X-Git-Url: http://www.privoxy.org/gitweb/?p=privoxy.git;a=blobdiff_plain;f=doc%2Fsource%2Fuser-manual.sgml;h=ccf8c6230cdbf9eb833a324926d0ddc6da79ed42;hp=408a61281a326995a3692f6833dd2e2d47040a2f;hb=dc1f592446fbced35169930697f4aa2b2ba21585;hpb=0428133610c525457cb16f7ac6a54203a2743d6c diff --git a/doc/source/user-manual.sgml b/doc/source/user-manual.sgml index 408a6128..ccf8c623 100644 --- a/doc/source/user-manual.sgml +++ b/doc/source/user-manual.sgml @@ -11,7 +11,7 @@ - + @@ -34,7 +34,7 @@ This file belongs into ijbswa.sourceforge.net:/home/groups/i/ij/ijbswa/htdocs/ - $Id: user-manual.sgml,v 2.134 2011/08/18 11:45:02 fabiankeil Exp $ + $Id: user-manual.sgml,v 2.153 2012/11/09 10:49:59 fabiankeil Exp $ Copyright (C) 2001-2011 Privoxy Developers http://www.privoxy.org/ See LICENSE. @@ -60,7 +60,7 @@ -$Id: user-manual.sgml,v 2.134 2011/08/18 11:45:02 fabiankeil Exp $ +$Id: user-manual.sgml,v 2.153 2012/11/09 10:49:59 fabiankeil Exp $ Mac OS X - Unzip the downloaded file (you can either double-click on the zip file - icon from the Finder, or from the desktop if you downloaded it there). - Then, double-click on the package installer icon and follow the - installation process. + Installation instructions for the OS X platform depend upon whether + you downloaded a ready-built installation package (.pkg or .mpkg) or have + downloaded the source code. + +Installation from ready-built package - The privoxy service will automatically start after a successful - installation (in addition to every time your computer starts up). To - prevent the privoxy service from automatically starting when your - computer starts up, remove or rename the folder named - /Library/StartupItems/Privoxy. + The downloaded file will either be a .pkg (for OS X 10.5 upwards) or a bzipped + .mpkg file (for OS X 10.4). The former can be double-clicked as is and the + installation will start; double-clicking the latter will unzip the .mpkg file + which can then be double-clicked to commence the installation. + + + The privoxy service will automatically start after a successful installation + (and thereafter every time your computer starts up) however you will need to + configure your web browser(s) to use it. To do so, configure them to use a + proxy for HTTP and HTTPS at the address 127.0.0.1:8118. + + + To prevent the privoxy service from automatically starting when your computer + starts up, remove or rename the file /Library/LaunchDaemons/org.ijbswa.privoxy.plist + (on OS X 10.5 and higher) or the folder named + /Library/StartupItems/Privoxy (on OS X 10.4 'Tiger'). + + + To manually start or stop the privoxy service, use the scripts startPrivoxy.sh + and stopPrivoxy.sh supplied in /Applications/Privoxy. They must be run from an + administrator account, using sudo. + + + To uninstall, run /Applications/Privoxy/uninstall.command as sudo from an + administrator account. + + +Installation from source + + To build and install the Privoxy source code on OS X you will need to obtain + the macsetup module from the Privoxy Sourceforge CVS repository (refer to + Sourceforge help for details of how to set up a CVS client to have read-only + access to the repository). This module contains scripts that leverage the usual + open-source tools (available as part of Apple's free of charge Xcode + distribution or via the usual open-source software package managers for OS X + (MacPorts, Homebrew, Fink etc.) to build and then install the privoxy binary + and associated files. The macsetup module's README file contains complete + instructions for its use. + + + The privoxy service will automatically start after a successful installation + (and thereafter every time your computer starts up) however you will need to + configure your web browser(s) to use it. To do so, configure them to use a + proxy for HTTP and HTTPS at the address 127.0.0.1:8118. + + + To prevent the privoxy service from automatically starting when your computer + starts up, remove or rename the file /Library/LaunchDaemons/org.ijbswa.privoxy.plist + (on OS X 10.5 and higher) or the folder named + /Library/StartupItems/Privoxy (on OS X 10.4 'Tiger'). To manually start or stop the privoxy service, use the Privoxy Utility - for Mac OS X. This application controls the privoxy service (e.g. - starting and stopping the service as well as uninstalling the software). + for Mac OS X (also part of the macsetup module). This application can start + and stop the privoxy service and display its log and configuration files. + + + To uninstall, run the macsetup module's uninstall.sh as sudo from an + administrator account. @@ -437,129 +487,523 @@ How to install the binary packages depends on your operating system: What's New in this Release - Privoxy 3.0.17 is a stable release. - The changes since 3.0.16 stable are: + Privoxy 3.0.19 is a stable release. + The changes since 3.0.18 stable are: - - - Fixed last-chunk-detection for responses where the content was small - enough to be read with the