-Junkbuster Frequently Asked Questions
+Privoxy Frequently Asked Questions
- By: Junkbuster Developers
+ By: Privoxy Developers
- $Id: faq.sgml,v 1.19 2002/03/21 17:01:54 hal9 Exp $
+ $Id: faq.sgml,v 1.22 2002/03/24 11:51:00 swa Exp $
The FAQ document gives users and developers alike answers to
- frequently asked questions about the Internet Junkbuster. Internet
- Junkbuster is a web proxy with advanced filtering capabilities for
- protecting privacy, filtering web page content, managing cookies,
- controlling access, and removing ads, banners, pop-ups and other
- obnoxious Internet Junk. Junkbuster has a very flexible configuration
- and can be customized to suit individual needs and tastes. Internet
- Junkbuster has application for both stand-alone systems and multi-user
- networks.
+ frequently asked questions about Privoxy. Privoxy is a web proxy with
+ advanced filtering capabilities for protecting privacy, filtering web
+ page content, managing cookies, controlling access, and removing ads,
+ banners, pop-ups and other obnoxious Internet Junk. Privoxy has a very
+ flexible configuration and can be customized to suit individual needs
+ and tastes. Privoxy has application for both stand-alone systems and
+ multi-user networks.
You can find the latest version of the document at
[1]http://ijbswa.sourceforge.net/faq/. Please see the Contact section
1.1. [4]General Information
- 1.1.1. [5]What is this new version of Junkbuster?
+ 1.1.1. [5]What is this new version of Privoxy?
1.1.2. [6]How does it differ from the old Junkbuster?
1.1.3. [7]What are some of the new features?
- 1.1.4. [8]What is a "proxy"? How does Junkbuster work?
- 1.1.5. [9]My browser does the same things as Junkbuster.
- Why should I use Junkbuster at all?
+ 1.1.4. [8]What is a "proxy"? How does Privoxy work?
+ 1.1.5. [9]My browser does the same things as Privoxy. Why
+ should I use Privoxy at all?
1.1.6. [10]Is there is a license or fee? What about a
warranty? Registration?
- 1.2. [11]Installation
-
- 1.2.1. [12]Can I install the new Junkbuster over the old
- one?
+ 1.1.7. [11]I would like to help you, what do I do?
- 1.2.2. [13]I just installed Junkbuster. Is there anything
+ 1.2. [12]Installation
+
+ 1.2.1. [13]Can I install the new Privoxy over the old one?
+ 1.2.2. [14]I just installed Privoxy. Is there anything
special I have to do now?
- 1.2.3. [14]What is the proxy address of Junkbuster?
- 1.2.4. [15]I just installed Junkbuster, and nothing is
+ 1.2.3. [15]What is the proxy address of Privoxy?
+ 1.2.4. [16]I just installed Privoxy, and nothing is
happening. All the ads are there. What's wrong?
- 1.3. [16]Configuration
+ 1.3. [17]Configuration
- 1.3.1. [17]Can I use my old config files?
- 1.3.2. [18]What is an "actions" file?
- 1.3.3. [19]The "actions"concept confuses me. Please list
+ 1.3.1. [18]Can I use my old config files?
+ 1.3.2. [19]What is an "actions" file?
+ 1.3.3. [20]The "actions"concept confuses me. Please list
some of these "actions".
- 1.3.4. [20]How are actions files configured? What is the
+ 1.3.4. [21]How are actions files configured? What is the
easiest way to do this?
- 1.3.5. [21]What are the differences between
- ijb-intermediate.action, ijb-basic.action, etc.?
+ 1.3.5. [22]What are the differences between
+ intermediate.action, basic.action, etc.?
- 1.3.6. [22]Why can I change the configuration with a
+ 1.3.6. [23]Why can I change the configuration with a
browser? Does that not raise security issues?
- 1.3.7. [23]How can I set up Junkbuster to act as a proxy
- for my LAN?
+ 1.3.7. [24]How can I set up Privoxy to act as a proxy for
+ my LAN?
- 1.3.8. [24]Instead of ads, now I get a Junkbuster logo [or
+ 1.3.8. [25]Instead of ads, now I get a Privoxy logo [or
checkerboard]. I don't want to see anything.
- 1.3.9. [25]Why would anybody want to see the logo or
+ 1.3.9. [26]Why would anybody want to see the logo or
checkerboard?
- 1.3.10. [26]I see large red banners on some pages that say
+ 1.3.10. [27]I see large red banners on some pages that say
"Blocked". How do I get rid of this?
- 1.4. [27]Misc
+ 1.4. [28]Misc
- 1.4.1. [28]How much does Junkbuster slow my browsing down?
+ 1.4.1. [29]How much does Privoxy slow my browsing down?
This has to add extra time to browsing.
- 1.4.2. [29]I noticed considerable delays in page requests
- compared to the old IJB. What's wrong?
+ 1.4.2. [30]I noticed considerable delays in page requests
+ compared to the old Junkbuster. What's wrong?
- 1.4.3. [30]What is the "http://i.j.b/"?
- 1.4.4. [31]I would like to help you, what do I do?
- 1.4.5. [32]Do you still maintain the blocklists?
- 1.4.6. [33]How can I submit new ads?
- 1.4.7. [34]How can I hide my IP address?
- 1.4.8. [35]Can Junkbuster guarantee I am anonymous?
- 1.4.9. [36]Might some things break because header
+ 1.4.3. [31]What is the "http://i.j.b/"?
+ 1.4.4. [32]Do you still maintain the blocklists?
+ 1.4.5. [33]How can I submit new ads?
+ 1.4.6. [34]How can I hide my IP address?
+ 1.4.7. [35]Can Privoxy guarantee I am anonymous?
+ 1.4.8. [36]Might some things break because header
information is being altered?
- 1.4.10. [37]Can Junkbuster act as a "caching" proxy to
- speed up web browsing?
+ 1.4.9. [37]Can Privoxy act as a "caching" proxy to speed up
+ web browsing?
- 1.4.11. [38]What about as a firewall? Can Junkbuster
- protect me?
+ 1.4.10. [38]What about as a firewall? Can Privoxy protect
+ me?
- 1.4.12. [39]The Junkbuster logo that replaces ads is very
+ 1.4.11. [39]The Privoxy logo that replaces ads is very
blocky and ugly looking. Can't a better font be
used?
- 1.4.13. [40]I have large empty spaces now where ads used to
- be. Why does Junkbuster leave these large gaps?
+ 1.4.12. [40]I have large empty spaces now where ads used to
+ be. Why does Privoxy leave these large gaps?
- 1.4.14. [41]How can Junkbuster filter Secure (HTTPS) URLs?
- 1.4.15. [42]Junkbuster runs as a "server". How secure is
- it? Do I need to take any special precautions?
+ 1.4.13. [41]How can Privoxy filter Secure (HTTPS) URLs?
+ 1.4.14. [42]Privoxy runs as a "server". How secure is it?
+ Do I need to take any special precautions?
- 1.4.16. [43]What is a "re_filterfile"?
+ 1.4.15. [43]What is a "default.filter"?
1.5. [44]Troubleshooting
still getting through. How?
1.5.3. [47]One of my favorite sites does not work with
- Junkbuster. What can I do?
+ Privoxy. What can I do?
1.5.4. [48]What time is it?
1.1. General Information
-1.1.1. What is this new version of Junkbuster?
+1.1.1. What is this new version of Privoxy?
The original Internet Junkbuster (tm) is a coyrighted product of
[52]Junkbusters Corporation. Development of this effort stopped some
- time ago as of version 2.0.2. Stefan Walherr started the ijbswa
+ time ago as of version 2.0.2. Stefan Waldherr started the ijbswa
project on [53]Sourceforge to rekindle development. Other developers
subsequently joined with Stefan, and have since added many new
features, refinements and enhancements.
- The new Junkbuster started with the same code base, but has changed
+ The new Privoxy started with the same code base, but has changed
significantly at this point.
_________________________________________________________________
1.1.2. How does it differ from the old Junkbuster?
- All the old features remain. The new Junkbuster still blocks ads and
+ All the old features remain. The new Privoxy still blocks ads and
banners, still manages cookies, and still helps protect your privacy.
But, these are all enhanced, and many new features have been added,
all in the same vein.
The configuration has changed significantly as well. This is something
that users will notice right off the bat. The "blocklist" file does
not exist any more. This is replaced by "actions" files, such as
- ijb.actions. This is where most of the per site configuration is now.
+ default.actions. This is where most of the per site configuration is
+ now.
_________________________________________________________________
1.1.3. What are some of the new features?
over-all.
_________________________________________________________________
-1.1.4. What is a "proxy"? How does Junkbuster work?
+1.1.4. What is a "proxy"? How does Privoxy work?
- When you connect to a web site with Junkbuster, you are really
- connecting to your locally running version of Junkbuster. Junkbuster
- intercepts your requests for the web page, and relays that to the
- "real" web site. The web site sends the HTTP data stream back to
- Junkbuster, where Junkbuster can work its magic before it relays this
- data back to your web browser.
+ When you connect to a web site with Privoxy, you are really connecting
+ to your locally running version of Privoxy. Privoxy intercepts your
+ requests for the web page, and relays that to the "real" web site. The
+ web site sends the HTTP data stream back to Privoxy, where Privoxy can
+ work its magic before it relays this data back to your web browser.
- Since Junkbuster sits between you and the WWW, it is in a position to
+ Since Privoxy sits between you and the WWW, it is in a position to
intercept and completely manage all web traffic and HTTP content
- before it gets to your browser. Junkbuster uses various programming
+ before it gets to your browser. Privoxy uses various programming
methods to do this, all of which is under your control via the various
configuration files and options.
- There are many kinds of proxies. Junkbuster best fits the "filtering
+ There are many kinds of proxies. Privoxy best fits the "filtering
proxy" category.
_________________________________________________________________
-1.1.5. My browser does the same things as Junkbuster. Why should I use
-Junkbuster at all?
+1.1.5. My browser does the same things as Privoxy. Why should I use Privoxy
+at all?
Modern browsers do indeed have some of the same functionality as
- Junkbuster. Maybe this is adequate for you. But Junkbuster is much
- more verstatile and powerful, and can do a number of things that
- browsers just can't.
+ Privoxy. Maybe this is adequate for you. But Privoxy is much more
+ verstatile and powerful, and can do a number of things that browsers
+ just can't.
In addition, a proxy is good choice if you use multiple browsers, or
have a LAN with multiple computers. This way all the configuration is
1.1.6. Is there is a license or fee? What about a warranty? Registration?
- Junkbuster is licensed under the GNU General Public License (GPL). It
- is free to use, copy, modify or distribute as you wish under the terms
- of this license. See [55]http://www.gnu.org/copyleft/gpl.html for
+ Privoxy is licensed under the GNU General Public License (GPL). It is
+ free to use, copy, modify or distribute as you wish under the terms of
+ this license. See [55]http://www.gnu.org/copyleft/gpl.html for
specifics.
