2 <HTML><HEAD><TITLE>Manpage of PRIVOXY</TITLE>
3 <LINK REL="STYLESHEET" TYPE="text/css" HREF="../p_doc.css"></HEAD><BODY>
5 Section: (1)<BR>Updated: 25 August 2002<BR><A HREF="#index">Index</A>
8 <A NAME="lbAB"> </A>
11 privoxy - Privacy Enhancing Proxy
12 <A NAME="lbAC"> </A>
16 <B>privoxy</B> [<B>--help</B> ] [<B>--version</B> ] [<B>--no-daemon</B> ] [<B>--pidfile </B><I>pidfile</I><B></B> ] [<B>--user </B><I>user[.group]</I><B></B> ] [<B></B><I>configfile</I><B></B> ]<B> (UNIX)</B>
19 <B>privoxy.exe</B> [<B></B><I>configfile</I><B></B> ]<B> (Windows)</B>
21 <A NAME="lbAD"> </A>
26 <B>Privoxy</B> may be invoked with the following command line
30 Print brief usage info and exit.
31 <DT><B>--version</B><DD>
32 Print version info and exit.
33 <DT><B>--no-daemon</B><DD>
34 Don't become a daemon, i.e. don't fork and become process group
35 leader, don't detach from controlling tty, and do all logging there.
36 <DT><B>--pidfile </B><I>pidfile</I><B></B><DD>
37 On startup, write the process ID to <I>pidfile</I>.
38 Delete the <I>pidfile</I> on exit.
39 Failiure to create or delete the <I>pidfile</I>
40 is non-fatal. If no <B>--pidfile</B> option is given, no PID file will be used.
41 <DT><B>--user </B><I>user[.group]</I><B></B><DD>
42 After (optionally) writing the PID file, assume the user ID of
43 <I>user</I> and the GID of
44 <I>group</I>, or, if the optional
45 <I>group</I> was not given, the default group of
46 <I>user</I>. Exit if the privileges are not
51 If the <I>configfile</I> is not specified on the command line,
52 <B>Privoxy</B> will look for a file named
53 <I>config</I> in the current directory (except on Win32 where
54 it will try <I>config.txt</I>). If no
55 <I>configfile</I> is found, <B>Privoxy</B> will
57 <A NAME="lbAE"> </A>
62 <B>Privoxy</B> is a web proxy with advanced filtering
63 capabilities for protecting privacy, filtering web page content, managing
64 cookies, controlling access, and removing ads, banners, pop-ups and other
65 obnoxious Internet junk. <B>Privoxy</B> has a very
66 flexible configuration and can be customized to suit individual needs and
67 tastes. <B>Privoxy</B> has application for both
68 stand-alone systems and multi-user networks.
71 <B>Privoxy</B> is based on <B>Internet
73 <A NAME="lbAF"> </A>
74 <H2>INSTALLATION AND USAGE</H2>
78 Browsers must be individually configured to use <B>Privoxy</B> as
79 a HTTP proxy. The default setting is for localhost, on port 8118
80 (configurable in the main config file). To set the HTTP proxy in Netscape
81 and Mozilla, go through: <B>Edit</B>;
82 <B>Preferences</B>; <B>Advanced</B>;
83 <B>Proxies</B>; <B>Manual Proxy Configuration</B>;
87 For Internet Explorer, go through: <B>Tools</B>;
88 <B>Internet Properties</B>; <B>Connections</B>;
92 The Secure (SSL) Proxy should also be set to the same values, otherwise
93 https: URLs will not be proxied. Note: <B>Privoxy</B> can only
94 proxy HTTP and HTTPS traffic. Do not try it with FTP or other protocols.
97 For other browsers, check the documentation.
98 <A NAME="lbAG"> </A>
99 <H2>CONFIGURATION</H2>
103 <B>Privoxy</B> can be configured with the various configuration
104 files. The default configuration files are: <I>config</I>,
105 <I>default.filter</I>, and
106 <I>default.action</I>. <I>user.action</I> should
107 be used for locally defined exceptions to the default rules of
108 <I>default.action</I> These are all well commented. On Unix
109 and Unix-like systems, these are located in
110 <I>/etc/privoxy/</I> by default. On Windows, OS/2 and AmigaOS,
111 these files are in the same directory as the <B>Privoxy</B>
115 The name and number of configuration files has changed from previous
116 versions. In fact, the configuration itself is changed and much more
117 sophisticated. See the user-manual for a complete
118 explanation of all configuration options and general usage, and notes for
119 upgrading from <B>Junkbuster</B> and earlier <B>Privoxy</B>
123 The actions list (ad blocks, etc) can also be configured with your
124 web browser at <A HREF="http://config.privoxy.org/">http://config.privoxy.org/.</A>
125 <B>Privoxy's</B> configuration parameters can also be viewed at
126 the same page. In addition, <B>Privoxy</B> can be toggled on/off.
