From 3ec6603d75254171971d369543469c44d681dcae Mon Sep 17 00:00:00 2001
From: hal9 const char FILENAME_rcs[] = "$Id: developer-manual.sgml,v 2.13 2007/10/30 17:59:31 fabiankeil Exp $";
+>const char FILENAME_rcs[] = "$Id: developer-manual.sgml,v 2.14 2008/01/17 01:49:51 hal9 Exp $";
/*********************************************************************
*
* File : $Source$
@@ -2421,7 +2421,7 @@ WIDTH="100%"
CLASS="PROGRAMLISTING"
>#ifndef _FILENAME_H
#define _FILENAME_H
-#define FILENAME_H_VERSION "$Id: developer-manual.sgml,v 2.13 2007/10/30 17:59:31 fabiankeil Exp $"
+#define FILENAME_H_VERSION "$Id: developer-manual.sgml,v 2.14 2008/01/17 01:49:51 hal9 Exp $"
/*********************************************************************
*
* File : $Source$
diff --git a/doc/webserver/developer-manual/documentation.html b/doc/webserver/developer-manual/documentation.html
index d34ca841..944aeb35 100644
--- a/doc/webserver/developer-manual/documentation.html
+++ b/doc/webserver/developer-manual/documentation.html
@@ -799,7 +799,7 @@ CLASS="APPLICATION"
>
version string, e.g. "3.0.7""3.0.8".
$Id: developer-manual.sgml,v 2.13 2007/10/30 17:59:31 fabiankeil Exp $
Please note that this document is constantly evolving. This copy represents - the state at the release of version 3.0.7. + the state at the release of version 3.0.8. You can find the latest version of the this manual at
debchange -v 3.0.7-beta-1 "New upstream version"debchange -v 3.0.8-stable-1 "New upstream version"
Can be run as an "intercepting" proxy, which obviates the need to + configure browsers individually. +
Sophisticated actions and filters for manipulating both server and client + headers. +
Can be chained with other proxies. +
Integrated browser based configuration and control utility at "web-bugs", JavaScript and HTML annoyances, - pop-up windows, header manipulation, etc.) + pop-up windows, etc.)
Support for Perl Compatible Regular Expressions in the configuration files, and - generally a more sophisticated and flexible configuration syntax over - previous versions. + a more sophisticated and flexible configuration syntax.
$Id: faq.sgml,v 2.35 2007/11/19 17:57:59 fabiankeil Exp $
Please note that this document is a work in progress. This copy represents
- the state at the release of version 3.0.7.
+ the state at the release of version 3.0.8.
You can find the latest version of the document at Privoxy is a
+> Privoxy is a non-caching
web proxy
- with advanced filtering capabilities for protecting
- privacy, modifying web page data, managing
+ with advanced filtering capabilities for enhancing privacy,
+ modifying web page data, managing HTTP
cookies,
controlling access, and removing ads, banners, pop-ups and other obnoxious
- Internet junk. Privoxy has a very flexible configuration and can be
+ Internet junk. Privoxy has a flexible configuration and can be
customized to suit individual needs and tastes. Privoxy has application for
both stand-alone systems and multi-user networks. The most recent release is 3.0.6 (stable)3.0.8 (stable).
+privoxy [--help ] [--version ] [--no-daemon ] [--pidfile pidfile ] [--user user[.group] ] [--chroot ] [--pre-chroot-nslookup hostname ] [configfile ]
+
+
+Privoxy may be invoked with the following command line
+options:
+
+
+If the configfile is not specified on the command line,
+Privoxy will look for a file named
+config in the current directory . If no
+configfile is found, Privoxy will
+fail to start.
+
+
+
+Privoxy is a non-caching
+web proxy
+with advanced filtering capabilities for enhancing privacy,
+modifying web page data, managing HTTP
+cookies,
+controlling access, and removing ads, banners, pop-ups and other obnoxious
+Internet junk. Privoxy has a flexible configuration and can be
+customized to suit individual needs and tastes. Privoxy has application for
+both stand-alone systems and multi-user networks.
+
+
+Privoxy is based on Internet Junkbuster (tm).
+
+
+
+Browsers can either be individually configured to use
+Privoxy as a HTTP proxy (recommended),
+or Privoxy can be combined with a packet
+filter to build an intercepting proxy
+(see config). The default setting is for
+localhost, on port 8118 (configurable in the main config file). To set the
+HTTP proxy in Netscape and Mozilla, go through: Edit;
+Preferences; Advanced;
+Proxies; Manual Proxy Configuration;
+View.
