home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
OS/2 Spezial
/
SPEZIAL2_97.zip
/
SPEZIAL2_97.iso
/
ANWEND
/
ONLINE
/
TPROXY12
/
README.TXT
next >
Wrap
Text File
|
1997-03-12
|
6KB
|
121 lines
TProxy: a *very* simple HTTP proxy server.
by N.A. Krawetz
Copyright 1996,1997. All rights reserved.
Current version: 1.2
Features:
* Multithreaded
* Firewall protection
* HTTP support
Limitations (benefits?):
* No caching (Netscape bypasses caching proxies anyway!)
* Occasionally runs out of Mutex Semaphores. This occurs when using many
threads (e.g. more than 8). Best solution is to limit the number of
threads to 4 (default), 5, or 6. If you must use many threads,
limit the use of other multi-threaded applications, such as
Netscape and WebExplorer, on the machine running the proxy server.
* Does not allow proxy-to-proxy forwarding. (May be added later.)
* ONLY supports HTTP. Does not support FTP, Telnet, or other protocols.
* Automatically closes connections after 2 minutes of inactivity.
Requires:
* EMX run-time libraries.
How to use TProxy:
There are four ways you can start TProxy:
TPROXY.EXE port
TPROXY.EXE port threads
TPROXY.EXE port address mask
TPROXY.EXE port threads address mask
The <port> is a socket number where the HTTP proxy clients will connect.
For example: "TPROXY.EXE 8080" will start the proxy on port 8080.
<threads> are the number of multiple connections. The default is 4, and
the maximum is 10. I would suggest using fewer than 6.
Normally, TProxy will let any HTTP client connect to it. If you want to
restrict connections (for firewalls) then you should specify the IP
address and netmask in standard dot notation.
For example: the address and mask 128.57.240.15 255.255.255.0 will only
allow clients from the 128.57.240.0 subnet access to the proxy server.
Log Mode:
A '-' before the port number starts the log mode. For example, port
"-8080" will use port "8080" and enter log mode.
In log mode, TProxy writes each connection to a log file. The log
files look like:
12-23-96 16:01 489 0 tp000000.log
12-23-96 16:01 386 0 tp000001.log
12-23-96 16:01 442 0 tp000002.log
12-23-96 16:01 575 0 tp000003.log
Each file contains:
1. The original query (or most of it, on line 1)
2. Client IP as well as the server's IP and port (on line 2)
3. The query determined by the proxy (or most of it, on line 3)
4. Other meta information provided by the client
5. A blank line
6. The entire response from the client. Including html, images,
and errors.
Log mode is not intended for long-term use. Furthermore, most people
will probably never need, nor use, it.
Log mode does not record unauthorized connections (firewall) and does
not record proxy error messages.
Log mode has not been heavily tested under critical situations. These
include limited disk space, security, speed-dependent applications.
Legal stuff:
TProxy is released as shareware and is not free software. To register
TProxy (and feel good about yourself), please send e-mail to:
dr.neal@worldnet.att.net
and let me know what you think of TProxy.
Shareware versions of TProxy may not be distributed to remote FTP or
networked sites without the explicit written permission of the Developer,
Neal Krawetz. Distributed versions of TProxy must contain the entire
unmodified distribution. The Developer is not responsible for modifications
made to the distribution without the explicit written permission of the
Developer.
You may not alter, merge, modify or adapt TProxy ("the Software") in any way
including disassembling or decompiling. You may not loan, rent, lease,
license, or distribute the Software or any copy.
All intellectual property rights in this Software and user documentation are
owned by N. A. Krawetz ("Developer") and are protected by United States
copyright laws, other applicable copyright laws, and international treaty
provisions. The Developer retains all rights not expressly granted.
Except as specifically provided herein, the Developer makes no warranty or
representation, promise or guarantee, either express or implied, statutory or
otherwise, with respect to this Software or user documentation, including its
quality, performance, merchantability, or fitness for a particular purpose.
The warranty and remedies set forth herein are exclusive and in lieu of all
other, oral or written, express or implied. No Software dealer, distributor,
agent or employee is authorized to make any modifications or additions to this
warranty.
Because software is inherently complex and may not be completely free of
errors, you are advised to verify your work and to make backup copies of your
work. In no event will the Developer be liable for direct, indirect, special,
incidental, economic, cover, or consequential damages arising out of the use
of or inability to use the Software or user documentation, even if advised of
the possibility of such damages. In no case shall the Developers' liabilities
exceed the total sum of the Software and licensing agreement. Some states or
provinces do not allow the exclusion or limitation of implied warranties or
limitation of liability for incidental or consequential damages, so the above
limitations or exclusion may not apply to you.
The Developer is not liable for the usage of the Software. The Developer is
not liable or responsible for information, data, documents, or images
retrieved, generated, stored, copied, or traversed that have copyright or are
proprietary, pornographic, restricted and otherwise illegal. All ownership
and rights to retrieved, generated, stored, copied, and traversed materials
are retained by their original owners, unless otherwise explicitly stated.