There is no warranty of any kind, expressed, implied or otherwise.
That is something that would cost real money ;-) There is no
- registration either. Junkbuster really is free in every respect!
+ registration either. Privoxy really is free in every respect!
+ _________________________________________________________________
+
+1.1.7. I would like to help you, what do I do?
+
+1.1.7.1. Money Money Money
+
+ We, of course, welcome donations and use the money for domain
+ registering, regular world-wide get-togethers (hahaha). Anyway, we'll
+ soon describe the process how to donate money to the team.
+ _________________________________________________________________
+
+1.1.7.2. You want to work with us?
+
+ Well, helping the team is always a good idea. We welcome new
+ developers, RPM gurus or documentation makers. Simply get an account
+ on sourceforge.net and mail your id to the developer mailing list.
+ Then read the section Quickstart in the developers manual.
+
+ Once we have added you to the team, you'll have write access to the
+ CVS repository, and together we'll find a suitable task for you.
_________________________________________________________________
1.2. Installation
-1.2.1. Can I install the new Junkbuster over the old one?
+1.2.1. Can I install the new Privoxy over the old one?
We recommend you uninstall the old Junkbuster first to minimize
conflicts and confusion. You may want to save your old configuration
3.0!]
_________________________________________________________________
-1.2.2. I just installed Junkbuster. Is there anything special I have to do
-now?
+1.2.2. I just installed Privoxy. Is there anything special I have to do now?
- All browsers must be told to use Junkbuster as a proxy by specifying
- the correct proxy address and port number in the appropriate
- configuration area for the browser. See below.
+ All browsers must be told to use Privoxy as a proxy by specifying the
+ correct proxy address and port number in the appropriate configuration
+ area for the browser. See below.
_________________________________________________________________
-1.2.3. What is the proxy address of Junkbuster?
+1.2.3. What is the proxy address of Privoxy?
- If you set up the Junkbuster to run on the computer you browse from
+ If you set up the Privoxy to run on the computer you browse from
(rather than your ISP's server or some networked computer on a LAN),
the proxy will be on "localhost" (which is the special name used by
every computer on the Internet to refer to itself) and the port will
- be 8118 (unless you have told the Internet Junkbuster to run on a
- different port with the listen-address config option).
+ be 8118 (unless you have Privoxy to run on a different port with the
+ listen-address config option).
When configuring your browser's proxy settings you typically enter the
word "localhost" in the boxes next to "HTTP" and "Secure" (HTTPS) and
then the number "8118" for "port". This tells your browser to send all
- web requests to "Junkbuster" instead of directly to the Interenet.
+ web requests to Privoxy instead of directly to the Interenet.
- Junkbuster can also be used to proxy for a Local Area Network. In this
+ Privoxy can also be used to proxy for a Local Area Network. In this
case, your would enter either the IP address of the LAN host where
- Junkbuster is running, or the equivalent hostname. Port assignment
- would be same as above.
+ Privoxy is running, or the equivalent hostname. Port assignment would
+ be same as above.
- Junkbuster does not currently handle protocols such as FTP, SMTP, IM,
+ Privoxy does not currently handle protocols such as FTP, SMTP, IM,
IRC, ICQ, or other Internet protocols.
_________________________________________________________________
-1.2.4. I just installed Junkbuster, and nothing is happening. All the ads
-are there. What's wrong?
+1.2.4. I just installed Privoxy, and nothing is happening. All the ads are
+there. What's wrong?
- Did you configure your browser to use Junkbuster as a proxy? It does
- not sound like it. See above. You might also try flushing the
- browser's caches to force a full re-reading of pages. You can verify
- that Junkbuster is running, and your browser is correctly configured
- by entering the special URL: [57]http://i.j.b/. This should give you a
- banner that says "This is the Internet JUNKBUSTER" and access to
- Junkbuster's internal configuration. If you see this, then you are
- good to go. If not, the browser or Junkbuster are not set up
- correctly.
+ Did you configure your browser to use Privoxy as a proxy? It does not
+ sound like it. See above. You might also try flushing the browser's
+ caches to force a full re-reading of pages. You can verify that
+ Privoxy is running, and your browser is correctly configured by
+ entering the special URL: [57]http://i.j.b/. This should give you a
+ banner that says "This is Privoxy" and access to Privoxy's internal
+ configuration. If you see this, then you are good to go. If not, the
+ browser or Privoxy are not set up correctly.
_________________________________________________________________
1.3. Configuration
1.3.2. What is an "actions" file?
- "actions" files are where various actions that Junkbuster might take,
- are configured. Typically, you would define a set of default actions
- that apply to all URLs, then add exceptions to these defaults.
+ "actions" files are where various actions that Privoxy might take, are
+ configured. Typically, you would define a set of default actions that
+ apply to all URLs, then add exceptions to these defaults.
Actions can be defined on a per site basis, or for groups of sites.
Actions can also be grouped together and then applied to one or more
actions, but need to accept cookies from a given site, we would define
this in our "actions" file.
- Junkbuster comes with several default actions files, with varying
- degrees of filtering and blocking, as starting points for your own
+ Privoxy comes with several default actions files, with varying degrees
+ of filtering and blocking, as starting points for your own
configuration (see below).
_________________________________________________________________
1.3.4. How are actions files configured? What is the easiest way to do this?
- The easiest way to do this, is to access Junkbuster with your web
- browser at [59]http://i.j.b/, and then select "[60]Edit the actions
- list" from the selection list. You can also do this by editing the
- appropriate file with a text editor.
+ The easiest way to do this, is to access Privoxy with your web browser
+ at [59]http://i.j.b/, and then select "[60]Edit the actions list" from
+ the selection list. You can also do this by editing the appropriate
+ file with a text editor.
Please see the [61]user-manual for a detailed explanation of these and
other configuration files, and their various options and syntax.
_________________________________________________________________
-1.3.5. What are the differences between ijb-intermediate.action,
-ijb-basic.action, etc.?
+1.3.5. What are the differences between intermediate.action, basic.action,
+etc.?
- Configuring the Internet Junkbuster is not easy. To help you get
- started, we provide you with three different default configurations.
- The following table shows you, which features are enabled in each
- configuration.
+ Configuring Privoxy is not easy. To help you get started, we provide
+ you with three different default configurations. The following table
+ shows you, which features are enabled in each configuration.
Table 1. Default Configurations
- Feature ijb.action ijb-basic.action ijb-intermediate.action
- ijb-advanced.action
+ Feature default.action basic.action intermediate.action
+ advanced.action
ad-filtering ? x x x
blank image ? x x x
de-animate GIFs ? x x x
raise security issues?
What I don't understand, is how I can browser edit the config file as
- a regular user, while the whole /etc/junkbuster hierarchy belongs to
- the user "junkbuster", with only 644 perms.
+ a regular user, while the whole /etc/privoxy hierarchy belongs to the
+ user "privoxy", with only 644 perms.
- When you use the browser-based editor, JunkBuster itself is writing to
- the config files. Because JunkBuster is running as the user
- "junkbuster", it can update the config files.
+ When you use the browser-based editor, Privoxy itself is writing to
+ the config files. Because Privoxy is running as the user "privoxy", it
+ can update the config files.
If you don't like this, setting "enable-edit-actions 0" in the config
file will disable the browser-based editor. If you're that paranoid,
you should also consider setting "enable-remote-toggle 0" to prevent
- browser-based enabling/disabling of JunkBuster.
+ browser-based enabling/disabling of Privoxy.
- Note that normally only local users can connect to JunkBuster, so this
- is not (normally) a security problem.
+ Note that normally only local users can connect to Privoxy, so this is
+ not (normally) a security problem.
_________________________________________________________________
-1.3.7. How can I set up Junkbuster to act as a proxy for my LAN?
+1.3.7. How can I set up Privoxy to act as a proxy for my LAN?
- By default, Junkbuster only responds to requests from localhost. To
- have it act as a server for a network, this needs to be changed in the
- main config file where the Junkbuster configuration is located. In
- that file is a "listen-address" option. It may be commented out with a
- "#" symbol. Make sure it is uncommented, and assign it the address of
- the LAN gateway interface, and port number to use:
+ By default, Privoxy only responds to requests from localhost. To have
+ it act as a server for a network, this needs to be changed in the main
+ config file where the Privoxy configuration is located. In that file
+ is a "listen-address" option. It may be commented out with a "#"
+ symbol. Make sure it is uncommented, and assign it the address of the
+ LAN gateway interface, and port number to use:
listen-address 192.168.1.1:8118
- Save the file, and restart Junkbuster. Configure all browsers on the
+ Save the file, and restart Privoxy. Configure all browsers on the
network then to use this address and port number.
_________________________________________________________________
-1.3.8. Instead of ads, now I get a Junkbuster logo [or checkerboard]. I
-don't want to see anything.
+1.3.8. Instead of ads, now I get a Privoxy logo [or checkerboard]. I don't
+want to see anything.
- This is a configuration option for images that Junkbuster is stopping.
- You have the choice of the Junkbuster logo, a checkerboard pattern
- (this scales better), a transparent 1x1 GIF image, or a custom URL or
- your choice.
+ This is a configuration option for images that Privoxy is stopping.
+ You have the choice of the Privoxy logo, a checkerboard pattern (this
+ scales better), a transparent 1x1 GIF image, or a custom URL or your
+ choice.
If you want to see nothing, then change the "+image-blocker" action to
"+image-blocker{blank}". This can be done from the "Edit Actions List"
1.3.9. Why would anybody want to see the logo or checkerboard?
This can be helpful for troubleshooting problems. It might also be
- good for anyone new to Junkbuster so that they can see if their
- favorite pages are displaying correctly, and Junkbuster is not
- inadvertantly removing something important.
+ good for anyone new to Privoxy so that they can see if their favorite
+ pages are displaying correctly, and Privoxy is not inadvertantly
+ removing something important.
_________________________________________________________________
1.3.10. I see large red banners on some pages that say "Blocked". How do I
get rid of this?
- These are URLs that match something in one of Junkbuster's block
- actions (+block). It is meant to be a warning so that you know
- something has been blocked and an easy way for you to see why. These
- are handled differently than what has been defined as "images" (e.g.
- ad banners). If you want them to be treated as if they were images, so
- that they can be invisible, then move the offending URL from the
- "+block" section to the "+imageblock" section of your actions file.
+ These are URLs that match something in one of Privoxy's block actions
+ (+block). It is meant to be a warning so that you know something has
+ been blocked and an easy way for you to see why. These are handled
+ differently than what has been defined as "images" (e.g. ad banners).