body, causing Privoxy to wait for the - end of the content until the server closed the connection or the - request timed out. Reported by "Karsten" in #3028326. - - - - - Responses with status code 204 weren't properly detected as body-less - like RFC2616 mandates. Like the previous bug, this caused Privoxy to - wait for the end of the content until the server closed the connection - or the request timed out. Fixes #3022042 and #3025553, reported by a - user with no visible name. Most likely also fixes a bunch of other - AJAX-related problem reports that got closed in the past due to - insufficient information and lack of feedback. - - - - - Fixed an ACL bug that made it impossible to build a blacklist. - Usually the ACL directives are used in a whitelist, which worked - as expected, but blacklisting is still useful for public proxies - where one only needs to deny known abusers access. - - - - - Added LOG_LEVEL_RECEIVED to log the not-yet-parsed data read from the - network. This should make debugging various parsing issues a lot easier. - - - - - The IPv6 code is enabled by default on Windows versions that support it. - Patch submitted by oCameLo in #2942729. - - - - - In mingw32 versions, the user.filter file is reachable through the - GUI, just like default.filter is. Feature request 3040263. - - - - - Added the configure option --enable-large-file-support to set a few - defines that are required by platforms like GNU/Linux to support files - larger then 2GB. Mainly interesting for users without proper logfile - management. - - - + - Logging with "debug 16" no longer stops at the first nul byte which is - pretty useless. Non-printable characters are replaced with their hex value - so the result can't span multiple lines making parsing them harder then - necessary. + Bug fixes: + + + + Prevent a segmentation fault when de-chunking buffered content. + It could be triggered by malicious web servers if Privoxy was + configured to filter the content and running on a platform + where SIZE_T_MAX isn't larger than UINT_MAX, which probably + includes most 32-bit systems. On those platforms, all Privoxy + versions before 3.0.19 appear to be affected. + To be on the safe side, this bug should be presumed to allow + code execution as proving that it doesn't seems unrealistic. + + + + + Do not expect a response from the SOCKS4/4A server until it + got something to respond to. This regression was introduced + in 3.0.18 and prevented the SOCKS4/4A negotiation from working. + Reported by qqqqqw in #3459781. + + + - Privoxy logs when reading an action, filter or trust file. + General improvements: + + + + Fix an off-by-one in an error message about connect failures. + + + + + Use a GNUMakefile variable for the webserver root directory and + update the path. Sourceforge changed it which broke various + web-related targets. + + + + + Update the CODE_STATUS description. + + + + + + + + The following changes were made between 3.0.17 and 3.0.18: + + + + - Fixed incorrect regression test markup which caused a test in - 3.0.16 to fail while Privoxy itself was working correctly. - While Privoxy accepts hide-referer, too, the action name is actually - hide-referrer which is also the name used one the final results page, - where the test expected the alias. + Bug fixes: + + + + If a generated redirect URL contains characters RFC 3986 doesn't + permit, they are (re)encoded. Not doing this makes Privoxy versions + from 3.0.5 to 3.0.17 susceptible to HTTP response splitting (CWE-113) + attacks if the +fast-redirects{check-decoded-url} action is used. + + + + + Fix a logic bug that could cause Privoxy to reuse a server + socket after it got tainted by a server-header-tagger-induced + block that was triggered before the whole server response had + been read. If keep-alive was enabled and the request following + the blocked one was to the same host and using the same forwarding + settings, Privoxy would send it on the tainted server socket. + While the server would simply treat it as a pipelined request, + Privoxy would later on fail to properly parse the server's + response as it would try to parse the unread data from the + first response as server headers for the second one. + Regression introduced in 3.0.17. + + + + + When implying keep-alive in client_connection(), remember that + the client didn't. Fixes a regression introduced in 3.0.13 that + would cause Privoxy to wait for additional client requests after + receiving a HTTP/1.1 request with "Connection: close" set + and connection sharing enabled. + With clients which terminates the client connection after detecting + that the whole body has been received it doesn't really matter, + but with clients that don't the connection would be kept open until + it timed out. + + + + + Fix a subtle race condition between prepare_csp_for_next_request() + and sweep(). A thread preparing itself for the next client request + could briefly appear to be inactive. + If all other