简评使用http代理服务器的安全性简评(On the safety of HTTP proxy server)

http代理服务器  时间:2021-03-03  阅读:()

使用http代理服务器的安全性简评On the safety of HTTP proxyserver

Due to various reasons, in the domestic Internet, it isunavoidable to deal with HTTP proxy server. HTTP proxy serveris divided into encrypted proxy server and general proxy server.If we run some software on your computer can access before cannot access the site, then it may be encrypted proxy; if we setthe proxy server in the browser, without running any software,so this type of proxy server is the general agent. In general,encryption agent security is better than ordinary proxy ifthere is no problem with encryption agent software. Here, thisarticle is mainly about the security of ordinary agents.Brief introduction of 1 and HTTP proxy agreement

The communication between the browser and the HTTP proxy serveris through the HTTP proxy protocol. If we do not use theencrypted proxy running on your computer, but directly in thebrowser settings on the internet proxy server address, thensend between the browser and proxy server communication to theInternet will. The common requests of proxy server are GET, POSTand CONNECT, and the following are introduced respectively:

1. 1, GE T

If we access aweb page of a HTTP protocol through a proxy server,then the browser sends the GET request to the HTTP proxy server.For example, when we access http://www.microsoft.com/ througha proxy server, the browser sends data to the HTTP proxy server:

. . . . . .

After the proxy server gets the data, the web page is returnedto the browser:

HTTP/1. 1 200 OK

. . . . . .

<html>

. . . . . .

We did not use and comparison of the proxy server, if not usinga proxy server, then we visit http://www.microsoft.com/, thebrowser will send a request to the server underwww.microsoft.com:

GET / HTTP/1. 1

. . . . . .

Server return:

HTTP/1. 1 200 OK

. . . . . .

<html>

. . . . . .

We see that after using the proxy server, the format of the GETrequest and return is almost unchanged, and there is nodifference in the security of using the proxy server.

1.2, POST

When we submit the form in the use of the HTTP protocol on thesite (such as the website user login form, fill in the user nameand password, and then log in, the form is submitted to theserver) , if the form type is POST (most of the type of form isPOST, but the search engine search form seemed to be GET type) ,then the browser will send a POST request to the proxy server.Comments such as inhttp://www.williamlong. info/archives/2209.html, the datawill be submitted to the http://www.williamlong. info/cmd.asp?Act=cmt&key=a666b083, if we use the HTTP proxy server, therequest will be sent to the proxy server:

POST http://www.williamlong. info/cmd.asp?

Act=cmt&key=a666b083 HTTP/1. 1

. . . . . .

[submission of comment data]

If the proxy server is not used, the following POST requestsare sent directly to the www.williamlong. info server:

POST /cmd.asp? Act=cmt&key=a666b083 HTTP/1. 1

. . . . . .

[submission of comment data]

The results returned using proxy server and without proxyserver are basically the same. So POST requests are basicallyno different in terms of the security of using proxy servers.

1.3, CONNECT

When we visit the HTTPS protocol web site, the browser sendsthe CONNECT request to the proxy server. For example, we visithttps://mail.google.

When com/mail/? Shva=1#inbox, the browser sends the followingrequest to the proxy server:

CONNECT mail.google.com:443 HTTP/1.0

. . . . . .

Then the server returns:

HTTP/1. 1 200 Connection established

. . . . . .

Then the browser starts sending encrypted data to the proxyserver, using the mail.google. com SSL certificate. The proxy

server to encrypt data as mail.google. com returns back to thebrowser.

If you don't use a proxy server, the browser connects directlyto the mail.google. com:443, and then starts sending andreceiving encrypted data.

We see that the use of the HTTP proxy server, HTTPS protocolcontent still end-to-end encryption, HTTPS still maintains thetransmission of any content will not be responsible for datatransmission equipment (including proxy server) to see thecharacteristics. Whether the proxy server is used does notchange the security of the HTTPS protocol.

2. Discuss in depth

Q: we see, after using the proxy server will need to access thedomain name of the website (including HTTPS) sent to the proxyserver, so that if the network being monitored, you will knowwhat sites we visit (but not HTTPS protocol to monitor thecontents of the transmission, only know that we visited thewebsite) , this is reduce security?

A: if our network is monitored, all network data packets arerecorded, so if you don't use a proxy server, the browser willfirst send a query to the corresponding domain name IP DNSrequest, IP will also be sent after the TCP connection requestto the need to visit the site, they can knowwhat sites we visitby network packet monitor.

