1 Privoxy Frequently Asked Questions
3 [ Copyright 2001-2007 by Privoxy Developers ]
5 $Id: faq.sgml,v 2.35 2007/11/19 17:57:59 fabiankeil Exp $
7 This FAQ gives quick answers to frequently asked questions about Privoxy. It is
8 not a substitute for the Privoxy User Manual.
12 Privoxy is a non-caching web proxy with advanced filtering capabilities for
13 enhancing privacy, modifying web page data, managing HTTP cookies, controlling
14 access, and removing ads, banners, pop-ups and other obnoxious Internet junk.
15 Privoxy has a flexible configuration and can be customized to suit individual
16 needs and tastes. Privoxy has application for both stand-alone systems and
19 Privoxy is based on Internet Junkbuster (tm).
21 Please note that this document is a work in progress. This copy represents the
22 state at the release of version 3.0.7. You can find the latest version of the
23 document at http://www.privoxy.org/faq/. Please see the Contact section if you
24 want to contact the developers.
26 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
29 1. General Information
31 1.1. Who should give Privoxy a try?
32 1.2. Is Privoxy the best choice for me?
33 1.3. What is a "proxy"? How does Privoxy work?
34 1.4. Does Privoxy do anything more than ad blocking?
35 1.5. What is this new version of "Junkbuster"?
36 1.6. Why "Privoxy"? Why change the name from Junkbuster at all?
37 1.7. How does Privoxy differ from the old Junkbuster?
38 1.8. How does Privoxy know what is an ad, and what is not?
39 1.9. Can Privoxy make mistakes? This does not sound very scientific.
40 1.10. Will I have to configure Privoxy before I can use it?
41 1.11. Can Privoxy run as a server on a network?
42 1.12. My browser does the same things as Privoxy. Why should I use Privoxy
44 1.13. Why should I trust Privoxy?
45 1.14. Is there is a license or fee? What about a warranty? Registration?
46 1.15. Can Privoxy remove spyware? Adware? Viruses?
47 1.16. Can I use Privoxy with other ad-blocking software?
48 1.17. I would like to help you, what can I do?
50 1.17.1. Would you like to participate?
56 2.1. Which browsers are supported by Privoxy?
57 2.2. Which operating systems are supported?
58 2.3. Can I use Privoxy with my email client?
59 2.4. I just installed Privoxy. Is there anything special I have to do now?
60 2.5. What is the proxy address of Privoxy?
61 2.6. I just installed Privoxy, and nothing is happening. All the ads are
63 2.7. I get a "Privoxy is not being used" dummy page although Privoxy is
64 running and being used.
68 3.1. What exactly is an "actions" file?
69 3.2. The "actions" concept confuses me. Please list some of these
71 3.3. How are actions files configured? What is the easiest way to do this?
72 3.4. There are several different "actions" files. What are the differences?
73 3.5. Where can I get updated Actions Files?
74 3.6. Can I use my old config files?
75 3.7. Why is the configuration so complicated?
76 3.8. How can I make my Yahoo/Hotmail/Gmail account work?
77 3.9. What's the difference between the "Cautious", "Medium" and "Advanced"
79 3.10. Why can I change the configuration with a browser? Does that not
80 raise security issues?
81 3.11. What is the default.filter file? What is a "filter"?
82 3.12. How can I set up Privoxy to act as a proxy for my LAN?
83 3.13. Instead of ads, now I get a checkerboard pattern. I don't want to see
85 3.14. Why would anybody want to see a checkerboard pattern?
86 3.15. I see some images being replaced with text instead of the
87 checkerboard image. Why and how do I get rid of this?
88 3.16. Can Privoxy run as a service on Win2K/NT/XP?
89 3.17. How can I make Privoxy work with other proxies like Squid or Tor?
90 3.18. Can I just set Privoxy to use port 80 and thus avoid individual
91 browser configuration?
92 3.19. Can Privoxy run as a "transparent" proxy?
93 3.20. Can Privoxy run as a "intercepting" proxy?
94 3.21. How can I configure Privoxy for use with Outlook Express?
95 3.22. How can I have separate rules just for HTML mail?
96 3.23. I sometimes notice cookies sneaking through. How?
97 3.24. Are all cookies bad? Why?
98 3.25. How can I allow permanent cookies for my trusted sites?
99 3.26. Can I have separate configurations for different users?
100 3.27. Can I set-up Privoxy as a whitelist of "good" sites?
101 3.28. How can I turn off ad-blocking?
102 3.29. How can I have custom template pages, like the BLOCKED page?
103 3.30. How can I remove the "Go There Anyway" link from the BLOCKED page?
107 4.1. How much does Privoxy slow my browsing down? This has to add extra
109 4.2. I notice considerable delays in page requests. What's wrong?
110 4.3. What are "http://config.privoxy.org/" and "http://p.p/"?
111 4.4. How can I submit new ads, or report problems?
112 4.5. If I do submit missed ads, will they be included in future updates?
113 4.6. Why doesn't anyone answer my support request?
114 4.7. How can I hide my IP address?
115 4.8. Can Privoxy guarantee I am anonymous?
116 4.9. A test site says I am not using a Proxy.
117 4.10. How do I use Privoxy together with Tor?
118 4.11. Might some things break because header information or content is
120 4.12. Can Privoxy act as a "caching" proxy to speed up web browsing?
121 4.13. What about as a firewall? Can Privoxy protect me?
122 4.14. I have large empty spaces / a checkerboard pattern now where ads used
124 4.15. How can Privoxy filter Secure (HTTPS) URLs?
125 4.16. Privoxy runs as a "server". How secure is it? Do I need to take any
127 4.17. Can I temporarily disable Privoxy?
128 4.18. When "disabled" is Privoxy totally out of the picture?
129 4.19. How can I tell Privoxy to totally ignore certain sites?
130 4.20. My logs show Privoxy "crunches" ads, but also its own internal CGI
131 pages. What is a "crunch"?
132 4.21. Can Privoxy effect files that I download from a webserver? FTP
134 4.22. I just downloaded a Perl script, and Privoxy altered it! Yikes, what
136 4.23. Should I continue to use a "HOSTS" file for ad-blocking?
137 4.24. Where can I find more information about Privoxy and related issues?
138 4.25. I've noticed that Privoxy changes "Microsoft" to "MicroSuck"! Why are
139 you manipulating my browsing?
140 4.26. Does Privoxy produce "valid" HTML (or XHTML)?
144 5.1. I cannot connect to any websites. Or, I am getting "connection
145 refused" message with every web page. Why?
146 5.2. Why am I getting a 503 Error (WSAECONNREFUSED) on every page?
147 5.3. I just added a new rule, but the steenkin ad is still getting through.
149 5.4. One of my favorite sites does not work with Privoxy. What can I do?
150 5.5. After installing Privoxy, I have to log in every time I start IE. What
152 5.6. I cannot connect to any FTP sites. Privoxy is blocking me.
153 5.7. In Mac OSX, I can't configure Microsoft Internet Explorer to use
154 Privoxy as the HTTP proxy.
155 5.8. In Mac OSX, I dragged the Privoxy folder to the trash in order to
156 uninstall it. Now the finder tells me I don't have sufficient
157 privileges to empty the trash.
158 5.9. In Mac OSX Panther (10.3), images often fail to load and/or I
159 experience random delays in page loading. I'm using localhost as my
160 browser's proxy setting.
161 5.10. I get a completely blank page at one site. "View Source" shows only:
162 <html><body></body></html>. Without Privoxy the page loads fine.
163 5.11. My logs show many "Unable to get my own hostname" lines. Why?
164 5.12. When I try to launch Privoxy, I get an error message "port 8118 is
165 already in use" (or similar wording). Why?
166 5.13. Pages with UTF-8 fonts are garbled.
167 5.14. Why are binary files (such as images) corrupted when Privoxy is used?
168 5.15. What is the "demoronizer" and why is it there?
169 5.16. Why do I keep seeing "PrivoxyWindowOpen()" in raw source code?
170 5.17. I am getting too many DNS errors like "404 No Such Domain". Why can't
171 Privoxy do this better?
172 5.18. At one site Privoxy just hangs, and starts taking all CPU. Why is
174 5.19. I just installed Privoxy, and all my browsing has slowed to a crawl.
176 5.20. Why do my filters work on some sites but not on others?
178 6. Contacting the developers, Bug Reporting and Feature Requests
181 6.2. Reporting Problems
183 6.2.1. Reporting Ads or Other Configuration Problems
184 6.2.2. Reporting Bugs
186 6.3. Request New Features
189 7. Privoxy Copyright, License and History
194 1. General Information
196 1.1. Who should give Privoxy a try?
198 Anyone who is interested in security, privacy, or in finer-grained control over
199 their web and Internet experience.
201 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
203 1.2. Is Privoxy the best choice for me?
205 Privoxy is certainly a good choice, especially for those who want more control
206 and security. Those with the willingness to read the documentation and the
207 ability to fine-tune their installation will benefit the most.
209 One of Privoxy's strengths is that it is highly configurable giving you the
210 ability to completely personalize your installation. Being familiar with, or at
211 least having an interest in learning about HTTP and other networking protocols,
212 HTML, and "Regular Expressions" will be a big plus and will help you get the
213 most out of Privoxy. A new installation just includes a very basic
214 configuration. The user should take this as a starting point only, and enhance
215 it as he or she sees fit. In fact, the user is encouraged, and expected to,
216 fine-tune the configuration.
218 Much of Privoxy's configuration can be done with a Web browser. But there are
219 areas where configuration is done using a text editor to edit configuration
220 files. Also note that the web-based action editor doesn't use authentication
221 and should only be enabled in environments where all clients with access to
222 Privoxy listening port can be trusted.
224 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
226 1.3. What is a "proxy"? How does Privoxy work?
228 A web proxy is a service, based on a software such as Privoxy, that clients
229 (i.e. browsers) can use instead of connecting directly to web servers on the
230 Internet. The clients then ask the proxy to fetch the objects they need (web
231 pages, images, movies etc) on their behalf, and when the proxy has done so, it
232 hands the results back to the client. It is a "go-between". See the Wikipedia
233 proxy definition for more.
235 There are many reasons to use web proxies, such as security (firewalling),
236 efficiency (caching) and others, and there are any number of proxies to
237 accommodate those needs.
239 Privoxy is a proxy that is primarily focused on privacy protection, ad and junk
240 elimination and freeing the user from restrictions placed on his activities.
241 Sitting between your browser(s) and the Internet, it is in a perfect position
242 to filter outbound personal information that your browser is leaking, as well
243 as inbound junk. It uses a variety of techniques to do this, all of which are
244 under your complete control via the various configuration files and options.
245 Being a proxy also makes it easier to share configurations among multiple
246 browsers and/or users.
248 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
250 1.4. Does Privoxy do anything more than ad blocking?
252 Yes, ad blocking is but one possible use. There are many, many ways Privoxy can
253 be used to sanitize and customize web browsing.
255 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
257 1.5. What is this new version of "Junkbuster"?
259 A long time ago, there was the Internet Junkbuster, by Anonymous Coders and
260 Junkbusters Corporation. This saved many users a lot of pain in the early days
261 of web advertising and user tracking.
263 But the web, its protocols and standards, and with it, the techniques for
264 forcing ads on users, give up autonomy over their browsing, and for tracking
265 them, keeps evolving. Unfortunately, the Internet Junkbuster did not. Version
266 2.0.2, published in 1998, was (and is) the last official release available from
267 Junkbusters Corporation. Fortunately, it had been released under the GNU GPL,
268 which allowed further development by others.
