X-Git-Url: http://www.privoxy.org/gitweb/?p=privoxy.git;a=blobdiff_plain;f=doc%2Fwebserver%2Fuser-manual%2Factions-file.html;h=c0eb301334dab507876087e57c68150a8b5c75c8;hp=dfd45a469ebf3e6ffdec969f99f6cb0f0ac1ac56;hb=3db7a58b2bbed7b6356b2a0600e93ec4f2846499;hpb=5214268f1ef9df06c1246a686fcab2a61d6a50ed
diff --git a/doc/webserver/user-manual/actions-file.html b/doc/webserver/user-manual/actions-file.html
index dfd45a46..c0eb3013 100644
--- a/doc/webserver/user-manual/actions-file.html
+++ b/doc/webserver/user-manual/actions-file.html
@@ -7,7 +7,7 @@
NAME="GENERATOR"
CONTENT="Modular DocBook HTML Stylesheet Version 1.79">
+HREF="../p_doc.css">
Privoxy 3.0.7 User Manual
Privoxy 3.0.17 User Manual
Privoxy with
- differing purposes:
-
match-all.action - is used to define which
+ "actions" relating to banner-blocking, images, pop-ups,
+ content modification, cookie handling etc should be applied by default.
+ It should be the first actions file loaded
+
default.action - is the primary action file
- that sets the initial values for all actions. It is intended to
- provide a base level of functionality for
- Privoxy's array of features. So it is
- a set of broad rules that should work reasonably well as-is for most users.
- This is the file that the developers are keeping updated, and making available to users.
- The user's preferences as set in - defines many exceptions (both
+ positive and negative) from the default set of actions that's configured
+ in standard.action,
- e.g. either Cautious (the default),
- Medium, or Advanced (see
- below).
-
match-all.action. It is a set of rules that should
+ work reasonably well as-is for most users. This file is only supposed to
+ be edited by the developers. It should be the second actions file loaded.
+
user.action - is intended to be for local site
- preferences and exceptions. As an example, if your ISP or your bank
- has specific requirements, and need special handling, this kind of
- thing should go here. This file will not be upgraded.
-
These have increasing levels of aggressiveness These have increasing levels of aggressiveness and have no
- influence on your browsing unless you select them explicitly in the
- editor. A default installation should be pre-set to
- Cautious (versions prior to 3.0.5 were set to
- Medium). New users should try this for a while before
- adjusting the settings to more aggressive levels. The more aggressive
- the settings, then the more likelihood there is of problems such as sites
- not working as they should.
-
. New users should try this for a while before
+ adjusting the settings to more aggressive levels. The more aggressive
+ the settings, then the more likelihood there is of problems such as sites
+ not working as they should.
+
The The Edit button allows you to turn each
- action on/off individually for fine-tuning. The Cautious
- button changes the actions list to low/safe settings which will activate
- ad blocking and a minimal set of Privoxy's features, and subsequently
- there will be less of a chance for accidental problems. The
- Medium button sets the list to a medium level of
- other features and a low level set of privacy features. The
- Advanced button sets the list to a high level of
- ad blocking and medium level of privacy. See the chart below. The latter
- three buttons over-ride any changes via with the
- Edit button. More fine-tuning can be done in the
- lower sections of this internal page.
-
It is not recommend to edit the standard.action file
- itself.
-
While the actions file editor allows to enable these settings in all
+ actions files, they are only supposed to be enabled in the first one
+ to make sure you don't unintentionally overrule earlier rules.
+
The default profiles, and their associated actions, as pre-defined in
- The default profiles, and their associated actions, as pre-defined in
+ standard.actiondefault.action are:
-
no
no
yes
yes
-
The list of actions files to be used are defined in the main configuration
file, and are processed in the order they are defined (e.g.
@@ -528,7 +501,7 @@ CLASS="SECT2"
>
handle-as-image +blockblock{Banner ads.} }
# Block these as if they were images. Send no block page.
banners.example.com
@@ -741,44 +714,61 @@ CLASS="EMPHASIS"
> Generally, an URL pattern has the form
<domain>/<path>, where both the
+><domain><port>/<path>, where the
<domain> and , the <port>
+ and the <path> are
- optional. (This is why the special are optional. (This is why the special
+ / pattern matches all
- URLs). Note that the protocol portion of the URL pattern (e.g.
- pattern matches all URLs). Note that the protocol
+ portion of the URL pattern (e.g. http://) should ) should
+ not be included in
- the pattern. This is assumed already!
be included in the pattern. This is assumed already!
The pattern matching syntax is different for the domain and path parts of
the URL. The domain part uses a simple globbing type matching technique,
- while the path part uses a more flexible
+ while the path part uses more flexible
"Regular
- Expressions (PCRE)" based syntax.
(POSIX 1003.2).
