Solved

Interesting problem with real payment.... https proxy

Posted on 2003-11-06
7
215 Views
Last Modified: 2010-04-05
  The application has to go through a proxy server and the webpage is secured or not by a username and password. I need this part. The application then will go through few proxy servers like this :  PC ->encrypted transmision-> Server1 ->encrypted transmision-> Server2 ->etc-> FinalWebServer.
   The 'proxy server' can be any program running as http proxy but can receive information on any ports. Also this 'proxy' must be able not to trace back the transmision.
   My e-mail is : mnuntel@yahoo.com
   I will pay money for any working source (not asm) in delphi 6,7.
0
Comment
Question by:TheNew-Old
  • 4
  • 3
7 Comments
 
LVL 6

Expert Comment

by:swift99
ID: 9699174
The proxy itself will always be able to trace back the source, or it would be incapable of completing a connection.  However, since ICMP is not HTTP, tracert will not be able to traverse proxies.

You could build something like this using ICS - see http://overbyte.delphicenter.com for some ideas.
0
 

Author Comment

by:TheNew-Old
ID: 9704076
  Yes I know that. What I mean is if someone, let say finalwebserver ask "the proxy" who am I the proxy should answer 'white house' or anything i need (or just to say that is no proxy and is a direct connection).  My english is not that good and is hard for me to say what I have to say.
   I can build something like this myself but it must be perfect without any errors. So only a brain can overpass some problems but more brains :))
0
 

Author Comment

by:TheNew-Old
ID: 9704112
 Anyway the important part for me is to make a transfer from PC ->encryted transmision + extra data -> proxy -> http://www.nothing.com
  I want that my ISP to see only encrypted transmisions.
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 
LVL 6

Expert Comment

by:swift99
ID: 9704204
That is what a proxy does ... to the "internet" it looks like it is the only user, and to the user, it looks like it is the entire internet.
0
 

Author Comment

by:TheNew-Old
ID: 9710961
 Yes....but my ISP will be able to see what I send to the "proxy" if not encrypted. And so on from proxy to proxy.
  If encrypted then ISP !#@?!@$#!#@$
  That's what I mean.
0
 
LVL 6

Accepted Solution

by:
swift99 earned 450 total points
ID: 9715207
ISP generally doesn't care, unless you generate excessive traffic.

You generally have to infer the presence of a proxy, unless the proxy has open ports on the exposed side for internet to internet relaying.  At that point in time, it doesn't matter what you do encryption wise because what goes in comes out on the same physical wire.  The ISP can tell that you are relaying with automated mechanisms, and if it is against your service agreement then they don't have to know the contents to legally cut your service.

SSL provides encryption.  There is a project to add SSL to ICS.  I believe that there are commercial products with SSL also.

No encryption is totally secure - A math professor in Florida showed emprically that 128 bit encryption can be cracked with home equipment in about 3 days.  You may want to check out the security forums for more hints.
0
 

Author Comment

by:TheNew-Old
ID: 9759974
 10x anyway man...

   The idea is that the proxy server is located at another ISP. If you can help me how to connect encrypted to that proxy server on port 32432 (no importance) and after that the proxy to connect to the internet without encryption please let me know at : mnuntel@yahoo.com

   
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Hello everybody This Article will show you how to validate number with TEdit control, What's the TEdit control? TEdit is a standard Windows edit control on a form, it allows to user to write, read and copy/paste single line of text. Usua…
Introduction I have seen many questions in this Delphi topic area where queries in threads are needed or suggested. I know bumped into a similar need. This article will address some of the concepts when dealing with a multithreaded delphi database…
When you create an app prototype with Adobe XD, you can insert system screens -- sharing or Control Center, for example -- with just a few clicks. This video shows you how. You can take the full course on Experts Exchange at http://bit.ly/XDcourse.
I designed this idea while studying technology in the classroom.  This is a semester long project.  Students are asked to take photographs on a specific topic which they find meaningful, it can be a place or situation such as travel or homelessness.…

919 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now