<!entity history SYSTEM "history.sgml">
<!entity copyright SYSTEM "copyright.sgml">
<!entity license SYSTEM "license.sgml">
-<!entity p-version "3.0.5">
-<!entity p-status "BETA">
+<!entity p-version "3.0.7">
+<!entity p-status "stable">
<!entity % p-not-stable "IGNORE">
<!entity % p-stable "INCLUDE">
<!entity % p-text "IGNORE"> <!-- define we are not a text only doc -->
This file belongs into
ijbswa.sourceforge.net:/home/groups/i/ij/ijbswa/htdocs/
- $Id: faq.sgml,v 2.22 2006/10/14 20:33:10 hal9 Exp $
+ $Id: faq.sgml,v 2.27 2007/10/22 19:47:05 fabiankeil Exp $
- Copyright (C) 2001-2006 Privoxy Developers http://privoxy.org
+ Copyright (C) 2001-2007 Privoxy Developers http://privoxy.org
See LICENSE.
Based partially on the Internet Junkbuster FAQ originally written by and
<subscript>
<!-- Completely the wrong markup, but very little is allowed -->
<!-- in this part of an article. FIXME -->
- <link linkend="copyright">Copyright</link> &my-copy; 2001-2006 by
- <ulink url="http://www.privoxy.org">Privoxy Developers</ulink>
+ <link linkend="copyright">Copyright</link> &my-copy; 2001-2007 by
+ <ulink url="http://www.privoxy.org/">Privoxy Developers</ulink>
</subscript>
</pubdate>
-<pubdate>$Id: faq.sgml,v 2.22 2006/10/14 20:33:10 hal9 Exp $</pubdate>
+<pubdate>$Id: faq.sgml,v 2.27 2007/10/22 19:47:05 fabiankeil Exp $</pubdate>
<!--
it is in a perfect position to filter outbound personal information that your
browser is leaking, as well as inbound junk. It uses a variety of techniques to do
this, all of which are under your complete control via the various configuration
- files and options.
+ files and options. Being a proxy also makes it easier to share
+ configurations among multiple browsers and/or users.
</para>
</sect2>
+<sect2 renderas="sect3" id="otherstuff">
+<title>Does Privoxy do anything more than ad blocking?</title>
+ <para>
+ Yes, ad blocking is but one possible use. There are many, many ways &my-app;
+ can be used to sanitize and customize web browsing.
+</para>
+</sect2>
+
<sect2 renderas="sect3" id="newjb"><title>What is this new version of
<quote><citetitle>Junkbuster</citetitle></quote>?</title>
<title id="whyprivoxy">Why <quote>Privoxy</quote>? Why change the name from
Junkbuster at all?</title>
<para>
- <ulink url="http://junkbusters.com/">Junkbusters Corporation</ulink>
+ Though outdated, <ulink url="http://junkbusters.com/">Junkbusters Corporation</ulink>
continues to offer their original version of the <application>Internet
Junkbuster</application>, so publishing our
<application> Junkbuster</application>-derived software under the same name
led to confusion.
</para>
<para>
- There are also potential legal complications from the continued use of the
+ There are also potential legal complications from our use of the
<application>Junkbuster</application> name, which is a registered trademark of
<ulink url="http://junkbusters.com/">Junkbusters Corporation</ulink>.
There are, however, no objections from Junkbusters Corporation to the
</para>
</sect2>
-
<sect2 renderas="sect3" id="differs"><title>How does Privoxy differ
from the old Junkbuster?</title>
<para>
</sect2>
-
<sect2 renderas="sect3">
<title id="configornot">Will I have to configure Privoxy
before I can use it?</title>
<para>
No, not really. The default installation should give you a good starting
- point, and block <emphasis>most</emphasis> unwanted content.
+ point, and block <emphasis>most</emphasis> ads and unwanted content. Many of
+ the more advanced features are off by default, and would require you to
+ activate them.
+</para>
+<para>
+ You do have to set up your browser to use
+ <application>Privoxy</application> (see the <link
+ linkend="firststep">Installation section below</link>).
</para>
<para>
- But you will certainly run into situations where there are false positives,
+ And you will certainly run into situations where there are false positives,
or ads not being blocked that you may not want to see. In these cases, you
would certainly benefit by customizing <application>Privoxy's</application>
configuration to more closely match your individual situation. And we would
encourage you to do this. This is where the real power of
<application>Privoxy</application> lies!
</para>
-<para>
- You will have to tell your browser about <application>Privoxy</application>
- (see the Installation section below).