+
+
+For Firefox, go through: Tools;
+Options; General;
+Connection Settings;
+Manual Proxy Configuration.
+
+
+For Internet Explorer, go through: Tools;
+Internet Properties; Connections;
+LAN Settings.
+
+
+The Secure (SSL) Proxy should also be set to the same values, otherwise
+https: URLs will not be proxied. Note: Privoxy can only
+proxy HTTP and HTTPS traffic. Do not try it with FTP or other protocols.
+HTTPS presents some limitations, and not all features will work with HTTPS
+connections.
+
+
+For other browsers, check the documentation.
+
+
+
+Privoxy can be configured with the various configuration
+files. The default configuration files are: config,
+default.filter, and
+default.action. user.action should
+be used for locally defined exceptions to the default rules of
+default.action, and user.filter for
+locally defined filters. These are well commented. On Unix
+and Unix-like systems, these are located in
+/etc/privoxy/ by default.
+
+
+Privoxy uses the concept of actions
+in order to manipulate the data stream between the browser and remote sites.
+There are various actions available with specific functions for such things
+as blocking web sites, managing cookies, etc. These actions can be invoked
+individually or combined, and used against individual URLs, or groups of URLs
+that can be defined using wildcards and regular expressions. The result is
+that the user has greatly enhanced control and freedom.
+
+
+The actions list (ad blocks, etc) can also be configured with your
+web browser at http://config.privoxy.org/
+(assuming the configuration allows it).
+Privoxy's configuration parameters can also be viewed at
+the same page. In addition, Privoxy can be toggled on/off.
+This is an internal page, and does not require Internet access.
+
+
+See the User Manual for a detailed
+explanation of installation, general usage, all configuration options, new
+features and notes on upgrading.
+
+
+
+A brief example of what a simple default.action
+configuration might look like:
+
+
+
+Then for a user.action, we would put local,
+narrowly defined exceptions:
+
+
+
+See the comments in the configuration files themselves, or the
+User Manual
+for full explanations of the above syntax, and other Privoxy
+configuration options.
+
+
+
+
+Various other files should be included, but may vary depending on platform
+and build configuration. Additional documentation should be included in the local
+documentation directory.
+
+
+
+Privoxy terminates on the SIGINT,
+SIGTERM and SIGABRT signals. Log
+rotation scripts may cause a re-opening of the logfile by sending a
+SIGHUP to Privoxy. Note that unlike
+other daemons, Privoxy does not need to be made aware of
+config file changes by SIGHUP -- it will detect them
+automatically.
+
+
+
+Please see the User Manual on how to contact the
+developers, for feature requests, reporting problems, and other questions.
+
+
+
+Other references and sites of interest to Privoxy
+users:
+
+
+
+http://www.privoxy.org/,
+the Privoxy Home page.
+
+http://www.privoxy.org/faq/,
+the Privoxy FAQ.
+
+http://sourceforge.net/projects/ijbswa/,
+the Project Page for Privoxy on
+SourceForge.
+
+http://config.privoxy.org/,
+the web-based user interface. Privoxy must be
+running for this to work. Shortcut: http://p.p/
+
+http://sourceforge.net/tracker/?group_id=11118&atid=460288, to submit ``misses'' and other
+configuration related suggestions to the developers.
+
+http://www.junkbusters.com/ht/en/cookies.html,
+an explanation how cookies are used to track web users.
+
+http://www.junkbusters.com/ijb.html,
+the original Internet Junkbuster.
+
+http://privacy.net/, a useful site
+to check what information about you is leaked while you browse the web.
+
+http://www.squid-cache.org/, a popular
+caching proxy, which is often used together with Privoxy.
+
+http://www.pps.jussieu.fr/~jch/software/polipo/,
+Polipo is a caching proxy with advanced features
+like pipelining, multiplexing and caching of partial instances. In many setups
+it can be used as Squid replacement.
+
+http://tor.eff.org/,
+Tor can help anonymize web browsing,
+web publishing, instant messaging, IRC, SSH, and other applications.
+
+http://www.privoxy.org/developer-manual/,
+the Privoxy developer manual.