Q: some proxy server products claim to be able to record the

contents of HTTPS transmission. How do they do that?

A: using the SSL hijacking means. These proxy server products,without exception, need to install the corresponding client,once you install these clients, you can control the clientcomputer, and then install the proxy server' s own certificate,SSL hijacking. Some products do not need to install the client,but the client browser access all the HTTPS web site, but thebrowser SSL certificate validation, the browser will give thecertificate invalid warning.

Q: if we were not able to access a website, use a proxy servercan be put on the website, this website is the HTTP protocol,so that access to this site all actions are logged in themonitored network environment?

A: yes. Because the proxy server does not change the securityof the HTTP protocol, all the contents of the plaintexttransmission can be recorded by the monitoring system. So, weuse a proxy server to submit important information (such as username and password) , you must select the HTTPS protocol, enterthe user name and password in the need to pay attention to thebrowser' s address bar is not to begin with https.

Q: after using aproxy server, theway the network packet passesis not different from that of the proxy server. What' s theimpact on the security?

A: it depends on every node in the road that was used beforeand after the proxy server was used. Even if you do not use aproxy server, the Internet still face a variety of human network

fault, using a proxy server because of the path is different,so there may still need to face these artificial networkfailures, there may be no need to face these people a networkfailure (if the proxy server itself specifically addressesthese failures) .

3, s umm ary

The above, using a remote HTTP proxy server security and do notuse a proxy server basic does not have what difference, thehuman network problems we face in using a proxy server theremay still exist, but also may reduce or even disappear.If someone offers artificial network failure to resolve theproxy server in the country, not to use or inability to useencryption software agents used, combined with the "proxyserver" and how to use AutoProxy, the agent of the era mightcome oh.

SugarHosts糖果主机圣诞节促销 美国/香港虚拟主机低至6折

SugarHosts 糖果主机商我们算是比较熟悉的,早年学会建站的时候开始就用的糖果虚拟主机,目前他们家还算是为数不多提供虚拟主机的商家,有提供香港、美国、德国等虚拟主机机房。香港机房CN2速度比较快,美国机房有提供优化线路和普通线路适合外贸业务。德国欧洲机房适合欧洲业务的虚拟主机。糖果主机商一般是不会发布黑五活动的,他们在圣圣诞节促销活动是有的,我们看到糖果主机商发布的圣诞节促销虚拟主机低至6折...

RAKsmart推出7.59美元/月,云服务器产品Cloud Server,KVM架构1核1G内存40G硬盘1M带宽基础配置

近期RAKsmart上线云服务器Cloud Server产品,KVM架构1核1G内存40G硬盘1M带宽基础配置7.59美元/月!RAKsmart云服务器Cloud Server位于美国硅谷机房,下单可选DIY各项配置,VPC网络/经典网络,大陆优化/精品网线路,1-1000Mbps带宽,支持Linux或者Windows操作系统,提供Snap和Backup。RAKsmart机房是一家成立于2012年...

#推荐# cmivps:全场7折,香港不限流量VPS,支持Windows系统

cmivps香港VPS带来了3个新消息:(1)双向流量改为单向流量,相当于流量间接扩大一倍;(2)Hong Kong 2T、Hong Kong 3T、Hong Kong 无限流量,这三款VPS开始支持Windows系统,如果需要中文版Windows系统请下单付款完成之后发ticket要求官方更改即可;(3)全场7折年付、8折月付优惠,优惠码有效期一个月!官方网站:https://www.cmivp...

http代理服务器为你推荐
office2016激活密钥求office2016永久激活的密钥天府热线劲舞团(四川天府热线)为什么越来越卡了??暴风影音怎么截图怎么截取暴风影音图片百度抢票浏览器现在火车票越来越难买了,新版百度手机浏览器,除了抢票外,还有什么其他功能吗?显卡温度多少正常显卡温度多少算正常?ps抠图技巧如何使用PS抠图ps抠图技巧photoshop最基本的抠图方法和技巧!今日热点怎么删除怎样删除实时热点天天酷跑刷金币天天酷跑怎么刷金币?天天酷跑刷金币如何使用八门神器给天天酷跑刷钻刷金币
国外vps租用 如何查询ip地址 金万维动态域名 本网站服务器在美国维护 arvixe 2014年感恩节 softbank官网 56折 20g硬盘 美国仿牌空间 国外php空间 ca4249 建立邮箱 北京双线机房 域名转接 域名和空间 服务器干什么用的 江苏双线服务器 银盘服务 域名dns 更多