-</para>
</sect2>
+<sect2 renderas="sect3" id="lan">
+<title>Can Privoxy run as a server on a network?</title>
+ <para>
+ Yes, &my-app; runs as a server already, and can easily be configured to
+ <quote>serve</quote> more than one client. See <link linkend="lanconfig">
+ How can I set up Privoxy to act as a proxy for my LAN</link> below.
+</para>
+</sect2>
+
<sect2 renderas="sect3" id="browsers2"><title>My browser does the same things as
-Privoxy. Why should I use
-Privoxy at all?</title>
+Privoxy. Why should I use Privoxy at all?</title>
<para>
Modern browsers do indeed have <emphasis>some</emphasis> of the same
functionality as <application>Privoxy</application>. Maybe this is
</para>
<para>
In addition, a proxy is good choice if you use multiple browsers, or
- have a LAN with multiple computers. This way all the configuration
- is in one place, and you don't have to maintain a similar configuration
- for possibly many browsers.
+ have a LAN with multiple computers since &my-app; can run as a server
+ application. This way all the configuration is in one place, and you don't
+ have to maintain a similar configuration for possibly many browsers or
+ users.
</para>
</sect2>
check every line of every configuration file yourself. You can check every
last bit of source code should you desire. And even if you can't read code,
there should be some comfort in knowing that thousands of other people can,
- and do read it. You can build the software from scratch, if you want, so
- that you know the executable is clean, and that it is
+ and some of them do read it. You can build the software from scratch, if you want,
+ so that you know the executable is clean, and that it is
<emphasis>yours</emphasis>. In fact, we encourage this level of scrutiny. It
is one reason we use &my-app; ourselves.
</para>
warranty? Registration?</title>
<para>
<application>Privoxy</application> is licensed under the <ulink
- url="http://www.gnu.org/copyleft/gpl.html">GNU General Public License (GPL)</ulink>.
+ url="http://www.gnu.org/licenses/old-licenses/gpl-2.0.html">GNU General Public License (GPL) version 2</ulink>.
It is free to use, copy, modify or distribute as you wish under the terms of this
license. Please see the <link linkend="copyright">Copyright</link> section for more
information on the license and copyright. Or the <filename>LICENSE</filename> file
<sect2 renderas="sect3" id="spyware">
<title>Can Privoxy remove spyware? Adware? Viruses?</title>
<para>
- No. &my-app; cannot remove anything. It is not a removal tool. It is a
- preventative. &my-app; can help prevent contact from sites
- that use such tactics with approriate configuration rules, and thus could
- conceivably prevent contamination from such sites.
+ No, at least not reliable enough to trust it. &my-app; is not designed to be
+ a malware removal tool and the default configuration doesn't even try to
+ filter out any malware.
+</para>
+<para>
+ &my-app; could help prevent contact from (known) sites that use such
+ tactics with appropriate configuration rules, and thus could conceivably
+ prevent contamination from such sites.
</para>
</sect2>
url="../developer-manual/index.html">Developer's Manual</ulink>, at least
the pertinent sections.
</para>
-<para>
- Once we have added you to the team, you'll have access to the <ulink
- url="http://sourceforge.net/cvs/?group_id=11118">CVS repository</ulink>, and
- together we'll find a suitable task for you.
-</para>
</sect3>
<sect3 renderas="sect4" id="jointeam-money"><title>Contribute!</title>
</sect2>
-<sect2 renderas="sect3">
-<title id="firststep">I just installed Privoxy. Is there anything
+<sect2 renderas="sect3" id="firststep">
+<title>I just installed Privoxy. Is there anything
special I have to do now?</title>
<para>
All browsers must be told to use <application>Privoxy</application>
as a proxy by specifying the correct proxy address and port number
- in the appropriate configuration area for the browser. See below.
- You should also flush your browser's memory and disk cache to get rid of any
+ in the appropriate configuration area for the browser. See
+ <ulink url="../user-manual/startup.html">the User Manual for more
+ details</ulink>. You should also flush your browser's memory and disk cache to get rid of any
cached junk items, and remove any stored
<ulink url="http://en.wikipedia.org/wiki/Browser_cookie">cookies</ulink>.
<application>Privoxy</application> can also be used to proxy for
a Local Area Network. In this case, your would enter either the IP
address of the LAN host where <application>Privoxy</application>
- is running, or the equivalent hostname. Port assignment would be
- same as above. Note that <application>Privoxy</application> doesn't
- listen on any LAN interfaces by default.
+ is running, or the equivalent hostname, e.g. <literal>192.168.1.1</literal>.
+ Port assignment would be same as above. Note that
+ <application>Privoxy</application> doesn't listen on any LAN interfaces by
+ default.
