Nathan Alden Sr Proxy Save Abandoned

An HTTP proxy server written in C# and targeting .NET Core 3.

Project README

NathanAlden.Proxy

NathanAlden.Proxy is a proxy server written in C# and .NET Core.

System Requirements

Downloading and Running the Application

  1. Download and extract a release.
  2. Edit the config.yml file included with the release. config.yml includes extensive comments to help make configuration easier.
  3. Run the following command from the CLI: dotnet /path/to/NathanAlden.Proxy.dll.

Features

Compatible with corporate domains, proxies, and restrictive Windows Firewall configurations

Consider the following scenario:

  • A user's runs Windows as their host OS; Windows is connected to a corporate domain
  • Domain policy force-enables Windows Firewall and may even disable the ability to customize the firewall's rules
  • The corporate network forces the use of a corporate proxy to access internet HTTP resources
  • The user runs local virtual machines that are not connected to the corporate domain, but still needs to access internet HTTP resources

Corporate Proxy

Traffic from the user's host OS has no trouble authenticating with the corporate proxy because they are logged in to their domain account. Requests to the proxy from applications that support NTLM authentication (e.g., Google Chrome) can automatically authenticate when the proxy responds with 407 Proxy Authentication Required. However, traffic originating from local VMs not connected to the domain cannot authenticate with NTLM. Depending on corporate proxy configuration, this can result in frequent 407 Proxy Authentication Required responses, some of which may not be actionable, especially from CLI tools that do not support proxy authentication at all (e.g., Git). Proxy settings in the Internet Options control panel do not allow for specifying credentials. CLI tool proxy environment variables only support basic authentication usernames and passwords in clear-text--a security risk. Ideally, local VMs would never receive 407 Proxy Authentication Required responses.

NathanAlden.Proxy can be configured to sit between local VMs and a corporate proxy. NathanAlden.Proxy automatically handles 407 Proxy Authentication Required by responding with basic authentication credentials. Unfortunately, NTLM is not supported at this time due to the complexity of the NTLM handshake; however, many corporate proxies support basic authentication.

Many existing proxies already support forward proxies. Unfortunately, most of them only provide a binary option for binding to a local IP address: 127.0.0.1 and 0.0.0.0. Binding to 0.0.0.0 when Windows Firewall is enabled can trigger Windows Firewall to block the listening socket, thus making it impossible for local VMs to communicate with the local proxy.

Windows Firewall

Since the local proxy only needs to handle traffic between the local VMs and the corporate proxy, it should be bound instead to a network adapter shared by all local VMs--usually, a so-called "host-only" network adapter.

Host-Only

With this configuration, NathanAlden.Proxy is resistant to Windows Firewall settings and automatically handles 407 Proxy Authentication Required responses before they reach the local VMs. Local VMs never need to supply proxy credentials.

Example configuration:

bindings:
  ipAddresses:
  - 192.168.100.1
  port: 3128

forwardProxies:
  http:
    host: proxy.corporatenetwork.com
    port: 80
    authentication:
      basic:
        enabled: true
  https:
    host: proxy.corporatenetwork.com
    port: 80
    authentication:
      basic:
        enabled: true
  noProxyHosts:
  - .corporatenetwork.com

Forward proxy support

As described above, NathanAlden.Proxy supports optional forward proxies for both HTTP and HTTPS connections.

Disallowed hosts

NathanAlden.Proxy can reject incoming requests destined for certain hosts. By default, NathanAlden.Proxy will reject hosts of the proxy itself to prevent endless forwarding loops. IPv4 and IPv6 addresses, CIDR, domain name, and domain name suffix formats are supported.

Example configuration:

disallowedHosts:
- 10.1.2.3
- 10.0.0.0/8
- 2001:0db8:85a3:0000:0000:8a2e:0370:7334
- 2001:db8:/32
- example.com
- .example.com

Socket configuration

Receive and send timeouts can be tweaked. Timeouts are in milliseconds.

Example configuration:

sockets:
  receiveTimeout: 60000
  sendTimeout: 60000
Open Source Agenda is not affiliated with "Nathan Alden Sr Proxy" Project. README Source: nathan-alden-sr/proxy
Stars
30
Open Issues
2
Last Commit
5 years ago
License
MIT

Open Source Agenda Badge

Open Source Agenda Rating