1 Privoxy Frequently Asked Questions
3 [ Copyright © 2001-2004 by Privoxy Developers ]
5 $Id: faq.txt,v 1.42.2.7 2004/01/30 23:46:57 oes Exp $
7 This FAQ gives quick answers to frequently asked questions about Privoxy. It
8 can't and doesn't replace the User Manual.
10 Privoxy is a web proxy with advanced filtering capabilities for protecting
11 privacy, modifying web page content, managing cookies, controlling access, and
12 removing ads, banners, pop-ups and other obnoxious Internet junk. Privoxy has a
13 very flexible configuration and can be customized to suit individual needs and
14 tastes. Privoxy has application for both stand-alone systems and multi-user
17 Privoxy is based on Internet Junkbuster (tm).
19 Please note that this document is constantly evolving. This copy represents the
20 state at the release of version 3.0.3. You can find the latest version of the
21 document at http://www.privoxy.org/faq/. Please see the Contact section if you
22 want to contact the developers.
24 -------------------------------------------------------------------------------
27 1. General Information
29 1.1. What is this new version of Privoxy?
30 1.2. Why "Privoxy"? Why a name change at all?
31 1.3. How does Privoxy differ from the old Junkbuster?
32 1.4. What is a "proxy"? How does Privoxy work?
33 1.5. How does Privoxy know what is an ad, and what is not?
34 1.6. Can Privoxy make mistakes? This does not sound very scientific.
35 1.7. Will I have to configure Privoxy before I can use it?
36 1.8. My browser does the same things as Privoxy. Why should I use Privoxy
38 1.9. Is there is a license or fee? What about a warranty? Registration?
39 1.10. I would like to help you, what do I do?
41 1.10.1. Money Money Money
43 1.10.3. You want to work with us?
47 2.1. Which browsers are supported by Privoxy?
48 2.2. Which operating systems are supported?
49 2.3. Can I use Privoxy with my email client?
50 2.4. Can I install Privoxy over Junkbuster?
51 2.5. I just installed Privoxy. Is there anything special I have to do now?
52 2.6. What is the proxy address of Privoxy?
53 2.7. I just installed Privoxy, and nothing is happening. All the ads are
55 2.8. I get a "Privoxy is not being used" dummy page although Privoxy is
56 running and being used.
60 3.1. Where can I get updated Actions Files?
61 3.2. Can I use my old config files?
62 3.3. What is an "actions" file?
63 3.4. The "actions" concept confuses me. Please list some of these
65 3.5. How are actions files configured? What is the easiest way to do this?
66 3.6. There are several different "actions" files. What are the differences?
67 3.7. How can I make my Yahoo/Hotmail/GMX account work?
68 3.8. What's the difference between the "Cautious", "Medium" and
69 "Adventuresome" defaults?
70 3.9. Why can I change the configuration with a browser? Does that not raise
72 3.10. What is the default.filter file? What is a "filter"?
73 3.11. How can I set up Privoxy to act as a proxy for my LAN?
74 3.12. Instead of ads, now I get a checkerboard pattern. I don't want to see
76 3.13. Why would anybody want to see a checkerboard pattern?
77 3.14. I see some images being replaced by a text instead of the
78 checkerboard image. Why and how do I get rid of this?
79 3.15. Can Privoxy run as a service on Win2K/NT?
80 3.16. How can I make Privoxy work with other proxies like Squid?
81 3.17. Can I just set Privoxy to use port 80 and thus avoid individual
82 browser configuration?
83 3.18. Can Privoxy run as a "transparent" proxy?
84 3.19. How can I configure Privoxy for use with Outlook Express?
85 3.20. How can I have separate rules just for HTML mail?
86 3.21. How can I allow permanent cookies for my trusted sites?
90 4.1. How much does Privoxy slow my browsing down? This has to add extra
92 4.2. I noticed considerable delays in page requests compared to the old
93 Junkbuster. What's wrong?
94 4.3. What are "http://config.privoxy.org/" and "http://p.p/"?
95 4.4. Do you still maintain the blocklists?
96 4.5. How can I submit new ads?
97 4.6. How can I hide my IP address?
98 4.7. Can Privoxy guarantee I am anonymous?
99 4.8. Might some things break because header information or content is being
101 4.9. Can Privoxy act as a "caching" proxy to speed up web browsing?
102 4.10. What about as a firewall? Can Privoxy protect me?
103 4.11. I have large empty spaces / a checkerboard pattern now where ads used
105 4.12. How can Privoxy filter Secure (HTTPS) URLs?
106 4.13. Privoxy runs as a "server". How secure is it? Do I need to take any
108 4.14. How can I temporarily disable Privoxy?
109 4.15. When "disabled" is Privoxy totally out of the picture?
110 4.16. My logs show Privoxy "crunches" ads, but also its own CGI pages. What
112 4.17. Can Privoxy effect files that I download from a webserver? FTP
114 4.18. I just downloaded a Perl script, and Privoxy altered it! Yikes, what
116 4.19. Where can I find more information about Privoxy and related issues?
117 4.20. I've noticed that Privoxy changes "Microsoft" to "MicroSuck"! Why are
118 you manipulating my browsing?
122 5.1. I just upgraded and am getting "connection refused" with every web
124 5.2. I just added a new rule, but the steenkin ad is still getting through.
126 5.3. One of my favorite sites does not work with Privoxy. What can I do?
127 5.4. After installing Privoxy, I have to log in every time I start IE. What
129 5.5. I cannot connect to any FTP sites. Privoxy seems to be blocking me.
130 5.6. In Mac OSX, I can't configure Microsoft Internet Explorer to use
131 Privoxy as the HTTP proxy.
132 5.7. In Mac OSX, I dragged the Privoxy folder to the trash in order to
133 uninstall it. Now the finder tells me I don't have sufficient
134 privileges to empty the trash.
135 5.8. In Mac OSX Panther (10.3), images often fail to load and/or I
136 experience random delays in page loading. I'm using localhost as my
137 browser's proxy setting.
138 5.9. I get a completely blank page at one site. "View Source" shows only:
139 <html><body></body></html>. Without Privoxy the page loads fine.
140 5.10. Why am I getting a 503 Error (WSAECONNREFUSED) on every page?
141 5.11. My logs show many "Unable to get my own hostname" lines. Why?
142 5.12. When I try to launch Privoxy, I get an error message "port 8118 is
143 already in use" (or similar wording). Why?
144 5.13. Pages with UTF-8 fonts are garbled.
145 5.14. Why are binary files (such as images) corrupted when Privoxy is used?
146 5.15. What is the "demoronizer" and why is it there?
147 5.16. Why do I keep seeing "PrivoxyWindowOpen()" in raw source code?
149 6. Contacting the developers, Bug Reporting and Feature Requests
153 6.3. Request New Features
154 6.4. Report Ads or Other Actions-Related Problems
157 7. Privoxy Copyright, License and History
162 1. General Information
164 1.1. What is this new version of Privoxy?
166 In the beginning, there was the Internet Junkbuster, by Anonymous Coders and
167 Junkbusters Corporation. It saved many users a lot of pain in the early days of
168 web advertising and user tracking.
170 But the web, its protocols and standards, and with it, the techniques for
171 forcing users to consume ads, give up autonomy over their browsing, and for
172 spying on them, kept evolving. Unfortunately, the Internet Junkbuster did not.
173 Version 2.0.2, published in 1998, was (and is) the last official release
174 available from Junkbusters Corporation. Fortunately, it had been released under
175 the GNU GPL, which allowed further development by others.
177 So Stefan Waldherr started maintaining an improved version of the software, to
178 which eventually a number of people contributed patches. It could already
179 replace banners with a transparent image, and had a first version of pop-up
180 killing, but it was still very closely based on the original, with all its
181 limitations, such as the lack of HTTP/1.1 support, flexible per-site
182 configuration, or content modification. The last release from this effort was
183 version 2.0.2-10, published in 2000.
185 Then, some developers picked up the thread, and started turning the software
186 inside out, upside down, and then reassembled it, adding many new features
189 The result of this is Privoxy, whose first stable version, 3.0, was released
192 -------------------------------------------------------------------------------
194 1.2. Why "Privoxy"? Why a name change at all?