270 So Stefan Waldherr started maintaining an improved version of the software, to
271 which eventually a number of people contributed patches. It could already
272 replace banners with a transparent image, and had a first version of pop-up
273 killing, but it was still very closely based on the original, with all its
274 limitations, such as the lack of HTTP/1.1 support, flexible per-site
275 configuration, or content modification. The last release from this effort was
276 version 2.0.2-10, published in 2000.
278 Then, some developers picked up the thread, and started turning the software
279 inside out, upside down, and then reassembled it, adding many new features
282 The result of this is Privoxy, whose first stable version, 3.0, was released
285 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
287 1.6. Why "Privoxy"? Why change the name from Junkbuster at all?
289 Though outdated, Junkbusters Corporation continues to offer their original
290 version of the Internet Junkbuster, so publishing our Junkbuster-derived
291 software under the same name led to confusion.
293 There are also potential legal complications from our use of the Junkbuster
294 name, which is a registered trademark of Junkbusters Corporation. There are,
295 however, no objections from Junkbusters Corporation to the Privoxy project
296 itself, and they, in fact, still share our ideals and goals.
298 The developers also believed that there are so many improvements over the
299 original code, that it was time to make a clean break from the past and make a
300 name in their own right.
302 Privoxy is the "Privacy Enhancing Proxy". Also, its content modification and
303 junk suppression gives you, the user, more control, more freedom, and allows
304 you to browse your personal and "private edition" of the web.
306 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
308 1.7. How does Privoxy differ from the old Junkbuster?
310 Privoxy picks up where Junkbuster left off. All the old features remain. The
311 new Privoxy still blocks ads and banners, still manages cookies, and still
312 helps protect your privacy. But, most of these features have been enhanced, and
313 many new ones have been added, all in the same vein.
315 Privoxy's new features include:
317 • Integrated browser based configuration and control utility at http://
318 config.privoxy.org/ (shortcut: http://p.p/). Browser-based tracing of rule
319 and filter effects. Remote toggling.
321 • Web page filtering (text replacements, removes banners based on size,
322 invisible "web-bugs", JavaScript and HTML annoyances, pop-up windows,
323 header manipulation, etc.)
325 • Modularized configuration that allows for standard settings and user
326 settings to reside in separate files, so that installing updated actions
327 files won't overwrite individual user settings.
329 • Support for Perl Compatible Regular Expressions in the configuration files,
330 and generally a more sophisticated and flexible configuration syntax over
333 • Improved cookie management features (e.g. session based cookies).
337 • Bypass many click-tracking scripts (avoids script redirection).
339 • Multi-threaded (POSIX and native threads).
341 • User-customizable HTML templates for all proxy-generated pages (e.g.
344 • Auto-detection and re-reading of config file changes.
346 • Improved signal handling, and a true daemon mode (Unix).
348 • Every feature now controllable on a per-site or per-location basis,
349 configuration more powerful and versatile over-all.
351 • Many smaller new features added, limitations and bugs removed, and security
354 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
356 1.8. How does Privoxy know what is an ad, and what is not?
358 Privoxy's approach to blocking ads is twofold:
360 First, there are certain patterns in the locations (URLs) of banner images.
361 This applies to both the path (you wouldn't guess how many web sites serve
362 their banners from a directory called "banners"!) and the host (blocking the
363 big banner hosting services like doublecklick.net already helps a lot). Privoxy
364 takes advantage of this fact by using URL patterns to sort out and block the
365 requests for things that sound like they would be ads or banners.
367 Second, banners tend to come in certain sizes. But you can't tell the size of
368 an image by its URL without downloading it, and if you do, it's too late to
369 save bandwidth. Therefore, Privoxy also inspects the HTML sources of web pages
370 while they are loaded, and replaces references to images with standard banner
371 sizes by dummy references, so that your browser doesn't request them anymore in
374 Both of this involves a certain amount of guesswork and is, of course, freely
375 and readily configurable.
377 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
379 1.9. Can Privoxy make mistakes? This does not sound very scientific.
381 Actually, it's a black art ;-) And yes, it is always possible to have a broad
382 rule accidentally block or change something by mistake. You will almost surely
383 run into such situations at some point. It is tricky writing rules to cover
384 every conceivable possibility, and not occasionally get false positives.
386 But this should not be a big concern since the Privoxy configuration is very
387 flexible, and includes tools to help identify these types of situations so they
388 can be addressed as needed, allowing you to customize your installation. (See
389 the Troubleshooting section below.)
391 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
393 1.10. Will I have to configure Privoxy before I can use it?
395 That depends on your expectations. The default installation should give you a
396 good starting point, and block most ads and unwanted content, but many of the
397 more advanced features are off by default, and require you to activate them.
399 You do have to set up your browser to use Privoxy (see the Installation section
402 And you will certainly run into situations where there are false positives, or
403 ads not being blocked that you may not want to see. In these cases, you would
404 certainly benefit by customizing Privoxy's configuration to more closely match
405 your individual situation. And we encourage you to do this. This is where the
406 real power of Privoxy lies!
408 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
410 1.11. Can Privoxy run as a server on a network?
412 Yes, Privoxy runs as a server already, and can easily be configured to "serve"
413 more than one client. See How can I set up Privoxy to act as a proxy for my LAN
416 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
418 1.12. My browser does the same things as Privoxy. Why should I use Privoxy at
421 Modern browsers do indeed have some of the same functionality as Privoxy. Maybe
422 this is adequate for you. But Privoxy is very versatile and powerful, and can
423 probably do a number of things your browser just can't.
425 In addition, a proxy is good choice if you use multiple browsers, or have a LAN
426 with multiple computers since Privoxy can run as a server application. This way
427 all the configuration is in one place, and you don't have to maintain a similar
428 configuration for possibly many browsers or users.
430 Note, however, that it's recommended to leverage both your browser's and
431 Privoxy's privacy enhancing features at the same time. While your browser
432 probably lacks some features Privoxy offers, it should also be able to do some
433 things more reliable, for example restricting and suppressing JavaScript.
435 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
437 1.13. Why should I trust Privoxy?
439 The most important reason is because you have access to everything, and you can
440 control everything. You can check every line of every configuration file
441 yourself. You can check every last bit of source code should you desire. And
442 even if you can't read code, there should be some comfort in knowing that other
443 people can, and do read it. You can build the software from scratch, if you
444 want, so that you know the executable is clean, and that it is yours. In fact,
445 we encourage this level of scrutiny. It is one reason we use Privoxy ourselves.
447 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
449 1.14. Is there is a license or fee? What about a warranty? Registration?
451 Privoxy is free software and licensed under the GNU General Public License
452 (GPL) version 2. It is free to use, copy, modify or distribute as you wish
453 under the terms of this license. Please see the Copyright section for more
454 information on the license and copyright. Or the LICENSE file that should be
457 There is no warranty of any kind, expressed, implied or otherwise. That is
458 something that would cost real money ;-) There is no registration either.
460 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
462 1.15. Can Privoxy remove spyware? Adware? Viruses?
464 No, at least not reliably enough to trust it. Privoxy is not designed to be a
465 malware removal tool and the default configuration doesn't even try to filter
468 Privoxy could help prevent contact from (known) sites that use such tactics
469 with appropriate configuration rules, and thus could conceivably prevent
470 contamination from such sites. However, keeping such a configuration up to date
471 would require a lot of time and effort that would be better spend on keeping
472 your software itself up to date so it doesn't have known vulnerabilities.
474 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
476 1.16. Can I use Privoxy with other ad-blocking software?
478 Privoxy should work fine with other proxies and other software in general.
480 But it is probably not necessary to use Privoxy in conjunction with other
481 ad-blocking products, and this could conceivably cause undesirable results. It
482 might be better to choose one software or the other and work a little to tweak
483 its configuration to your liking.
485 Note that this is an advice specific to ad blocking.
487 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
489 1.17. I would like to help you, what can I do?
491 1.17.1. Would you like to participate?
493 Well, we always need help. There is something for everybody who wants to help
494 us. We welcome new developers, packagers, testers, documentation writers or
495 really anyone with a desire to help in any way. You DO NOT need to be a
496 "programmer". There are many other tasks available. In fact, the programmers
497 often can't spend as much time programming because of some of the other, more
498 mundane things that need to be done, like checking the Tracker feedback
501 So first thing, get an account on SourceForge.net and mail your id to the
502 developers mailing list. Then, please read the Developer's Manual, at least the
505 You can also start helping out without SourceForge.net account, simply by
506 showing up on the mailing list, helping out other users, providing general
507 feedback or reporting problems you noticed.
509 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
513 We, of course, welcome donations and could use money for domain registering,
514 buying software to test Privoxy with, and, of course, for regular world-wide
515 get-togethers (hahaha). If you enjoy the software and feel like helping us with
516 a donation, just drop us a note and get your name on the list of contributors.
518 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
522 If you are a vendor of a web-related software like a browser, web server or
523 proxy, and would like us to ensure that Privoxy runs smoothly with your
524 product, you might consider supplying us with a copy or license. We can't,
525 however, guarantee that we will fix all potential compatibility issues as a
528 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
532 2.1. Which browsers are supported by Privoxy?
534 Any browser that can be configured to use a proxy, which should be virtually
535 all browsers, including Firefox, Internet Explorer, Opera, and Safari among
536 others. Direct browser support is not an absolute requirement since Privoxy
537 runs as a separate application and talks to the browser in the standardized
538 HTTP protocol, just like a web server does.
540 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
542 2.2. Which operating systems are supported?
544 At present, Privoxy is known to run on Windows(95, 98, ME, 2000, XP, Vista),
545 GNU/Linux (RedHat, SuSE, Debian, Fedora, Gentoo, Slackware and others), Mac
546 OSX, OS/2, AmigaOS, FreeBSD, NetBSD, OpenBSD, Solaris, and various other
549 But any operating system that runs TCP/IP, can conceivably take advantage of
550 Privoxy in a networked situation where Privoxy would run as a server on a LAN
551 gateway. Then only the "gateway" needs to be running one of the above operating
554 Source code is freely available, so porting to other operating systems is
555 always a possibility.
557 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
559 2.3. Can I use Privoxy with my email client?
561 As long as there is some way to set a HTTP proxy for the client, then yes, any
562 application can be used, whether it is strictly speaking a "browser" or not.
563 Though this may not be the best approach for dealing with some of the common
564 abuses of HTML in email. See How can I configure Privoxy with Outlook Express?
565 below for more on this.
567 Be aware that HTML email presents a number of unique security and privacy
568 related issues, that can require advanced skills to overcome. The developers
569 recommend using email clients that can be configured to convert HTML to plain
570 text for these reasons.
572 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
574 2.4. I just installed Privoxy. Is there anything special I have to do now?
576 All browsers should be told to use Privoxy as a proxy by specifying the correct
577 proxy address and port number in the appropriate configuration area for the
578 browser. It's possible to combine Privoxy with a packet filter to intercept
579 HTTP requests even if the client isn't explicitly configured to use Privoxy,
580 but where possible, configuring the client is recommended. See the User Manual
581 for more details. You should also flush your browser's memory and disk cache to
582 get rid of any cached junk items, and remove any stored cookies.
584 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
586 2.5. What is the proxy address of Privoxy?