+ If you want them to be treated as if they were images, so that they
+ can be invisible, then move the offending URL from the "+block"
+ section to the "+imageblock" section of your actions file.
Alternately, you could modify the "block" HTML template that is used
- by Junkbuster to display this, and make it something more to your
- liking.
+ by Privoxy to display this, and make it something more to your liking.
_________________________________________________________________
1.4. Misc
-1.4.1. How much does Junkbuster slow my browsing down? This has to add extra
+1.4.1. How much does Privoxy slow my browsing down? This has to add extra
time to browsing.
It should not slow you down any in real terms, and may actually help
speed things up since ads, banners and other junk are not being
- displayed. The actual processing time required by Junkbuster itself
- for each page, is relatively small in the overall scheme of things,
- and happens very quickly. This is typically more than offset by time
- saved not downloading and rendering ad images.
+ displayed. The actual processing time required by Privoxy itself for
+ each page, is relatively small in the overall scheme of things, and
+ happens very quickly. This is typically more than offset by time saved
+ not downloading and rendering ad images.
- "Filtering" via the re_filterfile mechanism may cause a perceived
+ "Filtering" via the filterfile mechanism may cause a perceived
slowdown, since the entire page is buffered before displaying. See
below.
_________________________________________________________________
1.4.2. I noticed considerable delays in page requests compared to the old
-IJB. What's wrong?
+Junkbuster. What's wrong?
Using the default filtering configuration, I noticed considerable
- delays in page requests compared to the old IJB. Loading pages with
- large contents seemed to take forever, then suddenly delivering all
- the content at once.
+ delays in page requests compared to the old Junkbuster. Loading pages
+ with large contents seemed to take forever, then suddenly delivering
+ all the content at once.
The whole content must be loaded in order to filter, and nothing is is
sent to the browser during this time. The loading time does not really
user a feeling of "it works".
To modify the content of a page (i.e. make frames resizeable again,
- etc.) and not just replace ads, the Internet Junkbuster needs to
- download the entire page first, do its content magic and then send the
- page to the browser.
+ etc.) and not just replace ads, Privoxy needs to download the entire
+ page first, do its content magic and then send the page to the
+ browser.
_________________________________________________________________
1.4.3. What is the "http://i.j.b/"?
- Since JunkBuster sits between your web browser and the Internet, it
- can be programmed to handle certain pages specially.
+ Since Privoxy sits between your web browser and the Internet, it can
+ be programmed to handle certain pages specially.
- With recent versions of JunkBuster (version 2.9.x), you can get some
- information about JunkBuster and change some settings by going to
+ With recent versions of Privoxy (version 2.9.x), you can get some
+ information about Privoxy and change some settings by going to
http://i.j.b/ or, equivalently, http://ijbswa.sourceforge.net/config/
(Note that i.j.b is far easier to type but may not work in some
configurations).
These pages are *not* forwarded to a server on the internet - instead
- they are handled by a special web server which is built in to
- JunkBuster.
+ they are handled by a special web server which is built in to Privoxy.
- If you are not running JunkBuster, then http://i.j.b/ will fail, and
+ If you are not running Privoxy, then http://i.j.b/ will fail, and
http://ijbswa.sourceforge.net/config/ will return a web page telling
- you you're not running JunkBuster.
+ you you're not running Privoxy.
If you have version 2.0.2, then the equivalent is
http://example.com/show-proxy-args (but you get far less information,
and you should really consider upgrading to 2.9.x).
_________________________________________________________________
-1.4.4. I would like to help you, what do I do?
-
- Well, helping the team is always a good idea. We welcome new
- developers, RPM gurus or documentation makers. Simply get an account
- on sourceforge.net and mail your id to the developer mailing list.
- Once we have added you to the team, you'll have write access to the
- CVS repository, and together we'll find a suitable task for you.
- _________________________________________________________________
-
-1.4.5. Do you still maintain the blocklists?
+1.4.4. Do you still maintain the blocklists?
No. The format of the blocklists has changed significantly in the
versions 2.9.x. Once we have released the new version, there will
again be blocklists that you can update automatically.
_________________________________________________________________
-1.4.6. How can I submit new ads?
+1.4.5. How can I submit new ads?
As of now, please discontinue to submit new ad blocking infos. Once we
have released the new version, there will again be a form on the
website, which you can use to contribute new ads.
_________________________________________________________________
-1.4.7. How can I hide my IP address?
+1.4.6. How can I hide my IP address?
- You cannot hide your IP address with Junkbuster or any other software,
+ You cannot hide your IP address with Privoxy or any other software,
since the server needs to know your IP address to send the answer to
you.
and many more through Google.
_________________________________________________________________
-1.4.8. Can Junkbuster guarantee I am anonymous?
+1.4.7. Can Privoxy guarantee I am anonymous?
No. Your chances of remaining anonymous are greatly improved, but
unless you are an expert on Internet security it would be safest to
assume that everything you do on the Web can be traced back to you.
- Junkbuster can remove various information about you, and allows you
- more freedom to decide which sites you can trust. But it's still
- possible that web sites can find out who you are. Here's one way this
- can happen.
+ Privoxy can remove various information about you, and allows you more
+ freedom to decide which sites you can trust. But it's still possible
+ that web sites can find out who you are. Here's one way this can
+ happen.
A few browsers disclose the user's email address in certain
- situations, such as when transferring a file by FTP. Junkbuster does
- not filter FTP. If you need this feature, or are concerned about the
- mail handler of your browser disclosing your email address, you might
+ situations, such as when transferring a file by FTP. Privoxy does not
+ filter FTP. If you need this feature, or are concerned about the mail
+ handler of your browser disclosing your email address, you might
consider products such as NSClean.
Browsers available only as binaries could use non-standard headers to
anticipating their behavior is easier. Trust the source, Luke!
_________________________________________________________________
-1.4.9. Might some things break because header information is being altered?
+1.4.8. Might some things break because header information is being altered?
Definitely. More and more sites use HTTP header content to decide what
to display and how to display it. There is many ways that this can be
adjustment that may be required, but by no means the only one.
_________________________________________________________________
-1.4.10. Can Junkbuster act as a "caching" proxy to speed up web browsing?
+1.4.9. Can Privoxy act as a "caching" proxy to speed up web browsing?
No, it does not have this ability at all. You want something like
- [64]Squid for this. And, yes, before you ask, Junkbuster can co-exist
+ [64]Squid for this. And, yes, before you ask, Privoxy can co-exist
with other kinds of proxies like "Squid".
_________________________________________________________________
-1.4.11. What about as a firewall? Can Junkbuster protect me?
+1.4.10. What about as a firewall? Can Privoxy protect me?
Not in the way you mean, or in the way a true firewall can, or a proxy
- that has this specific capability. Junkbuster can help protect your
+ that has this specific capability. Privoxy can help protect your
privacy, but not really protect you from intrusion attempts.
_________________________________________________________________
-1.4.12. The Junkbuster logo that replaces ads is very blocky and ugly
-looking. Can't a better font be used?
+1.4.11. The Privoxy logo that replaces ads is very blocky and ugly looking.
+Can't a better font be used?
This is not a font problem. The logo is an image that is created by
- Junkbuster on the fly. So as to not waste memory, the image is rather
+ Privoxy on the fly. So as to not waste memory, the image is rather
small. The blockiness comes when the image is scaled to fill a largish
area. There is not much to be done about this, other than to use one
of the other "imageblock" directives: pattern, blank, or a URL of your
chosing.
_________________________________________________________________
-1.4.13. I have large empty spaces now where ads used to be. Why does
-Junkbuster leave these large gaps?
+1.4.12. I have large empty spaces now where ads used to be. Why does Privoxy
+leave these large gaps?
It would be easy enough to just eliminate this space altogether,
rather than fill it with blank space. But, this would create problems
they were intended to be. It is best left this way.
_________________________________________________________________
-1.4.14. How can Junkbuster filter Secure (HTTPS) URLs?
+1.4.13. How can Privoxy filter Secure (HTTPS) URLs?
This is a limitation since HTTPS transactions are encrypted SSL
sessions between your browser and the secure site, and are meant to be
reliably secure and private. This means that all cookies and HTTP
header information are also encrypted from the time they leave your
- browser, to the site, and vice versa. Junkbuster does not try to
- unencrypt this information, so it just passes through as is.
- Junkbuster can still catch images and ads that are embedded in the SSL
- stream though.
+ browser, to the site, and vice versa. Privoxy does not try to
+ unencrypt this information, so it just passes through as is. Privoxy
+ can still catch images and ads that are embedded in the SSL stream
+ though.
_________________________________________________________________
-1.4.15. Junkbuster runs as a "server". How secure is it? Do I need to take
-any special precautions?
+1.4.14. Privoxy runs as a "server". How secure is it? Do I need to take any
+special precautions?
- There are no known exploits that might effect Junkbuster. On Unix-like
- systems, Junkbuster can run as a non-privileged user, which is how we
- recommend it be run. Also, by default Junkbuster only listens to
- requests from "localhost". It is not itself directly exposed to the
- Internet in this configuration. If you want to have Junkbuster serve
- as a LAN proxy, this will have to be opened up to allow for LAN
- requests. In this case, we'd recommend you specify only the LAN
- gateway address, e.g. 192.168.1.1 in the main Junkbuster config file.
- All LAN hosts can then use this as their proxy address in the browser
- proxy configuration. In this way, Junkbuster will not listen on any
- external ports. Of course, a firewall is always good too. Better safe
- than sorry.
+ There are no known exploits that might effect Privoxy. On Unix-like
+ systems, Privoxy can run as a non-privileged user, which is how we
+ recommend it be run. Also, by default Privoxy only listens to requests
+ from "localhost". It is not itself directly exposed to the Internet in
+ this configuration. If you want to have Privoxy serve as a LAN proxy,
+ this will have to be opened up to allow for LAN requests. In this
+ case, we'd recommend you specify only the LAN gateway address, e.g.
+ 192.168.1.1 in the main Privoxy config file. All LAN hosts can then
+ use this as their proxy address in the browser proxy configuration. In
+ this way, Privoxy will not listen on any external ports. Of course, a
+ firewall is always good too. Better safe than sorry.
_________________________________________________________________
-1.4.16. What is a "re_filterfile"?
+1.4.15. What is a "default.filter"?
- The "re_filterfile" is used to "filter" any page content. By
+ The "default.filter" is used to "filter" any page content. By
"filtering" we mean it can modify, remove, or change anything on the
page, including HTML tags, and JavaScript. Regular expressions are
used to accomplish this. This is potentially a very powerful feature,
but requires some expertise.
If you are familiar with regular expressions, and HTML, you can look
- at the provided re_filterfile with a text editor and see some of
+ at the provided default.filter with a text editor and see some of
things it can be used for.
