X-Git-Url: http://www.privoxy.org/gitweb/?p=privoxy.git;a=blobdiff_plain;f=doc%2Fwebserver%2Fman-page%2Fprivoxy-man-page.html;h=c496831a84cd50f990ff854bfed4e5ed79b7c026;hp=167822ee3b492dbbb94dfd0d6f606098e0e67868;hb=cbd8da07adad27663478d7f66615cb3b89727a22;hpb=16e9ef297b4cf15a61876abcc794e5a058500e4b diff --git a/doc/webserver/man-page/privoxy-man-page.html b/doc/webserver/man-page/privoxy-man-page.html index 167822ee..c496831a 100644 --- a/doc/webserver/man-page/privoxy-man-page.html +++ b/doc/webserver/man-page/privoxy-man-page.html @@ -1,343 +1,212 @@ -Privoxy Man page

NAME

-
-
-       privoxy - Privacy enhancing Proxy
-
-
-
-

SYNOPSIS

-       privoxy [--help] [--version] [--no-daemon] [--pidfile pid­
-       file] [--user user[.group]] [configfile] (Unix)
-
-       privoxy.exe [configfile] (Windows)
-
-
-
-
-

OPTIONS

-       Privoxy may be invoked  with  the  following  command-line
-       options:
-
-       --version (unix only)
-              Print version info and exit.
-
-       --help (unix only)
-              Print a short usage info and exit.
-
-       --no-daemon (unix only)
-              Don't  become  a daemon, i.e. don't fork and become
-              process group leader, don't detach from controlling
-              tty, and do all logging there.
-
-        --pidfile pidfile (unix only)
-              On startup, write the process ID to pidfile. Delete
-              the pidfile on exit. Failiure to create  or  delete
-              the pidfile is non-fatal. If no --pidfile option is
-              given, no PID file will be used.
-
-        --user user[.group] (unix only)
-              After (optionally) writing the PID file, assume the
-              user  ID  of  user and the GID of group, or, if the
-              optional group was not given, the default group  of
-              user.  Exit if the privileges are not sufficient to
-              do so.
-
-
-       If the configfile is not specified on  the  command  line,
-       Privoxy  will  look for a file named config in the current
-       directory (except on Win32 where it will try  config.txt).
-
-
-
-
-
-

DESCRIPTION

-       Privoxy  is  a web proxy with advanced filtering capabili­
-       ties for protecting privacy, filtering web  page  content,
-       managing  cookies,  controlling  access, and removing ads,
-       banners,  pop-ups  and  other  obnoxious  Internet   junk.
-       Privoxy  has a very flexible configuration and can be cus­
-       tomized to suit individual needs and tastes.  Privoxy  has
-       application  for  both  stand-alone systems and multi-user
-       Junkbuster  was originally written by JunkBusters Corpora­
-       tion, and was released as free open-source software  under
-       the  GNU  GPL. Stefan Waldherr made many improvements, and
-       started the SourceForge project to continue development.
-
-
-
-
-

INSTALLATION AND USE

-       Browsers must be individually configured to use Privoxy as
-       a  HTTP  proxy.   The default setting is for localhost, on
-       port 8118 (configurable in the main config file).  To  set
-       the  HTTP proxy in Netscape and Mozilla, go through: Edit;
-       Preferences; Advanced; Proxies;  Manual  Proxy  Configura­
-       tion; View.
-
-       For Internet Explorer, go through: Tools; Internet Proper­
-       ties; Connections; LAN Settings.
-
-       The Secure (SSL) Proxy should also be set to the same val­
-       ues, otherwise https: URLs will not be proxied.
-
-       For other browsers, check the documentation.
-
-
-
-
-

CONFIGURATION

-       Privoxy  can  be configured with the various configuration
-       files.  The  default  configuration  files  are:   config,
-       default.action,  and  default.filter.  These are well com­
-       mented.  On Unix and Unix-like systems, these are  located
-       in /etc/privoxy/ by default. On Windows, OS/2 and AmigaOS,
-       these files are in the same directory as the Privoxy  exe­
-       cutable.
-
-       The  name  and  number  of configuration files has changed
-       from previous versions, and is subject to change as devel­
-       opment  progresses.  In  fact, the configuration itself is
-       changed and much more sophisticated. See  the  user-manual
-       for a brief explanation of all configuration options.
-
-       The  actions  list (ad blocks, etc) can also be configured
-       with your web  browser  at  http://www.privoxy.org/config.
-       Privoxy's  configuration  parameters can also be viewed at
-       the same page. In addition, Privoxy can be toggled on/off.
-       This is an internal page.
-
-
-
-
-