</para>
<para>
<application>Privoxy</application> does not currently handle
<sect2 renderas="sect3" id="newconfig"><title>Can I use my old config files?</title>
<para>
- The syntax and purpose of configuration files has remained the same
- throughout the 3.x series. Although each release contains updated,
- <quote>improved</quote> versions and it is recommended to use the newer
- configuration files.
+ The syntax and purpose of configuration files has remained roughly the
+ same throughout the 3.x series, but backwards compatibility is not guaranteed.
+ Also each release contains updated, <quote>improved</quote> versions and it is
+ therefore recommended to use the newer configuration files.
<![%p-newstuff;[
If upgrading from version prior to 3.0.4 the syntax for <literal>fast-redirects</literal>
has changed. See the <ulink url="../user-manual/whatsnew.html">What's New section</ulink>
<sect2 renderas="sect3" id="yahoo"><title>How can I make my Yahoo/Hotmail/Gmail account work?</title>
<para>
The default configuration shouldn't impact the usability of any of these services.
- It will, however, make all <ulink
+ It may, however, make all <ulink
url="http://en.wikipedia.org/wiki/Browser_cookie">cookies</ulink>
temporary, so that your browser will forget your
login credentials in between browser sessions. If you would like not to have to log
<screen># Gmail is a _fragile_ site:
#
{ <literal>fragile</literal> }
+ # Gmail is ...
mail.google.com</screen>
</para>
<para>
<para>
Note that in the default configuration, only local users (i.e. those on
<quote>localhost</quote>) can connect to <application>Privoxy</application>,
- so this is not (normally) a security problem.
+ so this is (normally) not a security problem.
</para>
</sect2>
</sect2>
-<sect2 renderas="sect3">
-<title id="lanconfig">How can I set up Privoxy to act as a proxy for my
+<sect2 renderas="sect3" id="lanconfig">
+<title>How can I set up Privoxy to act as a proxy for my
LAN?</title>
<para>
By default, <application>Privoxy</application> only responds to requests
Remember that <link linkend="whatsanad">telling which image is an ad and which
isn't</link>, is an educated guess. While we hope that the standard configuration
is rather smart, it will make occasional mistakes. The checkerboard image is visually
- decent, but it shows you that and where images were blocked, which can be very
+ decent, and it shows you where images have been blocked, which can be very
helpful in case some navigation aid or otherwise innocent image was
erroneously blocked. It is recommended for new users so they can
<quote>see</quote> what is happening. Some people might also enjoy seeing how
<para>
No, its more complicated than that. This only works with special kinds
- of proxies known as <quote>transparent</quote> proxies (see below).
+ of proxies known as <quote>intercepting</quote> proxies (see below).
</para>
</sect2>
<title>Can Privoxy run as a <quote>transparent
</quote> proxy?</title>
<para>
- No, <application>Privoxy</application> currently does not have this ability,
- though it may be added in a future release. Transparent proxies require
- special handling of the request headers beyond what
- <application>Privoxy</application> is now capable of.
+ The whole idea of Privoxy is to modify client requests
+ and server responses in all sorts of ways and therefore
+ it's not a transparent proxy as described in
+ <ulink url="http://tools.ietf.org/html/rfc2616">RFC 2616</ulink>.
+</para>
+<para>
+ However, some people say <quote>transparent proxy</quote> when they
+ mean <quote>intercepting proxy</quote>. If you are one of them,
+ please read the <ulink url="#intercepting">next entry</ulink>.
</para>
+</sect2>
+
+<sect2 renderas="sect3" id="intercepting">
+<title>Can Privoxy run as a <quote>intercepting</quote> proxy?</title>
<para>
- Chaining <application>Privoxy</application> behind another proxy that has
- this ability should work though.
- See the <ulink
- url="../user-manual/config.html#FORWARDING">forwarding chapter</ulink>
- in the <ulink url="../user-manual/index.html">User Manual</ulink>. As
- a transparent proxy to be used for chaining we suggest Transproxy
- (<ulink url="http://transproxy.sourceforge.net/">http://transproxy.sourceforge.net/</ulink>).
+ <application>Privoxy</application> can't intercept traffic itself,
+ but it can handle requests that where intercepted and redirected
+ with a packet filter (like PF or iptables), as long as the Host
+ header is present.
+</para>
+<para>
+ As the Host header is required by HTTP/1.1 and as most web sites
+ don't work if it isn't set, this limitation shouldn't be a problem.
