<head>
<title>What's New in this Release</title>
<meta name="GENERATOR" content="Modular DocBook HTML Stylesheet Version 1.79">
- <link rel="HOME" title="Privoxy 3.0.33 User Manual" href="index.html">
+ <link rel="HOME" title="Privoxy 3.0.35 User Manual" href="index.html">
<link rel="PREVIOUS" title="Installation" href="installation.html">
<link rel="NEXT" title="Quickstart to Using Privoxy" href="quickstart.html">
<link rel="STYLESHEET" type="text/css" href="../p_doc.css">
<div class="NAVHEADER">
<table summary="Header navigation table" width="100%" border="0" cellpadding="0" cellspacing="0">
<tr>
- <th colspan="3" align="center">Privoxy 3.0.33 User Manual</th>
+ <th colspan="3" align="center">Privoxy 3.0.35 User Manual</th>
</tr>
<tr>
<td width="10%" align="left" valign="bottom"><a href="installation.html" accesskey="P">Prev</a></td>
</div>
<div class="SECT1">
<h1 class="SECT1"><a name="WHATSNEW" id="WHATSNEW">3. What's New in this Release</a></h1>
- <p><span class="APPLICATION">Privoxy 3.0.32</span> fixes multiple DoS issues and a couple of other bugs. The issues
- also affect earlier Privoxy releases.</p>
- <p>Changes in <span class="APPLICATION">Privoxy 3.0.32</span> stable:</p>
+ <p><span class="APPLICATION">Privoxy 3.0.34</span> fixes a few minor bugs and comes with a couple of general
+ improvements and new features.</p>
+ <p>Changes in <span class="APPLICATION">Privoxy 3.0.34</span> stable:</p>
<ul>
<li>
- <p>Security/Reliability:</p>
+ <p>Bug fixes:</p>
<ul>
<li>
- <p>ssplit(): Remove an assertion that could be triggered with a crafted CGI request. Commit 2256d7b4d67.
- OVE-20210203-0001. Reported by: Joshua Rogers (Opera)</p>
+ <p>Improve the handling of chunk-encoded responses by buffering the data even if filters are disabled and
+ properly keeping track of where the various chunks are supposed to start and end. Previously Privoxy would
+ merely check the last bytes received to see if they looked like the last-chunk. This failed to work if the
+ last-chunk wasn't received in one read and could also result in actual data being misdetected as
+ last-chunk. Should fix: SF support request #1739. Reported by: withoutname.</p>
</li>
<li>
- <p>cgi_send_banner(): Overrule invalid image types. Prevents a crash with a crafted CGI request if Privoxy
- is toggled off. Commit e711c505c48. OVE-20210206-0001. Reported by: Joshua Rogers (Opera)</p>
+ <p>remove_chunked_transfer_coding(): Refuse to de-chunk invalid data Previously the data could get
+ corrupted even further. Now we simply pass the unmodified data to the client.</p>
</li>
<li>
- <p>socks5_connect(): Don't try to send credentials when none are configured. Fixes a crash due to a
- NULL-pointer dereference when the socks server misbehaves. Commit 85817cc55b9. OVE-20210207-0001. Reported
- by: Joshua Rogers (Opera)</p>
+ <p>gif_deanimate(): Tolerate multiple image extensions in a row. This allows to deanimate all the gifs on:
+ https://commons.wikimedia.org/wiki/Category:Animated_smilies Fixes SF bug #795 reported by Celejar.</p>
</li>
<li>
- <p>chunked_body_is_complete(): Prevent an invalid read of size two. Commit a912ba7bc9c. OVE-20210205-0001.
