From b8192042138fa3e17454c7b5b078d7b6611b22c8 Mon Sep 17 00:00:00 2001 From: oes Date: Sat, 27 Jul 2002 18:50:56 +0000 Subject: [PATCH] Generated --- doc/webserver/faq/configuration.html | 206 +++++--- doc/webserver/faq/contact.html | 46 +- doc/webserver/faq/copyright.html | 20 +- doc/webserver/faq/general.html | 113 +++-- doc/webserver/faq/index.html | 101 ++-- doc/webserver/faq/installation.html | 48 +- doc/webserver/faq/misc.html | 126 ++--- doc/webserver/faq/trouble.html | 62 ++- doc/webserver/index.html | 42 +- doc/webserver/user-manual/actions-file.html | 479 +++++++++---------- doc/webserver/user-manual/appendix.html | 155 +++--- doc/webserver/user-manual/config.html | 339 +++++-------- doc/webserver/user-manual/configuration.html | 40 +- doc/webserver/user-manual/contact.html | 52 +- doc/webserver/user-manual/copyright.html | 33 +- doc/webserver/user-manual/filter-file.html | 137 +++--- doc/webserver/user-manual/index.html | 55 ++- doc/webserver/user-manual/installation.html | 168 +++++-- doc/webserver/user-manual/introduction.html | 33 +- doc/webserver/user-manual/quickstart.html | 61 +-- doc/webserver/user-manual/seealso.html | 18 +- doc/webserver/user-manual/startup.html | 152 +++--- doc/webserver/user-manual/templates.html | 28 +- doc/webserver/user-manual/upgradersnote.html | 18 +- 24 files changed, 1291 insertions(+), 1241 deletions(-) diff --git a/doc/webserver/faq/configuration.html b/doc/webserver/faq/configuration.html index 7960040b..48328471 100644 --- a/doc/webserver/faq/configuration.html +++ b/doc/webserver/faq/configuration.html @@ -4,8 +4,7 @@ >Configuration

3.8. Why can I change the configuration -with a browser? Does that not raise security issues?

3.9. Why can I change the configuration +with a browser? Does that not raise security issues?

It may seem strange that regular users can edit the config files with their browsers, although the whole

3.9. What is the 3.10. What is the default.filter file? What is a "filter"?

?

The default.filter - file is where filters are defined, which can be used to modify or - remove, web page content on the fly. Filters apply to anything in the page source, including HTML tags, and JavaScript. Regular expressions are used to accomplish this. There are a number of pre-defined filters to deal with common @@ -805,11 +895,13 @@ CLASS="SECT2" >

3.10. How can I set up 3.11. How can I set up Privoxy to act as a proxy for my - LAN?

By default,

3.11. Instead of ads, now I get a checkerboard pattern. I don't want to see anything.

3.12. Instead of ads, now I get a checkerboard pattern. I don't want to see anything.

The replacement for blocked images can be controlled with the handle-as-image - and

3.12. Why would anybody want to see a checkerboard pattern?

3.13. Why would anybody want to see a checkerboard pattern?

Remember that don't have to see..

3.13. I see some images being replaced by a text -instead of the checkerboard image. Why and how do I get rid of this?

3.14. I see some images being replaced by a text +instead of the checkerboard image. Why and how do I get rid of this?

This happens when the banners are not embedded in the HTML code of the page itself, but in separate HTML (sub)documents that are loaded into (i)frames @@ -998,11 +1090,13 @@ CLASS="SECT2" >

3.14. Can 3.15. Can Privoxy run as a service -on Win2K/NT?

Yes, it can run as a system service using

3.15. How can I make 3.16. How can I make Privoxy work with other proxies like Squid?

?

This can be done and is often useful to combine the benefits of

3.16. Can 3.17. Can Privoxy run as a "transparent" proxy?

proxy?