+</para>
+<para>
+ Please refer to your packet filter's documentation to learn how to
+ intercept and redirect traffic into Privoxy. Afterward you just have
+ to configure Privoxy to
+ <ulink url="../user-manual/config.html#ACCEPT-INTERCEPTED-REQUESTS">accept intercepted requests</ulink>.
</para>
</sect2>
advantage of this layer of trust, and using the data they glean from you and
your browsing habits for their own purposes, and maybe to your potential
detriment. Such sites are using you and storing their data on your system.
- That is why the security conscious watch from whom those cookies come, and why
+ That is why the privacy conscious watch from whom those cookies come, and why
they really <emphasis>need</emphasis> to be there.
</para>
<para>
There are several actions that relate to cookies. The default behavior is to
allow only <quote>session cookies</quote>, which means the cookies only last
for the current browser session. This eliminates most kinds of abuse related
- to cookies. But there may be cases where we want cookies to last.
+ to cookies. But there may be cases where you want cookies to last.
</para>
<para>
To disable all cookie actions, so that cookies are allowed unrestricted,
.example.com</screen>
</para>
<para>
- Place the above in <filename>user.action</filename>. Note some of these may
+ Place the above in <filename>user.action</filename>. Note that some of these may
be off by default anyway, so this might be redundant, but there is no harm
being explicit in what you want to happen. <filename>user.action</filename>
includes an alias for this situation, called
<screen>
# Unblock everybody, everywhere
{ <ulink url="../user-manual/actions-file.html#BLOCK">-block</ulink> }
- / # UN-Block *all* URLs
- </screen>
+ / # UN-Block *all* URLs</screen>
</para>
<para>
Or even a more comprehensive reversing of various ad related actions:
<ulink url="../user-manual/actions-file.html#FILTER-BANNERS-BY-LINK">-filter{banners-by-link}</ulink> \
<literal>allow-popups</literal> \
}
- / # UN-Block *all* URLs and allow ads
- </screen>
+ / # UN-Block *all* URLs and allow ads</screen>
</para>
<para>
This last <quote>action</quote> in this compound statement,
<sect2 renderas="sect3" id="blockall">
<title>How can I remove the <quote>Go There Anyway</quote> link from
the <emphasis>BLOCKED</emphasis> page?</title>
+<para>
+ There is more than one way to do it.
+</para>
<para>
Editing the BLOCKED template page (see above) may dissuade some users, but
this method is easily circumvented. Where you need this level of control, you
</para>
<para>
<screen>
- ./configure --disable-toggle --disable-editor --disable-force
- </screen>
+ ./configure --disable-toggle --disable-editor --disable-force</screen>
</para>
<para>
This will create an executable with hard-coded security features so that
&my-app; does not allow easy bypassing of blocked sites, or changing the
- current configuration via any connected user's web browser. Some of these
- features can also be toggled on/off via options in
- <application>Privoxy's</application> main
- <ulink
- url="../user-manual/config.html#ACCESS-CONTROL">config</ulink> file. But
- compiled-in compliance is a much better method of ensuring that a block is
- really a block.
+ current configuration via any connected user's web browser.
</para>
<para>
- Default builds of &my-app; are typically built with these features
- disabled.
+ Note that all of these features can also be toggled on/off via options in
+ <application>Privoxy's</application> main <ulink
+ url="../user-manual/config.html#ACCESS-CONTROL">config</ulink> file which
+ means you don't have to recompile anything.
</para>
</sect2>
url="../user-manual/actions-file.html#FILTER">filter</ulink></literal> or
<literal><ulink
url="../user-manual/actions-file.html#DEANIMATE-GIFS">deanimate-gifs</ulink></literal>
- actions will certainly cause a perceived slowdown, since the entire document
+ actions may cause a perceived slowdown, since the entire document
needs to be buffered before displaying. And on very large documents, filtering may have
some measurable impact. How much depends on the page size, the actual
definition of the filter(s), etc. See below. Most other actions have little
to no impact on speed.
</para>
-<para>
- Also, when filtering is enabled, typically there is a disabling of
- compression, (see <ulink
+<para>
+ Also, when filtering is enabled but zlib support isn't available, compression
+ is often disabled (see <ulink
url="../user-manual/actions-file.html#PREVENT-COMPRESSION">prevent-compression</ulink>).
This can have an impact on speed as well. Again, the page size, etc. will
determine how much of an impact.
to differentiate filterable content because of the MIME type as reported by
the server, or because of some configuration setting that enables/disables
filtering.
-
</para>
</sect2>
</para>
<para>
However, these proxies are called "anonymous" because you don't need
- a password, not because they would offer any real anonymity.
+ to authenticate, not because they would offer any real anonymity.
