X-Git-Url: http://www.privoxy.org/gitweb/?p=privoxy.git;a=blobdiff_plain;f=doc%2Fwebserver%2Fman-page%2Fprivoxy-man-page.html;h=8d118f55ac16c0bf320b494339e1395f6e1a8ec3;hp=167822ee3b492dbbb94dfd0d6f606098e0e67868;hb=6de6bda5b29cbb5a8aef6863c1b5ca999ab4887b;hpb=16e9ef297b4cf15a61876abcc794e5a058500e4b diff --git a/doc/webserver/man-page/privoxy-man-page.html b/doc/webserver/man-page/privoxy-man-page.html index 167822ee..8d118f55 100644 --- a/doc/webserver/man-page/privoxy-man-page.html +++ b/doc/webserver/man-page/privoxy-man-page.html @@ -1,343 +1,199 @@ -
+ + + ++ +Privoxy Man page + + + +NAME
+- privoxy - Privacy enhancing Proxy ++SYNOPSIS
++ privoxy [--chroot ] [--config-test ] [--help ] [--no-daemon ] + [--pidfile pidfile ] [--pre-chroot-nslookup hostname ] [--user + user[.group] ] [--version ] [configfile ] --SYNOPSIS
- privoxy [--help] [--version] [--no-daemon] [--pidfile pid - file] [--user user[.group]] [configfile] (Unix) - privoxy.exe [configfile] (Windows) ++OPTIONS
++ Privoxy may be invoked with the following command line options: + --chroot + Before changing to the user ID given in the --user option, + chroot to that user's home directory, i.e. make the kernel + pretend to the Privoxy process that the directory tree starts + there. If set up carefully, this can limit the impact of + possible vulnerabilities in Privoxy to the files contained in + that hierarchy. --OPTIONS
- Privoxy may be invoked with the following command-line - options: + --config-test + Exit after loading the configuration files before binding to the + listen address. The exit code signals whether or not the + configuration files have been successfully loaded. - --version (unix only) - Print version info and exit. + If the exit code is 1, at least one of the configuration files + is invalid, if it is 0, all the configuration files have been + successfully loaded (but may still contain errors that can + currently only be detected at run time). - --help (unix only) - Print a short usage info and exit. + This option doesn't affect the log setting, combination with + "--no-daemon" is recommended if a configured log file shouldn't + be used. - --no-daemon (unix only) - Don't become a daemon, i.e. don't fork and become - process group leader, don't detach from controlling - tty, and do all logging there. + --help Print brief usage info and exit. - --pidfile pidfile (unix only) - On startup, write the process ID to pidfile. Delete - the pidfile on exit. Failiure to create or delete - the pidfile is non-fatal. If no --pidfile option is - given, no PID file will be used. + --no-daemon + Don't become a daemon, i.e. don't fork and become process + group leader, don't detach from controlling tty, and do all + logging there. - --user user[.group] (unix only) - After (optionally) writing the PID file, assume the - user ID of user and the GID of group, or, if the - optional group was not given, the default group of - user. Exit if the privileges are not sufficient to - do so. + --pidfile pidfile + On startup, write the process ID to pidfile. Delete the pidfile + on exit. Failure to create or delete the pidfile is non-fatal. + If no --pidfile option is given, no PID file will be used. + --pre-chroot-nslookup hostname + Initialize the resolver library using hostname before + chroot'ing. On some systems this reduces the number of files + that must be copied into the chroot tree. - If the configfile is not specified on the command line, - Privoxy will look for a file named config in the current - directory (except on Win32 where it will try config.txt). + --user user[.group] + After (optionally) writing the PID file, assume the user ID of + user and the GID of group, or, if the optional group was not + given, the default group of user. Exit if the privileges are not + individual needs and tastes. It has application for both stand-alone + systems and multi-user networks. + Privoxy is Free Software and licensed under the GNU GPLv2. + Privoxy is an associated project of Software in the Public Interest + (SPI). --DESCRIPTION
- Privoxy is a web proxy with advanced filtering capabili - ties for protecting privacy, filtering web page content, - managing cookies, controlling access, and removing ads, - banners, pop-ups and other obnoxious Internet junk. - Privoxy has a very flexible configuration and can be cus - tomized to suit individual needs and tastes. Privoxy has - application for both stand-alone systems and multi-user - Junkbuster was originally written by JunkBusters Corpora - tion, and was released as free open-source software under - the GNU GPL. Stefan Waldherr made many improvements, and - started the SourceForge project to continue development. + Helping hands and donations are welcome: + ââ¬Â¢ https://www.privoxy.org/faq/general.html#PARTICIPATE + ââ¬Â¢ https://www.privoxy.org/faq/general.html#DONATE --INSTALLATION AND USE
