X-Git-Url: http://www.privoxy.org/gitweb/?p=privoxy.git;a=blobdiff_plain;f=doc%2Fsource%2Fuser-manual.sgml;h=ccf8c6230cdbf9eb833a324926d0ddc6da79ed42;hp=408a61281a326995a3692f6833dd2e2d47040a2f;hb=dc1f592446fbced35169930697f4aa2b2ba21585;hpb=0428133610c525457cb16f7ac6a54203a2743d6c
diff --git a/doc/source/user-manual.sgml b/doc/source/user-manual.sgml
index 408a6128..ccf8c623 100644
--- a/doc/source/user-manual.sgml
+++ b/doc/source/user-manual.sgml
@@ -11,7 +11,7 @@
-
+
@@ -34,7 +34,7 @@
This file belongs into
ijbswa.sourceforge.net:/home/groups/i/ij/ijbswa/htdocs/
- $Id: user-manual.sgml,v 2.134 2011/08/18 11:45:02 fabiankeil Exp $
+ $Id: user-manual.sgml,v 2.153 2012/11/09 10:49:59 fabiankeil Exp $
Copyright (C) 2001-2011 Privoxy Developers http://www.privoxy.org/
See LICENSE.
@@ -60,7 +60,7 @@
-$Id: user-manual.sgml,v 2.134 2011/08/18 11:45:02 fabiankeil Exp $
+$Id: user-manual.sgml,v 2.153 2012/11/09 10:49:59 fabiankeil Exp $Mac OS X
- Unzip the downloaded file (you can either double-click on the zip file
- icon from the Finder, or from the desktop if you downloaded it there).
- Then, double-click on the package installer icon and follow the
- installation process.
+ Installation instructions for the OS X platform depend upon whether
+ you downloaded a ready-built installation package (.pkg or .mpkg) or have
+ downloaded the source code.
+
+Installation from ready-built package
- The privoxy service will automatically start after a successful
- installation (in addition to every time your computer starts up). To
- prevent the privoxy service from automatically starting when your
- computer starts up, remove or rename the folder named
- /Library/StartupItems/Privoxy.
+ The downloaded file will either be a .pkg (for OS X 10.5 upwards) or a bzipped
+ .mpkg file (for OS X 10.4). The former can be double-clicked as is and the
+ installation will start; double-clicking the latter will unzip the .mpkg file
+ which can then be double-clicked to commence the installation.
+
+
+ The privoxy service will automatically start after a successful installation
+ (and thereafter every time your computer starts up) however you will need to
+ configure your web browser(s) to use it. To do so, configure them to use a
+ proxy for HTTP and HTTPS at the address 127.0.0.1:8118.
+
+
+ To prevent the privoxy service from automatically starting when your computer
+ starts up, remove or rename the file /Library/LaunchDaemons/org.ijbswa.privoxy.plist
+ (on OS X 10.5 and higher) or the folder named
+ /Library/StartupItems/Privoxy (on OS X 10.4 'Tiger').
+
+
+ To manually start or stop the privoxy service, use the scripts startPrivoxy.sh
+ and stopPrivoxy.sh supplied in /Applications/Privoxy. They must be run from an
+ administrator account, using sudo.
+
+
+ To uninstall, run /Applications/Privoxy/uninstall.command as sudo from an
+ administrator account.
+
+
+Installation from source
+
+ To build and install the Privoxy source code on OS X you will need to obtain
+ the macsetup module from the Privoxy Sourceforge CVS repository (refer to
+ Sourceforge help for details of how to set up a CVS client to have read-only
+ access to the repository). This module contains scripts that leverage the usual
+ open-source tools (available as part of Apple's free of charge Xcode
+ distribution or via the usual open-source software package managers for OS X
+ (MacPorts, Homebrew, Fink etc.) to build and then install the privoxy binary
+ and associated files. The macsetup module's README file contains complete
+ instructions for its use.
+
+
+ The privoxy service will automatically start after a successful installation
+ (and thereafter every time your computer starts up) however you will need to
+ configure your web browser(s) to use it. To do so, configure them to use a
+ proxy for HTTP and HTTPS at the address 127.0.0.1:8118.
+
+
+ To prevent the privoxy service from automatically starting when your computer
+ starts up, remove or rename the file /Library/LaunchDaemons/org.ijbswa.privoxy.plist
+ (on OS X 10.5 and higher) or the folder named
+ /Library/StartupItems/Privoxy (on OS X 10.4 'Tiger').
To manually start or stop the privoxy service, use the Privoxy Utility
- for Mac OS X. This application controls the privoxy service (e.g.
- starting and stopping the service as well as uninstalling the software).
+ for Mac OS X (also part of the macsetup module). This application can start
+ and stop the privoxy service and display its log and configuration files.
+
+
+ To uninstall, run the macsetup module's uninstall.sh as sudo from an
+ administrator account.
@@ -437,129 +487,523 @@ How to install the binary packages depends on your operating system:
What's New in this Release
- Privoxy 3.0.17 is a stable release.