+
+
+
+
+Copyright (C) 2001-2007 by Privoxy Developers <ijbswa-developers@lists.sourceforge.net>
+
+
+Some source code is based on code Copyright (C) 1997 by Anonymous Coders
+and Junkbusters, Inc. and licensed under the GNU General Public
+License.
+
+
+
+Privoxy is free software; you can
+redistribute it and/or modify it under the terms of the
+GNU General Public
+License, version 2, as published by the Free Software Foundation.
+
+
+This program is distributed in the hope that it will be useful, but WITHOUT
+ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
+FITNESS FOR A PARTICULAR PURPOSE. See the
+GNU General Public License for
+more details, which is available from the Free Software Foundation, Inc,
+51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
+
+
+You should have received a copy of the GNU General Public License
+along with this program; if not, write to the Free Software
+Foundation, Inc. 51 Franklin Street, Fifth Floor
+Boston, MA 02110-1301
+USA
+
+
+ matches any domain that ENDS in
- matches any domain with first-level domain .example.comcom
+ and second-level domain example.
+ For example www.example.com,
+ example.com and foo.bar.baz.example.com.
+ Note that it wouldn't match if the second-level domain was another-example.
Logging is disabled unless --no-daemon mode is used.
+> No logfile is written.
Many users will never look at it, however, and it's a privacy risk
- if third parties can get access to it. It is therefore disabled by
- default in Depending on the debug options below, the logfile may be a privacy risk
+ if third parties can get access to it. As most users will never look
+ at it, Privoxy 3.0.7 and later.
- For troubleshooting purposes, you will have to explicitly enable it.
- Please don't file any support requests without trying to reproduce
- the problem with logging enabled first. Once you read the log messages,
- you may even be able to solve the problem on your own.
+> For most troubleshooting purposes, you will have to change that,
+ please refer to the debugging section for details.
Your logfile will grow indefinitely, and you will probably want to
@@ -1408,17 +1404,7 @@ CLASS="VARIABLELIST"
>Specifies: Key values that determine what information gets logged to the
- logfile.
+> Key values that determine what information gets logged.
12289 (i.e.: URLs plus informational and warning messages) Nothing gets logged.
+> Default value is used (see above).
If you want to use CLF (Common Log Format), you should set Privoxy used to ship with the debug levels recommended above enabled by
+ default, but due to privacy concerns 3.0.7 and later are configured to
+ only log fatal errors.
+ If you are used to the more verbose settings, simply enable the debug lines
+ below again.
+ If you want to use pure CLF (Common Log Format), you should set "debug
512""... [too long, truncated]".
Please don't file any support requests without trying to reproduce
+ the problem with increased debug level first. Once you read the log
+ messages, you may even be able to solve the problem on your own.
+ The installed defaults provide a reasonable starting point, though
some settings may be aggressive by some standards. For the time being, the
@@ -453,14 +451,6 @@ CLASS="EMPHASIS"
>old listening address. While under development, the configuration content is subject to change.
- The below documentation may not be accurate by the time you read this.
- Also, what constitutes a "default" setting, may change, so
- please check all your configuration files on important issues. $Id: user-manual.sgml,v 2.49 2007/12/06 18:21:55 fabiankeil Exp $ RPMs can be installed with rpm -Uvh privoxy-3.0.7-1.rpmrpm -Uvh privoxy-3.0.8-1.rpm,
and will use If you have problems with failed dependencies, try rebuilding the SRC RPM:
rpm --rebuild privoxy-3.0.7-1.src.rpmrpm --rebuild privoxy-3.0.8-1.src.rpm. This
will use your locally installed libraries and RPM version. , the
documentation is in /usr/share/doc/privoxy-3.0.7/usr/share/doc/privoxy-3.0.8
and the Log directory is in This documentation is included with the current beta version of
+> This documentation is included with the current stable version of
Privoxy, v.3.0.7,
- and is mostly complete at this point. The most up to date reference for the
- time being is still the comments in the source files and in the individual
- configuration files. Development of a new version is currently nearing
- completion, and includes significant changes and enhancements over
- earlier versions. . Since this is a beta version, not all new features are well tested. This
- documentation may be slightly out of sync as a result (especially with
- CVS sources). And there may be bugs, though hopefully
- not many! Can be run as an "intercepting" proxy, which obviates the need to
+ configure browsers individually.
+ Sophisticated actions and filters for manipulating both server and client
+ headers.
