2 File : doc/source/p-config.sgml
4 Purpose : Used with other docs and files only.
6 Copyright (C) 2001-2021 Privoxy Developers https://www.privoxy.org/
9 ========================================================================
10 NOTE: Please read developer-manual/documentation.html before touching
11 anything in this, or other Privoxy documentation.
12 ========================================================================
15 This file contains all the config file comments and options. It used to
16 build both the user-manual config sections, and all of config (yes, the main
19 Rationale: This is broken up into two files since a file with a prolog
20 (DTD, etc) cannot be sourced as a secondary file. config.sgml is basically
21 a wrapper for this file.
25 OPTIONS: The actual options are included in this file and prefixed with
26 '@@', and processed by the Makefile to strip the '@@'. Default options
27 that should appear commented out should be listed as: '@@#OPTION'.
28 Otherwise, as '@@OPTION'. Example:
30 @@listen-address 127.0.0.1:8118
32 The Makefile does significant other processing too. The final results
33 should be checked to make sure that the perl processing does not
34 fubar something!!! Makefile processing requires w3m, fmt (shell line
38 This file is included into:
41 config (the actual Privoxy config file)
46 <!-- This part only goes into user-manual -->
48 <title>The Main Configuration File</title>
51 By default, the main configuration file is named <filename>config</filename>,
52 with the exception of Windows, where it is named <filename>config.txt</filename>.
53 Configuration lines consist of an initial keyword followed by a list of
54 values, all separated by whitespace (any number of spaces or tabs). For
59 <emphasis>confdir /etc/privoxy</emphasis>
63 Assigns the value <literal>/etc/privoxy</literal> to the option
64 <literal>confdir</literal> and thus indicates that the configuration
65 directory is named <quote>/etc/privoxy/</quote>.
69 All options in the config file except for <literal>confdir</literal> and
70 <literal>logdir</literal> are optional. Watch out in the below description
71 for what happens if you leave them unset.
75 The main config file controls all aspects of <application>Privoxy</application>'s
76 operation that are not location dependent (i.e. they apply universally, no matter
77 where you may be surfing). Like the filter and action files, the config file is
78 a plain text file and can be modified with a text editor like emacs, vim or
86 <!-- This part only goes into the config file -->
89 @@TITLE<!-- between the @@ is stripped by Makefile -->@@
90 Sample Configuration File for Privoxy &p-version;
93 Copyright (C) 2001-2021 Privoxy Developers https://www.privoxy.org/
97 ##################################################################
102 II. FORMAT OF THE CONFIGURATION FILE #
104 1. LOCAL SET-UP DOCUMENTATION #
105 2. CONFIGURATION AND LOG FILE LOCATIONS #
107 4. ACCESS CONTROL AND SECURITY #
110 7. HTTPS INSPECTION (EXPERIMENTAL) #
111 8. WINDOWS GUI OPTIONS #
113 ##################################################################
121 This file holds Privoxy's main configuration. Privoxy detects
122 configuration changes automatically, so you don't have to restart it
123 unless you want to load a different configuration file.
126 The configuration will be reloaded with the first request after the
127 change was done, this request itself will still use the old configuration,
128 though. In other words: it takes two requests before you see the result of
129 your changes. Requests that are dropped due to ACL don't trigger reloads.
132 When starting Privoxy on Unix systems, give the location of this
133 file as last argument. On Windows systems, Privoxy will look for
134 this file with the name 'config.txt' in the current working directory
135 of the Privoxy process.
139 <literallayout><!-- funky spacing -->
141 II. FORMAT OF THE CONFIGURATION FILE
142 ====================================</literallayout>
145 Configuration lines consist of an initial keyword followed by a list
146 of values, all separated by whitespace (any number of spaces or
150 actionsfile default.action
153 Indicates that the actionsfile is named 'default.action'.
156 The '#' indicates a comment. Any part of a line following a '#' is
157 ignored, except if the '#' is preceded by a '\'.
160 Thus, by placing a # at the start of an existing configuration line,
161 you can make it a comment and it will be treated as if it weren't there.
162 This is called "commenting out" an option and can be useful. Removing
163 the # again is called "uncommenting".
166 Note that commenting out an option and leaving it at its default
167 are two completely different things! Most options behave very
168 differently when unset. See the "Effect if unset" explanation
169 in each option's description for details.
172 Long lines can be continued on the next line by using a `\' as
178 <!-- ************************************************ -->
179 <!-- The following is common to both outputs (mostly) -->
180 <!-- ************************************************ -->
184 <!-- ~~~~~ New section ~~~~~ -->
185 <sect2 id="local-set-up">
186 <title>Local Set-up Documentation</title>
189 If you intend to operate <application>Privoxy</application> for more users
190 than just yourself, it might be a good idea to let them know how to reach
191 you, what you block and why you do that, your policies, etc.
195 <!-- ~~~~~ New section ~~~~~ -->
196 <sect3 renderas="sect4" id="user-manual"><title>user-manual</title>
199 <term>Specifies:</term>
202 Location of the <application>Privoxy</application> User Manual.
207 <term>Type of value:</term>
209 <para>A fully qualified URI</para>
213 <term>Default value:</term>
215 <para><emphasis>Unset</emphasis></para>
219 <term>Effect if unset:</term>
222 <ulink url="https://www.privoxy.org/user-manual/">https://www.privoxy.org/<replaceable class="parameter">version</replaceable>/user-manual/</ulink>
223 will be used, where <replaceable class="parameter">version</replaceable> is the <application>Privoxy</application> version.
231 The User Manual URI is the single best source of information on
232 <application>Privoxy</application>, and is used for help links from some
233 of the internal CGI pages. The manual itself is normally packaged with the
234 binary distributions, so you probably want to set this to a locally
242 Unix, in local filesystem (may not work with all browsers):
244 <screen>user-manual file:///usr/share/doc/privoxy-&p-version;/user-manual/</screen>
246 Windows, in local filesystem, <emphasis>must</emphasis> use forward slash notation:
248 <screen>user-manual file:/c:/some-dir/privoxy-&p-version;/user-manual/</screen>
250 Windows, UNC notation (with forward slashes):
252 <screen>user-manual file://///some-server/some-path/privoxy-&p-version;/user-manual/</screen>
255 The best all purpose solution is simply to put the full local
256 <literal>PATH</literal> to where the <citetitle>User Manual</citetitle> is
259 <screen>user-manual /usr/share/doc/privoxy/user-manual</screen>
261 The User Manual is then available to anyone with access to
262 <application>Privoxy</application>, by following the built-in URL:
263 <literal>http://config.privoxy.org/user-manual/</literal>
264 (or the shortcut: <literal>http://p.p/user-manual/</literal>).
267 If the documentation is not on the local system, it can be accessed
268 from a remote server, as:
270 <screen>user-manual http://example.com/privoxy/user-manual/</screen>
272 <!-- this gets hammered in conversion to config. Text repeated below. -->
275 If set, this option should be <emphasis>the first option in the config
276 file</emphasis>, because it is used while the config file is being read
289 If set, this option should be the first option in the config
290 file, because it is used while the config file is being read.
299 <![%config-file;[<literallayout>@@#user-manual https://www.privoxy.org/user-manual/</literallayout>]]>
303 <!-- ~~~~~ New section ~~~~~ -->
304 <sect3 renderas="sect4" id="trust-info-url"><title>trust-info-url</title>
308 <term>Specifies:</term>
311 A URL to be displayed in the error page that users will see if access to an untrusted page is denied.
316 <term>Type of value:</term>
322 <term>Default value:</term>
324 <para><emphasis>Unset</emphasis></para>
328 <term>Effect if unset:</term>
331 No links are displayed on the "untrusted" error page.
339 The value of this option only matters if the experimental trust mechanism has been
340 activated. (See <link linkend="trustfile"><emphasis>trustfile</emphasis></link> below.)
343 If you use the trust mechanism, it is a good idea to write up some on-line
344 documentation about your trust policy and to specify the URL(s) here.
345 Use multiple times for multiple URLs.
348 The URL(s) should be added to the trustfile as well, so users don't end up
349 locked out from the information on why they were locked out in the first place!
355 <![%config-file;[<literallayout>@@#trust-info-url http://www.example.com/why_we_block.html</literallayout>]]>
356 <![%config-file;[<literallayout>@@#trust-info-url http://www.example.com/what_we_allow.html</literallayout>]]>
360 <!-- ~~~~~ New section ~~~~~ -->
361 <sect3 renderas="sect4" id="admin-address"><title>admin-address</title>
365 <term>Specifies:</term>
368 An email address to reach the <application>Privoxy</application> administrator.
373 <term>Type of value:</term>
375 <para>Email address</para>
379 <term>Default value:</term>
381 <para><emphasis>Unset</emphasis></para>
385 <term>Effect if unset:</term>
388 No email address is displayed on error pages and the CGI user interface.
396 If both <literal>admin-address</literal> and <literal>proxy-info-url</literal>
397 are unset, the whole "Local Privoxy Support" box on all generated pages will
404 <![%config-file;[<literallayout>@@#admin-address privoxy-admin@example.com</literallayout>]]>
408 <!-- ~~~~~ New section ~~~~~ -->
409 <sect3 renderas="sect4" id="proxy-info-url"><title>proxy-info-url</title>
413 <term>Specifies:</term>
416 A URL to documentation about the local <application>Privoxy</application> setup,
417 configuration or policies.
422 <term>Type of value:</term>
428 <term>Default value:</term>
430 <para><emphasis>Unset</emphasis></para>
434 <term>Effect if unset:</term>
437 No link to local documentation is displayed on error pages and the CGI user interface.
445 If both <literal>admin-address</literal> and <literal>proxy-info-url</literal>
446 are unset, the whole "Local Privoxy Support" box on all generated pages will
450 This URL shouldn't be blocked ;-)
456 <![%config-file;[<literallayout>@@#proxy-info-url http://www.example.com/proxy-service.html</literallayout>]]>
460 <!-- ~ End section ~ -->
464 <!-- ~~~~~ New section ~~~~~ -->
466 <sect2 id="conf-log-loc">
467 <title>Configuration and Log File Locations</title>
470 <application>Privoxy</application> can (and normally does) use a number of
471 other files for additional configuration, help and logging.
472 This section of the configuration file tells <application>Privoxy</application>
473 where to find those other files.
477 The user running <application>Privoxy</application>, must have read
478 permission for all configuration files, and write permission to any files
479 that would be modified, such as log files and actions files.
483 <!-- ~~~~~ New section ~~~~~ -->
484 <sect3 renderas="sect4" id="confdir"><title>confdir</title>
488 <term>Specifies:</term>
490 <para>The directory where the other configuration files are located.</para>
494 <term>Type of value:</term>
496 <para>Path name</para>
500 <term>Default value:</term>
502 <para>/etc/privoxy (Unix) <emphasis>or</emphasis> <application>Privoxy</application> installation dir (Windows) </para>
506 <term>Effect if unset:</term>
508 <para><emphasis>Mandatory</emphasis></para>
515 No trailing <quote><literal>/</literal></quote>, please.
521 <![%config-file;[<literallayout>@@confdir .</literallayout>]]>
524 <!-- ~~~~~ New section ~~~~~ -->
525 <sect3 renderas="sect4" id="templdir"><title>templdir</title>
529 <term>Specifies:</term>
531 <para>An alternative directory where the templates are loaded from.</para>
535 <term>Type of value:</term>
537 <para>Path name</para>
541 <term>Default value:</term>
547 <term>Effect if unset:</term>
549 <para>The templates are assumed to be located in confdir/template.</para>
556 <application>Privoxy's</application> original templates are usually
557 overwritten with each update. Use this option to relocate customized
558 templates that should be kept. As template variables might change
559 between updates, you shouldn't expect templates to work with
560 <application>Privoxy</application> releases other than the one
561 they were part of, though.
567 <![%config-file;[<literallayout>@@#templdir .</literallayout>]]>
571 <!-- ~~~~~ New section ~~~~~ -->
572 <sect3 renderas="sect4" id="temporary-directory"><title>temporary-directory</title>
576 <term>Specifies:</term>
578 <para>A directory where Privoxy can create temporary files.</para>
582 <term>Type of value:</term>
584 <para>Path name</para>
588 <term>Default value:</term>
594 <term>Effect if unset:</term>
596 <para>No temporary files are created, external filters don't work.</para>
603 To execute <literal><ulink url="actions-file.html#EXTERNAL-FILTER">external filters</ulink></literal>,
604 <application>Privoxy</application> has to create temporary files.
605 This directive specifies the directory the temporary files should
609 It should be a directory only <application>Privoxy</application>
610 (and trusted users) can access.
616 <![%config-file;[<literallayout>@@#temporary-directory .</literallayout>]]>
620 <!-- ~~~~~ New section ~~~~~ -->
621 <sect3 renderas="sect4" id="logdir"><title>logdir</title>
625 <term>Specifies:</term>
628 The directory where all logging takes place
629 (i.e. where the <filename>logfile</filename> is located).