196 Privoxy is the "Privacy Enhancing Proxy". Also, its content modification and
197 junk suppression allow you to browse your "private edition" of the web.
199 Junkbusters Corporation continues to offer their original version of the
200 Internet Junkbuster, so publishing our Junkbuster-derived software under the
201 same name led to confusion.
203 There are also potential legal complications from the continued use of the
204 Junkbuster name, which is a registered trademark of Junkbusters Corporation.
205 There are, however, no objections from Junkbusters Corporation to the Privoxy
206 project itself, and they, in fact, still share our ideals and goals.
208 The developers also believed that there are so many changes from the original
209 code, that it was time to make a clean break from the past and make a name in
212 -------------------------------------------------------------------------------
214 1.3. How does Privoxy differ from the old Junkbuster?
216 Privoxy picks up where Junkbuster left off. All the old features remain. The
217 new Privoxy still blocks ads and banners, still manages cookies, and still
218 helps protect your privacy. But, these are all enhanced, and many new features
219 have been added, all in the same vein.
221 The configuration has changed significantly as well. This is something that
222 users will notice right off the bat if upgrading from Junkbuster 2.0.x. The
223 "blocklist" "cookielist", "imagelist" and much more has been combined into the
224 "actions" files, with a completely different syntax. See the note to upgraders
227 Privoxy's new features include:
229 * Integrated browser based configuration and control utility at http://
230 config.privoxy.org/ (shortcut: http://p.p/). Browser-based tracing of rule
231 and filter effects. Remote toggling.
233 * Web page content filtering (removes banners based on size, invisible
234 "web-bugs", JavaScript and HTML annoyances, pop-up windows, etc.)
236 * Modularized configuration that allows for standard settings and user
237 settings to reside in separate files, so that installing updated actions
238 files won't overwrite individual user settings.
240 * HTTP/1.1 compliant (but not all optional 1.1 features are supported).
242 * Support for Perl Compatible Regular Expressions in the configuration files,
243 and generally a more sophisticated and flexible configuration syntax over
246 * Improved cookie management features (e.g. session based cookies).
250 * Bypass many click-tracking scripts (avoids script redirection).
252 * Multi-threaded (POSIX and native threads).
254 * User-customizable HTML templates for all proxy-generated pages (e.g.
257 * Auto-detection and re-reading of config file changes.
259 * Improved signal handling, and a true daemon mode (Unix).
261 * Every feature now controllable on a per-site or per-location basis,
262 configuration more powerful and versatile over-all.
264 * Many smaller new features added, limitations and bugs removed, and security
267 -------------------------------------------------------------------------------
269 1.4. What is a "proxy"? How does Privoxy work?
271 A web proxy is a service, based on a software such as Privoxy, that clients
272 (i.e. browsers) can use instead of connecting directly to the web servers on
273 the Internet. The clients then ask the proxy to fetch the objects they need
274 (web pages, images, movies etc) on their behalf, and when the proxy has done
275 so, it hands the results back to the client.
277 There are many reasons to use web proxies, such as security (firewalling),
278 efficiency (caching) and others, and there are just as many different proxies
279 to accommodate those needs.
281 Privoxy is a proxy that is solely focused on privacy protection and junk
282 elimination. Sitting between your browser(s) and the Internet, it is in a
283 perfect position to filter outbound personal information that your browser is
284 leaking, as well as inbound junk. It uses a variety of techniques to do this,
285 all of which are under your control via the various configuration files and
288 -------------------------------------------------------------------------------
290 1.5. How does Privoxy know what is an ad, and what is not?
292 Privoxy's approach to blocking ads is twofold:
294 First, there are certain patterns in the locations (URLs) of banner images.
295 This applies to both the path (you wouldn't guess how many web sites serve
296 their banners from a directory called "banners"!) and the host (blocking the
297 big banner hosting services like doublecklick.net already helps a lot). Privoxy
298 takes advantage of this fact by using URL patterns to sort out and block the
299 requests for banners.
301 Second, banners tend to come in certain sizes. But you can't tell the size of
302 an image by its URL without downloading it, and if you do, it's too late to
303 save bandwidth. Therefore, Privoxy also inspects the HTML sources of web pages
304 while they are loaded, and replaces references to images with standard banner
305 sizes by dummy references, so that your browser doesn't request them anymore in
308 Both of this involves a certain amount of guesswork and is, of course, freely
311 -------------------------------------------------------------------------------
313 1.6. Can Privoxy make mistakes? This does not sound very scientific.
315 Actually, it's a black art ;-) And yes, it is always possible to have a broad
316 rule accidentally block or change something by mistake. You will almost surely
317 run into such situations at some point. It is tricky writing rules to cover
318 every conceivable possibility, and not occasionally get false positives.
320 But this should not be a big concern since the Privoxy configuration is very
321 flexible, and includes tools to help identify these types of situations so they
322 can be addressed as needed, allowing you to customize your installation. (See
323 the Troubleshooting section below.)
325 -------------------------------------------------------------------------------
327 1.7. Will I have to configure Privoxy before I can use it?
329 No, not really. The default installation should give you a good starting point,
330 and block most unwanted content.
332 But you will certainly run into situations where there are false positives, or
333 ads not being blocked that you may not want to see. In these cases, you would
334 certainly benefit by customizing Privoxy's configuration to more closely match
335 your individual situation. And we would encourage you to do this. This is where
336 the real power of Privoxy lies!
338 -------------------------------------------------------------------------------
340 1.8. My browser does the same things as Privoxy. Why should I use Privoxy at
343 Modern browsers do indeed have some of the same functionality as Privoxy. Maybe
344 this is adequate for you. But Privoxy is much more versatile and powerful, and
345 can do a number of things that browsers just can't.
347 In addition, a proxy is good choice if you use multiple browsers, or have a LAN
348 with multiple computers. This way all the configuration is in one place, and
349 you don't have to maintain a similar configuration for possibly many browsers.
351 -------------------------------------------------------------------------------
353 1.9. Is there is a license or fee? What about a warranty? Registration?
355 Privoxy is licensed under the GNU General Public License (GPL). It is free to
356 use, copy, modify or distribute as you wish under the terms of this license.
357 Please see the Copyright section for more information on the license and
358 copyright. Or the LICENSE file that should be included.
360 There is no warranty of any kind, expressed, implied or otherwise. That is
361 something that would cost real money ;-) There is no registration either.
362 Privoxy really is free in every respect!
364 -------------------------------------------------------------------------------
366 1.10. I would like to help you, what do I do?
368 1.10.1. Money Money Money
370 We, of course, welcome donations and could use money for domain registering,
371 buying software to test Privoxy with, and, of course, for regular world-wide
372 get-togethers (hahaha). If you enjoy the software and feel like helping us with
373 a donation, just drop us a note.
375 -------------------------------------------------------------------------------
379 If you are a vendor of a web-related software like a browser, web server or
380 proxy, and would like us to ensure that Privoxy runs smoothly with your
381 product, you might consider supplying us with a copy or license. We can't,
382 however, guarantee that we will fix all potential compatibility issues as a
385 -------------------------------------------------------------------------------
387 1.10.3. You want to work with us?
389 Well, helping the team is always a good idea. We welcome new developers,
390 packaging gurus or documentation writers. Simply get an account on
391 SourceForge.net and mail your id to the developers mailing list. Then read the
394 Once we have added you to the team, you'll have write access to the CVS
395 repository, and together we'll find a suitable task for you.
397 -------------------------------------------------------------------------------
401 2.1. Which browsers are supported by Privoxy?
403 Any browser that can be configured to use a proxy, which should be virtually
404 all browsers. Direct browser support is not necessary since Privoxy runs as a
405 separate application and talks to the browser in the standardized HTTP
406 protocol, just like a web server does.
408 -------------------------------------------------------------------------------
410 2.2. Which operating systems are supported?