No,


PrevContacting the developers, Bug Reporting and Feature Requests
HomeNext
Prev

6. Contacting the developers, Bug Reporting and Feature Requests

6. Contacting the developers, Bug Reporting and Feature Requests

We value your feedback. In fact, we rely on it to improve

6.1. Get Support

6.1. Get Support

For casual users, our support forum at

6.2. Report Bugs

6.2. Report Bugs

Please report all bugs Please report all bugs only through our bug tracker:

6.3. Request New Features

6.3. Request New Features

You are welcome to submit ideas on new features or other proposals for improvement through our feature request tracker at @@ -192,7 +193,9 @@ CLASS="SECT2" >

6.4. Report Ads or Other Actions-Related Problems

6.4. Report Ads or Other Actions-Related Problems

Please send feedback on ads that slipped through, innocent images that were blocked, and any other problems relating to the ijbswa-announce - list and available from our files section of + our project page

6.5. Other

6.5. Other

For any other issues, feel free to use the mailing lists. Technically interested users and people who wish to contribute to the project are also welcome on the developers list! @@ -249,7 +259,6 @@ CLASS="NAVFOOTER" >


Next
PrevPrivoxy Copyright, License and History
HomeNext
Prev

7. Privoxy Copyright, License and History

7. Privoxy Copyright, License and History

Copyright © 2001, 2002 by Privoxy Developers

action action also applies, the presence or absence of this mark decides whether an HTML

8.5.10. hide-forwarded-for-headers

8.5.10. hide-forwarded-for-headers

8.5.11. hide-from-header

8.5.11. hide-from-header

8.5.12. hide-referrer

8.5.12. hide-referrer is the preferred option here, since some servers will not send images back otherwise, in an attempt to prevent their valuable content from being embedded elsewhere (and hence, without being surrounded - by their banners).

8.5.13. hide-user-agent

8.5.13. hide-user-agent

This breaks many web sites that depend on looking at this header in order to customize their content for different browsers (which, by the - way, is NOT a Privoxy is - not recommended. In single-user, single-browser setups, you might use it to delete your OS version information from the headers, because it is an invitation to exploit known bugs for your @@ -2702,9 +2718,11 @@ CLASS="SECT3" >

8.5.14. kill-popups8.5.14. kill-popups

Privoxy. If the only kind of pop-ups that you want to kill are exit consoles (those - really nasty windows that appear when you close an other one), you might want to use

8.5.15. limit-connect

8.5.15. limit-connect

8.5.16. prevent-compression

8.5.16. prevent-compression

8.5.17. send-vanilla-wafer

8.5.17. send-vanilla-wafer

8.5.18. send-wafer

8.5.18. send-wafer

8.5.19. session-cookies-only

8.5.19. session-cookies-only

Allow only temporary "session" cookies (for the current browser session cookies (for the current browser session only).

It makes It makes no sense at all to use session-cookies-only

8.5.20. set-image-blocker

8.5.20. set-image-blocker

Effect:

This action alone doesn't do anything noticeable. If This action alone doesn't do anything noticeable. If both block and handle-as-image also apply, i.e. if the request is to be blocked as an image, - then the parameter of this action decides what will be sent as a replacement.

There is a third (advanced) type, called "auto". It is . It is NOT to be used in

8.5.21. Summary

8.5.21. Summary

Note that many of these actions have the potential to cause a page to misbehave, possibly even not to display at all. There are many ways @@ -3653,7 +3661,9 @@ CLASS="SECT2" >

8.6. Aliases

8.6. Aliases

Custom and "}", but we , but we strongly recommend that you only use "a" sign, since they are merely textually expanded.

Aliases can be used throughout the actions file, but they Aliases can be used throughout the actions file, but they must be defined in a special section at the top of the file! And there can only be one such section per actions file. Each actions file may have its own alias section, and the aliases defined in it are only visible @@ -3734,12 +3738,9 @@ CLASS="EMPHASIS" CLASS="QUOTE" >"shop", you can later change your policy on shops in - one place, and your changes will take effect everywhere in the actions file where the

8.7. Actions Files Tutorial

8.7. Actions Files Tutorial

The above chapters have shown

8.7.1. default.action

8.7.1. default.action

Every config file should start with a short comment stating its purpose:

Now come the regular sections, i.e. sets of actions, accompanied - by URL patterns to which they apply. Remember all actions are disabled when matching starts, so we have to explicitly enable the ones we want.