634 <term>Type of value:</term>
636 <para>Path name</para>
640 <term>Default value:</term>
642 <para>/var/log/privoxy (Unix) <emphasis>or</emphasis> <application>Privoxy</application> installation dir (Windows) </para>
646 <term>Effect if unset:</term>
648 <para><emphasis>Mandatory</emphasis></para>
655 No trailing <quote><literal>/</literal></quote>, please.
661 <![%config-file;[<literallayout>@@logdir .</literallayout>]]>
665 <!-- ~~~~~ New section ~~~~~ -->
666 <sect3 renderas="sect4" id="actionsfile"><title>
669 <anchor id="default.action">
670 <anchor id="standard.action">
671 <anchor id="user.action">
672 <!-- Note: slightly modified this section 04/28/02, hal. See NOTE. -->
675 <term>Specifies:</term>
678 The <link linkend="actions-file">actions file(s)</link> to use
683 <term>Type of value:</term>
685 <para>Complete file name, relative to <literal>confdir</literal></para>
689 <term>Default values:</term>
693 <msgtext><literallayout> match-all.action # Actions that are applied to all sites and maybe overruled later on.</literallayout></msgtext>
696 <msgtext><literallayout> default.action # Main actions file</literallayout></msgtext>
699 <msgtext><literallayout> user.action # User customizations</literallayout></msgtext>
705 <term>Effect if unset:</term>
708 No actions are taken at all. More or less neutral proxying.
716 Multiple <literal>actionsfile</literal> lines are permitted, and are in fact recommended!
719 The default values are <filename>default.action</filename>, which is the
720 <quote>main</quote> actions file maintained by the developers, and
721 <filename>user.action</filename>, where you can make your personal additions.
724 Actions files contain all the per site and per URL configuration for
725 ad blocking, cookie management, privacy considerations, etc.
731 <!-- NOTE: alternate markup to make a simpler list doesn't work due to -->
732 <!-- html -> text conversion, blah -->
733 <![%config-file;[<literallayout>@@actionsfile match-all.action # Actions that are applied to all sites and maybe overruled later on.</literallayout>]]>
734 <![%config-file;[<literallayout>@@actionsfile default.action # Main actions file</literallayout>]]>
736 XXX: Like user.filter, user.action should probably be commented out
737 by default as not all packages install it into the default directory.
740 <![%config-file;[<literallayout>@@actionsfile user.action # User customizations</literallayout>]]>
741 <![%config-file;[<literallayout>@@#actionsfile regression-tests.action # Tests for privoxy-regression-test</literallayout>]]>
744 <!-- ~~~~~ New section ~~~~~ -->
745 <sect3 renderas="sect4" id="filterfile"><title>filterfile</title>
746 <anchor id="default.filter">
749 <term>Specifies:</term>
752 The <link linkend="filter-file">filter file(s)</link> to use
757 <term>Type of value:</term>
759 <para>File name, relative to <literal>confdir</literal></para>
763 <term>Default value:</term>
765 <para>default.filter (Unix) <emphasis>or</emphasis> default.filter.txt (Windows)</para>
769 <term>Effect if unset:</term>
772 No textual content filtering takes place, i.e. all
773 <literal>+<link linkend="filter">filter</link>{<replaceable class="parameter">name</replaceable>}</literal>
774 actions in the actions files are turned neutral.
782 Multiple <literal>filterfile</literal> lines are permitted.
785 The <link linkend="filter-file">filter files</link> contain content modification
786 rules that use <link linkend="regex">regular expressions</link>. These rules permit
787 powerful changes on the content of Web pages, and optionally the headers
788 as well, e.g., you could try to disable your favorite JavaScript annoyances,
789 re-write the actual displayed text, or just have some fun
790 playing buzzword bingo with web pages.
794 <literal>+<link linkend="filter">filter</link>{<replaceable class="parameter">name</replaceable>}</literal>
795 actions rely on the relevant filter (<replaceable class="parameter">name</replaceable>)
796 to be defined in a filter file!
799 A pre-defined filter file called <filename>default.filter</filename> that contains
800 a number of useful filters for common problems is included in the distribution.
801 See the section on the <literal><link linkend="filter">filter</link></literal>
805 It is recommended to place any locally adapted filters into a separate
806 file, such as <filename>user.filter</filename>.
812 <![%config-file;[<literallayout>@@filterfile default.filter</literallayout>]]>
813 <![%config-file;[<literallayout>@@filterfile user.filter # User customizations</literallayout>]]>
817 <!-- ~~~~~ New section ~~~~~ -->
818 <sect3 renderas="sect4" id="logfile"><title>logfile</title>
822 <term>Specifies:</term>
830 <term>Type of value:</term>
832 <para>File name, relative to <literal>logdir</literal></para>
836 <term>Default value:</term>
838 <para><emphasis>Unset (commented out)</emphasis>. When activated: logfile (Unix) <emphasis>or</emphasis> privoxy.log (Windows).</para>
842 <term>Effect if unset:</term>
845 No logfile is written.
853 The logfile is where all logging and error messages are written. The level
854 of detail and number of messages are set with the <literal>debug</literal>
855 option (see below). The logfile can be useful for tracking down a problem with
856 <application>Privoxy</application> (e.g., it's not blocking an ad you
857 think it should block) and it can help you to monitor what your browser
861 Depending on the debug options below, the logfile may be a privacy risk
862 if third parties can get access to it. As most users will never look
863 at it, <application>Privoxy</application> only logs fatal errors by default.
866 For most troubleshooting purposes, you will have to change that,
867 please refer to the debugging section for details.
870 Any log files must be writable by whatever user <application>Privoxy</application>
871 is being run as (on Unix, default user id is <quote>privoxy</quote>).
874 To prevent the logfile from growing indefinitely, it is recommended to
875 periodically rotate or shorten it. Many operating systems support log
876 rotation out of the box, some require additional software to do it.
877 For details, please refer to the documentation for your operating system.
883 <![%config-file;[<literallayout>@@logfile logfile</literallayout>]]>
887 <!-- ~~~~~ New section ~~~~~ -->
888 <sect3 renderas="sect4" id="trustfile"><title>trustfile</title>
891 <term>Specifies:</term>
894 The name of the trust file to use
899 <term>Type of value:</term>
901 <para>File name, relative to <literal>confdir</literal></para>
905 <term>Default value:</term>
907 <para><emphasis>Unset (commented out)</emphasis>. When activated: trust (Unix) <emphasis>or</emphasis> trust.txt (Windows)</para>
911 <term>Effect if unset:</term>
914 The entire trust mechanism is disabled.
922 The trust mechanism is an experimental feature for building white-lists and should
923 be used with care. It is <emphasis>NOT</emphasis> recommended for the casual user.
926 If you specify a trust file, <application>Privoxy</application> will only allow
927 access to sites that are specified in the trustfile. Sites can be listed
931 Prepending a <literal>~</literal> character limits access to this site
932 only (and any sub-paths within this site), e.g.
933 <literal>~www.example.com</literal> allows access to
934 <literal>~www.example.com/features/news.html</literal>, etc.
937 Or, you can designate sites as <emphasis>trusted referrers</emphasis>, by
938 prepending the name with a <literal>+</literal> character. The effect is that
939 access to untrusted sites will be granted -- but only if a link from this
940 trusted referrer was used to get there. The link target will then be added
941 to the <quote>trustfile</quote> so that future, direct accesses will be
942 granted. Sites added via this mechanism do not become trusted referrers
943 themselves (i.e. they are added with a <literal>~</literal> designation).
944 There is a limit of 512 such entries, after which new entries will not be
948 If you use the <literal>+</literal> operator in the trust file, it may grow
949 considerably over time.
952 It is recommended that <application>Privoxy</application> be compiled with
953 the <literal>--disable-force</literal>, <literal>--disable-toggle</literal> and
954 <literal> --disable-editor</literal> options, if this feature is to be
958 Possible applications include limiting Internet access for children.
965 <![%config-file;[<literallayout>@@#trustfile trust</literallayout>]]>
969 <!-- ~ End section ~ -->
971 <!-- ~~~~~ New section ~~~~~ -->
972 <sect2 id="debugging">
973 <title>Debugging</title>
976 These options are mainly useful when tracing a problem.
977 Note that you might also want to invoke
978 <application>Privoxy</application> with the <literal>--no-daemon</literal>
979 command line option when debugging.
982 <sect3 renderas="sect4" id="debug"><title>debug</title>
986 <term>Specifies:</term>
989 Key values that determine what information gets logged.
994 <term>Type of value:</term>
996 <para>Integer values</para>
1000 <term>Default value:</term>
1002 <para>0 (i.e.: only fatal errors (that cause Privoxy to exit) are logged)</para>
1006 <term>Effect if unset:</term>
1009 Default value is used (see above).
1017 The available debug levels are:
1020 debug 1 # Log the destination for each request. See also debug 1024.
1021 debug 2 # show each connection status
1022 debug 4 # show tagging-related messages
1023 debug 8 # show header parsing
1024 debug 16 # log all data written to the network
1025 debug 32 # debug force feature
1026 debug 64 # debug regular expression filters
1027 debug 128 # debug redirects
1028 debug 256 # debug GIF de-animation
1029 debug 512 # Common Log Format
1030 debug 1024 # Log the destination for requests &my-app; didn't let through, and the reason why.
1031 debug 2048 # CGI user interface
1032 debug 4096 # Startup banner and warnings.
1033 debug 8192 # Non-fatal errors
1034 debug 32768 # log all data read from the network
1035 debug 65536 # Log the applying actions
1038 To select multiple debug levels, you can either add them or use
1039 multiple <literal>debug</literal> lines.
1042 A debug level of 1 is informative because it will show you each request
1043 as it happens. <emphasis>1, 1024, 4096 and 8192 are recommended</emphasis>
1044 so that you will notice when things go wrong. The other levels are
1045 probably only of interest if you are hunting down a specific problem.
1046 They can produce a lot of output (especially 16).
1049 If you are used to the more verbose settings, simply enable the debug lines
1053 If you want to use pure CLF (Common Log Format), you should set <quote>debug
1054 512</quote> <emphasis>ONLY</emphasis> and not enable anything else.
1057 <application>Privoxy</application> has a hard-coded limit for the
1058 length of log messages. If it's reached, messages are logged truncated
1059 and marked with <quote>... [too long, truncated]</quote>.
1062 Please don't file any support requests without trying to reproduce
1063 the problem with increased debug level first. Once you read the log
1064 messages, you may even be able to solve the problem on your own.
1070 <![%config-file;[<literallayout>@@#debug 1 # Log the destination for each request. See also debug 1024.</literallayout>]]>
1071 <![%config-file;[<literallayout>@@#debug 1024 # Log the destination for requests &my-app; didn't let through, and the reason why.</literallayout>]]>
1072 <![%config-file;[<literallayout>@@#debug 4096 # Startup banner and warnings</literallayout>]]>
1073 <![%config-file;[<literallayout>@@#debug 8192 # Non-fatal errors</literallayout>]]>
1077 <!-- ~~~~~ New section ~~~~~ -->
1078 <sect3 renderas="sect4" id="single-threaded"><title>single-threaded</title>
1082 <term>Specifies:</term>
1085 Whether to run only one server thread.
1090 <term>Type of value:</term>
1092 <para><emphasis>1 or 0</emphasis></para>
1096 <term>Default value:</term>
1098 <para><emphasis>0</emphasis></para>
1102 <term>Effect if unset:</term>
1105 Multi-threaded (or, where unavailable: forked) operation, i.e. the ability to
1106 serve multiple requests simultaneously.
1114 This option is only there for debugging purposes.
1115 <emphasis>It will drastically reduce performance.</emphasis>
1121 <![%config-file;[<literallayout>@@#single-threaded 1</literallayout>]]>
1124 <!-- ~~~~~ New section ~~~~~ -->
1125 <sect3 renderas="sect4" id="hostname"><title>hostname</title>
1129 <term>Specifies:</term>
1132 The hostname shown on the CGI pages.
1137 <term>Type of value:</term>
1143 <term>Default value:</term>
1145 <para><emphasis>Unset</emphasis></para>
1149 <term>Effect if unset:</term>
1152 The hostname provided by the operating system is used.
1160 On some misconfigured systems resolving the hostname fails or
1161 takes too much time and slows Privoxy down. Setting a fixed hostname
1162 works around the problem.
1165 In other circumstances it might be desirable to show a hostname
1166 other than the one returned by the operating system. For example
1167 if the system has several different hostnames and you don't want
1168 to use the first one.
1171 Note that Privoxy does not validate the specified hostname value.
1177 <![%config-file;[<literallayout>@@#hostname hostname.example.org</literallayout>]]>
1182 <!-- ~ End section ~ -->
1185 <!-- ~~~~~ New section ~~~~~ -->
1186 <sect2 id="access-control">
1187 <title>Access Control and Security</title>
1190 This section of the config file controls the security-relevant aspects
1191 of <application>Privoxy</application>'s configuration.