- Browsers must be individually configured to use Privoxy as - a HTTP proxy. The default setting is for localhost, on - port 8118 (configurable in the main config file). To set - the HTTP proxy in Netscape and Mozilla, go through: Edit; - Preferences; Advanced; Proxies; Manual Proxy Configura - tion; View. - For Internet Explorer, go through: Tools; Internet Proper - ties; Connections; LAN Settings. - - The Secure (SSL) Proxy should also be set to the same val - ues, otherwise https: URLs will not be proxied. - - For other browsers, check the documentation. - - - --CONFIGURATION
- Privoxy can be configured with the various configuration - files. The default configuration files are: config, - default.action, and default.filter. These are well com - mented. On Unix and Unix-like systems, these are located - in /etc/privoxy/ by default. On Windows, OS/2 and AmigaOS, - these files are in the same directory as the Privoxy exe - cutable. - - The name and number of configuration files has changed - from previous versions, and is subject to change as devel - opment progresses. In fact, the configuration itself is - changed and much more sophisticated. See the user-manual - for a brief explanation of all configuration options. - - The actions list (ad blocks, etc) can also be configured - with your web browser at http://www.privoxy.org/config. - Privoxy's configuration parameters can also be viewed at - the same page. In addition, Privoxy can be toggled on/off. - This is an internal page. - - - --SAMPLE CONFIGURATION
- A brief example of what a default.action configuration - might look like: - - - # Define a few useful custom aliases for later use - {{alias}} - +no-cookies = +no-cookies-set +no-cookies-read - - # Do accept cookies - -no-cookies = -no-cookies-set -no-cookies-read - - # Treat these blocked URLs as images. - +imageblock = +block +image - - # Define page filters we want to use. - myfilters = +filter{html-annoyances} +filter{js-annoyances}\ - +filter{no-popups} +filter{webbugs} - - ## Default Policies (actions) ############################ - { \ - -block \ - -downgrade \ - +fast-redirects \ - myfilters \ - +no-compression \ - +hide-forwarded \ - +hide-from{block} \ - +hide-referer{forge} \ - -hide-user-agent \ - -image \ - +image-blocker{blank} \ - +no-cookies-keep \ - -no-cookies-read \ - -no-cookies-set \ - +no-popups \ - -vanilla-wafer \ - -wafer \ - } - / - - # Now set exceptions to the above defined policies ####### - - # Sites where we want persistant cookies - {-no-cookies -no-cookies-keep} - .redhat.com - .sun.com - .yahoo.com - .msdn.microsoft.com - - # This site requires cookies AND 'fast-redirects' on - {-no-cookies -no-cookies-keep -fast-redirects} - .nytimes.com - - # Add custom headers, and turn off filtering of page source - {+add-header{X-Privacy: Yes please} #-add-header{*} \ - +add-header{X-User-Tracking: No thanks!} -filter} - privacy.net - - .adforce.imgis.com - .ad.preferences.com/image.* - .ads.web.aol.com - .ad-adex3.flycast.com - .ad.doubleclick.net - .ln.doubleclick.net - .ad.de.doubleclick.net - /.*/count\.cgi\?.*df= - 194.221.183.22[1-7] - a196.g.akamai.net/7/196/2670/000[12]/images.gmx.net/i4/images/.*/ - - # Block any URLs that match these patterns - {+block} - /.*/(.*[-_.])?ads?[0-9]?(/|[-_.].*|\.(gif|jpe?g)) - /.*/(plain|live|rotate)[-_.]?ads?/ - /.*/(sponsor)s?[0-9]?/ - /.*/ad(server|stream|juggler)\.(cgi|pl|dll|exe) - /.*/adbanners/ - /.*/adv((er)?ts?|ertis(ing|ements?))?/ - /.*/banners?/ - /.*/popupads/ - /.*/advert[0-9]+\.jpg - /ad_images/ - /.*/ads/ - /images/.*/.*_anim\.gif - /rotations/ - /.*(ms)?backoff(ice)?.*\.(gif|jpe?g) - 195.63.104.*/(inbox|log|meld|folderlu|folderru|log(in|out)[lmr]u|) - .images.nytimes.com - .images.yahoo.com/adv/ - /.*cnnstore\.gif - - - - See the comments in the configuration files themselves, or - the user-manual for explanations of the above syntax, and - other Privoxy configuration options. - - - --FILES
- /usr/sbin/privoxy - /etc/privoxy/config - /etc/privoxy/default.action - /etc/privoxy/advanced.action - /etc/privoxy/basic.action - /etc/privoxy/intermediate.action - /etc/privoxy/default.filter - /etc/privoxy/trust - /etc/privoxy/templates/* - /var/log/privoxy/logfile - - - mentation should be included in the local documentation - directory, though is not complete at this time. - - - --SIGNALS
- Privoxy terminates on the SIGINT, SIGTERM and SIGABRT sig - nals. Log rotation scripts may cause a re-opening of the - logfile by sending a SIGHUP to Privoxy. Note that unlike - other daemons, Privoxy does not need to be made aware of - config file changes by SIGHUP -- it will detect them auto - matically. - - - --NOTES
- This is a BETA version of Privoxy. Not all features are - well tested. - - Please see the user-maual on how to contact the developers - for feature requests, reporting problems, and other ques - tions. - - - --BUGS
- Probably. Please see the user-manual for how and where to - report bugs. - - - --SEE ALSO
- http://www.privoxy.org/ - http://config.privoxy.org/ - http://www.privoxy.org/faq/ - http://www.privoxy.org/user-manual/ - http://www.privoxy.org/developer-manual/ - http://sourceforge.net/projects/ijbswa (Privoxy Project - Page) - http://www.waldherr.org/junkbuster/ - http://www.junkbusters.com/ht/en/cookies.html - http://privacy.net/analyze/ - http://www.squid-cache.org/ - http://linuxalpha.ch/steudten/software/ - - - --DEVELOPMENT TEAM