threads were already using more recent files, + the thread could get its files swept away under its feet. + So far this has only been reproduced while stress testing in + valgrind while touching action files in a loop. It's unlikely + to have caused any actual problems in the real world. + + + + + Disable filters if SDCH compression is used unless filtering is forced. + If SDCH was combined with a supported compression algorithm, Privoxy + previously could try to decompress it and ditch the Content-Encoding + header even though the SDCH compression wasn't dealt with. + Reported by zebul666 in #3225863. + + + + + Make a copy of the --user value and only mess with that when splitting + user and group. On some operating systems modifying the value directly + is reflected in the output of ps and friends and can be misleading. + Reported by zepard in #3292710. + + + + + If forwarded-connect-retries is set, only retry if Privoxy is actually + forwarding the request. Previously direct connections would be retried + as well. + + + + + Fixed a small memory leak when retrying connections with IPv6 + support enabled. + + + + + Remove an incorrect assertion in compile_dynamic_pcrs_job_list() + It could be triggered by a pcrs job with an invalid pcre + pattern (for example one that contains a lone quantifier). + + + + + If the --user argument user[.group] contains a dot, always bail out + if no group has been specified. Previously the intended, but undocumented + (and apparently untested), behaviour was to try interpreting the whole + argument as user name, but the detection was flawed and checked for '0' + instead of '\0', thus merely preventing group names beginning with a zero. + + + + + In html_code_map[], use a numeric character reference instead of ' + which wasn't standardized before XHTML 1.0. + + + + + Fix an invalid free when compiled with FEATURE_GRACEFUL_TERMINATION + and shut down through http://config.privoxy.org/die + + + + + In get_actions(), fix the "temporary" backwards compatibility hack + to accept block actions without reason. + It also covered other actions that should be rejected as invalid. + Reported by Billy Crook. + + + - CGI interface improvements: + General improvements: - In finish_http_response(), continue to add the 'Connection: close' - header if the client connection will not be kept alive. - Anonymously pointed out in #2987454. + Privoxy can (re)compress buffered content before delivering + it to the client. Disabled by default as most users wouldn't + benefit from it. + + + + + The +fast-redirects{check-decoded-url} action checks URL + segments separately. If there are other parameters behind + the redirect URL, this makes it unnecessary to cut them off + by additionally using a +redirect{} pcrs command. + Initial patch submitted by Jamie Zawinski in #3429848. + + + + + When loading action sections, verify that the referenced filters + exist. Currently missing filters only result in an error message, + but eventually the severity will be upgraded to fatal. + + + + + Allow to bind to multiple separate addresses. + Patch set submitted by Petr Pisar in #3354485. + + + + + Set socket_error to errno if connecting fails in rfc2553_connect_to(). + Previously rejected direct connections could be incorrectly reported + as DNS issues if Privoxy was compiled with IPv6 support. + + + + + Adjust url_code_map[] so spaces are replaced with %20 instead of '+' + While '+' can be used by client's submitting form data, this is not + actually what Privoxy is using the lookups for. This is more of a + cosmetic issue and doesn't fix any known problems. + + + + + When compiled without FEATURE_FAST_REDIRECTS, do not silently + ignore +fast-redirect{} directives + + + + + Added a workaround for GNU libc's strptime() reporting negative + year values when the parsed year is only specified with two digits. + On affected systems cookies with such a date would not be turned + into session cookies by the +session-cookies-only action. + Reported by Vaeinoe in #3403560 + + + + + Fixed bind failures with certain GNU libc versions if no non-loopback + IP address has been configured on the system. This is mainly an issue + if the system is using DHCP and Privoxy is started before the network + is completely configured. + Reported by Raphael Marichez in #3349356. + Additional insight from Petr Pisar. + + + + + Privoxy log messages now use the ISO 8601 date format %Y-%m-%d. + It's only slightly longer than the old format, but contains + the full date including the year and allows sorting by date + (when grepping in multiple log files) without hassle. + + + + + In get_last_url(), do not bother trying to decode URLs that do + not contain at least one '%' sign. It reduces the log noise and + a number of unnecessary memory allocations. + + + + + In case of SOCKS5 failures, dump the socks response in the log message. + + + + + Simplify the signal setup in main(). + + + + + Streamline socks5_connect() slightly. + + + + + In