HOME

TheInfoList



OR:

An open proxy is a type of
proxy server In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource. Instead of connecting directly to a server that can fulfill a requ ...
that is accessible by any
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a ''internetworking, network of networks'' that consists ...
user. Generally, a proxy server only allows users ''within a network group'' (i.e. a closed proxy) to
store and forward Store and forward is a telecommunications technique in which information is sent to an intermediate station where it is kept and sent at a later time to the final destination or to another intermediate station. The intermediate station, or node in ...
Internet services such as
DNS The Domain Name System (DNS) is a hierarchical and distributed naming system for computers, services, and other resources in the Internet or other Internet Protocol (IP) networks. It associates various information with domain names assigned to ...
or web pages to reduce and control the bandwidth used by the group. With an ''open'' proxy, however, any user on the Internet is able to use this forwarding service.


Advantages

An ''anonymous open proxy'' is useful to those looking for online anonymity and privacy, as it can help users hide their
IP address An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
from web servers since the server requests appear to originate from the proxy server. It makes it harder to reveal their identity and thereby helps preserve their perceived security while browsing the web or using other internet services. Real anonymity and extensive
internet security Internet security is a branch of computer security. It encompasses the Internet, browser security, web site security, and network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules ...
might not be achieved by this measure alone as website operators can use client-side scripts to determine the browser's real IP address and the open proxy may be keeping logs of all connections. Open proxies also don't stop tracking cookies and fingerprinters from identifying users. Most public VPNs work through open proxies.


Disadvantages

It is possible for a computer to run as an open proxy server without the computer's owner knowing it. This can result from misconfiguration of proxy software running on the computer, or from infection with
malware Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, de ...
(
viruses A virus is a submicroscopic infectious agent that replicates only inside the living cells Cell most often refers to: * Cell (biology), the functional basic unit of life Cell may also refer to: Locations * Monastic cell, a small room ...
,
trojans Trojan or Trojans may refer to: * Of or from the ancient city of Troy * Trojan language, the language of the historical Trojans Arts and entertainment Music * ''Les Troyens'' ('The Trojans'), an opera by Berlioz, premiered part 1863, part 189 ...
or
worms Worms may refer to: *Worm, an invertebrate animal with a tube-like body and no limbs Places *Worms, Germany, a city ** Worms (electoral district) * Worms, Nebraska, U.S. *Worms im Veltlintal, the German name for Bormio, Italy Arts and entertai ...
) designed for this purpose. If it is caused by malware, the infected computer is known as a zombie computer.


Testing for access from an open proxy

Because open proxies are often implicated in abuse, a number of methods have been developed to detect them and to refuse service to them. IRC networks with strict usage policies automatically test client systems for known types of open proxies. Likewise, a
mail server Within the Internet email system, a message transfer agent (MTA), or mail transfer agent, or mail relay is software Software is a set of computer programs and associated software documentation, documentation and data (computing), data. Thi ...
may be configured to automatically test mail senders for open proxies, using
software Software is a set of computer programs and associated software documentation, documentation and data (computing), data. This is in contrast to Computer hardware, hardware, from which the system is built and which actually performs the work. ...
such as proxycheck. Groups of IRC and electronic mail operators run
DNSBL A Domain Name System blocklist, Domain Name System-based blackhole list, Domain Name System blacklist (DNSBL) or real-time blackhole list (RBL) is a service for operation of mail servers to perform a check via a Domain Name System (DNS) query whe ...
s publishing lists of the
IP address An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
es of known open proxies, such as AHBL, CBL, NJABL (till 2013), and
SORBS Sorbs ( hsb, Serbja, dsb, Serby, german: Sorben; also known as Lusatians, Lusatian Serbs and Wends) are a indigenous West Slavic ethnic group predominantly inhabiting the parts of Lusatia located in the German states of Saxony and Bran ...
(in operation since 2002). The AHBL discontinued public access in 2015.


See also

* Anonymizing proxy *
Open mail relay An open mail relay is a Simple Mail Transfer Protocol (SMTP) server configured in such a way that it allows anyone on the Internet to send e-mail through it, not just mail destined to or originating from known users. This used to be the default co ...


References

{{Reflist Internet security Proxy servers es:Proxy#Proxy Abierto pt:Proxy#Proxy abreto