Why the proxy is detected, how to fix it

Comments: 0

Some use cases of a proxy or VPN involve the need to be able to identify the mere usage of these tools. At times, you may be curious about whether your proxy usage is detectable, and if it is, how to hide it.

Various methods exist to detect proxy usage, most of which are concealed within the computer and browser.

The specific type of proxy used holds significance, in this case, our focus is on anonymous proxies. All types can be considered as such if they refrain from transmitting any information in the header during a request (refer to the description below).

If the proxy is detected, check the following settings:

  1. Browser HTTP headers.
  2. Analysis of headers sent by the browser. If the header is passed, it means the proxy is not anonymous, and there is a risk that your actual IP address may be disclosed.

    Headers that can expose your real IP:

    • HTTP_VIA
    • HTTP_X_FORWARDED_FOR
    • HTTP_PROXY_CONNECTION
    • X_FORWARDED_FOR
    • FORWARDED_FOR
    • FORWARDED
    • HTTP_FORWARDED_FOR_IP
    • HTTP_FORWARDED_FOR
    • FORWARDED_FOR_IP
    • HTTP_X_FORWARDED
    • HTTP_FORWARDED
    • HTTP_CLIENT_IP, VIA, X_FORWARDED
    • CLIENT_IP
  3. Flash Leak, Java Leak, and WebRTC Leak. Plugins like Adobe Flash, Java, and WebRTC can unintentionally reveal your real IP address. It is advisable to disable these plugins.
  4. DNS Leak.
  5. DNS queries can potentially leak the IP address of the DNS server closest to you and bypass your Proxy/VPN connection.

    How to safeguard against DNS leaks:

    • Force the required DNS servers in the connection settings.
    • Install specialized proxy programs that intercept and redirect DNS requests through your Proxy/VPN/TOR.
    • Disable third-party plugins such as Flash, Java, WebRTC, and Silverlight.
    • Use utilities to hide IP and encrypt traffic with built-in protection against DNS Leak.
  6. Fingerprints. Browser and system fingerprint analysis.
  7. Proxies are commonly used on Linux and BSD systems but less frequently on Windows. Users often overlook changing their User-Agent, which contains information about the operating system used in the browser.

  8. ETag. Compare cached Entity Tag identifiers.
  9. ETag can serve as a user identifier. If your IP address changes but the ETag remains stored in the browser cache, the resource can potentially identify you. It is crucial to completely clear the browser cache after modifying or using a proxy/VPN connection.

  10. MTU/MSS/p0f check. Passive TCP/IP stack listening methods.
  11. When using this method, the size of the Maximum Transmission Unit (MTU) value is compared. Encapsulation occurs when using a proxy, and with OpenVPN, the system retains the MTU size but can modify the Maximum Segment Size (MSS) within the packet.

    To prevent information disclosure through MTU/MSS, manual editing of these settings for the network adapter is necessary.

  12. Blacklists. Proxies can be checked against large Realtime Blackhole Lists (RBLs) for potential inclusion in blacklists.
  13. Differences between the local time and IP time zone.

Comments:

0 comments