X-Git-Url: http://www.privoxy.org/gitweb/?p=privoxy.git;a=blobdiff_plain;f=doc%2Fwebserver%2Ffaq%2Fmisc.html;h=86f38229619d619235239f4b187f1d4c82bcacf8;hp=9b68069b5b4a57816720f84a6b22cfd4d81f40ab;hb=0b86cbc9dedb057f948fc30fd68d04de1b25e978;hpb=0fe95c6387d3cd7173ad01a09acd06c111b189fe diff --git a/doc/webserver/faq/misc.html b/doc/webserver/faq/misc.html index 9b68069b..86f38229 100644 --- a/doc/webserver/faq/misc.html +++ b/doc/webserver/faq/misc.html @@ -1,11 +1,11 @@ + Miscellaneous

4.11. Might some things break because header information or +content is being altered?

Definitely. More and more sites use HTTP header content to decide what to - display and how to display it. There is many ways that this can be handled, +> Definitely. It is common for sites to use browser type, browser version, + HTTP header content, and various other techniques in order to dynamically + decide what to display and how to display it. What you see, and what I see, + might be very different. There are many, many ways that this can be handled, so having hard and fast rules, is tricky.

The "USER AGENT" in particular is often used in this way to identify - the browser, and adjust content accordingly. Changing this now is not - recommended, since so many sites do look for this. You may get undesirable - results by changing this.

"User-Agent" is sometimes used in this way to identify + the browser, and adjust content accordingly.

For instance, different browsers use different encodings of Russian and Czech +> Also, different browsers use different encodings of non-English characters, certain web servers convert pages on-the-fly according to the User Agent header. Giving a "REFERER""Referer" header; they may fail or break if unavailable. The weather maps of Intellicast have been blocked by their server when no "REFERER" or cookie is provided, is another example. There are - many, many other ways things can go wrong when trying to fool a web server.

"Referer" or cookie is provided, is another example. (But you + can forge both headers without giving information away). There are + many other ways things can go wrong when trying to fool a web server. The + results of which could inadvertently cause pages to load incorrectly, + partially, or even not at all. And there may be no obvious clues as to just + what went wrong, or why. Nowhere will there be a message that says + "Turn off fast-redirects or else! + "

Similar thoughts apply to modifying JavaScript, and, to a lesser degree, + HTML elements.

If you have problems with a site, you will have to adjust your configuration accordingly. Cookies are probably the most likely adjustment that may @@ -399,11 +768,8 @@ CLASS="SECT2" >

4.9. Can Privoxy act as a 4.12. Can Privoxy act as a "caching" proxy to @@ -415,195 +781,563 @@ speed up web browsing?Squid for this. And, yes, - before you ask, or + Polipo for this. + And, yes, before you ask, Privoxy can co-exist + with other kinds of proxies like Squid. + See the forwarding + chapter in the user + manual for details.

4.13. What about as a firewall? Can Privoxy protect me?

Not in the way you mean, or in the way some firewall vendors claim they can. + Privoxy can help protect your privacy, but can't + protect your system from intrusion attempts. It is, of course, perfectly possible + to use both.

4.14. I have large empty spaces / a checkerboard pattern now where +ads used to be. Why?

It is technically possible to eliminate banners and ads in a way that frees + their allocated page space. This could easily be done by blocking with + Privoxy's filters, + and eliminating the entire image references from the + HTML page source.

But, this would consume considerably more CPU resources (IOW, slow things + down), would likely destroy the layout of some web pages which rely on the + banners utilizing a certain amount of page space, and might fail in other + cases, where the screen space is reserved (e.g. by HTML tables for instance). + Also, making ads and banners disappear without any trace complicates + troubleshooting, and would sooner or later be problematic.

The better alternative is to instead let them stay, and block the resulting + requests for the banners themselves as is now the case. This leaves either + empty space, or the familiar checkerboard pattern.

So the developers won't support this in the default configuration, but you + can of course define appropriate filters yourself to achieve this.

4.15. How can Privoxy filter Secure (HTTPS) URLs?

Since secure HTTP connections are encrypted SSL sessions between your browser + and the secure site, and are meant to be reliably secure, + there is little that Privoxy can do but hand the raw + gibberish data though from one end to the other unprocessed.

The only exception to this is blocking by host patterns, as the client needs + to tell Privoxy the name of the remote server, + so that Privoxy can establish the connection. + If that name matches a host-only pattern, the connection will be blocked.

As far as ad blocking is concerned, this is less of a restriction than it may + seem, since ad sources are often identifiable by the host name, and often + the banners to be placed in an encrypted page come unencrypted nonetheless + for efficiency reasons, which exposes them to the full power of + Privoxy's ad blocking.

"Content cookies" (those that are embedded in the actual HTML or + JS page content, see filter{content-cookies}), + in an SSL transaction will be impossible to block under these conditions. + Fortunately, this does not seem to be a very common scenario since most + cookies come by traditional means.