- Reported by: Joshua Rogers (Opera)</p>
+ <p>OpenSSL generate_host_certificate(): Use X509_get_subject_name() instead of X509_get_issuer_name() to
+ get the issuer for generated website certificates so there are no warnings in the browser when using an
+ intermediate CA certificate instead of a self-signed root certificate. Problem reported and patch submitted
+ by Chakib Benziane.</p>
</li>
<li>
- <p>Obsolete pcre: Prevent invalid memory accesses with an invalid pattern passed to pcre_compile(). Note
- that the obsolete pcre code is scheduled to be removed before the 3.0.33 release. There has been a warning
- since 2008 already. Commit 28512e5b624. OVE-20210222-0001. Reported by: Joshua Rogers (Opera)</p>
+ <p>can_filter_request_body(): Fix a log message that contained a spurious u.</p>
</li>
- </ul>
- </li>
- <li>
- <p>Bug fixes:</p>
- <ul>
<li>
- <p>Properly parse the client-tag-lifetime directive. Previously it was not accepted as an obsolete hash
- value was being used. Reported by: Joshua Rogers (Opera)</p>
+ <p>handle_established_connection(): Check for pending TLS data from the client before checking if data is
+ available on the connection. The TLS library may have already consumed all the data from the client
+ response in which case poll() and select() will not detect that data is available to be read. Sponsored by:
+ Robert Klemme.</p>
</li>
<li>
- <p>decompress_iob(): Prevent reading of uninitialized data. Reported by: Joshua Rogers (Opera).</p>
+ <p>ssl_send_certificate_error(): Don't crash if there's no certificate information available. This is only
+ relevant when Privoxy is built with wolfSSL 5.0.0 or later (code not yet published). Earlier wolfSSL
+ versions or the other TLS backends don't seem to trigger the crash.</p>
</li>
<li>
- <p>decompress_iob(): Don't advance cur past eod when looking for the end of the file name and comment.</p>
+ <p>socks5_connect(): Add support for target hosts specified as IPv4 address Previously the IP address was
+ sent as domain.</p>
+ </li>
+ </ul>
+ </li>
+ <li>
+ <p>General improvements:</p>
+ <ul>
+ <li>
+ <p>Add a client-body-tagger action which creates tags based on the content of the request body. Sponsored
+ by: Robert Klemme.</p>
</li>
<li>
- <p>decompress_iob(): Cast value to unsigned char before shifting. Prevents a left-shift of a negative value
- which is undefined behaviour. Reported by: Joshua Rogers (Opera)</p>
+ <p>When client-body filters are enabled, buffer the whole request before opening a connection to the
+ server. Makes it less likely that the server connection times out and we don't open a connection if the
+ buffering fails anyway. Sponsored by: Robert Klemme.</p>
</li>
<li>
- <p>gif_deanimate(): Confirm that that we have enough data before doing any work. Fixes a crash when fuzzing
- with an empty document. Reported by: Joshua Rogers (Opera).</p>
+ <p>Add periods to a couple of log messages.</p>
</li>
<li>
- <p>buf_copy(): Fail if there's no data to write or nothing to do. Prevents undefined behaviour "applying
- zero offset to null pointer". Reported by: Joshua Rogers (Opera)</p>
+ <p>accept_connection(): Add missing space to a log message.</p>
</li>
<li>
- <p>log_error(): Treat LOG_LEVEL_FATAL as fatal even when --stfu is being used while fuzzing. Reported by:
- Joshua Rogers (Opera).</p>
+ <p>Initialize ca-related defaults with strdup_or_die() so errors aren't silently ignored.</p>
</li>
<li>
- <p>Respect DESTDIR when considering whether or not to install config files with ".new" extension.</p>
+ <p>make_path: Use malloc_or_die() in cases where allocation errors were already fatal anyway.</p>
</li>
<li>
- <p>OpenSSL ssl_store_cert(): Fix two error messages.</p>
+ <p>handle_established_connection(): Improve an error message slightly.</p>
</li>
<li>
- <p>Fix a couple of format specifiers.</p>
+ <p>receive_client_request(): Reject https URLs without CONNECT request.</p>
</li>
<li>
- <p>Silence compiler warnings when compiling with NDEBUG.</p>
+ <p>Include all requests in the statistics if mutexes are available. Previously in case of reused
+ connections only the last request got counted. The statistics still aren't perfect but it's an
+ improvement.</p>
</li>
<li>
- <p>fuzz_server_header(): Fix compiler warning.</p>
+ <p>Add read_socks_reply() and start using it in socks5_connect() to apply the socket timeout more
+ consistently.</p>
</li>
<li>
- <p>fuzz_client_header(): Fix compiler warning.</p>
+ <p>socks5_connect(): Deal with domain names in the socks reply</p>
</li>
<li>
- <p>cgi_send_user_manual(): Also reject requests if the user-manual directive specifies a https:// URL.
