Firewalls
Proxy Servers & Firewalls
 
WT - Firewall & Proxy Server
WT - Firewall & Proxy ServerWT - Firewall & Proxy Server
WT - Firewall & Proxy Server
 
Linux11 Proxy Server
Linux11 Proxy ServerLinux11 Proxy Server
Linux11 Proxy Server
 
Mail server
Mail serverMail server
Mail server
 
Mail server on linux
Mail server on linux Mail server on linux
Mail server on linux
 
Fin415 Week 4 Slides
Fin415 Week 4 SlidesFin415 Week 4 Slides
Fin415 Week 4 Slides
 
Optimizing Proxy Server Performance
Optimizing Proxy Server PerformanceOptimizing Proxy Server Performance
Optimizing Proxy Server Performance
 
Proxy Presentation
Proxy PresentationProxy Presentation
Proxy Presentation
 
Dr Rosanne Hawarden's thesis on the networks of men and women board directors
Dr Rosanne Hawarden's thesis on the networks of men and women board directorsDr Rosanne Hawarden's thesis on the networks of men and women board directors
Dr Rosanne Hawarden's thesis on the networks of men and women board directors
 
Group18_Awesome4some:Proxy server.ppt
Group18_Awesome4some:Proxy server.pptGroup18_Awesome4some:Proxy server.ppt
Group18_Awesome4some:Proxy server.ppt
 
Reverse proxy
Reverse proxyReverse proxy
Reverse proxy
 
2014-37. Membangun mail server dengan zimbra pada linux
2014-37.  Membangun mail server dengan zimbra pada linux2014-37.  Membangun mail server dengan zimbra pada linux
2014-37. Membangun mail server dengan zimbra pada linux
 
2014-25. Mail server menggunakan zimbra
2014-25. Mail server menggunakan zimbra2014-25. Mail server menggunakan zimbra
2014-25. Mail server menggunakan zimbra
 
Panduan praktis membangun web server dan web mail lokal
Panduan praktis membangun web server dan web mail lokalPanduan praktis membangun web server dan web mail lokal
Panduan praktis membangun web server dan web mail lokal
 
Presentasi MSDK Mail Server
Presentasi MSDK Mail ServerPresentasi MSDK Mail Server
Presentasi MSDK Mail Server
 
PROJECT ARRANGED (FINAL)
PROJECT ARRANGED (FINAL)PROJECT ARRANGED (FINAL)
PROJECT ARRANGED (FINAL)
 
Interanet Mailing
Interanet Mailing  Interanet Mailing
Interanet Mailing
 

Similar a Proxy servers

98 366 mva slides lesson 8
98 366 mva slides lesson 898 366 mva slides lesson 8
98 366 mva slides lesson 8suddenven
 
Firewall & Proxy Server
Firewall & Proxy ServerFirewall & Proxy Server
Firewall & Proxy ServerLakshyaArora12
 
Packet Filter Firewall and Application Level Gateway.pptx
Packet Filter Firewall and Application Level Gateway.pptxPacket Filter Firewall and Application Level Gateway.pptx
Packet Filter Firewall and Application Level Gateway.pptxssuserec53e73
 
Firewalls (1).ppt
Firewalls (1).pptFirewalls (1).ppt
Firewalls (1).pptadnanetnzr
 
Firewalls presentation powerpoint powepoint
Firewalls presentation powerpoint powepointFirewalls presentation powerpoint powepoint
Firewalls presentation powerpoint powepointanxiousanoja
 
Unit 5.3_Firewalls (1).ppt
Unit 5.3_Firewalls (1).pptUnit 5.3_Firewalls (1).ppt
Unit 5.3_Firewalls (1).pptAnuReddy68
 
Firewalls.ppt
Firewalls.pptFirewalls.ppt
Firewalls.pptKaushal72
 
Network security chapter 6 and 7 internet architecture
Network security chapter  6 and 7 internet   architectureNetwork security chapter  6 and 7 internet   architecture
Network security chapter 6 and 7 internet architectureMuhammad ismail Shah
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementationajeet singh
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementationajeet singh
 