412 At present, Privoxy is known to run on Windows(95, 98, ME, 2000, XP), Linux
413 (RedHat, SuSE, Debian, Conectiva, Gentoo, Slackware), Mac OSX, OS/2, AmigaOS,
414 BeOS, FreeBSD, NetBSD, OpenBSD, Solaris, and many more flavors of Unix.
416 But any operating system that runs TCP/IP, can conceivably take advantage of
417 Privoxy in a networked situation where Privoxy would run as a server on a LAN
418 gateway. Then only the "gateway" needs to be running one of the above operating
421 Source code is freely available, so porting to other operating systems is
422 always a possibility.
424 -------------------------------------------------------------------------------
426 2.3. Can I use Privoxy with my email client?
428 As long as there is some way to set a HTTP proxy for the client, then yes, any
429 application can be used, whether it is strictly speaking a "browser" or not.
430 Though this may not be the best approach for dealing with some of the common
431 abuses of HTML in email. See How can I configure Privoxy with Outlook Express?
432 below for more on this.
434 Be aware that HTML email presents a number of unique security and privacy
435 related issues, that can require advanced skills to overcome. The developers
436 recommend using email clients that can be configured to convert HTML to plain
437 text for these reasons.
439 -------------------------------------------------------------------------------
441 2.4. Can I install Privoxy over Junkbuster?
443 We recommend you un-install Junkbuster first to minimize conflicts and
444 confusion. You may want to save your old configuration files for future
445 reference. The configuration files and syntax have substantially changed, so
446 you will need to manually port your old patterns. See the note to upgraders and
447 installation chapter in the user manual for details.
449 Note: Some installers may automatically un-install Junkbuster, if present!
451 -------------------------------------------------------------------------------
453 2.5. I just installed Privoxy. Is there anything special I have to do now?
455 All browsers must be told to use Privoxy as a proxy by specifying the correct
456 proxy address and port number in the appropriate configuration area for the
457 browser. See below. You should also flush your browser's memory and disk cache
458 to get rid of any cached junk items, and remove any stored cookies.
460 -------------------------------------------------------------------------------
462 2.6. What is the proxy address of Privoxy?
464 If you set up the Privoxy to run on the computer you browse from (rather than
465 your ISP's server or some networked computer on a LAN), the proxy will be on
466 127.0.0.1 (sometimes referred to as "localhost", which is the special name used
467 by every computer on the Internet to refer to itself) and the port will be 8118
468 (unless you have Privoxy to run on a different port with the listen-address
471 When configuring your browser's proxy settings you typically enter the word
472 "localhost" or the IP address "127.0.0.1" in the boxes next to "HTTP" and
473 "Secure" (HTTPS) and then the number "8118" for "port". This tells your browser
474 to send all web requests to Privoxy instead of directly to the Internet.
476 Privoxy can also be used to proxy for a Local Area Network. In this case, your
477 would enter either the IP address of the LAN host where Privoxy is running, or
478 the equivalent hostname. Port assignment would be same as above. Note that
479 Privoxy doesn't listen on any LAN interfaces by default.
481 Privoxy does not currently handle any other protocols such as FTP, SMTP, IM,
484 -------------------------------------------------------------------------------
486 2.7. I just installed Privoxy, and nothing is happening. All the ads are there.
489 Did you configure your browser to use Privoxy as a proxy? It does not sound
490 like it. See above. You might also try flushing the browser's caches to force a
491 full re-reading of pages. You can verify that Privoxy is running, and your
492 browser is correctly configured by entering the special URL: http://p.p/. This
493 should take you to a page titled "This is Privoxy.." with access to Privoxy's
494 internal configuration. If you see this, then you are good to go. If you
495 receive a page saying "Privoxy is not running", then the browser is not set up
496 to use your Privoxy installation. If you receive anything else (probably
497 nothing at all), it could either be that the browser is not set up correctly,
498 or that Privoxy is not running at all. Check the log file. For instructions on
499 starting Privoxy and browser configuration, see the chapter on starting Privoxy
502 -------------------------------------------------------------------------------
504 2.8. I get a "Privoxy is not being used" dummy page although Privoxy is running
507 First, make sure that Privoxy is really running and being used by visiting
508 http://p.p/. You should see the Privoxy main page. If not, see the chapter on
509 starting Privoxy in the user manual.
511 Now if http://p.p/ works for you, but other parts of Privoxy's web interface
512 show the dummy page, your browser has cached a redirection it encountered
513 before Privoxy was being used. You need to clear your browser's cache. Note
514 that shift-reloading the dummy page won't help, since that'll only refresh the
515 dummy page, not the redirection that lead you there.
517 The procedure for clearing the cache varies from browser to browser. As an
518 example, Mozilla users would click Edit --> Preferences --> Advanced --> Cache
519 and then click both "Clear Memory Cache" and "Clear Disk Cache".
521 -------------------------------------------------------------------------------
525 3.1. Where can I get updated Actions Files?
527 Based on your feedback and the continuing development, updated actions files
528 will be made available on the files section of our project page.
530 If you wish to receive an email notification whenever we release updates of
531 Privoxy or the actions file, subscribe to our announce mailing list,
532 ijbswa-announce@lists.sourceforge.net.
534 -------------------------------------------------------------------------------
536 3.2. Can I use my old config files?
538 The syntax, number, and purpose of configuration files has substantially
539 changed from Junkbuster and earlier versions of Privoxy. The old files, like
540 blocklist will not work at all. If you are upgrading from a 2.0.x version, you
541 will need to port your configuration data to the new format. Note that even the
542 pattern syntax has changed! Even configuration files from the 2.9.x versions
543 will need to be adapted, as configuration syntax has been very much in flow in
546 -------------------------------------------------------------------------------
548 3.3. What is an "actions" file?
550 Actions files are where various actions that Privoxy might take while
551 processing a certain request, are configured. Typically, you would define a set
552 of default actions that apply to all URLs, then add exceptions to these
553 defaults where needed.
555 Actions can be defined on a URL pattern basis, i.e. for single URLs, whole web
556 sites, groups or parts thereof etc. Actions can also be grouped together and
557 then applied to requests matching one or more patterns. There are many possible
558 actions that might apply to any given site. As an example, if you are blocking
559 cookies as one of your default actions, but need to accept cookies from a given
560 site, you would need to define an exception for this site in one of your
561 actions files, preferably in user.action.
563 -------------------------------------------------------------------------------
565 3.4. The "actions" concept confuses me. Please list some of these "actions".
567 For a comprehensive discussion of the actions concept, please refer to the
568 actions file chapter in the user manual. It includes a list of all actions and
569 an actions file tutorial to get you started.
571 -------------------------------------------------------------------------------
573 3.5. How are actions files configured? What is the easiest way to do this?
575 Actions files are just text files in a special syntax and can be edited with a
576 text editor. But probably the easiest way is to access Privoxy's user interface
577 with your web browser at http://config.privoxy.org/ (Shortcut: http://p.p/) and
578 then select "View & change the current configuration" from the menu.
580 -------------------------------------------------------------------------------
582 3.6. There are several different "actions" files. What are the differences?
584 As of Privoxy v2.9.15, three actions files are being included, to be used for
585 different purposes: These are default.action, the "main" actions file which is
586 actively maintained by the Privoxy developers, user.action, where users are
587 encouraged to make their private customizations, and standard.action, which is
588 for internal Privoxy use only. Please see the actions chapter in the user
589 manual for a more detailed explanation.
591 Earlier versions included three different versions of the default.action file.
592 The new scheme allows for greater flexibility of local configuration, and for
593 browser based selection of pre-defined "aggressiveness" levels.
595 -------------------------------------------------------------------------------
597 3.7. How can I make my Yahoo/Hotmail/GMX account work?
599 The default configuration shouldn't impact the usability of any of these
600 services. It will, however, make all cookies temporary, so that your browser
601 will forget your login credentials in between browser sessions. If you would
602 like not to have to log in manually each time you access those websites, simply
603 turn off all cookie handling for them in the user.action file. An example for
604 yahoo might look like:
606 # Allow all cookies for Yahoo login:
608 { -crunch-incoming-cookies -crunch-outgoing-cookies -session-cookies-only }
612 -------------------------------------------------------------------------------
614 3.8. What's the difference between the "Cautious", "Medium" and "Adventuresome"
617 Configuring Privoxy is not entirely trivial. To help you get started, we
618 provide you with three different default action "profiles" in the web based
619 actions file editor at http://config.privoxy.org/show-status. See the User
620 Manual for a list of actions, and how the default profiles are set.
622 Where the defaults are likely to break some sites, exceptions for known popular
623 "problem" sites are included, but in general, the more aggressive your default
624 settings are, the more exceptions you will have to make later. See the User
625 Manual for a more deatiled discussion.
627 It should be noted that the "Adventuresome" profile (formerly known as the
628 "Advanced" profile) is not only more aggressive, but also includes fun and,
629 extreme usage of most of Privoxy's features. Use at your own risk!