"default" section section will be applied to all requests as a start. It can be partly or wholly overridden by later matches further down this file, or in user.action, but it will still be largely responsible for your overall browsing @@ -4102,6 +4101,14 @@ HREF="actions-file.html#FILTER-NIMDA" +filter{banners-by-size} \ + -filter{banners-by-link} \ + -filter{img-reorder} \ -filter{crude-parental} \ + -filter{js-events} \ -"general policy" that applies universally and won't get any exceptions defined later. Other choices, - like not blocking (which is understandably the default!) need exceptions, i.e. we need to specify explicitly what we want to block in later sections. @@ -4332,22 +4340,16 @@ edit.*.yahoo.com CLASS="APPLICATION" >Privoxy knows which - URLs belong to images, so that if they are to be blocked, a substitute image can be sent, rather than an HTML page. Contacting the remote site to find out is not an option, since it would destroy the loading time advantage of banner blocking, and it - would feed the advertisers (in terms of money and information). We can mark any URL as an image with the

And then there are known banner sources. They often use scripts to generate the banners, so it won't be visible from the URL that the - request is for an image. Hence we block them and mark them as images in one go, with the help of our e.g. catches "nasty-"nasty-ads.nasty-corp.com" as intended, but also "downlo"downloads.sourcefroge.net" or ""adsl.some-provider.net." So here come some well-known exceptions to the -block - applies, so (unless it matches again further down) it ends up with no filter - disables all filters in one fell swoop!

8.7.2. user.action

8.7.2. user.action

So far we are painting with a broad brush by setting general policies, which would be a reasonable starting point for many people. Now, @@ -4730,12 +4716,9 @@ CLASS="FILENAME" CLASS="FILENAME" >user.action is also a - safe place for your personal settings, since


PrevAppendix
HomeNext
Privoxy 2.9.16 User Manual
Privoxy User Manual
Prev

14. Appendix

14. Appendix
. - Matches any single character, e.g. "a"
? - The preceding character or expression is matched ZERO or ONE times. Either/or.
+ - The preceding character or expression is matched ONE or MORE times.
* - The preceding character or expression is matched ZERO or MORE times.
\ - The "escape"
[] - Characters enclosed in brackets will be matched if any of the enclosed characters are encountered. For instance,
() - parentheses are used to group a sub-expression, or multiple sub-expressions.
| - The "bar"

/.*/banners/.* - A simple example that uses the common combination of

A now something a little more complex:

/.*/adv((er)?ts?|ertis(ing|ements?))?/ - We have several literal forward slashes again (".*", so we are matching against any conceivable sub-path, just so - it matches our expression. The only true literal that must match our pattern is adv"ing" - OR "ements?", which would then match either spelling.

/.*/advert[0-9]+\.(gif|jpe?g) - Again another path statement with forward slashes. Anything in the square brackets

14.2. 14.2. Privoxy's Internal Pages

's Internal Pages

Since

@@ -818,7 +784,9 @@ CLASS="APPLICATION" editing of actions files:

@@ -836,7 +804,9 @@ TARGET="_top" Show the source code version numbers:

@@ -854,7 +824,9 @@ TARGET="_top" Show the browser's request headers:

@@ -872,7 +844,9 @@ TARGET="_top" Show which actions apply to a URL and why:

@@ -894,7 +868,9 @@ CLASS="QUOTE" to run, but only as a pass-through proxy, with no actions taking place:

@@ -909,7 +885,9 @@ TARGET="_top" > Short cuts. Turn off, then on:

@@ -921,7 +899,9 @@ TARGET="_top"

@@ -942,7 +922,9 @@ CLASS="SECT3" >

14.2.1. Bookmarklets

14.2.1. Bookmarklets

Below are some

14.3. Chain of Events

14.3. Chain of Events

Let's take a quick look at the basic sequence of events when a web page is requested by your browser and

14.4. Anatomy of an Action

14.4. Anatomy of an Action

The way to any given URL can be complex, and not always so easy to understand what is happening. And sometimes we need to be able to - see just what Privoxy (i.e. not persistent). So we will allow persistent cookies for google. The - second turns off any "+block" - and an "/ads"! But we did not want this at all! Now we see why we get the blank page. We could - now add a new action below this that explicitly does not block (


Prev

7.2.2. trust-info-url

7.2.2. trust-info-url

The value of this option only matters if the experimental trust mechanism has been activated. (See trustfile above.)

