HTTPS/HTTP gateways sit in front of the web server, usually as an invisible intercepting gateway or a reverse proxy.
They receive secure HTTPS traffic, decrypt the secure traffic, and make normal HTTP requests to the web server.
These gateways often include special decryption hardware to decrypt secure traffic much more efficiently than the origin server.
3. Resource Gateways
An application server:
3.1 Common Gateway Interface (CGI)
4. Tunnels
Web tunnels, enable access to applications that speak non-HTTP protocols through HTTP applications.
4.1 Establishing HTTP Tunnels with CONNECT
Web tunnels are established using HTTP's CONNECT method.
CONNECT requests:
CONNECT responses:
4.2 SSL Tunneling
Web tunnels were first developed to carry encrypted SSL traffic through firewalls.
To allow SSL traffic to flow through existing proxy firewalls, a tunneling feature was added to HTTP, in which raw, encrypted data is placed inside HTTP messages and sent through normal HTTP channels.
4.3 Tunnel Authentication
5. Relays
HTTP relays are simple HTTP proxies that do not fully adhere to the HTTP specifications.
Relays process enough HTTP to establish connections, then blindly forward bytes.