- Stefan Waldherr - Andreas Oesterhelt - Jon Foster - Markus Breitenbach - Thomas Steudten - David Schmidt - Haroon Rafique - Joerg Strohmayer - Shamim Mohamed - John Venvertloh - Hal Burgiss - Rodrigo Barbosa - Gábor Lipták - - - --COPYRIGHT AND LICENSE
- This program is free software; you can redistribute it - and/or modify it under the terms of the GNU General Public - License as published by the Free Software Foundation; - either version 2 of the License, or (at your option) any - later version. - - This program is distributed in the hope that it will be - useful, but WITHOUT ANY WARRANTY; without even the implied - warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR - PURPOSE. See the GNU General Public License for more - details. - - You should have received a copy of the GNU General Public - License along with this program; if not, write to the Free - Software Foundation, Inc., 59 Temple Place, Suite 330, - Boston, MA 02111-1307 USA - - Internet Junkbuster Proxy is a trademark of Junkbusters - Corporation. ++INSTALLATION AND USAGE
++ Browsers can either be individually configured to use Privoxy as a HTTP + proxy (recommended), or Privoxy can be combined with a packet filter to + build an intercepting proxy (see config). The default setting is for + localhost, on port 8118 (configurable in the main config file). To + set the HTTP proxy in Firefox, go through: Tools; Options; General; + Connection Settings; Manual Proxy Configuration. + For Internet Explorer, go through: Tools; Internet Properties; + Connections; LAN Settings. + The Secure (SSL) Proxy should also be set to the same values, otherwise + https: URLs will not be proxied. Note: Privoxy can only proxy HTTP and + HTTPS traffic. Do not try it with FTP or other protocols. HTTPS + presents some limitations, and not all features will work with HTTPS + connections. + For other browsers, check the documentation. ++CONFIGURATION
++ Privoxy can be configured with the various configuration files. The + default configuration files are: config, default.filter, default.action + and default.action. user.action should be used for locally defined + exceptions to the default rules in match-all.action and default.action, + and user.filter for locally defined filters. These are well commented. + On Unix and Unix-like systems, these are located in /etc/privoxy/ by + default. + Privoxy uses the concept of actions in order to manipulate the data + stream between the browser and remote sites. There are various actions + available with specific functions for such things as blocking web + sites, managing cookies, etc. These actions can be invoked individually + or combined, and used against individual URLs, or groups of URLs that + can be defined using wildcards and regular expressions. The result is + that the user has greatly enhanced control and freedom. + The actions list (ad blocks, etc) can also be configured with your web + browser at http://config.privoxy.org/ (assuming the configuration + /etc/privoxy/user.filter + /etc/privoxy/trust + /etc/privoxy/templates/* + /var/log/privoxy/logfile + Various other files should be included, but may vary depending on + platform and build configuration. Additional documentation should be + included in the local documentation directory. ++SIGNALS
++ Privoxy terminates on the SIGINT and SIGTERM signals. Log rotation + scripts may cause a re-opening of the logfile by sending a SIGHUP to + Privoxy. Note that unlike other daemons, Privoxy does not need to be + made aware of config file changes by SIGHUP -- it will detect them + automatically. Signals other than the ones listed above aren't + explicitly handled and result in the default action defined by the + operating system. ++NOTES
++ Please see the User Manual on how to contact the developers, for + feature requests, reporting problems, and other questions. ++SEE ALSO
++ Other references and sites of interest to Privoxy users: + https://www.privoxy.org/, the Privoxy Home page. + https://www.privoxy.org/faq/, the Privoxy FAQ. + https://www.privoxy.org/developer-manual/, the Privoxy developer + manual. + https://sourceforge.net/projects/ijbswa/, the Project Page for Privoxy + on SourceForge. + http://config.privoxy.org/, the web-based user interface. Privoxy must + be running for this to work. Shortcut: http://p.p/ + https://sourceforge.net/tracker/?group_id=11118&atid=460288, to submit + ``misses'' and other configuration related suggestions to the + developers. ++DEVELOPMENT TEAM
++ Fabian Keil, lead developer + David Schmidt + Hal Burgiss + Lee Rian + Roland Rosenfeld + Ian Silvester + Privoxy is distributed in the hope that it will be useful, but WITHOUT + ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or + FITNESS FOR A PARTICULAR PURPOSE. See the license for details. -- +Privoxy 3.0.26 29 August 2016 PRIVOXY(1) +