4.16. Privoxy runs as a "server". How +secure is it? Do I need to take any special precautions?

On Unix-like systems, Privoxy can run as a non-privileged + user, which is how we recommend it be run. Also, by default + Privoxy listens to requests from "localhost" + only.

The server aspect of Privoxy is not itself directly + exposed to the Internet in this configuration. If you want to have + Privoxy serve as a LAN proxy, this will have to + be opened up to allow for LAN requests. In this case, we'd recommend + you specify only the LAN gateway address, e.g. 192.168.1.1, in the main + Privoxy configuration file and check all access control and security + options. All LAN hosts can then use this as their proxy address + in the browser proxy configuration, but Privoxy can co-exist - with other kinds of proxies like Squid.

+ will not listen on any external interfaces. ACLs can be defined in addition, + and using a firewall is always good too. Better safe than sorry.

4.10. What about as a firewall? Can Privoxy protect me?4.17. Can I temporarily disable Privoxy?

Not in the way you mean, or in the way a true firewall can, or a proxy that - has this specific capability. Privoxy can help - protect your privacy, but not really protect you from intrusion attempts.

doesn't have a transparent proxy mode, + but you can toggle off blocking and content filtering.

The easiest way to do that is to point your browser + to the remote toggle URL: http://config.privoxy.org/toggle.

See the Bookmarklets section + of the User Manual for an easy way to access this + feature. Note that this is a feature that may need to be enabled in the main + config file.

4.11. The Privoxy logo that replaces ads is very blocky -and ugly looking. Can't a better font be used?4.18. When "disabled" is Privoxy totally +out of the picture?

This is not a font problem. The logo is an image that is created by +> No, this just means all optional filtering and actions are disabled. Privoxy on the fly. So as to not waste - memory, the image is rather small. The blockiness comes when the - image is scaled to fill a largish area. There is not much to be done - about this, other than to use one of the other - is still acting as a proxy, but just + doing less of the things that Privoxy would + normally be expected to do. It is still a "imageblock" directives: pattern, - blank, or a URL of your choosing.

Given the above problem, we have decided to remove the logo option entirely -[as of v2.9.13].

"middle-man" in + the interaction between your browser and web sites. See below to bypass + the proxy.

4.12. I have large empty spaces now where ads used to be. -Why?4.19. How can I tell Privoxy to totally ignore certain sites?

It would be easy enough to just eliminate this space altogether, rather than - fill it with blank space. But, this would create problems with many pages - that use the overall size of the ad to help organize the page layout and - position the various components of the page where they were intended to be. - It is best left this way.

Bypassing a proxy, or proxying based on arbitrary criteria, is purely a browser + configuration issue, not a Privoxy issue. Modern browsers typically do have + settings for not proxying certain sites. Check your browser's help files.

4.13. How can Privoxy filter Secure (HTTPS) URLs?4.20. My logs show Privoxy "crunches" +ads, but also its own internal CGI pages. What is a "crunch"?

This is a limitation since HTTPS transactions are encrypted SSL sessions - between your browser and the secure site, and are meant to be reliably - secure and private. This means that all cookies and HTTP - header information are also encrypted from the time they leave your browser, - to the site, and vice versa. A "crunch" simply means Privoxy does not - try to unencrypt this information, so it just passes through as is. +> intercepted something, nothing more. Often this is indeed ads or + banners, but Privoxy can still catch images and ads that - are embedded in the SSL stream though.

uses the same mechanism for + trapping requests for its own internal pages. For instance, a request for + Privoxy's configuration page at: http://config.privoxy.org, is + intercepted (i.e. it does not go out to the 'net), and the familiar CGI + configuration is returned to the browser, and the log consequently will show + a "crunch".

Since version 3.0.7, Privoxy will also log the crunch reason. + If you are using an older version you might want to upgrade.

4.14. Privoxy runs as a "server". How -secure is it? Do I need to take any special precautions?4.21. Can Privoxy effect files that I download +from a webserver? FTP server?

There are no known exploits that might effect +> From the webserver's perspective, there is no difference between + viewing a document (i.e. a page), and downloading a file. The same is true of Privoxy. On Unix-like systems, +>. If there is a match for a block pattern, + it will still be blocked, and of course this is obvious. +

Filtering is potentially more of a concern since the results are not always + so obvious, and the effects of filtering are there whether the file is simply + viewed, or downloaded. And potentially whether the content is some obnoxious + advertisement, or Mr. Jimmy's latest/greatest source code jewel. Of course, + one of these presumably is "bad" content that we don't want, and + the other is "good" content that we do want. Privoxy can run as a non-privileged - user, which is how we recommend it be run. Also, by default +> is blind to the differences, and can only + distinguish "good from bad" by the configuration parameters we give it.

