This attack allows malicious scripts inside the victim's browser to issue cross-domain requests to any hosts accessible to the transparent proxy. This can happen if the transparent proxy uses the HTTP host header information for addressing rather than the IP address information at the network layer. The transparent proxy will examine the HTTP header of the request and direct it to the remote site thereby partially bypassing the browser's same origin policy.
![mikrotik routeros 6.28 mikrotik routeros 6.28](https://cdn.slidesharecdn.com/ss_thumbnails/mikrotikrouteros-161028103659-thumbnail.jpg)
To circumvent that, however, malicious Flash or an Applet that is executing in the user's browser can attempt to create a cross-domain socket connection from the client to the remote domain. A browser has same origin policy that typically prevents scripts coming from one domain initiating requests to other websites from which they did not come. Two ways are available to do that: either by looking at the layer three (network) IP address or by examining layer seven (application) HTTP header destination. For requests originating at the client transparent proxies need to figure out the final destination of the client's data packet. Packages are provided only by MikroTik and no 3rd parties are allowed to make them. Transparent proxies are often used by enterprises and ISPs. RouterOS supports a lot of different features and since every installation requires specific set of features supprted it is possible to add or remove certain groups of features using package system.
#Mikrotik routeros 6.28 how to#
Stay tuned for our next how to which will be focusing on IPSec and creating secure VPN from the 3 major operating systems and phones to a MikroTik device. All of this is done in a manner transparent to the client. For Hardware encryption Mikrotik routers check out part 1.5 for a quick guide to set up Mikrotik to Mikrotik IPsec VPN. The proxy also intercepts all responses to the client and forwards these to the client. It intercepts all requests originating from the client and forwards them to the correct location. A transparent proxy serves as an intermediate between the client and the internet at large.