Jump to content

Open proxy

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by 172.99.190.215 (talk) at 14:28, 25 September 2025. The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Disadvantages

It is possible for a computer to run as an open proxy server without the computer's owner knowing it. This can result from misconfiguration of proxy software running on the computer, or from infection with malware (viruses, trojans or worms) designed for this purpose.[1] If it is caused by malware, the infected computer is known as a zombie computer.

Testing for access from an open proxy

Because open proxies are often implicated in abuse, a number of methods have been developed to detect them and to refuse service to them. IRC networks with strict usage policies automatically test client systems for known types of open proxies.[2] Likewise, a mail server may be configured to automatically test mail senders for open proxies, using software such as proxycheck.[3]

Groups of IRC and electronic mail operators run DNSBLs publishing lists of the IP addresses of known open proxies, such as AHBL, CBL, NJABL (till 2013), and SORBS (in operation since 2002). The AHBL discontinued public access in 2015.[4]

See also

References

  1. ^ "Accidental spamming, zombies and spoofing". Australian Communications and Media Authority. Archived from the original on 2015-12-25. Retrieved 2015-12-08.
  2. ^ "Blitzed Open Proxy Monitor". Blitzed.org. 2011-08-21. Archived from the original on August 15, 2014. Retrieved June 21, 2014.
  3. ^ "proxycheck: Open Proxy checker". Corpit.ru. Retrieved 2011-11-21.
  4. ^ "Official Abusive Hosts Blocking List Website".