588 If you set up the Privoxy to run on the computer you browse from (rather than
589 your ISP's server or some networked computer on a LAN), the proxy will be on
590 127.0.0.1 (sometimes referred to as "localhost", which is the special name used
591 by every computer on the Internet to refer to itself) and the port will be 8118
592 (unless you used the listen-address config option to tell Privoxy to run on a
595 When configuring your browser's proxy settings you typically enter the word
596 "localhost" or the IP address "127.0.0.1" in the boxes next to "HTTP" and
597 "Secure" (HTTPS) and then the number "8118" for "port". This tells your browser
598 to send all web requests to Privoxy instead of directly to the Internet.
600 Privoxy can also be used to proxy for a Local Area Network. In this case, your
601 would enter either the IP address of the LAN host where Privoxy is running, or
602 the equivalent hostname, e.g. 192.168.1.1. Port assignment would be same as
603 above. Note that Privoxy doesn't listen on any LAN interfaces by default.
605 Privoxy does not currently handle any other protocols such as FTP, SMTP, IM,
608 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
610 2.6. I just installed Privoxy, and nothing is happening. All the ads are there.
613 Did you configure your browser to use Privoxy as a proxy? It does not sound
614 like it. See above. You might also try flushing the browser's caches to force a
615 full re-reading of pages. You can verify that Privoxy is running, and your
616 browser is correctly configured by entering the special URL: http://p.p/. This
617 should take you to a page titled "This is Privoxy.." with access to Privoxy's
618 internal configuration. If you see this, then you are good to go. If you
619 receive a page saying "Privoxy is not running", then the browser is not set up
620 to use your Privoxy installation. If you receive anything else (probably
621 nothing at all), it could either be that the browser is not set up correctly,
622 or that Privoxy is not running at all. Check the log file. For instructions on
623 starting Privoxy and browser configuration, see the chapter on starting Privoxy
626 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
628 2.7. I get a "Privoxy is not being used" dummy page although Privoxy is running
631 First, make sure that Privoxy is really running and being used by visiting
632 http://p.p/. You should see the Privoxy main page. If not, see the chapter on
633 starting Privoxy in the User Manual.
635 Now if http://p.p/ works for you, but other parts of Privoxy's web interface
636 show the dummy page, your browser has cached a redirection it encountered
637 before Privoxy was being used. You need to clear your browser's cache. Note
638 that shift-reloading the dummy page won't help, since that'll only refresh the
639 dummy page, not the redirection that lead you there.
641 The procedure for clearing the cache varies from browser to browser. For
642 example, Mozilla/Netscape users would click Edit --> Preferences --> Advanced
643 --> Cache and then click both "Clear Memory Cache" and "Clear Disk Cache". In
644 some Firefox versions it's Tools --> Options --> Privacy --> Cache and then
645 click "Clear Cache Now".
647 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
651 3.1. What exactly is an "actions" file?
653 Privoxy utilizes the concept of " actions" that are used to manipulate and
654 control web page data. Actions files are where these actions that Privoxy could
655 take while processing a certain request, are configured. Typically, you would
656 define a set of default actions that apply globally to all URLs, then add
657 exceptions to these defaults where needed. There is a wide array of actions
658 available that give the user a high degree of control and flexibility on how to
659 process each and every web page.
661 Actions can be defined on a URL pattern basis, i.e. for single URLs, whole web
662 sites, groups or parts thereof etc. Actions can also be grouped together and
663 then applied to requests matching one or more patterns. There are many possible
664 actions that might apply to any given site. As an example, if you are blocking
665 cookies as one of your default actions, but need to accept cookies from a given
666 site, you would need to define an exception for this site in one of your
667 actions files, preferably in user.action.
669 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
671 3.2. The "actions" concept confuses me. Please list some of these "actions".
673 For a comprehensive discussion of the actions concept, please refer to the
674 actions file chapter in the User Manual. It includes a list of all actions and
675 an actions file tutorial to get you started.
677 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
679 3.3. How are actions files configured? What is the easiest way to do this?
681 Actions files are just text files in a special syntax and can be edited with a
682 text editor. But probably the easiest way is to access Privoxy's user interface
683 with your web browser at http://config.privoxy.org/ (Shortcut: http://p.p/) and
684 then select "View & change the current configuration" from the menu. Note that
685 this feature must be explicitly enabled in the main config file (see
686 enable-edit-actions).
688 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
690 3.4. There are several different "actions" files. What are the differences?
692 Three actions files are being included by the developers, to be used for
693 different purposes: These are default.action, the "main" actions file which is
694 actively maintained by the Privoxy developers and typically sets the default
695 policies, user.action, where users are encouraged to make their private
696 customizations, and standard.action, which is for internal Privoxy use only.
697 Please see the actions chapter in the User Manual for a more detailed
700 Earlier versions included three different versions of the default.action file.
701 The new scheme allows for greater flexibility of local configuration, and for
702 browser based selection of pre-defined "aggressiveness" levels.
704 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
706 3.5. Where can I get updated Actions Files?
708 Based on your feedback and the continuing development, updates of
709 default.action will be made available from time to time on the files section of
712 If you wish to receive an email notification whenever we release updates of
713 Privoxy or the actions file, subscribe to our announce mailing list,
714 ijbswa-announce@lists.sourceforge.net.
716 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
718 3.6. Can I use my old config files?
720 The syntax and purpose of configuration files has remained roughly the same
721 throughout the 3.x series, but backwards compatibility is not guaranteed. Also
722 each release contains updated, "improved" versions and it is therefore strongly
723 recommended to install the newer configuration files and merge back your
726 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
728 3.7. Why is the configuration so complicated?
730 "Complicated" is in the eye of the beholder. Those that are familiar with some
731 of the underlying concepts, such as regular expression syntax, take to it like
732 a fish takes to water. Also, software that tries hard to be "user friendly",
733 often lacks sophistication and flexibility. There is always that trade-off
734 there between power vs. easy-of-use. Furthermore, anyone is welcome to
735 contribute ideas and implementations to enhance Privoxy.
737 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
739 3.8. How can I make my Yahoo/Hotmail/Gmail account work?
741 The default configuration shouldn't impact the usability of any of these
742 services. It may, however, make all cookies temporary, so that your browser
743 will forget your login credentials in between browser sessions. If you would
744 like not to have to log in manually each time you access those websites, simply
745 turn off all cookie handling for them in the user.action file. An example for
746 yahoo might look like:
748 # Allow all cookies for Yahoo login:
750 { -crunch-incoming-cookies -crunch-outgoing-cookies -session-cookies-only }
754 These kinds of sites are often quite complex and heavy with Javascript and thus
755 "fragile". So if still a problem, we have an alias just for such sticky
758 # Gmail is a _fragile_ site:
765 Be sure to flush your browser's caches whenever making these kinds of changes,
766 just to make sure the changes "take".
768 Make sure the domain, host and path are appropriate as well. Your browser can
769 tell you where you are specifically and you should use that information for
770 your configuration settings. Note that above it is not referenced as gmail.com,
771 which is a valid domain name.
773 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
775 3.9. What's the difference between the "Cautious", "Medium" and "Advanced"
778 Configuring Privoxy is not entirely trivial. To help you get started, we
779 provide you with three different default action "profiles" in the web based
780 actions file editor at http://config.privoxy.org/show-status. See the User
781 Manual for a list of actions, and how the default profiles are set.
783 Where the defaults are likely to break some sites, exceptions for known popular
784 "problem" sites are included, but in general, the more aggressive your default
785 settings are, the more exceptions you will have to make later. New users are
786 best to start off in "Cautious" setting. This is safest and will have the
787 fewest problems. See the User Manual for a more detailed discussion.
789 It should be noted that the "Advanced" profile (formerly known as the
790 "Adventuresome" profile) is more aggressive, and will make use of some of
791 Privoxy's advanced features. Use at your own risk!
793 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
795 3.10. Why can I change the configuration with a browser? Does that not raise
798 It may seem strange that regular users can edit the config files with their
799 browsers, although the whole /etc/privoxy hierarchy belongs to the user
800 "privoxy", with only 644 permissions.
802 When you use the browser-based editor, Privoxy itself is writing to the config
803 files. Because Privoxy is running as the user "privoxy", it can update its own
806 If you run Privoxy for multiple untrusted users (e.g. in a LAN) or aren't
807 entirely in control of your own browser, you will probably want to make sure
808 that the the web-based editor and remote toggle features are "off" by setting "
809 enable-edit-actions 0" and "enable-remote-toggle 0" in the main configuration
812 As of Privoxy 3.0.7 these options are disabled by default.
814 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
816 3.11. What is the default.filter file? What is a "filter"?
818 The default.filter file is where filters as supplied by the developers are
819 defined. Filters are a special subset of actions that can be used to modify or
820 remove web page content or headers on the fly. Content filters can be applied
821 to anything in the page source, header filters can be applied to either server
822 or client headers. Regular expressions are used to accomplish this.
824 There are a number of pre-defined filters to deal with common annoyances. The
825 filters are only defined here, to invoke them, you need to use the filter
826 action in one of the actions files. Content filtering is automatically disabled
827 for inappropriate MIME types, but if you now better than Privoxy what should or
828 should not be filtered you can filter any content you like.
830 Filters should not be confused with blocks, which is a completely different
831 action, and is more typically used to block ads and unwanted sites.
833 If you are familiar with regular expressions, and HTML, you can look at the
834 provided default.filter with a text editor and define your own filters. This is
835 potentially a very powerful feature, but requires some expertise in both
836 regular expressions and HTML/HTTP. You should place any modifications to the
837 default filters, or any new ones you create in a separate file, such as
838 user.filter, so they won't be overwritten during upgrades. The ability to
839 define multiple filter files in config is a new feature as of v. 3.0.5.
841 There is no GUI editor option for this part of the configuration, but you can
842 disable/enable the various pre-defined filters of the included default.filter
843 file with the web-based actions file editor. Note that the custom actions
844 editor must be explicitly enabled in the main config file (see
845 enable-edit-actions).
847 If you intend to develop your own filters, you might want to have a look at
850 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
852 3.12. How can I set up Privoxy to act as a proxy for my LAN?
854 By default, Privoxy only responds to requests from 127.0.0.1 (localhost). To
855 have it act as a server for a network, this needs to be changed in the main
856 configuration file. Look for the listen-address option, which may be commented
857 out with a "#" symbol. Make sure it is uncommented, and assign it the address
858 of the LAN gateway interface, and port number to use. Assuming your LAN address
859 is 192.168.1.1 and you wish to run Privoxy on port 8118, this line should look
862 listen-address 192.168.1.1:8118
865 Save the file, and restart Privoxy. Configure all browsers on the network then
866 to use this address and port number.
868 Alternately, you can have Privoxy listen on all available interfaces:
873 And then use Privoxy's permit-access feature to limit connections. A firewall
874 in this situation is recommended as well.
876 The above steps should be the same for any TCP network, regardless of operating
879 If you run Privoxy on a LAN with untrusted users, we recommend that you
880 double-check the access control and security options!
882 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
884 3.13. Instead of ads, now I get a checkerboard pattern. I don't want to see
887 The replacement for blocked images can be controlled with the set-image-blocker
888 action. You have the choice of a checkerboard pattern, a transparent 1x1 GIF
889 image (aka "blank"), or a redirect to a custom image of your choice. Note that
890 this choice only has effect for images which are blocked as images, i.e. whose
891 URLs match both a handle-as-image and block action.
893 If you want to see nothing, then change the set-image-blocker action to
894 "blank". This can be done by editing the user.action file, or through the
895 web-based actions file editor.
