If there's one piece of technology that I feel is very confusing today, and that is proxy servers, proxy servers has been around for decades. And they've developed into so many different things that they can become a massive IT security headache. So I want to take a few moments and make sure we understand conceptually, what is a proxy server? What types of proxy servers are out there? And what do we do with them? Be ready for questions on the exam where you might need to add proxy servers to particular situations.
Don't worry, I've got you covered in this episode right here. First of all, there's two kinds of proxy servers, there's forward proxy servers and reverse proxies. So what I'd like to do is start off with the older school, a forward proxy. All right now, if you take a look at this picture, a proxy by definition is a device a box a piece of software running on a computer, which acts as an intermediary between to different devices having the session. So you're going to have a client, you're going to have a server and a proxy in the middle. So if you take a look at this, this is a forward proxy with a forward proxy.
The client is aware of the proxy. So the client speaks to the proxy. And then the proxy actually does whatever it does to the request, and forwards that as the as a representative of the client. So this is a forward proxy. Now, forward proxies have been around like forever. A traditional forward proxy is usually going to be a dedicated box, or it could be a piece of software running on a server that is in an organization, a great example would be schools, just about every school on earth that has an internet connection runs a traditional forward proxy server.
The idea behind a proxy server like this is it will provide caching it provides content filtering, it will index very much Like a firewall and that it will look at the different things that people are doing and blocked based on URL or all kinds of stuff like that. proxy servers are amazing. They can take ads out, they can block certain parts of websites. So there's a lot of power in it that takes them way beyond a simple firewalls. The reason we see them in schools, obviously, is we don't want kids going to inappropriate sites. And proxies are very, very common in schools.
So the important thing that you have to understand about a proxy, first of all, is that proxies, by definition, are going to be application specific. So I'm going to set up a web proxy or an FTP proxy or Voice over IP proxy. So depending on what type of application I have, there is a specific proxy server for it. In fact, now remember what we said with a traditional forward proxy server. The clients are aware of the proxies. So let's come up with a situation where we have a web proxy in order to use this web proxy Every single system that wants to use the web proxy has to go through a configuration.
So what I have appeared is my Internet Options. And this is from Windows 10. Now, what I want to do is let me I'm under connections already. So let's click on land settings. And you'll see right here where it says proxy server, so I'm going to say use a proxy server for your land. And then I have to actually type in the IP address, and it's going to be Port 80.
So in this particular situation, in order to use a traditional forward web proxy, I actually have to set up all of my individual browsers to use that. Now, if this proxy is designed to filter and prevent people from doing what they want to do, why wouldn't people just go in here and delete this information? Say I don't want to use the proxy? The answer is simple. Because a well set up system is going to go if you don't go through the proxy, we're not even gonna let you out in the First place. So that is a very traditional one.
Now we have a improvement on that, and what we call a transparent proxy. Transparent proxies don't have to go through all this configuration stuff. But a transparent proxy has to be literally in the line, it has to be in line between you and the internet, so that it can grab everything that nobody has a choice but to go through it. And a transparent proxy can work that way. They are out there just as just as common as a more traditional proxy. The nice part is I don't have to go through this type of configuration information.
So a traditional forward is going to invariably be a box. In the windows world. There are programs that famous programs with things like wind gate and things like that, that provide these forward proxy services. The other type of forward proxy that we run into what I'm going to call a modern forward proxy is used by people who want to do nefarious things. Now, I'm not going to say they always do bad things, but sometimes they want to hide themselves. So if we take a look at a diagram like this, so what we're doing now is we're going to move the proxy out of our local in house.
And we're going to move it out to the internet, but it's still going to work the same way. In this situation, you can see I can connect my client system. And instead of going directly to a web server, I can go to this proxy, and then the proxy will take care of it. So I love Canadian television, for example, and it's impossible for some of these Canadian websites. Do you play the United States? Now if I were nefarious person, I could easily find a Canadian proxy.
I could go through that proxy and then dial in and watch shows like letter Kenny and corner gas and all these great shows that you Americans probably never heard of. All you Canadians out there going well, sure. Anyway, so this is the type of thing that we can do with it. Now I want to look at this diagram one more time. The problem with this diagram is that the proxy works fine, but notice that there's a connection from my system. To the proxy server that's out on the internet.