Presently, there is no GUI editor option for this part of the
1.5.1. I just upgraded and am getting "connection refused" with every web
page?
- Either Junkbuster is not running, or your browser is configured for a
- different port than what Junkbuster is using.
+ Either Privoxy is not running, or your browser is configured for a
+ different port than what Privoxy is using.
- The old Junkbuster used port 8000 by default. This has been changed to
+ The old Privoxy used port 8000 by default. This has been changed to
port 8118 now, due to a conflict with NAS (Network Audio Service),
which uses port 8000. If you haven't, you need to change your browser
- to the new port number, or alternately change Junkbuster's
- "listen-address" setting in the config file used to start Junkbuster.
+ to the new port number, or alternately change Privoxy's
+ "listen-address" setting in the config file used to start Privoxy.
_________________________________________________________________
1.5.2. I just added a new rule, but the steenkin ad is still getting
If the ad had been displayed before you added its URL, it will
probably be held in the browser's cache for some time, so it will be
- displayed without the need for any request to the server, and
- Junkbuster will not be in the picture. The best thing to do is try
- flusing the browser's caches. And then try again.
+ displayed without the need for any request to the server, and Privoxy
+ will not be in the picture. The best thing to do is try flusing the
+ browser's caches. And then try again.
If this doesn't help, you probably have an error in the rule you
applied. Try pasting the full URL of the offending ad into
actions match your new rule.
_________________________________________________________________
-1.5.3. One of my favorite sites does not work with Junkbuster. What can I
-do?
+1.5.3. One of my favorite sites does not work with Privoxy. What can I do?
- First verify that it is indeed a Junkbuster problem, by disabling
- Junkbuster filtering and blocking. Go to [66]http://i.j.b/ and click
- on "Toggle Junkbuster On or Off", then disable it. Now try that page
- again.
+ First verify that it is indeed a Privoxy problem, by disabling Privoxy
+ filtering and blocking. Go to [66]http://i.j.b/ and click on "Toggle
+ Privoxy On or Off", then disable it. Now try that page again.
If still a problem, go to "Show which actions apply to a URL and why"
from [67]http://i.j.b/ and paste the full URL of the page in question
into the prompt. See which actions are being applied to the URL. Now,
armed with this information, go to "Edit the actions list". Here you
- should see various sections that have various "Junkbuster" features
+ should see various sections that have various Privoxy features
disabled for specific sites. Disabled "actions" will have a "-" (minus
sign) in front of them. Add your problem page URL to one of these
sections that looks like it is disabling the feature that is causing
8. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#PROXYMORON
9. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#BROWSERS2
10. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#LICENSE
- 11. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#INSTALLATION
- 12. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#NEWINSTALL
- 13. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN111
- 14. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#LOCALHOST
- 15. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN133
- 16. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#CONFIGURATION
- 17. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#NEWCONFIG
- 18. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN148
- 19. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#ACTIONSS
- 20. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN166
- 21. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#CONFIGFILES
- 22. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#BROWSECONFIG
- 23. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN278
- 24. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN289
- 25. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN300
- 26. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN305
- 27. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#MISC
- 28. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN318
- 29. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#LOADINGTIMES
- 30. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#CONFIGURL
- 31. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#JOINTEAM
+ 11. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#JOINTEAM
+ 12. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#INSTALLATION
+ 13. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#NEWINSTALL
+ 14. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN124
+ 15. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#LOCALHOST
+ 16. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN149
+ 17. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#CONFIGURATION
+ 18. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#NEWCONFIG
+ 19. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN165
+ 20. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#ACTIONSS
+ 21. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN183
+ 22. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#CONFIGFILES
+ 23. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#BROWSECONFIG
+ 24. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN300
+ 25. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN312
+ 26. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN323
+ 27. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN328
+ 28. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#MISC
+ 29. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN341
+ 30. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#LOADINGTIMES
+ 31. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#CONFIGURL
32. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#BLOCKLIST
33. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#NEWADS
34. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#IP
- 35. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN353
- 36. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN363
- 37. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN373
- 38. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN380
- 39. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN384
- 40. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN391
- 41. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN394
- 42. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN400
- 43. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN411
- 44. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN422
- 45. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN424
- 46. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN436
- 47. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN442
- 48. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN459
+ 35. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN382
+ 36. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN393
+ 37. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN403
+ 38. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN411
+ 39. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN416
+ 40. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN424
+ 41. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN428
+ 42. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN435
+ 43. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN447
+ 44. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN458
+ 45. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN460
+ 46. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN472
+ 47. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN478
+ 48. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN496
49. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#CONTACT
50. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#COPYRIGHT
51. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#SEEALSO
-Junkbuster User Manual
+Privoxy User Manual
- By: Junkbuster Developers
+ By: Privoxy Developers
- $Id: user-manual.sgml,v 1.49 2002/03/21 17:01:05 hal9 Exp $
+ $Id: user-manual.sgml,v 1.53 2002/03/24 11:51:00 swa Exp $
The user manual gives users information on how to install, configure
- and use Internet Junkbuster. Internet Junkbuster is a web proxy with
- advanced filtering capabilities for protecting privacy, filtering web
- page content, managing cookies, controlling access, and removing ads,
- banners, pop-ups and other obnoxious Internet Junk. Junkbuster has a
- very flexible configuration and can be customized to suit individual
- needs and tastes. Internet Junkbuster has application for both
- stand-alone systems and multi-user networks.
+ and use Privoxy. Privoxy is a web proxy with advanced filtering
+ capabilities for protecting privacy, filtering web page content,
+ managing cookies, controlling access, and removing ads, banners,
+ pop-ups and other obnoxious Internet Junk. Privoxy has a very flexible
+ configuration and can be customized to suit individual needs and
+ tastes. Privoxy has application for both stand-alone systems and
+ multi-user networks.
You can find the latest version of the user manual at
[1]http://ijbswa.sourceforge.net/user-manual/.
2.5. [9]Windows
2.6. [10]Other
- 3. [11]JunkBuster Configuration
+ 3. [11]Privoxy Configuration
- 3.1. [12]Controlling Junkbuster with Your Web Browser
+ 3.1. [12]Controlling Privoxy with Your Web Browser
3.2. [13]Configuration Files Overview
3.3. [14]The Main Configuration File
3.5. [24]The Filter File
3.6. [25]Templates
- 4. [26]Quickstart to Using Junkbuster
+ 4. [26]Quickstart to Using Privoxy
4.1. [27]Command Line Options
28
29
- 8.2. [35]JunkBuster's Internal Pages
+ 8.2. [35]Privoxy's Internal Pages
8.3. [36]Anatomy of an Action
1. Introduction
- Internet Junkbuster is a web proxy with advanced filtering
- capabilities for protecting privacy, filtering and modifying web page
- content, managing cookies, controlling access, and removing ads,
- banners, pop-ups and other obnoxious Internet Junk. Junkbuster has a
- very flexible configuration and can be customized to suit individual
- needs and tastes. Internet Junkbuster has application for both
- stand-alone systems and multi-user networks.
+ Privoxy is a web proxy with advanced filtering capabilities for
+ protecting privacy, filtering and modifying web page content, managing
+ cookies, controlling access, and removing ads, banners, pop-ups and
+ other obnoxious Internet Junk. Privoxy has a very flexible
+ configuration and can be customized to suit individual needs and
+ tastes. Privoxy has application for both stand-alone systems and
+ multi-user networks.
This documentation is included with the current BETA version of
- Internet Junkbuster and is mostly complete at this point. The most up
- to date reference for the time being is still the comments in the
- source files and in the individual configuration files. Development of
- version 3.0 is currently nearing completion, and includes many
- significant changes and enhancements over earlier versions. The target
- release date for stable v3.0 is "soon" ;-)
+ Privoxy and is mostly complete at this point. The most up to date
+ reference for the time being is still the comments in the source files
+ and in the individual configuration files. Development of version 3.0
+ is currently nearing completion, and includes many significant changes
+ and enhancements over earlier versions. The target release date for
+ stable v3.0 is "soon" ;-)
Since this is a BETA version, not all new features are well tested.
This documentation may be slightly out of sync as a result (especially
1.1. New Features
- In addition to Junkbuster's traditional features of ad and banner
- blocking and cookie management, this is a list of new features
- currently under development:
+ In addition to Internet Junkbuster's traditional feature of ad and
+ banner blocking and cookie management, Privoxy provides new features,
+ some of them currently under development:
* Integrated browser based configuration and control utility
([37]http://i.j.b). Browser-based tracing of rule and filter
2. Installation
- Junkbuster is available as raw source code, or pre-compiled binaries.
- See the [38]Junkbuster Home Page for binaries and current release
- info. Junkbuster is also available via [39]CVS. This is the
- recommended approach at this time. But please be aware that CVS is
- constantly changing, and it may break in mysterious ways.
+ Privoxy is available as raw source code, or pre-compiled binaries. See
+ the [38]Privoxy Home Page for binaries and current release info.
+ Privoxy is also available via [39]CVS. This is the recommended
+ approach at this time. But please be aware that CVS is constantly
+ changing, and it may break in mysterious ways.
_________________________________________________________________
2.1. Source
This will create both binary and src RPMs in the usual places.
Example:
- /usr/src/redhat/RPMS/i686/junkbuster-2.9.11-1.i686.rpm
+ /usr/src/redhat/RPMS/i686/privoxy-2.9.11-1.i686.rpm
- /usr/src/redhat/SRPMS/junkbuster-2.9.11-1.src.rpm
+ /usr/src/redhat/SRPMS/privoxy-2.9.11-1.src.rpm
To install, of course:
- rpm -Uvv /usr/src/redhat/RPMS/i686/junkbuster-2.9.11-1.i686.rpm
+ rpm -Uvv /usr/src/redhat/RPMS/i686/privoxy-2.9.11-1.i686.rpm
- This will place the Junkbuster configuration files in
- /etc/junkbuster/, and log files in /var/log/junkbuster/.
+ This will place the Privoxy configuration files in /etc/privoxy/, and
+ log files in /var/log/privoxy/.
_________________________________________________________________
2.3. SuSE
This will create both binary and src RPMs in the usual places.
Example:
- /usr/src/packages/RPMS/i686/junkbuster-2.9.11-1.i686.rpm
+ /usr/src/packages/RPMS/i686/privoxy-2.9.11-1.i686.rpm
- /usr/src/packages/SRPMS/junkbuster-2.9.11-1.src.rpm
+ /usr/src/packages/SRPMS/privoxy-2.9.11-1.src.rpm
To install, of course:
- rpm -Uvv /usr/src/packages/RPMS/i686/junkbuster-2.9.11-1.i686.rpm
+ rpm -Uvv /usr/src/packages/RPMS/i686/privoxy-2.9.11-1.i686.rpm
- This will place the Junkbuster configuration files in
- /etc/junkbuster/, and log files in /var/log/junkbuster/.
