X-Git-Url: http://www.privoxy.org/gitweb/?a=blobdiff_plain;f=doc%2Fsource%2Fp-config.sgml;h=83ee1313c6571f3ff15ba77a92db96d3ae95db40;hb=da5c31a52dde23aa688c3c65771c90d4182861f9;hp=5eef4d2d2706ddee36c11d9c26860d5e58027c26;hpb=5bb0f71836ddb4d463c21dcfd552b33d1f0e49ee;p=privoxy.git diff --git a/doc/source/p-config.sgml b/doc/source/p-config.sgml index 5eef4d2d..83ee1313 100644 --- a/doc/source/p-config.sgml +++ b/doc/source/p-config.sgml @@ -3,7 +3,7 @@ Purpose : Used with other docs and files only. - Copyright (C) 2001-2019 Privoxy Developers https://www.privoxy.org/ + Copyright (C) 2001-2020 Privoxy Developers https://www.privoxy.org/ See LICENSE. ======================================================================== @@ -90,7 +90,7 @@ Sample Configuration File for Privoxy &p-version; -Copyright (C) 2001-2019 Privoxy Developers https://www.privoxy.org/ +Copyright (C) 2001-2020 Privoxy Developers https://www.privoxy.org/ @@ -107,7 +107,8 @@ Copyright (C) 2001-2019 Privoxy Developers https://www.privoxy.org/ 4. ACCESS CONTROL AND SECURITY # 5. FORWARDING # 6. MISCELLANEOUS # - 7. WINDOWS GUI OPTIONS # + 7. HTTPS INSPECTION (EXPERIMENTAL) # + 8. WINDOWS GUI OPTIONS # # ################################################################## @@ -1015,7 +1016,7 @@ actionsfile The available debug levels are: - debug 1 # Log the destination for each request &my-app; let through. See also debug 1024. + debug 1 # Log the destination for each request. See also debug 1024. debug 2 # show each connection status debug 4 # show I/O status debug 8 # show header parsing @@ -1259,6 +1260,9 @@ actionsfile If the specified address isn't available on the system, or if the hostname can't be resolved, Privoxy will fail to start. + On GNU/Linux, and other platforms that can listen on not yet assigned IP + addresses, Privoxy will start and will listen on the specified + address whenever the IP address is assigned to the system IPv6 addresses containing colons have to be quoted by brackets. @@ -1626,7 +1630,7 @@ actionsfile - Examples: + Example: enforce-blocks 1 @@ -1673,7 +1677,7 @@ ACLs: permit-access and deny-access If your system implements RFC 3493, then src_addr and dst_addr can be IPv6 addresses delimeted by + class="parameter">dst_addr can be IPv6 addresses delimited by brackets, port can be a number or a service name, and src_masklen and @@ -2226,7 +2230,7 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t target_pattern - socks_proxy[:port] + [user:pass@]socks_proxy[:port] http_parent[:port] @@ -2239,7 +2243,8 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t (http_parent may be . to denote no HTTP forwarding), and the optional port parameters are TCP ports, - i.e. integer values from 1 to 65535 + i.e. integer values from 1 to 65535. user and + pass can be used for SOCKS5 authentication if required. @@ -2315,6 +2320,13 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t forward-socks4 / socks-gw.example.com:1080 . + + To connect SOCKS5 proxy which requires username/password authentication: + + + forward-socks5 / user:pass@socks-gw.example.com:1080 . + + To chain Privoxy and Tor, both running on the same system, you would use something like: @@ -2496,7 +2508,7 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t - Examples: + Example: forwarded-connect-retries 1 @@ -2573,7 +2585,7 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t - Examples: + Example: accept-intercepted-requests 1 @@ -2631,7 +2643,7 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t - Examples: + Example: allow-cgi-request-crunching 1 @@ -2698,7 +2710,7 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t - Examples: + Example: split-large-forms 1 @@ -2781,7 +2793,7 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t - Examples: + Example: keep-alive-timeout 300 @@ -2850,7 +2862,7 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t - Examples: + Example: tolerate-pipelining 1 @@ -2931,7 +2943,7 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t - Examples: + Example: default-server-timeout 60 @@ -2939,7 +2951,7 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t -@@#default-server-timeout 60]]> +@@#default-server-timeout 5]]> @@ -3030,7 +3042,7 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t - Examples: + Example: connection-sharing 1 @@ -3086,7 +3098,7 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t - Examples: + Example: socket-timeout 300 @@ -3174,7 +3186,7 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t - Examples: + Example: max-client-connections 256 @@ -3223,13 +3235,13 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t