socks5_connect(), require a complete socks response from the server. + Previously Privoxy didn't care how much data the server response + contained as long as the first two bytes contained the expected + values. While at it, shrink the buffer size so Privoxy can't read + more than a whole socks response. + + + + + In chat(), do not bother to generate a client request in case of + direct CONNECT requests. It will not be used anyway. + + + + + Reduce server_last_modified()'s stack size. + + + + + Shorten get_http_time() by using strftime(). + + + + + Constify the known_http_methods pointers in unknown_method(). + + + + + Constify the time_formats pointers in parse_header_time(). + + + + + Constify the formerly_valid_actions pointers in action_used_to_be_valid(). + + + + + Introduce a GNUMakefile MAN_PAGE variable that defaults to privoxy.1. + The Debian package uses section 8 for the man page and this + should simplify the patch. + + + + + Deduplicate the INADDR_NONE definition for Solaris by moving it to jbsockets.h + + + + + In block_url(), ditch the obsolete workaround for ancient Netscape versions + that supposedly couldn't properly deal with status code 403. + + + + + Remove a useless NULL pointer check in load_trustfile(). + + + + + Remove two useless NULL pointer checks in load_one_re_filterfile(). + + + + + Change url_code_map[] from an array of pointers to an array of arrays + It removes an unnecessary layer of indirection and on 64bit system reduces + the size of the binary a bit. + + + + + Fix various typos. Fixes taken from Debian's 29_typos.dpatch by Roland Rosenfeld. + + + + + Add a dok-tidy GNUMakefile target to clean up the messy HTML + generated by the other dok targets. + + + + + GNUisms in the GNUMakefile have been removed. + + + + + Change the HTTP version in static responses to 1.1 + + + + + Synced config.sub and config.guess with upstream + 2011-11-11/386c7218162c145f5f9e1ff7f558a3fbb66c37c5. + + + + + Add a dedicated function to parse the values of toggles. Reduces duplicated + code in load_config() and provides better error handling. Invalid or missing + toggle values are now a fatal error instead of being silently ignored. + + + + + Terminate HTML lines in static error messages with \n instead of \r\n. + + + + + Simplify cgi_error_unknown() a bit. - Apostrophes in block messages no longer cause parse errors - when the blocked page is viewed with JavaScript enabled. - Reported by dg1727 in #3062296. + In LogPutString(), don't bother looking at pszText when not + actually logging anything. - Fix a bunch of anchors that used underscores instead of dashes. + Change ssplit()'s fourth parameter from int to size_t. + Fixes a clang complaint. - Allow to keep the client connection alive after crunching the previous request. - Already opened server connections can be kept alive, too. + Add a warning that the statistics currently can't be trusted. + Mention Privoxy-Log-Parser's --statistics option as + an alternative for the time being. - In cgi_show_url_info(), don't forget to prefix URLs that only contain - http:// or https:// in the path. Fixes #2975765 reported by Adam Piggott. + In rfc2553_connect_to(), start setting cgi->error_message on error. - Show the 404 CGI page if cgi_send_user_manual() is called while - local user manual delivery is disabled. + Change the expected status code returned for http://p.p/die depending + on whether or not FEATURE_GRACEFUL_TERMINATION is available. - + + + In cgi_die(), mark the client connection for closing. + If the client will fetch the style sheet through another connection + it gets the main thread out of the accept() state and should thus + trigger the actual shutdown. + + + + + Add a proper CGI message for cgi_die(). + + + + + Don't enforce a logical line length limit in read_config_line(). + + + + + Slightly refactor server_last_modified() to remove useless gmtime*() calls. + + + + + In get_content_type(), also recognize '.jpeg' as JPEG extension. + + + + + Add '.png' to the list of recognized file extensions in get_content_type(). + + + + + In block_url(), consistently use the block reason "Request blocked by Privoxy" + In two places the reason was "Request for blocked URL" which hides the + fact that the request got blocked by Privoxy and isn't necessarily + correct as the block may be due to tags. + + + + + In listen_loop(), reload the configuration files after accepting + a new connection instead of before. + Previously the first connection that arrived after a configuration + change would still be handled with the old configuration. + + + + + In chat()'s receive-data loop, skip a client socket check if + the socket will be written to right away anyway. This can + increase the transfer speed for unfiltered content on fast + network connections. + + + + + The socket timeout is used for SOCKS negotiations as well which + previously couldn't timeout. + + + + + Don't keep the client connection alive if any configuration