Privacy and security

How​ ​Reverse​ ​Proxy​ ​Technology​ ​Works

Requests​ ​to​ ​the​ ​Proxy​ ​Domain​ ​are​ ​duplicated​ ​and​ ​are​ ​then​ ​"replayed"​ ​against​ ​the​ ​Source​ ​Domain​ ​as​ ​if the​ ​user​ ​was​ ​making​ ​the​ ​request​ ​to​ ​the​ ​Source​ ​Domain​ ​themselves​ ​from​ ​their​ ​web​ ​browser.

The​ ​entire​ ​visitor​ ​request​ ​is​ ​duplicated​ ​including​ ​the​ ​Content,​ ​POST/PUT​ ​parameters,​ ​Browser​ ​User Agent,​ ​Headers,​ ​and​ ​Cookies​ ​and​ ​then​ ​passed​ ​along​ ​to​ ​the​ ​Source​ ​Domain.

Some​ ​data​ ​is​ ​manipulated​ ​as​ ​it​ ​flows​ ​to​ ​and​ ​from​ ​the​ ​Source​ ​Domain​ ​to​ ​ensure​ ​the​ ​request​ ​to​ ​the Source​ ​Domain​ ​is​ ​the​ ​same​ ​as​ ​if​ ​the​ ​Visitor​ ​was​ ​loading​ ​the​ ​Source​ ​Domain​ ​in​ ​their​ ​browser. References​ ​of​ ​​proxydomain.com​​ ​are​ ​replaced​ ​with​ ​​sourcedomain.com​​ ​to​ ​make​ ​sure​ ​the​ ​Source​ ​Domain server​ ​sees​ ​the​ ​request​ ​the​ ​same​ ​as​ ​if​ ​the​ ​visitor​ ​loaded​ ​the​ ​Source​ ​Domain​ ​outside​ ​of​ ​our​ ​Proxy.

If​ ​the​ ​Source​ ​Domain​ ​is​ ​HTTPS-enabled,​ ​then​ ​all​ ​requests​ ​that​ ​are​ ​sent​ ​and​ ​received​ ​from​ ​the​ ​Source Domain​ ​are​ ​encrypted​ ​and​ ​sent​ ​using​ ​SSL​ ​protocols.

The​ ​Proxy​ ​Technology​ ​verifies​ ​the​ ​source​ ​domain's​ ​SSL​ ​certificate​ ​for​ ​HTTPS​ ​requests,​ ​just​ ​like​ ​a​ ​web browser.​ ​Requests​ ​that​ ​are​ ​not​ ​validated​ ​will​ ​throw​ ​a​ ​SSL​ ​Error​ ​if​ ​it's​ ​unable​ ​to​ ​verify​ ​the​ ​certificate and​ ​the​ ​request​ ​is​ ​then​ ​terminated.

Last updated