7.2.3. admin-address

7.2.3. admin-address

Default value:

Unset

7.2.4. proxy-info-url

7.2.4. proxy-info-url

Default value:

Unset

7.3. Debugging

7.3. Debugging

These options are mainly useful when tracing a problem. Note that you might also want to invoke @@ -1202,7 +1180,9 @@ CLASS="SECT3" >

7.3.1. debug

7.3.1. debug

Key values that determine what information gets logged to the logfile.

A debug level of 1 is informative because it will show you each request - as it happens. 1, 4096 and 8192 are highly recommended so that you will notice when things go wrong. The other levels are probably only of interest if you are hunting down a specific problem. They can produce @@ -1299,12 +1273,9 @@ CLASS="EMPHASIS"

The reporting of The reporting of fatal errors (i.e. ones which crash "debug 512" ONLY and not enable anything else.

7.3.2. single-threaded

7.3.2. single-threaded

Type of value:

None

Default value:

Unset

This option is only there for debug purposes and you should never - need to use it. It will drastically reduce performance.

7.4. Access Control and Security

7.4. Access Control and Security

This section of the config file controls the security-relevant aspects of

7.4.1. listen-address

7.4.1. listen-address

7.4.2. toggle

7.4.2. toggle

7.4.3. enable-remote-toggle

7.4.3. enable-remote-toggle

For the time being, access to the toggle feature can For the time being, access to the toggle feature can not be controlled separately by listen-address above) can - toggle it for all users. So this option is not recommended for multi-user environments with untrusted users.

7.4.4. enable-edit-actions

7.4.4. enable-edit-actions

Notes:

For the time being, access to the editor can For the time being, access to the editor can not be controlled separately by listen-address above) can - modify its configuration for all users. So this option is not recommended for multi-user environments with untrusted users.

7.4.5. ACLs: permit-access and deny-access

7.4.5. ACLs: permit-access and deny-accessDefault value:

Unset

Access controls are included at the request of ISPs and systems - administrators, and are not usually needed by individual users. For a typical home user, it will normally suffice to ensure that listen-address option. @@ -1967,12 +1919,9 @@ CLASS="REPLACEABLE" >dst_addr - that is examined is the address of the forwarder and NOT the address of the ultimate target. This is necessary because it may be impossible for the local

You should prefer using IP addresses over DNS names, because the address lookups take - time. All DNS names must resolve! You can not use domain patterns like dst_addr implies that - all destination addresses are OK:

7.4.6. buffer-limit

7.4.6. buffer-limit

buffer-limit Kbytes - each, unless you have enabled "single-threaded"

7.5. Forwarding

7.5. Forwarding

This feature allows routing of HTTP requests through a chain of multiple proxies. @@ -2203,7 +2147,9 @@ CLASS="SECT3" >

7.5.1. forward

7.5.1. forward

Default value:

Unset

7.5.2. forward-socks4 and forward-socks4a

7.5.2. forward-socks4 and forward-socks4aDefault value:

Unset

7.5.3. Advanced Forwarding Examples

7.5.3. Advanced Forwarding Examples

If you have links to multiple ISPs that provide various special content only to their subscribers, you can configure multiple Privoxies which have connections to the respective ISPs to act as forwarders to each other, so that - your users can see the internal content of all ISPs.

Assume that host-a has a PPP connection to isp-a.net. And host-b has a PPP connection to @@ -2699,7 +2640,9 @@ CLASS="SECT2" >