- The changes since 3.0.16 stable are:
+ Privoxy 3.0.19 is a stable release.
+ The changes since 3.0.18 stable are:
-
-
- Fixed last-chunk-detection for responses where the content was small
- enough to be read with the body, causing Privoxy to wait for the
- end of the content until the server closed the connection or the
- request timed out. Reported by "Karsten" in #3028326.
-
-
-
-
- Responses with status code 204 weren't properly detected as body-less
- like RFC2616 mandates. Like the previous bug, this caused Privoxy to
- wait for the end of the content until the server closed the connection
- or the request timed out. Fixes #3022042 and #3025553, reported by a
- user with no visible name. Most likely also fixes a bunch of other
- AJAX-related problem reports that got closed in the past due to
- insufficient information and lack of feedback.
-
-
-
-
- Fixed an ACL bug that made it impossible to build a blacklist.
- Usually the ACL directives are used in a whitelist, which worked
- as expected, but blacklisting is still useful for public proxies
- where one only needs to deny known abusers access.
-
-
-
-
- Added LOG_LEVEL_RECEIVED to log the not-yet-parsed data read from the
- network. This should make debugging various parsing issues a lot easier.
-
-
-
-
- The IPv6 code is enabled by default on Windows versions that support it.
- Patch submitted by oCameLo in #2942729.
-
-
-
-
- In mingw32 versions, the user.filter file is reachable through the
- GUI, just like default.filter is. Feature request 3040263.
-
-
-
-
- Added the configure option --enable-large-file-support to set a few
- defines that are required by platforms like GNU/Linux to support files
- larger then 2GB. Mainly interesting for users without proper logfile
- management.
-
-
-
+
- Logging with "debug 16" no longer stops at the first nul byte which is
- pretty useless. Non-printable characters are replaced with their hex value
- so the result can't span multiple lines making parsing them harder then
- necessary.
+ Bug fixes:
+
+
+
+ Prevent a segmentation fault when de-chunking buffered content.
+ It could be triggered by malicious web servers if Privoxy was
+ configured to filter the content and running on a platform
+ where SIZE_T_MAX isn't larger than UINT_MAX, which probably
+ includes most 32-bit systems. On those platforms, all Privoxy
+ versions before 3.0.19 appear to be affected.
+ To be on the safe side, this bug should be presumed to allow
+ code execution as proving that it doesn't seems unrealistic.
+
+
+
+
+ Do not expect a response from the SOCKS4/4A server until it
+ got something to respond to. This regression was introduced
+ in 3.0.18 and prevented the SOCKS4/4A negotiation from working.
+ Reported by qqqqqw in #3459781.
+
+
+
- Privoxy logs when reading an action, filter or trust file.
+ General improvements:
+
+
+
+ Fix an off-by-one in an error message about connect failures.
+
+
+
+
+ Use a GNUMakefile variable for the webserver root directory and
+ update the path. Sourceforge changed it which broke various
+ web-related targets.
+
+
+
+
+ Update the CODE_STATUS description.
+
+
+
+
+
+
+
+ The following changes were made between 3.0.17 and 3.0.18:
+
+
+
+
- Fixed incorrect regression test markup which caused a test in
- 3.0.16 to fail while Privoxy itself was working correctly.
- While Privoxy accepts hide-referer, too, the action name is actually
- hide-referrer which is also the name used one the final results page,
- where the test expected the alias.
+ Bug fixes:
+
+
+
+ If a generated redirect URL contains characters RFC 3986 doesn't
+ permit, they are (re)encoded. Not doing this makes Privoxy versions
+ from 3.0.5 to 3.0.17 susceptible to HTTP response splitting (CWE-113)
+ attacks if the +fast-redirects{check-decoded-url} action is used.
+
+
+
+
+ Fix a logic bug that could cause Privoxy to reuse a server
+ socket after it got tainted by a server-header-tagger-induced
+ block that was triggered before the whole server response had
+ been read. If keep-alive was enabled and the request following
+ the blocked one was to the same host and using the same forwarding
+ settings, Privoxy would send it on the tainted server socket.
+ While the server would simply treat it as a pipelined request,
+ Privoxy would later on fail to properly parse the server's
+ response as it would try to parse the unread data from the
+ first response as server headers for the second one.
+ Regression introduced in 3.0.17.
+
+
+
+
+ When implying keep-alive in client_connection(), remember that
+ the client didn't. Fixes a regression introduced in 3.0.13 that
+ would cause Privoxy to wait for additional client requests after
+ receiving a HTTP/1.1 request with "Connection: close" set
+ and connection sharing enabled.
+ With clients which terminates the client connection after detecting
+ that the whole body has been received it doesn't really matter,
+ but with clients that don't the connection would be kept open until
+ it timed out.
+
+
+
+
+ Fix a subtle race condition between prepare_csp_for_next_request()
+ and sweep(). A thread preparing itself for the next client request
+ could briefly appear to be inactive.