+ This will place the Privoxy configuration files in /etc/privoxy/, and
+ log files in /var/log/privoxy/.
_________________________________________________________________
2.4. OS/2
- Junkbuster is packaged in a WarpIN self- installing archive. The
+ Privoxy is packaged in a WarpIN self- installing archive. The
self-installing program will be named depending on the release
version, something like: ijbos2_setup_1.2.3.exe. In order to install
it, simply run this executable or double-click on its icon and follow
- the WarpIN installation panels. A shadow of the Junkbuster executable
+ the WarpIN installation panels. A shadow of the Privoxy executable
will be placed in your startup folder so it will start automatically
whenever OS/2 starts.
- The directory you choose to install Junkbuster into will contain all
- of the configuration files.
+ The directory you choose to install Privoxy into will contain all of
+ the configuration files.
If you would like to build binary images on OS/2 yourself, you will
need a few Unix-like tools: autoconf, autoheader and sh. These tools
The rest should be the same as above for Linux/Unix.
_________________________________________________________________
-3. JunkBuster Configuration
+3. Privoxy Configuration
- All JunkBuster configuration is kept in text files. These files can be
- edited with a text editor. Many important aspects of JunkBuster can
- also be controlled easily with a web browser.
+ All Privoxy configuration is kept in text files. These files can be
+ edited with a text editor. Many important aspects of Privoxy can also
+ be controlled easily with a web browser.
_________________________________________________________________
-3.1. Controlling Junkbuster with Your Web Browser
+3.1. Controlling Privoxy with Your Web Browser
- JunkBuster can be reached by the special URL [41]http://i.j.b/ (or
+ Privoxy can be reached by the special URL [41]http://i.j.b/ (or
alternately [42]http://ijbswa.sourceforge.net/config/), which is an
internal page. You will see the following section:
* Show the source code version numbers
* Show the client's request headers.
* Show which actions apply to a URL and why
- * Toggle JunkBuster on or off
+ * Toggle Privoxy on or off
* Edit the actions list
This should be self-explanatory. Note the last item is an editor for
the "actions list", which is where much of the ad, banner, cookie, and
URL blocking magic is configured as well as other advanced features of
- Junkbuster. This is an easy way to adjust various aspects of
- Junkbuster configuration. The actions file, and other configuration
- files, are explained in detail below. Junkbuster will automatically
- detect any changes to these files.
-
- "Toggle JunkBuster On or Off" is handy for sites that might have
- problems with your current actions and filters, or just to test if a
- site misbehaves, whether it is JunkBuster causing the problem or not.
- Junkbuster continues to run as a proxy in this case, but all filtering
- is disabled.
+ Privoxy. This is an easy way to adjust various aspects of Privoxy
+ configuration. The actions file, and other configuration files, are
+ explained in detail below. Privoxy will automatically detect any
+ changes to these files.
+
+ "Toggle Privoxy On or Off" is handy for sites that might have problems
+ with your current actions and filters, or just to test if a site
+ misbehaves, whether it is Privoxy causing the problem or not. Privoxy
+ continues to run as a proxy in this case, but all filtering is
+ disabled.
_________________________________________________________________
3.2. Configuration Files Overview
For Unix, *BSD and Linux, all configuration files are located in
- /etc/junkbuster/ by default. For MS Windows, OS/2, and AmigaOS these
- are all in the same directory as the Junkbuster executable. The name
- and number of configuration files has changed from previous versions,
- and is subject to change as development progresses.
+ /etc/privoxy/ by default. For MS Windows, OS/2, and AmigaOS these are
+ all in the same directory as the Privoxy executable. The name and
+ number of configuration files has changed from previous versions, and
+ is subject to change as development progresses.
The installed defaults provide a reasonable starting point, though
possibly aggressive by some standards. For the time being, there are
* The main configuration file is named config on Linux, Unix, BSD,
OS/2, and AmigaOS and config.txt on Windows.
- * The ijb.action file is used to define various "actions" relating
- to images, banners, pop-ups, access restrictions, banners and
- cookies. There is a CGI based editor for this file that can be
+ * The default.action file is used to define various "actions"
+ relating to images, banners, pop-ups, access restrictions, banners
+ and cookies. There is a CGI based editor for this file that can be
accessed via [43]http://i.j.b. (Other actions files are included
as well with differing levels of filtering and blocking, e.g.
ijb-basic.action.)
- * The re_filterfile file can be used to re-write the raw page
+ * The default.filter file can be used to re-write the raw page
content, including viewable text as well as embedded HTML and
JavaScript, and whatever else lurks on any given web page.
- ijb.action and re_filterfile can use Perl style regular expressions
- for maximum flexibility. All files use the "#" character to denote a
- comment. Such lines are not processed by Junkbuster. After making any
- changes, there is no need to restart Junkbuster in order for the
- changes to take effect. Junkbuster should detect such changes
+ default.action and default.filter can use Perl style regular
+ expressions for maximum flexibility. All files use the "#" character
+ to denote a comment. Such lines are not processed by Privoxy. After
+ making any changes, there is no need to restart Privoxy in order for
+ the changes to take effect. Privoxy should detect such changes
automatically.
While under development, the configuration content is subject to
Thus, by placing a "#" at the start of an existing configuration line,
you can make it a comment and it will be treated as if it weren't
there. This is called "commenting out" an option and can be useful to
- turn off features: If you comment out the "logfile" line, junkbuster
- will not log to a file at all. Watch for the "default:" section in
- each explanation to see what happens if the option is left unset (or
+ turn off features: If you comment out the "logfile" line, Privoxy will
+ not log to a file at all. Watch for the "default:" section in each
+ explanation to see what happens if the option is left unset (or
commented out).
Long lines can be continued on the next line by using a "\" as the
very last character.
- There are various aspects of Junkbuster behavior that can be tuned.
+ There are various aspects of Privoxy behavior that can be tuned.
_________________________________________________________________
3.3.1. Defining Other Configuration Files
- Junkbuster can use a number of other files to tell it what ads to
- block, what cookies to accept, etc. This section of the configuration
- file tells Junkbuster where to find all those other files.
+ Privoxy can use a number of other files to tell it what ads to block,
+ what cookies to accept, etc. This section of the configuration file
+ tells Privoxy where to find all those other files.
- On Windows and AmigaOS, Junkbuster looks for these files in the same
- directory as the executable. On Unix and OS/2, Junkbuster looks for
- these files in the current working directory. In either case, an
- absolute path name can be used to avoid problems.
+ On Windows and AmigaOS, Privoxy looks for these files in the same
+ directory as the executable. On Unix and OS/2, Privoxy looks for these
+ files in the current working directory. In either case, an absolute
+ path name can be used to avoid problems.
When development goes modular and multi-user, the blocker, filter, and
per-user config will be stored in subdirectories of "confdir". For
The location of the configuration files:
- confdir /etc/junkbuster # No trailing /, please.
+ confdir /etc/privoxy # No trailing /, please.
The directory where all logging (i.e. logfile and jarfile) takes
place. No trailing "/", please:
- logdir /var/log/junkbuster
+ logdir /var/log/privoxy
Note that all file specifications below are relative to the above two
directories!
- The "ijb.action" file contains patterns to specify the actions to
+ The "default.action" file contains patterns to specify the actions to
apply to requests for each site. Default: Cookies to and from all
destinations are kept only during the current browser session (i.e.
they are not saved to disk). Pop-ups are disabled for all sites. All
- sites are filtered through selected sections of "re_filterfile". No
- sites are blocked. The JunkBuster logo is displayed for filtered ads
- and other images. The syntax of this file is explained in detail
+ sites are filtered through selected sections of "default.filter". No
+ sites are blocked. The Privoxy logo is displayed for filtered ads and
+ other images. The syntax of this file is explained in detail
[44]below. Other "actions" files are included, and you are free to use
any of them. They have varying degrees of aggressiveness.
- actionsfile ijb.action
+ actionsfile default.action
- The "re_filterfile" file contains content modification rules that use
+ The "default.filter" file contains content modification rules that use
"regular expressions". These rules permit powerful changes on the
content of Web pages, e.g., you could disable your favorite JavaScript
annoyances, re-write the actual displayed text, or just have some fun
that way since the page is not incrementally displayed.) This effect
will be more noticeable on slower connections.
- re_filterfile re_filterfile
+ filterfile default.filter
The logfile is where all logging and error messages are written. The
- logfile can be useful for tracking down a problem with Junkbuster
- (e.g., it's not blocking an ad you think it should block) but in most
- cases you probably will never look at it.
+ logfile can be useful for tracking down a problem with Privoxy (e.g.,
+ it's not blocking an ad you think it should block) but in most cases
+ you probably will never look at it.
Your logfile will grow indefinitely, and you will probably want to
periodically remove it. On Unix systems, you can do this with a cron
job (see "man cron"). For Redhat, a logrotate script has been
included.
- On SuSE Linux systems, you can place a line like
- "/var/log/junkbuster.* +1024k 644 nobody.nogroup" in /etc/logfiles,
- with the effect that cron.daily will automatically archive, gzip, and
- empty the log, when it exceeds 1M size.
+ On SuSE Linux systems, you can place a line like "/var/log/privoxy.*
+ +1024k 644 nobody.nogroup" in /etc/logfiles, with the effect that
+ cron.daily will automatically archive, gzip, and empty the log, when
+ it exceeds 1M size.
Default: Log to the a file named logfile. Comment out to disable
logging.
logfile logfile
- The "jarfile" defines where Junkbuster stores the cookies it
- intercepts. Note that if you use a "jarfile", it may grow quite large.
- Default: Don't store intercepted cookies.
+ The "jarfile" defines where Privoxy stores the cookies it intercepts.
+ Note that if you use a "jarfile", it may grow quite large. Default:
+ Don't store intercepted cookies.
#jarfile jarfile
- If you specify a "trustfile", Junkbuster will only allow access to
- sites that are named in the trustfile. You can also mark sites as
- trusted referrers, with the effect that access to untrusted sites will
- be granted, if a link from a trusted referrer was used. The link
- target will then be added to the "trustfile". This is a very
- restrictive feature that typical users most probably want to leave
- disabled. Default: Disabled, don't use the trust mechanism.
+ If you specify a "trustfile", Privoxy will only allow access to sites
+ that are named in the trustfile. You can also mark sites as trusted
+ referrers, with the effect that access to untrusted sites will be
+ granted, if a link from a trusted referrer was used. The link target
+ will then be added to the "trustfile". This is a very restrictive
+ feature that typical users most probably want to leave disabled.