1195 <!-- ~~~~~ New section ~~~~~ -->
1196 <sect3 renderas="sect4" id="listen-address"><title>listen-address</title>
1200 <term>Specifies:</term>
1203 The address and TCP port on which <application>Privoxy</application> will
1204 listen for client requests.
1209 <term>Type of value:</term>
1211 <para>[<replaceable class="parameter">IP-Address</replaceable>]:<replaceable class="parameter">Port</replaceable></para>
1212 <para>[<replaceable class="parameter">Hostname</replaceable>]:<replaceable class="parameter">Port</replaceable></para>
1217 <term>Default value:</term>
1219 <para>127.0.0.1:8118</para>
1223 <term>Effect if unset:</term>
1226 Bind to 127.0.0.1 (IPv4 localhost), port 8118. This is suitable and
1227 recommended for home users who run <application>Privoxy</application> on
1228 the same machine as their browser.
1236 You will need to configure your browser(s) to this proxy address and port.
1239 If you already have another service running on port 8118, or if you want to
1240 serve requests from other machines (e.g. on your local network) as well, you
1241 will need to override the default.
1244 You can use this statement multiple times to make
1245 <application>Privoxy</application> listen on more ports or more
1246 <abbrev>IP</abbrev> addresses. Suitable if your operating system does not
1247 support sharing <abbrev>IPv6</abbrev> and <abbrev>IPv4</abbrev> protocols
1251 If a hostname is used instead of an IP address, <application>Privoxy</application>
1252 will try to resolve it to an IP address and if there are multiple, use the first
1256 If the address for the hostname isn't already known on the system
1257 (for example because it's in /etc/hostname), this may result in DNS
1261 If the specified address isn't available on the system, or if the
1262 hostname can't be resolved, <application>Privoxy</application>
1264 On GNU/Linux, and other platforms that can listen on not yet assigned IP
1265 addresses, Privoxy will start and will listen on the specified
1266 address whenever the IP address is assigned to the system
1269 IPv6 addresses containing colons have to be quoted by brackets.
1270 They can only be used if <application>Privoxy</application> has
1271 been compiled with IPv6 support. If you aren't sure if your version
1272 supports it, have a look at
1273 <ulink url="http://config.privoxy.org/show-status">http://config.privoxy.org/show-status</ulink>.
1276 Some operating systems will prefer IPv6 to IPv4 addresses even if the
1277 system has no IPv6 connectivity which is usually not expected by the user.
1278 Some even rely on DNS to resolve localhost which mean the "localhost" address
1279 used may not actually be local.
1282 It is therefore recommended to explicitly configure the intended IP address
1283 instead of relying on the operating system, unless there's a strong reason not to.
1286 If you leave out the address, <application>Privoxy</application> will bind to all
1287 IPv4 interfaces (addresses) on your machine and may become reachable from the
1288 Internet and/or the local network. Be aware that some GNU/Linux distributions
1289 modify that behaviour without updating the documentation. Check for non-standard
1290 patches if your <application>Privoxy</application> version behaves differently.
1293 If you configure <application>Privoxy</application> to be reachable from the
1294 network, consider using <link linkend="acls">access control lists</link>
1295 (ACL's, see below), and/or a firewall.
1298 If you open <application>Privoxy</application> to untrusted users, you should
1299 also make sure that the following actions are disabled: <literal><link
1300 linkend="enable-edit-actions">enable-edit-actions</link></literal> and
1301 <literal><link linkend="enable-remote-toggle">enable-remote-toggle</link></literal>
1306 <term>Example:</term>
1309 Suppose you are running <application>Privoxy</application> on
1310 a machine which has the address 192.168.0.1 on your local private network
1311 (192.168.0.0) and has another outside connection with a different address.
1312 You want it to serve requests from inside only:
1315 listen-address 192.168.0.1:8118
1318 Suppose you are running <application>Privoxy</application> on an
1319 IPv6-capable machine and you want it to listen on the IPv6 address
1320 of the loopback device:
1323 listen-address [::1]:8118
1329 <![%config-file;[<literallayout>@@listen-address 127.0.0.1:8118</literallayout>]]>
1333 <!-- ~~~~~ New section ~~~~~ -->
1334 <sect3 renderas="sect4" id="toggle"><title>toggle</title>
1338 <term>Specifies:</term>
1341 Initial state of "toggle" status
1346 <term>Type of value:</term>
1352 <term>Default value:</term>
1358 <term>Effect if unset:</term>
1361 Act as if toggled on
1369 If set to 0, <application>Privoxy</application> will start in
1370 <quote>toggled off</quote> mode, i.e. mostly behave like a normal,
1371 content-neutral proxy with both ad blocking and content filtering
1372 disabled. See <literal>enable-remote-toggle</literal> below.
1378 <![%config-file;[<literallayout>@@toggle 1</literallayout>]]>
1382 <!-- ~~~~~ New section ~~~~~ -->
1383 <sect3 renderas="sect4" id="enable-remote-toggle"><title>enable-remote-toggle</title>
1386 <term>Specifies:</term>
1389 Whether or not the <ulink url="http://config.privoxy.org/toggle">web-based toggle
1390 feature</ulink> may be used
1395 <term>Type of value:</term>
1401 <term>Default value:</term>
1407 <term>Effect if unset:</term>
1410 The web-based toggle feature is disabled.
1418 When toggled off, <application>Privoxy</application> mostly acts like a normal,
1419 content-neutral proxy, i.e. doesn't block ads or filter content.
1422 Access to the toggle feature can <emphasis>not</emphasis> be
1423 controlled separately by <quote>ACLs</quote> or HTTP authentication,
1424 so that everybody who can access <application>Privoxy</application> (see
1425 <quote>ACLs</quote> and <literal>listen-address</literal> above) can
1426 toggle it for all users. So this option is <emphasis>not recommended</emphasis>
1427 for multi-user environments with untrusted users.
1430 Note that malicious client side code (e.g Java) is also
1431 capable of using this option.
1434 As a lot of <application>Privoxy</application> users don't read
1435 documentation, this feature is disabled by default.
1438 Note that you must have compiled <application>Privoxy</application> with
1439 support for this feature, otherwise this option has no effect.
1445 <![%config-file;[<literallayout>@@enable-remote-toggle 0</literallayout>]]>
1449 <!-- ~~~~~ New section ~~~~~ -->
1450 <sect3 renderas="sect4" id="enable-remote-http-toggle"><title>enable-remote-http-toggle</title>
1453 <term>Specifies:</term>
1456 Whether or not Privoxy recognizes special HTTP headers to change its behaviour.
1461 <term>Type of value:</term>
1467 <term>Default value:</term>
1473 <term>Effect if unset:</term>
1476 Privoxy ignores special HTTP headers.
1484 When toggled on, the client can change <application>Privoxy's</application>
1485 behaviour by setting special HTTP headers. Currently the only supported
1486 special header is <quote>X-Filter: No</quote>, to disable filtering for
1487 the ongoing request, even if it is enabled in one of the action files.
1490 This feature is disabled by default. If you are using
1491 <application>Privoxy</application> in a environment with trusted clients,
1492 you may enable this feature at your discretion. Note that malicious client
1493 side code (e.g Java) is also capable of using this feature.
1496 This option will be removed in future releases as it has been obsoleted
1497 by the more general header taggers.
1503 <![%config-file;[<literallayout>@@enable-remote-http-toggle 0</literallayout>]]>
1507 <!-- ~~~~~ New section ~~~~~ -->
1508 <sect3 renderas="sect4" id="enable-edit-actions"><title>enable-edit-actions</title>
1511 <term>Specifies:</term>
1514 Whether or not the <ulink url="http://config.privoxy.org/show-status">web-based actions
1515 file editor</ulink> may be used
1520 <term>Type of value:</term>
1526 <term>Default value:</term>
1532 <term>Effect if unset:</term>
1535 The web-based actions file editor is disabled.
1543 Access to the editor can <emphasis>not</emphasis> be
1544 controlled separately by <quote>ACLs</quote> or HTTP authentication,
1545 so that everybody who can access <application>Privoxy</application> (see
1546 <quote>ACLs</quote> and <literal>listen-address</literal> above) can
1547 modify its configuration for all users.
1550 This option is <emphasis>not recommended</emphasis> for environments
1551 with untrusted users and as a lot of <application>Privoxy</application>
1552 users don't read documentation, this feature is disabled by default.
1555 Note that malicious client side code (e.g Java) is also
1556 capable of using the actions editor and you shouldn't enable
1557 this options unless you understand the consequences and are
1558 sure your browser is configured correctly.
1561 Note that you must have compiled <application>Privoxy</application> with
1562 support for this feature, otherwise this option has no effect.
1568 <![%config-file;[<literallayout>@@enable-edit-actions 0</literallayout>]]>
1572 <sect3 renderas="sect4" id="enforce-blocks"><title>enforce-blocks</title>
1575 <term>Specifies:</term>
1578 Whether the user is allowed to ignore blocks and can <quote>go there anyway</quote>.
1583 <term>Type of value:</term>
1586 <replaceable>0 or 1</replaceable>
1591 <term>Default value:</term>
1593 <para><emphasis>0</emphasis></para>
1597 <term>Effect if unset:</term>
1600 Blocks are not enforced.
1608 <application>Privoxy</application> is mainly used to block and filter
1609 requests as a service to the user, for example to block ads and other
1610 junk that clogs the pipes. <application>Privoxy's</application> configuration
1611 isn't perfect and sometimes innocent pages are blocked. In this situation it
1612 makes sense to allow the user to enforce the request and have
1613 <application>Privoxy</application> ignore the block.
1616 In the default configuration <application>Privoxy's</application>
1617 <quote>Blocked</quote> page contains a <quote>go there anyway</quote>
1618 link to adds a special string (the force prefix) to the request URL.
1619 If that link is used, <application>Privoxy</application> will
1620 detect the force prefix, remove it again and let the request pass.
1623 Of course <application>Privoxy</application> can also be used to enforce
1624 a network policy. In that case the user obviously should not be able to
1625 bypass any blocks, and that's what the <quote>enforce-blocks</quote>
1626 option is for. If it's enabled, <application>Privoxy</application> hides
1627 the <quote>go there anyway</quote> link. If the user adds the force
1628 prefix by hand, it will not be accepted and the circumvention attempt
1634 <term>Example:</term>
1642 <![%config-file;[<literallayout>@@enforce-blocks 0</literallayout>]]>
1646 <!-- ~~~~~ New section ~~~~~ -->
1647 <sect3 renderas="sect4" id="acls"><title>
1648 ACLs: permit-access and deny-access</title>
1649 <anchor id="permit-access">
1650 <anchor id="deny-access">
1654 <term>Specifies:</term>
1657 Who can access what.
1662 <term>Type of value:</term>
1665 <replaceable class="parameter">src_addr</replaceable>[:<replaceable class="parameter">port</replaceable>][/<replaceable class="parameter">src_masklen</replaceable>]
1666 [<replaceable class="parameter">dst_addr</replaceable>[:<replaceable class="parameter">port</replaceable>][/<replaceable class="parameter">dst_masklen</replaceable>]]
1669 Where <replaceable class="parameter">src_addr</replaceable> and
1670 <replaceable class="parameter">dst_addr</replaceable> are IPv4 addresses in dotted decimal notation or valid
1671 DNS names, <replaceable class="parameter">port</replaceable> is a port
1672 number, and <replaceable class="parameter">src_masklen</replaceable> and
1673 <replaceable class="parameter">dst_masklen</replaceable> are subnet masks in CIDR notation, i.e. integer
1674 values from 2 to 30 representing the length (in bits) of the network address. The masks and the whole
1675 destination part are optional.
1678 If your system implements
1679 <ulink url="http://tools.ietf.org/html/rfc3493">RFC 3493</ulink>, then
1680 <replaceable class="parameter">src_addr</replaceable> and <replaceable
1681 class="parameter">dst_addr</replaceable> can be IPv6 addresses delimited by
1682 brackets, <replaceable class="parameter">port</replaceable> can be a number
1683 or a service name, and
1684 <replaceable class="parameter">src_masklen</replaceable> and
1685 <replaceable class="parameter">dst_masklen</replaceable> can be a number
1691 <term>Default value:</term>
1693 <para><emphasis>Unset</emphasis></para>
1695 If no <replaceable class="parameter">port</replaceable> is specified,
1696 any port will match. If no <replaceable class="parameter">src_masklen</replaceable> or
1697 <replaceable class="parameter">src_masklen</replaceable> is given, the complete IP
1698 address has to match (i.e. 32 bits for IPv4 and 128 bits for IPv6).
1703 <term>Effect if unset:</term>
1706 Don't restrict access further than implied by <literal>listen-address</literal>
1714 Access controls are included at the request of ISPs and systems
1715 administrators, and <emphasis>are not usually needed by individual users</emphasis>.