The port part of a pattern is a decimal port number preceded by a colon
+ (:). If the domain part contains a numerical IPv6 address,
+ it has to be put into angle brackets
+ (<, >).
matches any domain that ENDS in
- matches any domain with first-level domain .example.comcom
+ and second-level domain example.
+ For example www.example.com,
+ example.com and foo.bar.baz.example.com.
+ Note that it wouldn't match if the second-level domain was another-example.
www.
+> (It also matches the domain
+ www but most of the time that doesn't matter.)
Privoxy uses Perl compatible (PCRE)
+> uses "modern" POSIX 1003.2
"Regular
- Expression" based syntax
- (through the PCRE library) for
- matching the path portion (after the slash), and is thus more flexible.
for matching the path portion (after the slash),
+ and is thus more flexible.
There is an Appendix with a brief quick-start into regular
- expressions, and full (very technical) documentation on PCRE regex syntax is available on-line
- at http://www.pcre.org/man.txt.
- You might also find the Perl man page on regular expressions (man perlre)
- useful, which is available on-line at http://perldoc.perl.org/perlre.html.
man re_format).
Note that the path pattern is automatically left-anchored at the
Example: +block+handle-as-image
are, you definitely don't need to worry about this
one.
Headers added by this action are not modified by other actions.
+
Example usage:
Type:
Boolean.
Parameterized.
Parameter:
N/A
A block reason that should be given to the user.
Notes:
"BLOCKED" page
- for requests to blocked pages. This page contains links to find out why the request
- was blocked, and a click-through to the blocked content (the latter only if compiled with the
- force feature enabled). The "BLOCKED" page adapts to the available
- screen space -- it displays full-blown if space allows, or miniaturized and text-only
- if loaded into a small frame or window. If you are using Privoxy
- right now, you can take a look at the
- "BLOCKED"
- page.
+ for requests to blocked pages. This page contains the block reason given as
+ parameter, a link to find out why the block action applies, and a click-through
+ to the blocked content (the latter only if the force feature is available and
+ enabled).
@@ -1981,18 +1996,18 @@ WIDTH="90%"
>
{+block}
+>{+block{No nasty stuff for you.}}
# Block and replace with "blocked" page
.nasty-stuff.example.com
-{+block +handle-as-image}
+{+block{Doubleclick banners.} +handle-as-image}
# Block and replace with image
.ad.doubleclick.net
.ads.r.us/banners/
-{+block +handle-as-empty-document}
+{+block{Layered ads.} +handle-as-empty-document}
# Block and then ignore
- adserver.exampleclick.net/.*\.js$
If the request URL gets changed, Privoxy will detect that and use the new
+ one. This can be used to rewrite the request destination behind the client's
+ back, for example to specify a Tor exit relay for certain requests.
+
{+client-header-filter{hide-tor-exit-notation}}
-.exit/
+># Hide Tor exit notation in Host and Referer Headers
+{+client-header-filter{hide-tor-exit-notation}}
+/
8.5.4. client-header-tagger8.5.5. client-header-tagger# Tag every request with the User-Agent header
{+client-header-tagger{user-agent}}
/
+
+# Tagging itself doesn't change the action
+# settings, sections with TAG patterns do:
+#
+# If it's a download agent, use a different forwarding proxy,
+# show the real User-Agent and make sure resume works.
+{+forward-override{forward-socks5 10.0.0.2:2222 .} \
+ -hide-if-modified-since \
+ -overwrite-last-modified \
+ -hide-user-agent \
+ -filter \
+ -deanimate-gifs \
+}
+TAG:^User-Agent: NetBSD-ftp/
+TAG:^User-Agent: Novell ZYPP Installer
+TAG:^User-Agent: RPM APT-HTTP/
+TAG:^User-Agent: fetch libfetch/
+TAG:^User-Agent: Ubuntu APT-HTTP/
+TAG:^User-Agent: MPlayer/
8.5.5. content-type-overwrite8.5.6. content-type-overwrite8.5.6. crunch-client-header8.5.7. crunch-client-header8.5.7. crunch-if-none-match8.5.8. crunch-if-none-match8.5.8. crunch-incoming-cookies8.5.9. crunch-incoming-cookies8.5.9. crunch-server-header8.5.10. crunch-server-header8.5.10. crunch-outgoing-cookies8.5.11. crunch-outgoing-cookies8.5.11. deanimate-gifs8.5.12. deanimate-gifs8.5.12. downgrade-http-version8.5.13. downgrade-http-version8.5.13. fast-redirects8.5.14. fast-redirects8.5.14. filter8.5.15. filter
Filtering requires buffering the page content, which may appear to
slow down page rendering since nothing is displayed until all content has
- passed the filters. (It does not really take longer, but seems that way
- since the page is not incrementally displayed.) This effect will be more
- noticeable on slower connections.