+ If all other threads were already using more recent files,
+ the thread could get its files swept away under its feet.
+ So far this has only been reproduced while stress testing in
+ valgrind while touching action files in a loop. It's unlikely
+ to have caused any actual problems in the real world.
+
+
+
+
+ Disable filters if SDCH compression is used unless filtering is forced.
+ If SDCH was combined with a supported compression algorithm, Privoxy
+ previously could try to decompress it and ditch the Content-Encoding
+ header even though the SDCH compression wasn't dealt with.
+ Reported by zebul666 in #3225863.
+
+
+
+
+ Make a copy of the --user value and only mess with that when splitting
+ user and group. On some operating systems modifying the value directly
+ is reflected in the output of ps and friends and can be misleading.
+ Reported by zepard in #3292710.
+
+
+
+
+ If forwarded-connect-retries is set, only retry if Privoxy is actually
+ forwarding the request. Previously direct connections would be retried
+ as well.
+
+
+
+
+ Fixed a small memory leak when retrying connections with IPv6
+ support enabled.
+
+
+
+
+ Remove an incorrect assertion in compile_dynamic_pcrs_job_list()
+ It could be triggered by a pcrs job with an invalid pcre
+ pattern (for example one that contains a lone quantifier).
+
+
+
+
+ If the --user argument user[.group] contains a dot, always bail out
+ if no group has been specified. Previously the intended, but undocumented
+ (and apparently untested), behaviour was to try interpreting the whole
+ argument as user name, but the detection was flawed and checked for '0'
+ instead of '\0', thus merely preventing group names beginning with a zero.
+
+
+
+
+ In html_code_map[], use a numeric character reference instead of '
+ which wasn't standardized before XHTML 1.0.
+
+
+
+
+ Fix an invalid free when compiled with FEATURE_GRACEFUL_TERMINATION
+ and shut down through http://config.privoxy.org/die
+
+
+
+
+ In get_actions(), fix the "temporary" backwards compatibility hack
+ to accept block actions without reason.
+ It also covered other actions that should be rejected as invalid.
+ Reported by Billy Crook.
+
+
+
- CGI interface improvements:
+ General improvements:
- In finish_http_response(), continue to add the 'Connection: close'
- header if the client connection will not be kept alive.
- Anonymously pointed out in #2987454.
+ Privoxy can (re)compress buffered content before delivering
+ it to the client. Disabled by default as most users wouldn't
+ benefit from it.
+
+
+
+
+ The +fast-redirects{check-decoded-url} action checks URL
+ segments separately. If there are other parameters behind
+ the redirect URL, this makes it unnecessary to cut them off
+ by additionally using a +redirect{} pcrs command.
+ Initial patch submitted by Jamie Zawinski in #3429848.
+
+
+
+
+ When loading action sections, verify that the referenced filters
+ exist. Currently missing filters only result in an error message,
+ but eventually the severity will be upgraded to fatal.
+
+
+
+
+ Allow to bind to multiple separate addresses.
+ Patch set submitted by Petr Pisar in #3354485.
+
+
+
+
+ Set socket_error to errno if connecting fails in rfc2553_connect_to().
+ Previously rejected direct connections could be incorrectly reported
+ as DNS issues if Privoxy was compiled with IPv6 support.
+
+
+
+
+ Adjust url_code_map[] so spaces are replaced with %20 instead of '+'
+ While '+' can be used by client's submitting form data, this is not
+ actually what Privoxy is using the lookups for. This is more of a
+ cosmetic issue and doesn't fix any known problems.
+
+
+
+
+ When compiled without FEATURE_FAST_REDIRECTS, do not silently
+ ignore +fast-redirect{} directives
+
+
+
+
+ Added a workaround for GNU libc's strptime() reporting negative
+ year values when the parsed year is only specified with two digits.
+ On affected systems cookies with such a date would not be turned
+ into session cookies by the +session-cookies-only action.
+ Reported by Vaeinoe in #3403560
+
+
+
+
+ Fixed bind failures with certain GNU libc versions if no non-loopback
+ IP address has been configured on the system. This is mainly an issue
+ if the system is using DHCP and Privoxy is started before the network
+ is completely configured.
+ Reported by Raphael Marichez in #3349356.
+ Additional insight from Petr Pisar.
+
+
+
+
+ Privoxy log messages now use the ISO 8601 date format %Y-%m-%d.
+ It's only slightly longer than the old format, but contains
+ the full date including the year and allows sorting by date
+ (when grepping in multiple log files) without hassle.
+
+
+
+
+ In get_last_url(), do not bother trying to decode URLs that do
+ not contain at least one '%' sign. It reduces the log noise and
+ a number of unnecessary memory allocations.
+
+
+
+
+ In case of SOCKS5 failures, dump the socks response in the log message.
+
+
+
+
+ Simplify the signal setup in main().
+
+
+
+
+ Streamline socks5_connect() slightly.
+
+
+
+
+ In socks5_connect(), require a complete socks response from the server.