1716 For a typical home user, it will normally suffice to ensure that
1717 <application>Privoxy</application> only listens on the localhost
1718 (127.0.0.1) or internal (home) network address by means of the
1719 <link linkend="listen-address"><emphasis>listen-address</emphasis></link>
1723 Please see the warnings in the FAQ that <application>Privoxy</application>
1724 is not intended to be a substitute for a firewall or to encourage anyone
1725 to defer addressing basic security weaknesses.
1728 Multiple ACL lines are OK.
1729 If any ACLs are specified, <application>Privoxy</application> only talks
1730 to IP addresses that match at least one <literal>permit-access</literal> line
1731 and don't match any subsequent <literal>deny-access</literal> line. In other words, the
1732 last match wins, with the default being <literal>deny-access</literal>.
1735 If <application>Privoxy</application> is using a forwarder (see <literal>forward</literal> below)
1736 for a particular destination URL, the <replaceable class="parameter">dst_addr</replaceable>
1737 that is examined is the address of the forwarder and <emphasis>NOT</emphasis> the address
1738 of the ultimate target. This is necessary because it may be impossible for the local
1739 <application>Privoxy</application> to determine the IP address of the
1740 ultimate target (that's often what gateways are used for).
1743 You should prefer using IP addresses over DNS names, because the address lookups take
1744 time. All DNS names must resolve! You can <emphasis>not</emphasis> use domain patterns
1745 like <quote>*.org</quote> or partial domain names. If a DNS name resolves to multiple
1746 IP addresses, only the first one is used.
1749 Some systems allow IPv4 clients to connect to IPv6 server sockets.
1750 Then the client's IPv4 address will be translated by the system into
1751 IPv6 address space with special prefix ::ffff:0:0/96 (so called IPv4
1752 mapped IPv6 address). <application>Privoxy</application> can handle it
1753 and maps such ACL addresses automatically.
1756 Denying access to particular sites by ACL may have undesired side effects
1757 if the site in question is hosted on a machine which also hosts other sites
1763 <term>Examples:</term>
1766 Explicitly define the default behavior if no ACL and
1767 <literal>listen-address</literal> are set: <quote>localhost</quote>
1768 is OK. The absence of a <replaceable class="parameter">dst_addr</replaceable> implies that
1769 <emphasis>all</emphasis> destination addresses are OK:
1772 permit-access localhost
1775 Allow any host on the same class C subnet as www.privoxy.org access to
1776 nothing but www.example.com (or other domains hosted on the same system):
1779 permit-access www.privoxy.org/24 www.example.com/32
1782 Allow access from any host on the 26-bit subnet 192.168.45.64 to anywhere,
1783 with the exception that 192.168.45.73 may not access the IP address behind
1784 www.dirty-stuff.example.com:
1787 permit-access 192.168.45.64/26
1788 deny-access 192.168.45.73 www.dirty-stuff.example.com
1791 Allow access from the IPv4 network 192.0.2.0/24 even if listening on
1792 an IPv6 wild card address (not supported on all platforms):
1795 permit-access 192.0.2.0/24
1798 This is equivalent to the following line even if listening on an
1799 IPv4 address (not supported on all platforms):
1802 permit-access [::ffff:192.0.2.0]/120
1810 <!-- ~~~~~ New section ~~~~~ -->
1811 <sect3 renderas="sect4" id="buffer-limit"><title>buffer-limit</title>
1815 <term>Specifies:</term>
1818 Maximum size of the buffer for content filtering.
1823 <term>Type of value:</term>
1825 <para>Size in Kbytes</para>
1829 <term>Default value:</term>
1835 <term>Effect if unset:</term>
1838 Use a 4MB (4096 KB) limit.
1846 For content filtering, i.e. the <literal>+filter</literal> and
1847 <literal>+deanimate-gif</literal> actions, it is necessary that
1848 <application>Privoxy</application> buffers the entire document body.
1849 This can be potentially dangerous, since a server could just keep sending
1850 data indefinitely and wait for your RAM to exhaust -- with nasty consequences.
1854 When a document buffer size reaches the <literal>buffer-limit</literal>, it is
1855 flushed to the client unfiltered and no further attempt to
1856 filter the rest of the document is made. Remember that there may be multiple threads
1857 running, which might require up to <literal>buffer-limit</literal> Kbytes
1858 <emphasis>each</emphasis>, unless you have enabled <quote>single-threaded</quote>
1865 <![%config-file;[<literallayout>@@buffer-limit 4096</literallayout>]]>
1868 <!-- ~~~~~ New section ~~~~~ -->
1869 <sect3 renderas="sect4" id="enable-proxy-authentication-forwarding"><title>enable-proxy-authentication-forwarding</title>
1872 <term>Specifies:</term>
1875 Whether or not proxy authentication through &my-app; should work.
1880 <term>Type of value:</term>
1886 <term>Default value:</term>
1892 <term>Effect if unset:</term>
1895 Proxy authentication headers are removed.
1903 Privoxy itself does not support proxy authentication, but can
1904 allow clients to authenticate against Privoxy's parent proxy.
1907 By default Privoxy (3.0.21 and later) don't do that and remove
1908 Proxy-Authorization headers in requests and Proxy-Authenticate
1909 headers in responses to make it harder for malicious sites to
1910 trick inexperienced users into providing login information.
1913 If this option is enabled the headers are forwarded.
1916 Enabling this option is <emphasis>not recommended</emphasis> if there is
1917 no parent proxy that requires authentication or if the local network between
1918 Privoxy and the parent proxy isn't trustworthy. If proxy authentication is
1919 only required for some requests, it is recommended to use a client header filter
1920 to remove the authentication headers for requests where they aren't needed.
1926 <![%config-file;[<literallayout>@@enable-proxy-authentication-forwarding 0</literallayout>]]>
1929 <!-- ~~~~~ New section ~~~~~ -->
1930 <sect3 renderas="sect4" id="trusted-cgi-referer"><title>trusted-cgi-referer</title>
1933 <term>Specifies:</term>
1936 A trusted website or webpage whose links can be followed to reach sensitive CGI pages
1941 <term>Type of value:</term>
1943 <para>URL or URL prefix</para>
1947 <term>Default value:</term>
1953 <term>Effect if unset:</term>
1956 No external pages are considered trusted referers.
1964 Before &my-app; accepts configuration changes through CGI pages like
1965 <link linkend="client-specific-tag">client-tags</link> or the
1966 <link linkend="enable-remote-toggle">remote toggle</link>, it checks
1967 the Referer header to see if the request comes from a trusted source.
1970 By default only the webinterface domains
1971 <ulink url="http://config.privoxy.org/">config.privoxy.org</ulink>
1973 <ulink url="http://p.p/">p.p</ulink>
1974 are considered trustworthy.
1975 Requests originating from other domains are rejected to prevent
1976 third-parties from modifiying Privoxy's state by e.g. embedding
1977 images that result in CGI requests.
1980 In some environments it may be desirable to embed links to CGI pages
1981 on external pages, for example on an Intranet homepage the Privoxy admin
1985 The <quote>trusted-cgi-referer</quote> option can be used to add that page,
1986 or the whole domain, as trusted source so the resulting requests aren't
1988 Requests are accepted if the specified trusted-cgi-refer is the prefix
1992 If the trusted source is supposed to access the CGI pages via
1993 JavaScript the <link linkend="cors-allowed-origin">cors-allowed-origin</link>
1998 Declaring pages the admin doesn't control trustworthy may allow
1999 malicious third parties to modify Privoxy's internal state against
2000 the user's wishes and without the user's knowledge.
2007 <![%config-file;[<literallayout>@@#trusted-cgi-referer http://www.example.org/local-privoxy-control-page</literallayout>]]>
2011 <!-- ~~~~~ New section ~~~~~ -->
2012 <sect3 renderas="sect4" id="cors-allowed-origin"><title>cors-allowed-origin</title>
2015 <term>Specifies:</term>
2018 A trusted website which can access &my-app;'s CGI pages through JavaScript.
2023 <term>Type of value:</term>
2029 <term>Default value:</term>
2035 <term>Effect if unset:</term>
2038 No external sites get access via cross-origin resource sharing.
2046 Modern browsers by default prevent cross-origin requests made
2047 via JavaScript to &my-app;'s CGI interface even if &my-app;
2048 would trust the referer because it's white listed via the
2049 <link linkend="trusted-cgi-referer">trusted-cgi-referer</link>
2053 <ulink url="https://en.wikipedia.org/wiki/Cross-origin_resource_sharing"
2054 >Cross-origin resource sharing (CORS)</ulink> is a mechanism to allow
2055 cross-origin requests.
2058 The <quote>cors-allowed-origin</quote> option can be used to specify
2059 a domain that is allowed to make requests to Privoxy CGI interface
2060 via JavaScript. It is used in combination with the
2061 <link linkend="trusted-cgi-referer">trusted-cgi-referer</link>
2066 Declaring domains the admin doesn't control trustworthy may allow
2067 malicious third parties to modify Privoxy's internal state against
2068 the user's wishes and without the user's knowledge.
2075 <![%config-file;[<literallayout>@@#cors-allowed-origin http://www.example.org/</literallayout>]]>
2080 <!-- ~ End section ~ -->
2083 <!-- ~~~~~ New section ~~~~~ -->
2085 <sect2 id="forwarding">
2086 <title>Forwarding</title>
2089 This feature allows routing of HTTP requests through a chain of
2093 Forwarding can be used to chain Privoxy with a caching proxy to speed
2094 up browsing. Using a parent proxy may also be necessary if the machine
2095 that <application>Privoxy</application> runs on has no direct Internet access.
2098 Note that parent proxies can severely decrease your privacy level.
2099 For example a parent proxy could add your IP address to the request
2100 headers and if it's a caching proxy it may add the <quote>Etag</quote>
2101 header to revalidation requests again, even though you configured Privoxy
2102 to remove it. It may also ignore Privoxy's header time randomization and use the
2103 original values which could be used by the server as cookie replacement
2104 to track your steps between visits.
2108 Also specified here are SOCKS proxies. <application>Privoxy</application>
2109 supports the SOCKS 4 and SOCKS 4A protocols.
2112 <sect3 renderas="sect4" id="forward"><title>forward</title>
2115 <term>Specifies:</term>
2118 To which parent HTTP proxy specific requests should be routed.
2123 <term>Type of value:</term>
2126 <replaceable class="parameter">target_pattern</replaceable>
2127 <replaceable class="parameter">http_parent</replaceable>[:<replaceable class="parameter">port</replaceable>]
2130 where <replaceable class="parameter">target_pattern</replaceable> is a <link linkend="af-patterns">URL pattern</link>
2131 that specifies to which requests (i.e. URLs) this forward rule shall apply. Use <literal>/</literal> to
2132 denote <quote>all URLs</quote>.
2133 <replaceable class="parameter">http_parent</replaceable>[:<replaceable class="parameter">port</replaceable>]
2134 is the DNS name or IP address of the parent HTTP proxy through which the requests should be forwarded,
2135 optionally followed by its listening port (default: 8000).
2136 Use a single dot (<literal>.</literal>) to denote <quote>no forwarding</quote>.
2141 <term>Default value:</term>
2143 <para><emphasis>Unset</emphasis></para>
2147 <term>Effect if unset:</term>
2150 Don't use parent HTTP proxies.
2158 If <replaceable class="parameter">http_parent</replaceable> is <quote>.</quote>, then requests are not
2159 forwarded to another HTTP proxy but are made directly to the web servers.
2162 <replaceable class="parameter">http_parent</replaceable> can be a
2163 numerical IPv6 address (if
2164 <ulink url="http://tools.ietf.org/html/rfc3493">RFC 3493</ulink> is
2165 implemented). To prevent clashes with the port delimiter, the whole IP
2166 address has to be put into brackets. On the other hand a <replaceable
2167 class="parameter">target_pattern</replaceable> containing an IPv6 address
2168 has to be put into angle brackets (normal brackets are reserved for
2169 regular expressions already).
2172 Multiple lines are OK, they are checked in sequence, and the last match wins.
2177 <term>Examples:</term>
2180 Everything goes to an example parent proxy, except SSL on port 443 (which it doesn't handle):
2183 forward / parent-proxy.example.org:8080
2187 Everything goes to our example ISP's caching proxy, except for requests
2188 to that ISP's sites:
2191 forward / caching-proxy.isp.example.net:8000
2192 forward .isp.example.net .
2195 Parent proxy specified by an IPv6 address:
2198 forward / [2001:DB8::1]:8000
2201 Suppose your parent proxy doesn't support IPv6:
2204 forward / parent-proxy.example.org:8000
2205 forward ipv6-server.example.org .
2206 forward <[2-3][0-9a-f][0-9a-f][0-9a-f]:*> .
