UK Proxy Buy – Some Tips

So what is a proxy, well the definition actually changes slightly depending on who you are talking to.  The origin of the term goes back to the beginning of the web in around 1990 when proxy servers were actually referred to as ‘gateways’.  These were simply devices which forwarded packets between different networks, sometimes even converting the different protocols that were being used.

However a simple up to date definition could be as follows:

A proxy server is a computer or system that acts as an intermediary between a client and a server.

They have all sorts of uses within corporate networks but in reality their real popularity has come outside that from ordinary computer users. You see the proxy sits between the computer you are using and the server you are contacting. It relays all information between the two sides and effectively protects the anonymity of the client computer.

This is the main benefit of using a proxy in this context, the proxy hides your location, your computer and identity from the web server you are using.

So Why all Secret Squirrel?  UK Proxy Buy or Not?

Most proxy users aren’t looking for total anonymity (although some are), but people have been using proxies for years in order to bypass the various blocks and filters that exist online. For example one of the most popular uses of a proxy server was in order to access British TV Online and blocked media sites  such as the BBC iPlayer or Hulu.

The BBC’s wonderful website and application is only accessible if you’re physically located in the United Kingdom – everyone else get’s blocked. However if you connect through a UK proxy first, then the BBC website only sees the location of the proxy and allows access.

It is how millions of people across the world could watch the BBC News or Match of the Day from outside the United Kingdom. As long as their proxy server was located in the UK, their actual location didn’t matter.  Exactly the same situation from US sites like Hulu, to access from outside the USA you needed to channel your connection through a proxy server based in the United States.

So does a UK Proxy Unlock Every UK TV site?

Unfortunately no, in fact the reality is that nowadays a proxy is pretty much useless as far as bypassing geographical blocks.  The reason is that the inbound connection from a proxy server is actually fairly easy to detect which is what most large scale media sites do.  If they detect a connection from a proxy server then access is blocked automatically.

Here’s a example of the message you get when trying to access Netflix through a proxy, it simply won’t let you use the site.

The reality is that there’s little point in buying a UK proxy or indeed one based anywhere in the world.  They can still obscure your identity a little, and they stop every website you visit being logged at your ISP but for watching UK TV you need something else.

That something else is a UK VPN service, which in many ways operates in a very similar way.  A VPN is a virtual private network connection between your computer and a VPN server.  Exactly like a proxy this server acts as an intermediary between you and the web resource you’re trying to access – relaying information both ways.  Yet there are important differences, firstly the entire connection is encrypted which means that no-one can access or intercept your data at any point.  The second is that a VPN connection is virtually impossible to detect, so none of the media sites are able to block or disconnect the connection.

Here we can see one such VPN service in action, it’s called Identity Cloaker.

As you can see it’s quite straight forward especially on a computer or laptop.  You merely click on the country you require and it establishes a connection to that specific VPN server. From that point any website you connect to will only the address of the VPN server not yours, which means that you can access whatever you like irrespective of your location.

Literally millions of people use these VPN services now to bypass blocks and filters of all descriptions.  Some use them to bypass state controlled filters such as in China and Turkey where the internet is heavily censored. While many others simply use them to access things like UK or US television, or to switch the version of Netflix they are using.

If you want to try the VPN service illustrated here, which is one of the few that still works with all the British TV sites it’s called Identity Cloaker.

You can try their 10 day trial here – Identity Cloaker

Primer on Protocol Verification

Depending on the environment and the purpose of a proxy then protocol verification is not always necessary. Indeed this was mostly ignored by earlier proxies and gateways as information was simply tunneled through transparently. Nowadays though there is normally some requirement to identify the protocol being transmitted through the proxy server.

Generic (circuit-level) tunneling, such as SOCKS and (SSL) tunneling, allows any protocol to be passed through the proxy server gateway. This implies that the proxy server does not necessarily understand the protocol and cannot verify what is happening at the protocol level. For example, the SSL tunneling protocol, despite its name, can tunnel /my TCP-based protocol, for example the telnet protocol.

A short-term solution to this is to allow only well-known ports to be tunneled, such as 445 for HTTPS, 563 for SNEWS, and 636 for secure LDAP. See Table 7-1 on page 135 for a list of well-known Web-related protocol ports. A longer-term solution is to be provided by proxy servers that verify the spoken protocol. More intelligence will need to be built into proxy servers to understand even protocols that are merely tunneled, not proxied. This enables proxies to notice misuse, such as exploiting the SSL tunneling to establish a telnet session.

Note that protocols that are proxied at the application level by the proxy server, such as HTTP, FTP, and Gopher, cannot be exploited as above because no direct “tunnel” is established through the proxy server. Instead, the proxy will fully re-perform the request on behalf of the client and then pass the response back.   This is important as it may be necessary for the function to be completed properly.  For example it’s common now to stream multimedia or video through  the servers and these need to function on the specific ports.  You won’t be able to stream things like the BBC TV output through this site without some sort of protocol verification taking place.

This ensures that the protocol is a legitimately allowed protocol. ‘ However, the Gopher protocol, or rather Gopher URLs, can be used to fool the proxy to make requests using other protocols by crafting special malicious URLs that convert to the language used by some other protocol.

Common Security Holes in Server Software can be read about on this blog and particularly there are Trojan horses disguised as Gopher URLs. If limiting to well-known ports is not acceptable (there are a number of servers out there running on non-standard ports), it is recommended to at least [9106/e ports that definitely should not be allowed an SSL tunnel to. Among these are ports known to be dedicated for other purposes, such as the telnet and SMTP ports (23, 25, respectively). Some proxy server software may in fact have a built-in filter for these ports and automatically disallow Gopher requests to them.