English فارسی Suomi
Français Nederlands Translate

Circumvention Tools

CircumventionTools: WhatIsAProxy

What Is A HTTP Proxy?

Software called an application proxy enables one computer on the Internet to process requests from another computer. The most common kinds of application proxies are HTTP proxies, which handle requests for Web sites, and SOCKS proxies, which handle connection requests from a wide variety of applications. In this chapter we will look at HTTP proxies and how they work.

Good proxies and bad proxies

Application proxies can be used by network operators to censor the Internet or to monitor and control what users do. However, application proxies are also a tool for users to get around censorship and other network restrictions.

Proxies that restrict access 

A network operator may require users to access the Internet (or at least Web pages) only through a certain proxy. The network operator can program this proxy to keep records of what users access and also deny access to certain sites or services (IP blocking or port blocking). In this case, the network operator may use a firewall to block connections that do not go through the restrictive proxy. This configuration is sometimes called a forced proxy, because users are required to use it.

Proxies for circumvention 

However, an application proxy can also be helpful for circumventing restrictions. If you can communicate with a computer in an unrestricted location that is running an application proxy, you can benefit from its unrestricted connectivity. Sometimes a proxy is available for the public to use; in that case, it's called an open proxy. Many open proxies are blocked in Internet-restricting countries if the people administering the network restrictions know about them.

Where to find an application proxy

There are many Web sites with lists of open application proxies. An overview of such Web sites is available at http://www.dmoz.org/Computers/Internet/Proxying_and_Filtering/Hosted_Proxy_Services/Free/Proxy_Lists/.

Please note that many open application proxies only exist for a few hours, so it is important to get a proxy from a list which was very recently updated.

HTTP Proxy settings

To use an application proxy, you must configure the proxy settings for your operating system or within individual applications. Once you have selected a proxy in an application's proxy settings, the application tries to use that proxy for all of its Internet access. Be sure you make note of the original settings so that you can restore them. If the proxy becomes unavailable or unreachable for some reason, the software that is set to use it generally stops working. In that case, you may need to reset to the original settings.

On Mac OS X and some Linux systems, these settings can be configured in the operating system, and will automatically be applied to applications such as the web browser or instant messaging applications. On Windows and some Linux systems, there is no central place to configure proxy settings, and each application must be configured locally. Bear in mind, that even if the proxy settings are configured centrally there is no guarantee that applications will support these settings, so it is always a good idea to check the settings of each individual application.

Typically only Web browsers can directly use an HTTP proxy.

prox2 

The steps below describe how to configure either Microsoft Internet Explorer, Mozilla Firefox and the Free and Open Source Instant Messaging Client Pidgin to use a proxy. If you use Firefox for Web browsing, it may be simpler to use the SwitchProxy software; it is an alternative to the steps below.  If you use Tor, it is safest to use the TorButton software (which is provided as part of the Tor Bundle download) to configure your browser to use Tor.

While e-mail clients such as Microsoft Outlook and Mozilla Thunderbird can also be configured to use HTTP proxies, actual mail traffic when sending and fetching mail, uses other protocols such as POP3, IMAP and SMTP, and this traffic will not pass through the HTTP proxy.

Mozilla Firefox

To configure Firefox to use an HTTP proxy:

  1. On the "Tools" menu, click "Options":1_1
  2. The "Options" window appears:2
  3. In the toolbar at the top of the window, click "Advanced":3_1
  4. Click the "Network" tab:
    4_1

  5. Click "Settings".  Firefox displays the "Connection Settings" window:5
  6. Select "Manual proxy configuration". The fields below that option become available.6a_1
  7. Enter the "HTTP proxy" address and "Port" number, and then click "OK".
    7

If you click the "Use this proxy server for all protocols", Firefox will attempt to send HTTPS (secure HTTP) and FTP traffic through the proxy. This may not work if you are using a public application proxy, since many of these do not support HTTPS and FTP traffic. If, on the other hand your HTTPS and/or FTP traffic is being blocked, you can try to find a public application proxy with HTTPS and/or FTP support, and use the "Use this proxy server for all protocols" setting in Firefox.

Now Firefox is configured to use an HTTP proxy.

Microsoft Internet Explorer

To configure Internet Explorer to use an HTTP proxy:

  1. On the "Tools" menu, click "Internet Options":
    FLOSS_Manuals__en____Microsoft_Internet__2008_11_12__22_40_02
  2. Internet Explorer displays the "Internet Options" window:InternetOptions06
  3. Click the "Connections" tab.
    Internet_Options__2008_11_12__22_40_09
  4. Click "LAN Settings". The "Local Area Network (LAN) Settings" window appears.Local_Area_Network__LAN__Settings__2008_11_13__11_44_41
  5. Select "Use a proxy server for your LAN". 
  6. Click "Advanced".  The "Proxy Settings" window appears.
  7. IE_proxy_settings7
  8. Enter the "Proxy address to use" and "Port" number in the first row of fields.
  9. If you click the "Use the same proxy server for all protocols", Internet Explorer will attempt to send HTTPS (secure HTTP) and FTP traffic through the proxy. This may not work if you are using a public application proxy, since many of these do not support HTTPS and FTP traffic. If, on the other hand your HTTPS and/or FTP traffic is being blocked, you can try to find a public application proxy with HTTPS and/or FTP support, and use the "Use this proxy server for all protocols" setting in Internet Explorer. IE_proxy_settings9

Now Internet Explorer is configured to use an HTTP proxy.

Pidgin Instant Messaging Client

Some Internet applications other than Web browsers can also use a HTTP proxy to connect to the Internet, potentially bypassing blocking. Here is an example with the instant messaging software Pidgin.

  1. On the "Tools" menu, click "Preferences":PidginConfigProxy1_1

  2. Pidgin displays the "Preferences" window:PidginConfigProxy2_1
  3. Click the "Network" tab to display it.PidginConfigProxy3_1
  4. For "Proxy type", select "HTTP". Additional fields appear under that option.
    PidginConfigProxy4_1
  5. Enter the "Host" address and "Port" number of your HTTP proxy.PidginConfigProxy5http
  6. Click "Close".
Pidgin is now configured to use the HTTP proxy.

When you're done with the proxy

When you are done using a proxy, particularly on a shared computer, return the settings you've changed to their previous values. Otherwise, those applications will continue to try to use the proxy.  This could be a problem if you don't want people to know that you were using the proxy or if you were using a local proxy provided by a particular circumvention application that isn't running all the time.


EDIT