Under high load incoming connection may queue up before Privoxy - gets around to serve them. The queue length is limitted by the + gets around to serve them. The queue length is limited by the operating system. Once the queue is full, additional connections are dropped before Privoxy can accept and serve them. Increasing the queue length allows Privoxy to accept more - incomming connections that arrive roughly at the same time. + incoming connections that arrive roughly at the same time. Note that Privoxy can only request a certain queue length, @@ -3253,7 +3265,7 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t - Examples: + Example: listen-backlog 4096 @@ -3324,7 +3336,7 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t - Examples: + Example: enable-accept-filter 1 @@ -3670,7 +3682,7 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t # Define a couple of tags, the described effect requires action sections # that are enabled based on CLIENT-TAG patterns. client-specific-tag circumvent-blocks Overrule blocks but do not affect other actions - disable-content-filters Disable content-filters but do not affect other actions + client-specific-tag disable-content-filters Disable content-filters but do not affect other actions @@ -3727,7 +3739,7 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t - Examples: + Example: # Increase the time to life for temporarily enabled tags to 3 minutes @@ -3799,7 +3811,7 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t - Examples: + Example: # Allow systems that can reach Privoxy to provide the client @@ -3872,7 +3884,7 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t - Examples: + Example: # Increase the receive buffer size @@ -3887,6 +3899,539 @@ forward-socks4, forward-socks4a, forward-socks5 and forward-socks5t + + +HTTPS Inspection (Experimental) + + + HTTPS inspection allows to filter encrypted requests. + This is only supported when Privoxy + has been built with FEATURE_HTTPS_INSPECTION. + + + + +ca-directory + + + Specifies: + + + Directory with the CA key, the CA certificate and the trusted CAs file. + + + + + Type of value: + + + Text + + + + + Default value: + + Empty string + + + + Effect if unset: + + + Default value is used. + + + + + Notes: + + + This directive specifies the directory where the + CA key, the CA certificate and the trusted CAs file + are located. + + + The permissions should only let &my-app; and the &my-app; + admin access the directory. + + + + + Example: + + + ca-directory /usr/local/etc/privoxy/CA + + + + +@@#ca-directory /usr/local/etc/privoxy/CA]]> + + + + + + +ca-cert-file + + + Specifies: + + + The CA certificate file in ".crt" format. + + + + + Type of value: + + + Text + + + + + Default value: + + cacert.crt + + + + Effect if unset: + + + Default value is used. + + + + + Notes: + + + This directive specifies the name of the CA certificate file + in ".crt" format. + + + The file is used by &my-app; to generate website certificates + when https inspection is enabled with the + https-inspection + action. + + + &my-app; clients should import the certificate so that they + can validate the generated certificates. + + + The file can be generated with: + openssl req -new -x509 -extensions v3_ca -keyout cakey.pem -out cacert.crt -days 3650 + + + + + Example: + + + ca-cert-file root.crt + + + + +@@#ca-cert-file cacert.crt]]> + + + + + + +ca-key-file + + + Specifies: + + + The CA key file in ".pem" format. + + + + + Type of value: + + + Text + + + + + Default value: + + cacert.pem + + + + Effect if unset: + + + Default value is used. + + + + + Notes: + + + This directive specifies the name of the CA key file in ".pem" format. + The ca-cert-file section contains + a command to generate it. + + + + + Example: + + + ca-key-file cakey.pem + + + + +@@#ca-key-file cakey.pem]]> + + + + + + +ca-password + + + Specifies: + + + The password for the CA keyfile. + + + + + Type of value: + + + Text + + + + + Default value: + + Empty string + + + + Effect if unset: + + + Default value is used. + + + + + Notes: + + + This directive specifies the password for the CA keyfile + that is used when Privoxy generates certificates for intercepted + requests. + + + Note that the password is shown on the CGI page so don't + reuse an important one. + + + + + Example: + + + ca-password blafasel + + + + +@@#ca-password swordfish]]> + + + + + + +certificate-directory + + + Specifies: + + + Directory to save generated keys and certificates. + + + + + Type of value: + + + Text + + + + + Default value: + + ./certs + + + + Effect