Privoxy only listens to requests - from knows the differences in files according + to the "localhost". The server aspect of - "Content Type" as reported by the webserver. If this is + reported accurately (e.g. "application/zip" for a zip archive), + then Privoxy is not itself directly exposed to the - Internet in this configuration. If you want to have - knows to ignore these where + appropriate. Privoxy serve as a LAN proxy, this will have to - be opened up to allow for LAN requests. In this case, we'd recommend - you specify only the LAN gateway address, e.g. 192.168.1.1, in the main +> potentially can filter HTML + as well as plain text documents, subject to configuration parameters of + course. Also, documents that are of an unknown type (generally assumed to be + "text/plain") can be filtered, as will those that might be + incorrectly reported by the webserver. If such a file is a downloaded file + that is intended to be saved to disk, then any content that might have been + altered by filtering, will be saved too, for these (probably rare) cases.

Note that versions later than 3.0.2 do NOT filter document types reported as "text/plain". Prior to this, Privoxy config file. All LAN hosts can then use - this as their proxy address in the browser proxy configuration. In this way, +> + did filter this document type.

In short, filtering is "ON" if a) the content type as reported + by the webserver is appropriate and b) the configuration + allows it (or at least does not disallow it). That's it. There is no magic + cookie anywhere to say this is "good" and this is "bad". It's the configuration that lets it all happen or not.

If you download text files, you probably do not want these to be filtered, + particularly if the content is source code, or other critical content. Source + code sometimes might be mistaken for Javascript (i.e. the kind that might + open a pop-up window). It is recommended to turn off filtering for download + sites (particularly if the content may be plain text files and you are using + version 3.0.2 or earlier) in your user.action file. And + also, for any site or page where making any changes at + all to the content is to be avoided.

Privoxy will not listen on any external ports. - Of course, a firewall is always good too. Better safe than sorry.

does not do FTP at all, only HTTP + and HTTPS (SSL) protocols.

4.15. How can I temporarily disable Privoxy?4.22. I just downloaded a Perl script, and Privoxy +altered it! Yikes, what is wrong!

Please read above.

4.23. Should I continue to use a "HOSTS" file for ad-blocking?

The easiest way is to access One time-tested technique to defeat common ads is to trick the local DNS + system by giving a phony IP address for the ad generator in the local + HOSTS file, typically using 127.0.0.1, aka + localhost. This effectively blocks the ad.

There is no reason to use this technique in conjunction with + Privoxy. Privoxy with your - browser by using the special URL: http://p.p/ - and select "Toggle Privoxy on or off" from that page.

HOSTS file, in fact, not only + duplicates effort, but may get in the way and seriously slow down your system. + It is recommended to remove such entries from your HOSTS file. If you think + your hosts list is neglected by Privoxy's + configuration, consider adding your list to your user.action file:

  { +block }
+   www.ad.example1.com
+   ad.example2.com
+   ads.galore.example.com
+   etc.example.com

4.16. Where can I find more information about Privoxy +>4.24. Where can I find more information about Privoxy and related issues?

http://www.privoxy.org/, - The Privoxy Home page. @@ -654,10 +1385,33 @@ BORDER="0" > http://www.privoxy.org/faq/, + the Privoxy FAQ. +

+

+

http://sourceforge.net/projects/ijbswahttp://sourceforge.net/projects/ijbswa/, the Project Page for SourceforgeSourceForge.
http://p.p/, access - http://config.privoxy.org/, + the web-based user interface. Privoxy from your browser. Alternately, - must be + running for this to work. Shortcut: http://config.privoxy.orghttp://p.p/ - may work in some situations where the first does not.
http://p.p/, and select "actions file feedback system" - to submit http://sourceforge.net/tracker/?group_id=11118&atid=460288, to submit "misses" to the developers. +> and other + configuration related suggestions to the developers.
http://www.squid-cache.org/, a popular + caching proxy, which is often used together with Privoxy. +
http://www.junkbusters.com/ht/en/cookies.html +>, + an explanation how cookies are used to track web users.
http://www.waldherr.org/junkbuster/ +>http://www.junkbusters.com/ijb.html, + the original Internet Junkbuster.
http://privacy.net/analyze/ +>http://privacy.net/, a useful site + to check what information about you is leaked while you browse the web.

+

http://www.pps.jussieu.fr/~jch/software/polipo/, + Polipo is a caching proxy with advanced features + like pipelining, multiplexing and caching of partial instances. In many setups + it can be used as Squid replacement. +

+

http://tor.eff.org/, + Tor can help anonymize web browsing, + web publishing, instant messaging, IRC, SSH, and other applications. +

+

http://www.privoxy.org/developer-manual/, + the Privoxy developer manual.

4.25. I've noticed that Privoxy changes "Microsoft" to +"MicroSuck"! Why are you manipulating my browsing?

We're not. The text substitutions that you are seeing are disabled + in the default configuration as shipped. You have either manually + activated the "fun" filter which + is clearly labeled "Text replacements for subversive browsing + fun!" or you are using an older Privoxy version and have implicitly + activated it by choosing the "Advanced" profile in the + web-based editor. Please upgrade.

4.26. Does Privoxy produce "valid" HTML (or XHTML)?

Privoxy generates HTML in both its own "templates", and possibly + whenever there are text substitutions via a Privoxy filter. While this + should always conform to the HTML 4.01 specifications, it has not been + validated against this or any other standard.