-
-
serve(): Close the client socket as well if the server socket for an inspected connection has been
- closed. Privoxy currently can't establish a new server connection when the client socket is reused and
- would drop the connection in continue_https_chat() anyway.
+ Allow to edit the add-header action through the CGI editor by generalizing the code that got added with
+ the suppress-tag action. Closes SF patch request #146. Patch by Maxim Antonov.
-
-
Don't disable redirect checkers in redirect_url() Disable them in handle_established_connection()
- instead. Doing it in redirect_url() prevented the +redirect{} and +fast-redirects{} actions from being
- logged with LOG_LEVEL_ACTIONS.
+ Add a CGI handler for /wpad.dat that returns a Proxy Auto-Configuration (PAC) file. Among other things,
+ it can be used to instruct clients through DHCP to use Privoxy as proxy. For example with the dnsmasq
+ option: dhcp-option=252,http://config.privoxy.org/wpad.dat Initial patch by Richard Schneidt.
-
-
handle_established_connection(): Slightly improve a comment
+ Don't log the applied actions in process_encrypted_request() Log them in continue_https_chat() instead
+ to mirror chat(). Prevents the applied actions from getting logged twice for the first request on an
+ https-inspected connection.
-
-
handle_established_connection(): Fix a comment
+ OpenSSL generate_host_certificate(): Use config.privoxy.org as Common Name Org and Org Unit if the real
+ host name is too long to get accepted by OpenSSL. Clients should only care about the Subject Alternative
+ Name anyway and we can continue to use the real host name for it. Reported by Miles Wen on
+ privoxy-users@.
-
-
socks5_connect(): Fix indentation.
+ Establish the TLS connection with the client earlier and decide how to route the request afterwards.
+ This allows to change the forwarding settings based on information from the https-inspected request, for
+ example the path.
-
-
handle_established_connection(): Improve an error message
+ listen_loop(): When shutting down gracefully, close listening ports before waiting for the threads to
+ exit. Allows to start a second Privoxy with the same config file while the first Privoxy is still
+ running.
-
-
create_pattern_spec(): Fix ifdef indentation
+ serve(): Close the client socket as well if the server socket for an inspected connection has been
+ closed. Privoxy currently can't establish a new server connection when the client socket is reused and
+ would drop the connection in continue_https_chat() anyway.
-
-
Fix comment typos
+ Don't disable redirect checkers in redirect_url(). Disable them in handle_established_connection()
+ instead. Doing it in redirect_url() prevented the +redirect{} and +fast-redirects{} actions from being
+ logged with LOG_LEVEL_ACTIONS.
-
-
Add a CGI handler for /wpad.dat that returns a Proxy Auto-Configuration (PAC) file. Among other things,
- it can be used to instruct clients through DHCP to use Privoxy as proxy. For example with the dnsmasq
- option: dhcp-option=252,http://config.privoxy.org/wpad.dat Initial patch by Richard Schneidt.
+ handle_established_connection(): Slightly improve a comment.
-
-
listen_loop(): When shutting down gracefully, close listening ports before waiting for the threads to
- exit. Allows to start a second Privoxy with the same config file while the first Privoxy is still
- running.
+ handle_established_connection(): Fix a comment.
-
-
Allow to edit the add-header action through the CGI editor by generalizing the code that got added with
- the suppress-tag action. Closes SF patch request #146. Patch by Maxim Antonov.
+ socks5_connect(): Fix indentation.
-
-
process_encrypted_request(): Improve a log message The function only processes request headers and there
- may still be unread request body data left to process.
+ handle_established_connection(): Improve an error message.
-
-
read_http_request_body(): Fix two error messages that used an incorrect variable.
+ create_pattern_spec(): Fix ifdef indentation.
+
+ -
+
Fix comment typos.
+
+ -
+
process_encrypted_request(): Improve a log message. The function only processes request headers and
+ there may still be unread request body data left to process.
-
chat(): Log the applied actions before deciding how to forward the request.
@@ -124,7 +162,7 @@
parse_time_header(): Silence a coverity complaint when building without assertions.
-
-
receive_encrypted_request_headers(): Improve a log message
+ receive_encrypted_request_headers(): Improve a log message.
-
mbedTLS get_ciphersuites_from_string(): Use strlcpy() instead of strncpy(). Previously the terminating
@@ -137,27 +175,12 @@
doesn't know that. Get rid of several "this statement may fall through [-Wimplicit-fallthrough=]"
warnings.
- -
-
If the the response is chunk-encoded, ignore the Content-Length header sent by the server. Allows to
- load https://redmine.lighttpd.net/ with filtering enabled.
-
-
Store the PEM certificate in a dynamically allocated buffer when https-inspecting. Should prevent errors
like: 2021-03-16 22:36:19.148 7f47bbfff700 Error: X509 PEM cert len 16694 is larger than buffer len 16383
As a bonus it should slightly reduce the memory usage as most certificates are smaller than the previously
used fixed buffer. Reported by: Wen Yue
- -
-
Don't log the applied actions in process_encrypted_request() Log them in continue_https_chat() instead
- to mirror chat(). Prevents the applied actions from getting logged twice for the first request on an
- https-inspected connection.
-
- -
-
OpenSSL generate_host_certificate(): Use config.privoxy.org as Common Name Org and Org Unit if the real
- host name is too long to get accepted by OpenSSL. Clients should only care about the Subject Alternative
- Name anyway and we can continue to use the real host name for it. Reported by Miles Wen on
- privoxy-users@.
-
-
OpenSSL generate_host_certificate(): Fix two error messsages.
@@ -185,16 +208,16 @@
Disable fast-redirects for idp.springer.com/.