+ Previously Privoxy didn't care how much data the server response
+ contained as long as the first two bytes contained the expected
+ values. While at it, shrink the buffer size so Privoxy can't read
+ more than a whole socks response.
+
+
+
+
+ In chat(), do not bother to generate a client request in case of
+ direct CONNECT requests. It will not be used anyway.
+
+
+
+
+ Reduce server_last_modified()'s stack size.
+
+
+
+
+ Shorten get_http_time() by using strftime().
+
+
+
+
+ Constify the known_http_methods pointers in unknown_method().
+
+
+
+
+ Constify the time_formats pointers in parse_header_time().
+
+
+
+
+ Constify the formerly_valid_actions pointers in action_used_to_be_valid().
+
+
+
+
+ Introduce a GNUMakefile MAN_PAGE variable that defaults to privoxy.1.
+ The Debian package uses section 8 for the man page and this
+ should simplify the patch.
+
+
+
+
+ Deduplicate the INADDR_NONE definition for Solaris by moving it to jbsockets.h
+
+
+
+
+ In block_url(), ditch the obsolete workaround for ancient Netscape versions
+ that supposedly couldn't properly deal with status code 403.
+
+
+
+
+ Remove a useless NULL pointer check in load_trustfile().
+
+
+
+
+ Remove two useless NULL pointer checks in load_one_re_filterfile().
+
+
+
+
+ Change url_code_map[] from an array of pointers to an array of arrays
+ It removes an unnecessary layer of indirection and on 64bit system reduces
+ the size of the binary a bit.
+
+
+
+
+ Fix various typos. Fixes taken from Debian's 29_typos.dpatch by Roland Rosenfeld.
+
+
+
+
+ Add a dok-tidy GNUMakefile target to clean up the messy HTML
+ generated by the other dok targets.
+
+
+
+
+ GNUisms in the GNUMakefile have been removed.
+
+
+
+
+ Change the HTTP version in static responses to 1.1
+
+
+
+
+ Synced config.sub and config.guess with upstream
+ 2011-11-11/386c7218162c145f5f9e1ff7f558a3fbb66c37c5.
+
+
+
+
+ Add a dedicated function to parse the values of toggles. Reduces duplicated
+ code in load_config() and provides better error handling. Invalid or missing
+ toggle values are now a fatal error instead of being silently ignored.
+
+
+
+
+ Terminate HTML lines in static error messages with \n instead of \r\n.
+
+
+
+
+ Simplify cgi_error_unknown() a bit.
- Apostrophes in block messages no longer cause parse errors
- when the blocked page is viewed with JavaScript enabled.
- Reported by dg1727 in #3062296.
+ In LogPutString(), don't bother looking at pszText when not
+ actually logging anything.
- Fix a bunch of anchors that used underscores instead of dashes.
+ Change ssplit()'s fourth parameter from int to size_t.
+ Fixes a clang complaint.
- Allow to keep the client connection alive after crunching the previous request.
- Already opened server connections can be kept alive, too.
+ Add a warning that the statistics currently can't be trusted.
+ Mention Privoxy-Log-Parser's --statistics option as
+ an alternative for the time being.
- In cgi_show_url_info(), don't forget to prefix URLs that only contain
- http:// or https:// in the path. Fixes #2975765 reported by Adam Piggott.
+ In rfc2553_connect_to(), start setting cgi->error_message on error.
- Show the 404 CGI page if cgi_send_user_manual() is called while
- local user manual delivery is disabled.
+ Change the expected status code returned for http://p.p/die depending
+ on whether or not FEATURE_GRACEFUL_TERMINATION is available.
-
+
+
+ In cgi_die(), mark the client connection for closing.
+ If the client will fetch the style sheet through another connection
+ it gets the main thread out of the accept() state and should thus
+ trigger the actual shutdown.
+
+
+
+
+ Add a proper CGI message for cgi_die().
+
+
+
+
+ Don't enforce a logical line length limit in read_config_line().
+
+
+
+
+ Slightly refactor server_last_modified() to remove useless gmtime*() calls.
+
+
+
+
+ In get_content_type(), also recognize '.jpeg' as JPEG extension.
+
+
+
+
+ Add '.png' to the list of recognized file extensions in get_content_type().
+
+
+
+
+ In block_url(), consistently use the block reason "Request blocked by Privoxy"
+ In two places the reason was "Request for blocked URL" which hides the
+ fact that the request got blocked by Privoxy and isn't necessarily
+ correct as the block may be due to tags.
+
+
+
+
+ In listen_loop(), reload the configuration files after accepting
+ a new connection instead of before.
+ Previously the first connection that arrived after a configuration
+ change would still be handled with the old configuration.
+
+
+
+
+ In chat()'s receive-data loop, skip a client socket check if
+ the socket will be written to right away anyway. This can
+ increase the transfer speed for unfiltered content on fast
+ network connections.
+
+
+
+
+ The socket timeout is used for SOCKS negotiations as well which
+ previously couldn't timeout.