Most of them will log your IP address and make it available to the
authorities in case you violate the law of the country they run in. In fact
you can't even rule out that some of them only exist to *collect* information
with <ulink url="http://tor.eff.org/">Tor</ulink>,
an <ulink url="http://www.eff.org/">EFF</ulink> supported onion routing system.
The configuration details can be found in
- <ulink url="#TOR">How do I use <application>Privoxy</application> together with <application>Tor</application> section</ulink>
+ <ulink url="#TOR">How do I use <application>Privoxy</application> together
+ with <application>Tor</application> section</ulink>
just below.
</para>
-<!--
-<para>
- There is, however, even in the single-machine case the possibility to make the
- server believe that your machine is in fact a shared proxy serving a large
- LAN, and we are looking into that.
-</para>
- I assume this is about sending fake forward IP addresses?
- David and I looked into it and considered it a waste of time to implement.
- Fabian 2006-09-04
--->
</sect2>
<sect2 renderas="sect3">
configuration and chained it with <application>Tor</application>.
</para>
<para>
- Most of <application>Privoxy's</application> protection can be easily subverted
+ Most of <application>Privoxy's</application> privacy-enhancing features can be easily subverted
by an insecure browser configuration, therefore you should use a browser that can
be configured to only execute code from trusted sites, and be careful which sites you trust.
For example there is no point in having <application>Privoxy</application>
<sect2 renderas="sect3" id="tor"><title>How do I use Privoxy
together with Tor?</title>
<para>
- Before you configure <application>Privoxy</application> to use <application>Tor</application>
- (<ulink url="http://tor.eff.org/">http://tor.eff.org/</ulink>),
+ Before you configure <application>Privoxy</application> to use
+ <ulink url="https://www.torproject.org/">Tor</ulink>,
please follow the <citetitle>User Manual</citetitle> chapters
<ulink url="../user-manual/installation.html">2. Installation</ulink> and
<ulink url="../user-manual/startup.html">5. Startup</ulink> to make sure
<application>Privoxy</application> itself is setup correctly.
</para>
<para>
- If it is, refer to <ulink url="http://tor.eff.org/documentation.html.en">Tor's
+ If it is, refer to <ulink url="https://www.torproject.org/documentation.html">Tor's
extensive documentation</ulink> to learn how to install <application>Tor</application>,
and make sure <application>Tor</application>'s logfile says that
<quote>Tor has successfully opened a circuit</quote> and it
are working, it is time to connect them. As far as <application>Privoxy</application>
is concerned, <application>Tor</application> is just another proxy that can be reached
by socks4 or socks4a. Most likely you are interested in <application>Tor</application>
- to increase your anonymity level, therefore you should use socks4a,
- to make sure <application>Privoxy's</application> DNS requests are
+ to increase your anonymity level, therefore you should use socks4a, to make sure DNS requests are
done through <application>Tor</application> and thus invisible to your local network.
</para>
</screen>
</para>
<para>
- This is enough to reach the Internet, but additionally you should
+ This is enough to reach the Internet, but additionally you might want to
uncomment the following forward rules, to make sure your local network is still
reachable through Privoxy:
</para>
<para>
Unencrypted connections to systems in these address ranges will
be as (un)secure as the local network is, but the alternative is
- that you can't reach the network at all.
- If you also want to be able to reach servers in your local
- network by using their names, you will need additional
- exceptions that look like this:
+ that your browser can't reach the network at all. Then again,
+ that may actually be desired and if you don't know for sure
+ that your browser has to be able to reach the local network,
+ there's no reason to allow it.
+</para>
+<para>
+ If you want your browser to be able to reach servers in your local
+ network by using their names, you will need additional exceptions
+ that look like this:
</para>
<para>
<screen>
in your browser, confirm that <application>Privoxy</application> has reloaded its configuration
and that there are no other forward lines, unless you know that you need them. If everything looks good,
refer to
- <ulink url="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#head-0e1cc2ac330ede8c6ad1ac0d0db0ac163b0e6143">Tor
+ <ulink url="https://wiki.torproject.org/wiki/TheOnionRouter/TorFAQ#head-0e1cc2ac330ede8c6ad1ac0d0db0ac163b0e6143">Tor
Faq 4.2</ulink> to learn how to verify that you are really using <application>Tor</application>.
</para>
<para>
- Afterwards, please take the time to at least skim through the rest
+ Afterward, please take the time to at least skim through the rest
of <application>Tor's</application> documentation. Make sure you understand
what <application>Tor</application> does, why it is no replacement for
application level security, and why you shouldn't use it for unencrypted logins.