Similar a Proxy servers (20)

MVA slides lesson 8
MVA slides lesson 8MVA slides lesson 8
MVA slides lesson 8
 
98 366 mva slides lesson 8
98 366 mva slides lesson 898 366 mva slides lesson 8
98 366 mva slides lesson 8
 
Advance firewalls
Advance firewallsAdvance firewalls
Advance firewalls
 
Firewall & Proxy Server
Firewall & Proxy ServerFirewall & Proxy Server
Firewall & Proxy Server
 
Packet Filter Firewall and Application Level Gateway.pptx
Packet Filter Firewall and Application Level Gateway.pptxPacket Filter Firewall and Application Level Gateway.pptx
Packet Filter Firewall and Application Level Gateway.pptx
 
Firewalls.ppt
Firewalls.pptFirewalls.ppt
Firewalls.ppt
 
Firewalls.ppt
Firewalls.pptFirewalls.ppt
Firewalls.ppt
 
Firewalls (1).ppt
Firewalls (1).pptFirewalls (1).ppt
Firewalls (1).ppt
 
Fw.ppt
Fw.pptFw.ppt
Fw.ppt
 
Firewalls.ppt
Firewalls.pptFirewalls.ppt
Firewalls.ppt
 
Firewalls presentation powerpoint powepoint
Firewalls presentation powerpoint powepointFirewalls presentation powerpoint powepoint
Firewalls presentation powerpoint powepoint
 
Unit 5.3_Firewalls (1).ppt
Unit 5.3_Firewalls (1).pptUnit 5.3_Firewalls (1).ppt
Unit 5.3_Firewalls (1).ppt
 
Firewalls.ppt
Firewalls.pptFirewalls.ppt
Firewalls.ppt
 
Web proxy server
Web proxy serverWeb proxy server
Web proxy server
 
Web proxy server
Web proxy serverWeb proxy server
Web proxy server
 
Firewalls.ppt
Firewalls.pptFirewalls.ppt
Firewalls.ppt
 
Network security chapter 6 and 7 internet architecture
Network security chapter  6 and 7 internet   architectureNetwork security chapter  6 and 7 internet   architecture
Network security chapter 6 and 7 internet architecture
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
applayer.pptx
applayer.pptxapplayer.pptx
applayer.pptx
 

Más de Kumar

Graphics devices
Graphics devicesGraphics devices
Graphics devicesKumar
 
Fill area algorithms
Fill area algorithmsFill area algorithms
Fill area algorithmsKumar
 
region-filling
region-fillingregion-filling
region-fillingKumar
 
Bresenham derivation
Bresenham derivationBresenham derivation
Bresenham derivationKumar
 
Bresenham circles and polygons derication
Bresenham circles and polygons dericationBresenham circles and polygons derication
Bresenham circles and polygons dericationKumar
 
Introductionto xslt
Introductionto xsltIntroductionto xslt
Introductionto xsltKumar
 
Extracting data from xml
Extracting data from xmlExtracting data from xml
Extracting data from xmlKumar
 
Xml basics
Xml basicsXml basics
Xml basicsKumar
 
XML Schema
XML SchemaXML Schema
XML SchemaKumar
 
Publishing xml
Publishing xmlPublishing xml
Publishing xmlKumar
 
Applying xml
Applying xmlApplying xml
Applying xmlKumar
 
Introduction to XML
Introduction to XMLIntroduction to XML
Introduction to XMLKumar
 
How to deploy a j2ee application
How to deploy a j2ee applicationHow to deploy a j2ee application
How to deploy a j2ee applicationKumar
 
JNDI, JMS, JPA, XML
JNDI, JMS, JPA, XMLJNDI, JMS, JPA, XML
JNDI, JMS, JPA, XMLKumar
 
EJB Fundmentals
EJB FundmentalsEJB Fundmentals
EJB FundmentalsKumar
 
JSP and struts programming
JSP and struts programmingJSP and struts programming
JSP and struts programmingKumar
 
java servlet and servlet programming
java servlet and servlet programmingjava servlet and servlet programming
java servlet and servlet programmingKumar
 