7.6. Windows GUI Options

7.6. Windows GUI Options

    activity-animation 1
   

@@ -2756,12 +2696,9 @@ CLASS="APPLICATION" CLASS="LITERAL" >

    log-messages 1
   

@@ -2789,12 +2726,9 @@ CLASS="QUOTE" CLASS="LITERAL" >

    log-buffer-size 1
   

@@ -2814,12 +2748,9 @@ CLASS="APPLICATION" CLASS="LITERAL" >

    log-max-lines 200
   

@@ -2843,12 +2774,9 @@ CLASS="APPLICATION" CLASS="LITERAL" >

    log-highlight-messages 1
   

@@ -2864,12 +2792,9 @@ NAME="LOG-FONT-NAME" CLASS="LITERAL" >

    log-font-name Comic Sans MS
   

@@ -2885,12 +2810,9 @@ NAME="LOG-FONT-SIZE" CLASS="LITERAL" >

    log-font-size 8
   

@@ -2915,12 +2837,9 @@ CLASS="APPLICATION" CLASS="LITERAL" >

    show-on-task-bar 0
   

@@ -2944,12 +2863,9 @@ CLASS="APPLICATION" CLASS="LITERAL" >

    close-button-minimizes 1
   

@@ -2977,12 +2893,9 @@ CLASS="APPLICATION" CLASS="LITERAL" >

  #  #hide-console
   

@@ -2995,7 +2908,6 @@ CLASS="NAVFOOTER" >
HomeThe Main Configuration File

If set, this option should be If set, this option should be the first option in the config file, because it is used while the config file is being read.

PrevPrivoxy Configuration
HomeNext
Privoxy 2.9.16 User Manual

6. 6. Privoxy Configuration

Configuration

All

6.1. Controlling 6.1. Controlling Privoxy with Your Web Browser

with Your Web Browser

Privoxy User Manual
PrevNext
 

    Privoxy Menu

    Privoxy Menu

6.2. Configuration Files Overview

6.2. Configuration Files Overview

For Unix, *BSD and Linux, all configuration files are located in "wake up" requests - must obviously be sent to the old listening address.

While under development, the configuration content is subject to change. @@ -426,7 +424,6 @@ CLASS="NAVFOOTER" >


Prev
HomeNext
Privoxy 2.9.16 User Manual

11. Contacting the Developers, Bug Reporting and Feature -Requests

11. Contacting the Developers, Bug Reporting and Feature +Requests

We value your feedback. In fact, we rely on it to improve

11.1. Get Support

11.1. Get Support

For casual users, our support forum at

11.2. Report Bugs

11.2. Report Bugs

Please report all bugs Please report all bugs only through our bug tracker:

11.3. Request New Features

11.3. Request New Features

You are welcome to submit ideas on new features or other proposals for improvement through our feature request tracker at @@ -194,7 +195,9 @@ CLASS="SECT2" >

11.4. Report Ads or Other Actions-Related Problems

11.4. Report Ads or Other Actions-Related Problems

Please send feedback on ads that slipped through, innocent images that were blocked, and any other problems relating to the ijbswa-announce - list and available from our files section of + our project page

11.5. Other

11.5. Other

For any other issues, feel free to use the mailing lists. Technically interested users and people who wish to contribute to the project are also welcome on the developers list! @@ -251,7 +261,6 @@ CLASS="NAVFOOTER" >


Privoxy User Manual
PrevNext
PrevPrivoxy Copyright, License and History
HomeNext
Privoxy 2.9.16 User Manual

12. 12. Privoxy Copyright, License and History

Copyright, License and History

Copyright © 2001, 2002 by Privoxy Developers

Privoxy User Manual
PrevNext
HomeNext

Privoxy User Manual
PrevNext

( (including the quotation marks!), followed by the text remembered as # The status bar is for displaying link targets, not pointless blahblah # -s/window\.status\s*=\s*['"].*?['"]/dUmMy=1/ig

construct means: "a single - or a double quote".

. Finally, \1 is + a backreference to the first parenthesis just like $1 above, + with the difference that in the pattern, a backslash indicates + a backreference, whereas in the substitute, it's the dollar.

So what does this job do? It replaces assignments of single- or double-quoted strings to the # Kill OnUnload popups. Yummy. Test: http://www.zdnet.com/zdsubs/yahoo/tree/yfs.html # -s/(<body .*)onunload(.*>)/$1never$2/iU

OnUnload event binding in the HTML DOM was a in the HTML DOM was a CRIME. When I close a browser window, I want it to close and die. Basta. This job replaces the i option makes the pattern matching - case-insensitive.

[^>]* + instead of .* to prevent the match from exceeding the + <body> tag if it doesn't contain "OnUnload", but the page's + content does.

The last example is from the fun department:

x option in this job turns on extended syntax, and allows for - e.g. the liberal use of (non-interpreted!) whitespace for nicer formatting.