</para>
<para>
- <quote>User-Agent</quote> is often used in this way to identify
- the browser, and adjust content accordingly. Changing this now (at least not
- further than removing the OS information) is not recommended, since so many
- sites do look for it. You may get undesirable results by changing just this
- one aspect.
+ The <quote>User-Agent</quote> is sometimes used in this way to identify
+ the browser, and adjust content accordingly.
</para>
<para>
speed up web browsing?</title>
<para>
No, it does not have this ability at all. You want something like
- <ulink url="http://www.squid-cache.org/">Squid</ulink> for this. And, yes,
- before you ask, <application>Privoxy</application> can co-exist
+ <ulink url="http://www.squid-cache.org/">Squid</ulink> or
+ <ulink url="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</ulink> for this.
+ And, yes, before you ask, <application>Privoxy</application> can co-exist
with other kinds of proxies like <application>Squid</application>.
See the <ulink url="../user-manual/config.html#FORWARDING">forwarding
chapter</ulink> in the <ulink url="../user-manual/index.html">user
<sect2 renderas="sect3">
<title id="firewall">What about as a firewall? Can Privoxy protect me?</title>
<para>
- Not in the way you mean, or in the way a true firewall can.
- <application>Privoxy</application> can help protect your privacy, but not
- protect you from intrusion attempts. It is, of course, perfectly possible
- and recommended to use <emphasis>both</emphasis>.
+ Not in the way you mean, or in the way some firewall vendors claim they can.
+ <application>Privoxy</application> can help protect your privacy, but can't
+ protect your system from intrusion attempts. It is, of course, perfectly possible
+ to use <emphasis>both</emphasis>.
</para>
</sect2>
<title id="secure">Privoxy runs as a <quote>server</quote>. How
secure is it? Do I need to take any special precautions?</title>
<para>
- There are no known exploits that might affect
- <application>Privoxy</application>. On Unix-like systems,
- <application>Privoxy</application> can run as a non-privileged
- user, which is how we recommend it be run. Also, by default
- <application>Privoxy</application> only listens to requests
- from <quote>localhost</quote> only. The server aspect of
- <application>Privoxy</application> is not itself directly exposed to the
- Internet in this configuration. If you want to have
+ On Unix-like systems, <application>Privoxy</application> can run as a non-privileged
+ user, which is how we recommend it be run. Also, by default
+ <application>Privoxy</application> listens to requests from <quote>localhost</quote>
+ only.
+</para>
+<para>
+ The server aspect of <application>Privoxy</application> is not itself directly
+ exposed to the Internet in this configuration. If you want to have
<application>Privoxy</application> serve as a LAN proxy, this will have to
be opened up to allow for LAN requests. In this case, we'd recommend
you specify only the LAN gateway address, e.g. 192.168.1.1, in the main
<title>When <quote>disabled</quote> is Privoxy totally
out of the picture?</title>
<para>
- No, this just means all filtering and actions are disabled.
+ No, this just means all optional filtering and actions are disabled.
<application>Privoxy</application> is still acting as a proxy, but just not
doing any of the things that <application>Privoxy</application> would
normally be expected to do. It is still a <quote>middle-man</quote> in
configuration is returned to the browser, and the log consequently will show
a <quote>crunch</quote>.
</para>
+<para>
+ Since version 3.0.7, Privoxy will also log the crunch reason.
+ If you are using an older version you might want to upgrade.
+</para>
</sect2>
<sect2 renderas="sect3" id="downloads">
</para>
<para>
<application>Privoxy</application> knows the differences in files according
- to the <quote>Document Type</quote> as reported by the webserver. If this is
+ to the <quote>Content Type</quote> as reported by the webserver. If this is
reported accurately (e.g. <quote>application/zip</quote> for a zip archive),
then <application>Privoxy</application> knows to ignore these where
appropriate. <application>Privoxy</application> potentially can filter HTML
did filter this document type.
</para>
<para>
- In short, filtering is <quote>ON</quote> if a) the Document Type as reported
+ In short, filtering is <quote>ON</quote> if a) the content type as reported
by the webserver is appropriate <emphasis>and</emphasis> b) the configuration
allows it (or at least does not disallow it). That's it. There is no magic
cookie anywhere to say this is <quote>good</quote> and this is
- <quote>bad</quote>. It's the configuration that let's it all happen or not.
+ <quote>bad</quote>. It's the configuration that lets it all happen or not.
