Proxy configurations: The lesser of two evils