- Previously Privoxy would try and fail to open a local file.</p>
+ <p>Add a filter for bundeswehr.de that hides the cookie and privacy info banner.</p>
</li>
</ul>
</li>
<li>
- <p>General improvements:</p>
+ <p>Action file improvements:</p>
<ul>
<li>
- <p>Log the TLS version and the the cipher when debug 2 is enabled.</p>
+ <p>Disable filter{banners-by-size} for .freiheitsfoo.de/.</p>
</li>
<li>
- <p>ssl_send_certificate_error(): Respect HEAD requests by not sending a body.</p>
+ <p>Disable filter{banners-by-size} for freebsdfoundation.org/.</p>
</li>
<li>
- <p>ssl_send_certificate_error(): End the body with a single new line.</p>
+ <p>Disable fast-redirects for consent.youtube.com/.</p>
</li>
<li>
- <p>serve(): Increase the chances that the host is logged when closing a server socket.</p>
+ <p>Block requests to ups.xplosion.de/.</p>
</li>
<li>
- <p>handle_established_connection(): Add parentheses to clarify an expression Suggested by: David
- Binderman</p>
+ <p>Block requests for elsa.memoinsights.com/t.</p>
</li>
<li>
- <p>continue_https_chat(): Explicitly unset CSP_FLAG_CLIENT_CONNECTION_KEEP_ALIVE if
- process_encrypted_request() fails. This makes it more obvious that the connection will not be reused.
- Previously serve() relied on CSP_FLAG_SERVER_CONTENT_LENGTH_SET and CSP_FLAG_CHUNKED being unset. Inspired
- by a patch from Joshua Rogers (Opera).</p>
+ <p>Fix a typo in a test.</p>
</li>
<li>
- <p>decompress_iob(): Add periods to a couple of log messages</p>
+ <p>Disable fast-redirects for launchpad.net/.</p>
</li>
<li>
- <p>Terminate the body of the HTTP snipplets with a single new line instead of "\r\n".</p>
+ <p>Unblock .eff.org/.</p>
</li>
<li>
- <p>configure: Add --with-assertions option and only enable assertions when it is used</p>
+ <p>Stop unblocking .org/.*(image|banner) which appears to be too generous The example URL
+ http://www.gnu.org/graphics/gnu-head-banner.png is already unblocked due to .gnu.org being unblocked.</p>
</li>
<li>
- <p>windows build: Use --with-brotli and --with-mbedtls by default and enable dynamic error checking.</p>
+ <p>Unblock adfd.org/.</p>
</li>
<li>
- <p>gif_deanimate(): Confirm we've got an image before trying to write it Saves a pointless buf_copy()
- call.</p>
+ <p>Disable filter{banners-by-link} for .eff.org/.</p>
</li>
<li>
- <p>OpenSSL ssl_store_cert(): Remove a superfluous space before the serial number.</p>
+ <p>Block requests to odb.outbrain.com/.</p>
+ </li>
+ <li>
+ <p>Disable fast-redirects for .gandi.net/.</p>
</li>
- </ul>
- </li>
- <li>
- <p>Action file improvements:</p>
- <ul>
<li>
- <p>Disable fast-redirects for .golem.de/</p>
+ <p>Disable fast-redirects{} for .onion/.*/status/.</p>
</li>
<li>
- <p>Unblock requests to adri*.</p>
+ <p>Disable fast-redirects{} for twitter.com/.*/status/.</p>
</li>
<li>
- <p>Block requests for trc*.taboola.com/</p>
+ <p>Unblock pinkstinks.de/.</p>
</li>
<li>
- <p>Disable fast-redirects for .linkedin.com/</p>
+ <p>Disable fast-redirects for .hagalil.com/.</p>
</li>
</ul>
</li>
<li>
- <p>Filter file improvements:</p>
+ <p>Privoxy-Log-Parser:</p>
<ul>