+ Can be chained with other proxies.
+ Integrated browser based configuration and control utility at "web-bugs", JavaScript and HTML annoyances,
- pop-up windows, header manipulation, etc.)
+ pop-up windows, etc.)
Support for Perl Compatible Regular Expressions in the configuration files, and
- generally a more sophisticated and flexible configuration syntax over
- previous versions.
+ a more sophisticated and flexible configuration syntax.
Logging is off by default now. If you need logging, it can be turned on
- in the config file. You may also want
- to enable logging until you verified that the new In the default configuration only fatal errors are logged now.
+ You can change that in the debug section
+ of the configuration file. You may also want to enable more verbose
+ logging until you verified that the new Privoxy version
- is working as expected.
+> version is working
+ as expected.
4.1. How much does Privoxy slow my browsing down? This
has to add extra time to browsing.
4.8. Can Privoxy guarantee I am anonymous?
4.9. A test site says I am not using a Proxy.
4.11. Might some things break because header information or
content is being altered?
4.12. Can Privoxy act as a "caching"
4.13. What about as a firewall? Can Privoxy protect me?
4.14. I have large empty spaces / a checkerboard pattern now where
ads used to be. Why?
4.15. How can Privoxy filter Secure (HTTPS) URLs?
4.16. Privoxy runs as a "server"
5.1. I cannot connect to any websites. Or, I am getting
5.3. I just added a new rule, but the steenkin ad is
still getting through. How?
Privoxy is developed on:
+ PRIVOXY
+Section: (1)
Updated: 19 January 2008
Index
+
+
+
+NAME
+
+privoxy - Privacy Enhancing Proxy
+
+SYNOPSIS
+
+OPTIONS
+
+
+
+DESCRIPTION
+
+INSTALLATION AND USAGE
+
+CONFIGURATION
+
+SAMPLE CONFIGURATION
+
+
+ # Define a few useful custom aliases for later use
+ {{alias}}
+
+ # Useful aliases that combine more than one action
+ +crunch-cookies = +crunch-incoming-cookies +crunch-outgoing-cookies
+ -crunch-cookies = -crunch-incoming-cookies -crunch-outgoing-cookies
+ +block-as-image = +block +handle-as-image
+
+ # Fragile sites should have the minimum changes
+ fragile = -block -deanimate-gifs -fast-redirects -filter \
+ -hide-referer -prevent-cookies -kill-popups
+
+ ## Turn some actions on ################################
+ ## NOTE: Actions are off by default, unless explictily turned on
+ ## otherwise with the '+' operator.
+
+{ \
++deanimate-gifs{last} \
++filter{refresh-tags} \
++filter{img-reorder} \
++filter{banners-by-size} \
++filter{webbugs} \
++filter{jumping-windows} \
++filter{ie-exploits} \
++hide-forwarded-for-headers \
++hide-from-header{block} \
++hide-referrer{conditional-block} \
++session-cookies-only \
++set-image-blocker{pattern} \
+}
+/ # '/' Match *all* URL patterns
+
+
+ # Block all URLs that match these patterns
+ { +block }
+ ad.
+ ad[sv].
+ .*ads.
+ banner?.
+ /.*count(er)?\.(pl|cgi|exe|dll|asp|php[34]?)
+ .hitbox.com
+ media./.*(ads|banner)
+
+ # Block, and treat these URL patterns as if they were 'images'.
+ # We would expect these to be ads.
+ { +block-as-image }
+ .ad.doubleclick.net
+ .a[0-9].yimg.com/(?:(?!/i/).)*$
+ ad.*.doubleclick.net
+
+ # Make exceptions for these harmless ones that would be
+ # caught by our +block patterns just above.
+ { -block }
+ adsl.
+ adobe.
+ advice.
+ .*downloads.
+ # uploads or downloads
+ /.*loads
+
+
+
+ # Re-define aliases as needed here
+ {{alias}}
+
+ # Useful aliases
+ -crunch-cookies = -crunch-incoming-cookies -crunch-outgoing-cookies
+
+ # Set personal exceptions to the policies in default.action #######
+
+ # Sites where we want persistent cookies, so allow *all* cookies
+ { -crunch-cookies -session-cookies-only }
+ .redhat.com
+ .sun.com
+ .msdn.microsoft.com
+
+ # These sites break easily. Use our "fragile" alias here.
