Some use cases of a proxy or VPN involve the need to be able to identify the mere usage of these tools. At times, you may be curious about whether your proxy usage is detectable, and if it is, how to hide it.
Various methods exist to detect proxy usage, most of which are concealed within the computer and browser.
The specific type of proxy used holds significance, in this case, our focus is on anonymous proxies. All types can be considered as such if they refrain from transmitting any information in the header during a request (refer to the description below).
Analysis of headers sent by the browser. If the header is passed, it means the proxy is not anonymous, and there is a risk that your actual IP address may be disclosed.
Headers that can expose your real IP:
DNS queries can potentially leak the IP address of the DNS server closest to you and bypass your Proxy/VPN connection.
How to safeguard against DNS leaks:
Proxies are commonly used on Linux and BSD systems but less frequently on Windows. Users often overlook changing their User-Agent, which contains information about the operating system used in the browser.
ETag can serve as a user identifier. If your IP address changes but the ETag remains stored in the browser cache, the resource can potentially identify you. It is crucial to completely clear the browser cache after modifying or using a proxy/VPN connection.
When using this method, the size of the Maximum Transmission Unit (MTU) value is compared. Encapsulation occurs when using a proxy, and with OpenVPN, the system retains the MTU size but can modify the Maximum Segment Size (MSS) within the packet.
To prevent information disclosure through MTU/MSS, manual editing of these settings for the network adapter is necessary.
Comments: 0