+
+
+
+
+ Don't keep the client connection alive if any configuration file
+ changed since the time the connection came in. This is closer to
+ Privoxy's behaviour before keep-alive support for client connection
+ has been added and also less confusing in general.
+
+
+
+
+ Treat all Content-Type header values containing the pattern
+ 'script' as a sign of text. Reported by pribog in #3134970.
+
+
+
@@ -568,106 +1012,135 @@ How to install the binary packages depends on your operating system:
- Enable user.filter by default. Suggested by David White in #3001830.
+ Moved the site-specific block pattern section below the one for the
+ generic patterns so for requests that are matched in both, the block
+ reason for the domain is shown which is usually more useful than showing
+ the one for the generic pattern.
+
+
+
+
+ Remove -prevent-compression from the fragile alias. It's no longer
+ used anywhere by default and isn't known to break stuff anyway.
- Block .sitestat.com/. Reported by johnd16 in #3002725.
+ Add a (disabled) section to block various Facebook tracking URLs.
+ Reported by Dan Stahlke in #3421764.
- Block .atemda.com/. Reported by johnd16 in #3002723.
+ Add a (disabled) section to rewrite and redirect click-tracking
+ URLs used on news.google.com.
+ Reported by Dan Stahlke in #3421755.
- Block js.adlink.net/. Reported by johnd16 in #3002720.
+ Unblock linuxcounter.net/.
+ Reported by Dan Stahlke in #3422612.
- Block .analytics.yahoo.com/. Reported by johnd16 in #3002713.
+ Block 'www91.intel.com/' which is used by Omniture.
+ Reported by Adam Piggott in #3167370.
- Block sb.scorecardresearch.com, too. Reported by dg1727 in #2992652.
+ Disable the handle-as-empty-doc-returns-ok option and mark it as deprecated.
+ Reminded by tceverling in #2790091.
- Fix problems noticed on Yahoo mail and news pages.
+ Add ".ivwbox.de/" to the "Cross-site user tracking" section.
+ Reported by Nettozahler in #3172525.
- Remove the too broad yahoo section, only keeping the
- fast-redirects exception as discussed on ijbswa-devel@.
+ Unblock and fast-redirect ".awin1.com/.*=http://".
+ Reported by Adam Piggott in #3170921.
- Don't block adesklets.sourceforge.net. Reported in #2974204.
+ Block "b.collective-media.net/".
- Block chartbeat ping tracking. Reported in #2975895.
+ Widen the Debian popcon exception to "qa.debian.org/popcon".
+ Seen in Debian's 05_default_action.dpatch by Roland Rosenfeld.
- Tag CSS and image requests with cautious and medium settings, too.
+ Block ".gemius.pl/" which only seems to be used for user tracking.
+ Reported by johnd16 in #3002731. Additional input from Lee and movax.
- Don't handle view.atdmt.com as image. It's used for click-throughs
- so users should be able to "go there anyway".
- Reported by Adam Piggott in #2975927.
+ Disable banners-by-size filters for '.thinkgeek.com/'.
+ The filter only seems to catch pictures of the inventory.
- Also let the refresh-tags filter remove invalid refresh tags where
- the 'url=' part is missing. Anonymously reported in #2986382.
- While at it, update the description to mention the fact that only
- refresh tags with refresh times above 9 seconds are covered.
+ Block requests for 'go.idmnet.bbelements.com/please/showit/'.
+ Reported by kacperdominik in #3372959.
- javascript needs to be blocked with +handle-as-empty-document to
- work around Firefox bug 492459. So move .js blockers from
- +block{Might be a web-bug.} -handle-as-empty-document to
- +block{Might be a web-bug.} +handle-as-empty-document.
+ Unblock adainitiative.org/.
- ijbswa-Feature Requests-3006719 - Block 160x578 Banners.
+ Add a fast-redirects exception for '.googleusercontent.com/.*=cache'.
- Block another omniture tracking domain.
+ Add a fast-redirects exception for webcache.googleusercontent.com/.
- Added a range-requests tagger.
+ Unblock http://adassier.wordpress.com/ and http://adassier.files.wordpress.com/.
+
+
+
+
+
+
+
+ Filter file improvements:
+
+
+
+ Let the yahoo filter hide '.ads'.
- Added two sections to get Flickr's Ajax interface working with
- default pre-settings. If you change the configuration to block
- cookies by default, you'll need additional exceptions.
- Reported by Mathias Homann in #3101419 and by Patrick on ijbswa-users@.
+ Let the msn filter hide overlay ads for Facebook 'likes' in search
+ results and elements with the id 's_notf_div'. They only seem to be
+ used to advertise site 'enhancements'.
+
+
+ Let the js-events filter additionally disarm setInterval().
+ Suggested by dg1727 in #3423775.
+
+
@@ -677,275 +1150,368 @@ How to install the binary packages depends on your operating system:
- Explicitly mention how to match all URLs.
+ Clarify the effect of compiling Privoxy with zlib support.
+ Suggested by dg1727 in #3423782.