2214 <!-- ~~~~~ New section ~~~~~ -->
2215 <sect3 renderas="sect4" id="socks"><title>
2216 forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t</title>
2217 <anchor id="forward-socks4">
2218 <anchor id="forward-socks4a">
2222 <term>Specifies:</term>
2225 Through which SOCKS proxy (and optionally to which parent HTTP proxy) specific requests should be routed.
2230 <term>Type of value:</term>
2233 <replaceable class="parameter">target_pattern</replaceable>
2234 [<replaceable class="parameter">user</replaceable>:<replaceable class="parameter">pass</replaceable>@]<replaceable class="parameter">socks_proxy</replaceable>[:<replaceable class="parameter">port</replaceable>]
2235 <replaceable class="parameter">http_parent</replaceable>[:<replaceable class="parameter">port</replaceable>]
2238 where <replaceable class="parameter">target_pattern</replaceable> is a
2239 <link linkend="af-patterns">URL pattern</link> that specifies to which
2240 requests (i.e. URLs) this forward rule shall apply. Use <literal>/</literal> to
2241 denote <quote>all URLs</quote>. <replaceable class="parameter">http_parent</replaceable>
2242 and <replaceable class="parameter">socks_proxy</replaceable>
2243 are IP addresses in dotted decimal notation or valid DNS names
2244 (<replaceable class="parameter">http_parent</replaceable>
2245 may be <quote>.</quote> to denote <quote>no HTTP forwarding</quote>), and the optional
2246 <replaceable class="parameter">port</replaceable> parameters are TCP ports,
2247 i.e. integer values from 1 to 65535. <replaceable class="parameter">user</replaceable> and
2248 <replaceable class="parameter">pass</replaceable> can be used for SOCKS5 authentication if required.
2253 <term>Default value:</term>
2255 <para><emphasis>Unset</emphasis></para>
2259 <term>Effect if unset:</term>
2262 Don't use SOCKS proxies.
2270 Multiple lines are OK, they are checked in sequence, and the last match wins.
2273 The difference between <literal>forward-socks4</literal> and <literal>forward-socks4a</literal>
2274 is that in the SOCKS 4A protocol, the DNS resolution of the target hostname happens on the SOCKS
2275 server, while in SOCKS 4 it happens locally.
2278 With <literal>forward-socks5</literal> the DNS resolution will happen on the remote server as well.
2281 <literal>forward-socks5t</literal> works like vanilla <literal>forward-socks5</literal> but
2282 lets &my-app; additionally use Tor-specific SOCKS extensions. Currently the only supported
2283 SOCKS extension is optimistic data which can reduce the latency for the first request made
2284 on a newly created connection.
2287 <replaceable class="parameter">socks_proxy</replaceable> and
2288 <replaceable class="parameter">http_parent</replaceable> can be a
2289 numerical IPv6 address (if
2290 <ulink url="http://tools.ietf.org/html/rfc3493">RFC 3493</ulink> is
2291 implemented). To prevent clashes with the port delimiter, the whole IP
2292 address has to be put into brackets. On the other hand a <replaceable
2293 class="parameter">target_pattern</replaceable> containing an IPv6 address
2294 has to be put into angle brackets (normal brackets are reserved for
2295 regular expressions already).
2298 If <replaceable class="parameter">http_parent</replaceable> is <quote>.</quote>, then requests are not
2299 forwarded to another HTTP proxy but are made (HTTP-wise) directly to the web servers, albeit through
2305 <term>Examples:</term>
2308 From the company example.com, direct connections are made to all
2309 <quote>internal</quote> domains, but everything outbound goes through
2310 their ISP's proxy by way of example.com's corporate SOCKS 4A gateway to
2314 forward-socks4a / socks-gw.example.com:1080 www-cache.isp.example.net:8080
2315 forward .example.com .
2318 A rule that uses a SOCKS 4 gateway for all destinations but no HTTP parent looks like this:
2321 forward-socks4 / socks-gw.example.com:1080 .
2325 To connect SOCKS5 proxy which requires username/password authentication:
2328 forward-socks5 / user:pass@socks-gw.example.com:1080 .
2332 To chain Privoxy and Tor, both running on the same system, you would use
2336 forward-socks5t / 127.0.0.1:9050 .
2339 Note that if you got Tor through one of the bundles, you may
2340 have to change the port from 9050 to 9150 (or even another one).
2341 For details, please check the documentation on the
2342 <ulink url="https://torproject.org/">Tor website</ulink>.
2345 The public <application>Tor</application> network can't be used to
2346 reach your local network, if you need to access local servers you
2347 therefore might want to make some exceptions:
2350 forward 192.168.*.*/ .
2352 forward 127.*.*.*/ .
2355 Unencrypted connections to systems in these address ranges will
2356 be as (un)secure as the local network is, but the alternative is that you
2357 can't reach the local network through <application>Privoxy</application>
2358 at all. Of course this may actually be desired and there is no reason
2359 to make these exceptions if you aren't sure you need them.
2362 If you also want to be able to reach servers in your local network by
2363 using their names, you will need additional exceptions that look like
2367 forward localhost/ .
2375 <![%user-man;[ <!-- not included in config due to length -->
2376 <!-- ~~~~~ New section ~~~~~ -->
2377 <sect3 renderas="sect4" id="advanced-forwarding-examples"><title>Advanced Forwarding Examples</title>
2380 If you have links to multiple ISPs that provide various special content
2381 only to their subscribers, you can configure multiple <application>Privoxies</application>
2382 which have connections to the respective ISPs to act as forwarders to each other, so that
2383 <emphasis>your</emphasis> users can see the internal content of all ISPs.
2387 Assume that host-a has a PPP connection to isp-a.example.net. And host-b has a PPP connection to
2388 isp-b.example.org. Both run <application>Privoxy</application>. Their forwarding
2389 configuration can look like this:
2398 forward .isp-b.example.net host-b:8118
2407 forward .isp-a.example.org host-a:8118
2411 Now, your users can set their browser's proxy to use either
2412 host-a or host-b and be able to browse the internal content
2413 of both isp-a and isp-b.
2417 If you intend to chain <application>Privoxy</application> and
2418 <application>squid</application> locally, then chaining as
2419 <literal>browser -> squid -> privoxy</literal> is the recommended way.
2423 Assuming that <application>Privoxy</application> and <application>squid</application>
2424 run on the same box, your <application>squid</application> configuration could then look like this:
2428 # Define Privoxy as parent proxy (without ICP)
2429 cache_peer 127.0.0.1 parent 8118 7 no-query
2431 # Define ACL for protocol FTP
2434 # Do not forward FTP requests to Privoxy
2435 always_direct allow ftp
2437 # Forward all the rest to Privoxy
2438 never_direct allow all
2442 You would then need to change your browser's proxy settings to <application>squid</application>'s address and port.
2443 Squid normally uses port 3128. If unsure consult <literal>http_port</literal> in <filename>squid.conf</filename>.
2447 You could just as well decide to only forward requests you suspect
2448 of leading to Windows executables through a virus-scanning parent proxy,
2449 say, on <literal>antivir.example.com</literal>, port 8010:
2454 forward /.*\.(exe|com|dll|zip)$ antivir.example.com:8010
2460 <sect3 renderas="sect4" id="forwarded-connect-retries"><title>forwarded-connect-retries</title>
2463 <term>Specifies:</term>
2466 How often Privoxy retries if a forwarded connection request fails.
2471 <term>Type of value:</term>
2474 <replaceable class="parameter">Number of retries.</replaceable>
2479 <term>Default value:</term>
2481 <para><emphasis>0</emphasis></para>
2485 <term>Effect if unset:</term>
2488 Connections forwarded through other proxies are treated like direct connections and no retry attempts are made.
2496 <replaceable class="parameter">forwarded-connect-retries</replaceable> is mainly interesting
2497 for socks4a connections, where <application>Privoxy</application> can't detect why the connections failed.
2498 The connection might have failed because of a DNS timeout in which case a retry makes sense,
2499 but it might also have failed because the server doesn't exist or isn't reachable. In this
2500 case the retry will just delay the appearance of Privoxy's error message.
2503 Note that in the context of this option, <quote>forwarded connections</quote> includes all connections
2504 that Privoxy forwards through other proxies. This option is not limited to the HTTP CONNECT method.
2507 Only use this option, if you are getting lots of forwarding-related error messages
2508 that go away when you try again manually. Start with a small value and check Privoxy's
2509 logfile from time to time, to see how many retries are usually needed.
2514 <term>Example:</term>
2517 forwarded-connect-retries 1
2522 <![%config-file;[<literallayout>@@forwarded-connect-retries 0</literallayout>]]>
2528 <title>Miscellaneous</title>
2530 <sect3 renderas="sect4" id="accept-intercepted-requests"><title>accept-intercepted-requests</title>
2533 <term>Specifies:</term>
2536 Whether intercepted requests should be treated as valid.
2541 <term>Type of value:</term>
2544 <replaceable>0 or 1</replaceable>
2549 <term>Default value:</term>
2551 <para><emphasis>0</emphasis></para>
2555 <term>Effect if unset:</term>
2558 Only proxy requests are accepted, intercepted requests are treated as invalid.
2566 If you don't trust your clients and want to force them
2567 to use <application>Privoxy</application>, enable this
2568 option and configure your packet filter to redirect outgoing
2569 HTTP connections into <application>Privoxy</application>.
2572 Note that intercepting encrypted connections (HTTPS) isn't supported.
2575 Make sure that <application>Privoxy's</application> own requests
2576 aren't redirected as well. Additionally take care that
2577 <application>Privoxy</application> can't intentionally connect
2578 to itself, otherwise you could run into redirection loops if
2579 <application>Privoxy's</application> listening port is reachable
2580 by the outside or an attacker has access to the pages you visit.
2583 If you are running Privoxy as intercepting proxy without being
2584 able to intercept all client requests you may want to adjust
2585 the CGI templates to make sure they don't reference content from
2591 <term>Example:</term>
2594 accept-intercepted-requests 1
2599 <![%config-file;[<literallayout>@@accept-intercepted-requests 0</literallayout>]]>
2602 <sect3 renderas="sect4" id="allow-cgi-request-crunching"><title>allow-cgi-request-crunching</title>
2605 <term>Specifies:</term>
2608 Whether requests to <application>Privoxy's</application> CGI pages can be blocked or redirected.
2613 <term>Type of value:</term>
2616 <replaceable>0 or 1</replaceable>
2621 <term>Default value:</term>
2623 <para><emphasis>0</emphasis></para>
2627 <term>Effect if unset:</term>
2630 <application>Privoxy</application> ignores block and redirect actions for its CGI pages.
2638 By default <application>Privoxy</application> ignores block or redirect actions
2639 for its CGI pages. Intercepting these requests can be useful in multi-user
2640 setups to implement fine-grained access control, but it can also render the complete
2641 web interface useless and make debugging problems painful if done without care.
2644 Don't enable this option unless you're sure that you really need it.
2649 <term>Example:</term>
2652 allow-cgi-request-crunching 1
2657 <![%config-file;[<literallayout>@@allow-cgi-request-crunching 0</literallayout>]]>
2660 <sect3 renderas="sect4" id="split-large-forms"><title>split-large-forms</title>
2663 <term>Specifies:</term>
2666 Whether the CGI interface should stay compatible with broken HTTP clients.
2671 <term>Type of value:</term>
2674 <replaceable>0 or 1</replaceable>
2679 <term>Default value:</term>
2681 <para><emphasis>0</emphasis></para>
2685 <term>Effect if unset:</term>
2688 The CGI form generate long GET URLs.
2696 <application>Privoxy's</application> CGI forms can lead to
2697 rather long URLs. This isn't a problem as far as the HTTP
2698 standard is concerned, but it can confuse clients with arbitrary
2699 URL length limitations.
2702 Enabling split-large-forms causes <application>Privoxy</application>
2703 to divide big forms into smaller ones to keep the URL length down.
2704 It makes editing a lot less convenient and you can no longer
2705 submit all changes at once, but at least it works around this
2709 If you don't notice any editing problems, there is no reason
2710 to enable this option, but if one of the submit buttons appears
2711 to be broken, you should give it a try.
2716 <term>Example:</term>
2724 <![%config-file;[<literallayout>@@split-large-forms 0</literallayout>]]>
2727 <sect3 renderas="sect4" id="keep-alive-timeout"><title>keep-alive-timeout</title>
2730 <term>Specifies:</term>
2733 Number of seconds after which an open connection will no longer be reused.
2738 <term>Type of value:</term>
2741 <replaceable>Time in seconds.</replaceable>
2746 <term>Default value:</term>
2752 <term>Effect if unset:</term>
2755 Connections are not kept alive.
2763 This option allows clients to keep the connection to &my-app;
2764 alive. If the server supports it, &my-app; will keep
2765 the connection to the server alive as well. Under certain
2766 circumstances this may result in speed-ups.
2769 By default, &my-app; will close the connection to the server if
2770 the client connection gets closed, or if the specified timeout
2771 has been reached without a new request coming in. This behaviour
2772 can be changed with the <ulink
2773 url="#CONNECTION-SHARING">connection-sharing</ulink> option.
2776 This option has no effect if <application>Privoxy</application>
2777 has been compiled without keep-alive support.
