When setting up an HTTPS proxy connection, the browser must first contact the server over a designated TCP port. These ports may vary, but some are standard, such as port 23 for POP3 mail and port 80 for normal web browsing. After this, the security handshake process begins, which uses either Transport Layer Security (TLS) or Secure Sockets Layer (SSL) encryption to create a trust chain between the client and server. Because of this encryption, the handshake process fails against a proxied connection.
HTTPS proxies, however, have methods of completing the handshake process. Passive exclusion involves relaying all handshake messages to the client, which is less secure as data associated with the handshake is not encrypted. Authoritative inclusion uses the proxy’s SSL or TLS credentials to act as a secure secondary server, thus providing more protection. Lastly, dynamic HTTPS proxies can use either of these methods, depending on the situation. They are usually the preferred option since they offer more compatibility.
An Example HTTPS Proxy Session
A typical HTTP or HTTPS session is relatively straightforward. Your device will connect to your Internet Service Provider (ISP), who will assign you a unique IP address that identifies you on the internet. Every device from computer to cellphone connected to the internet has an IP address by which devices communicate.
Now, let’s take a look at the different types of connections. A typical non-proxy internet connection would involve your device connecting directly to the server. However, your IP address, location, and machine details are visible and available for anyone to see.
On the other hand, an HTTPS proxy connection provides a layer of encryption otherwise unavailable in a standard connection. The proxy intercepts traffic coming from your device and relays it to the server and vice-versa. As a result, the proxy conceals your actual IP address, geographic area, and machine details, as the server only communicates directly with the proxy.
You can configure proxy settings on a per-device basis or globally on your local network at the router level. Refer to our guides for setting up a proxy for simple walkthroughs. It is important to note that when using a proxy, you must trust it (and the proxy provider) with your data. At OneProxy, we understand the critical role that proxies play in digital security, and we are one of the most trusted suppliers on the market. We take our responsibility for your data seriously, and are proud of our excellent reputation and TrustPilot score.