127 This is an internal page, and does not require Internet access.
128 <A NAME="lbAH"> </A>
129 <H2>SAMPLE CONFIGURATION</H2>
133 A brief example of what a simple <I>default.action</I>
134 configuration might look like:
137 # Define a few useful custom aliases for later use
141 +crunch-cookies = +crunch-incoming-cookies +crunch-outgoing-cookies
142 -crunch-cookies = -crunch-incoming-cookies -crunch-outgoing-cookies
143 +imageblock = +block +handle-as-image
145 # Fragile sites should have the minimum changes
146 fragile = -block -deanimate-gifs -fast-redirects -filter \
147 -hide-referer -prevent-cookies -kill-popups
149 ## Turn some actions on ################################
153 +deanimate-gifs{last} \
154 -downgrade-http-version \
156 +filter{html-annoyances} \
157 +filter{js-annoyances} \
158 +filter{content-cookies} \
160 +filter{banners-by-size} \
161 +hide-forwarded-for-headers \
162 +hide-from-header{block} \
163 +hide-referrer{forge} \
166 +set-image-blocker{pattern} \
168 +prevent-compression \
169 +session-cookies-only \
173 / # '/' Matches *all* URL patterns
175 # Block, and treat these URL patterns as if they were 'images'.
176 # We would expect these to be ads.
179 .a[0-9].yimg.com/(?:(?!/i/).)*$
182 # Block any URLs that match these patterns
187 /.*count(er)?\.(pl|cgi|exe|dll|asp|php[34]?)
190 # Make exceptions for these harmless ones that would be
191 # caught by our +block patterns just above.
200 Then for a <I>user.action</I>, we would put local,
201 narrowly defined exceptions:
204 # Re-define aliases as needed here
208 -crunch-cookies = -crunch-incoming-cookies -crunch-outgoing-cookies
210 # Set personal exceptions to the policies in default.action #######
212 # Sites where we want persistant cookies, so allow *all* cookies
213 {-crunch-cookies -session-cookies-only}
218 # This site breaks easily.
219 {-block -fast-redirects}
225 See the comments in the configuration files themselves, or the
227 for explanations of the above syntax, and other <B>Privoxy</B>
228 configuration options.
229 <A NAME="lbAI"> </A>
235 <I>/usr/sbin/privoxy</I>
236 <I>/etc/privoxy/config</I>
237 <I>/etc/privoxy/default.action</I>
238 <I>/etc/privoxy/standard.action</I>
239 <I>/etc/privoxy/user.action</I>
240 <I>/etc/privoxy/default.filter</I>
241 <I>/etc/privoxy/trust</I>
242 <I>/etc/privoxy/templates/*</I>
243 <I>/var/log/privoxy/logfile</I>
248 Various other files should be included, but may vary depending on platform
249 and build configuration. More documentation should be included in the local
250 documentation directory.
251 <A NAME="lbAJ"> </A>
256 <B>Privoxy</B> terminates on the <B>SIGINT</B>,
257 <B>SIGTERM</B> and <B>SIGABRT</B> signals. Log
258 rotation scripts may cause a re-opening of the logfile by sending a
259 <B>SIGHUP</B> to <B>Privoxy</B>. Note that unlike
260 other daemons, <B>Privoxy</B> does not need to be made aware of
261 config file changes by <B>SIGHUP</B> -- it will detect them
263 <A NAME="lbAK"> </A>
268 Please see the <I>User Manual</I> on how to contact the
269 developers for feature requests, reporting problems, and other questions.
270 <A NAME="lbAL"> </A>
275 Other references and sites of interest to <B>Privoxy</B>
280 <A HREF="http://www.privoxy.org/">http://www.privoxy.org/,</A>
281 the <B>Privoxy</B> Home page.
283 <A HREF="http://www.privoxy.org/faq/">http://www.privoxy.org/faq/,</A>
284 the <B>Privoxy</B> FAQ.
286 <A HREF="http://sourceforge.net/projects/ijbswa/">http://sourceforge.net/projects/ijbswa/,</A>
287 the Project Page for <B>Privoxy</B> on
290 <A HREF="http://config.privoxy.org/">http://config.privoxy.org/,</A>
291 the web-based user interface. <B>Privoxy</B> must be
292 running for this to work. Shortcut: <A HREF="http://p.p/">http://p.p/</A>
294 <A HREF="http://www.privoxy.org/actions/">http://www.privoxy.org/actions/,</A> to submit ``misses'' to the developers.
