X-Git-Url: http://www.privoxy.org/gitweb/?a=blobdiff_plain;f=doc%2Fsource%2Fp-config.sgml;h=30f5701b1e94c9935544b5e8f90b36f115e5249d;hb=ebbac8cf3d2fab2ac88871ab7c442a20c2e9e1f1;hp=788dc7b656e95186d1366a67b707c6ce4ba7741e;hpb=352696e3ebdddaaf4d370ee35f2bab3ed3b18134;p=privoxy.git diff --git a/doc/source/p-config.sgml b/doc/source/p-config.sgml index 788dc7b6..30f5701b 100644 --- a/doc/source/p-config.sgml +++ b/doc/source/p-config.sgml @@ -1,11 +1,9 @@ + +I. INTRODUCTION + =============== + This file holds Privoxy's main configuration. Privoxy detects @@ -266,7 +256,7 @@ II. FORMAT OF THE CONFIGURATION FILE PATH to where the User Manual is located: -   user-manual  /usr/share/doc/privoxy/user-manual + user-manual /usr/share/doc/privoxy/user-manual The User Manual is then available to anyone with access to Privoxy, by following the built-in URL: @@ -277,7 +267,7 @@ II. FORMAT OF THE CONFIGURATION FILE If the documentation is not on the local system, it can be accessed from a remote server, as: -   user-manual  http://example.com/privoxy/user-manual/ + user-manual http://example.com/privoxy/user-manual/ @@ -1270,6 +1260,9 @@ actionsfile If the specified address isn't available on the system, or if the hostname can't be resolved, Privoxy will fail to start. + On GNU/Linux, and other platforms that can listen on not yet assigned IP + addresses, Privoxy will start and will listen on the specified + address whenever the IP address is assigned to the system IPv6 addresses containing colons have to be quoted by brackets. @@ -1994,6 +1987,11 @@ ACLs: permit-access and deny-access Requests are accepted if the specified trusted-cgi-refer is the prefix of the Referer. + + If the trusted source is supposed to access the CGI pages via + JavaScript the cors-allowed-origin + option can be used. + Declaring pages the admin doesn't control trustworthy may allow @@ -2005,7 +2003,75 @@ ACLs: permit-access and deny-access -@@trusted-cgi-referer http://www.example.org/local-privoxy-control-page]]> +@@#trusted-cgi-referer http://www.example.org/local-privoxy-control-page]]> + + + + +cors-allowed-origin + + + Specifies: + + + A trusted website which can access &my-app;'s CGI pages through JavaScript. + + + + + Type of value: + + URL + + + + Default value: + + Unset + + + + Effect if unset: + + + No external sites get access via cross-origin resource sharing. + + + + + Notes: + + + Modern browsers by default prevent cross-origin requests made + via JavaScript to &my-app;'s CGI interface even if &my-app; + would trust the referer because it's white listed via the + trusted-cgi-referer + directive. + + + Cross-origin resource sharing (CORS) is a mechanism to allow + cross-origin requests. + + + The cors-allowed-origin option can be used to specify + a domain that is allowed to make requests to Privoxy CGI interface + via JavaScript. It is used in combination with the + trusted-cgi-referer + directive. + + + + Declaring domains the admin doesn't control trustworthy may allow + malicious third parties to modify Privoxy's internal state against + the user's wishes and without the user's knowledge. + + + + + + +@@#cors-allowed-origin http://www.example.org/]]> @@ -2164,7 +2230,7 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t target_pattern - socks_proxy[:port] + [user:pass@]socks_proxy[:port] http_parent[:port] @@ -2177,7 +2243,8 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t (http_parent may be . to denote no HTTP forwarding), and the optional port parameters are TCP ports, - i.e. integer values from 1 to 65535 + i.e. integer values from 1 to 65535. user and + pass can be used for SOCKS5 authentication if required. @@ -2253,6 +2320,13 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t forward-socks4 / socks-gw.example.com:1080 . + + To connect SOCKS5 proxy which requires username/password authentication: + + + forward-socks5 / user:pass@socks-gw.example.com:1080 . + + To chain Privoxy and Tor, both running on the same system, you would use something like: @@ -2273,8 +2347,8 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t forward 192.168.*.*/ . - forward 10.*.*.*/ . - forward 127.*.*.*/ . + forward 10.*.*.*/ . + forward 127.*.*.*/ . Unencrypted connections to systems in these address ranges will @@ -3323,8 +3397,8 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t This directive was added as a work-around for Firefox bug 492459: Websites are no longer rendered if SSL requests for JavaScripts are blocked by a proxy. - (https://bugzilla.mozilla.org/show_bug.cgi?id=492459), + ( + https://bugzilla.mozilla.org/show_bug.cgi?id=492459), the bug has been fixed for quite some time, but this directive is also useful to make it harder for websites to detect whether or not resources are being blocked. @@ -3446,15 +3520,17 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t # Best speed (compared to the other levels) compression-level 1 + # Best compression compression-level 9 + # No compression. Only useful for testing as the added header # slightly increases the amount of data that has to be sent. # If your benchmark shows that using this compression level # is superior to using no compression at all, the benchmark # is likely to be flawed. compression-level 0 - + @@ -3606,8 +3682,8 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t # Define a couple of tags, the described effect requires action sections # that are enabled based on CLIENT-TAG patterns. client-specific-tag circumvent-blocks Overrule blocks but do not affect other actions - disable-content-filters Disable content-filters but do not affect other actions - + client-specific-tag disable-content-filters Disable content-filters but do not affect other