0% found this document useful (0 votes)
23 views4 pages

Proxr

Uploaded by

Xteqq
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views4 pages

Proxr

Uploaded by

Xteqq
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Reverse proxy

In computer networks, a reverse proxy or surrogate


server is a proxy server that appears to any client to be an
ordinary web server, but in reality merely acts as an
intermediary that forwards the client's requests to one or
more ordinary web servers.[1][2] Reverse proxies help
increase scalability, performance, resilience, and security,
Example scenario: A client on the Internet
but they also carry a number of risks. (cloud on the left) makes a request to a
reverse proxy server (red oval in the middle).
Companies that run web servers often set up reverse The proxy inspects the request, determines
proxies to facilitate the communication between an that it is valid and that it does not have the
Internet user's browser and the web servers. An important requested resource in its own cache. It then
advantage of doing so is that the web servers can be forwards the request to some internal web
hidden behind a firewall on a company-internal network, server (oval on the right). The internal server
and only the reverse proxy needs to be directly exposed to delivers the requested resource back to the
proxy, which in turn delivers it to the client. The
the Internet. Reverse proxy servers are implemented in
client on the Internet is unaware of the internal
popular open-source web servers, such as Apache, Nginx,
network, and cannot tell whether it is
and Caddy. Dedicated reverse proxy servers, such as the communicating with a proxy or directly with a
open source software HAProxy and Squid, are used by web server.
some of the biggest websites on the Internet.

A reverse proxy can track all IP addresses making requests through it and it can also read and modify any
non-encrypted traffic and risks logging passwords or injecting malware if compromised by a malicious
party.

Reverse proxies differ from forward proxies, which are used when the client is restricted to a private,
internal network and asks a forward proxy to retrieve resources from the public Internet.

Uses
Large websites and content delivery networks use reverse proxies, together with other techniques, to
balance the load between internal servers. Reverse proxies can keep a cache of static content, which further
reduces the load on these internal servers and the internal network. It is also common for reverse proxies to
add features such as compression or TLS encryption to the communication channel between the client and
the reverse proxy.[3]

Reverse proxies can inspect HTTP headers, which, for example, allows them to present a single IP address
to the Internet while relaying requests to different internal servers based on the URL of the HTTP request.

Reverse proxies can hide the existence and characteristics of origin servers. This can make it more difficult
to determine the actual location of the origin server / website and, for instance, more challenging to initiate
legal action such as takedowns or block access to the website, as the IP address of the website may not be
immediately apparent. Additionally, the reverse proxy may be located in a different jurisdiction with
different legal requirements, further complicating the takedown process.

Application firewall features can protect against common web-based attacks, like a denial-of-service attack
(DoS) or distributed denial-of-service attacks (DDoS). Without a reverse proxy, removing malware or
initiating takedowns (while simultaneously dealing with the attack) on one's own site, for example, can be
difficult.

In the case of secure websites, a web server may not perform TLS encryption itself, but instead offload the
task to a reverse proxy that may be equipped with TLS acceleration hardware. (See TLS termination
proxy.)

A reverse proxy can distribute the load from incoming requests to several servers, with each server
supporting its own application area. In the case of reverse proxying web servers, the reverse proxy may
have to rewrite the URL in each incoming request in order to match the relevant internal location of the
requested resource.

A reverse proxy can reduce load on its origin servers by caching static content and dynamic content, known
as web acceleration. Proxy caches of this sort can often satisfy a considerable number of website requests,
greatly reducing the load on the origin server(s).

A reverse proxy can optimize content by compressing it in order to speed up loading times.

In a technique named "spoon-feeding",[4] a dynamically generated page can be produced all at once and
served to the reverse proxy, which can then return it to the client a little bit at a time. The program that
generates the page need not remain open, thus releasing server resources during the possibly extended time
the client requires to complete the transfer.

Reverse proxies can operate wherever multiple web-servers must be accessible via a single public IP
address. The web servers listen on different ports in the same machine, with the same local IP address or,
possibly, on different machines with different local IP addresses. The reverse proxy analyzes each incoming
request and delivers it to the right server within the local area network.

