Skip to main content

Proxy Auto Configuration (PAC) File

What is PAC File?

Proxy Auto Configuration file is text file having a single function containing various rules coded in JavaScript that instructs web browser to forward traffic to a proxy server or directly to the destination server.

Along with proxy server details there are optional and additional parameter that specify when and under what circumstances a browser forwards traffic to proxy server.

Example:

function FindProxyForURL(url, host) {
if (shExpMatch(url, "*.google.com/*"))
       return 10.10.10.1:8080;
       return DIRECT'
}


Advantage of PAC file:
  1. PAC file can be hosted on a centralized place such as workstation, internal web server, or server outside the corporate network.
  2. Perform Load distribution
  3. Handle proxy failover.
  4. Supported by all browsers.
  5. Exceptions rules can be configured for internal or external sites.
  6. Provides critical security, ensuring that traffic is always proxied when it should be.
History
Originally developed by Netscape in 1996 for Netscape Navigator 2.0.

Data Flow Diagram



In next blog we will try to understand how WPAD protocol works and security concerns associated with the combination of PAC file and WPAD

Reference: 

Comments

Popular posts from this blog

MTBF MTTR MTTD

Juniper SRX : Proxy ARP on Juniper SRX

Proxy ARP ( Address Resolution Protocol ) is a technique by which a intermediate network device like router replies to ARP request for a given IP address that is not part of local network.  The router acts as a proxy for the destination device to which the host wants to communicate and provides its own MAC address as the reply. Note: Proxy ARP can help devices on a network reach remote subnets without the need to configure routing or a default gateway. Disadvantages of Proxy ARP Proxy ARP can lead to security and performance issues on the network.  It poses a security risk by making the network vulnerable to ARP spoofinf attack. In attacks, malicious devices can impersonate proxies. Intercept or modify traffic between devices. It may introduce inconsistency into the network’s topology. Addressing scheme by concealing device locations and identities. Let see when and how proxy ARP is configured in Juniper by answering below questions which often comes to our mind ...