2780 Note that a timeout of five seconds as used in the default
2781 configuration file significantly decreases the number of
2782 connections that will be reused. The value is used because
2783 some browsers limit the number of connections they open to
2784 a single host and apply the same limit to proxies. This can
2785 result in a single website <quote>grabbing</quote> all the
2786 connections the browser allows, which means connections to
2787 other websites can't be opened until the connections currently
2791 Several users have reported this as a Privoxy bug, so the
2792 default value has been reduced. Consider increasing it to
2793 300 seconds or even more if you think your browser can handle
2794 it. If your browser appears to be hanging, it probably can't.
2799 <term>Example:</term>
2802 keep-alive-timeout 300
2807 <![%config-file;[<literallayout>@@keep-alive-timeout 5</literallayout>]]>
2811 <sect3 renderas="sect4" id="tolerate-pipelining"><title>tolerate-pipelining</title>
2814 <term>Specifies:</term>
2817 Whether or not pipelined requests should be served.
2822 <term>Type of value:</term>
2825 <replaceable>0 or 1.</replaceable>
2830 <term>Default value:</term>
2836 <term>Effect if unset:</term>
2839 If Privoxy receives more than one request at once, it terminates the
2840 client connection after serving the first one.
2848 &my-app; currently doesn't pipeline outgoing requests,
2849 thus allowing pipelining on the client connection is not
2850 guaranteed to improve the performance.
2853 By default &my-app; tries to discourage clients from pipelining
2854 by discarding aggressively pipelined requests, which forces the
2855 client to resend them through a new connection.
2858 This option lets &my-app; tolerate pipelining. Whether or not
2859 that improves performance mainly depends on the client configuration.
2862 If you are seeing problems with pages not properly loading,
2863 disabling this option could work around the problem.
2868 <term>Example:</term>
2871 tolerate-pipelining 1
2876 <![%config-file;[<literallayout>@@tolerate-pipelining 1</literallayout>]]>
2880 <sect3 renderas="sect4" id="default-server-timeout"><title>default-server-timeout</title>
2883 <term>Specifies:</term>
2886 Assumed server-side keep-alive timeout if not specified by the server.
2891 <term>Type of value:</term>
2894 <replaceable>Time in seconds.</replaceable>
2899 <term>Default value:</term>
2905 <term>Effect if unset:</term>
2908 Connections for which the server didn't specify the keep-alive
2909 timeout are not reused.
2917 Enabling this option significantly increases the number of connections
2918 that are reused, provided the <ulink
2919 url="#KEEP-ALIVE-TIMEOUT">keep-alive-timeout</ulink> option
2923 While it also increases the number of connections problems
2924 when &my-app; tries to reuse a connection that already has
2925 been closed on the server side, or is closed while &my-app;
2926 is trying to reuse it, this should only be a problem if it
2927 happens for the first request sent by the client. If it happens
2928 for requests on reused client connections, &my-app; will simply
2929 close the connection and the client is supposed to retry the
2930 request without bothering the user.
2933 Enabling this option is therefore only recommended if the
2935 url="#CONNECTION-SHARING">connection-sharing</ulink> option
2939 It is an error to specify a value larger than the <ulink
2940 url="#KEEP-ALIVE-TIMEOUT">keep-alive-timeout</ulink> value.
2943 This option has no effect if <application>Privoxy</application>
2944 has been compiled without keep-alive support.
2949 <term>Example:</term>
2952 default-server-timeout 60
2957 <![%config-file;[<literallayout>@@#default-server-timeout 5</literallayout>]]>
2961 <sect3 renderas="sect4" id="connection-sharing"><title>connection-sharing</title>
2964 <term>Specifies:</term>
2967 Whether or not outgoing connections that have been kept alive
2968 should be shared between different incoming connections.
2973 <term>Type of value:</term>
2976 <replaceable>0 or 1</replaceable>
2981 <term>Default value:</term>
2987 <term>Effect if unset:</term>
2990 Connections are not shared.
2998 This option has no effect if <application>Privoxy</application>
2999 has been compiled without keep-alive support, or if it's disabled.
3007 Note that reusing connections doesn't necessary cause speedups.
3008 There are also a few privacy implications you should be aware of.
3011 If this option is enabled, outgoing connections are shared between
3012 clients (if there are more than one) and closing the browser that initiated
3013 the outgoing connection does not affect the connection between &my-app;
3014 and the server unless the client's request hasn't been completed yet.
3017 If the outgoing connection is idle, it will not be closed until either
3018 <application>Privoxy's</application> or the server's timeout is reached.
3019 While it's open, the server knows that the system running &my-app; is still
3023 If there are more than one client (maybe even belonging to multiple users),
3024 they will be able to reuse each others connections. This is potentially
3025 dangerous in case of authentication schemes like NTLM where only the
3026 connection is authenticated, instead of requiring authentication for
3030 If there is only a single client, and if said client can keep connections
3031 alive on its own, enabling this option has next to no effect. If the client
3032 doesn't support connection keep-alive, enabling this option may make sense
3033 as it allows &my-app; to keep outgoing connections alive even if the client
3034 itself doesn't support it.
3037 You should also be aware that enabling this option increases the likelihood
3038 of getting the "No server or forwarder data" error message, especially if you
3039 are using a slow connection to the Internet.
3042 This option should only be used by experienced users who
3043 understand the risks and can weight them against the benefits.
3048 <term>Example:</term>
3051 connection-sharing 1
3056 <![%config-file;[<literallayout>@@#connection-sharing 1</literallayout>]]>
3060 <sect3 renderas="sect4" id="socket-timeout"><title>socket-timeout</title>
3063 <term>Specifies:</term>
3066 Number of seconds after which a socket times out if
3067 no data is received.
3072 <term>Type of value:</term>
3075 <replaceable>Time in seconds.</replaceable>
3080 <term>Default value:</term>
3086 <term>Effect if unset:</term>
3089 A default value of 300 seconds is used.
3097 The default is quite high and you probably want to reduce it.
3098 If you aren't using an occasionally slow proxy like Tor, reducing
3099 it to a few seconds should be fine.
3103 When a TLS library is being used to read or write data from a socket with
3104 <literal><ulink url="actions-file.html#HTTPS-INSPECTION">https-inspection</ulink></literal>
3105 enabled the socket-timeout currently isn't applied and the timeout
3106 used depends on the library (which may not even use a timeout).
3112 <term>Example:</term>
3120 <![%config-file;[<literallayout>@@socket-timeout 300</literallayout>]]>
3124 <sect3 renderas="sect4" id="max-client-connections"><title>max-client-connections</title>
3127 <term>Specifies:</term>
3130 Maximum number of client connections that will be served.
3135 <term>Type of value:</term>
3138 <replaceable>Positive number.</replaceable>
3143 <term>Default value:</term>
3152 Connections are served until a resource limit is reached.
3155 &my-app; creates one thread (or process) for every incoming client
3156 connection that isn't rejected based on the access control settings.
3159 If the system is powerful enough, &my-app; can theoretically deal with
3160 several hundred (or thousand) connections at the same time, but some
3161 operating systems enforce resource limits by shutting down offending
3162 processes and their default limits may be below the ones &my-app; would
3163 require under heavy load.
3166 Configuring &my-app; to enforce a connection limit below the thread
3167 or process limit used by the operating system makes sure this doesn't
3168 happen. Simply increasing the operating system's limit would work too,
3169 but if &my-app; isn't the only application running on the system,
3170 you may actually want to limit the resources used by &my-app;.
3173 If &my-app; is only used by a single trusted user, limiting the
3174 number of client connections is probably unnecessary. If there
3175 are multiple possibly untrusted users you probably still want to
3176 additionally use a packet filter to limit the maximal number of
3177 incoming connections per client. Otherwise a malicious user could
3178 intentionally create a high number of connections to prevent other
3179 users from using &my-app;.
3182 Obviously using this option only makes sense if you choose a limit
3183 below the one enforced by the operating system.
3186 One most POSIX-compliant systems &my-app; can't properly deal with
3187 more than FD_SETSIZE file descriptors if &my-app; has been configured
3188 to use select() and has to reject connections if the limit is reached.
3189 When using select() this limit therefore can't be increased without
3190 recompiling &my-app; with a different FD_SETSIZE limit unless &my-app;
3191 is running on Windows with _WIN32 defined.
3194 When &my-app; has been configured to use poll() the FD_SETSIZE limit
3200 <term>Example:</term>
3203 max-client-connections 256
3208 <![%config-file;[<literallayout>@@#max-client-connections 256</literallayout>]]>
3212 <sect3 renderas="sect4" id="listen-backlog"><title>listen-backlog</title>
3215 <term>Specifies:</term>
3218 Connection queue length requested from the operating system.
3223 <term>Type of value:</term>
3226 <replaceable>Number.</replaceable>
3231 <term>Default value:</term>
3237 <term>Effect if unset:</term>
3240 A connection queue length of 128 is requested from the operating system.
3248 Under high load incoming connection may queue up before Privoxy
3249 gets around to serve them. The queue length is limited by the
3250 operating system. Once the queue is full, additional connections
3251 are dropped before Privoxy can accept and serve them.
3254 Increasing the queue length allows Privoxy to accept more
3255 incoming connections that arrive roughly at the same time.
3258 Note that Privoxy can only request a certain queue length,
3259 whether or not the requested length is actually used depends
3260 on the operating system which may use a different length instead.
3263 On many operating systems a limit of -1 can be specified to
3264 instruct the operating system to use the maximum queue length
3265 allowed. Check the listen man page to see if your platform allows this.
3268 On some platforms you can use "netstat -Lan -p tcp" to see the effective
3272 Effectively using a value above 128 usually requires changing
3273 the system configuration as well. On FreeBSD-based system the
3274 limit is controlled by the kern.ipc.soacceptqueue sysctl.
3279 <term>Example:</term>
3287 <![%config-file;[<literallayout>@@#listen-backlog -1</literallayout>]]>
3291 <sect3 renderas="sect4" id="enable-accept-filter"><title>enable-accept-filter</title>
3294 <term>Specifies:</term>
3297 Whether or not Privoxy should use an accept filter
3302 <term>Type of value:</term>
3305 <replaceable>0 or 1</replaceable>
3310 <term>Default value:</term>
3316 <term>Effect if unset:</term>
3319 No accept filter is enabled.
3327 Accept filters reduce the number of context switches by not
3328 passing sockets for new connections to Privoxy until a complete
3329 HTTP request is available.
3332 As a result, Privoxy can process the whole request right away
3333 without having to wait for additional data first.
3336 For this option to work, Privoxy has to be compiled with
3337 FEATURE_ACCEPT_FILTER and the operating system has to support
3338 it (which may require loading a kernel module).
3341 Currently accept filters are only supported on FreeBSD-based
3343 <ulink url="https://www.freebsd.org/cgi/man.cgi?query=accf_http">accf_http(9)
3345 to learn how to enable the support in the operating system.
3350 <term>Example:</term>
3353 enable-accept-filter 1
3358 <![%config-file;[<literallayout>@@#enable-accept-filter 1</literallayout>]]>
3362 <sect3 renderas="sect4" id="handle-as-empty-doc-returns-ok"><title>handle-as-empty-doc-returns-ok</title>
3365 <term>Specifies:</term>
3368 The status code Privoxy returns for pages blocked with
3369 <!-- URL will only end up in the user manual so the relative link should work. -->
3370 <literal><ulink url="actions-file.html#HANDLE-AS-EMPTY-DOCUMENT">+handle-as-empty-document</ulink></literal>.
3375 <term>Type of value:</term>
3378 <replaceable>0 or 1</replaceable>
3383 <term>Default value:</term>
3389 <term>Effect if unset:</term>
3392 Privoxy returns a status 403(forbidden) for all blocked pages.
3397 <term>Effect if set:</term>
3400 Privoxy returns a status 200(OK) for pages blocked with +handle-as-empty-document
3401 and a status 403(Forbidden) for all other blocked pages.
3409 This directive was added as a work-around for Firefox bug 492459:
3410 <quote>Websites are no longer rendered if SSL requests for JavaScripts are blocked by a proxy.</quote>
3411 (<ulink url="https://bugzilla.mozilla.org/show_bug.cgi?id=492459">
3412 https://bugzilla.mozilla.org/show_bug.cgi?id=492459</ulink>),
3413 the bug has been fixed for quite some time, but this directive is also useful
3414 to make it harder for websites to detect whether or not resources are being
3420 <![%config-file;[<literallayout>@@#handle-as-empty-doc-returns-ok 1</literallayout>]]>
3424 <sect3 renderas="sect4" id="enable-compression"><title>enable-compression</title>
3427 <term>Specifies:</term>
3430 Whether or not buffered content is compressed before delivery.
3435 <term>Type of value:</term>
3438 <replaceable>0 or 1</replaceable>
3443 <term>Default value:</term>
3449 <term>Effect if unset:</term>
3452 Privoxy does not compress buffered content.
3457 <term>Effect if set:</term>
3460 Privoxy compresses buffered content before delivering it to the client,
3461 provided the client supports it.