897 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
899 3.14. Why would anybody want to see a checkerboard pattern?
901 Remember that telling which image is an ad and which isn't, is an educated
902 guess. While we hope that the standard configuration is rather smart, it will
903 make occasional mistakes. The checkerboard image is visually decent, and it
904 shows you where images have been blocked, which can be very helpful in case
905 some navigation aid or otherwise innocent image was erroneously blocked. It is
906 recommended for new users so they can "see" what is happening. Some people
907 might also enjoy seeing how many banners they don't have to see.
909 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
911 3.15. I see some images being replaced with text instead of the checkerboard
912 image. Why and how do I get rid of this?
914 This happens when the banners are not embedded in the HTML code of the page
915 itself, but in separate HTML (sub)documents that are loaded into (i)frames or
916 (i)layers, and these external HTML documents are blocked. Being non-images they
917 get replaced by a substitute HTML page rather than a substitute image, which
918 wouldn't work out technically, since the browser expects and accepts only HTML
919 when it has requested an HTML document.
921 The substitute page adapts to the available space and shows itself as a
922 miniature two-liner if loaded into small frames, or full-blown with a large red
923 "BLOCKED" banner if space allows.
925 If you prefer the banners to be blocked by images, you must see to it that the
926 HTML documents in which they are embedded are not blocked. Clicking the "See
927 why" link offered in the substitute page will show you which rule blocked the
928 page. After changing the rule and un-blocking the HTML documents, the browser
929 will try to load the actual banner images and the usual image blocking will
930 (hopefully!) kick in.
932 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
934 3.16. Can Privoxy run as a service on Win2K/NT/XP?
936 Yes. Version 3.0.5 introduces full Windows service functionality. See the User
937 Manual for details on how to install and configure Privoxy as a service.
939 Earlier 3.x versions could run as a system service using srvany.exe. See the
940 discussion at http://sourceforge.net/tracker/?func=detail&atid=361118&aid=
941 485617&group_id=11118, for details, and a sample configuration.
943 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
945 3.17. How can I make Privoxy work with other proxies like Squid or Tor?
947 This can be done and is often useful to combine the benefits of Privoxy with
948 those of a another proxy. See the forwarding chapter in the User Manual which
949 describes how to do this, and the How do I use Privoxy together with Tor
952 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
954 3.18. Can I just set Privoxy to use port 80 and thus avoid individual browser
957 No, its more complicated than that. This only works with special kinds of
958 proxies known as "intercepting" proxies (see below).
960 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
962 3.19. Can Privoxy run as a "transparent" proxy?
964 The whole idea of Privoxy is to modify client requests and server responses in
965 all sorts of ways and therefore it's not a transparent proxy as described in
968 However, some people say "transparent proxy" when they mean "intercepting
969 proxy". If you are one of them, please read the next entry.
971 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
973 3.20. Can Privoxy run as a "intercepting" proxy?
975 Privoxy can't intercept traffic itself, but it can handle requests that where
976 intercepted and redirected with a packet filter (like PF or iptables), as long
977 as the Host header is present.
979 As the Host header is required by HTTP/1.1 and as most web sites rely on it
980 anyway, this limitation shouldn't be a problem.
982 Please refer to your packet filter's documentation to learn how to intercept
983 and redirect traffic into Privoxy. Afterward you just have to configure Privoxy
984 to accept intercepted requests.
986 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
988 3.21. How can I configure Privoxy for use with Outlook Express?
990 Outlook Express uses Internet Explorer components to both render HTML, and
991 fetch any HTTP requests that may be embedded in an HTML email. So however you
992 have Privoxy configured to work with IE, this configuration should
993 automatically be shared.
995 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
997 3.22. How can I have separate rules just for HTML mail?
999 The short answer is, you can't. Privoxy has no way of knowing which particular
1000 application makes a request, so there is no way to distinguish between web
1001 pages and HTML mail. Privoxy just blindly proxies all requests. In the case of
1002 Outlook Express (see above), OE uses IE anyway, and there is no way for Privoxy
1003 to ever be able to distinguish between them (nor could any other proxy type
1004 application for that matter).
1006 For a good discussion of some of the issues involved (including privacy and
1007 security issues), see http://sourceforge.net/tracker/?func=detail&atid=211118&
1008 aid=629518&group_id=11118.
1010 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1012 3.23. I sometimes notice cookies sneaking through. How?
1014 Cookies can be set in several ways. The classic method is via the Set-Cookie
1015 HTTP header. This is straightforward, and an easy one to manipulate, such as
1016 the Privoxy concept of session-cookies-only. There is also the possibility of
1017 using Javascript to set cookies (Privoxy calls these content-cookies). This is
1018 trickier because the syntax can vary widely, and thus requires a certain amount
1019 of guesswork. It is not realistic to catch all of these short of disabling
1020 Javascript, which would break many sites. And lastly, if the cookies are
1021 embedded in a HTTPS/SSL secure session via Javascript, they are beyond
1024 All in all, Privoxy can help manage cookies in general, can help minimize the
1025 loss of privacy posed by cookies, but can't realistically stop all cookies.
1027 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1029 3.24. Are all cookies bad? Why?
1031 No, in fact there are many beneficial uses of cookies. Cookies are just a
1032 method that browsers can use to store data between pages, or between browser
1033 sessions. Sometimes there is a good reason for this, and the user's life is a
1034 bit easier as a result. But there is a long history of some websites taking
1035 advantage of this layer of trust, and using the data they glean from you and
1036 your browsing habits for their own purposes, and maybe to your potential
1037 detriment. Such sites are using you and storing their data on your system. That
1038 is why the privacy conscious watch from whom those cookies come, and why they
1039 really need to be there.
1041 See the Wikipedia cookie definition for more.
1043 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1045 3.25. How can I allow permanent cookies for my trusted sites?
1047 There are several actions that relate to cookies. The default behavior is to
1048 allow only "session cookies", which means the cookies only last for the current
1049 browser session. This eliminates most kinds of abuse related to cookies. But
1050 there may be cases where you want cookies to last.
1052 To disable all cookie actions, so that cookies are allowed unrestricted, both
1053 in and out, for example.com:
1055 { -crunch-incoming-cookies -crunch-outgoing-cookies -session-cookies-only -filter{content-cookies} }
1059 Place the above in user.action. Note that some of these may be off by default
1060 anyway, so this might be redundant, but there is no harm being explicit in what
1061 you want to happen. user.action includes an alias for this situation, called
1064 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1066 3.26. Can I have separate configurations for different users?
1068 Each instance of Privoxy has its own configuration, including such attributes
1069 as the TCP port that it listens on. What you can do is run multiple instances
1070 of Privoxy, each with a unique listen-address configuration setting, and
1071 configuration path, and then each of these can have their own configurations.
1072 Think of it as per-port configuration.
1074 Simple enough for a few users, but for large installations, consider having
1075 groups of users that might share like configurations.
1077 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1079 3.27. Can I set-up Privoxy as a whitelist of "good" sites?
1081 Sure. There are a couple of things you can do for simple white-listing. Here's
1084 ############################################################
1086 ############################################################
1088 / # Block *all* URLs
1090 ############################################################
1092 ############################################################
1099 This allows access to only those three sites by first blocking all URLs, and
1100 then subsequently allowing three specific exceptions.
1102 Another approach is Privoxy's trustfile concept, which incorporates the notion
1103 of "trusted referrers". See the Trust documentation for details.
1105 These are fairly simple approaches and are not completely foolproof. There are
1106 various other configuration options that should be disabled (described
1107 elsewhere here and in the User Manual) so that users can't modify their own
1108 configuration and easily circumvent the whitelist.
1110 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1112 3.28. How can I turn off ad-blocking?
1114 Ad blocking is achieved through a complex application of various Privoxy
1115 actions. These actions are deployed against simple images, banners, flash
1116 animations, text pages, JavaScript, pop-ups and pop-unders, etc., so its not as
1117 simple as just turning one or two actions off. The various actions that make up
1118 Privoxy ad blocking are hard-coded into the default configuration files. It has
1119 been assumed that everyone using Privoxy is interested in this particular
1122 If you want to do without this, there are several approaches you can take: You
1123 can manually undo the many block rules in default.action. Or even easier, just
1124 create your own default.action file from scratch without the many ad blocking
1125 rules, and corresponding exceptions. Or lastly, if you are not concerned about
1126 the additional blocks that are done for privacy reasons, you can very easily
1127 over-ride all blocking with the following very simple rule in your user.action:
1129 # Unblock everybody, everywhere
1131 / # UN-Block *all* URLs
1134 Or even a more comprehensive reversing of various ad related actions:
1136 # Unblock everybody, everywhere, and turn off appropriate filtering, etc
1138 -filter{banners-by-size} \
1139 -filter{banners-by-link} \
1142 / # UN-Block *all* URLs and allow ads
1145 This last "action" in this compound statement, allow-popups, is an alias that
1146 disables various pop-up blocking features.
1148 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1150 3.29. How can I have custom template pages, like the BLOCKED page?
1152 Privoxy "templates" are specialized text files utilized by Privoxy for various
1153 purposes and can easily be modified using any text editor. All the template
1154 pages are installed in a sub-directory appropriately named: templates. Knowing
1155 something about HTML syntax will of course be helpful.
1157 Be forewarned that the default templates are subject to being overwritten
1158 during upgrades. You can, however, create completely new templates, place them
1159 in another directory and specify the alternate path in the main config. For
1160 details, have a look at the templdir option.
1162 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1164 3.30. How can I remove the "Go There Anyway" link from the BLOCKED page?
1166 There is more than one way to do it (although Perl is not involved).
1168 Editing the BLOCKED template page (see above) may dissuade some users, but this
1169 method is easily circumvented. Where you need this level of control, you might
1170 want to build Privoxy from source, and disable various features that are
1171 available as compile-time options. You should configure the sources as follows:
1173 ./configure --disable-toggle --disable-editor --disable-force
1176 This will create an executable with hard-coded security features so that
1177 Privoxy does not allow easy bypassing of blocked sites, or changing the current
1178 configuration via any connected user's web browser.
1180 Finally, all of these features can also be toggled on/off via options in
1181 Privoxy's main config file which means you don't have to recompile anything.
1183 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1187 4.1. How much does Privoxy slow my browsing down? This has to add extra time to
1190 How much of an impact depends on many things, including the CPU of the host
1191 system, how aggressive the configuration is, which specific actions are being
1192 triggered, the size of the page, the bandwidth of the connection, etc.
1194 Overall, it should not slow you down any in real terms, and may actually help
1195 speed things up since ads, banners and other junk are not typically being
1196 retrieved and displayed. The actual processing time required by Privoxy itself
1197 for each page, is relatively small in the overall scheme of things, and happens
1198 very quickly. This is typically more than offset by time saved not downloading
1199 and rendering ad images and other junk content (if ad blocking is being used).
1201 "Filtering" content via the filter or deanimate-gifs actions may cause a
1202 perceived slowdown, since the entire document needs to be buffered before
1203 displaying. And on very large documents, filtering may have some measurable
1204 impact. How much depends on the page size, the actual definition of the filter
1205 (s), etc. See below. Most other actions have little to no impact on speed.
1207 Also, when filtering is enabled but zlib support isn't available, compression
1208 is often disabled (see prevent-compression). This can have an impact on speed
1209 as well, although it's probably smaller than you might think. Again, the page
1210 size, etc. will determine how much of an impact.
1212 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1214 4.2. I notice considerable delays in page requests. What's wrong?