631 -------------------------------------------------------------------------------
633 3.9. Why can I change the configuration with a browser? Does that not raise
636 It may seem strange that regular users can edit the config files with their
637 browsers, although the whole /etc/privoxy hierarchy belongs to the user
638 "privoxy", with only 644 permissions.
640 When you use the browser-based editor, Privoxy itself is writing to the config
641 files. Because Privoxy is running as the user "privoxy", it can update the
644 If you run Privoxy for multiple untrusted users (e.g. in a LAN), you will
645 probably want to turn the web-based editor and remote toggle features off by
646 setting "enable-edit-actions 0" and "enable-remote-toggle 0" in the main
649 Note that in the default configuration, only local users (i.e. those on
650 "localhost") can connect to Privoxy, so this is not (normally) a security
653 -------------------------------------------------------------------------------
655 3.10. What is the default.filter file? What is a "filter"?
657 The default.filter file is where filters are defined, which can be used to
658 modify or remove, web page content on the fly. Filters apply to anything in the
659 page source, including HTML tags, and JavaScript. Regular expressions are used
660 to accomplish this. There are a number of pre-defined filters to deal with
661 common annoyances. The filters are only defined here, to invoke them, you need
662 to use the filter action in one of the actions files. Filtering is
663 automatically disabled for inappropriate MIME types.
665 If you are familiar with regular expressions, and HTML, you can look at the
666 provided default.filter with a text editor and define your own filters. This is
667 potentially a very powerful feature, but requires some expertise in both
668 regular expressions and HTML/HTTP.
670 Presently, there is no GUI editor option for this part of the configuration,
671 but you can disable/enable the various pre-defined filters of the included
672 default.filter file with the web-based actions file editor.
674 -------------------------------------------------------------------------------
676 3.11. How can I set up Privoxy to act as a proxy for my LAN?
678 By default, Privoxy only responds to requests from 127.0.0.1 (localhost). To
679 have it act as a server for a network, this needs to be changed in the main
680 configuration file. Look for the listen-address option, which may be commented
681 out with a "#" symbol. Make sure it is uncommented, and assign it the address
682 of the LAN gateway interface, and port number to use. Assuming your LAN address
683 is 192.168.1.1 and you wish to run Privoxy on port 8118, this line should look
686 listen-address 192.168.1.1:8118
689 Save the file, and restart Privoxy. Configure all browsers on the network then
690 to use this address and port number.
692 Alternately, you can have Privoxy listen on all available interfaces:
697 And then use Privoxy's permit-access feature to limit connections. A firewall
698 in this situation is recommended as well.
700 The above steps should be the same for any TCP network, regardless of operating
703 If you run Privoxy on a LAN with untrusted users, we recommend that you
704 double-check the access control and security options!
706 -------------------------------------------------------------------------------
708 3.12. Instead of ads, now I get a checkerboard pattern. I don't want to see
711 The replacement for blocked images can be controlled with the set-image-blocker
712 action. You have the choice of a checkerboard pattern, a transparent 1x1 GIF
713 image (aka "blank"), or a redirect to a custom image of your choice. Note that
714 this choice only has effect for images which are blocked as images, i.e. whose
715 URLs match both a handle-as-image and block action.
717 If you want to see nothing, then change the set-image-blocker action to
718 "blank". This can be done by editing the default.action file, or trough the
719 web-based actions file editor.
721 -------------------------------------------------------------------------------
723 3.13. Why would anybody want to see a checkerboard pattern?
725 Remember that telling which image is an ad and which isn't, is mostly
726 guesswork. While we hope that the standard configuration is rather smart, it
727 can and will make errors. The checkerboard image is visually decent, but it
728 shows you that and where images were blocked, which can be very helpful in case
729 some navigation aid or otherwise innocent image was erraneously blocked. Some
730 people might also enjoy seeing how many banners they don't have to see..
732 -------------------------------------------------------------------------------
734 3.14. I see some images being replaced by a text instead of the checkerboard
735 image. Why and how do I get rid of this?
737 This happens when the banners are not embedded in the HTML code of the page
738 itself, but in separate HTML (sub)documents that are loaded into (i)frames or
739 (i)layers, and these external HTML documents are blocked. Being non-images they
740 get replaced by a substitute HTML page rather than a substitute image, which
741 wouldn't work out technically, since the browser expects and accepts only HTML
742 when it has requested an HTML document.
744 The substitute page adapts to the available space and shows itself as a
745 miniature two-liner if loaded into small frames, or full-blown with a large red
746 "BLOCKED" banner if space allows.
748 If you prefer the banners to be blocked by images, you must see to it that the
749 HTML documents in which they are embedded are not blocked. Clicking the "See
750 why" link offered in the substitute page will show you which rule blocked the
751 page. After changing the rule and un-blocking the HTML documents, the browser
752 will try to load the actual banner images and the usual image blocking will
753 (hopefully!) kick in.
755 -------------------------------------------------------------------------------
757 3.15. Can Privoxy run as a service on Win2K/NT?
759 Yes, it can run as a system service using srvany.exe. See the discussion at
760 http://sourceforge.net/tracker/?func=detail&atid=361118&aid=485617&group_id=
761 11118, for details, and a sample configuration.
763 Version 3.0.1 fixes the problem where the icon and menu where not available in
764 the taskbar for this usage.
766 -------------------------------------------------------------------------------
768 3.16. How can I make Privoxy work with other proxies like Squid?
770 This can be done and is often useful to combine the benefits of Privoxy with
771 those of a caching proxy. See the forwarding chapter in the user manual which
772 describes how to do this.
774 -------------------------------------------------------------------------------
776 3.17. Can I just set Privoxy to use port 80 and thus avoid individual browser
779 No, its more complicated than that. This only works with special kinds of
780 proxies known as "transparent" proxies (see below).
782 -------------------------------------------------------------------------------
784 3.18. Can Privoxy run as a "transparent" proxy?
786 No, Privoxy currently does not have this ability, though it is planned for a
787 future release. Transparent proxies require special handling of the request
788 headers beyond what Privoxy is now capable of.
790 Chaining Privoxy behind another proxy that has this ability should work though.
791 See the forwarding chapter in the user manual. As a transparent proxy to be
792 used for chaining we recommend Transproxy (http://www.transproxy.nlc.net.au/).
794 -------------------------------------------------------------------------------
796 3.19. How can I configure Privoxy for use with Outlook Express?
798 Outlook Express uses Internet Explorer components to both render HTML, and
799 fetch any HTTP requests that may be embedded in an HTML email. So however you
800 have Privoxy configured to work with IE, this configuration should
801 automatically be shared.
803 -------------------------------------------------------------------------------
805 3.20. How can I have separate rules just for HTML mail?
807 The short answer is, you can't. Privoxy has no way of knowing which particular
808 application makes a request, so there is no way to distinguish between web
809 pages and HTML mail. Privoxy just blindly proxies all requests. In the case of
810 Outlook Express (see above), OE uses IE anyway, and there is no way for Privoxy
811 to ever be able to distinguish between them (nor could any other proxy type
812 application for that matter).
814 For a good discussion of some of the issues involved (including privacy and
815 security issues), see http://sourceforge.net/tracker/?func=detail&atid=211118&
816 aid=629518&group_id=11118.
818 -------------------------------------------------------------------------------
820 3.21. How can I allow permanent cookies for my trusted sites?
822 There are several actions that relate to cookies. The default behavior is to
823 allow only "session cookies", which means the cookies only last for the current
824 browser session. This eliminates most kinds of abuse related to cookies. But
825 there may be cases where we want cookies to last.