So the downside to this is that anybody who wants to, can easily figure out for example, if the police set your internet service provider a warrant, it's fairly easy for them to figure out Ah, this goes back to Mike Myers machine there in Houston, Texas. So what we do with a lot of these proxies is we create an encrypted tunnel, a connection, called a virtual private network or VPN. We have other episodes that go into VPN in detail, but for right now, I want you to understand that if we encrypt everything, I mean, everything. That way, nobody can tell exactly what we're doing. So we create a VPN connection from our system to the proxy, and then the proxy goes out and acts as our representative and does whatever it wants to do. There are lots and lots of tools out there that do stuff like this.
So what I'd like to do is show you one tool in particular. So let's open up a browser, get a new one up. And I'm going to type in a website. This is called high dot main. And what I'd like to do is we're going to use this as a proxy. So, keep in mind, this isn't unique.
There are thousands of these different types of proxy servers out there. This is a public proxy server, anybody can go to it. And what I can do is actually go to a website. Now if you look here at the bottom, it says, I will look as though I'm coming from the Netherlands. This one is just a demo. So it only gives a few options.
So I'm going to go to my total sim comm site, and I'm going to click on this and I want you to watch what happens here. Now one of the things you got to worry about is that all of these types of proxy tools are slow. And that's all Okay, so what's happening? First of all, you'll notice that I'm not actually at total sim Comm. I'm actually connecting to a proxy server at the high.me website. But high.me puts this little overlay on top to remind me that I'm not actually directly on www.opm.com.
And if there was something important that only people in the Netherlands could do, this would work just fine. Now, that works out pretty good. With a couple of little exceptions. First of all, when you make a connection like this, there's not just one connection to a website, you're probably launching Java connections and all kinds of different stuff. If you run open up one web page and type in netstat, you usually see that that one web page is actually making five or six different connections. And the problem is is a lot of these once they make the connection, they will try to phone home directly back to you.
And that can make some problems. So The VPN certainly helps. But the VPN doesn't let anybody know what you're doing. But the VPN still points back to you. And there's a situation where we run into a bit of a problem. So what we do is there are certain types of forward modern forward VPNs, that do cool stuff like for example, the Tor network.
With Tor, what it's going to do is you're going to have lots and lots now I only have a few computers here. But there could be hundreds or thousands of these computers, which all work together to hide you really well. So when you make a connection, you arbitrarily pick one of these Tor nodes as they're called. And then the nodes will make a random group of connections to a bunch of other computers. These are all VPN connections, and then randomly pick one guy to act as the Outward Bound proxy server. So you can see what's happened here is not only is everything now very much encrypted through the VPN, but it is really Hard not impossible, but practically impossible to get back to you.
And that's why people use these Tor proxies, not just because it's a good proxy server, but because it makes this very complicated, backward trail that's almost impossible for anybody to get out of. So law enforcement and people like that are often frustrated by Tor networks. Because bad guys often use them to hide themselves really, really well. Now, that's forward proxy servers. So what I want to do is spin this around a little bit and talk about a reverse proxy server with a reverse proxy server. What we do instead is that we have servers, let's say web servers, where the proxy server represents the web server, not the client.
It's a COMPLETE REVERSE OF A forward. Now these types of proxy servers do very, very specific jobs. Number one, their job is to protect the server from evil people like us. So there's lots of security in these, for example, these are often designed to handle denial of service attacks, all kinds of different nefarious attacks like that. It's used for load balancing. So if I have three or four servers, that proxy server can select whatever server is got the least load on it, and goes ahead and passes jobs to that.
It can be used for caching just like a forward does. A lot of times, web pages will have a certain set of images that it's always passing out. Those images don't sit on the well, they're on the servers. But the reverse proxy server keeps a copy of any static images no matter what page you go to that website, boom, they send it really, really quick. It also handles encryption acceleration. So if you've got a bunch of HTTPS servers, most of the time it's the proxy server that handles all of the HTTPS encryption and decryption A lot of times, you'll see that these have different types of modules on board that are designed to help with the encryption.
And they sit in front and they take a lot of work off of the web servers. When you're thinking about proxy servers, especially for the exam, make sure you're comfortable with the concept of a forward versus a reverse proxy server. Remember forward hides the clients and reverse hides the servers