SAMPLE CONFIGURATION

-       A  brief  example  of  what a default.action configuration
-       might look like:
-
-
-       # Define a few useful custom aliases for later use
-       {{alias}}
-       +no-cookies = +no-cookies-set +no-cookies-read
-
-       # Do accept cookies
-       -no-cookies = -no-cookies-set -no-cookies-read
-
-       # Treat these blocked URLs as images.
-       +imageblock = +block +image
-
-       # Define page filters we want to use.
-       myfilters = +filter{html-annoyances} +filter{js-annoyances}\
-                   +filter{no-popups} +filter{webbugs}
-
-       ## Default Policies (actions) ############################
-       { \
-        -block \
-        -downgrade \
-        +fast-redirects \
-        myfilters \
-        +no-compression \
-        +hide-forwarded \
-        +hide-from{block} \
-        +hide-referer{forge} \
-        -hide-user-agent \
-        -image \
-        +image-blocker{blank} \
-        +no-cookies-keep \
-        -no-cookies-read \
-        -no-cookies-set \
-        +no-popups \
-        -vanilla-wafer \
-        -wafer \
-       }
-       /
-
-       # Now set exceptions to the above defined policies #######
-
-       # Sites where we want persistant cookies
-       {-no-cookies -no-cookies-keep}
-        .redhat.com
-        .sun.com
-        .yahoo.com
-        .msdn.microsoft.com
-
-       # This site requires cookies AND 'fast-redirects' on
-       {-no-cookies -no-cookies-keep -fast-redirects}
-        .nytimes.com
-
-       # Add custom headers, and turn off filtering of page source
-       {+add-header{X-Privacy: Yes please} #-add-header{*} \
-        +add-header{X-User-Tracking: No thanks!} -filter}
-        privacy.net
-
-        .adforce.imgis.com
-        .ad.preferences.com/image.*
-        .ads.web.aol.com
-        .ad-adex3.flycast.com
-        .ad.doubleclick.net
-        .ln.doubleclick.net
-        .ad.de.doubleclick.net
-        /.*/count\.cgi\?.*df=
-        194.221.183.22[1-7]
-        a196.g.akamai.net/7/196/2670/000[12]/images.gmx.net/i4/images/.*/
-
-       # Block any URLs that match these patterns
-       {+block}
-        /.*/(.*[-_.])?ads?[0-9]?(/|[-_.].*|\.(gif|jpe?g))
-        /.*/(plain|live|rotate)[-_.]?ads?/
-        /.*/(sponsor)s?[0-9]?/
-        /.*/ad(server|stream|juggler)\.(cgi|pl|dll|exe)
-        /.*/adbanners/
-        /.*/adv((er)?ts?|ertis(ing|ements?))?/
-        /.*/banners?/
-        /.*/popupads/
-        /.*/advert[0-9]+\.jpg
-        /ad_images/
-        /.*/ads/
-        /images/.*/.*_anim\.gif
-        /rotations/
-        /.*(ms)?backoff(ice)?.*\.(gif|jpe?g)
-        195.63.104.*/(inbox|log|meld|folderlu|folderru|log(in|out)[lmr]u|)
-        .images.nytimes.com
-        .images.yahoo.com/adv/
-        /.*cnnstore\.gif
-
-
-
-       See the comments in the configuration files themselves, or
-       the  user-manual for explanations of the above syntax, and
-       other Privoxy configuration options.
-
-
-
-
-

FILES

-       /usr/sbin/privoxy
-       /etc/privoxy/config
-       /etc/privoxy/default.action
-       /etc/privoxy/advanced.action
-       /etc/privoxy/basic.action
-       /etc/privoxy/intermediate.action
-       /etc/privoxy/default.filter
-       /etc/privoxy/trust
-       /etc/privoxy/templates/*
-       /var/log/privoxy/logfile
-
-
-       mentation should be included in  the  local  documentation
-       directory, though is not complete at this time.
-
-
-
-
-

SIGNALS

-       Privoxy terminates on the SIGINT, SIGTERM and SIGABRT sig­
-       nals. Log rotation scripts may cause a re-opening  of  the
-       logfile  by  sending a SIGHUP to Privoxy. Note that unlike
-       other daemons, Privoxy does not need to be made  aware  of
-       config file changes by SIGHUP -- it will detect them auto­
-       matically.
-
-
-
-
-

NOTES

-       This is a BETA version of Privoxy. Not  all  features  are
-       well tested.
-
-       Please see the user-maual on how to contact the developers
-       for feature requests, reporting problems, and other  ques­
-       tions.
-
-
-
-
-

BUGS

-       Probably.  Please see the user-manual for how and where to
-       report bugs.
-
-
-
-
-

SEE ALSO

-       http://www.privoxy.org/
-       http://config.privoxy.org/
-       http://www.privoxy.org/faq/
-       http://www.privoxy.org/user-manual/
-       http://www.privoxy.org/developer-manual/
-       http://sourceforge.net/projects/ijbswa  (Privoxy   Project
-       Page)
-       http://www.waldherr.org/junkbuster/
-       http://www.junkbusters.com/ht/en/cookies.html
-       http://privacy.net/analyze/
-       http://www.squid-cache.org/
-       http://linuxalpha.ch/steudten/software/
-
-
-
-
-