file + changed since the time the connection came in. This is closer to + Privoxy's behaviour before keep-alive support for client connection + has been added and also less confusing in general. + + + + + Treat all Content-Type header values containing the pattern + 'script' as a sign of text. Reported by pribog in #3134970. + + + @@ -568,106 +1012,135 @@ How to install the binary packages depends on your operating system: - Enable user.filter by default. Suggested by David White in #3001830. + Moved the site-specific block pattern section below the one for the + generic patterns so for requests that are matched in both, the block + reason for the domain is shown which is usually more useful than showing + the one for the generic pattern. + + + + + Remove -prevent-compression from the fragile alias. It's no longer + used anywhere by default and isn't known to break stuff anyway. - Block .sitestat.com/. Reported by johnd16 in #3002725. + Add a (disabled) section to block various Facebook tracking URLs. + Reported by Dan Stahlke in #3421764. - Block .atemda.com/. Reported by johnd16 in #3002723. + Add a (disabled) section to rewrite and redirect click-tracking + URLs used on news.google.com. + Reported by Dan Stahlke in #3421755. - Block js.adlink.net/. Reported by johnd16 in #3002720. + Unblock linuxcounter.net/. + Reported by Dan Stahlke in #3422612. - Block .analytics.yahoo.com/. Reported by johnd16 in #3002713. + Block 'www91.intel.com/' which is used by Omniture. + Reported by Adam Piggott in #3167370. - Block sb.scorecardresearch.com, too. Reported by dg1727 in #2992652. + Disable the handle-as-empty-doc-returns-ok option and mark it as deprecated. + Reminded by tceverling in #2790091. - Fix problems noticed on Yahoo mail and news pages. + Add ".ivwbox.de/" to the "Cross-site user tracking" section. + Reported by Nettozahler in #3172525. - Remove the too broad yahoo section, only keeping the - fast-redirects exception as discussed on ijbswa-devel@. + Unblock and fast-redirect ".awin1.com/.*=http://". + Reported by Adam Piggott in #3170921. - Don't block adesklets.sourceforge.net. Reported in #2974204. + Block "b.collective-media.net/". - Block chartbeat ping tracking. Reported in #2975895. + Widen the Debian popcon exception to "qa.debian.org/popcon". + Seen in Debian's 05_default_action.dpatch by Roland Rosenfeld. - Tag CSS and image requests with cautious and medium settings, too. + Block ".gemius.pl/" which only seems to be used for user tracking. + Reported by johnd16 in #3002731. Additional input from Lee and movax. - Don't handle view.atdmt.com as image. It's used for click-throughs - so users should be able to "go there anyway". - Reported by Adam Piggott in #2975927. + Disable banners-by-size filters for '.thinkgeek.com/'. + The filter only seems to catch pictures of the inventory. - Also let the refresh-tags filter remove invalid refresh tags where - the 'url=' part is missing. Anonymously reported in #2986382. - While at it, update the description to mention the fact that only - refresh tags with refresh times above 9 seconds are covered. + Block requests for 'go.idmnet.bbelements.com/please/showit/'. + Reported by kacperdominik in #3372959. - javascript needs to be blocked with +handle-as-empty-document to - work around Firefox bug 492459. So move .js blockers from - +block{Might be a web-bug.} -handle-as-empty-document to - +block{Might be a web-bug.} +handle-as-empty-document. + Unblock adainitiative.org/. - ijbswa-Feature Requests-3006719 - Block 160x578 Banners. + Add a fast-redirects exception for '.googleusercontent.com/.*=cache'. - Block another omniture tracking domain. + Add a fast-redirects exception for webcache.googleusercontent.com/. - Added a range-requests tagger. + Unblock http://adassier.wordpress.com/ and http://adassier.files.wordpress.com/. + + + + + + + + Filter file improvements: + + + + Let the yahoo filter hide '.ads'. - Added two sections to get Flickr's Ajax interface working with - default pre-settings. If you change the configuration to block - cookies by default, you'll need additional exceptions. - Reported by Mathias Homann in #3101419 and by Patrick on ijbswa-users@. + Let the msn filter hide overlay ads for Facebook 'likes' in search + results and elements with the id 's_notf_div'. They only seem to be + used to advertise site 'enhancements'. + + + Let the js-events filter additionally disarm setInterval(). + Suggested by dg1727 in #3423775. + + @@ -677,275 +1150,368 @@ How to install the binary packages depends on your operating system: - Explicitly mention how to match all URLs. + Clarify the effect of compiling Privoxy with zlib support. + Suggested by dg1727 in #3423782. - Consistently recommend socks5 in the Tor FAQ entry and mention - its advantage compared to socks4a. Reported by David in #2960129. + Point out that the SourceForge messaging system works like a black + hole and should thus not be used to contact individual developers. - Slightly