You get the idea?


PrevPrivoxy User ManualPrivoxy 2.9.16 User Manual

Privoxy User Manual

Privoxy 2.9.16 User Manual

Copyright © 2001, 2002 by Privoxy Developers @@ -43,12 +44,14 @@ TARGET="_top" >

$Id: user-manual.sgml,v 1.123.2.7 2002/06/09 00:29:34 hal9 Exp $

$Id: user-manual.sgml,v 1.123.2.11 2002/07/26 15:20:31 oes Exp $

HomeNext
NextInstallation
Privoxy 2.9.16 User Manual

2. Installation

2. Installation

installation on your system, you will need to remove it. On some platforms, this may be done for you as part of their installation procedure. (See below for your platform). In any case - be sure to backup your old configuration if it is valuable to you. See the note to @@ -115,7 +110,9 @@ CLASS="SECT2" >

2.1. Binary Packages

2.1. Binary Packages

How to install the binary packages depends on your operating system:

2.1.1. Red Hat, SuSE and Conectiva RPMs

2.1.1. Red Hat, SuSE and Conectiva RPMs

RPMs can be installed with rpm -Uvh privoxy-2.9.15-1.rpmrpm -Uvh privoxy-2.9.16-1.rpm, and will use Privoxy will - not be automatically started on system boot. You will need to enable that using If you have problems with failed dependencies, try rebuilding the SRC RPM: rpm --rebuild privoxy-2.9.15-1.src.rpmrpm --rebuild privoxy-2.9.16-1.src.rpm. This will use your locally installed libraries and RPM version.

2.1.2. Debian

2.1.2. Debian

DEBs can be installed with dpkg -i - privoxy_2.9.15-1.deb, and will use

2.1.3. Windows

2.1.3. Windows

Just double-click the installer, which will guide you through the installation process. You will find the configuration files @@ -212,7 +212,9 @@ CLASS="SECT3" >

2.1.4. Solaris, NetBSD, FreeBSD, HP-UX

2.1.4. Solaris, NetBSD, FreeBSD, HP-UX

Create a new directory,

2.1.5. OS/2

2.1.5. OS/2

First, make sure that no previous installations of

2.1.6. Max OSX

2.1.6. Mac OSX

Unzip the downloaded package (you can either double-click on the file - in the finder, or on the desktop if you downloaded it there). Then, - double-click on the package installer icon and follow the installation - process. + in the finder, or on the desktop if you downloaded it there). The + Privoxy.pkg package should appear after unzipping. Then, + double-click on that Privoxy.pkg package installer icon and follow + the installation process. Privoxy will be installed in the subdirectory +> will be installed in the folder /Applications/Privoxy.app/Library/Privoxy. - Privoxy will set itself up to start - automatically on system bring-up via + It will run automatically whenever you start up. To prevent it from + running automatically, remove or rename the folder /System/Library/StartupItems/Privoxy.

/Library/StartupItems/Privoxy
.

To run Privoxy by hand, double-click on + RunPrivoxy.command. + To run Privoxy from Terminal, execute + /Library/Privoxy/RunPrivoxy.command.

2.1.7. AmigaOS

2.1.7. AmigaOS

Copy and then unpack the

2.2. Building from Source

2.2. Building from Source

The most convenient way to obtain the

Privoxy User Manual
PrevNext
 tar xzvf privoxy-2.9.15-beta-src* [.tgz or .tar.gz]
- cd privoxy-2.9.15-beta
tar xzvf privoxy-2.9.16-beta-src* [.tgz or .tar.gz] + cd privoxy-2.9.16-beta
developer manual.

2.3. Keeping your Installation Up-to-Date

As user feedback comes in and development continues, we will make updated versions + of both the software and the main actions file + (default.action) available for download.

If you wish to receive an email notification whenever we release updates of + Privoxy or the actions file, subscribe + to our announce mailing list, ijbswa-announce@lists.sourceforge.net.

Both can be downloaded from the files + section on SourceForge.

In order not to loose your personal changes and adjustments when updating + to the latest default.action file we strongly + recommend that you use user.action for your + customization of Privoxy. See the Chapter on actions files for details.