X-Git-Url: http://www.privoxy.org/gitweb/?p=privoxy.git;a=blobdiff_plain;f=doc%2Fsource%2Fprivoxy-man-page.sgml;h=f594a6407a5fcfdd2dd29cebe2b48a90d7943608;hp=22e426c3b76b0dc60de3fa9d92e42f5b8dbc1cb4;hb=b1ea6b63055bdeb924fcd3ec38ee20472bd55736;hpb=4ca1b3964ffd8d2ac27cf2a9f4de9bb7ac67259e diff --git a/doc/source/privoxy-man-page.sgml b/doc/source/privoxy-man-page.sgml index 22e426c3..f594a640 100644 --- a/doc/source/privoxy-man-page.sgml +++ b/doc/source/privoxy-man-page.sgml @@ -1,13 +1,9 @@ - + ]> - 2009-02-15 + 2012-11-08 privoxy - 1 + 8 Privoxy &p-version; @@ -72,13 +68,14 @@ privoxy + + - pidfile - user[.group] - hostname + user[.group] + configfile @@ -93,20 +90,48 @@ + - --help + --chroot + + + Before changing to the user ID given in the --user option, chroot to + that user's home directory, i.e. make the kernel pretend to the + Privoxy process that the directory tree starts + there. If set up carefully, this can limit the impact of possible + vulnerabilities in Privoxy to the files contained in + that hierarchy. + + + + + + --config-test - Print brief usage info and exit. + Exit after loading the configuration files before binding to + the listen address. The exit code signals whether or not the + configuration files have been successfully loaded. + + + If the exit code is 1, at least one of the configuration files + is invalid, if it is 0, all the configuration files have been + successfully loaded (but may still contain errors that can + currently only be detected at run time). + + This option doesn't affect the log setting, combination with + "--no-daemon" is recommended if a configured log file shouldn't + be used. + - --version + --help - Print version info and exit. + Print brief usage info and exit. @@ -133,6 +158,17 @@ + + --pre-chroot-nslookup hostname + + + Initialize the resolver library using hostname + before chroot'ing. On some systems this reduces the number of files + that must be copied into the chroot tree. + + + + --user user[.group] @@ -148,29 +184,16 @@ + - --chroot - - - Before changing to the user ID given in the --user option, chroot to - that user's home directory, i.e. make the kernel pretend to the - Privoxy process that the directory tree starts - there. If set up carefully, this can limit the impact of possible - vulnerabilities in Privoxy to the files contained in - that hierarchy. - - - - - --pre-chroot-nslookup hostname - - - Initialize the resolver library using hostname - before chroot'ing. On some systems this reduces the number of files - that must be copied into the chroot tree. - - + --version + + + Print version info and exit. + + + @@ -257,7 +280,7 @@ See the User Manual for a detailed + url="https://www.privoxy.org/user-manual/">User Manual for a detailed explanation of installation, general usage, all configuration options, new features and notes on upgrading. @@ -294,13 +317,14 @@ Signals - Privoxy terminates on the SIGINT, - SIGTERM and SIGABRT signals. Log + Privoxy terminates on the SIGINT + and SIGTERM signals. Log rotation scripts may cause a re-opening of the logfile by sending a SIGHUP to Privoxy. Note that unlike other daemons, Privoxy does not need to be made aware of config file changes by SIGHUP -- it will detect them - automatically. + automatically. Signals other than the ones listed above aren't explicitly + handled and result in the default action defined by the operating system.