+ Default: Disabled, don't use the trust mechanism.
#trustfile trust
3.3.2. Other Configuration Options
This part of the configuration file contains options that control how
- Junkbuster operates.
+ Privoxy operates.
"Admin-address" should be set to the email address of the proxy
administrator. It is used in many of the proxy-generated pages.
#admin-address fill@me.in.please
"Proxy-info-url" can be set to a URL that contains more info about
- this Junkbuster installation, it's configuration and policies. It is
- used in many of the proxy-generated pages and its use is highly
- recommended in multi-user installations, since your users will want to
- know why certain content is blocked or modified. Default: Don't show a
- link to on-line documentation.
+ this Privoxy installation, it's configuration and policies. It is used
+ in many of the proxy-generated pages and its use is highly recommended
+ in multi-user installations, since your users will want to know why
+ certain content is blocked or modified. Default: Don't show a link to
+ on-line documentation.
proxy-info-url http://www.your-site.com/proxy.html
- "Listen-address" specifies the address and port where Junkbuster will
+ "Listen-address" specifies the address and port where Privoxy will
listen for connections from your Web browser. The default is to listen
on the localhost port 8118, and this is suitable for most users. (In
your web browser, under proxy configuration, list the proxy server as
want to serve requests from other machines (e.g. on your local
network) as well, you will need to override the default. The syntax is
"listen-address [<ip-address>]:<port>". If you leave out the IP
- address, junkbuster will bind to all interfaces (addresses) on your
+ address, Privoxy will bind to all interfaces (addresses) on your
machine and may become reachable from the Internet. In that case,
consider using access control lists (acl's) (see "aclfile" above), or
a firewall.
- For example, suppose you are running Junkbuster on a machine which has
+ For example, suppose you are running Privoxy on a machine which has
the address 192.168.0.1 on your local private network (192.168.0.0)
and has another outside connection with a different address. You want
it to serve requests from inside only:
It is highly recommended that you enable ERROR reporting (debug 8192),
at least until v3.0 is released.
- The reporting of FATAL errors (i.e. ones which crash JunkBuster) is
+ The reporting of FATAL errors (i.e. ones which crash Privoxy) is
always on and cannot be disabled.
If you want to use CLF (Common Log Format), you should set "debug 512"
debug 4096 # Info
debug 8192 # Errors - *we highly recommended enabling this*
- Junkbuster normally uses "multi-threading", a software technique that
+ Privoxy normally uses "multi-threading", a software technique that
permits it to handle many different requests simultaneously. In some
cases you may wish to disable this -- particularly if you're trying to
- debug a problem. The "single-threaded" option forces Junkbuster to
- handle requests sequentially. Default: Multi-threaded mode.
+ debug a problem. The "single-threaded" option forces Privoxy to handle
+ requests sequentially. Default: Multi-threaded mode.
#single-threaded
- "toggle" allows you to temporarily disable all Junkbuster's filtering.
+ "toggle" allows you to temporarily disable all Privoxy's filtering.
Just set "toggle 0".
- The Windows version of Junkbuster puts an icon in the system tray,
- which also allows you to change this option. If you right-click on
- that icon (or select the "Options" menu), one choice is "Enable".
- Clicking on enable toggles Junkbuster on and off. This is useful if
- you want to temporarily disable Junkbuster, e.g., to access a site
- that requires cookies which you would otherwise have blocked. This can
- also be toggled via a web browser at the Junkbuster internal address
- of [45]http://i.j.b on any platform.
+ The Windows version of Privoxy puts an icon in the system tray, which
+ also allows you to change this option. If you right-click on that icon
+ (or select the "Options" menu), one choice is "Enable". Clicking on
+ enable toggles Privoxy on and off. This is useful if you want to
+ temporarily disable Privoxy, e.g., to access a site that requires
+ cookies which you would otherwise have blocked. This can also be
+ toggled via a web browser at the Privoxy internal address of
+ [45]http://i.j.b on any platform.
- "toggle 1" means Junkbuster runs normally, "toggle 0" means that
- Junkbuster becomes a non-anonymizing non-blocking proxy. Default: 1
- (on).
+ "toggle 1" means Privoxy runs normally, "toggle 0" means that Privoxy
+ becomes a non-anonymizing non-blocking proxy. Default: 1 (on).
toggle 1
For content filtering, i.e. the "+filter" and "+deanimate-gif"
- actions, it is necessary that Junkbuster buffers the entire document
+ actions, it is necessary that Privoxy buffers the entire document
body. This can be potentially dangerous, since a server could just
keep sending data indefinitely and wait for your RAM to exhaust. With
nasty consequences.
buffer-limit 4069
- To enable the web-based ijb.action file editor set enable-edit-actions
- to 1, or 0 to disable. Note that you must have compiled JunkBuster
- with support for this feature, otherwise this option has no effect.
- This internal page can be reached at [46]http://i.j.b.
+ To enable the web-based default.action file editor set
+ enable-edit-actions to 1, or 0 to disable. Note that you must have
+ compiled Privoxy with support for this feature, otherwise this option
+ has no effect. This internal page can be reached at [46]http://i.j.b.
Security note: If this is enabled, anyone who can use the proxy can
edit the actions file, and their changes will affect all users. For
enable-edit-actions 1
- Allow JunkBuster to be toggled on and off remotely, using your web
+ Allow Privoxy to be toggled on and off remotely, using your web
browser. Set "enable-remote-toggle"to 1 to enable, and 0 to disable.
- Note that you must have compiled JunkBuster with support for this
+ Note that you must have compiled Privoxy with support for this
feature, otherwise this option has no effect.
Security note: If this is enabled, anyone who can use the proxy can
The field separator (FS) is whitespace (space or tab).
- IMPORTANT NOTE: If the junkbuster is using a forwarder (see below) or
- a gateway for a particular destination URL, the DST_ADDR that is
+ IMPORTANT NOTE: If Privoxy is using a forwarder (see below) or a
+ gateway for a particular destination URL, the DST_ADDR that is
examined is the address of the forwarder or the gateway and NOT the
address of the ultimate target. This is necessary because it may be
- impossible for the local Junkbuster to determine the address of the
+ impossible for the local Privoxy to determine the address of the
ultimate target (that's often what gateways are used for).
Here are a few examples to show how the ACL features work:
permit-access localhost
A silly example to illustrate permitting any host on the class-C
- subnet with Junkbuster to go anywhere:
+ subnet with Privoxy to go anywhere:
- permit-access www.junkbusters.com/24
+ permit-access www.privoxy.com/24
Except deny one particular IP address from using it at all:
- deny-access ident.junkbusters.com
+ deny-access ident.privoxy.com
You can also specify an explicit network address and subnet mask.
Explicit addresses do not have to be resolved to be used.
to allow all *.org domains. Every IP address listed must resolve
fully.
- An ISP may want to provide a Junkbuster that is accessible by "the
- world" and yet restrict use of some of their private content to hosts
- on its internal network (i.e. its own subscribers). Say, for instance
- the ISP owns the Class-B IP address block 123.124.0.0 (a 16 bit
- netmask). This is how they could do it:
+ An ISP may want to provide a Privoxy that is accessible by "the world"
+ and yet restrict use of some of their private content to hosts on its
+ internal network (i.e. its own subscribers). Say, for instance the ISP
+ owns the Class-B IP address block 123.124.0.0 (a 16 bit netmask). This
+ is how they could do it:
permit-access 0.0.0.0/0 0.0.0.0/0 # other clients can go anywhere
# with the following exceptions
requests via multiple gateways allowing transparent access to multiple
networks without having to modify browser configurations.
- Also specified here are SOCKS proxies. Junkbuster SOCKS 4 and SOCKS
- 4A. The difference is that SOCKS 4A will resolve the target hostname
- using DNS on the SOCKS server, not our local DNS client.
+ Also specified here are SOCKS proxies. Privoxy SOCKS 4 and SOCKS 4A.
+ The difference is that SOCKS 4A will resolve the target hostname using
+ DNS on the SOCKS server, not our local DNS client.
The syntax of each line is:
This is a bit tricky, but here's an example:
host-a has a PPP connection to isp-a.com. And host-b has a PPP
- connection to isp-b.com. host-a can run a Junkbuster proxy with
+ connection to isp-b.com. host-a can run a Privoxy proxy with
forwarding like this:
forward .* .
forward isp-b.com host-b:8118
- host-b can run a Junkbuster proxy with forwarding like this:
+ host-b can run a Privoxy proxy with forwarding like this:
forward .* .
forward isp-a.com host-a:8118
forward localhost.localdomain . # Loopback address
forward www.ukc.mirror.ac.uk . # Specific host
- If you intend to chain Junkbuster and squid locally, then chain as
- browser -> squid -> junkbuster is the recommended way.
+ If you intend to chain Privoxy and squid locally, then chain as
+ browser -> squid -> privoxy is the recommended way.
Your squid configuration could then look like this:
- # Define junkbuster as parent cache
+ # Define Privoxy as parent cache
cache_peer 127.0.0.1 parent 8118 0 no-query
# Define ACL for protocol FTP
acl FTP proto FTP
- # Do not forward ACL FTP to junkbuster
+ # Do not forward ACL FTP to privoxy
always_direct allow FTP
- # Do not forward ACL CONNECT (https) to junkbuster
+ # Do not forward ACL CONNECT (https) to privoxy
always_direct allow CONNECT
- # Forward the rest to junkbuster
+ # Forward the rest to privoxy
never_direct allow all
_________________________________________________________________
3.3.5. Windows GUI Options
- Junkbuster has a number of options specific to the Windows GUI
- interface:
+ Privoxy has a number of options specific to the Windows GUI interface:
- If "activity-animation" is set to 1, the Junkbuster icon will animate
- when "Junkbuster" is active. To turn off, set to 0.
+ If "activity-animation" is set to 1, the Privoxy icon will animate
+ when "Privoxy" is active. To turn off, set to 0.
activity-animation 1
- If "log-messages" is set to 1, Junkbuster will log messages to the
+ If "log-messages" is set to 1, Privoxy will log messages to the
console window:
log-messages 1
log-max-lines 200
- If "log-highlight-messages" is set to 1, Junkbuster will highlight
+ If "log-highlight-messages" is set to 1, Privoxy will highlight
portions of the log messages with a bold-faced font:
log-highlight-messages 1
log-font-size 8
- "show-on-task-bar" controls whether or not Junkbuster will appear as a
+ "show-on-task-bar" controls whether or not Privoxy will appear as a
button on the Task bar when minimized:
show-on-task-bar 0
If "close-button-minimizes" is set to 1, the Windows close button will
- minimize Junkbuster instead of closing the program (close with the
- exit option on the File menu).