improve the explanation of why filtering may appear - slower than it is. + Mention some of the problems one can experience when not explicitly + configuring an IP addresses as listen address. - Grammar fixes for the ACL section. + Explicitly mention that hostnames can be used instead of IP addresses + for the listen-address, that only the first address returned will be + used and what happens if the address is invalid. + Requested by Calestyo in #3302213. + + + + + + + + Log message improvements: + + + + If only the server connection is kept alive, do not pretend to + wait for a new client request. - Fixed a link to the 'intercepting' entry and add another one. + Remove a superfluous log message in forget_connection(). - Rename the 'Other' section to 'Mailing Lists' and reword it - to make it clear that nobody is forced to use the trackers + In chat(), properly report missing server responses as such + instead of calling them empty. - Note that 'anonymously' posting on the trackers may not always - be possible. + In forwarded_connect(), fix a log message nobody should ever see. - Suggest to enable debug 32768 when suspecting parsing problems. + Fix a log message in socks5_connect(), a failed write operation + was logged as failed read operation. - - - - - - Privoxy-Log-Parser improvements: - - Gather statistics for ressources, methods, and HTTP versions - used by the client. + Let load_one_actions_file() properly complain about a missing + '{' at the beginning of the file. + Simply stating that a line is invalid isn't particularly helpful. - Also gather statistics for blocked and redirected requests. + Do not claim to listen on a socket until Privoxy actually does. + Patch submitted by Petr Pisar #3354485 - Provide the percentage of keep-alive offers the client accepted. + Prevent a duplicated LOG_LEVEL_CLF message when sending out + the "no-server-data" response. - Add a --url-statistics-threshold option. + Also log the client socket when dropping a connection. - Add a --host-statistics-threshold option to also gather - statistics about how many request where made per host. + Include the destination host in the 'Request ... marked for + blocking. limit-connect{...} doesn't allow CONNECT ...' message + Patch submitted by Saperski in #3296250. - Fix a bug in handle_loglevel_header() where a 'scan: ' got lost. + Prevent a duplicated log message if none of the resolved IP + addresses were reachable. - Add a --shorten-thread-ids option to replace the thread id with - a decimal number. + In connect_to(), do not pretend to retry if forwarded-connect-retries + is zero or unset. - Accept and ignore: Looks like we got the last chunk together - with the server headers. We better stop reading. + When a specified user or group can't be found, put the name in + single-quotes when logging it. - Accept and ignore: Continue hack in da house. + In rfc2553_connect_to(), explain getnameinfo() errors better. - Accept and higlight: Rejecting connection from 10.0.0.2. - Maximum number of connections reached. + Remove a useless log message in chat(). - Accept and highlight: Loading actions file: /usr/local/etc/privoxy/default.action + When retrying to connect, also log the maximum number of connection + attempts. - Accept and highlight: Loading filter file: /usr/local/etc/privoxy/default.filter + Rephrase a log message in compile_dynamic_pcrs_job_list(). + Divide the error code and its meaning with a colon. Call the pcrs + job dynamic and not the filter. Filters may contain dynamic and + non-dynamic pcrs jobs at the same time. Only mention the name of + the filter or tagger, but don't claim it's a filter when it could + be a tagger. - Accept and highlight: Killed all-caps Host header line: HOST: bestproxydb.com + In a fatal error message in load_one_actions_file(), cover both + URL and TAG patterns. - Accept and highlight: Reducing expected bytes to 0. Marking - the server socket tainted after throwing 4 bytes away. + In pcrs_strerror(), properly report unknown positive error code + values as such. Previously they were handled like 0 (no error). - Accept: Merged multiple header lines to: 'X-FORWARDED-PROTO: http X-HOST: 127.0.0.1' + In compile_dynamic_pcrs_job_list(), also log the actual error code as + pcrs_strerror() doesn't handle all errors reported by pcre. + + + + + Don't bother trying to continue chatting if the client didn't ask for it. + Reduces log noise a bit. + + + + + Make two fatal error message in load_one_actions_file() more descriptive. + + + + + In cgi_send_user_manual(), log when rejecting a file name due to '/' or '..'