1216 If you use any filter action, such as filtering banners by size, web-bugs etc,
1217 or the deanimate-gifs action, the entire document must be loaded into memory in
1218 order for the filtering mechanism to work, and nothing is sent to the browser
1221 The loading time typically does not really change much in real numbers, but the
1222 feeling is different, because most browsers are able to start rendering
1223 incomplete content, giving the user a feeling of "it works". This effect is
1224 more noticeable on slower dialup connections. Extremely large documents may
1225 have some impact on the time to load the page where there is filtering being
1226 done. But overall, the difference should be very minimal. If there is a big
1227 impact, then probably some other situation is contributing (like anti-virus
1230 Filtering is automatically disabled for inappropriate MIME types. But note that
1231 if the web server mis-reports the MIME type, then content that should not be
1232 filtered, could be. Privoxy only knows how to differentiate filterable content
1233 because of the MIME type as reported by the server, or because of some
1234 configuration setting that enables/disables filtering.
1236 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1238 4.3. What are "http://config.privoxy.org/" and "http://p.p/"?
1240 http://config.privoxy.org/ is the address of Privoxy's built-in user interface,
1241 and http://p.p/ is a shortcut for it.
1243 Since Privoxy sits between your web browser and the Internet, it can simply
1244 intercept requests for these addresses and answer them with its built-in "web
1247 This also makes for a good test for your browser configuration: If entering the
1248 URL http://config.privoxy.org/ takes you to a page saying "This is Privoxy
1249 ...", everything is OK. If you get a page saying "Privoxy is not working"
1250 instead, then your browser didn't use Privoxy for the request, hence it could
1251 not be intercepted, and you have accessed the real web site at
1254 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1256 4.4. How can I submit new ads, or report problems?
1258 Please see the Contact section for various ways to interact with the
1261 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1263 4.5. If I do submit missed ads, will they be included in future updates?
1265 Whether such submissions are eventually included in the default.action
1266 configuration file depends on how significant the issue is. We of course want
1267 to address any potential problem with major, high-profile sites such as Google,
1268 Yahoo, etc. Any site with global or regional reach, has a good chance of being
1269 a candidate. But at the other end of the spectrum are any number of smaller,
1270 low-profile sites such as for local clubs or schools. Since their reach and
1271 impact are much less, they are best handled by inclusion in the user's
1272 user.action, and thus would be unlikely to be included.
1274 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1276 4.6. Why doesn't anyone answer my support request?
1278 Rest assured that it has been read and considered. Why it is not answered,
1279 could be for various reasons, including no one has a good answer for it, no one
1280 has had time to yet investigate it thoroughly, it has been reported numerous
1281 times already, or because not enough information was provided to help us help
1282 you. Your efforts are not wasted, and we do appreciate them.
1284 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1286 4.7. How can I hide my IP address?
1288 If you run both the browser and Privoxy locally, you cannot hide your IP
1289 address with Privoxy or ultimately any other software alone. The server needs
1290 to know your IP address so that it knows where to send the responses back.
1292 There are many publicly usable "anonymous" proxies out there, which provide a
1293 further level of indirection between you and the web server.
1295 However, these proxies are called "anonymous" because you don't need to
1296 authenticate, not because they would offer any real anonymity. Most of them
1297 will log your IP address and make it available to the authorities in case you
1298 violate the law of the country they run in. In fact you can't even rule out
1299 that some of them only exist to *collect* information on (those suspicious)
1300 people with a more than average preference for privacy.
1302 If you want to hide your IP address from most adversaries, you should consider
1303 chaining Privoxy with Tor. The configuration details can be found in How do I
1304 use Privoxy together with Tor section just below.
1306 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1308 4.8. Can Privoxy guarantee I am anonymous?
1310 No. Your chances of remaining anonymous are improved, but unless you chain
1311 Privoxy with Tor or a similar proxy and know what you're doing when it comes to
1312 configuring the rest of your system, you should assume that everything you do
1313 on the Web can be traced back to you.
1315 Privoxy can remove various information about you, and allows you more freedom
1316 to decide which sites you can trust, and what details you want to reveal. But
1317 it neither hides your IP address, nor can it guarantee that the rest of the
1318 system behaves correctly. There are several possibilities how a web sites can
1319 find out who you are, even if you are using a strict Privoxy configuration and
1320 chained it with Tor.
1322 Most of Privoxy's privacy-enhancing features can be easily subverted by an
1323 insecure browser configuration, therefore you should use a browser that can be
1324 configured to only execute code from trusted sites, and be careful which sites
1325 you trust. For example there is no point in having Privoxy modify the
1326 User-Agent header, if websites can get all the information they want through
1327 JavaScript, ActiveX, Flash, Java etc.
1329 A few browsers disclose the user's email address in certain situations, such as
1330 when transferring a file by FTP. Privoxy does not filter FTP. If you need this
1331 feature, or are concerned about the mail handler of your browser disclosing
1332 your email address, you might consider products such as NSClean.
1334 Browsers available only as binaries could use non-standard headers to give out
1335 any information they can have access to: see the manufacturer's license
1336 agreement. It's impossible to anticipate and prevent every breach of privacy
1337 that might occur. The professionally paranoid prefer browsers available as
1338 source code, because anticipating their behavior is easier. Trust the source,
1341 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1343 4.9. A test site says I am not using a Proxy.
1345 Good! Actually, they are probably testing for some other kinds of proxies.
1346 Hiding yourself completely would require additional steps.
1348 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1350 4.10. How do I use Privoxy together with Tor?
1352 Before you configure Privoxy to use Tor, please follow the User Manual chapters
1353 2. Installation and 5. Startup to make sure Privoxy itself is setup correctly.
1355 If it is, refer to Tor's extensive documentation to learn how to install Tor,
1356 and make sure Tor's logfile says that "Tor has successfully opened a circuit"
1357 and it "looks like client functionality is working".
1359 If either Tor or Privoxy isn't working, their combination most likely will
1360 neither. Testing them on their own will also help you to direct problem reports
1361 to the right audience. If Privoxy isn't working, don't bother the Tor
1362 developers. If Tor isn't working, don't send bug reports to the Privoxy Team.
1364 If you verified that Privoxy and Tor are working, it is time to connect them.
1365 As far as Privoxy is concerned, Tor is just another proxy that can be reached
1366 by socks4 or socks4a. Most likely you are interested in Tor to increase your
1367 anonymity level, therefore you should use socks4a, to make sure DNS requests
1368 are done through Tor and thus invisible to your local network.
1370 Since Privoxy 3.0.5, its main configuration file is already prepared for Tor,
1371 if you are using a default Tor configuration and run it on the same system as
1372 Privoxy, you just have to edit the forwarding section and uncomment the line:
1374 # forward-socks4a / 127.0.0.1:9050 .
1378 This is enough to reach the Internet, but additionally you might want to
1379 uncomment the following forward rules, to make sure your local network is still
1380 reachable through Privoxy:
1382 # forward 192.168.*.*/ .
1383 # forward 10.*.*.*/ .
1384 # forward 127.*.*.*/ .
1388 Unencrypted connections to systems in these address ranges will be as (un)
1389 secure as the local network is, but the alternative is that your browser can't
1390 reach the network at all. Then again, that may actually be desired and if you
1391 don't know for sure that your browser has to be able to reach the local
1392 network, there's no reason to allow it.
1394 If you want your browser to be able to reach servers in your local network by
1395 using their names, you will need additional exceptions that look like this:
1397 # forward localhost/ .
1401 Save the modified configuration file and open http://config.privoxy.org/
1402 show-status/ in your browser, confirm that Privoxy has reloaded its
1403 configuration and that there are no other forward lines, unless you know that
1404 you need them. If everything looks good, refer to Tor Faq 4.2 to learn how to
1405 verify that you are really using Tor.
1407 Afterward, please take the time to at least skim through the rest of Tor's
1408 documentation. Make sure you understand what Tor does, why it is no replacement
1409 for application level security, and why you probably don't want to use it for
1412 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1414 4.11. Might some things break because header information or content is being
1417 Definitely. It is common for sites to use browser type, browser version, HTTP
1418 header content, and various other techniques in order to dynamically decide
1419 what to display and how to display it. What you see, and what I see, might be
1420 very different. There are many, many ways that this can be handled, so having
1421 hard and fast rules, is tricky.
1423 The "User-Agent" is sometimes used in this way to identify the browser, and
1424 adjust content accordingly.
1426 Also, different browsers use different encodings of non-English characters,
1427 certain web servers convert pages on-the-fly according to the User Agent
1428 header. Giving a "User Agent" with the wrong operating system or browser
1429 manufacturer causes some sites in these languages to be garbled; Surfers to
1430 Eastern European sites should change it to something closer. And then some page
1431 access counters work by looking at the "Referer" header; they may fail or break
1432 if unavailable. The weather maps of Intellicast have been blocked by their
1433 server when no "Referer" or cookie is provided, is another example. (But you
1434 can forge both headers without giving information away). There are many other
1435 ways things can go wrong when trying to fool a web server. The results of which
1436 could inadvertently cause pages to load incorrectly, partially, or even not at
1437 all. And there may be no obvious clues as to just what went wrong, or why.
1438 Nowhere will there be a message that says "Turn off fast-redirects or else! "
1440 Similar thoughts apply to modifying JavaScript, and, to a lesser degree, HTML
1443 If you have problems with a site, you will have to adjust your configuration
1444 accordingly. Cookies are probably the most likely adjustment that may be
1445 required, but by no means the only one.
1447 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1449 4.12. Can Privoxy act as a "caching" proxy to speed up web browsing?
1451 No, it does not have this ability at all. You want something like Squid or
1452 Polipo for this. And, yes, before you ask, Privoxy can co-exist with other
1453 kinds of proxies like Squid. See the forwarding chapter in the user manual for
1456 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1458 4.13. What about as a firewall? Can Privoxy protect me?
1460 Not in the way you mean, or in the way some firewall vendors claim they can.
1461 Privoxy can help protect your privacy, but can't protect your system from
1462 intrusion attempts. It is, of course, perfectly possible to use both.
1464 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1466 4.14. I have large empty spaces / a checkerboard pattern now where ads used to
1469 It is technically possible to eliminate banners and ads in a way that frees
1470 their allocated page space. This could easily be done by blocking with
1471 Privoxy's filters, and eliminating the entire image references from the HTML
1474 But, this would consume considerably more CPU resources (IOW, slow things
1475 down), would likely destroy the layout of some web pages which rely on the
1476 banners utilizing a certain amount of page space, and might fail in other
1477 cases, where the screen space is reserved (e.g. by HTML tables for instance).
1478 Also, making ads and banners disappear without any trace complicates
1479 troubleshooting, and would sooner or later be problematic.
1481 The better alternative is to instead let them stay, and block the resulting
1482 requests for the banners themselves as is now the case. This leaves either
1483 empty space, or the familiar checkerboard pattern.
1485 So the developers won't support this in the default configuration, but you can
1486 of course define appropriate filters yourself to achieve this.
1488 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1490 4.15. How can Privoxy filter Secure (HTTPS) URLs?