- Consistently recommend socks5 in the Tor FAQ entry and mention
- its advantage compared to socks4a. Reported by David in #2960129.
+ Point out that the SourceForge messaging system works like a black
+ hole and should thus not be used to contact individual developers.
- Slightly improve the explanation of why filtering may appear
- slower than it is.
+ Mention some of the problems one can experience when not explicitly
+ configuring an IP addresses as listen address.
- Grammar fixes for the ACL section.
+ Explicitly mention that hostnames can be used instead of IP addresses
+ for the listen-address, that only the first address returned will be
+ used and what happens if the address is invalid.
+ Requested by Calestyo in #3302213.
+
+
+
+
+
+
+
+ Log message improvements:
+
+
+
+ If only the server connection is kept alive, do not pretend to
+ wait for a new client request.
- Fixed a link to the 'intercepting' entry and add another one.
+ Remove a superfluous log message in forget_connection().
- Rename the 'Other' section to 'Mailing Lists' and reword it
- to make it clear that nobody is forced to use the trackers
+ In chat(), properly report missing server responses as such
+ instead of calling them empty.
- Note that 'anonymously' posting on the trackers may not always
- be possible.
+ In forwarded_connect(), fix a log message nobody should ever see.
- Suggest to enable debug 32768 when suspecting parsing problems.
+ Fix a log message in socks5_connect(), a failed write operation
+ was logged as failed read operation.
-
-
-
-
-
- Privoxy-Log-Parser improvements:
-
- Gather statistics for ressources, methods, and HTTP versions
- used by the client.
+ Let load_one_actions_file() properly complain about a missing
+ '{' at the beginning of the file.
+ Simply stating that a line is invalid isn't particularly helpful.
- Also gather statistics for blocked and redirected requests.
+ Do not claim to listen on a socket until Privoxy actually does.
+ Patch submitted by Petr Pisar #3354485
- Provide the percentage of keep-alive offers the client accepted.
+ Prevent a duplicated LOG_LEVEL_CLF message when sending out
+ the "no-server-data" response.
- Add a --url-statistics-threshold option.
+ Also log the client socket when dropping a connection.
- Add a --host-statistics-threshold option to also gather
- statistics about how many request where made per host.
+ Include the destination host in the 'Request ... marked for
+ blocking. limit-connect{...} doesn't allow CONNECT ...' message
+ Patch submitted by Saperski in #3296250.
- Fix a bug in handle_loglevel_header() where a 'scan: ' got lost.
+ Prevent a duplicated log message if none of the resolved IP
+ addresses were reachable.
- Add a --shorten-thread-ids option to replace the thread id with
- a decimal number.
+ In connect_to(), do not pretend to retry if forwarded-connect-retries
+ is zero or unset.
- Accept and ignore: Looks like we got the last chunk together
- with the server headers. We better stop reading.
+ When a specified user or group can't be found, put the name in
+ single-quotes when logging it.
- Accept and ignore: Continue hack in da house.
+ In rfc2553_connect_to(), explain getnameinfo() errors better.
- Accept and higlight: Rejecting connection from 10.0.0.2.
- Maximum number of connections reached.
+ Remove a useless log message in chat().
- Accept and highlight: Loading actions file: /usr/local/etc/privoxy/default.action
+ When retrying to connect, also log the maximum number of connection
+ attempts.
- Accept and highlight: Loading filter file: /usr/local/etc/privoxy/default.filter
+ Rephrase a log message in compile_dynamic_pcrs_job_list().
+ Divide the error code and its meaning with a colon. Call the pcrs
+ job dynamic and not the filter. Filters may contain dynamic and
+ non-dynamic pcrs jobs at the same time. Only mention the name of
+ the filter or tagger, but don't claim it's a filter when it could
+ be a tagger.
- Accept and highlight: Killed all-caps Host header line: HOST: bestproxydb.com
+ In a fatal error message in load_one_actions_file(), cover both
+ URL and TAG patterns.
- Accept and highlight: Reducing expected bytes to 0. Marking
- the server socket tainted after throwing 4 bytes away.
+ In pcrs_strerror(), properly report unknown positive error code
+ values as such. Previously they were handled like 0 (no error).
- Accept: Merged multiple header lines to: 'X-FORWARDED-PROTO: http X-HOST: 127.0.0.1'
+ In compile_dynamic_pcrs_job_list(), also log the actual error code as
+ pcrs_strerror() doesn't handle all errors reported by pcre.
+
+
+
+
+ Don't bother trying to continue chatting if the client didn't ask for it.
+ Reduces log noise a bit.
+
+
+
+
+ Make two fatal error message in load_one_actions_file() more descriptive.
+
+
+
+
+ In cgi_send_user_manual(), log when rejecting a file name due to '/' or '..'.
-
-
-
-
-
- Code cleanups:
-
- Remove the next member from the client_state struct. Only the main
- thread needs access to all client states so give it its own struct.
+ In load_file(), log a message if opening a file failed.
+ The CGI error message alone isn't too helpful.
