22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

168 Lotus Security Handbook<br />

From a topology point of view (both generally and bandwidth-wise), forward<br />

proxies are always relatively closer in network speed terms to your users,<br />

compared to a slower (WAN) link that typically separates the forward proxy from<br />

the actual contents on the Internet.<br />

5.3.2 Transparent proxies<br />

5.3.3 Caching proxies<br />

Transparent proxies are proxies that “are there,” but that do not make users<br />

explicitly aware that the proxy is there. In forwarding proxies, these are typically<br />

Linux/UNIX boxes that listen to all the traffic for a particular protocol for a<br />

particular segment of a network, and intercept the traffic without the user process<br />

actually knowing about their existence. In fact, the user process is not talking to<br />

the proxy, but talking to another (the end) site, and the proxy is effectively<br />

becoming a man-in-the-middle, highjacking the connection.<br />

A proxy is non-transparent, or declared, when users know that they are talking<br />

via a proxy, because they are talking (in proxy-speak: HTTP) to the proxy. In<br />

other words, if I declare my proxy to be proxy.mydomain.com, then my processes<br />

will talk to proxy.mydomain.com, asking “it” to contact the ultimate destination of<br />

my requests. I’m fully cognizant of the existence of the proxy, that I have to talk<br />

“proxy-speak” to it (that is, HTTP), and that I have to tell it where to go and fetch<br />

the content from.<br />

You can have declared, non-transparent proxies that are automatically declared,<br />

are configured, or are dis<strong>cover</strong>ed. Regardless of how they become declared,<br />

these proxies are visible and known to the requesting user or process. In other<br />

words, it does not matter how you or your process know the proxy exists, what<br />

matters is that you do know the proxy exists, and that you are talking to the<br />

proxy.<br />

A transparent proxy is not truly a type of proxy on its own, but rather any proxy is<br />

either transparent or declared by design.<br />

A caching proxy, as the name indicates, is a proxy that is configured to reuse<br />

cached images of content when available and possible. When a previously<br />

cached piece of content is not available, then it fetches and serves the content<br />

but also tries to cache it.<br />

The most important aspect of caching proxies is to ensure that caching proxies<br />

only cache what is truly cacheable. Dynamic, regularly changing content would<br />

not be a good choice to cache since this could affect the stability of the<br />

application relying on the content. In the case of HTTP content, HTTP headers<br />

indicate if it is possible to cache the content or not via the “cache” directives.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!