Introduction to JDBC and JDBC Drivers
Introduction to JDBC and JDBC DriversIntroduction to JDBC and JDBC Drivers
Introduction to JDBC and JDBC DriversKumar
 
Introduction to J2EE
Introduction to J2EEIntroduction to J2EE
Introduction to J2EEKumar
 

Más de Kumar (20)

Graphics devices
Graphics devicesGraphics devices
Graphics devices
 
Fill area algorithms
Fill area algorithmsFill area algorithms
Fill area algorithms
 
region-filling
region-fillingregion-filling
region-filling
 
Bresenham derivation
Bresenham derivationBresenham derivation
Bresenham derivation
 
Bresenham circles and polygons derication
Bresenham circles and polygons dericationBresenham circles and polygons derication
Bresenham circles and polygons derication
 
Introductionto xslt
Introductionto xsltIntroductionto xslt
Introductionto xslt
 
Extracting data from xml
Extracting data from xmlExtracting data from xml
Extracting data from xml
 
Xml basics
Xml basicsXml basics
Xml basics
 
XML Schema
XML SchemaXML Schema
XML Schema
 
Publishing xml
Publishing xmlPublishing xml
Publishing xml
 
DTD
DTDDTD
DTD
 
Applying xml
Applying xmlApplying xml
Applying xml
 
Introduction to XML
Introduction to XMLIntroduction to XML
Introduction to XML
 
How to deploy a j2ee application
How to deploy a j2ee applicationHow to deploy a j2ee application
How to deploy a j2ee application
 
JNDI, JMS, JPA, XML
JNDI, JMS, JPA, XMLJNDI, JMS, JPA, XML
JNDI, JMS, JPA, XML
 
EJB Fundmentals
EJB FundmentalsEJB Fundmentals
EJB Fundmentals
 
JSP and struts programming
JSP and struts programmingJSP and struts programming
JSP and struts programming
 
java servlet and servlet programming
java servlet and servlet programmingjava servlet and servlet programming
java servlet and servlet programming
 
Introduction to JDBC and JDBC Drivers
Introduction to JDBC and JDBC DriversIntroduction to JDBC and JDBC Drivers
Introduction to JDBC and JDBC Drivers
 
Introduction to J2EE
Introduction to J2EEIntroduction to J2EE
Introduction to J2EE
 

Último

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Último (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Proxy servers

