An open proxy is a type of
proxy server
In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource.
Instead of connecting directly to a server that can fulfill a requ ...
that is accessible by any
Internet
The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a ''internetworking, network of networks'' that consists ...
user.
Generally, a proxy server only allows users ''within a network group'' (i.e. a closed proxy) to
store and forward
Store and forward is a telecommunications technique in which information is sent to an intermediate station where it is kept and sent at a later time to the final destination or to another intermediate station. The intermediate station, or node in ...
Internet services such as
DNS
The Domain Name System (DNS) is a hierarchical and distributed naming system for computers, services, and other resources in the Internet or other Internet Protocol (IP) networks. It associates various information with domain names assigned to ...
or
web pages to reduce and control the
bandwidth used by the group. With an ''open'' proxy, however, any user on the Internet is able to use this forwarding service.
Advantages
An ''anonymous open proxy'' is useful to those looking for online anonymity and privacy, as it can help users hide their
IP address
An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
from web servers since the server requests appear to originate from the proxy server. It makes it harder to reveal their identity and thereby helps preserve their perceived security while browsing
the web or using other
internet services. Real anonymity and extensive
internet security
Internet security is a branch of computer security. It encompasses the Internet, browser security, web site security, and network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules ...
might not be achieved by this measure alone as website operators can use client-side scripts to determine the browser's real IP address and the open proxy may be keeping logs of all connections. Open proxies also don't stop
tracking cookies and
fingerprinters from identifying users.
Most public
VPNs work through open proxies.
Disadvantages
It is possible for a computer to run as an open proxy server without the computer's owner knowing it. This can result from misconfiguration of proxy software running on the computer, or from infection with
malware
Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, de ...
(
viruses
A virus is a submicroscopic infectious agent that replicates only inside the living cells
Cell most often refers to:
* Cell (biology), the functional basic unit of life
Cell may also refer to:
Locations
* Monastic cell, a small room ...
,
trojans
Trojan or Trojans may refer to:
* Of or from the ancient city of Troy
* Trojan language, the language of the historical Trojans
Arts and entertainment Music
* ''Les Troyens'' ('The Trojans'), an opera by Berlioz, premiered part 1863, part 189 ...
or
worms Worms may refer to:
*Worm, an invertebrate animal with a tube-like body and no limbs
Places
*Worms, Germany, a city
** Worms (electoral district)
* Worms, Nebraska, U.S.
*Worms im Veltlintal, the German name for Bormio, Italy
Arts and entertai ...
) designed for this purpose. If it is caused by malware, the infected computer is known as a
zombie computer.
Testing for access from an open proxy
Because open proxies are often implicated in abuse, a number of methods have been developed to detect them and to refuse service to them.
IRC networks with strict usage policies automatically test client systems for known types of open proxies. Likewise, a
mail server
Within the Internet email system, a message transfer agent (MTA), or mail transfer agent, or mail relay is software
Software is a set of computer programs and associated software documentation, documentation and data (computing), data. Thi ...
may be configured to automatically test mail senders for open proxies, using
software
Software is a set of computer programs and associated software documentation, documentation and data (computing), data. This is in contrast to Computer hardware, hardware, from which the system is built and which actually performs the work.
...
such as
proxycheck
.
Groups of IRC and electronic mail operators run
DNSBL
A Domain Name System blocklist, Domain Name System-based blackhole list, Domain Name System blacklist (DNSBL) or real-time blackhole list (RBL) is a service for operation of mail servers to perform a check via a Domain Name System (DNS) query whe ...
s publishing lists of the
IP address
An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
es of known open proxies, such as
AHBL,
CBL,
NJABL (till 2013), and
SORBS
Sorbs ( hsb, Serbja, dsb, Serby, german: Sorben; also known as Lusatians, Lusatian Serbs and Wends) are a indigenous West Slavic ethnic group predominantly inhabiting the parts of Lusatia located in the German states of Saxony and Bran ...
(in operation since 2002). The AHBL discontinued public access in 2015.
See also
*
Anonymizing proxy
*
Open mail relay
An open mail relay is a Simple Mail Transfer Protocol (SMTP) server configured in such a way that it allows anyone on the Internet to send e-mail through it, not just mail destined to or originating from known users. This used to be the default co ...
References
{{Reflist
Internet security
Proxy servers
es:Proxy#Proxy Abierto
pt:Proxy#Proxy abreto