827 To disable all cookie actions, so that cookies are allowed unrestricted, both
828 in and out, for example.com:
830 { -crunch-incoming-cookies -crunch-outgoing-cookies -session-cookies-only -filter{content-cookies} }
834 Place the above in user.action. Note some of these may be off by default
835 anyway, so this might be redundant, but there is no harm being explicit in what
836 you want to happen. user.action includes an alias for this situation, called
839 -------------------------------------------------------------------------------
843 4.1. How much does Privoxy slow my browsing down? This has to add extra time to
846 It should not slow you down any in real terms, and may actually help speed
847 things up since ads, banners and other junk are not being displayed. The actual
848 processing time required by Privoxy itself for each page, is relatively small
849 in the overall scheme of things, and happens very quickly. This is typically
850 more than offset by time saved not downloading and rendering ad images.
852 "Filtering" content via the filter or deanimate-gifs actions may cause a
853 perceived slowdown, since the entire document needs to be buffered before
854 displaying. See below.
856 -------------------------------------------------------------------------------
858 4.2. I noticed considerable delays in page requests compared to the old
859 Junkbuster. What's wrong?
861 If you use any filter action, such as filtering banners by size, web-bugs etc,
862 or the deanimate-gifs action, the entire document must be loaded into memory in
863 order for the filtering mechanism to work, and nothing is sent to the browser
866 The loading time does not really change in real numbers, but the feeling is
867 different, because most browsers are able to start rendering incomplete
868 content, giving the user a feeling of "it works". This effect is especially
869 noticeable on slow dialup connections.
871 Filtering is automatically disabled for inappropriate MIME types. But note that
872 if the web server mis-reports the MIME type, then content that should not be
873 filtered, could be. Privoxy only knows how to differentiate filterable content
874 because of the MIME type as reported by the server, or because of some
875 configuration setting that enables/disables filtering.
877 -------------------------------------------------------------------------------
879 4.3. What are "http://config.privoxy.org/" and "http://p.p/"?
881 http://config.privoxy.org/ is the address of Privoxy's built-in user interface,
882 and http://p.p/ is a shortcut for it.
884 Since Privoxy sits between your web browser and the Internet, it can simply
885 intercept requests for these addresses and answer them with its built-in "web
888 This also makes for a good test for your browser configuration: If entering the
889 URL http://config.privoxy.org/ takes you to a page saying "This is Privoxy
890 ...", everything is OK. If you get a page saying "Privoxy is not working"
891 instead, then your browser didn't use Privoxy for the request, hence it could
892 not be intercepted, and you have accessed the real web site at
895 With recent versions of Privoxy (version 2.9.x and later), the user interface
896 features information on the run time status, the configuration, and even a
897 built-in editor for the actions files.
899 Note that the built-in URLs from earlier versions of Junkbuster / Privoxy,
900 http://example.com/show-proxy-args and http://i.j.b/, are no longer supported.
901 If you still use such an old version, you should really consider upgrading to
904 -------------------------------------------------------------------------------
906 4.4. Do you still maintain the blocklists?
908 No. The patterns for blocking now reside (among other things) in the actions
909 files, which are actively maintained instead. See next question ...
911 -------------------------------------------------------------------------------
913 4.5. How can I submit new ads?
915 Yes, absolutely! Please see the Contact section for how to do that. Please note
916 that you (technically) need the latest Privoxy version for this to work.
918 -------------------------------------------------------------------------------
920 4.6. How can I hide my IP address?
922 If you run both the browser and the proxy locally, you cannot hide your IP
923 address with Privoxy or any other software. The server needs to know your IP
924 address to send the answers back to you.
926 Fortunately there are many publicly usable anonymous proxies out there, which
927 solve the problem by providing a further level of indirection between you and
928 the web server, shared by many people, and thus letting your requests "drown"
929 in white noise of unrelated requests as far as user tracking is concerned.
931 Most of them will, however, log your IP address and make it available to the
932 authorities in case you abuse that anonymity for criminal purposes. In fact you
933 can't even rule out that some of them only exist to *collect* information on
934 (those suspicious) people with a more than average preference for privacy.
936 You can find a list of anonymous public proxies at multiproxy.org and many more
937 through Google. A particularly interesting project is the JAP service offered
938 by the Technical University of Dresden (http://anon.inf.tu-dresden.de/
941 There is, however, even in the single-machine case the possibility to make the
942 server believe that your machine is in fact a shared proxy serving a whole big
943 LAN, and we are looking into that.
945 -------------------------------------------------------------------------------
947 4.7. Can Privoxy guarantee I am anonymous?
949 No. Your chances of remaining anonymous are greatly improved, but unless you
950 are an expert on Internet security it would be safest to assume that everything
951 you do on the Web can be traced back to you.
953 Privoxy can remove various information about you, and allows you more freedom
954 to decide which sites you can trust, and what details you want to reveal. But
955 it's still possible that web sites can find out who you are. Here's one way
958 A few browsers disclose the user's email address in certain situations, such as
959 when transferring a file by FTP. Privoxy does not filter FTP. If you need this
960 feature, or are concerned about the mail handler of your browser disclosing
961 your email address, you might consider products such as NSClean.
963 Browsers available only as binaries could use non-standard headers to give out
964 any information they can have access to: see the manufacturer's license
965 agreement. It's impossible to anticipate and prevent every breach of privacy
966 that might occur. The professionally paranoid prefer browsers available as
967 source code, because anticipating their behavior is easier. Trust the source,
970 -------------------------------------------------------------------------------
972 4.8. Might some things break because header information or content is being
975 Definitely. More and more sites use HTTP header content to decide what to
976 display and how to display it. There is many ways that this can be handled, so
977 having hard and fast rules, is tricky.
979 "User-Agent" in particular is often used in this way to identify the browser,
980 and adjust content accordingly. Changing this now (at least not further than
981 removing the OS information) is not recommended, since so many sites do look
982 for it. You may get undesirable results by changing this.
984 For instance, different browsers use different encodings of Russian and Czech
985 characters, certain web servers convert pages on-the-fly according to the User
986 Agent header. Giving a "User Agent" with the wrong operating system or browser
987 manufacturer causes some sites in these languages to be garbled; Surfers to
988 Eastern European sites should change it to something closer. And then some page
989 access counters work by looking at the "Referer" header; they may fail or break
990 if unavailable. The weather maps of Intellicast have been blocked by their
991 server when no "Referer" or cookie is provided, is another example. (But you
992 can forge both headers without giving information away). There are many other
993 ways things can go wrong when trying to fool a web server.
995 Similar thoughts apply to modifying JavaScript, and, to a lesser degree, HTML
998 If you have problems with a site, you will have to adjust your configuration
999 accordingly. Cookies are probably the most likely adjustment that may be
1000 required, but by no means the only one.
1002 -------------------------------------------------------------------------------
1004 4.9. Can Privoxy act as a "caching" proxy to speed up web browsing?
1006 No, it does not have this ability at all. You want something like Squid for
1007 this. And, yes, before you ask, Privoxy can co-exist with other kinds of
1008 proxies like Squid. See the forwarding chapter in the user manual for details.
1010 -------------------------------------------------------------------------------
1012 4.10. What about as a firewall? Can Privoxy protect me?
1014 Not in the way you mean, or in the way a true firewall can. Privoxy can help
1015 protect your privacy, but not protect you from intrusion attempts. It is, of
1016 course, perfectly possible and recommended to use both.
1018 -------------------------------------------------------------------------------
1020 4.11. I have large empty spaces / a checkerboard pattern now where ads used to
1023 It would be technically possible eliminate the banners in a way that frees
1024 their screen estate in many cases, by doing all banner blocking with filters,
1025 i.e. eliminating the whole image references from the HTML pages instead of
1026 letting them stay in, and blocking the resulting requests for the banners
1029 But this would consume considerable CPU resources, would likely destroy the
1030 layout of many web pages which rely on the banners consuming a certain amount
1031 of screen space, and would fail in other cases, where the screen space is
1032 reserved e.g. by tables anyway. Also, making the banners disappear without a
1033 visual trace complicates troubleshooting.
1035 So we won't support this in the default configuration, but you can of course
1036 define appropriate filters yourself.