+ { fragile }
+ .forbes.com
+ mybank.example.com
+
+ # Replace example.com's style sheet with one of my choosing
+ { +redirect{http://localhost/css-replacements/example.com.css} }
+ .example.com/stylesheet.css
+
+
+FILES
+
+
+
+ /usr/sbin/privoxy
+ /etc/privoxy/config
+ /etc/privoxy/default.action
+ /etc/privoxy/standard.action
+ /etc/privoxy/user.action
+ /etc/privoxy/default.filter
+ /etc/privoxy/user.filter
+ /etc/privoxy/trust
+ /etc/privoxy/templates/*
+ /var/log/privoxy/logfile
+
+
+SIGNALS
+
+NOTES
+
+SEE ALSO
+
+DEVELOPMENT TEAM
+
+
+ Fabian Keil, lead developer
+ David Schmidt, developer
+
+ Hal Burgiss
+ Roland Rosenfeld
+ Jörg Strohmayer
+
+
+
+COPYRIGHT AND LICENSE
+
+
+COPYRIGHT
+
+LICENSE
+
+
+ Index
+
+
+
+This document was created by
+man2html,
+using the manual pages.
+Time: 14:48:33 GMT, January 19, 2008
+
+
diff --git a/doc/webserver/privoxy-index.html b/doc/webserver/privoxy-index.html
index 71f14a8b..607d0e30 100644
--- a/doc/webserver/privoxy-index.html
+++ b/doc/webserver/privoxy-index.html
@@ -76,7 +76,7 @@ NAME="AEN2"
>Project Index Page v3.0.7
Project Index Page v3.0.8Privoxy 3.0.7 User Manual Privoxy 3.0.8 User Manual 8.2. How to Edit
8.4.1. The Domain Pattern
8.4.2. The Path Pattern
8.5.39. Summary
8.7.1. default.action
8.7.2. user.action
Privoxy 3.0.7 User Manual Privoxy 3.0.8 User Manual14.2. Privoxy's Internal Pages
Short cuts. Turn off, then on:
Privoxy 3.0.7 User Manual Privoxy 3.0.8 User ManualEffect if unset: debug 1 # show each GET/POST/CONNECT request
+> debug 1 # log each request destination (and the crunch reason if Privoxy intercepted the request)
debug 2 # show each connection status
debug 4 # show I/O status
debug 8 # show header parsing
@@ -1487,16 +1476,28 @@ CLASS="LITERAL"
CLASS="emphasis"
>1, 4096 and 8192 are highly recommended1, 4096 and 8192 are recommended
- so that you will notice when things go wrong. The other levels are probably
- only of interest if you are hunting down a specific problem. They can produce
- a hell of an output (especially 16).
+ so that you will notice when things go wrong. The other levels are
+ probably only of interest if you are hunting down a specific problem.
+ They can produce a hell of an output (especially 16).
Privoxy 3.0.7 User Manual Privoxy 3.0.8 User Manual6.1. Controlling Privoxy with Your Web Browser
Privoxy Menu
▪ Documentation
@@ -272,9 +272,7 @@ CLASS="FILENAME"
Privoxy executable. The name
- and number of configuration files has changed from previous versions, and is
- subject to change as development progresses. executable. Privoxy 3.0.7 User Manual Privoxy 3.0.8 User ManualPrivoxy 3.0.7 User Manual Privoxy 3.0.8 User Manual12.1. License
Privoxy 3.0.7 User Manual Privoxy 3.0.8 User Manual9.1. Filter File Tutorial
Privoxy 3.0.7 User Manual Privoxy 3.0.8 User Manual tar xzvf privoxy-3.0.7-beta-src* [.tgz or .tar.gz]
- cd privoxy-3.0.7-beta
tar xzvf privoxy-3.0.8-src* [.tgz or .tar.gz]
+ cd privoxy-3.0.8Privoxy 3.0.7 User Manual Privoxy 3.0.8 User Manual1. Introduction Privoxy 3.0.8 User ManualPrivoxy provides many supplemental
- features, some of them currently under development,
+ features,
that give the end-user more control, more privacy and more freedom:
Privoxy 3.0.7 User Manual Privoxy 3.0.8 User Manual Privoxy 3.0.7 User Manual Privoxy 3.0.8 User Manual Privoxy 3.0.7 User Manual Privoxy 3.0.8 User Manual