actions + @@ -3668,7 +3744,7 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t # Increase the time to life for temporarily enabled tags to 3 minutes client-tag-lifetime 180 - + @@ -3741,7 +3817,7 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t # Allow systems that can reach Privoxy to provide the client # IP address with a X-Forwarded-For header. trust-x-forwarded-for 1 - + @@ -3813,7 +3889,7 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t # Increase the receive buffer size receive-buffer-size 32768 - + @@ -3823,6 +3899,392 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t + + +TLS/SSL + + + +ca-directory + + + Specifies: + + + Directory with the CA key, the CA certificate and the trusted CAs file. + + + + + Type of value: + + + Text + + + + + Default value: + + Empty string + + + + Effect if unset: + + + Default value is used. + + + + + Notes: + + + This directive specifies the directory where the + CA key, the CA certificate and the trusted CAs file + are located. + + + The permissions should only let &my-app; and the &my-app; + admin access the directory. + + + + + Examples: + + + ca-directory /usr/local/etc/privoxy/CA + + + + +@@#ca-directory /usr/local/etc/privoxy/CA]]> + + + + + + +ca-cert-file + + + Specifies: + + + The CA certificate file in ".crt" format. + + + + + Type of value: + + + Text + + + + + Default value: + + cacert.crt + + + + Effect if unset: + + + Default value is used. + + + + + Notes: + + + This directive specifies the name of the CA certificate file + in ".crt" format. + + + The file is used by &my-app; to generate website certificates + when https filtering is enabled with the + enable-https-filtering + action. + + + &my-app; clients should import the certificate so that they + can validate the generated certificates. + + + The file can be generated with: + openssl req -new -x509 -extensions v3_ca -keyout cakey.pem -out cacert.crt -days 3650 + + + + + Examples: + + + ca-cert-file root.crt + + + + +@@#ca-cert-file cacert.crt]]> + + + + + + +ca-key-file + + + Specifies: + + + The CA key file in ".pem" format. + + + + + Type of value: + + + Text + + + + + Default value: + + cacert.pem + + + + Effect if unset: + + + Default value is used. + + + + + Notes: + + + This directive specifies the name of the CA key file + in ".pem" format. See the ca-cert-file + for a command to generate it. + + + + + Examples: + + + ca-key-file cakey.pem + + + + +@@#ca-key-file root.pem]]> + + + + + + +ca-password + + + Specifies: + + + The password for the CA keyfile. + + + + + Type of value: + + + Text + + + + + Default value: + + Empty string + + + + Effect if unset: + + + Default value is used. + + + + + Notes: + + + This directive specifies the password for the CA keyfile + that is used when Privoxy generates certificates for intercepted + requests. + + + Note that the password is shown on the CGI page so don't + reuse an important one. + + + + + Examples: + + + ca-password blafasel + + + + +@@#ca-password swordfish]]> + + + + + + +certificate-directory + + + Specifies: + + + Directory to safe generated keys and certificates. + + + + + Type of value: + + + Text + + + + + Default value: + + ./certs + + + + Effect if unset: + + + Default value is used. + + + + + Notes: + + + This directive specifies the directory where generated + TLS/SSL keys and certificates are saved. + + + The keys and certificates currently have to be deleted manually + when changing the ca-cert-file + and the ca-cert-key. + + + The permissions should only let &my-app; and the &my-app; + admin access the directory. + + + + + Examples: + + + certificate-directory /usr/local/var/privoxy/certs + + + + +@@#certificate-directory /usr/local/var/privoxy/certs]]> + + + + + + +trusted-cas-file + + + Specifies: + + + The trusted CAs file in ".pem" format. + + + + + Type of value: + + + File name relative to ca-directory + + + + + Default value: + + trustedCAs.pem + + + + Effect if unset: + + + Default value is used. + + + + + Notes: + + + This directive specifies the trusted CAs file that is used when validating + certificates for intercepted TLS/SSL request. + + + An example file can be downloaded from + https://curl.haxx.se/ca/cacert.pem. + + + + + Examples: + + + trusted-cas-file trusted_cas_file.pem + + + + +@@#trusted-cas-file trustedCAs.pem]]> + + + + + + @@ -3842,15 +4304,9 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t @@#activity-animation 1]]> - - activity-animation 1 - - - - + ]]> @@ -3864,15 +4320,9 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t @@#log-messages 1]]> - - log-messages 1 - - - - + ]]> @@ -3890,15 +4340,9 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t @@#log-buffer-size 1]]> - - log-buffer-size 1 - - - - + ]]> @@ -3910,15 +4354,9 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t @@#log-max-lines 200]]> - - log-max-lines 200 - - - - + ]]> @@ -3931,15 +4369,9 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t @@#log-highlight-messages 1]]> - - log-highlight-messages 1 - - - - + ]]> @@ -3950,15 +4382,9 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t @@#log-font-name Comic Sans MS]]> - - log-font-name Comic Sans MS - - - - + ]]> @@ -3969,15 +4395,9 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t @@#log-font-size 8]]> - - log-font-size 8 - - - - + ]]> @@ -3990,15 +4410,9 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t @@#show-on-task-bar 0]]> - - show-on-task-bar 0 - - - - + ]]> @@ -4011,15 +4425,9 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t @@#close-button-minimizes 1]]> - - close-button-minimizes 1 - - - - + ]]> @@ -4033,15 +4441,9 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t @@#hide-console]]> - - #hide-console - - - - + ]]>