DEV Community

Discussion on: Be anonymous, create your own proxy server with AWS EC2

Collapse
 
artis3n profile image
Ari Kalfus

Well, HTTPS traffic is still encrypted so your ISP won't see what traffic you mean to send, just that you are communicating with your VPN server in AWS because that is the only DNS traffic it see. So you're fine there, but again DNS over https is an easier and cheaper way to accomplish that.

Thread Thread
 
mrrcollins profile image
Ryan Collins • Edited

Your ISP won't be able to see the traffic, but they will know what sites you are visiting since those requests go across in plaintext. Here's an example line from Squid log when used as a proxy server:

1591682643.548 240341 10.70.13.198 TCP_TUNNEL/200 3208 CONNECT mail.google.com:443 - HIER_DIRECT/172.217.6.101 -
1591682682.345    679 10.70.5.74 TCP_TUNNEL/200 4438 CONNECT v10.events.data.microsoft.com:443 - HIER_DIRECT/52.114.75.78 -
1591682708.770    345 10.70.13.197 TCP_TUNNEL/200 4007 CONNECT settings-win.data.microsoft.com:443 - HIER_DIRECT/52.183.220.149 -

That's the traffic your ISP will see. Since you aren't encrypting traffic between you and the proxy, even DOH won't stop your ISP from seeing the sites you are visiting.

Your plan is solid, except for the connection to the proxy server. 😄

Thread Thread
 
artis3n profile image
Ari Kalfus

You should be encrypting traffic between yourself and the proxy! That's half of a proxy's point

Thread Thread
 
mrrcollins profile image
Ryan Collins

😄 We're on the same page, except you didn't put that part in the article. You're not encrypting anything between your browser and the proxy.

Thread Thread
 
artis3n profile image
Ari Kalfus

Not my article!

Thread Thread
 
mrrcollins profile image
Ryan Collins

Ah man, it must be getting late, LOL! Apparently I've failed at reading tonight and probably should go to bed. 😄

Thread Thread
 
viralsangani profile image
Viral Sangani

Sure, thanks for the suggestion, I will edit the part to encrypt the traffic between browser and proxy.