1492 Since secure HTTP connections are encrypted SSL sessions between your browser
1493 and the secure site, and are meant to be reliably secure, there is little that
1494 Privoxy can do but hand the raw gibberish data though from one end to the other
1497 The only exception to this is blocking by host patterns, as the client needs to
1498 tell Privoxy the name of the remote server, so that Privoxy can establish the
1499 connection. If that name matches a host-only pattern, the connection will be
1502 As far as ad blocking is concerned, this is less of a restriction than it may
1503 seem, since ad sources are often identifiable by the host name, and often the
1504 banners to be placed in an encrypted page come unencrypted nonetheless for
1505 efficiency reasons, which exposes them to the full power of Privoxy's ad
1508 "Content cookies" (those that are embedded in the actual HTML or JS page
1509 content, see filter{content-cookies}), in an SSL transaction will be impossible
1510 to block under these conditions. Fortunately, this does not seem to be a very
1511 common scenario since most cookies come by traditional means.
1513 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1515 4.16. Privoxy runs as a "server". How secure is it? Do I need to take any
1516 special precautions?
1518 On Unix-like systems, Privoxy can run as a non-privileged user, which is how we
1519 recommend it be run. Also, by default Privoxy listens to requests from
1522 The server aspect of Privoxy is not itself directly exposed to the Internet in
1523 this configuration. If you want to have Privoxy serve as a LAN proxy, this will
1524 have to be opened up to allow for LAN requests. In this case, we'd recommend
1525 you specify only the LAN gateway address, e.g. 192.168.1.1, in the main Privoxy
1526 configuration file and check all access control and security options. All LAN
1527 hosts can then use this as their proxy address in the browser proxy
1528 configuration, but Privoxy will not listen on any external interfaces. ACLs can
1529 be defined in addition, and using a firewall is always good too. Better safe
1532 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1534 4.17. Can I temporarily disable Privoxy?
1536 Privoxy doesn't have a transparent proxy mode, but you can toggle off blocking
1537 and content filtering.
1539 The easiest way to do that is to point your browser to the remote toggle URL:
1540 http://config.privoxy.org/toggle.
1542 See the Bookmarklets section of the User Manual for an easy way to access this
1543 feature. Note that this is a feature that may need to be enabled in the main
1546 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1548 4.18. When "disabled" is Privoxy totally out of the picture?
1550 No, this just means all optional filtering and actions are disabled. Privoxy is
1551 still acting as a proxy, but just doing less of the things that Privoxy would
1552 normally be expected to do. It is still a "middle-man" in the interaction
1553 between your browser and web sites. See below to bypass the proxy.
1555 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1557 4.19. How can I tell Privoxy to totally ignore certain sites?
1559 Bypassing a proxy, or proxying based on arbitrary criteria, is purely a browser
1560 configuration issue, not a Privoxy issue. Modern browsers typically do have
1561 settings for not proxying certain sites. Check your browser's help files.
1563 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1565 4.20. My logs show Privoxy "crunches" ads, but also its own internal CGI pages.
1568 A "crunch" simply means Privoxy intercepted something, nothing more. Often this
1569 is indeed ads or banners, but Privoxy uses the same mechanism for trapping
1570 requests for its own internal pages. For instance, a request for Privoxy's
1571 configuration page at: http://config.privoxy.org, is intercepted (i.e. it does
1572 not go out to the 'net), and the familiar CGI configuration is returned to the
1573 browser, and the log consequently will show a "crunch".
1575 Since version 3.0.7, Privoxy will also log the crunch reason. If you are using
1576 an older version you might want to upgrade.
1578 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1580 4.21. Can Privoxy effect files that I download from a webserver? FTP server?
1582 From the webserver's perspective, there is no difference between viewing a
1583 document (i.e. a page), and downloading a file. The same is true of Privoxy. If
1584 there is a match for a block pattern, it will still be blocked, and of course
1587 Filtering is potentially more of a concern since the results are not always so
1588 obvious, and the effects of filtering are there whether the file is simply
1589 viewed, or downloaded. And potentially whether the content is some obnoxious
1590 advertisement, or Mr. Jimmy's latest/greatest source code jewel. Of course, one
1591 of these presumably is "bad" content that we don't want, and the other is
1592 "good" content that we do want. Privoxy is blind to the differences, and can
1593 only distinguish "good from bad" by the configuration parameters we give it.
1595 Privoxy knows the differences in files according to the "Content Type" as
1596 reported by the webserver. If this is reported accurately (e.g. "application/
1597 zip" for a zip archive), then Privoxy knows to ignore these where appropriate.
1598 Privoxy potentially can filter HTML as well as plain text documents, subject to
1599 configuration parameters of course. Also, documents that are of an unknown type
1600 (generally assumed to be "text/plain") can be filtered, as will those that
1601 might be incorrectly reported by the webserver. If such a file is a downloaded
1602 file that is intended to be saved to disk, then any content that might have
1603 been altered by filtering, will be saved too, for these (probably rare) cases.
1605 Note that versions later than 3.0.2 do NOT filter document types reported as
1606 "text/plain". Prior to this, Privoxy did filter this document type.
1608 In short, filtering is "ON" if a) the content type as reported by the webserver
1609 is appropriate and b) the configuration allows it (or at least does not
1610 disallow it). That's it. There is no magic cookie anywhere to say this is
1611 "good" and this is "bad". It's the configuration that lets it all happen or
1614 If you download text files, you probably do not want these to be filtered,
1615 particularly if the content is source code, or other critical content. Source
1616 code sometimes might be mistaken for Javascript (i.e. the kind that might open
1617 a pop-up window). It is recommended to turn off filtering for download sites
1618 (particularly if the content may be plain text files and you are using version
1619 3.0.2 or earlier) in your user.action file. And also, for any site or page
1620 where making any changes at all to the content is to be avoided.
1622 Privoxy does not do FTP at all, only HTTP and HTTPS (SSL) protocols, so please
1625 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1627 4.22. I just downloaded a Perl script, and Privoxy altered it! Yikes, what is
1632 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1634 4.23. Should I continue to use a "HOSTS" file for ad-blocking?
1636 One time-tested technique to defeat common ads is to trick the local DNS system
1637 by giving a phony IP address for the ad generator in the local HOSTS file,
1638 typically using 127.0.0.1, aka localhost. This effectively blocks the ad.
1640 There is no reason to use this technique in conjunction with Privoxy. Privoxy
1641 does essentially the same thing, much more elegantly and with much more
1642 flexibility. A large HOSTS file, in fact, not only duplicates effort, but may
1643 get in the way and seriously slow down your system. It is recommended to remove
1644 such entries from your HOSTS file. If you think your hosts list is neglected by
1645 Privoxy's configuration, consider adding your list to your user.action file:
1650 ads.galore.example.com
1654 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1656 4.24. Where can I find more information about Privoxy and related issues?
1658 Other references and sites of interest to Privoxy users:
1660 http://www.privoxy.org/, the Privoxy Home page.
1662 http://www.privoxy.org/faq/, the Privoxy FAQ.
1664 http://sourceforge.net/projects/ijbswa/, the Project Page for Privoxy on
1667 http://config.privoxy.org/, the web-based user interface. Privoxy must be
1668 running for this to work. Shortcut: http://p.p/
1670 http://sourceforge.net/tracker/?group_id=11118&atid=460288, to submit "misses"
1671 and other configuration related suggestions to the developers.
1673 http://www.junkbusters.com/ht/en/cookies.html, an explanation how cookies are
1674 used to track web users.
1676 http://www.junkbusters.com/ijb.html, the original Internet Junkbuster.
1678 http://privacy.net/, a useful site to check what information about you is
1679 leaked while you browse the web.
1681 http://www.squid-cache.org/, a popular caching proxy, which is often used
1682 together with Privoxy.
1684 http://www.pps.jussieu.fr/~jch/software/polipo/, Polipo is a caching proxy with
1685 advanced features like pipelining, multiplexing and caching of partial
1686 instances. In many setups it can be used as Squid replacement.
1688 http://tor.eff.org/, Tor can help anonymize web browsing, web publishing,
1689 instant messaging, IRC, SSH, and other applications.
1691 http://www.privoxy.org/developer-manual/, the Privoxy developer manual.
1693 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1695 4.25. I've noticed that Privoxy changes "Microsoft" to "MicroSuck"! Why are you
1696 manipulating my browsing?
1698 We're not. The text substitutions that you are seeing are disabled in the
1699 default configuration as shipped. You have either manually activated the "fun"
1700 filter which is clearly labeled "Text replacements for subversive browsing fun!
1701 " or you are using an older Privoxy version and have implicitly activated it by
1702 choosing the "Adventuresome" profile in the web-based editor. Please upgrade.
1704 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1706 4.26. Does Privoxy produce "valid" HTML (or XHTML)?
1708 Privoxy generates HTML in both its own "templates", and possibly whenever there
1709 are text substitutions via a Privoxy filter. While this should always conform
1710 to the HTML 4.01 specifications, it has not been validated against this or any
1713 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1717 5.1. I cannot connect to any websites. Or, I am getting "connection refused"
1718 message with every web page. Why?
1720 There are several possibilities:
1722 • Privoxy is not running. Solution: verify that Privoxy is installed
1723 correctly, has not crashed, and is indeed running. Turn on Privoxy's
1724 logging, and look at the logs to see what they say.
1726 • Or your browser is configured for a different port than what Privoxy is
1727 using. Solution: verify that Privoxy and your browser are set to the same
1728 port (listen-address).
1730 • Or if using a forwarding rule, you have a configuration problem or a
1731 problem with a host in the forwarding chain. Solution: temporarily alter
1732 your configuration and take the forwarders out of the equation.
1734 • Or you have a firewall that is interfering and blocking you. Solution: try
1735 disabling or removing the firewall as a simple test.
1737 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1739 5.2. Why am I getting a 503 Error (WSAECONNREFUSED) on every page?
1741 More than likely this is a problem with your TCP/IP networking. ZoneAlarm has
1742 been reported to cause this symptom -- even if not running! The solution is to
1743 either fight the ZA configuration, or uninstall ZoneAlarm, and then find
1744 something better behaved in its place. Other personal firewall type products
1745 may cause similar type problems if not configured correctly.
1747 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1749 5.3. I just added a new rule, but the steenkin ad is still getting through.
1752 If the ad had been displayed before you added its URL, it will probably be held
1753 in the browser's cache for some time, so it will be displayed without the need
1754 for any request to the server, and Privoxy will not be involved. Flush the
1755 browser's caches, and then try again.
1757 If this doesn't help, you probably have an error in the rule you applied. Try
1758 pasting the full URL of the offending ad into http://config.privoxy.org/
1759 show-url-info and see if it really matches your new rule. Blocking ads is like
1760 blocking spam: a lot of tinkering is required to stay ahead of the game. And
1761 remember you need to block the URL of the ad in question, which may be entirely
1762 different from the site URL itself. Most ads are hosted on different servers
1763 than the main site itself. If you right-click on the ad, you should be able to
1764 get all the relevant information you need. Alternately, you can find the
1765 correct URL by looking at Privoxy's logs (you may need to enable logging in the
1766 main config file if its disabled).