1038 -------------------------------------------------------------------------------
1040 4.12. How can Privoxy filter Secure (HTTPS) URLs?
1042 Since secure HTTP connections are encrypted SSL sessions between your browser
1043 and the secure site, and are meant to be reliably secure, there is little that
1044 Privoxy can do but hand the raw gibberish data though from one end to the other
1047 The only exception to this is blocking by host patterns, as the client needs to
1048 tell Privoxy the name of the remote server, so that Privoxy can establish the
1049 connection. If that name matches a host-only pattern, the connection will be
1052 As far as ad blocking is concerned, this is less of a restriction than it may
1053 seem, since ad sources are often identifiable by the host name, and often the
1054 banners to be placed in an encrypted page come unencrypted nonetheless for
1055 efficiency reasons, which exposes them to the full power of Privoxy's ad
1058 "Content cookies" (those that are embedded in the actual HTML or JS page
1059 content, see filter{content-cookies}), in an SSL transaction will be impossible
1060 to block under these conditions. Fortunately, this does not seem to be a very
1061 common scenario since most cookies come by traditional means.
1063 -------------------------------------------------------------------------------
1065 4.13. Privoxy runs as a "server". How secure is it? Do I need to take any
1066 special precautions?
1068 There are no known exploits that might affect Privoxy. On Unix-like systems,
1069 Privoxy can run as a non-privileged user, which is how we recommend it be run.
1070 Also, by default Privoxy only listens to requests from "localhost" only. The
1071 server aspect of Privoxy is not itself directly exposed to the Internet in this
1072 configuration. If you want to have Privoxy serve as a LAN proxy, this will have
1073 to be opened up to allow for LAN requests. In this case, we'd recommend you
1074 specify only the LAN gateway address, e.g. 192.168.1.1, in the main Privoxy
1075 configuration file and check all access control and security options. All LAN
1076 hosts can then use this as their proxy address in the browser proxy
1077 configuration, but Privoxy will not listen on any external interfaces. ACLs can
1078 be defined in addition, and using a firewall is always good too. Better safe
1081 -------------------------------------------------------------------------------
1083 4.14. How can I temporarily disable Privoxy?
1085 The easiest way is to access Privoxy with your browser by using the remote
1086 toggle URL: http://config.privoxy.org/toggle. See the Bookmarklets section of
1087 the User Manual for an easy way to access this feature.
1089 -------------------------------------------------------------------------------
1091 4.15. When "disabled" is Privoxy totally out of the picture?
1093 No, this just means all filtering and actions are disabled. Privoxy is still
1094 acting as a proxy, but just not doing any of the things that Privoxy would
1095 normally be expected to do. It is still a "middle-man" in the interaction
1096 between your browser and web sites.
1098 -------------------------------------------------------------------------------
1100 4.16. My logs show Privoxy "crunches" ads, but also its own CGI pages. What is
1103 A "crunch" simply means Privoxy intercepted something, nothing more. Often this
1104 is indeed ads or banners, but Privoxy uses the same mechanism for trapping
1105 requests for its own internal pages. For instance, a request for Privoxy's
1106 configuration page at: http://config.privoxy.org, is intercepted (i.e. it does
1107 not go out to the 'net), and the familiar CGI configuration is returned to the
1108 browser, and the log consequently will show a "crunch".
1110 -------------------------------------------------------------------------------
1112 4.17. Can Privoxy effect files that I download from a webserver? FTP server?
1114 From the webserver's perspective, there is no difference between viewing a
1115 document (i.e. a page), and downloading a file. The same is true of Privoxy. If
1116 there is a match for a block pattern, it will still be blocked, and of course
1119 Filtering is potentially more of a concern since the results are not always so
1120 obvious, and the effects of filtering are there whether the file is simply
1121 viewed, or downloaded. And potentially whether the content is some obnoxious
1122 advertizement, or Mr. Jimmy's latest/greatest source code jewel. Of course, one
1123 of these presumably is "bad" content that we don't want, and the other is
1124 "good" content that we do want. Privoxy is blind to the differences, and can
1125 only distinguish "good from bad" by the configuration parameters we give it.
1127 Privoxy knows the differences in files according to the "Document Type" as
1128 reported by the webserver. If this is reported accurately (e.g. "application/
1129 zip" for a zip archive), then Privoxy knows to ignore these where appropriate.
1130 Privoxy potentially can filter HTML as well as plain text documents, subject to
1131 configuration parameters of course. Also, documents that are of an unknown type
1132 (generally assumed to be "text/plain") can be filtered, as will those that
1133 might be incorrectly reported by the webserver. If such a file is a downloaded
1134 file that is intended to be saved to disk, then any content that might have
1135 been altered by filtering, will be saved too, for these (probably rare) cases.
1137 Note that versions later than 3.0.2 do NOT filter document types of "text/
1138 plain". Prior to this, Privoxy did filter this document type.
1140 In short, filtering is "ON" if a) the Document Type as reported by the
1141 webserver is appropriate and b) the configuration allows it (or at least does
1142 not disallow it). That's it. There is no magic cookie anywhere to say this is
1143 "good" and this is "bad". It's the configuration that let's it all happen or
1146 If you download text files, you probably do not want these to be filtered,
1147 particularly if the content is source code, or other critical content. Source
1148 code sometimes might be mistaken for Javascript (i.e. the kind that might open
1149 a pop-up window). It is recommended to turn off filtering for download sites
1150 (particularly if the content may be plain text files and you are using version
1151 3.0.2 or earlier) in your user.action file. And also, for any site or page
1152 where making any changes at all to the content is to be avoided.
1154 Privoxy does not do FTP at all, only HTTP protocols, so please don't even try.
1156 -------------------------------------------------------------------------------
1158 4.18. I just downloaded a Perl script, and Privoxy altered it! Yikes, what is
1163 -------------------------------------------------------------------------------
1165 4.19. Where can I find more information about Privoxy and related issues?
1167 Other references and sites of interest to Privoxy users:
1169 http://www.privoxy.org/, the Privoxy Home page.
1171 http://www.privoxy.org/faq/, the Privoxy FAQ.
1173 http://sourceforge.net/projects/ijbswa/, the Project Page for Privoxy on
1176 http://config.privoxy.org/, the web-based user interface. Privoxy must be
1177 running for this to work. Shortcut: http://p.p/
1179 http://www.privoxy.org/actions/, to submit "misses" to the developers.
1181 http://cvs.sourceforge.net/cgi-bin/viewcvs.cgi/ijbswa/contrib/, cool and fun
1182 ideas from Privoxy users.
1184 http://www.junkbusters.com/ht/en/cookies.html, an explanation how cookies are
1185 used to track web users.
1187 http://www.junkbusters.com/ijb.html, the original Internet Junkbuster.
1189 http://www.waldherr.org/junkbuster/, Stefan Waldherr's version of Junkbuster,
1190 from which Privoxy was derived.
1192 http://privacy.net/analyze/, a useful site to check what information about you
1193 is leaked while you browse the web.
1195 http://www.squid-cache.org/, a very popular caching proxy, which is often used
1196 together with Privoxy.
1198 http://www.privoxy.org/developer-manual/, the Privoxy developer manual.
1200 -------------------------------------------------------------------------------
1202 4.20. I've noticed that Privoxy changes "Microsoft" to "MicroSuck"! Why are you
1203 manipulating my browsing?
1205 We're not. The text substitutions that you are seeing are disabled in the
1206 default configuration as shipped. You have either manually activated the "fun"
1207 filter which is clearly labeled "Text replacements for subversive browsing fun!
1208 " or you have implicitly activated it by choosing the "Adventuresome" profile
1209 in the web-based editor (formerly known as the Advanced profile).
1211 -------------------------------------------------------------------------------
1215 5.1. I just upgraded and am getting "connection refused" with every web page?
1217 Either Privoxy is not running, or your browser is configured for a different
1218 port than what Privoxy is using.
1220 The old Privoxy (and also Junkbuster) used port 8000 by default. This has been
1221 changed to port 8118 now, due to a conflict with NAS (Network Audio Service),
1222 which uses port 8000. If you haven't, you need to change your browser to the
1223 new port number, or alternately change the listen-address option in Privoxy's
1224 main configuration file.