</para>
<para>
If you download text files, you probably do not want these to be filtered,
<application>Privoxy</application>. <application>Privoxy</application>
does essentially the same thing, much more elegantly and with much more
flexibility. A large <filename>HOSTS</filename> file, in fact, not only
- duplicates effort, but may get in the way. It is recommended to remove
- such entries from your <filename>HOSTS</filename> file. If you think
+ duplicates effort, but may get in the way and seriously slow down your system.
+ It is recommended to remove such entries from your <filename>HOSTS</filename> file. If you think
your hosts list is neglected by <application>Privoxy's </application>
configuration, consider adding your list to your <filename>user.action</filename> file:
</para>
</para>
</sect2>
+<sect2 renderas="sect3" id="valid">
+<title>Does Privoxy produce <quote>valid</quote> HTML (or XHTML)?</title>
+
+<para>
+ Privoxy generates HTML in both its own <quote>templates</quote>, and possibly
+ whenever there are text substitutions via a &my-app; filter. While this
+ should always conform to the HTML 4.01 specifications, it has not been
+ validated against this or any other standard.
+</para>
+</sect2>
+
+
</sect1>
If the ad had been displayed before you added its URL, it will probably be
held in the browser's cache for some time, so it will be displayed without
the need for any request to the server, and <application>Privoxy</application>
- will not be in the picture. The best thing to do is try flushing the browser's
- caches. And then try again.
+ will not be involved. Flush the browser's caches, and then try again.
</para>
<para>
be able to get all the relevant information you need. Alternately, you can
find the correct URL by looking at <application>Privoxy's</application> logs.
</para>
+<para>
+ Below is a slightly modified real-life log snippet that originates with one
+ requested URL: <literal>www.example.com</literal> (name of site was changed
+ for this example, the number of requests is real). You can see in this the
+ complexity of what goes into making up this one <quote>page</quote>. There
+ are eight different domains involved here, with thirty two separate URLs
+ requested in all, making up all manner of images, Shockwave Flash,
+ JavaScript, CSS stylesheets, scripts, and other related content. Some of this
+ content is obviously <quote>good</quote> or <quote>bad</quote>, but not all.
+ Many of the more questionable looking requests, are going to outside domains
+ that seem to be identifying themselves with suspicious looking names, making
+ our job a little easier. &my-app; has <quote>crunched</quote> (meaning caught
+ and BLOCKED) quite a few items in this example, but perhaps missed a few as well.
+</para>
+<para>
+<screen>
+<![CDATA[
+Request: www.example.com/
+Request: www.example.com/favicon.ico
+Request: img.example.com/main.css
+Request: img.example.com/sr.js
+Request: example.betamarker.com/example.html
+Request: www.lik-sang.com/Banners/bestsellers/skyscraper.php?likref=BSellers
+Request: img.example.com/pb.png
+Request: www.google-analytics.com/urchin.js crunch!
+Request: www.advertising-department.com/ats/switch.ps.php?26856 crunch!
+Request: img.example.com/p.gif
+Request: www.popuptraffic.com/assign.php?l=example&mode=behind crunch!
+Request: www.popuptraffic.com/scripts/popup.php?hid=5c3cf&tmpl=PBa.tmpl crunch!
+Request: www.popuptraffic.com/assign.php?l=example crunch!
+Request: www.lik-sang.com/Banners/best_sellers/best_sellers.css
+Request: www.adtrak.net/adx.js crunch!
+Request: img.example.com/hbg.gif
+Request: img.example.com/example.jpg
+Request: img.example.com/mt.png
+Request: img.example.com/mm.png
+Request: img.example.com/mb.png
+Request: www.popuptraffic.com/scripts/popup.php?hid=a71b91fa5&tmpl=Ua.tmp crunch!
+Request: www.example.com/tracker.js
+Request: www.lik-sang.com/Banners/best_sellers/lsi_head.gif
+Request: www.adtrak.net/adjs.php?n=020548130&what=zone:61 crunch!
+Request: www.adtrak.net/adjs.php?n=463594413&what=zone:58&source=Ua crunch!
+Request: www.lik-sang.com/Banners/best_sellers/bottomani.swf
+Request: mmm.elitemediagroup.net/install.php?allowpop=no&popupmincook=0&allowsp2=1 crunch!
+Request: www.example.com/tracker.js?screen=1400x1050&win=962x693
+Request: www.adtrak.net/adlog.php?bannerid=1309&clientid=439&zoneid=61 crunch!
+Request: 66.70.21.80/scripts/click.php?hid=5c3cf599a9efd0320d26&si
+Request: 66.70.21.80/img/pixel.gif
+Request: www.adtrak.net/adlog.php?bannerid=1309&clientid=439&zoneid=58&source=Ua&block=86400 crunch!