. - - - - - - Code cleanups: - - Remove the next member from the client_state struct. Only the main - thread needs access to all client states so give it its own struct. + In load_file(), log a message if opening a file failed. + The CGI error message alone isn't too helpful. - Garbage-collect request_contains_null_bytes(). + In connection_destination_matches(), improve two log messages + to help understand why the destinations don't match. - Ditch redundant code in unload_configfile(). + Rephrase a log message in serve(). Client request arrival + should be differentiated from closed client connections now. - Ditch LogGetURLUnderCursor() which doesn't seem to be used anywhere. + In serve(), log if a client connection isn't reused due to a + configuration file change. - In write_socket(), remove the write-only variable write_len in - an ifdef __OS2__ block. Spotted by cppcheck. + Let mark_server_socket_tainted() always mark the server socket tainted, + just don't talk about it in cases where it has no effect. It doesn't change + Privoxy's behaviour, but makes understanding the log file easier. + + + + + + + + configure: + + + + Added a --disable-ipv6-support switch for platforms where support + is detected but doesn't actually work. - In connect_to(), don't declare the variable 'flags' on OS/2 where - it isn't used. Spotted by cppcheck. + Do not check for the existence of strerror() and memmove() twice - Limit the scope of various variables. Spotted by cppcheck. + Remove a useless test for setpgrp(2). Privoxy doesn't need it and + it can cause problems when cross-compiling. - In add_to_iob(), turn an interestingly looking for loop into a - boring while loop. + Rename the --disable-acl-files switch to --disable-acl-support. + Since about 2001, ACL directives are specified in the standard + config file. - Code cleanup in preparation for external filters. + Update the URL of the 'Removing outdated PCRE version after the + next stable release' posting. The old URL stopped working after + one of SF's recent site "optimizations". Reported by Han Liu. + + + + + + + + Privoxy-Regression-Test: + + + + Added --shuffle-tests option to increase the chances of detection race conditions. - In listen_loop(), mention the socket on which we accepted the - connection, not just the source IP address. + Added a --local-test-file option that allows to use Privoxy-Regression-Test without Privoxy. - In write_socket(), also log the socket we're writing to. + Added tests for missing socks4 and socks4a forwarders. - In log_error(), assert that escaped characters get logged - completely or not at all. + The --privoxy-address option now works with IPv6 addresses containing brackets, too. - In log_error(), assert that ival and sval have reasonable values. - There's no reason not to abort() if they don't. + Perform limited sanity checks for parameters that are supposed to have numerical values. - Remove an incorrect cgi_error_unknown() call in a - cannot-happen-situation in send_crunch_response(). + Added a --sleep-time option to specify a number of seconds to + sleep between tests, defaults to 0. - Clean up white-space in http_response definition and - move the crunch_reason to the beginning. + Disable the range-requests tagger for tests that break if it's enabled. - Turn http_response.reason into an enum and rename it - to http_response.crunch_reason. + Log messages use the ISO 8601 date format %Y-%m-%d. - Silence a 'gcc (Debian 4.3.2-1.1) 4.3.2' warning on i686 GNU/Linux. + Fix spelling in two error messages. - Fix white-space in a log message in remove_chunked_transfer_coding(). - While at it, add a note that the message doesn't seem to - be entirely correct and should be improved later on. + In the --help output, include a list of supported tests and their default levels. + + + Adjust the tests to properly deal with FEATURE_TOGGLE being disabled. + + - GNUmakefile improvements: + Privoxy-Log-Parser: - Use $(SSH) instead of ssh, so one only needs to specify a username once. + Perform limited sanity checks for command line parameters that + are supposed to have numerical values. + + + + + Implement a --unbreak-lines-only option to try to revert MUA breakage. + + + + + Accept and highlight: Added header: Content-Encoding: deflate + + + + + Accept and highlight: Compressed content from 29258 to 8630 bytes. - Removed references to the action feedback thingy that hasn't been - working for years. + Accept and highlight: Client request arrived in time on socket 21. - Consistently use shell.sourceforge.net instead of shell.sf.net so - one doesn't need to check server fingerprints twice. + Highlight: Didn't receive data in time: a.fsdn.com:443 - Removed GNUisms in the webserver and webactions targets so they - work with standard tar. + Accept log messages with ISO 8601 time stamps, too. + + + + + + + + uagen: + + + + Bump generated Firefox version to 8.0. + + + Only randomize the release date if the new --randomize-release-date + option is enabled. Firefox versions after 4 use a fixed date string + without meaning. + + @@ -1872,6 +2438,27 @@ must find a better place for this paragraph + + + --config-test + + + Exit after loading the configuration files before binding to + the listen address. The exit code signals whether or not the + configuration files have been successfully loaded. + + + If the