<li>
- <p>Make the second pcrs job of the img-reorder filter greedy again. The ungreedy version broke the img tags
- on: https://bulk.fefe.de/scalability/.</p>
+ <p>Bump version to 0.9.5.</p>
+ </li>
+ <li>
+ <p>Highlight more log messages.</p>
+ </li>
+ <li>
+ <p>Highlight the Crunch reason only once. Previously the "crunch reason" could also be highlighted when the
+ URL contained a matching string. The real crunch reason only occurs once per line, so there's no need to
+ continue looking for it after it has been found once. While at it, add a comment with an example log
+ line.</p>
</li>
</ul>
</li>
<li>
- <p>Privoxy-Log-Parser:</p>
+ <p>uagen:</p>
<ul>
<li>
- <p>Highlight a few more messages.</p>
+ <p>Bump version to 1.2.4.</p>
+ </li>
+ <li>
+ <p>Update BROWSER_VERSION and BROWSER_REVISION to 102.0 to match the User-Agent of the current Firefox
+ ESR.</p>
+ </li>
+ <li>
+ <p>Explicitly document that changing the 'Gecko token' is suspicious.</p>
+ </li>
+ <li>
+ <p>Consistently use a lower-case 'c' as copyright symbol.</p>
+ </li>
+ <li>
+ <p>Bump copyright.</p>
+ </li>
+ <li>
+ <p>Add 'aarch64' as Linux architecture.</p>
</li>
<li>
- <p>Clarify the --statistics output. The shown "Reused connections" are server connections so name them
- appropriately.</p>
+ <p>Add OpenBSD architecture 'arm64'.</p>
</li>
<li>
- <p>Bump version to 0.9.3.</p>
+ <p>Stop using sparc64 as FreeBSD architecture. It hasn't been supported for a while now.</p>
</li>
</ul>
</li>
<li>
- <p>Privoxy-Regression-Test:</p>
+ <p>Build system:</p>
<ul>
<li>
- <p>Add the --check-bad-ssl option to the --help output.</p>
+ <p>Makefile: Add a 'dok' target that depends on the 'error' target to show the "You are not using GNU make
+ or did nor run configure" message.</p>
</li>
<li>
- <p>Bump version to 0.7.3.</p>
+ <p>configure: Fix --with-msan option. Also (probably) reported by Andrew Savchenko.</p>
+ </li>
+ </ul>
+ </li>
+ <li>
+ <p>macOS build system:</p>
+ <ul>
+ <li>
+ <p>Enable HTTPS inspection when building the macOS binary (using OpenSSL as TLS library).</p>
</li>
</ul>
</li>
<p>Documentation:</p>
<ul>
<li>
- <p>Add pushing the created tag to the release steps in the developer manual.</p>
+ <p>Add OpenSSL to the list of libraries that may be licensed under the Apache 2.0 license in which case the
+ linked Privoxy binary has to be distributed under the GPLv3 or later.</p>
+ </li>
+ <li>
+ <p>config: Fix the documented ca-directory default value. Reported by avoidr.</p>
+ </li>
+ <li>
+ <p>Rebuild developer-manual and tidy with 'HTML Tidy for FreeBSD version 5.8.0'.</p>
+ </li>
+ <li>
+ <p>Update developer manual with new macOS packaging instructions.</p>
</li>
<li>
- <p>Clarify that 'debug 32768' should be used in addition to the other debug directives when reporting
- problems.</p>
+ <p>Note that the FreeBSD installation instructions work for ElectroBSD as well.</p>
</li>
<li>
- <p>Add a 'Third-party licenses and copyrights' section to the user manual.</p>
+ <p>Note that FreeBSD/ElectroBSD users can try to install Privoxy as binary package using 'pkg'.</p>
</li>
</ul>
</li>