DEVELOPMENT TEAM

-        Stefan Waldherr
-        Andreas Oesterhelt
-        Jon Foster
-        Markus Breitenbach
-        Thomas Steudten
-        David Schmidt
-        Haroon Rafique
-        Joerg Strohmayer
-        Shamim Mohamed
-        John Venvertloh
-        Hal Burgiss
-        Rodrigo Barbosa
-        Gábor Lipták
-
-
-
-
-

COPYRIGHT AND LICENSE

-       This  program  is  free  software; you can redistribute it
-       and/or modify it under the terms of the GNU General Public
-       License  as  published  by  the  Free Software Foundation;
-       either version 2 of the License, or (at your  option)  any
-       later version.
-
-       This  program  is  distributed in the hope that it will be
-       useful, but WITHOUT ANY WARRANTY; without even the implied
-       warranty  of  MERCHANTABILITY  or FITNESS FOR A PARTICULAR
-       PURPOSE.  See the GNU  General  Public  License  for  more
-       details.
-
-       You  should have received a copy of the GNU General Public
-       License along with this program; if not, write to the Free
-       Software  Foundation,  Inc.,  59  Temple Place, Suite 330,
-       Boston, MA  02111-1307  USA
-
-       Internet Junkbuster Proxy is a  trademark  of  Junkbusters
-       Corporation.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- + + + + + + + + + + PRIVOXY + + + +

PRIVOXY

NAME
+ SYNOPSIS
+ OPTIONS
+ DESCRIPTION
+ INSTALLATION AND USAGE
+ CONFIGURATION
+ FILES
+ SIGNALS
+ NOTES
+ SEE ALSO
+ DEVELOPMENT TEAM
+ COPYRIGHT AND LICENSE
+
+ +

NAME

+

privoxy − Privacy Enhancing Proxy

+

SYNOPSIS

+

privoxy [−−chroot ] + [−−config-test ] [−−help ] [−−no-daemon ] + [−−pidfile pidfile ] [−−pre-chroot-nslookup hostname ] + [−−user user[.group] ] [−−version ] [configfile ]

+

OPTIONS

+

Privoxy may be invoked with the following command line options: +
+ −−chroot

+

Before changing to the user ID given in the −−user option, chroot to that + user’s home directory, i.e. make the kernel pretend to the Privoxy process that the directory tree + starts there. If set up carefully, this can limit the impact of possible vulnerabilities in Privoxy to the + files contained in that hierarchy.

+

−−config-test

+

Exit after loading the configuration files before binding to the listen address. The exit + code signals whether or not the configuration files have been successfully loaded.

+

If the exit code is 1, at least one of the configuration files is + invalid, if it is 0, all the configuration files have been successfully loaded (but may still contain errors that can + currently only be detected at run time).

+

This option doesn’t affect the log setting, combination with + "--no-daemon" is recommended if a configured log file shouldn’t be used.

+ + + + + + + + +
+

−−help

+
+

Print brief usage info and exit.

+
+

−−no-daemon

+

Don’t become a daemon, i.e. don’t fork and become process group leader, + don’t detach from controlling tty, and do all logging there.

+

−−pidfile pidfile

+

On startup, write the process ID to pidfile. Delete the pidfile on exit. + Failure to create or delete the pidfile is non-fatal. If no −−pidfile option is given, no + PID file will be used.

+

−−pre-chroot-nslookup hostname

+

Initialize the resolver library using hostname before chroot’ing. On some + systems this reduces the number of files that must be copied into the chroot tree.

+

−−user user[.group]

+

After (optionally) writing the PID file, assume the user ID of user and the GID of + group, or, if the optional group was not given, the default group of user. Exit if the + privileges are not sufficient to do so.

+

−−version

+

Print version info and exit.

+

If the configfile is not specified on the command line, + Privoxy will look for a file named config in the current directory. If no configfile is found, + Privoxy will fail to start.

+

DESCRIPTION

+

Privoxy is a non-caching web proxy with advanced filtering capabilities + for enhancing privacy, modifying web page data and HTTP headers, controlling access, and removing ads and other + obnoxious Internet junk. Privoxy has a flexible configuration and can be customized to suit individual needs and + tastes. It has application for both stand-alone systems and multi-user networks.

+

Privoxy is Free Software and licensed under the GNU GPLv2 or later.

+

Privoxy is an associated project of Software in the Public Interest + (SPI).