exit code is 1, at least one of the configuration files + is invalid, if it is 0, all the configuration files have been + successfully loaded (but may still contain errors that can + currently only be detected at run time). + + + This option doesn't affect the log setting, combination with + --no-daemon is recommended if a configured + log file shouldn't be used. + + --version @@ -3383,7 +3970,7 @@ for details. and use their output as input. - If the request URL gets changed, &my-app; will detect that and use the new + If the request URI gets changed, &my-app; will detect that and use the new one. This can be used to rewrite the request destination behind the client's back, for example to specify a Tor exit relay for certain requests. @@ -3405,7 +3992,7 @@ for details. {+client-header-filter{hide-tor-exit-notation}} / - + @@ -3499,6 +4086,22 @@ TAG:^User-Agent: fetch libfetch/ TAG:^User-Agent: Ubuntu APT-HTTP/ TAG:^User-Agent: MPlayer/ + + + +# Tag all requests with the Range header set +{+client-header-tagger{range-requests}} +/ + +# Disable filtering for the tagged requests. +# +# With filtering enabled Privoxy would remove the Range headers +# to be able to filter the whole response. The downside is that +# it prevents clients from resuming downloads or skipping over +# parts of multimedia files. +{-filter -deanimate-gifs} +TAG:^RANGE-REQUEST$ + @@ -4117,9 +4720,19 @@ new action This is a left-over from the time when Privoxy didn't support important HTTP/1.1 features well. It is left here for the - unlikely case that you experience HTTP/1.1 related problems with some server - out there. Not all HTTP/1.1 features and requirements are supported yet, - so there is a chance you might need this action. + unlikely case that you experience HTTP/1.1-related problems with some server + out there. + + + Note that enabling this action is only a workaround. It should not + be enabled for sites that work without it. While it shouldn't break + any pages, it has an (usually negative) performance impact. + + + If you come across a site where enabling this action helps, please report it, + so the cause of the problem can be analyzed. If the problem turns out to be + caused by a bug in Privoxy it should be + fixed so the following release works without the work around. @@ -4356,10 +4969,10 @@ problem-host.example.com by defining appropriate -filter exceptions. - Compressed content can't be filtered either, unless &my-app; - is compiled with zlib support (requires at least &my-app; 3.0.7), - in which case &my-app; will decompress the content before filtering - it. + Compressed content can't be filtered either, but if &my-app; + is compiled with zlib support and a supported compression algorithm + is used (gzip or deflate), &my-app; can first decompress the content + and then filter it. If you use a &my-app; version without zlib support, but want filtering to work on @@ -5463,6 +6076,94 @@ new action + + + +limit-cookie-lifetime + + + + Typical use: + + Limit the lifetime of HTTP cookies to a couple of minutes or hours. + + + + + Effect: + + + Overwrites the expires field in Set-Cookie server headers if it's above the specified limit. + + + + + + Type: + + + Parameterized. + + + + + Parameter: + + + The lifetime limit in minutes, or 0. + + + + + + Notes: + + + This action reduces the lifetime of HTTP cookies coming from the + server to the specified number of minutes, starting from the time + the cookie passes Privoxy. + + + Cookies with a lifetime below the limit are not modified. + The lifetime of session cookies is set to the specified limit. + + + The effect of this action depends on the server. + + + In case of servers which refresh their cookies with each response + (or at least frequently), the lifetime limit set by this action + is updated as well. + Thus, a session associated with the cookie continues to work with + this action enabled, as long as a new request is made before the + last limit set is reached. + + + However, some servers send their cookies once, with a lifetime of several + years (the year 2037 is a popular choice), and do not refresh them + until a certain event in the future, for example the user logging out. + In this case this action may limit the absolute lifetime of the session, + even if requests are made frequently. + + + If the parameter is 0, this action behaves like + session-cookies-only. + + + + + + Example usages: + + + +limit-cookie-lifetime{60} + + + + + + + prevent-compression @@ -5719,6 +6420,10 @@ new action either provided as parameter, or derived by applying a single pcrs command to the original URL. + + The syntax for pcrs commands is documented in the + filter file section. + This action will be ignored if you use it together with block. @@ -7339,7 +8044,7 @@ pre-defined filters for your convenience: - refresh tags + refresh-tags Disable any refresh tags if the interval is greater than nine seconds (so @@ -8914,6 +9619,72 @@ In file: user.action [ View ] [ Edit ]