1226 -------------------------------------------------------------------------------
1228 5.2. I just added a new rule, but the steenkin ad is still getting through.
1231 If the ad had been displayed before you added its URL, it will probably be held
1232 in the browser's cache for some time, so it will be displayed without the need
1233 for any request to the server, and Privoxy will not be in the picture. The best
1234 thing to do is try flushing the browser's caches. And then try again.
1236 If this doesn't help, you probably have an error in the rule you applied. Try
1237 pasting the full URL of the offending ad into http://config.privoxy.org/
1238 show-url-info and see if it really matches your new rule.
1240 -------------------------------------------------------------------------------
1242 5.3. One of my favorite sites does not work with Privoxy. What can I do?
1244 First verify that it is indeed a Privoxy problem, by toggling off Privoxy
1245 through http://config.privoxy.org/toggle, and then shift-reloading the problem
1246 page (i.e. holding down the shift key while clicking reload. Alternatively,
1247 flush your browser's disk and memory caches).
1249 If still a problem, go to http://config.privoxy.org/show-url-info and paste the
1250 full URL of the page in question into the prompt. See which actions are being
1251 applied to the URL, and which matches in which actions files are responsible
1252 for that. Now, armed with this information, go to http://config.privoxy.org/
1253 show-status and select the appropriate actions files for editing.
1255 You can now either look for a section which disables the actions that you
1256 suspect to cause the problem and add a pattern for your site there, or make up
1257 a completely new section for your site. In any case, the recommended way is to
1258 disable only the prime suspect, reload the problem page, and only if the
1259 problem persists, disable more and more actions until you have identified the
1260 culprit. You may or may not want to turn the other actions on again. Remember
1261 to flush your browser's caches in between any such changes!
1263 Alternately, if you are comfortable with a text editor, you can accomplish the
1264 same thing by editing the appropriate actions file. Probably the easiest way to
1265 deal with such problems when editing by hand is to add your site to a { fragile
1266 } section in user.action, which is an alias that turns off most "dangerous"
1267 actions, but is also likely to turn off more actions then needed, and thus
1268 lower your privacy and protection more than necessary,
1270 Troubleshooting actions is discussed in more detail in the user-manual appendix
1271 . There is also an actions tutorial.
1273 -------------------------------------------------------------------------------
1275 5.4. After installing Privoxy, I have to log in every time I start IE. What
1278 This is a quirk that effects the installation of Privoxy, in conjunction with
1279 Internet Explorer and Internet Connection Sharing on Windows 2000 and Windows
1280 XP. The symptoms may appear to be corrupted or invalid DUN settings, or
1283 When setting up an NT based Windows system with Privoxy you may find that
1284 things do not seem to be doing what you expect. When you set your system up you
1285 will probably have set up Internet Connection Sharing (ICS) with Dial up
1286 Networking (DUN) when logged in with administrator privileges. You will
1287 probably have made this DUN connection available to other accounts that you may
1288 have set-up on your system. E.g. Mum or Dad sets up the system and makes
1289 accounts suitably configured for the kids.
1291 When setting up Privoxy in this environment you will have to alter the proxy
1292 set-up of Internet Explorer (IE) for the specific DUN connection on which you
1293 wish to use Privoxy. When you do this the ICS DUN set-up becomes user specific.
1294 In this instance you will see no difference if you change the DUN connection
1295 under the account used to set-up the connection. However when you do this from
1296 another user you will notice that the DUN connection changes to make available
1297 to "Me only". You will also find that you have to store the password under each
1300 The reason for this is that each user's set-up for IE is user specific. Each
1301 set-up DUN connection and each LAN connection in IE store the settings for each
1302 user individually. As such this enforces individual configurations rather than
1303 common ones. Hence the first time you use a DUN connection after re-booting
1304 your system it may not perform as you expect, and prompt you for the password.
1305 Just set and save the password again and all should be OK.
1307 [Thanks to Ray Griffith for this submission.]
1309 -------------------------------------------------------------------------------
1311 5.5. I cannot connect to any FTP sites. Privoxy seems to be blocking me.
1313 Privoxy cannot act as a proxy for FTP traffic, so do not configure your browser
1314 to use Privoxy as an FTP proxy. The same is true for any protocol other than
1317 Most browsers understand FTP as well as HTTP. If you connect to a site, with a
1318 URL like ftp://ftp.example.com, your browser is making an FTP connection, and
1319 not a HTTP connection. So while your browser may speak FTP, Privoxy does not,
1320 and cannot proxy such traffic.
1322 To complicate matters, some systems may have a generic "proxy" setting, which
1323 will silently enable both HTTP and FTP proxying! So it is possible to
1324 accidentally enable FTP proxying in these cases. And of course, if this
1325 happens, Privoxy will indeed cause problems since it does not know FTP.
1327 Will Privoxy ever proxy FTP traffic? Unlikely. There just is not much reason,
1328 and the work to make this happen is more than it may seem.
1330 -------------------------------------------------------------------------------
1332 5.6. In Mac OSX, I can't configure Microsoft Internet Explorer to use Privoxy
1335 Microsoft Internet Explorer (in versions like 5.1) respects system-wide network
1336 settings. In order to change the HTTP proxy, open System Preferences, and click
1337 on the Network icon. In the settings pane that comes up, click on the Proxies
1338 tab. Ensure the "Web Proxy (HTTP)" checkbox is checked and enter 127.0.0.1 in
1339 the entry field. Enter 8118 in the Port field. The next time you start IE, it
1340 should reflect these values.
1342 -------------------------------------------------------------------------------
1344 5.7. In Mac OSX, I dragged the Privoxy folder to the trash in order to
1345 uninstall it. Now the finder tells me I don't have sufficient privileges to
1348 Just dragging the Privoxy folder to the trash is not enough to delete it.
1349 Privoxy supplies an uninstall.command file that takes care of these details.
1350 Open the trash, drag the uninstall.command file out of the trash and
1351 double-click on it. You will be prompted for confirmation and the
1352 administration password.
1354 The trash may still appear full after this command; emptying the trash from the
1355 desktop should make it appear empty again.
1357 -------------------------------------------------------------------------------
1359 5.8. In Mac OSX Panther (10.3), images often fail to load and/or I experience
1360 random delays in page loading. I'm using localhost as my browser's proxy
1363 We believe this is due to an IPv6-related bug in OSX, but don't fully
1364 understand the issue yet. In any case, changing the proxy setting to 127.0.0.1
1365 instead of localhost works around the problem.
1367 -------------------------------------------------------------------------------
1369 5.9. I get a completely blank page at one site. "View Source" shows only:
1370 <html><body></body></html>. Without Privoxy the page loads fine.
1372 Chances are that the site suffers from a bug in PHP, which results in empty
1373 pages being sent if the client explicitly requests an uncompressed page, like
1374 Privoxy does. This bug has been fixed in PHP 4.2.3.
1376 To find out if this is in fact the source of the problem, try adding the site
1377 to a -prevent-compression section in user.action:
1379 # Make exceptions for ill-behaved sites:
1381 {-prevent-compression}
1385 If that works, you may also want to report the problem to the site's
1386 webmasters, telling them to use zlib.output_compression instead of ob_gzhandler
1387 in their PHP applications (workaround) or upgrade to PHP 4.2.3 or later (fix).
1389 -------------------------------------------------------------------------------
1391 5.10. Why am I getting a 503 Error (WSAECONNREFUSED) on every page?
1393 More than likely this is a problem with the network stack. ZoneAlarm has been
1394 reported to cause this symptom -- even if not running. The solution is to
1395 either fight the ZA configuration, or uninstall ZoneAlarm, and then find
1396 something better behaved in its place. Other firewall type products may cause
1397 similar type problems if not configured correctly.
1399 -------------------------------------------------------------------------------
1401 5.11. My logs show many "Unable to get my own hostname" lines. Why?
1403 Privoxy tries to get the hostname of the system its running on from the IP
1404 address of the system interface it is bound to (from the config file
1405 listen-address setting). If the system cannot supply this information, Privoxy
1406 logs this condition.
