X-Git-Url: http://www.privoxy.org/gitweb/?a=blobdiff_plain;f=templates%2Fedit-actions-for-url;h=d1153320e2daeb1d149146ed8fc1be439fcc4496;hb=578b5ec72f1bb2ceebe5d0afca2327c9d7a22bf1;hp=0548bf44af4e493f323b28799c8729da815e7008;hpb=eab49ebd857dfee741125c50b60ce5ff41e8c3d0;p=privoxy.git diff --git a/templates/edit-actions-for-url b/templates/edit-actions-for-url index 0548bf44..d1153320 100644 --- a/templates/edit-actions-for-url +++ b/templates/edit-actions-for-url @@ -32,18 +32,24 @@ # # Revisions : # $Log: edit-actions-for-url,v $ -# Revision 1.31 2003/09/22 00:33:01 david__schmidt -# Enable sending a custom 'blocked' image. Shows up as -# "image-blocker-custom-file" parameter in config, and -# "+set-image-blocker{custom}" in action files. +# Revision 1.35 2006/08/03 02:46:42 david__schmidt +# Incorporate Fabian Keil's patch work: http://www.fabiankeil.de/sourcecode/privoxy/ # -# Revision 1.30 2002/09/05 16:12:02 oes -# Synced with stable branch: -# Revision 1.29.2.3 2002/08/23 02:22:53 hal9 -# Fix a perl brain fart with
  • in comments. +# Revision 1.34 2006/07/18 14:49:13 david__schmidt +# Reorganizing the repository: swapping out what was HEAD (the old 3.1 branch) +# with what was really the latest development (the v_3_0_branch branch) # -# Revision 1.29.2.1 2002/08/02 12:51:42 oes -# Added top submit button; Consistency with docs: Change default name for action from hide-referer to hide-referrer +# Revision 1.29.2.5 2004/10/05 03:17:26 david__schmidt +# Typo: inspect_jpegs, not inspect-jpegs in form +# +# Revision 1.29.2.4 2004/10/03 12:53:46 david__schmidt +# Add the ability to check jpeg images for invalid +# lengths of comment blocks. Defensive strategy +# against the exploit: +# Microsoft Security Bulletin MS04-028 +# Buffer Overrun in JPEG Processing (GDI+) Could +# Allow Code Execution (833987) +# Enabled with +inspect-jpegs in actions files. # # Revision 1.29.2.3 2002/08/23 02:22:53 hal9 # Fix a perl brain fart with
  • in comments. @@ -517,6 +523,19 @@ function show_send_wafer_opts(tf) id="deanimate_last" @deanimate-gifs-param-last@> + + + + + inspect-jpegs + Checks jpeg images for malicious content. + @@ -524,7 +543,8 @@ function show_send_wafer_opts(tf) name="downgrade_http_version" value="N" @downgrade-http-version-n@> - downgrade-http-version + downgrade-http-version Change HTTP/1.1 requests to HTTP/1.0. Only change if you know what you're doing! @@ -541,7 +561,20 @@ function show_send_wafer_opts(tf) fast-redirects Bypass some click-tracking URLs. - + +   +   +   +   + + +
    + +   hide-forwarded-for-headers Block any existing X-Forwarded-for header, and do not add a new one. + + + + + hide-if-modified-since + Remove or randomize If-Modified-Since header. + + +   +   +   +   + + Useful for filter testing.
    + + hour(s). + To appreciate this option a small amount of paranoia is required, + but at least in theory the If-Modified-Since header could be used + to keep track of your visits. + + + + + + + overwrite-last-modified + Remove or randomize If-Modified-Since header. + + +   +   +   +   + + Useless.
    + +
    + +
    + + + + + + + + crunch-if-none-match + Remove If-None-Match header to circumvent browser cache. Useful for filter testing, + but hurts performance. + + + + + + content-type-overwrite + Replace Content-Type header. Useful to let the browser render broken + XHTML as broken + HTML. By default it only applies to + text documents, if you know what you're doing you + can enable force-text-mode to modify binary content types as well. + + +   +   +   +   + New Content-Type:
    + + + + + + + + force-text-mode + + Enable filtering on documents whose Content-Type wasn't recognized as text. + Do think twice, nothing is alright. + + + + + + + handle-as-empty-document + + Block with an empty document instead of an Image or HTML message. + The empty document contains only a space and can safely be parsed + as JavaScript or Style Sheet. Use content-type-overwrite to specify the + Content-Type, default is test/html. + + + + + + + + treat-forbidden-connects-like-blocks + + Answer forbidden Connect requests with the usual block message. + May be a protocol violation, but makes unblocking easier. + + + + + + + + crunch-client-header + Remove header(s) matching the supplied pattern. Together with add-header you can + build a custom header replacement action. + + +   +   +   +   + Header string to suppress:
    + + + + + + + crunch-server-header + Remove server header(s) matching the supplied pattern. + + +   +   +   +   + Header string to suppress:
    + + + + + + + hide-accept-language + Pretend to have different language settings. (Makes a fake User-Agent more believable, + but can lead to foreign content.) + + +   +   +   +   + + This isn't the option you're looking for.
    +
    +
    + + + + + + + hide-content-disposition + Block or overwrite the content-disposition header. Useful to view a document inside the browser, + even if you were supposed to save it first, or to change the suggested file name. + + +   +   +   +   + +
    +
    +
    + + + + + + + redirect + Redirect to another address. + + +   +   +   +   + Address to redirect to:
    + + + + + + + filter-client-headers + Apply filters to the client headers as well. Only enable this if you know what you're doing. + + + + + + filter-server-headers + Apply filters to the server headers as well. Only enable this if you know what you're doing. + Fake as this web address:
    + value="@hide-referrer-param@">
    +
    - - - - - inspect-jpegs - Checks jpeg images for malicious content. - - kill-popups + kill-popups Filter the website through a built-in filter to disable many JavaScript pop-up windows. @@ -823,11 +1187,7 @@ function show_send_wafer_opts(tf)
    -
    + for="set_image_blocker_mode_blank">Send a 1x1 transparent GIF