+ minimize Privoxy instead of closing the program (close with the exit
+ option on the File menu).
close-button-minimizes 1
The "hide-console" option is specific to the MS-Win console version of
- JunkBuster. If this option is used, Junkbuster will disconnect from
- and hide the command console.
+ Privoxy. If this option is used, Privoxy will disconnect from and hide
+ the command console.
#hide-console
_________________________________________________________________
3.4. The Actions File
- The "ijb.action" file (formerly actionsfile) is used to define what
- actions Junkbuster takes, and thus determines how images, cookies and
- various other aspects of HTTP content and transactions are handled.
- Images can be anything you want, including ads, banners, or just some
- obnoxious URL that you would rather not see. Cookies can be accepted
- or rejected, or accepted only during the current browser session (i.e.
- not written to disk). Changes to ijb.action should be immediately
- visible to Junkbuster without the need to restart.
+ The "default.action" file (formerly actionsfile) is used to define
+ what actions Privoxy takes, and thus determines how images, cookies
+ and various other aspects of HTTP content and transactions are
+ handled. Images can be anything you want, including ads, banners, or
+ just some obnoxious URL that you would rather not see. Cookies can be
+ accepted or rejected, or accepted only during the current browser
+ session (i.e. not written to disk). Changes to default.action should
+ be immediately visible to Privoxy without the need to restart.
The easiest way to edit "actions" file is with a browser by loading
[48]http://i.j.b/, and then select "Edit Actions List". A text editor
There are four types of lines in this file: comments (begin with a "#"
character), actions, aliases and patterns, all of which are explained
- below, as well as the configuration file syntax that Junkbuster
+ below, as well as the configuration file syntax that Privoxy
understands.
_________________________________________________________________
"www4.example.com", "wwwd.example.com", "wwwz.example.com", etc., but
not "wwww.example.com".
- If Junkbuster was compiled with "pcre" support (default), Perl
- compatible regular expressions can be used. See the pcre/docs/
- directory or "man perlre" (also available on
+ If Privoxy was compiled with "pcre" support (default), Perl compatible
+ regular expressions can be used. See the pcre/docs/ directory or "man
+ perlre" (also available on
[50]http://www.perldoc.com/perl5.6/pod/perlre.html) for details. A
brief discussion of regular expressions is in the [51]Appendix. For
instance:
{-name} # disable this action totally
If nothing is specified in this file, no "actions" are taken. So in
- this case JunkBuster would just be a normal, non-blocking,
+ this case Privoxy would just be a normal, non-blocking,
non-anonymizing proxy. You must specifically enable the privacy and
- blocking features you need (although the provided default ijb.action
- file will give a good starting point).
+ blocking features you need (although the provided default
+ default.action file will give a good starting point).
Later defined actions always over-ride earlier ones. For multi-valued
actions, the actions are applied in the order they are specified.
- The list of valid Junkbuster "actions" are:
+ The list of valid Privoxy "actions" are:
* Add the specified HTTP header, which is not checked for validity.
You may specify this many times to specify many different headers:
* "+downgrade" will downgrade HTTP/1.1 client requests to HTTP/1.0
and downgrade the responses as well. Use this action for servers
- that use HTTP/1.1 protocol features that Junkbuster doesn't handle
+ that use HTTP/1.1 protocol features that Privoxy doesn't handle
well yet. HTTP/1.1 is only partially implemented. Default is not
to downgrade requests.
+downgrade
time is wasted, while your browser ask the server for one redirect
after the other. Plus, it feeds the advertisers.
The "+fast-redirects" option enables interception of these
- requests by Junkbuster, who will cut off all but the last valid
- URL in the request and send a local redirect back to your browser
+ requests by Privoxy, who will cut off all but the last valid URL
+ in the request and send a local redirect back to your browser
without contacting the remote site.
+fast-redirects
* Apply the filters in the section_header section of the
- re_filterfile file to the site(s). Re_filterfile sections are
+ default.filter file to the site(s). default.filter sections are
grouped according to like functionality.
+filter{section_header}
- Filter sections that are pre-defined in the supplied re_filterfile
- include:
+ Filter sections that are pre-defined in the supplied
+ default.filter include:
html-annoyances: Get rid of particularly annoying HTML abuse.
+image}", e.g an advertizement. There are five options.
"-image-blocker" will send a HTML "blocked" page, usually
resulting in a "broken image" icon. "+image-blocker{logo}" will
- send a "JunkBuster" logo image. "+image-blocker{blank}" will send
- a 1x1 transparent GIF image. And finally,
+ send a Privoxy logo image. "+image-blocker{blank}" will send a 1x1
+ transparent GIF image. And finally,
"+image-blocker{http://xyz.com}" will send a HTTP temporary
redirect to the specified image. This has the advantage of the
icon being being cached by the browser, which will speed up the
+image-blocker{http://i.j.b/send-banner}
* By default (i.e. in the absence of a "+limit-connect" action),
- Junkbuster will only allow CONNECT requests to port 443, which is
- the standard port for https as a precaution.
+ Privoxy will only allow CONNECT requests to port 443, which is the
+ standard port for https as a precaution.
The CONNECT methods exists in HTTP to allow access to secure
websites (https:// URLs) through proxies. It works very simply:
the proxy connects to the server on the specified port, and then
#and above 500 are OK.
* "+no-compression" prevents the website from compressing the data.
- Some websites do this, which can be a problem for Junkbuster,
- since "+filter", "+no-popup" and "+gif-deanimate" will not work on
+ Some websites do this, which can be a problem for Privoxy, since
+ "+filter", "+no-popup" and "+gif-deanimate" will not work on
compressed data. This will slow down connections to those
websites, though. Default is "nocompression" is turned on.
+nocompression
3.4.3. Aliases
- Custom "actions", known to Junkbuster as "aliases", can be defined by
+ Custom "actions", known to Privoxy as "aliases", can be defined by
combining other "actions". These can in turn be invoked just like the
built-in "actions". Currently, an alias can contain any character
except space, tab, "=", "{" or "}". But please use only "a"- "z",
"0"-"9", "+", and "-". Alias names are not case sensitive, and must be
- defined before anything else in the ijb.actionfile ! And there can
+ defined before anything else in the default.actionfile ! And there can
only be one set of "aliases" defined.
Now let's define a few aliases:
Any web page can be dynamically modified with the filter file. This
modification can be removal, or re-writing, of any web page content,
including tags and non-visible content. The default filter file is
- re_filterfile, located in the config directory.
+ default.filter, located in the config directory.
The included example file is divided into sections. Each section
begins with the FILTER keyword, followed by the identifier for that
This file uses regular expressions to alter or remove any string in
the target page. The expressions can only operate on one line at a
- time. Some examples from the included default re_filterfile:
+ time. Some examples from the included default default.filter:
Stop web pages from displaying annoying messages in the status bar by
deleting such references:
3.6. Templates
- When Junkbuster displays one of its internal pages, such as a 404 Not
+ When Privoxy displays one of its internal pages, such as a 404 Not
Found error page, it uses the appropriate template. On Linux, BSD, and
- Unix, these are located in /etc/junkbuster/templates by default. These
+ Unix, these are located in /etc/privoxy/templates by default. These
may be customized, if desired.
_________________________________________________________________
-4. Quickstart to Using Junkbuster
+4. Quickstart to Using Privoxy
- Install package, then run and enjoy! JunkBuster is typically started
- by specifying the main configuration file to be used on the command
- line. Example Unix startup command:
+ Install package, then run and enjoy! Privoxy is typically started by
+ specifying the main configuration file to be used on the command line.
+ Example Unix startup command:
- # /usr/sbin/junkbuster /etc/junkbuster/config
+ # /usr/sbin/privoxy /etc/privoxy/config
An init script is provided for SuSE and Redhat.
- For for SuSE: /etc/rc.d/junkbuster start
+ For for SuSE: /etc/rc.d/privoxy start
- For RedHat: /etc/rc.d/init.d/junkbuster start
+ For RedHat: /etc/rc.d/init.d/privoxy start
- If no configuration file is specified on the command line, Junkbuster
+ If no configuration file is specified on the command line, Privoxy
will look for a file named config in the current directory. Except on
Win32 where it will try config.txt. If no file is specified on the
- command line and no default configuration file can be found,
- Junkbuster will fail to start.
+ command line and no default configuration file can be found, Privoxy
+ will fail to start.
Be sure your browser is set to use the proxy which is by default at
localhost, port 8118. With Netscape (and Mozilla), this can be set
The included default configuration files should give a reasonable
starting point, though may be somewhat aggressive in blocking junk.
You will probably want to keep an eye out for sites that require
- persistent cookies, and add these to ijb.action as needed. By default,
- most of these will be accepted only during the current browser
- session, until you add them to the configuration. If you want the
- browser to handle this instead, you will need to edit ijb.action and
- disable this feature. If you use more than one browser, it would make
- more sense to let Junkbuster handle this. In which case, the
- browser(s) should be set to accept all cookies.
+ persistent cookies, and add these to default.action as needed. By
+ default, most of these will be accepted only during the current
+ browser session, until you add them to the configuration. If you want
+ the browser to handle this instead, you will need to edit
+ default.action and disable this feature. If you use more than one
+ browser, it would make more sense to let Privoxy handle this. In which
+ case, the browser(s) should be set to accept all cookies.
If a particular site shows problems loading properly, try adding it to
- the {fragile} section of ijb.action. This will turn off most actions
- for this site.
+ the {fragile} section of default.action. This will turn off most
+ actions for this site.
- Junkbuster is HTTP/1.1 compliant, but not all 1.1 features are as yet
+ Privoxy is HTTP/1.1 compliant, but not all 1.1 features are as yet
implemented. If browsers that support HTTP/1.1 (like Mozilla or recent
versions of I.E.) experience problems, you might try to force HTTP/1.0
compatibility. For Mozilla, look under Edit -> Preferences -> Debug ->
- Networking. Or set the "+downgrade" config option in ijb.action.
+ Networking. Or set the "+downgrade" config option in default.action.
- After running Junkbuster for a while, you can start to fine tune the
+ After running Privoxy for a while, you can start to fine tune the
configuration to suit your personal, or site, preferences and
requirements. There are many, many aspects that can be customized.
- "Actions" (as specified in ijb.action) can be adjusted by pointing
+ "Actions" (as specified in default.action) can be adjusted by pointing
your browser to [53]http://i.j.b/, and then follow the link to "edit
the actions list". (This is an internal page and does not require
Internet access.)
- In fact, various aspects of Junkbuster configuration can be viewed
- from this page, including current configuration parameters, source
- code version numbers, the browser's request headers, and "actions"
- that apply to a given URL. In addition to the ijb.action file editor
- mentioned above, Junkbuster can also be turned "on" and "off" from
- this page.
