Proxy Server PDF
Proxy Server PDF
1. Introduction
2. Body
a. Background
i. Introducing squid
ii. History of squid
iii. Software and hardware requirements
iv. Installation
b. Configuration
i. Configure as a web filter
ii. Configure authentication and access
iii. Configure as a caching server
iv. Configure to monitor traffic
v. Configure transparent mode
c. Results
i. Test access to websites
ii. Monitor Traffic
3. Conclusion
a. Summary
Abstract network administrators secure those
networks but may not provide the level
Proxy servers act as intermediaries
they want. With the addition of a
between computing devices, to provide
secure Proxy Server, they can add an
security and to shield the hosts on an
additional level of security, improve
internal network. It is important that
network performance and monitor web
we understand the purposes and
activity that is being accessed over
processes of this technology, in order
their network.
to help protect our information,
systems and networks. This research As we attempt to increase our security
will provide us with the ability to of the network by adding a proxy
build, configure and deploy a Squid server, we must understand that Proxy
proxy server. This paper will describe servers are basically separated into two
Squid proxy servers, discuss types, Transparent and Anonymous
configuration and discuss results of Proxies. Transparent Proxies forward
authentication, performance and Web user requests to a destination without
access testing. hiding or concealing any information.
This type of proxy server is usually
Introduction
used on internal networks, where the
The uses of internet connectivity need to obscure the IP address in not
by Universities, Businesses and warranted because the computers on
Organization networks, have grown that network are safe from external
exponentially in the last twenty years. threats. Anonymous Proxies, on the
With that connectivity explosion, other hand, allow users to surf the web
comes the potential vulnerability while keeping their IP address
exploitation by attackers, malicious anonymous or hidden. Most
code and other threats being directed universities, large businesses and
toward those networks. The ability to organizations today use these proxies
secure the network and control access to act as a middle point between a user
from workstations has become a and the destination address. This
difficult task for network middle point or “Proxy” makes a
administrators. The use of Access request on behalf of a user on the
Controls, Intrusion Detection Systems, network and obscures their IP address
Firewalls and Scanners, all help from that destination site. These
proxies also improve the performance accessed the internet. (2) Increase
of the network by using a caching internet usage and complexity resulted
system to save network users recent in an increase in security incidents. In
request responses from the web to its 1995 2540 incidents were reported.
local hard drive. By caching this web Just five years later 3234 incidents
data, it eliminates the need for other were reported. From 2000 to 2003
users on the network to download that incidents reported climbed to 82,064
same information from the Web again, reports. (3) One of the first proxy
providing faster access to those sites, servers used was a windows service
images and files and saving network named Wingate. Wingate was used to
bandwidth. This anonymous type of share internet dial up connection
Proxy server will be used in the among multiple devices. The program
purposes of this paper, as we came with a security hole and people
concentrate our efforts toward the quickly learned how to connect to
building of a Squid Server. Wingate externally. External users
could then piggy back of Wingate and
Efforts in building a secure server at a
telnet to other devices obscuring their
low cost, configuring that server to
source information. (4) Modern Day
increase network performance while
network administrators have to be
aiding in network security from outside
extra careful when configuring proxy
threats and monitoring traffic on the
servers. New trends and increase in
network are key for a network
proxy server abuse are greater now
administrator’s success. We will use
than ever before. (4) Understanding
this research paper to enhance our
the different methods will help
knowledge and ability to accomplish
correctly configure our squid proxy
this in our future endeavors as IT
server. Two methods that will be
professionals.
explored are the transparent method
and the traditional method. The
Previous Work
traditional method will capture traffic
Over the last 15 years internet usage in by configuring the web proxy settings
the United States alone has increased. of network devices to point traffic to
In 1995 one out of ten adults accessed the proxy server. (5) The transparent
the internet. More than a decade later method will place the proxy server in
78% of adults and 98% of teenagers line with the gateway. The only
physical path to the gateway will be Netapp’s Netcache. The other path
through the proxy server. In resulted in the project creating Squid.
transparent mode, users will not see Initially the funding was provided by a
that the proxy server is being used. (5) grant. The grant was part of a project
Companies with heavy usage networks called IRCache which in turn created
turn to caching to cater the needs of the processes for the squid caching softare.
user. (7) There are many factors on Eventually funding for IRCache would
effectiveness of using a caching server. run out. Squid would be eventually
Incorrect configuring of a proxy server developed by donations and
can lead to more bandwidth usage as volunteers. To this day Squid is an
opposed to bandwidth conservation. open source software ran by donations
(6) Correctly configuring the squid and volunteers with some investments.
proxy server for security and [8]
performance will be a major focus in
Software and Hardware Requirements
this paper.
needs. Features enabled during squid server a user must locate and edit
configuration and what value they are the file named squid.con. This
will create files that are executable. sqid. The location of the squid.conf
These file are called make files in the for the server used in this paper can be
The following lines were added to the RFC1918 possible internal network
denied In one acl by using the 4193 local private network range
Cache manager
When configuring squid for a caching
server the cache directives can be used. Squid also has a gui interface that can be
To create a directory for caching web accessed by a web server. In this example
documents, the rule in “cache_dir aufs Apache is installed on the centos machine.