- Garbage-collect request_contains_null_bytes().
+ In connection_destination_matches(), improve two log messages
+ to help understand why the destinations don't match.
- Ditch redundant code in unload_configfile().
+ Rephrase a log message in serve(). Client request arrival
+ should be differentiated from closed client connections now.
- Ditch LogGetURLUnderCursor() which doesn't seem to be used anywhere.
+ In serve(), log if a client connection isn't reused due to a
+ configuration file change.
- In write_socket(), remove the write-only variable write_len in
- an ifdef __OS2__ block. Spotted by cppcheck.
+ Let mark_server_socket_tainted() always mark the server socket tainted,
+ just don't talk about it in cases where it has no effect. It doesn't change
+ Privoxy's behaviour, but makes understanding the log file easier.
+
+
+
+
+
+
+
+ configure:
+
+
+
+ Added a --disable-ipv6-support switch for platforms where support
+ is detected but doesn't actually work.
- In connect_to(), don't declare the variable 'flags' on OS/2 where
- it isn't used. Spotted by cppcheck.
+ Do not check for the existence of strerror() and memmove() twice
- Limit the scope of various variables. Spotted by cppcheck.
+ Remove a useless test for setpgrp(2). Privoxy doesn't need it and
+ it can cause problems when cross-compiling.
- In add_to_iob(), turn an interestingly looking for loop into a
- boring while loop.
+ Rename the --disable-acl-files switch to --disable-acl-support.
+ Since about 2001, ACL directives are specified in the standard
+ config file.
- Code cleanup in preparation for external filters.
+ Update the URL of the 'Removing outdated PCRE version after the
+ next stable release' posting. The old URL stopped working after
+ one of SF's recent site "optimizations". Reported by Han Liu.
+
+
+
+
+
+
+
+ Privoxy-Regression-Test:
+
+
+
+ Added --shuffle-tests option to increase the chances of detection race conditions.
- In listen_loop(), mention the socket on which we accepted the
- connection, not just the source IP address.
+ Added a --local-test-file option that allows to use Privoxy-Regression-Test without Privoxy.
- In write_socket(), also log the socket we're writing to.
+ Added tests for missing socks4 and socks4a forwarders.
- In log_error(), assert that escaped characters get logged
- completely or not at all.
+ The --privoxy-address option now works with IPv6 addresses containing brackets, too.
- In log_error(), assert that ival and sval have reasonable values.
- There's no reason not to abort() if they don't.
+ Perform limited sanity checks for parameters that are supposed to have numerical values.
- Remove an incorrect cgi_error_unknown() call in a
- cannot-happen-situation in send_crunch_response().
+ Added a --sleep-time option to specify a number of seconds to
+ sleep between tests, defaults to 0.
- Clean up white-space in http_response definition and
- move the crunch_reason to the beginning.
+ Disable the range-requests tagger for tests that break if it's enabled.
- Turn http_response.reason into an enum and rename it
- to http_response.crunch_reason.
+ Log messages use the ISO 8601 date format %Y-%m-%d.
- Silence a 'gcc (Debian 4.3.2-1.1) 4.3.2' warning on i686 GNU/Linux.
+ Fix spelling in two error messages.
- Fix white-space in a log message in remove_chunked_transfer_coding().
- While at it, add a note that the message doesn't seem to
- be entirely correct and should be improved later on.
+ In the --help output, include a list of supported tests and their default levels.
+
+
+ Adjust the tests to properly deal with FEATURE_TOGGLE being disabled.
+
+
- GNUmakefile improvements:
+ Privoxy-Log-Parser:
- Use $(SSH) instead of ssh, so one only needs to specify a username once.
+ Perform limited sanity checks for command line parameters that
+ are supposed to have numerical values.
+
+
+
+
+ Implement a --unbreak-lines-only option to try to revert MUA breakage.
+
+
+
+
+ Accept and highlight: Added header: Content-Encoding: deflate
+
+
+
+
+ Accept and highlight: Compressed content from 29258 to 8630 bytes.
- Removed references to the action feedback thingy that hasn't been
- working for years.
+ Accept and highlight: Client request arrived in time on socket 21.
- Consistently use shell.sourceforge.net instead of shell.sf.net so
- one doesn't need to check server fingerprints twice.
+ Highlight: Didn't receive data in time: a.fsdn.com:443
- Removed GNUisms in the webserver and webactions targets so they
- work with standard tar.
+ Accept log messages with ISO 8601 time stamps, too.
+
+
+
+
+
+
+
+ uagen:
+
+
+
+ Bump generated Firefox version to 8.0.
+
+
+ Only randomize the release date if the new --randomize-release-date
+ option is enabled. Firefox versions after 4 use a fixed date string
+ without meaning.
+
+
@@ -1872,6 +2438,27 @@ must find a better place for this paragraph
+
+
+ --config-test
+
+
+ Exit after loading the configuration files before binding to
+ the listen address. The exit code signals whether or not the
+ configuration files have been successfully loaded.