+ In fact, various aspects of Privoxy configuration can be viewed from
+ this page, including current configuration parameters, source code
+ version numbers, the browser's request headers, and "actions" that
+ apply to a given URL. In addition to the default.action file editor
+ mentioned above, Privoxy can also be turned "on" and "off" from this
+ page.
- If you encounter problems, please verify it is a Junkbuster bug, by
- disabling Junkbuster, and then trying the same page. Also, try another
+ If you encounter problems, please verify it is a Privoxy bug, by
+ disabling Privoxy, and then trying the same page. Also, try another
browser if possible to eliminate browser or site problems. Before
reporting it as a bug, see if there is not a configuration option that
is enabled that is causing the page not to load. You can then add an
4.1. Command Line Options
- JunkBuster may be invoked with the following command-line options:
+ Privoxy may be invoked with the following command-line options:
* --version
Print version info and exit, Unix only.
USER, and if included the GID of GROUP. Exit if the privileges are
not sufficient to do so. Unix only.
* configfile
- If no configfile is included on the command line, JunkBuster will
+ If no configfile is included on the command line, Privoxy will
look for a file named "config" in the current directory (except on
Win32 where it will look for "config.txt" instead). Specify full
path to avoid confusion.
* Use the [54]Sourceforge support forum to get help.
* Submit bugs only thru our [55]Sourceforge bug forum. Make sure
that the bug has not already been submitted. Please try to verify
- that it is a Junkbuster bug, and not a browser or site bug first.
- If you are using your own custom configuration, please try the
- stock configs to see if the problem is a configuration related
- bug. And if not using the latest development snapshot, please try
- the latest one. Or even better, CVS sources.
+ that it is a Privoxy bug, and not a browser or site bug first. If
+ you are using your own custom configuration, please try the stock
+ configs to see if the problem is a configuration related bug. And
+ if not using the latest development snapshot, please try the
+ latest one. Or even better, CVS sources.
* Submit feature requests only thru our [56]Sourceforge feature
request forum.
6.1. License
- Internet Junkbuster is free software; you can redistribute it and/or
- modify it under the terms of the GNU General Public License as
- published by the Free Software Foundation; either version 2 of the
- License, or (at your option) any later version.
+ Privoxy is free software; you can redistribute it and/or modify it
+ under the terms of the GNU General Public License as published by the
+ Free Software Foundation; either version 2 of the License, or (at your
+ option) any later version.
This program is distributed in the hope that it will be useful, but
WITHOUT ANY WARRANTY; without even the implied warranty of
Junkbuster was originally written by Anonymous Coders and
[60]Junkbuster's Corporation, and was released as free open-source
software under the GNU GPL. [61]Stefan Waldherr made many
- improvements, and started the [62]SourceForge project to rekindle
- development. There are now several active developers contributing. The
- last stable release was v2.0.2, which has now grown whiskers ;-).
+ improvements, and started the [62]SourceForge project Privoxy to
+ rekindle development. There are now several active developers
+ contributing. The last stable release was v2.0.2, which has now grown
+ whiskers ;-).
_________________________________________________________________
7. See also
8.1. Regular Expressions
- Junkbuster can use "regular expressions" in various config files.
+ Privoxy can use "regular expressions" in various config files.
Assuming support for "pcre" (Perl Compatible Regular Expressions) is
compiled in, which is the default. Such configuration directives do
not require regular expressions, but they can be used to increase
"string1" is replaced by "string2" in this example.
These are just some of the ones you are likely to use when matching
- URLs with Junkbuster, and is a long way from a definitive list. This
- is enough to get us started with a few simple examples which may be
- more illuminating:
+ URLs with Privoxy, and is a long way from a definitive list. This is
+ enough to get us started with a few simple examples which may be more
+ illuminating:
/.*/banners/.* - A simple example that uses the common combination of
"." and "*" to denote any character, zero or more times. In other
break it ;-).
We are barely scratching the surface of regular expressions here so
- that you can understand the default Junkbuster configuration files,
- and maybe use this knowledge to customize your own installation. There
- is much, much more that can be done with regular expressions. Now that
+ that you can understand the default Privoxy configuration files, and
+ maybe use this knowledge to customize your own installation. There is
+ much, much more that can be done with regular expressions. Now that
you know enough to get started, you can learn more on your own :/
More reading on Perl Compatible Regular expressions:
[70]http://www.perldoc.com/perl5.6/pod/perlre.html
_________________________________________________________________
-8.2. JunkBuster's Internal Pages
+8.2. Privoxy's Internal Pages
- Since JunkBuster proxies each requested web page, it is easy for
- JunkBuster to trap certain URLs. In this way, we can talk directly to
- JunkBuster, and see how it is configured, see how our rules are being
- applied, change these rules and other configuration options, and even
- turn JunkBuster's filtering off, all with a web browser.
+ Since Privoxy proxies each requested web page, it is easy for Privoxy
+ to trap certain URLs. In this way, we can talk directly to Privoxy,
+ and see how it is configured, see how our rules are being applied,
+ change these rules and other configuration options, and even turn
+ Privoxy's filtering off, all with a web browser.
The URLs listed below are the special ones that allow direct access to
- JunkBuster. Of course, JunkBuster must be running to access these. If
- not, you will get a friendly error message. Internet access is not
+ Privoxy. Of course, Privoxy must be running to access these. If not,
+ you will get a friendly error message. Internet access is not
necessary either.
- * Junkbuster main page:
+ * Privoxy main page:
[71]http://ijbswa.sourceforge.net/config/
Alternately, this may be reached at [72]http://i.j.b/, but this
* Show which actions apply to a URL and why:
[76]http://ijbswa.sourceforge.net/config/show-url-info
- * Toggle JunkBuster on or off:
+ * Toggle Privoxy on or off:
[77]http://ijbswa.sourceforge.net/config/toggle
Short cuts. Turn off, then on:
8.3. Anatomy of an Action
- The way Junkbuster applies "actions" to any given URL can be complex,
- and not always so easy to understand what is happening. And sometimes
- we need to be able to see just what Junkbuster is doing. Especially,
- if something Junkbuster is doing is causing us a problem
- inadvertantly. It can be a little daunting to look at the actions
- files themselves, since they tend to be filled with "regular
- expressions" whose consequences are not always so obvious.
-
- First, you enter one URL (or partial URL), and this page will tell you
- how the currently configured Junkbuster "actions" are being applied to
- that specific URL. This will not help with filtering effects from the
- re_filterfile! It also will not tell you about any other URLs that may
- be embedded within the URL you are testing. For instance, images such
- as ads are expressed as URLs within the raw page source of HTML pages.
- So you will only get info for the actual URL that is pasted into the
- prompt area -- not any sub-URLs. If you want to know about embedded
- URLs like ads, you will have to dig those out of the HTML source. Use
- your browser's "View Page Source" option for this.
-
- Let's look at an example, [81]google.com, one section at a time:
+ The way Privoxy applies "actions" to any given URL can be complex, and
+ not always so easy to understand what is happening. And sometimes we
+ need to be able to see just what Privoxy is doing. Especially, if
+ something Privoxy is doing is causing us a problem inadvertantly. It
+ can be a little daunting to look at the actions files themselves,
+ since they tend to be filled with "regular expressions" whose
+ consequences are not always so obvious. Privoxy provides the
+ [81]http://ijbswa.sourceforge.net/config/show-url-info page that can
+ show us very specifically how actions are being applied to any given
+ URL. This is a big help for troubleshooting.
+
+ First, enter one URL (or partial URL) at the prompt, and then Privoxy
+ will tell us how current configuration will handle it. This will not
+ help with filtering effects from the default.filter! It also will not
+ tell you about any other URLs that may be embedded within the URL you
+ are testing. For instance, images such as ads are expressed as URLs
+ within the raw page source of HTML pages. So you will only get info
+ for the actual URL that is pasted into the prompt area -- not any
+ sub-URLs. If you want to know about embedded URLs like ads, you will
+ have to dig those out of the HTML source. Use your browser's "View
+ Page Source" option for this.
+
+ Let's look at an example, [82]google.com, one section at a time:
System default actions:
This is the top section, and only tells us of the compiled in
- defaults. This is basically what Junkbuster would do if there were not
+ defaults. This is basically what Privoxy would do if there were not
any "actions" defined, i.e. it does nothing. Every action is disabled.
This is not particularly informative for our purposes here. OK, next
section:
file, and "google.com" is referenced in these sections.
And now we pull it altogether in the bottom section and summarize how
- Junkbuster is appying all its "actions" to "google.com":
+ Privoxy is appying all its "actions" to "google.com":
Final results:
Visible links
1. http://ijbswa.sourceforge.net/user-manual/
2. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#INTRODUCTION
- 3. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN27
+ 3. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN28
4. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#INSTALLATION
5. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#INSTALLATION-SOURCE
6. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#INSTALLATION-RH
9. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#INSTALLATION-WIN
10. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#INSTALLATION-OTHER
11. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#CONFIGURATION
- 12. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN144
- 13. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN161
- 14. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN192
- 15. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN225
- 16. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN317
- 17. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN454
- 18. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN542
- 19. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN651
+ 12. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN147
+ 13. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN165
+ 14. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN196
+ 15. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN229
+ 16. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN322
+ 17. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN459
+ 18. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN547
+ 19. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN656
20. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#ACTIONSFILE
- 21. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN749
- 22. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN823
- 23. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN1143
+ 21. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN754
+ 22. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN828
+ 23. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN1148
24. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#FILTERFILE
- 25. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN1202
+ 25. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN1207
26. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#QUICKSTART
- 27. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN1257
+ 27. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN1263
28. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#CONTACT
29. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#COPYRIGHT
- 30. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN1316
- 31. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN1322
+ 30. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN1322
+ 31. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN1328
32. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#SEEALSO
33. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#APPENDIX
34. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#REGEX
- 35. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN1506
+ 35. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN1512
36. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#ACTIONSANAT
37. http://i.j.b/
38. http://sourceforge.net/projects/ijbswa/
78. http://ijbswa.sourceforge.net/config/toggle?set=disable
79. http://ijbswa.sourceforge.net/config/toggle?set=enable
80. http://ijbswa.sourceforge.net/config/edit-actions
- 81. http://google.com/
+ 81. http://ijbswa.sourceforge.net/config/show-url-info
+ 82. http://google.com/
Hidden links:
- 82. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN1378
- 83. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN1386
- 84. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN1389
- 85. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN1392
- 86. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN1395
- 87. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN1400
- 88. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN1403
- 89. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN1406
+ 83. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN1384
+ 84. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN1392
+ 85. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN1395
+ 86. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN1398
+ 87. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN1401
+ 88. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN1406
+ 89. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN1409
90. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN1412
+ 91. file://localhost/home/swa/sf/current-org/doc/source/tmp.html#AEN1418