/squid_cache/ 51200 32 512” is placed in A pearl script is added to the Apache
the squid.conf file. This directive creates a configuration file that will point clients to
directory named squid_cache with 50 GB the cgi file in the Squid directory. The cgi
of free space. Squid organizes files into file in squid is named cachemgr.cgi and is
hierarchical levels. The previous rule an executable file. The location of the file
created the first level with 32 directories, in the directory is “/usr/local/
and the second level with 512 directories. squid/libexec/”. Accessing the cache
This is the minimal configuration for the manager allows you to monitor a wealth of
server to start caching objects. There are useful information. Some examples of
many more options for the cache directive information on the cache manager are
that can be found in chapter 2 of Squid 3.1. general runtime information, IP cache stats
[12] and contents, http header statistics, traffic
resource counters, and request forwarding
Monitoring traffic
statistics. These are just a few statistics
Access and error log that can be monitored by the network. A
complete list of options with the Squid
Squid has two very useful log files. One cache manager can be found on chapter 6
log is the access log, this log file will log of Squid Proxy Server 3.1. [12]
all connections to the squid proxy server.
Transparent mode
Intercept For the first test my PC will be pointed to
the Squid server by configuring my
To configure Squid in transparent mode
browser to use proxy setting with IP
we have to use a router to forward the
address 192.168.0.181. To test the access
traffic to the server. In the router
control list I pointed the address to
forwarding rules, all traffic using port 80
www.google.com:897 to verify the squid
needs to be directed to the IP address of
access denied page. I also accessed the url
the Squid server. The router also has to
www.yahoo.com, and confirmed the same
redirect traffic to the port Squid server is
result. The additional four pcs were
listening to. In this case traffic is
pointed to the squid server and access
redirected to 192.168.0.181 and port 3128.
denied pages were verified for the domains
On the Squid server machine IP tables is
that were inserted in the squid.conf file.
used to handle incoming traffic to the
Squid server. In the squid.conf file we Testing monitoring
need to add the directive “http_port 3128
To test the monitoring the following
intercept”. Configure these three steps and
command was executed: “tail –f
clients will not be able to see evidence of a
/var/log/squid/access.log | ccze –CA”.
proxy server being used.
This will convert the time stamps to a
Results readable format and also log the access
attempts in real time. Monitoring the log
Test Lab
allowed me to observe repeated connection
from www.woopra.com. A google search
The test environment includes a lan on the
showed this website to be a tracking
192.168.0./24 network. The Squid server
software recording what website clients
shares the network with five PC’s with
were visiting on the network. The site was
windows 7 installed. There will be five
blocked using Squid’s access control lists.
machines including my PC that will be
connecting to the squid proxy server.
Refer to figure 5 for the diagram of the
network topology.
[2] Smith, A., & Zichuhr, K. (2012, April 13). Internet adoption over time. Retrieved from
http://pewinternet.org/Reports/2012/Digital-differences/Main-Report/Internet-adoption-over-
time.aspx
[3] Dixit, S., & Kumar Jha, P. (2008, April 01). Network security: It is a process, not a product.
Retrieved from http://www.scribd.com/doc/20364810/Network-Security-Research-Paper
[4] Exposing the underground: Adventures of an open proxy server. (n.d.). Retrieved from
http://www.secureworks.com/resources/articles/other_articles/proxies/
[5] DOI: Guide to Web Filtering Deployments Why Pass-By Filtering is Passé
[6] Felmann, A., Caceres, R., Douglis, F., Glass, G., & Rabinovich, M. (1999). Performance of web
proxy caching in heterogeneous bandwidth environments. Retrieved from
http://www.kiskeya.net/ramon/work/pubs/infocom99.proxy.pdf
[7] Mao, Z., & Herley, C. (2011). A robust link-translating proxy server mirroring the whole web. ACM SIGAPP
Applied Computing Review, 11(2), 30-42.
[9] Grance, T., Stevens, M., & Myers, M. (2003, October). Special Publication 800-36: Guide to
Selecting Information Technology Security Products. Retrieved from National Institute of
Standards and Technology: Publications: http://csrc.nist.gov/publications/PubsFL.html
[10] Radack, S. (2009, October). PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED
GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES. Retrieved from National Institute
of Standards and Technology: Publications, ITL Security Buletins:
http://csrc.nist.gov/publications/index.html.
[11]Roberts, H., Zuckerman, E., Faris, R., & Palfrey, J. (2010, October 14). 2010 Circumvention Tool
Usage Report. Retrieved from Berkman Center for Internet & Society at Harvard University:
http://cyber.law.harvard.edu/publications
[12] Saini, K. (2011). Squid Proxy Server 3.1: Beginner's Guide. Birmingham - Mumbai: PACKT
Publishing.
[13] Scarfone, K., & Hoffman, P. (2009, September). Special Publication 800-41 r1: Guidelines on
Firewalls and Firewall Policy. Retrieved from National Institute of Standards and Technology:
Publications: http://csrc.nist.gov/publications/PubsFL.html
[14] Scarfone, K., & Mell, P. (2012, July). Special Publication 800-94 r1(Draft): Guide to Intrusion
Detection and Prevention Systems(IDPS)(Draft). Retrieved from National Institute of
Standards and Technology: Publications: http://csrc.nist.gov/publications/index.html
[15] Smyth, N. (2012). CentOS 6 Essentials. Retrieved from Techotopia: http://www.techotopia.com
[16] Tracy, M., Jansen, W., Scarfone, K., & Winograd, T. (2007, September). Special Publication 800-
44 ver2: Guidelines on Securing Public Web Servers. Retrieved from National Institute of
Standards and Technology: Publications: http://csrc.nist.gov/publications/index.html