3469 This directive is only supported if Privoxy has been compiled with
3470 FEATURE_COMPRESSION, which should not to be confused with FEATURE_ZLIB.
3473 Compressing buffered content is mainly useful if Privoxy and the
3474 client are running on different systems. If they are running on the
3475 same system, enabling compression is likely to slow things down.
3476 If you didn't measure otherwise, you should assume that it does
3477 and keep this option disabled.
3480 Privoxy will not compress buffered content below a certain length.
3485 <![%config-file;[<literallayout>@@#enable-compression 1</literallayout>]]>
3489 <sect3 renderas="sect4" id="compression-level"><title>compression-level</title>
3492 <term>Specifies:</term>
3495 The compression level that is passed to the zlib library when compressing buffered content.
3500 <term>Type of value:</term>
3503 <replaceable>Positive number ranging from 0 to 9.</replaceable>
3508 <term>Default value:</term>
3517 Compressing the data more takes usually longer than compressing
3518 it less or not compressing it at all. Which level is best depends
3519 on the connection between Privoxy and the client. If you can't
3520 be bothered to benchmark it for yourself, you should stick with
3521 the default and keep compression disabled.
3524 If compression is disabled, the compression level is irrelevant.
3529 <term>Examples:</term>
3532 # Best speed (compared to the other levels)
3538 # No compression. Only useful for testing as the added header
3539 # slightly increases the amount of data that has to be sent.
3540 # If your benchmark shows that using this compression level
3541 # is superior to using no compression at all, the benchmark
3542 # is likely to be flawed.
3548 <![%config-file;[<literallayout>@@#compression-level 1</literallayout>]]>
3552 <sect3 renderas="sect4" id="client-header-order"><title>client-header-order</title>
3555 <term>Specifies:</term>
3558 The order in which client headers are sorted before forwarding them.
3563 <term>Type of value:</term>
3566 <replaceable>Client header names delimited by spaces or tabs</replaceable>
3571 <term>Default value:</term>
3580 By default &my-app; leaves the client headers in the order they
3581 were sent by the client. Headers are modified in-place, new headers
3582 are added at the end of the already existing headers.
3585 The header order can be used to fingerprint client requests
3586 independently of other headers like the User-Agent.
3589 This directive allows to sort the headers differently to better
3590 mimic a different User-Agent. Client headers will be emitted
3591 in the order given, headers whose name isn't explicitly specified
3592 are added at the end.
3595 Note that sorting headers in an uncommon way will make fingerprinting
3597 Encrypted headers are not affected by this directive unless
3598 <literal><ulink url="actions-file.html#HTTPS-INSPECTION">https-inspection</ulink></literal>
3604 <![%config-file;[<literallayout>@@#client-header-order Host \
3615 Upgrade-Insecure-Requests \
3625 <sect3 renderas="sect4" id="client-specific-tag"><title>client-specific-tag</title>
3628 <term>Specifies:</term>
3631 The name of a tag that will always be set for clients that
3632 requested it through the webinterface.
3637 <term>Type of value:</term>
3640 <replaceable>Tag name followed by a description that will be shown in the webinterface</replaceable>
3645 <term>Default value:</term>
3654 Client-specific tags allow Privoxy admins to create different
3655 profiles and let the users chose which one they want without
3656 impacting other users.
3659 One use case is allowing users to circumvent certain blocks
3660 without having to allow them to circumvent all blocks.
3661 This is not possible with the
3662 <link linkend="enable-remote-toggle">enable-remote-toggle feature</link>
3663 because it would bluntly disable all blocks for all users and also affect
3664 other actions like filters.
3665 It also is set globally which renders it useless in most multi-user setups.
3668 After a client-specific tag has been defined with the client-specific-tag
3669 directive, action sections can be activated based on the tag by using a
3670 <ulink url="actions-file.html#CLIENT-TAG-PATTERN">CLIENT-TAG</ulink> pattern.
3671 The CLIENT-TAG pattern is evaluated at the same priority
3672 as URL patterns, as a result the last matching pattern wins.
3673 Tags that are created based on client or server headers are evaluated
3674 later on and can overrule CLIENT-TAG and URL patterns!
3677 The tag is set for all requests that come from clients that requested
3679 Note that "clients" are differentiated by IP address,
3680 if the IP address changes the tag has to be requested again.
3683 Clients can request tags to be set by using the CGI interface <ulink
3684 url="http://config.privoxy.org/client-tags">http://config.privoxy.org/client-tags</ulink>.
3685 The specific tag description is only used on the web page and should
3686 be phrased in away that the user understands the effect of the tag.
3691 <term>Examples:</term>
3694 # Define a couple of tags, the described effect requires action sections
3695 # that are enabled based on CLIENT-TAG patterns.
3696 client-specific-tag circumvent-blocks Overrule blocks but do not affect other actions
3697 client-specific-tag disable-content-filters Disable content-filters but do not affect other actions
3698 client-specific-tag overrule-redirects Overrule redirect sections
3699 client-specific-tag allow-cookies Do not crunch cookies in either direction
3700 client-specific-tag change-tor-socks-port Change forward-socks5 settings to use a different Tor socks port (and circuits)
3701 client-specific-tag no-https-inspection Disable HTTPS inspection
3702 client-specific-tag no-tls-verification Don't verify certificates when http-inspection is enabled
3709 <!-- ~ End section ~ -->
3711 <sect3 renderas="sect4" id="client-tag-lifetime"><title>client-tag-lifetime</title>
3714 <term>Specifies:</term>
3717 How long a temporarily enabled tag remains enabled.
3722 <term>Type of value:</term>
3725 <replaceable>Time in seconds.</replaceable>
3730 <term>Default value:</term>
3739 In case of some tags users may not want to enable them permanently,
3740 but only for a short amount of time, for example to circumvent a block
3741 that is the result of an overly-broad URL pattern.
3744 The CGI interface <ulink
3745 url="http://config.privoxy.org/client-tags">http://config.privoxy.org/client-tags</ulink>
3746 therefore provides a "enable this tag temporarily" option.
3747 If it is used, the tag will be set until the client-tag-lifetime
3753 <term>Example:</term>
3756 # Increase the time to life for temporarily enabled tags to 3 minutes
3757 client-tag-lifetime 180
3764 <!-- ~ End section ~ -->
3766 <sect3 renderas="sect4" id="trust-x-forwarded-for"><title>trust-x-forwarded-for</title>
3769 <term>Specifies:</term>
3772 Whether or not Privoxy should use IP addresses specified with the X-Forwarded-For header
3777 <term>Type of value:</term>
3780 <replaceable>0 or one</replaceable>
3785 <term>Default value:</term>
3794 If clients reach Privoxy through another proxy, for example a load
3795 balancer, Privoxy can't tell the client's IP address from the connection.
3796 If multiple clients use the same proxy, they will share the same
3797 client tag settings which is usually not desired.
3800 This option lets Privoxy use the X-Forwarded-For header value as
3801 client IP address. If the proxy sets the header, multiple clients
3802 using the same proxy do not share the same client tag settings.
3805 This option should only be enabled if Privoxy can only be reached
3806 through a proxy and if the proxy can be trusted to set the header
3807 correctly. It is recommended that ACL are used to make sure only
3808 trusted systems can reach Privoxy.
3811 If access to Privoxy isn't limited to trusted systems, this option
3812 would allow malicious clients to change the client tags for other
3813 clients or increase Privoxy's memory requirements by registering
3814 lots of client tag settings for clients that don't exist.
3819 <term>Example:</term>
3822 # Allow systems that can reach Privoxy to provide the client
3823 # IP address with a X-Forwarded-For header.
3824 trust-x-forwarded-for 1
3831 <!-- ~ End section ~ -->
3833 <!-- ~~~~~ New section ~~~~~ -->
3835 <sect3 renderas="sect4" id="receive-buffer-size"><title>receive-buffer-size</title>
3838 <term>Specifies:</term>
3841 The size of the buffer Privoxy uses to receive data from the server.
3846 <term>Type of value:</term>
3849 <replaceable>Size in bytes</replaceable>
3854 <term>Default value:</term>
3863 Increasing the receive-buffer-size increases Privoxy's memory usage but
3864 can lower the number of context switches and thereby reduce the
3865 cpu usage and potentially increase the throughput.
3868 This is mostly relevant for fast network connections and
3869 large downloads that don't require filtering.
3872 Reducing the buffer size reduces the amount of memory Privoxy
3873 needs to handle the request but increases the number of systemcalls
3874 and may reduce the throughput.
3877 A dtrace command like:
3878 <quote>sudo dtrace -n 'syscall::read:return /execname == "privoxy"/ { @[execname] = llquantize(arg0, 10, 0, 5, 20); @m = max(arg0)}'</quote>
3879 can be used to properly tune the receive-buffer-size.
3880 On systems without dtrace, strace or truss may be used as
3881 less convenient alternatives.
3884 If the buffer is too large it will increase Privoxy's memory
3885 footprint without any benefit. As the memory is (currently)
3886 cleared before using it, a buffer that is too large can
3887 actually reduce the throughput.
3892 <term>Example:</term>
3895 # Increase the receive buffer size
3896 receive-buffer-size 32768
3903 <!-- ~ End section ~ -->
3908 <sect2 id="https-inspection-directives">
3909 <title>HTTPS Inspection (Experimental)</title>
3912 HTTPS inspection allows to filter encrypted requests and responses.
3913 This is only supported when <application>Privoxy</application>
3914 has been built with FEATURE_HTTPS_INSPECTION.
3915 If you aren't sure if your version supports it, have a look at
3916 <ulink url="http://config.privoxy.org/show-status">http://config.privoxy.org/show-status</ulink>.
3919 <!-- ~~~~~ New section ~~~~~ -->
3921 <sect3 renderas="sect4" id="ca-directory"><title>ca-directory</title>
3924 <term>Specifies:</term>
3927 Directory with the CA key, the CA certificate and the trusted CAs file.
3932 <term>Type of value:</term>
3940 <term>Default value:</term>
3942 <para><emphasis>Empty string</emphasis></para>
3946 <term>Effect if unset:</term>
3949 Default value is used.
3957 This directive specifies the directory where the
3958 CA key, the CA certificate and the trusted CAs file
3962 The permissions should only let &my-app; and the &my-app;
3963 admin access the directory.
3968 <term>Example:</term>
3971 ca-directory /usr/local/etc/privoxy/CA
3976 <![%config-file;[<literallayout>@@#ca-directory /usr/local/etc/privoxy/CA</literallayout>]]>
3979 <!-- ~ End section ~ -->
3981 <!-- ~~~~~ New section ~~~~~ -->
3983 <sect3 renderas="sect4" id="ca-cert-file"><title>ca-cert-file</title>
3986 <term>Specifies:</term>
3989 The CA certificate file in ".crt" format.
3994 <term>Type of value:</term>
4002 <term>Default value:</term>
4004 <para><emphasis>cacert.crt</emphasis></para>
4008 <term>Effect if unset:</term>
4011 Default value is used.
4019 This directive specifies the name of the CA certificate file
4023 The file is used by &my-app; to generate website certificates
4024 when https inspection is enabled with the
4025 <literal><ulink url="actions-file.html#HTTPS-INSPECTION">https-inspection</ulink></literal>
4029 &my-app; clients should import the certificate so that they
4030 can validate the generated certificates.
4033 The file can be generated with:
4034 <command>openssl req -new -x509 -extensions v3_ca -keyout cakey.pem -out cacert.crt -days 3650</command>
4039 <term>Example:</term>
4042 ca-cert-file root.crt
4047 <![%config-file;[<literallayout>@@#ca-cert-file cacert.crt</literallayout>]]>
4050 <!-- ~ End section ~ -->
4052 <!-- ~~~~~ New section ~~~~~ -->
4054 <sect3 renderas="sect4" id="ca-key-file"><title>ca-key-file</title>
4057 <term>Specifies:</term>
4060 The CA key file in ".pem" format.
4065 <term>Type of value:</term>
4073 <term>Default value:</term>
4075 <para><emphasis>cacert.pem</emphasis></para>
4079 <term>Effect if unset:</term>
4082 Default value is used.
4090 This directive specifies the name of the CA key file in ".pem" format.
4091 The <ulink url="#CA-CERT-FILE">ca-cert-file section</ulink> contains
4092 a command to generate it.
4095 The CA key is used by &my-app; to sign generated certificates.
4098 Access to the key should be limited to Privoxy.
4103 <term>Example:</term>
4106 ca-key-file cakey.pem
4111 <![%config-file;[<literallayout>@@#ca-key-file cakey.pem</literallayout>]]>
4114 <!-- ~ End section ~ -->
4116 <!-- ~~~~~ New section ~~~~~ -->
4118 <sect3 renderas="sect4" id="ca-password"><title>ca-password</title>
4121 <term>Specifies:</term>
4124 The password for the CA keyfile.
4129 <term>Type of value:</term>
4137 <term>Default value:</term>
4139 <para><emphasis>Empty string</emphasis></para>
4143 <term>Effect if unset:</term>
4146 Default value is used.
4154 This directive specifies the password for the CA keyfile
4155 that is used when Privoxy generates certificates for intercepted
4159 Note that the password is shown on the CGI page so don't
4160 reuse an important one.