Reverse proxies can perform A/B testing and multivariate testing without requiring application code to
handle the logic of which version is served to a client.

A reverse proxy can add access authentication to a web server that does not have any authentication.[5][6]

Risks
When the transit traffic is encrypted and the reverse proxy needs to filter/cache/compress or otherwise
modify or improve the traffic, the proxy first must decrypt and re-encrypt communications. This requires the
proxy to possess the TLS certificate and its corresponding private key, extending the number of systems that
can have access to non-encrypted data and making it a more valuable target for attackers.

The vast majority of external data breaches happen either when hackers succeed in abusing an existing
reverse proxy that was intentionally deployed by an organisation, or when hackers succeed in converting an
existing Internet-facing server into a reverse proxy server. Compromised or converted systems allow
external attackers to specify where they want their attacks proxied to, enabling their access to internal
networks and systems.

Applications that were developed for the internal use of a company are not typically hardened to public
standards and are not necessarily designed to withstand all hacking attempts. When an organisation allows
external access to such internal applications via a reverse proxy, they might unintentionally increase their
own attack surface and invite hackers.

If a reverse proxy is not configured to filter attacks or it does not receive daily updates to keep its attack
signature database up to date, a zero-day vulnerability can pass through unfiltered, enabling attackers to
gain control of the system(s) that are behind the reverse proxy server.

Using the reverse proxy of a third party (e.g., Cloudflare, Imperva) places the entire triad of confidentiality,
integrity and availability in the hands of the third party who operates the proxy.

If a reverse proxy is fronting many different domains, its outage (e.g., by a misconfiguration or DDoS
attack) could bring down all fronted domains.[7]

Reverse proxies can also become a single point of failure if there is no other way to access the back end
server.

See also
Network address translation

References
1. "Forward and reverse proxies" (http://httpd.apache.org/docs/current/mod/mod_proxy.html).
The Apache Software Foundation. Archived (https://web.archive.org/web/20180828142409/h
ttp://httpd.apache.org/docs/current/mod/mod_proxy.html) from the original on 28 August
2018. Retrieved 26 August 2018.
2. Reese, Will (September 2008). "Nginx: the high-performance web server and reverse proxy"
(https://dl.acm.org/doi/fullHtml/10.5555/1412202.1412204). Linux Journal (173).
3. "Proxy servers and tunneling" (https://developer.mozilla.org/en-US/docs/Web/HTTP/Proxy_s
ervers_and_tunneling). MDN Web Docs. Archived (https://web.archive.org/web/2020112605
0800/https://developer.mozilla.org/en-US/docs/Web/HTTP/Proxy_servers_and_tunneling)
from the original on 26 November 2020. Retrieved 6 December 2020.
4. "squid-cache wiki entry on "SpoonFeeding" " (https://web.archive.org/web/20190125220423/
https://wiki.squid-cache.org/SpoonFeeding). Francesco Chemolli. Archived from the original
(http://wiki.squid-cache.org/SpoonFeeding) on 25 January 2019. Retrieved 9 February 2011.
5. "Possible to add basic HTTP access authentication via HAProxy?" (http://serverfault.com/qu
estions/239749/possible-to-add-basic-http-access-authentication-via-haproxy).
serverfault.com. Archived (https://web.archive.org/web/20181004191559/https://serverfault.c
om/questions/239749/possible-to-add-basic-http-access-authentication-via-haproxy) from
the original on 4 October 2018. Retrieved 27 April 2016.
6. "forward_auth (Caddyfile directive) - Caddy Documentation" (https://caddyserver.com/docs/c
addyfile/directives/forward_auth#examples). caddyserver.com. Retrieved 22 May 2022.
7. "Cloudflare outage knocks out major sites and services, including Discord" (https://finance.y
ahoo.com/news/cloudflare-outage-knocks-major-sites-170213763.html). finance.yahoo.com.
Archived (https://web.archive.org/web/20200622044745/https://finance.yahoo.com/news/clo
udflare-outage-knocks-major-sites-170213763.html) from the original on 22 June 2020.
Retrieved 14 December 2020.

Retrieved from "https://en.wikipedia.org/w/index.php?title=Reverse_proxy&oldid=1236741202"

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy