Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
If this isn't allowed then the thread can be removed and I apologise for any problems...
Lately I've really been starting to get into this security stuff, and as they say "In order to stop one, you need to know what they do"...well I've been investigating this "Proxy Stuff"...
The only problem is, I can understand why it works (with the packet routing, etc) but what I don't get, is how do you get your packets actually routed to this proxy server and for it to all work?...
Basically i mean, how can you configure your machine to use this proxy server?
I thought that basically by telling the browser to use "such and such" proxy on "such and such" port, but when i goto an online security scanner to see if it can still get my IP, it does, it gets the correct IP addres...not the one of the proxy server...
Again, If this isn't allowed, just say so
Last edited by Grim Reaper; 02-02-2003 at 01:51 AM.
The thing is, the proxy servers you are using are not masquerading (hiding) your IP. They are passing it along. There are other proxies that hide it.
You were correct in your first assumption as to how it is used, client side. What you did not think about is that computers can be configured in a nearly unlimited amount of ways. Is it surprising to find out that some people don't hide IPs that are going through them? It all depends on the server, and the only way to tell is by trial and error.
I've tried quiet a few, but none are actually hiding my IP...
Don't spose you know of one that actually allows you to surf annonymously...at least then i know it can be done...so far i haven't gotten it/anything to work...
Well, the only reason for me to block this thread would be asking for *specifics*.
Next to the "forwarding" proxy servers stuff, users have Java/JS on by default. Ain't hard to get your info tru JS.
There are some proxies that allow you to surf anonymous, tho this is all relatively anonymous, since most proxies are misconfigured servers. This means the admins don't intentionally either scrub or keep logs, so when they're investigating bandwidth irregularities or abusemail from remote networks there always is a chance to find your IP in the logs. One way would be to chain your proxies or use one that's solid and known for anonimity like Magusnet. Note the various clauses on Magusnet pages that will keep you from actually *thinking* about doing harm :-]
There's a huge list of sites w lists of proxies around the 'net (beware commercial sites as usual), and anonymous ones aren't really hard to Google as are tutorials or env.cgi checkers on servers.
The real problem with sharing anonymous proxy addresses is the slew of skiddies that will follow to abuse it, leaving you vulnerable if you use the proxy unaware of it all.
// Btw, I'm sure LQ would be against members sharing (anonymous) proxy nfo over the LQ board.
I have tried quiet a few, but none of which are working...hmmm, I guess I'll take a squiz at some more guides then, maybe they'll unviel something I'm missing..
Also, I know what you mean by chaining proxies, but how exactly would you do it? I mean, there's only one option in browsers to enter a Proxy IP address...
Last edited by Grim Reaper; 02-03-2003 at 12:13 AM.
ah! makes sense...so it'll put in the packets the first IP followed by the second IP, and the packet will head off to the first IP, once it reaches there, the proxy will then read the second IP, and pass the packet onto it, then once it reaches the second proxy, it forwards it to where its really meant to go (say this site for example...)
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.