4165 <term>Example:</term>
4168 ca-password blafasel
4173 <![%config-file;[<literallayout>@@#ca-password swordfish</literallayout>]]>
4176 <!-- ~ End section ~ -->
4178 <!-- ~~~~~ New section ~~~~~ -->
4180 <sect3 renderas="sect4" id="certificate-directory"><title>certificate-directory</title>
4183 <term>Specifies:</term>
4186 Directory to save generated keys and certificates.
4191 <term>Type of value:</term>
4199 <term>Default value:</term>
4201 <para><emphasis>./certs</emphasis></para>
4205 <term>Effect if unset:</term>
4208 Default value is used.
4216 This directive specifies the directory where generated
4217 TLS/SSL keys and certificates are saved when https inspection
4219 <literal><ulink url="actions-file.html#HTTPS-INSPECTION">https-inspection</ulink></literal>
4223 The keys and certificates currently have to be deleted manually
4224 when changing the <ulink url="#CA-CERT-FILE">ca-cert-file</ulink>
4225 and the <ulink url="#CA-CERT-KEY">ca-cert-key</ulink>.
4228 The permissions should only let &my-app; and the &my-app;
4229 admin access the directory.
4233 &my-app; currently does not garbage-collect obsolete keys
4234 and certificates and does not keep track of how may keys
4235 and certificates exist.
4238 &my-app; admins should monitor the size of the directory
4239 and/or make sure there is sufficient space available.
4240 A cron job to limit the number of keys and certificates
4241 to a certain number may be worth considering.
4247 <term>Example:</term>
4250 certificate-directory /usr/local/var/privoxy/certs
4255 <![%config-file;[<literallayout>@@#certificate-directory /usr/local/var/privoxy/certs</literallayout>]]>
4258 <!-- ~ End section ~ -->
4260 <!-- ~~~~~ New section ~~~~~ -->
4262 <sect3 renderas="sect4" id="cipher-list"><title>cipher-list</title>
4265 <term>Specifies:</term>
4268 A list of ciphers to use in TLS handshakes
4273 <term>Type of value:</term>
4281 <term>Default value:</term>
4287 <term>Effect if unset:</term>
4290 A default value is inherited from the TLS library.
4298 This directive allows to specify a non-default list of ciphers to use
4299 in TLS handshakes with clients and servers.
4302 Ciphers are separated by colons. Which ciphers are supported
4303 depends on the TLS library. When using OpenSSL, unsupported ciphers
4304 are skipped. When using MbedTLS they are rejected.
4308 Specifying an unusual cipher list makes fingerprinting easier.
4309 Note that the default list provided by the TLS library may
4310 be unusual when compared to the one used by modern browsers
4317 <term>Examples:</term>
4320 # Explicitly set a couple of ciphers with names used by MbedTLS
4321 cipher-list cipher-list TLS-ECDHE-RSA-WITH-CHACHA20-POLY1305-SHA256:\
4322 TLS-ECDHE-ECDSA-WITH-CHACHA20-POLY1305-SHA256:\
4323 TLS-DHE-RSA-WITH-CHACHA20-POLY1305-SHA256:\
4324 TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256:\
4325 TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384:\
4326 TLS-ECDHE-ECDSA-WITH-AES-256-CCM:\
4327 TLS-ECDHE-ECDSA-WITH-AES-256-CCM-8:\
4328 TLS-ECDHE-ECDSA-WITH-AES-128-CCM:\
4329 TLS-ECDHE-ECDSA-WITH-AES-128-CCM-8:\
4330 TLS-ECDHE-ECDSA-WITH-CAMELLIA-128-GCM-SHA256:\
4331 TLS-ECDHE-ECDSA-WITH-CAMELLIA-256-GCM-SHA384:\
4332 TLS-ECDHE-RSA-WITH-AES-128-GCM-SHA256:\
4333 TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384:\
4334 TLS-ECDHE-RSA-WITH-CAMELLIA-128-GCM-SHA256:\
4335 TLS-ECDHE-RSA-WITH-CAMELLIA-256-GCM-SHA384:\
4336 TLS-DHE-RSA-WITH-AES-256-GCM-SHA384:\
4337 TLS-DHE-RSA-WITH-AES-128-GCM-SHA256:\
4338 TLS-DHE-RSA-WITH-AES-256-CCM:\
4339 TLS-DHE-RSA-WITH-AES-256-CCM-8:\
4340 TLS-DHE-RSA-WITH-AES-128-CCM:\
4341 TLS-DHE-RSA-WITH-AES-128-CCM-8:\
4342 TLS-DHE-RSA-WITH-CAMELLIA-128-GCM-SHA256:\
4343 TLS-DHE-RSA-WITH-CAMELLIA-256-GCM-SHA384:\
4344 TLS-ECDH-RSA-WITH-AES-128-GCM-SHA256:\
4345 TLS-ECDH-RSA-WITH-AES-256-GCM-SHA384:\
4346 TLS-ECDH-RSA-WITH-CAMELLIA-128-GCM-SHA256:\
4347 TLS-ECDH-RSA-WITH-CAMELLIA-256-GCM-SHA384:\
4348 TLS-ECDH-ECDSA-WITH-AES-128-GCM-SHA256:\
4349 TLS-ECDH-ECDSA-WITH-AES-256-GCM-SHA384:\
4350 TLS-ECDH-ECDSA-WITH-CAMELLIA-128-GCM-SHA256:\
4351 TLS-ECDH-ECDSA-WITH-CAMELLIA-256-GCM-SHA384
4354 # Explicitly set a couple of ciphers with names used by OpenSSL
4355 cipher-list ECDHE-RSA-AES256-GCM-SHA384:\
4356 ECDHE-ECDSA-AES256-GCM-SHA384:\
4357 DH-DSS-AES256-GCM-SHA384:\
4358 DHE-DSS-AES256-GCM-SHA384:\
4359 DH-RSA-AES256-GCM-SHA384:\
4360 DHE-RSA-AES256-GCM-SHA384:\
4361 ECDH-RSA-AES256-GCM-SHA384:\
4362 ECDH-ECDSA-AES256-GCM-SHA384:\
4363 ECDHE-RSA-AES128-GCM-SHA256:\
4364 ECDHE-ECDSA-AES128-GCM-SHA256:\
4365 DH-DSS-AES128-GCM-SHA256:\
4366 DHE-DSS-AES128-GCM-SHA256:\
4367 DH-RSA-AES128-GCM-SHA256:\
4368 DHE-RSA-AES128-GCM-SHA256:\
4369 ECDH-RSA-AES128-GCM-SHA256:\
4370 ECDH-ECDSA-AES128-GCM-SHA256:\
4371 ECDHE-RSA-AES256-GCM-SHA384:\
4375 # Use keywords instead of explicitly naming the ciphers (Does not work with MbedTLS)
4376 cipher-list ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH
4383 <!-- ~ End section ~ -->
4385 <!-- ~~~~~ New section ~~~~~ -->
4387 <sect3 renderas="sect4" id="trusted-cas-file"><title>trusted-cas-file</title>
4390 <term>Specifies:</term>
4393 The trusted CAs file in ".pem" format.
4398 <term>Type of value:</term>
4401 File name relative to ca-directory
4406 <term>Default value:</term>
4408 <para><emphasis>trustedCAs.pem</emphasis></para>
4412 <term>Effect if unset:</term>
4415 Default value is used.
4423 This directive specifies the trusted CAs file that is used when validating
4424 certificates for intercepted TLS/SSL requests.
4427 An example file can be downloaded from
4428 <ulink url="https://curl.se/ca/cacert.pem">https://curl.se/ca/cacert.pem</ulink>.
4429 If you want to create the file yourself, please see:
4430 <ulink url="https://curl.se/docs/caextract.html">https://curl.se/docs/caextract.html</ulink>.
4435 <term>Example:</term>
4438 trusted-cas-file trusted_cas_file.pem
4443 <![%config-file;[<literallayout>@@#trusted-cas-file trustedCAs.pem</literallayout>]]>
4446 <!-- ~ End section ~ -->
4450 <!-- ~~~~~ New section ~~~~~ -->
4452 <sect2 id="windows-gui">
4453 <title>Windows GUI Options</title>
4455 <application>Privoxy</application> has a number of options specific to the
4456 Windows GUI interface:
4459 <anchor id="activity-animation">
4460 <![%config-file;[<para>@@</para>]]> <!-- for spacing -->
4462 If <quote>activity-animation</quote> is set to 1, the
4463 <application>Privoxy</application> icon will animate when
4464 <quote>Privoxy</quote> is active. To turn off, set to 0.
4467 <![%config-file;[<literallayout>@@#activity-animation 1</literallayout>]]>
4470 <emphasis>activity-animation 1</emphasis>
4474 <anchor id="log-messages">
4475 <![%config-file;[<para>@@</para>]]> <!-- for spacing -->
4477 If <quote>log-messages</quote> is set to 1,
4478 <application>Privoxy</application> copies log messages to the console
4480 The log detail depends on the <link linkend="debug">debug</link> directive.
4483 <![%config-file;[<literallayout>@@#log-messages 1</literallayout>]]>
4486 <emphasis>log-messages 1</emphasis>
4490 <anchor id="log-buffer-size">
4491 <![%config-file;[<para>@@</para>]]> <!-- for spacing -->
4493 If <quote>log-buffer-size</quote> is set to 1, the size of the log buffer,
4494 i.e. the amount of memory used for the log messages displayed in the
4495 console window, will be limited to <quote>log-max-lines</quote> (see below).
4499 Warning: Setting this to 0 will result in the buffer to grow infinitely and
4500 eat up all your memory!
4503 <![%config-file;[<literallayout>@@#log-buffer-size 1</literallayout>]]>
4506 <emphasis>log-buffer-size 1</emphasis>
4510 <anchor id="log-max-lines">
4511 <![%config-file;[<para>@@</para>]]> <!-- for spacing -->
4513 <application>log-max-lines</application> is the maximum number of lines held
4514 in the log buffer. See above.
4517 <![%config-file;[<literallayout>@@#log-max-lines 200</literallayout>]]>
4520 <emphasis>log-max-lines 200</emphasis>
4524 <anchor id="log-highlight-messages">
4525 <![%config-file;[<para>@@</para>]]> <!-- for spacing -->
4527 If <quote>log-highlight-messages</quote> is set to 1,
4528 <application>Privoxy</application> will highlight portions of the log
4529 messages with a bold-faced font:
4532 <![%config-file;[<literallayout>@@#log-highlight-messages 1</literallayout>]]>
4535 <emphasis>log-highlight-messages 1</emphasis>
4539 <anchor id="log-font-name">
4540 <![%config-file;[<para>@@</para>]]> <!-- for spacing -->
4542 The font used in the console window:
4545 <![%config-file;[<literallayout>@@#log-font-name Comic Sans MS</literallayout>]]>
4548 <emphasis>log-font-name Comic Sans MS</emphasis>
4552 <anchor id="log-font-size">
4553 <![%config-file;[<para>@@</para>]]> <!-- for spacing -->
4555 Font size used in the console window:
4558 <![%config-file;[<literallayout>@@#log-font-size 8</literallayout>]]>
4561 <emphasis>log-font-size 8</emphasis>
4565 <anchor id="show-on-task-bar">
4566 <![%config-file;[<para>@@</para>]]> <!-- for spacing -->
4568 <quote>show-on-task-bar</quote> controls whether or not
4569 <application>Privoxy</application> will appear as a button on the Task bar
4573 <![%config-file;[<literallayout>@@#show-on-task-bar 0</literallayout>]]>
4576 <emphasis>show-on-task-bar 0</emphasis>
4580 <anchor id="close-button-minimizes">
4581 <![%config-file;[<para>@@</para>]]> <!-- for spacing -->
4583 If <quote>close-button-minimizes</quote> is set to 1, the Windows close
4584 button will minimize <application>Privoxy</application> instead of closing
4585 the program (close with the exit option on the File menu).
4588 <![%config-file;[<literallayout>@@#close-button-minimizes 1</literallayout>]]>
4591 <emphasis>close-button-minimizes 1</emphasis>
4595 <anchor id="hide-console">
4596 <![%config-file;[<para>@@</para>]]> <!-- for spacing -->
4598 The <quote>hide-console</quote> option is specific to the MS-Win console
4599 version of <application>Privoxy</application>. If this option is used,
4600 <application>Privoxy</application> will disconnect from and hide the
4604 <![%config-file;[<literallayout>@@#hide-console</literallayout>]]>
4607 #<emphasis>hide-console</emphasis>
4614 <!-- end config content common to both outputs -->
4617 <!-- These are dummy anchors to keep the processor quiet -->
4618 <!-- when building config-file only (ie. they are used in u-m only) -->
4621 <anchor id="filter">
4622 <anchor id="filter-file">
4624 <anchor id="actions-file">
4625 <anchor id="af-patterns">
4629 <!-- eof p-config.sgml -->