1 <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN">
4 <meta name="generator" content="HTML Tidy, see www.w3.org">
8 <link rel="stylesheet" type="text/css" href="../p_web.css">
15 <!-- Manpage converted by man2html 3.0.1 -->
22 <b>privoxy</b> [<b>--help</b> ] [<b>--version</b> ] [<b>--no-daemon</b> ] [<b>--pidfile</b> <i>pidfile</i> ]
23 [<b>--user</b> <i>user[.group]</i> ] [<b>--chroot</b> ] [<b>--pre-chroot-nslookup</b> <i>hostname</i> ]
33 <b>Privoxy</b> may be invoked with the following command line options:
35 <b>--help</b> Print brief usage info and exit.
38 Print version info and exit.
41 Don't become a daemon, i.e. don't fork and become process
42 group leader, don't detach from controlling tty, and do all log-
45 <b>--pidfile</b> <i>pidfile</i>
46 On startup, write the process ID to <i>pidfile</i>. Delete the <i>pidfile</i>
47 on exit. Failure to create or delete the <i>pidfile</i> is non-fatal.
48 If no <b>--pidfile</b> option is given, no PID file will be used.
50 <b>--user</b> <i>user[.group]</i>
51 After (optionally) writing the PID file, assume the user ID of
52 <i>user</i> and the GID of <i>group</i>, or, if the optional <i>group</i> was not
53 given, the default group of <i>user</i>. Exit if the privileges are not
57 Before changing to the user ID given in the --user option,
58 chroot to that user's home directory, i.e. make the kernel pre-
59 tend to the <b>Privoxy</b> process that the directory tree starts
60 there. If set up carefully, this can limit the impact of possi-
61 ble vulnerabilities in <b>Privoxy</b> to the files contained in that
64 <b>--pre-chroot-nslookup</b> <i>hostname</i>
65 Initialize the resolver library using <i>hostname</i> before
66 chroot'ing. On some systems this reduces the number of files
67 that must be copied into the chroot tree.
69 If the <i>configfile</i> is not specified on the command line, <b>Privoxy</b>
70 will look for a file named <i>config</i> in the current directory. If no <i>con-</i>
71 <i>figfile</i> is found, <b>Privoxy</b> will fail to start.
79 Privoxy is a non-caching web proxy with advanced filtering capabilities
80 for enhancing privacy, modifying web page data and HTTP headers, con-
81 trolling access, and removing ads and other obnoxious Internet junk.
82 Privoxy has a flexible configuration and can be customized to suit
87 INSTALLATION AND USAGE
90 Browsers can either be individually configured to use <b>Privoxy</b> as a HTTP
91 proxy (recommended), or <b>Privoxy</b> can be combined with a packet filter to
92 build an intercepting proxy (see <i>config</i>). The default setting is for
93 localhost, on port 8118 (configurable in the main config file). To
94 set the HTTP proxy in Firefox, go through: <b>Tools</b>; <b>Options</b>; <b>General</b>;
95 <b>Connection</b> <b>Settings</b>; <b>Manual</b> <b>Proxy</b> <b>Configuration</b>.
97 For Internet Explorer, go through: <b>Tools</b>; <b>Internet</b> <b>Properties</b>; <b>Connec-</b>
98 <b>tions</b>; <b>LAN</b> <b>Settings</b>.
100 The Secure (SSL) Proxy should also be set to the same values, otherwise
101 https: URLs will not be proxied. Note: <b>Privoxy</b> can only proxy HTTP and
102 HTTPS traffic. Do not try it with FTP or other protocols. HTTPS
103 presents some limitations, and not all features will work with HTTPS
106 For other browsers, check the documentation.
114 <b>Privoxy</b> can be configured with the various configuration files. The
115 default configuration files are: <i>config</i>, <i>default.filter</i>, <i>default.action</i>
116 and <i>default.action</i>. <i>user.action</i> should be used for locally defined
117 exceptions to the default rules in <i>match-all.action</i> and <i>default.action</i>,
118 and <i>user.filter</i> for locally defined filters. These are well commented.
119 On Unix and Unix-like systems, these are located in <i>/etc/privoxy/</i> by
122 <b>Privoxy</b> uses the concept of <b>actions</b> in order to manipulate the data
123 stream between the browser and remote sites. There are various actions
124 available with specific functions for such things as blocking web
125 sites, managing cookies, etc. These actions can be invoked individually
126 or combined, and used against individual URLs, or groups of URLs that
127 can be defined using wildcards and regular expressions. The result is
128 that the user has greatly enhanced control and freedom.
130 The actions list (ad blocks, etc) can also be configured with your web
131 browser at http://config.privoxy.org/ (assuming the configuration
132 allows it). <b>Privoxy's</b> configuration parameters can also be viewed at
133 the same page. In addition, <b>Privoxy</b> can be toggled on/off. This is an
134 internal page, and does not require Internet access.
136 See the <i>User</i> <i>Manual</i> for a detailed explanation of installation, general
137 usage, all configuration options, new features and notes on upgrading.
145 <i>/usr/sbin/privoxy</i>
146 <i>/etc/privoxy/config</i>
147 <i>/etc/privoxy/match-all.action</i>
148 <i>/etc/privoxy/default.action</i>
149 <i>/etc/privoxy/user.action</i>
150 <i>/etc/privoxy/default.filter</i>
151 detect them automatically.
159 This is a UNRELEASED version of <b>Privoxy</b>. Not all features are well
162 Please see the <i>User</i> <i>Manual</i> on how to contact the developers, for fea-
163 ture requests, reporting problems, and other questions.
171 Other references and sites of interest to <b>Privoxy</b> users:
174 http://www.privoxy.org/, the <b>Privoxy</b> Home page.
176 http://www.privoxy.org/faq/, the <b>Privoxy</b> FAQ.
178 http://www.privoxy.org/developer-manual/, the <b>Privoxy</b> developer manual.
180 https://sourceforge.net/projects/ijbswa/, the Project Page for <b>Privoxy</b>
183 http://config.privoxy.org/, the web-based user interface. <b>Privoxy</b> must
184 be running for this to work. Shortcut: http://p.p/
186 https://sourceforge.net/tracker/?group_id=11118&atid=460288, to submit
187 ``misses'' and other configuration related suggestions to the develop-
196 Fabian Keil, lead developer
197 David Schmidt, developer
208 COPYRIGHT AND LICENSE
212 Copyright (C) 2001-2011 by Privoxy Developers <ijbswa-develop-
213 ers@lists.sourceforge.net>
215 Some source code is based on code Copyright (C) 1997 by Anonymous
216 Coders and Junkbusters, Inc. and licensed under the <i>GNU</i> <i>General</i> <i>Public</i>
220 <b>Privoxy</b> is free software; you can redistribute it and/or modify it
221 under the terms of the <i>GNU</i> <i>General</i> <i>Public</i> <i>License</i>, version 2, as pub-
222 lished by the Free Software Foundation.