296 <A HREF="http://cvs.sourceforge.net/cgi-bin/viewcvs.cgi/ijbswa/contrib/">http://cvs.sourceforge.net/cgi-bin/viewcvs.cgi/ijbswa/contrib/,</A> cool
297 and fun ideas from <B>Privoxy</B> users.
299 <A HREF="http://www.junkbusters.com/ht/en/cookies.html">http://www.junkbusters.com/ht/en/cookies.html,</A>
300 an explanation how cookies are used to track web users.
302 <A HREF="http://www.junkbusters.com/ijb.html">http://www.junkbusters.com/ijb.html,</A>
303 the original Internet Junkbuster.
305 <A HREF="http://www.waldherr.org/junkbuster/">http://www.waldherr.org/junkbuster/,</A>
306 Stefan Waldherr's version of Junkbuster, from which <B>Privoxy</B> was
309 <A HREF="http://privacy.net/analyze/">http://privacy.net/analyze/,</A> a useful site
310 to check what information about you is leaked while you browse the web.
312 <A HREF="http://www.squid-cache.org/">http://www.squid-cache.org/,</A> a very popular
313 caching proxy, which is often used together with <B>Privoxy</B>.
315 <A HREF="http://www.privoxy.org/developer-manual/">http://www.privoxy.org/developer-manual/,</A>
316 the <B>Privoxy</B> developer manual.
317 <A NAME="lbAM"> </A>
318 <H2>DEVELOPMENT TEAM</H2>
327 Rodrigo Barbosa (RPM specfiles)
330 Karsten Hopp (Red Hat)
332 Gábor Lipták
335 Roland Rosenfeld (Debian)
336 Georg Sauthoff (Gentoo)
337 David Schmidt (OS/2, Mac OSX ports)
338 Joerg Strohmayer (Amiga)
342 <A NAME="lbAN"> </A>
343 <H2>COPYRIGHT AND LICENSE</H2>
345 <A NAME="lbAO"> </A>
350 Copyright (C) 2001, 2002 by Privoxy Developers <<A HREF="mailto:developers@privoxy.org">developers@privoxy.org</A>>
353 Some source code is based on code Copyright (C) 1997 by Anonymous Coders
354 and Junkbusters, Inc. and licensed under the <I>GNU General Public
356 <A NAME="lbAP"> </A>
361 <B>Privoxy</B> is free software; you can
362 redistribute it and/or modify it under the terms of the
363 <I>GNU General Public
364 License</I>, version 2, as published by the Free Software Foundation.
367 This program is distributed in the hope that it will be useful, but WITHOUT
368 ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
369 FITNESS FOR A PARTICULAR PURPOSE. See the
370 <I>GNU General Public License</I> for
371 more details, which is available from the Free Software Foundation, Inc, 59
372 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
375 You should have received a copy of the <I>GNU General Public License</I>
376 along with this program; if not, write to the Free Software
377 Foundation, Inc. 59 Temple Place - Suite 330
378 Boston, MA 02111-1307
383 <A NAME="index"> </A><H2>Index</H2>
385 <DT><A HREF="#lbAB">NAME</A><DD>
386 <DT><A HREF="#lbAC">SYNOPSIS</A><DD>
387 <DT><A HREF="#lbAD">OPTIONS</A><DD>
388 <DT><A HREF="#lbAE">DESCRIPTION</A><DD>
389 <DT><A HREF="#lbAF">INSTALLATION AND USAGE</A><DD>
390 <DT><A HREF="#lbAG">CONFIGURATION</A><DD>
391 <DT><A HREF="#lbAH">SAMPLE CONFIGURATION</A><DD>
392 <DT><A HREF="#lbAI">FILES</A><DD>
393 <DT><A HREF="#lbAJ">SIGNALS</A><DD>
394 <DT><A HREF="#lbAK">NOTES</A><DD>
395 <DT><A HREF="#lbAL">SEE ALSO</A><DD>
396 <DT><A HREF="#lbAM">DEVELOPMENT TEAM</A><DD>
397 <DT><A HREF="#lbAN">COPYRIGHT AND LICENSE</A><DD>
399 <DT><A HREF="#lbAO">COPYRIGHT</A><DD>
400 <DT><A HREF="#lbAP">LICENSE</A><DD>
404 This document was created by
406 using the manual pages.<BR>
407 Time: 22:33:08 GMT, August 25, 2002