Proxy introduction

Written by Mad Marcus

Ok, so some of you have questions about proxies, their use, how they work, and many others...

So I have decided to write this short essay for the -=ICE Fortress=- visitors to explain my take on proxies.

Proxies are a sort of server, usually designed for the use of an internal network to forward traffic to the internet and back to the internal machine. Naturally, most of you have heard of them throught their other use, which is, that if they are not configured to block it they can also be used to forward outside traffic, from machines anywhere on the internet to other places on the internet.

Depending on how the proxy is set up and what kind of proxy it is, it may also be more or less "anonymous", as we tend to describe them.

What is this anonymity? Well, in most basic, it is what information the proxy reveals to the machine you connect to through it about wether or not the connection is made by a proxy and the IP address of the machine making the connection if it does reveal that it is a proxied connection.

"plain" connection:

Your machine --- your ip address --- server

proxied connection:

Your machine --- your ip address --- proxy server --- proxies ip address --- server

This is, of course simplistic, as there is a lot of other information the server can gather about who is connecting to it, called "ennvironmental variables" besides the ip address. But it is a basic illustration of what the process looks like.

What are these environmental variables??

There are a LOT. But the nature of them varies from the IP address of the computer connecting, the OS, wether or not it is forwarded by a proxy, what kind of documents are viewable by the machine (gif,jpeg,html,etc), so you get the idea.

Any of the variables, which actually give information about your computer are called "spills", for example if the proxy reveals your real ip address, we would say it spills your ip, and also that it is transparent, or non-anonymous.

To see what environmental variables are spilled about your connection you could go to a proxy judge like the one at, for just anonymity testing, or for a full set of variables go to (formerly Tamos).

The thing about this is that if you plan on doing any serious work, you will probably have to sort through dozens if not hundreds of proxies. So, manual proxy configuration in your browser is not recommended nor is using the proxy judges one at a time for each proxy.

So, what to do?

I recommend, Multiproxy. ( *now*

This small prggie allows you to load a whole list of proxies, and test them all, delete the ones that are dead or non-anonymous, and sort the reamining ones by speed. Also allows you to set your browser and any other proggies you might want to use a proxy for to connect to multiproxy on your local machine by local loopback ( on port 8088, and it will then forward you to the fastest and most anonymous proxies in your list.

What is local loopback? It is an IP address that every machine with tcp/ip has which allows you to connect to your own machine through any tcp/ip program or service as though it were a remote address.

The site also has a pretty good list of anonymous, and regular proxies. Though if it hasn't been updated recently they will probably be mostly dead, as happens with proxies.

Why, you ask, do proxies go dead? Because the admin who set them up probably did not do so with you in mind, he set them up for his local network or domain. And if he notices WAY too much traffic on them, in his logs after awhile, he figures out that people are using his proxy that aren't supposed to be and shuts off outside access.

Also, another good tool for proxy testing is the portions of Golden eye that deal with proxies and proxy testing, very quick and much more descriptive than multi-proxy. Multiproxy will only tell you anon. or non-anon. while GE will actually tell you what level and comments on anything you should know about the connection.