if unset: + + + Default value is used. + + + + + Notes: + + + This directive specifies the directory where generated + TLS/SSL keys and certificates are saved when https inspection + is enabled with the + https-inspection + action. + + + The keys and certificates currently have to be deleted manually + when changing the ca-cert-file + and the ca-cert-key. + + + The permissions should only let &my-app; and the &my-app; + admin access the directory. + + + + &my-app; currently does not garbage-collect obsolete keys + and certificates and does not keep track of how may keys + and certificates exist. + + + &my-app; admins should monitor the size of the directory + and/or make sure there is sufficient space available. + A cron job to limit the number of keys and certificates + to a certain number may be worth considering. + + + + + + Example: + + + certificate-directory /usr/local/var/privoxy/certs + + + + +@@#certificate-directory /usr/local/var/privoxy/certs]]> + + + + + + +cipher-list + + + Specifies: + + + A list of ciphers to use in TLS handshakes + + + + + Type of value: + + + Text + + + + + Default value: + + None + + + + Effect if unset: + + + A default value is inherited from the TLS library. + + + + + Notes: + + + This directive allows to specify a non-default list of ciphers to use + in TLS handshakes with clients and servers. + + + Ciphers are separated by colons. Which ciphers are supported + depends on the TLS library. When using OpenSSL, unsupported ciphers + are skipped. When using MbedTLS they are rejected. + + + + Specifying an unusual cipher list makes fingerprinting easier. + Note that the default list provided by the TLS library may + be unusual when compared to the one used by modern browsers + as well. + + + + + + Examples: + + + # Explicitly set a couple of ciphers with names used by MbedTLS + cipher-list cipher-list TLS-ECDHE-RSA-WITH-CHACHA20-POLY1305-SHA256:\ +TLS-ECDHE-ECDSA-WITH-CHACHA20-POLY1305-SHA256:\ +TLS-DHE-RSA-WITH-CHACHA20-POLY1305-SHA256:\ +TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256:\ +TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384:\ +TLS-ECDHE-ECDSA-WITH-AES-256-CCM:\ +TLS-ECDHE-ECDSA-WITH-AES-256-CCM-8:\ +TLS-ECDHE-ECDSA-WITH-AES-128-CCM:\ +TLS-ECDHE-ECDSA-WITH-AES-128-CCM-8:\ +TLS-ECDHE-ECDSA-WITH-CAMELLIA-128-GCM-SHA256:\ +TLS-ECDHE-ECDSA-WITH-CAMELLIA-256-GCM-SHA384:\ +TLS-ECDHE-RSA-WITH-AES-128-GCM-SHA256:\ +TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384:\ +TLS-ECDHE-RSA-WITH-CAMELLIA-128-GCM-SHA256:\ +TLS-ECDHE-RSA-WITH-CAMELLIA-256-GCM-SHA384:\ +TLS-DHE-RSA-WITH-AES-256-GCM-SHA384:\ +TLS-DHE-RSA-WITH-AES-128-GCM-SHA256:\ +TLS-DHE-RSA-WITH-AES-256-CCM:\ +TLS-DHE-RSA-WITH-AES-256-CCM-8:\ +TLS-DHE-RSA-WITH-AES-128-CCM:\ +TLS-DHE-RSA-WITH-AES-128-CCM-8:\ +TLS-DHE-RSA-WITH-CAMELLIA-128-GCM-SHA256:\ +TLS-DHE-RSA-WITH-CAMELLIA-256-GCM-SHA384:\ +TLS-ECDH-RSA-WITH-AES-128-GCM-SHA256:\ +TLS-ECDH-RSA-WITH-AES-256-GCM-SHA384:\ +TLS-ECDH-RSA-WITH-CAMELLIA-128-GCM-SHA256:\ +TLS-ECDH-RSA-WITH-CAMELLIA-256-GCM-SHA384:\ +TLS-ECDH-ECDSA-WITH-AES-128-GCM-SHA256:\ +TLS-ECDH-ECDSA-WITH-AES-256-GCM-SHA384:\ +TLS-ECDH-ECDSA-WITH-CAMELLIA-128-GCM-SHA256:\ +TLS-ECDH-ECDSA-WITH-CAMELLIA-256-GCM-SHA384 + + + # Explicitly set a couple of ciphers with names used by OpenSSL +cipher-list ECDHE-RSA-AES256-GCM-SHA384:\ +ECDHE-ECDSA-AES256-GCM-SHA384:\ +DH-DSS-AES256-GCM-SHA384:\ +DHE-DSS-AES256-GCM-SHA384:\ +DH-RSA-AES256-GCM-SHA384:\ +DHE-RSA-AES256-GCM-SHA384:\ +ECDH-RSA-AES256-GCM-SHA384:\ +ECDH-ECDSA-AES256-GCM-SHA384:\ +ECDHE-RSA-AES128-GCM-SHA256:\ +ECDHE-ECDSA-AES128-GCM-SHA256:\ +DH-DSS-AES128-GCM-SHA256:\ +DHE-DSS-AES128-GCM-SHA256:\ +DH-RSA-AES128-GCM-SHA256:\ +DHE-RSA-AES128-GCM-SHA256:\ +ECDH-RSA-AES128-GCM-SHA256:\ +ECDH-ECDSA-AES128-GCM-SHA256:\ +ECDHE-RSA-AES256-GCM-SHA384:\ +AES128-SHA + + + # Use keywords instead of explicitly naming the ciphers (Does not work with MbedTLS) + cipher-list ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH + + + + + + + + + + +trusted-cas-file + + + Specifies: + + + The trusted CAs file in ".pem" format. + + + + + Type of value: + + + File name relative to ca-directory + + + + + Default value: + + trustedCAs.pem + + + + Effect if unset: + + + Default value is used. + + + + + Notes: + + + This directive specifies the trusted CAs file that is used when validating + certificates for intercepted TLS/SSL requests. + + + An example file can be downloaded from + https://curl.haxx.se/ca/cacert.pem. + + + + + Example: + + + trusted-cas-file trusted_cas_file.pem + + + + +@@#trusted-cas-file trustedCAs.pem]]> + + + + + +