1768 Below is a slightly modified real-life log snippet that originates with one
1769 requested URL: www.example.com (name of site was changed for this example, the
1770 number of requests is real). You can see in this the complexity of what goes
1771 into making up this one "page". There are eight different domains involved
1772 here, with thirty two separate URLs requested in all, making up all manner of
1773 images, Shockwave Flash, JavaScript, CSS stylesheets, scripts, and other
1774 related content. Some of this content is obviously "good" or "bad", but not
1775 all. Many of the more questionable looking requests, are going to outside
1776 domains that seem to be identifying themselves with suspicious looking names,
1777 making our job a little easier. Privoxy has "crunched" (meaning caught and
1778 BLOCKED) quite a few items in this example, but perhaps missed a few as well.
1780 Request: www.example.com/
1781 Request: www.example.com/favicon.ico
1782 Request: img.example.com/main.css
1783 Request: img.example.com/sr.js
1784 Request: example.betamarker.com/example.html
1785 Request: www.lik-sang.com/Banners/bestsellers/skyscraper.php?likref=BSellers
1786 Request: img.example.com/pb.png
1787 Request: www.google-analytics.com/urchin.js crunch! (Blocked)
1788 Request: www.advertising-department.com/ats/switch.ps.php?26856 crunch! (Blocked)
1789 Request: img.example.com/p.gif
1790 Request: www.popuptraffic.com/assign.php?l=example&mode=behind crunch! (Blocked)
1791 Request: www.popuptraffic.com/scripts/popup.php?hid=5c3cf&tmpl=PBa.tmpl crunch! (Blocked)
1792 Request: www.popuptraffic.com/assign.php?l=example crunch! (Blocked)
1793 Request: www.lik-sang.com/Banners/best_sellers/best_sellers.css
1794 Request: www.adtrak.net/adx.js crunch! (Blocked)
1795 Request: img.example.com/hbg.gif
1796 Request: img.example.com/example.jpg
1797 Request: img.example.com/mt.png
1798 Request: img.example.com/mm.png
1799 Request: img.example.com/mb.png
1800 Request: www.popuptraffic.com/scripts/popup.php?hid=a71b91fa5&tmpl=Ua.tmp crunch! (Blocked)
1801 Request: www.example.com/tracker.js
1802 Request: www.lik-sang.com/Banners/best_sellers/lsi_head.gif
1803 Request: www.adtrak.net/adjs.php?n=020548130&what=zone:61 crunch! (Blocked)
1804 Request: www.adtrak.net/adjs.php?n=463594413&what=zone:58&source=Ua crunch! (Blocked)
1805 Request: www.lik-sang.com/Banners/best_sellers/bottomani.swf
1806 Request: mmm.elitemediagroup.net/install.php?allowpop=no&popupmincook=0&allowsp2=1 crunch! (Blocked)
1807 Request: www.example.com/tracker.js?screen=1400x1050&win=962x693
1808 Request: www.adtrak.net/adlog.php?bannerid=1309&clientid=439&zoneid=61 crunch! (Blocked)
1809 Request: 66.70.21.80/scripts/click.php?hid=5c3cf599a9efd0320d26&si
1810 Request: 66.70.21.80/img/pixel.gif
1811 Request: www.adtrak.net/adlog.php?bannerid=1309&clientid=439&zoneid=58&source=Ua&block=86400 crunch! (Blocked)
1812 Request: 66.70.21.80/scripts/click.php?hid=a71b9f6504b0c5681fa5&si=Ua
1815 Despite 12 out of 32 requests being blocked, the page looked, and seemed to
1816 behave perfectly "normal" (minus some ads, of course).
1818 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1820 5.4. One of my favorite sites does not work with Privoxy. What can I do?
1822 First verify that it is indeed a Privoxy problem, by toggling off Privoxy
1823 through http://config.privoxy.org/toggle (the toggle feature may need to be
1824 enabled in the main config), and then shift-reloading the problem page (i.e.
1825 holding down the shift key while clicking reload. Alternatively, flush your
1826 browser's disk and memory caches).
1828 If the problem went away, we know we have a configuration related problem. Now
1829 go to http://config.privoxy.org/show-url-info and paste the full URL of the
1830 page in question into the prompt. See which actions are being applied to the
1831 URL, and which matches in which actions files are responsible for that. It
1832 might be helpful also to look at your logs for this site too, to see what else
1833 might be happening (note: logging may need to be enabled in the main config
1834 file). Many sites are complex and require a number of related pages to help
1835 present their content. Look at what else might be used by the page in question,
1836 and what of that might be required. Now, armed with this information, go to
1837 http://config.privoxy.org/show-status and select the appropriate actions files
1840 You can now either look for a section which disables the actions that you
1841 suspect to cause the problem and add a pattern for your site there, or make up
1842 a completely new section for your site. In any case, the recommended way is to
1843 disable only the prime suspect, reload the problem page, and only if the
1844 problem persists, disable more and more actions until you have identified the
1845 culprit. You may or may not want to turn the other actions on again. Remember
1846 to flush your browser's caches in between any such changes!
1848 Alternately, if you are comfortable with a text editor, you can accomplish the
1849 same thing by editing the appropriate actions file. Probably the easiest way to
1850 deal with such problems when editing by hand is to add your site to a { fragile
1851 } section in user.action, which is an alias that turns off most "dangerous"
1852 actions, but is also likely to turn off more actions then needed, and thus
1853 lower your privacy and protection more than necessary,
1855 Troubleshooting actions is discussed in more detail in the User Manual
1856 appendix, Troubleshooting: the Anatomy of an Action. There is also an actions
1857 tutorial with general configuration information and examples.
1859 As a last resort, you can always see if your browser has a setting that will
1860 bypass the proxy setting for selective sites. Modern browsers can do this.
1862 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1864 5.5. After installing Privoxy, I have to log in every time I start IE. What
1867 This is a quirk that effects the installation of Privoxy, in conjunction with
1868 Internet Explorer and Internet Connection Sharing on Windows 2000 and Windows
1869 XP. The symptoms may appear to be corrupted or invalid DUN settings, or
1872 When setting up an NT based Windows system with Privoxy you may find that
1873 things do not seem to be doing what you expect. When you set your system up you
1874 will probably have set up Internet Connection Sharing (ICS) with Dial up
1875 Networking (DUN) when logged in with administrator privileges. You will
1876 probably have made this DUN connection available to other accounts that you may
1877 have set-up on your system. E.g. Mum or Dad sets up the system and makes
1878 accounts suitably configured for the kids.
1880 When setting up Privoxy in this environment you will have to alter the proxy
1881 set-up of Internet Explorer (IE) for the specific DUN connection on which you
1882 wish to use Privoxy. When you do this the ICS DUN set-up becomes user specific.
1883 In this instance you will see no difference if you change the DUN connection
1884 under the account used to set-up the connection. However when you do this from
1885 another user you will notice that the DUN connection changes to make available
1886 to "Me only". You will also find that you have to store the password under each
1889 The reason for this is that each user's set-up for IE is user specific. Each
1890 set-up DUN connection and each LAN connection in IE store the settings for each
1891 user individually. As such this enforces individual configurations rather than
1892 common ones. Hence the first time you use a DUN connection after re-booting
1893 your system it may not perform as you expect, and prompt you for the password.
1894 Just set and save the password again and all should be OK.
1896 [Thanks to Ray Griffith for this submission.]
1898 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1900 5.6. I cannot connect to any FTP sites. Privoxy is blocking me.
1902 Privoxy cannot act as a proxy for FTP traffic, so do not configure your browser
1903 to use Privoxy as an FTP proxy. The same is true for any protocol other than
1904 HTTP or HTTPS (SSL).
1906 Most browsers understand FTP as well as HTTP. If you connect to a site, with a
1907 URL like ftp://ftp.example.com, your browser is making an FTP connection, and
1908 not a HTTP connection. So while your browser may speak FTP, Privoxy does not,
1909 and cannot proxy such traffic.
1911 To complicate matters, some systems may have a generic "proxy" setting, which
1912 will enable various protocols, including both HTTP and FTP proxying! So it is
1913 possible to accidentally enable FTP proxying in these cases. And of course, if
1914 this happens, Privoxy will indeed cause problems since it does not know FTP.
1915 Newer version will give a sane error message if a FTP connection is attempted.
1916 Just disable the FTP setting and all will be well again.
1918 Will Privoxy ever proxy FTP traffic? Unlikely. There just is not much reason,
1919 and the work to make this happen is more than it may seem.
1921 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1923 5.7. In Mac OSX, I can't configure Microsoft Internet Explorer to use Privoxy
1926 Microsoft Internet Explorer (in versions like 5.1) respects system-wide network
1927 settings. In order to change the HTTP proxy, open System Preferences, and click
1928 on the Network icon. In the settings pane that comes up, click on the Proxies
1929 tab. Ensure the "Web Proxy (HTTP)" checkbox is checked and enter 127.0.0.1 in
1930 the entry field. Enter 8118 in the Port field. The next time you start IE, it
1931 should reflect these values.
1933 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1935 5.8. In Mac OSX, I dragged the Privoxy folder to the trash in order to
1936 uninstall it. Now the finder tells me I don't have sufficient privileges to
1939 Just dragging the Privoxy folder to the trash is not enough to delete it.
1940 Privoxy supplies an uninstall.command file that takes care of these details.
1941 Open the trash, drag the uninstall.command file out of the trash and
1942 double-click on it. You will be prompted for confirmation and the
1943 administration password.
1945 The trash may still appear full after this command; emptying the trash from the
1946 desktop should make it appear empty again.
1948 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1950 5.9. In Mac OSX Panther (10.3), images often fail to load and/or I experience
1951 random delays in page loading. I'm using localhost as my browser's proxy
1954 We believe this is due to an IPv6-related bug in OSX, but don't fully
1955 understand the issue yet. In any case, changing the proxy setting to 127.0.0.1
1956 instead of localhost works around the problem.
1958 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1960 5.10. I get a completely blank page at one site. "View Source" shows only:
1961 <html><body></body></html>. Without Privoxy the page loads fine.
1963 Chances are that the site suffers from a bug in PHP, which results in empty
1964 pages being sent if the client explicitly requests an uncompressed page, like
1965 Privoxy does. This bug has been fixed in PHP 4.2.3.
1967 To find out if this is in fact the source of the problem, try adding the site
1968 to a -prevent-compression section in user.action:
1970 # Make exceptions for ill-behaved sites:
1972 {-prevent-compression}
1976 If that works, you may also want to report the problem to the site's
1977 webmasters, telling them to use zlib.output_compression instead of ob_gzhandler
1978 in their PHP applications (workaround) or upgrade to PHP 4.2.3 or later (fix).
1980 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1982 5.11. My logs show many "Unable to get my own hostname" lines. Why?
1984 Privoxy tries to get the hostname of the system its running on from the IP
1985 address of the system interface it is bound to (from the config file
1986 listen-address setting). If the system cannot supply this information, Privoxy
1987 logs this condition.
1989 Typically, this would be considered a minor system configuration error. It is
1990 not a fatal error to Privoxy however, but may result in a much slower response
1991 from Privoxy on some platforms due to DNS timeouts.
1993 This can be caused by a problem with the local HOSTS file. If this file has
1994 been changed from the original, try reverting it to see if that helps. Make
1995 sure whatever name(s) are used for the local system, that they resolve both
1998 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
2000 5.12. When I try to launch Privoxy, I get an error message "port 8118 is
2001 already in use" (or similar wording). Why?
2003 Port 8118 is Privoxy's default TCP "listening" port. Typically this message
2004 would mean that there is already one instance of Privoxy running, and your
2005 system is actually trying to start a second Privoxy on the same port, which
2006 will not work. (You can have multiple instances but they must be assigned
2007 different ports.) How and why this might happen varies from platform to
2008 platform, but you need to check your installation and start-up procedures.
2010 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
2012 5.13. Pages with UTF-8 fonts are garbled.
2014 This is caused by the "demoronizer" filter. You should either upgrade Privoxy,
2015 or at least upgrade to the most recent default.action file available from
2016 SourceForge. Or you can simply disable the demoronizer filter.
2018 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
2020 5.14. Why are binary files (such as images) corrupted when Privoxy is used?