  • 1. Proxy Servers CS-480b Dick Steflik
  • 2. Proxy Servers • Part of an overall Firewall strategy • Sits between the local network and the external network • Originally used primarily as a caching strategy to minimize outgoing URL requests and increase perceived browser performance • Primary mission is now to insure anonymity of internal users • Still used for caching of frequently requested files • Also used for content filtering • Acts as a go-between, submitting your requests to the external network • Requests are translated from your IP address to the Proxy’s IP address • E-mail addresses of internal users are removed from request headers • Cause an actual break in the flow of communications
  • 3. Security Advantages • Terminates the TCP connection before relaying to target host (in and out) • Hide internal clients from external network • Blocking of dangerous URLs • Filter dangerous content • Check consistency of retrieved content • Eliminate need for transport layer routing between networks • Single point of access, control and logging
  • 4. TCP Connection Termination • Both the outgoing and incoming TCP connections are terminated • prevents a hacker from hijacking a stale connection on a service that is being proxied • ex . HTTP page request request packet’ request packet User Proxy Server response packet response packet’ Connection left open until the Connection only left open until proxy closes it after receiving server closes the connection after response packet and sending it sending the response packet back to user
  • 5. TCP Connection Termination • Transport layer packets don’t need to be routed because the entire request must be regenerated • Prevents transport layer exploits • source routing • fragmentation • several DoS attacks • Since some protocols don’t have proxies available many admins will enable routing, this alleviates any benefit gained • Most good proxy servers will allow you to create generic proxies using SOCKS or the redir utility
  • 6. Performance Aspects • Caching • By keeping local copies of frequently accessed file the proxy can serve those files back to a requesting browser without going to the external site each time, this dramatically improves the performance seen by the end user • Only makes sense to implement this at the ISP rather than the small business level because of the number of pages available • Because of dynamic content many pages are invalidated in the cache right away • Load balancing • A proxy can be used in a reverse direction to balance the load amongst a set of identical servers (servers inside the firewall and users outside) • Used especially with web dynamic content (.asp, .php,.cfm,.jsp)
  • 7. Proxy Liabilities • Single point of failure • if the proxy dies , no one can get to the external network • Client software must usually be designed to use a proxy • Proxies must exist for each service • Doesn’t protect the OS • proxies run at the application level • Usually optimized for performance rather than security • WINGATE was installed to be easy to configure; opened a winsock proxy to the external interface, which let hackers essentially hijack the machine • Create a service bottleneck • solved via parallelism (more proxies, and load balance)
  • 8. Transparent / Opaque • Transparent – both parties (local/remote) are unaware that the connection is being proxied • Zorp - application layer proxy is transparent • Opaque – the local party must configure client software to use the proxy • client software must be proxy-aware software • Netscape proxy server is opaque • With all of the things modern firewalls can do in the area of redirection you could configure the firewall to redirect all http requests to a proxy • no user configuration required (transparent)
  • 9. Circuit Level Proxies • Since some protocols require a real connection between the client and server, a regular proxy can’t be used • Windows Media Player, Internet Relay Chat (IRC), or Telnet • Circuit-level proxy servers were devised to simplify matters. • Instead of operating at the Application layer, they work as a "shim" between the Application layer and the Transport layer, monitoring TCP handshaking between packets from trusted clients or servers to untrusted hosts, and vice versa. The proxy server is still an intermediary between the two parties, but this time it establishes a virtual circuit between them. • By using SOCKS (RFC 1928) this can be done • SOCKS defines a cross-platform standard for accessing circuit-level proxies • SOCKS Version 5 also supports both username/password (RFC 1929) and API- based (RFC 1961) authentication. It also supports both public and private key encryption. • SOCKS 5 is capable of solving this problem by establishing TCP connections and then using these to relay UDP data.
  • 10. SOCKS based Proxying • RFC 1928 • Not a true application layer proxy • SOCKS protocol provides a framework for developing secure communications by easily integrating other security technologies • SOCKS includes two components • SOCKS server • implemented at the application layer • SOCKS client • implemented between the application and transport layers • The basic purpose of the protocol is to enable hosts on one side of a SOCKS server to gain access to hosts on the other side of a SOCKS Server, without requiring direct IP-reachability . • Copies packet payloads through the proxy
  • 13. GNU ZORP Proxy Firewall Suite • Protocol Analyzing Firewall • core framework allows: • the administrator to fine tune proxy decisions (Python based) • fully analyze complex protocols with an application-level gateway: • SSH with several forwarded TCP connections • SSL with an embedded POP3 protocol). • FTP, TTP, finger, whois, SSL . • Usually integrated into the network topology as routers, this means that they have an IP address in all their subnets, and hosts on different subnets use the firewall as their gateway to the outside world. • Proxy based but uses a packet filter to preprocess the packet stream and provide transparency.
  • 14. How Zorp Works • A TCP session is established in the following way: • client initiates a connection by sending a SYN packet destined to the server • the firewall behaves as a router between the client and the server, receives the SYN packet on one of its interfaces and consults the packet filter • the packet filter rulebase is checked whether the given packet is permitted • if the given connection is to be processed by a proxy, then the packet filter rulebase contains a REDIRECT (ipchains) or TPROXY (iptables) target. Both REDIRECT and TPROXY requires a port parameter which tells the local port of the firewall host where the proxy is listening. • Zorp accepts the connection, checks its own access control rules and starts the appropriate proxy • the proxy connects to the server on its own as needed (the server side connection is not necessarily established immediately) • the proxy mediates protocol requests and responses between the communicating hosts while analyzing the ongoing stream
  • 15. Best Practices • Use a Real Firewall • Disable Routing • Secure the Base Operating System • harden the OS • Disable External Access • Disable unneeded Services