1408 Typically, this would be considered a system configuration error. It is not a
1409 fatal error to Privoxy however, but may result in a much slower response from
1410 Privoxy due to DNS timeouts.
1412 -------------------------------------------------------------------------------
1414 5.12. When I try to launch Privoxy, I get an error message "port 8118 is
1415 already in use" (or similar wording). Why?
1417 Port 8118 is Privoxy's default TCP "listening" port. Typically this message
1418 would mean that there is already one instance of Privoxy running, and you are
1419 actually trying to start a second Privoxy on the same port, which will not
1420 work. How and why this might happen varies from platform to platform, but you
1421 need to check your installation and start-up procedures.
1423 -------------------------------------------------------------------------------
1425 5.13. Pages with UTF-8 fonts are garbled.
1427 This is caused by the "demoronizer" filter, which was introduced in version
1428 3.0.2, and was inappropriately turned on by default. You should either upgrade
1429 Privoxy, or at least upgrade to the most recent default.action file available
1430 from SourceForge. Or you can simply disable the demoronizer filter.
1432 -------------------------------------------------------------------------------
1434 5.14. Why are binary files (such as images) corrupted when Privoxy is used?
1436 This may also be caused by the "demoronizer" filter, in conjunction with a web
1437 server that is misreporting a file type. Binary files are exempted from
1438 Privoxy's filtering (unless the web server by mistake says the file is a plain
1439 text file). Either upgrade Privoxy, or go to the most recent default.action
1440 file available from SourceForge.
1442 -------------------------------------------------------------------------------
1444 5.15. What is the "demoronizer" and why is it there?
1446 The original demoronizer was a Perl script that cleaned up HTML pages which
1447 were created with certain Microsoft products. MS has used proprietary
1448 extensions to standardized font encodings (ISO 8859-1), which has caused
1449 problems for pages that are viewed with non-Microsoft products (and are
1450 expecting to see a standard set of fonts). The demoronizer corrected these
1451 errors so the pages displayed correctly. Privoxy borrowed from this script,
1452 introducing a filter based on the original demoronizer, which in turn could
1453 correct these errors on the fly.
1455 But this is only needed in some situations, and will cause serious problems in
1456 some other situations.
1458 If you are using Microsoft products, you do not need it. If you need to view
1459 pages with UTF-8 characters (such as Cyrillic or Chinese), then it will cause
1460 corruption of the fonts, and thus should not be on.
1462 On the other hand, if you use non-Microsoft products, and you occasionally
1463 notice wierd characters on pages, you might want to try it.
1465 This filter was introduced with version 3.0.2 of Privoxy, and was on by default
1466 in that version. It is off in all subsequent versions (unless turned on by the
1469 -------------------------------------------------------------------------------
1471 5.16. Why do I keep seeing "PrivoxyWindowOpen()" in raw source code?
1473 Privoxy is attempting to disable malicious Javascript in this case, with the
1474 unsolicited-popups filter. Privoxy cannot tell very well "good" code snippets
1475 from "bad" code snippets.
1477 If you see this in HTML source, and the page displays without problems, then
1478 this is good, and likely some pop-up window was disabled. If you see this where
1479 it is causing a problem, such as a downloaded program source code file, then
1480 you should set an exception for this site or page such that the integrity of
1481 the page stays in tact by disabling all filtering.
1483 -------------------------------------------------------------------------------
1485 6. Contacting the developers, Bug Reporting and Feature Requests
1487 We value your feedback. In fact, we rely on it to improve Privoxy and its
1488 configuration. However, please note the following hints, so we can provide you
1489 with the best support:
1491 -------------------------------------------------------------------------------
1495 For casual users, our support forum at SourceForge is probably best suited:
1496 http://sourceforge.net/tracker/?group_id=11118&atid=211118
1498 All users are of course welcome to discuss their issues on the users mailing
1499 list, where the developers also hang around.
1501 -------------------------------------------------------------------------------
1505 Please report all bugs only through our bug tracker: http://sourceforge.net/
1506 tracker/?group_id=11118&atid=111118.
1508 Before doing so, please make sure that the bug has not already been submitted
1509 and observe the additional hints at the top of the submit form.
1511 Please try to verify that it is a Privoxy bug, and not a browser or site bug
1512 first. If unsure, try toggling off Privoxy, and see if the problem persists.
1513 The appendix of the user manual also has helpful information on action
1514 debugging. If you are using your own custom configuration, please try the stock
1515 configs to see if the problem is configuration related.
1517 If not using the latest version, chances are that the bug has been found and
1518 fixed in the meantime. We would appreciate if you could take the time to
1519 upgrade to the latest version (or even the latest CVS snapshot) and verify your
1520 bug, but this is not required for reporting.
1522 -------------------------------------------------------------------------------
1524 6.3. Request New Features
1526 You are welcome to submit ideas on new features or other proposals for
1527 improvement through our feature request tracker at http://sourceforge.net/
1528 tracker/?atid=361118&group_id=11118.
1530 -------------------------------------------------------------------------------
1532 6.4. Report Ads or Other Actions-Related Problems
1534 Please send feedback on ads that slipped through, innocent images that were
1535 blocked, and any other problems relating to the default.action file through our
1536 actions feedback mechanism located at http://www.privoxy.org/actions/. On this
1537 page, you will also find a bookmark which will take you back there from any
1538 troubled site and even pre-fill the form!
1540 New, improved default.action files will occasionally be made available based on
1541 your feedback. These will be announced on the ijbswa-announce list and
1542 available from our the files section of our project page.
1544 -------------------------------------------------------------------------------
1548 For any other issues, feel free to use the mailing lists. Technically
1549 interested users and people who wish to contribute to the project are also
1550 welcome on the developers list! You can find an overview of all Privoxy-related
1551 mailing lists, including list archives, at: http://sourceforge.net/mail/?
1554 -------------------------------------------------------------------------------
1556 7. Privoxy Copyright, License and History
1558 Copyright © 2001 - 2004 by Privoxy Developers <developers@privoxy.org>
1560 Some source code is based on code Copyright © 1997 by Anonymous Coders and
1561 Junkbusters, Inc. and licensed under the GNU General Public License.
1563 Portions of this document are "borrowed" from the original Junkbuster (tm) FAQ,
1564 and modified as appropriate for Privoxy.
1566 -------------------------------------------------------------------------------
1570 Privoxy is free software; you can redistribute it and/or modify it under the
1571 terms of the GNU General Public License, version 2, as published by the Free
1572 Software Foundation.
1574 This program is distributed in the hope that it will be useful, but WITHOUT ANY
1575 WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
1576 PARTICULAR PURPOSE. See the GNU General Public License for more details, which
1577 is available from the Free Software Foundation, Inc, 59 Temple Place - Suite
1578 330, Boston, MA 02111-1307, USA.
1580 You should have received a copy of the GNU General Public License along with
1581 this program; if not, write to the
1584 Foundation, Inc. 59 Temple Place - Suite 330
1585 Boston, MA 02111-1307
1588 -------------------------------------------------------------------------------
1592 In the beginning, there was the Internet Junkbuster, by Anonymous Coders and
1593 Junkbusters Corporation. It saved many users a lot of pain in the early days of
1594 web advertising and user tracking.
1596 But the web, its protocols and standards, and with it, the techniques for
1597 forcing users to consume ads, give up autonomy over their browsing, and for
1598 spying on them, kept evolving. Unfortunately, the Internet Junkbuster did not.
1599 Version 2.0.2, published in 1998, was (and is) the last official release
1600 available from Junkbusters Corporation. Fortunately, it had been released under
1601 the GNU GPL, which allowed further development by others.
1603 So Stefan Waldherr started maintaining an improved version of the software, to
1604 which eventually a number of people contributed patches. It could already
1605 replace banners with a transparent image, and had a first version of pop-up
1606 killing, but it was still very closely based on the original, with all its
1607 limitations, such as the lack of HTTP/1.1 support, flexible per-site
1608 configuration, or content modification. The last release from this effort was
1609 version 2.0.2-10, published in 2000.
1611 Then, some developers picked up the thread, and started turning the software
1612 inside out, upside down, and then reassembled it, adding many new features
1615 The result of this is Privoxy, whose first stable version, 3.0, was released