2022 This may also be caused by the "demoronizer" filter, in conjunction with a web
2023 server that is misreporting the content type. Binary files are exempted from
2024 Privoxy's filtering (unless the web server by mistake says the file is
2025 something else). Either upgrade Privoxy, or go to the most recent
2026 default.action file available from SourceForge.
2028 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
2030 5.15. What is the "demoronizer" and why is it there?
2032 The original demoronizer was a Perl script that cleaned up HTML pages which
2033 were created with certain Microsoft products. MS has used proprietary
2034 extensions to standardized font encodings (ISO 8859-1), which has caused
2035 problems for pages that are viewed with non-Microsoft products (and are
2036 expecting to see a standard set of fonts). The demoronizer corrected these
2037 errors so the pages displayed correctly. Privoxy borrowed from this script,
2038 introducing a filter based on the original demoronizer, which in turn could
2039 correct these errors on the fly.
2041 But this is only needed in some situations, and will cause serious problems in
2042 some other situations.
2044 If you are using Microsoft products, you do not need it. If you need to view
2045 pages with UTF-8 characters (such as Cyrillic or Chinese), then it will cause
2046 corruption of the fonts, and thus should not be on.
2048 On the other hand, if you use non-Microsoft products, and you occasionally
2049 notice weird characters on pages, you might want to try it.
2051 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
2053 5.16. Why do I keep seeing "PrivoxyWindowOpen()" in raw source code?
2055 Privoxy is attempting to disable malicious Javascript in this case, with the
2056 unsolicited-popups filter. Privoxy cannot tell very well "good" code snippets
2057 from "bad" code snippets.
2059 If you see this in HTML source, and the page displays without problems, then
2060 this is good, and likely some pop-up window was disabled. If you see this where
2061 it is causing a problem, such as a downloaded program source code file, then
2062 you should set an exception for this site or page such that the integrity of
2063 the page stays in tact by disabling all filtering.
2065 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
2067 5.17. I am getting too many DNS errors like "404 No Such Domain". Why can't
2068 Privoxy do this better?
2070 There are potentially several factors here. First of all, the DNS resolution is
2071 done by the underlying operating system -- not Privoxy itself. Privoxy merely
2072 initiates the process and hands it off, and then later reports whatever the
2073 outcome was. And tries to give a coherent message if there seems to be a
2074 problem. In some cases, this might otherwise be mitigated by the browser itself
2075 which might try some work-arounds and alternate approaches (e.g adding "www."
2078 In other cases, if Privoxy is being chained with another proxy, this could
2079 complicate the issue, and cause undue delays and timeouts. In the case of a
2080 "socks4a" proxy, the socks server handles all the DNS. Privoxy would just be
2081 the "messenger" which is reporting whatever problem occurred downstream, and
2082 not the root cause of the error.
2084 In any case, versions newer than 3.0.3 include various improvements to help
2085 Privoxy better handle these cases.
2087 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
2089 5.18. At one site Privoxy just hangs, and starts taking all CPU. Why is this?
2091 This is probably a manifestation of the "100% cpu" problem that occurs on pages
2092 containing many (thousands upon thousands) of blank lines. The blank lines are
2093 in the raw HTML source of the page, and the browser just ignores them. But the
2094 pattern matching in Privoxy's page filtering mechanism is trying to match
2095 against absurdly long strings and this becomes very CPU-intensive, taking a
2096 long, long time to complete. Until a better solution comes along, disable
2097 filtering on these pages, particularly the js-annoyances and unsolicited-popups
2100 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
2102 5.19. I just installed Privoxy, and all my browsing has slowed to a crawl. What
2105 This should not happen, and for the overwhelming number of users world-wide, it
2106 does not happen. I would suspect some inadvertent interaction of software
2107 components such as anti-virus software, spyware protectors, personal firewalls
2108 or similar components. Try disabling (or uninstalling) these one at a time and
2111 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
2113 5.20. Why do my filters work on some sites but not on others?
2115 It's probably due to compression. It is a common practice for web servers to
2116 send their content "compressed" in order to speed things up, and then let the
2117 browser "uncompress" them. When compiled with zlib support Privoxy can
2118 decompress content before filtering, otherwise you may want to enable
2119 prevent-compression.
2121 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
2123 6. Contacting the developers, Bug Reporting and Feature Requests
2125 We value your feedback. In fact, we rely on it to improve Privoxy and its
2126 configuration. However, please note the following hints, so we can provide you
2127 with the best support:
2129 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
2133 For casual users, our support forum at SourceForge is probably best suited:
2134 http://sourceforge.net/tracker/?group_id=11118&atid=211118
2136 All users are of course welcome to discuss their issues on the users mailing
2137 list, where the developers also hang around.
2139 Note that the Privoxy mailing lists are moderated. Posts from unsubscribed
2140 addresses have to be accepted manually by a moderator. This may cause a delay
2141 of several days and if you use a subject that doesn't clearly mention Privoxy
2142 or one of its features, your message may be accidentally discarded as spam.
2144 If you aren't subscribed, you should therefore spend a few seconds to come up
2145 with a proper subject. Additionally you should make it clear that you want to
2146 get CC'd. Otherwise some responses will be directed to the mailing list only,
2147 and you won't see them.
2149 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
2151 6.2. Reporting Problems
2153 "Problems" for our purposes, come in two forms:
2155 • Configuration issues, such as ads that slip through, or sites that don't
2156 function properly due to one Privoxy "action" or another being turned "on".
2158 • "Bugs" in the programming code that makes up Privoxy, such as that might
2161 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
2163 6.2.1. Reporting Ads or Other Configuration Problems
2165 Please send feedback on ads that slipped through, innocent images that were
2166 blocked, sites that don't work properly, and other configuration related
2167 problem of default.action file, to http://sourceforge.net/tracker/?group_id=
2168 11118&atid=460288, the Actions File Tracker.
2170 New, improved default.action files may occasionally be made available based on
2171 your feedback. These will be announced on the ijbswa-announce list and
2172 available from our the files section of our project page.
2174 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
2176 6.2.2. Reporting Bugs
2178 Please report all bugs through our bug tracker: http://sourceforge.net/tracker
2179 /?group_id=11118&atid=111118.
2181 Before doing so, please make sure that the bug has not already been submitted
2182 and observe the additional hints at the top of the submit form. If already
2183 submitted, please feel free to add any info to the original report that might
2184 help to solve the issue.
2186 Please try to verify that it is a Privoxy bug, and not a browser or site bug or
2187 documented behaviour that just happens to be different than what you expected.
2188 If unsure, try toggling off Privoxy, and see if the problem persists.
2190 If you are using your own custom configuration, please try the stock configs to
2191 see if the problem is configuration related. If you're having problems with a
2192 feature that is disabled by default, please ask around on the mailing list if
2193 others can reproduce the problem.
2195 If you aren't using the latest Privoxy version, the bug may have been found and
2196 fixed in the meantime. We would appreciate if you could take the time to
2197 upgrade to the latest version (or even the latest CVS snapshot) and verify that
2198 your bug still exists.
2200 Please be sure to provide the following information:
2202 • The exact Privoxy version you are using (if you got the source from CVS,
2203 please also provide the source code revisions as shown in http://
2204 config.privoxy.org/show-version).
2206 • The operating system and versions you run Privoxy on, (e.g. Windows XP
2207 SP2), if you are using a Unix flavor, sending the output of "uname -a"
2208 should do, in case of GNU/Linux, please also name the distribution.
2210 • The name, platform, and version of the browser you were using (e.g.
2211 Internet Explorer v5.5 for Mac).
2213 • The URL where the problem occurred, or some way for us to duplicate the
2214 problem (e.g. http://somesite.example.com/?somethingelse=123).
2216 • Whether your version of Privoxy is one supplied by the Privoxy developers
2217 via SourceForge, or if you got your copy somewhere else.
2219 • Whether you are using Privoxy in tandem with another proxy such as Tor. If
2220 so, please temporary disable the other proxy to see if the symptoms change.
2222 • Whether you are using a personal firewall product. If so, does Privoxy work
2225 • Any other pertinent information to help identify the problem such as config
2226 or log file excerpts (yes, you should have log file entries for each action
2229 You don't have to tell us your actual name when filing a problem report, but
2230 please use a nickname so we can differentiate between your messages and the
2231 ones entered by other "anonymous" users that may respond to your request if
2232 they have the same problem or already found a solution.
2234 Please also check the status of your request a few days after submitting it, as
2235 we may request additional information. If you use a SF id, you should
2236 automatically get a mail when someone responds to your request.
2238 The appendix of the Privoxy User Manual also has helpful information on
2239 understanding actions, and action debugging.
2241 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
2243 6.3. Request New Features
2245 You are welcome to submit ideas on new features or other proposals for
2246 improvement through our feature request tracker at http://sourceforge.net/
2247 tracker/?atid=361118&group_id=11118.
2249 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
2253 For any other issues, feel free to use the mailing lists. Technically
2254 interested users and people who wish to contribute to the project are also
2255 welcome on the developers list! You can find an overview of all Privoxy-related
2256 mailing lists, including list archives, at: http://sourceforge.net/mail/?
2259 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
2261 7. Privoxy Copyright, License and History
2263 Copyright 2001-2007 by Privoxy Developers <
2264 ijbswa-developers@lists.sourceforge.net>
2266 Some source code is based on code Copyright 1997 by Anonymous Coders and
2267 Junkbusters, Inc. and licensed under the GNU General Public License.
2269 Portions of this document are "borrowed" from the original Junkbuster (tm) FAQ,
2270 and modified as appropriate for Privoxy.
2272 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
2276 Privoxy is free software; you can redistribute it and/or modify it under the
2277 terms of the GNU General Public License, version 2, as published by the Free
2278 Software Foundation.
2280 This program is distributed in the hope that it will be useful, but WITHOUT ANY
2281 WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
2282 PARTICULAR PURPOSE. See the GNU General Public License for more details, which
2283 is available from the Free Software Foundation, Inc, 51 Franklin Street, Fifth
2284 Floor, Boston, MA 02110-1301, USA
2286 You should have received a copy of the GNU General Public License along with
2287 this program; if not, write to the
2290 Foundation, Inc. 51 Franklin Street, Fifth Floor
2291 Boston, MA 02110-1301
2294 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
2298 A long time ago, there was the Internet Junkbuster, by Anonymous Coders and
2299 Junkbusters Corporation. This saved many users a lot of pain in the early days
2300 of web advertising and user tracking.
2302 But the web, its protocols and standards, and with it, the techniques for
2303 forcing ads on users, give up autonomy over their browsing, and for tracking
2304 them, keeps evolving. Unfortunately, the Internet Junkbuster did not. Version
2305 2.0.2, published in 1998, was (and is) the last official release available from
2306 Junkbusters Corporation. Fortunately, it had been released under the GNU GPL,
2307 which allowed further development by others.
2309 So Stefan Waldherr started maintaining an improved version of the software, to
2310 which eventually a number of people contributed patches. It could already
2311 replace banners with a transparent image, and had a first version of pop-up
2312 killing, but it was still very closely based on the original, with all its
2313 limitations, such as the lack of HTTP/1.1 support, flexible per-site
2314 configuration, or content modification. The last release from this effort was
2315 version 2.0.2-10, published in 2000.
2317 Then, some developers picked up the thread, and started turning the software
2318 inside out, upside down, and then reassembled it, adding many new features
2321 The result of this is Privoxy, whose first stable version, 3.0, was released