+
+
+ If the exit code is 1, at least one of the configuration files
+ is invalid, if it is 0, all the configuration files have been
+ successfully loaded (but may still contain errors that can
+ currently only be detected at run time).
+
+
+ This option doesn't affect the log setting, combination with
+ --no-daemon is recommended if a configured
+ log file shouldn't be used.
+
+ --version
@@ -3383,7 +3970,7 @@ for details.
and use their output as input.
- If the request URL gets changed, &my-app; will detect that and use the new
+ If the request URI gets changed, &my-app; will detect that and use the new
one. This can be used to rewrite the request destination behind the client's
back, for example to specify a Tor exit relay for certain requests.
@@ -3405,7 +3992,7 @@ for details.
{+client-header-filter{hide-tor-exit-notation}}
/
-
+
@@ -3499,6 +4086,22 @@ TAG:^User-Agent: fetch libfetch/
TAG:^User-Agent: Ubuntu APT-HTTP/
TAG:^User-Agent: MPlayer/
+
+
+
+# Tag all requests with the Range header set
+{+client-header-tagger{range-requests}}
+/
+
+# Disable filtering for the tagged requests.
+#
+# With filtering enabled Privoxy would remove the Range headers
+# to be able to filter the whole response. The downside is that
+# it prevents clients from resuming downloads or skipping over
+# parts of multimedia files.
+{-filter -deanimate-gifs}
+TAG:^RANGE-REQUEST$
+
@@ -4117,9 +4720,19 @@ new action
This is a left-over from the time when Privoxy
didn't support important HTTP/1.1 features well. It is left here for the
- unlikely case that you experience HTTP/1.1 related problems with some server
- out there. Not all HTTP/1.1 features and requirements are supported yet,
- so there is a chance you might need this action.
+ unlikely case that you experience HTTP/1.1-related problems with some server
+ out there.
+
+
+ Note that enabling this action is only a workaround. It should not
+ be enabled for sites that work without it. While it shouldn't break
+ any pages, it has an (usually negative) performance impact.
+
+
+ If you come across a site where enabling this action helps, please report it,
+ so the cause of the problem can be analyzed. If the problem turns out to be
+ caused by a bug in Privoxy it should be
+ fixed so the following release works without the work around.
@@ -4356,10 +4969,10 @@ problem-host.example.com
by defining appropriate -filter exceptions.
- Compressed content can't be filtered either, unless &my-app;
- is compiled with zlib support (requires at least &my-app; 3.0.7),
- in which case &my-app; will decompress the content before filtering
- it.
+ Compressed content can't be filtered either, but if &my-app;
+ is compiled with zlib support and a supported compression algorithm
+ is used (gzip or deflate), &my-app; can first decompress the content
+ and then filter it.
If you use a &my-app; version without zlib support, but want filtering to work on
@@ -5463,6 +6076,94 @@ new action
+
+
+
+limit-cookie-lifetime
+
+
+
+ Typical use:
+
+ Limit the lifetime of HTTP cookies to a couple of minutes or hours.
+
+
+
+
+ Effect:
+
+
+ Overwrites the expires field in Set-Cookie server headers if it's above the specified limit.
+
+
+
+
+
+ Type:
+
+
+ Parameterized.
+
+
+
+
+ Parameter:
+
+
+ The lifetime limit in minutes, or 0.
+
+
+
+
+
+ Notes:
+
+
+ This action reduces the lifetime of HTTP cookies coming from the
+ server to the specified number of minutes, starting from the time
+ the cookie passes Privoxy.
+
+
+ Cookies with a lifetime below the limit are not modified.
+ The lifetime of session cookies is set to the specified limit.
+
+
+ The effect of this action depends on the server.
+
+
+ In case of servers which refresh their cookies with each response
+ (or at least frequently), the lifetime limit set by this action
+ is updated as well.
+ Thus, a session associated with the cookie continues to work with
+ this action enabled, as long as a new request is made before the
+ last limit set is reached.
+
+
+ However, some servers send their cookies once, with a lifetime of several
+ years (the year 2037 is a popular choice), and do not refresh them
+ until a certain event in the future, for example the user logging out.
+ In this case this action may limit the absolute lifetime of the session,
+ even if requests are made frequently.
+
+
+ If the parameter is 0, this action behaves like
+ session-cookies-only.
+
+
+
+
+
+ Example usages:
+
+
+ +limit-cookie-lifetime{60}
+
+
+
+
+
+
+
prevent-compression
@@ -5719,6 +6420,10 @@ new action
either provided as parameter, or derived by applying a
single pcrs command to the original URL.
+
+ The syntax for pcrs commands is documented in the
+ filter file section.
+
This action will be ignored if you use it together with
block.
@@ -7339,7 +8044,7 @@ pre-defined filters for your convenience:
- refresh tags
+ refresh-tags
Disable any refresh tags if the interval is greater than nine seconds (so
@@ -8914,6 +9619,72 @@ In file: user.action [ View ][ Edit ]