+Request: 66.70.21.80/scripts/click.php?hid=a71b9f6504b0c5681fa5&si=Ua
+]]>
+</screen>
+</para>
+<para>
+ Despite 12 out of 32 requests being blocked, the page looked, and seemed to
+ behave perfectly <quote>normal</quote> (minus some ads, of course).
+</para>
</sect2>
</para>
<para>
- If still a problem, go to <ulink
+ If the problem went away, we know we have a configuration related problem.
+ Now go to <ulink
url="http://config.privoxy.org/show-url-info">http://config.privoxy.org/show-url-info</ulink>
- and paste the full URL of the page in question into the prompt. See which actions
- are being applied to the URL, and which matches in which actions files are
- responsible for that. Now, armed with this information, go to <ulink
+ and paste the full URL of the page in question into the prompt. See which
+ actions are being applied to the URL, and which matches in which actions
+ files are responsible for that. It might be helpful also to look at your logs
+ for this site too, to see what else might be happening. Many sites are
+ complex and require a number of related pages to help present their content.
+ Look at what else might be used by the page in question, and what of that
+ might be <emphasis>required</emphasis>.
+ Now, armed with this information, go to
+ <ulink
url="http://config.privoxy.org/show-status">http://config.privoxy.org/show-status</ulink>
- and select the appropriate actions files for editing.
-</para>
+ and select the appropriate actions files for editing. </para>
<para>
You can now either look for a section which disables the actions that
you suspect to cause the problem and add a pattern for your site there,
url="../user-manual/actions-file.html#ACT-EXAMPLES">actions tutorial</ulink>
with general configuration information and examples.
</para>
+<para>
+ As a last resort, you can always see if your browser has a setting that will
+ bypass the proxy setting for selective sites. Modern browsers can do this.
+</para>
</sect2>
<para>
This can be caused by a problem with the local <filename>HOSTS</filename>
file. If this file has been changed from the original, try reverting it to
- see if that helps. Make sure what ever name(s) are used for the local system,
+ see if that helps. Make sure whatever name(s) are used for the local system,
that they resolve both ways.
</para>
</sect2>
</title>
<para>
This may also be caused by the <quote>demoronizer</quote> filter,
- in conjunction with a web server that is misreporting a file type. Binary
+ in conjunction with a web server that is misreporting the content type. Binary
files are exempted from <application>Privoxy's</application> filtering
(unless the web server by mistake says the file is something else). Either
upgrade <application>Privoxy</application>, or go to the most recent
<para>
It's probably due to compression. It is a common practice for web servers to
send their content <quote>compressed</quote> in order to speed things up, and
- then let the browser <quote>uncompress</quote> them. &my-app; does not (yet)
- support compression. But we can force the web server to bend to our will ;-)
- So for filtering, make sure you have <ulink
- url="../user-manual/actions-file.html#PREVENT-COMPRESSION">prevent-compression</ulink>
- turned ON!
+ then let the browser <quote>uncompress</quote> them. When compiled with zlib support
+ &my-app; can decompress content before filtering, otherwise you may want to enable
+<ulink
+ url="../user-manual/actions-file.html#PREVENT-COMPRESSION">prevent-compression</ulink>.
</para>
</sect2>
51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
$Log: faq.sgml,v $
+Revision 2.27 2007/10/22 19:47:05 fabiankeil
+- Bump version and copyright.
+- Adjust Tor section to make it clear that forward exceptions
+ aren't required and may not even be desired.
+- A bunch of other minor rewordings.
+- Fix markup problems Roland noticed (hopefully without adding new ones).
+
+Revision 2.26 2007/08/05 15:37:55 fabiankeil
+- Don't claim that thousands of people read our code.
+- Specify the GPL version and link to GPLv2 instead of v3.
+- Note that configuration syntax may change between releases.
+- Mention zlib support.
+- Answer the "transparent proxy" question properly.
+- Add "intercepting proxy" entry.
+- Mention Polipo.
+- Rephrase some other sentences for various reasons.
+
+Revision 2.25 2007/07/18 11:00:34 hal9
+Add misc note about valid mark-up in Privoxy.
+
+Revision 2.24 2006/11/14 01:57:46 hal9
+Dump all docs prior to 3.0.6 release. Various minor changes to faq and user
+manual.
+
+Revision 2.23 2006/10/21 22:19:52 hal9
+Two new FAQs, a rewrite or two, and some touch ups.
+
Revision 2.22 2006/10/14 20:33:10 hal9
Three new FAQ's re: templates and blocking, and various minor touch-ups/improvements.