+

Helping hands and donations are welcome:

+ + + + + + + + + + + + + + + +
+

+
+

https://www.privoxy.org/faq/general.html#PARTICIPATE

+
+

+
+

https://www.privoxy.org/faq/general.html#DONATE

+
+

INSTALLATION AND USAGE

+

Browsers can either be individually configured to use Privoxy as a + HTTP proxy (recommended), or Privoxy can be combined with a packet filter to build an intercepting proxy (see + config). The default setting is for localhost, on port 8118 (configurable in the main config file). To set the + HTTP proxy in Firefox, go through: Tools; Options; General; Connection Settings; + Manual Proxy Configuration.

+

For Internet Explorer, go through: Tools; Internet + Properties; Connections; LAN Settings.

+

The Secure (SSL) Proxy should also be set to the same values, otherwise + https: URLs will not be proxied. Note: Privoxy can only proxy HTTP and HTTPS traffic. Do not try it with FTP + or other protocols. HTTPS presents some limitations, and not all features will work with HTTPS connections.

+

For other browsers, check the documentation.

+

CONFIGURATION

+

Privoxy can be configured with the various configuration files. + The default configuration files are: config, default.filter, default.action and + default.action. user.action should be used for locally defined exceptions to the default rules in + match-all.action and default.action, and user.filter for locally defined filters. These are well + commented. On Unix and Unix-like systems, these are located in /etc/privoxy/ by default.

+

Privoxy uses the concept of actions in order to manipulate + the data stream between the browser and remote sites. There are various actions available with specific functions for + such things as blocking web sites, managing cookies, etc. These actions can be invoked individually or combined, and + used against individual URLs, or groups of URLs that can be defined using wildcards and regular expressions. The + result is that the user has greatly enhanced control and freedom.

+

The actions list (ad blocks, etc) can also be configured with your web + browser at http://config.privoxy.org/ (assuming the configuration allows it). Privoxy’s configuration + parameters can also be viewed at the same page. In addition, Privoxy can be toggled on/off. This is an + internal page, and does not require Internet access.

+

See the User Manual for a detailed explanation of installation, + general usage, all configuration options, new features and notes on upgrading.

+

FILES

+

/usr/sbin/privoxy
+ /etc/privoxy/config
+ /etc/privoxy/match-all.action
+ /etc/privoxy/default.action
+ /etc/privoxy/user.action
+ /etc/privoxy/default.filter
+ /etc/privoxy/user.filter
+ /etc/privoxy/trust
+ /etc/privoxy/templates/*
+ /var/log/privoxy/logfile

+

Various other files should be included, but may vary depending on + platform and build configuration. Additional documentation should be included in the local documentation + directory.

+

SIGNALS

+

Privoxy terminates on the SIGINT and SIGTERM + signals. Log rotation scripts may cause a re-opening of the logfile by sending a SIGHUP to Privoxy. + Note that unlike other daemons, Privoxy does not need to be made aware of config file changes by SIGHUP + -- it will detect them automatically. Signals other than the ones listed above aren’t explicitly handled and + result in the default action defined by the operating system.

+

NOTES

+

Please see the User Manual on how to contact the developers, for + feature requests, reporting problems, and other questions.

+

SEE ALSO

+

Other references and sites of interest to Privoxy users:

+

https://www.privoxy.org/, the Privoxy Home page.

+

https://www.privoxy.org/faq/, the Privoxy FAQ.

+

https://www.privoxy.org/developer-manual/, the Privoxy developer + manual.

+

https://sourceforge.net/projects/ijbswa/, the Project Page for + Privoxy on SourceForge.

+

http://config.privoxy.org/, the web-based user interface. Privoxy + must be running for this to work. Shortcut: http://p.p/

+

https://sourceforge.net/tracker/?group_id=11118&atid=460288, to + submit ‘‘misses’’ and other configuration related suggestions to the developers.

+

DEVELOPMENT TEAM

+

Fabian Keil, lead developer
+ David Schmidt
+ Lee Rian
+ Roland Rosenfeld
+ Ian Silvester

+

COPYRIGHT AND LICENSE

+

COPYRIGHT
+ Copyright (C) 2001-2020 by Privoxy Developers <privoxy-devel@lists.privoxy.org>

+

Some source code is based on code Copyright (C) 1997 by Anonymous Coders + and Junkbusters, Inc. and licensed under the GNU General Public License.

+

LICENSE
+ Privoxy
is free software; you can redistribute and/or modify its source code under the terms of the GNU + General Public License as published by the Free Software Foundation, either version 2 of the license, or (at your + option) any later version.

+

The same is true for Privoxy binaries unless they are linked with + a mbed TLS version that is licensed under the Apache 2.0 license in which case you can redistribute and/or modify the + Privoxy binaries under the terms of the GNU General Public License as published by the Free Software + Foundation, either version 3 of the license, or (at your option) any later version.

+

Privoxy is distributed in the hope that it will be useful, but + WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See + the license for details.

+
+ +