+ passed the filters. (The total time until the page is completely rendered
+ doesn't change much, but it may be perceived as slower since the page is
+ not incrementally displayed.)
+ This effect will be more noticeable on slower connections.
+filter{js-annoyances} # Get rid of particularly annoying JavaScript abuse
+filter{js-annoyances} # Get rid of particularly annoying JavaScript abuse.
+filter{js-events} # Kill all JS event bindings (Radically destructive! Only for extra nasty sites)
+filter{js-events} # Kill all JS event bindings and timers (Radically destructive! Only for extra nasty sites).
+filter{html-annoyances} # Get rid of particularly annoying HTML abuse
+filter{html-annoyances} # Get rid of particularly annoying HTML abuse.
+filter{content-cookies} # Kill cookies that come in the HTML or JS content
+filter{content-cookies} # Kill cookies that come in the HTML or JS content.
+filter{crude-parental} # Crude parental filtering. Note that this filter doesn't work reliably.
+filter{ie-exploits} # Disable a known Internet Explorer bug exploits
+filter{ie-exploits} # Disable some known Internet Explorer bug exploits.
+filter{site-specifics} # Custom filters for specific site related problems
+filter{site-specifics} # Cure for site-specific problems. Don't apply generally!
+filter{google} # Removes text ads and other Google specific improvements
+filter{no-ping} # Removes non-standard ping attributes in <a> and <area> tags.
+filter{yahoo} # Removes text ads and other Yahoo specific improvements
+filter{google} # CSS-based block for Google text ads. Also removes a width limitation and the toolbar advertisement.
+filter{msn} # Removes text ads and other MSN specific improvements
+filter{yahoo} # CSS-based block for Yahoo text ads. Also removes a width limitation.
+filter{blogspot} # Cleans up Blogspot blogs
+filter{msn} # CSS-based block for MSN text ads. Also removes tracking URLs and a width limitation.
+filter{no-ping} # Removes non-standard ping attributes from anchor and area tags
+filter{blogspot} # Cleans up some Blogspot blogs. Read the fine print before using this.
8.5.15. force-text-mode8.5.16. force-text-mode8.5.16. forward-override8.5.17. forward-override"forward-socks4"
- to use a socks4 connection (with local DNS resolution) instead.
+ to use a socks4 connection (with local DNS resolution) instead, use "forward-socks5"
+ for socks5 connections (with remote DNS resolution).
"forward-socks4" to use a socks4 connection
- (with local DNS resolution) instead.
+ (with local DNS resolution) instead, use "forward-socks5"
+ for socks5 connections (with remote DNS resolution).
Notes:
This action takes parameters similar to the
+> This action takes parameters similar to the
forward8.5.17. handle-as-empty-document8.5.18. handle-as-empty-document
# Block all documents on example.org that end with ".js",
# but send an empty document instead of the usual HTML message.
-{+block +handle-as-empty-document}
+{+block{Blocked JavaScript} +handle-as-empty-document}
example.org/.*\.js$
8.5.18. handle-as-image8.5.19. handle-as-image8.5.19. hide-accept-language8.5.20. hide-accept-language8.5.20. hide-content-disposition8.5.21. hide-content-disposition8.5.21. hide-if-modified-since8.5.22. hide-if-modified-since"If-Modified-Since:" makes
- sure it isn't used as a cookie replacement, but you will run into
- caching problems if the random range is too high.
+ it less likely that the server can use the time as a cookie replacement,
+ but you will run into caching problems if the random range is too high.
It is a good idea to only use a small negative value and let
@@ -4948,7 +5095,8 @@ CLASS="LITERAL"
HREF="actions-file.html#CRUNCH-IF-NONE-MATCH"
>crunch-if-none-match.
+>,
+ otherwise it's more or less pointless.
# Let the browser revalidate without being tracked across sessions
-{ +hide-if-modified-since{-60} \
+># Let the browser revalidate but make tracking based on the time less likely.
+{+hide-if-modified-since{-60} \
+overwrite-last-modified{randomize} \
+crunch-if-none-match}
/
"conditional-forge" to forge the header if the host has changed.
"block" to delete the header unconditionally.
Always blocking the referrer, or using a custom one, can lead to
failures on servers that check the referrer before they answer any
- requests, in an attempt to prevent their valuable content from being
+ requests, in an attempt to prevent their content from being
embedded or linked to elsewhere.
Typical use:
Conceal your type of browser and client operating system
Try to conceal your type of browser and client operating system
Effect:
the right thing to do: good web sites
work browser-independently).
-
To protect against the MS buffer over-run in JPEG processing
Prevent abuse of Privoxy as a TCP proxy relay or disable SSL for untrusted sites
Effect:
Protect against a known exploit
+> Specifies to which ports HTTP CONNECT requests are allowable.
Type:
Boolean.
Parameterized.
Parameter:
N/A
+> A comma-separated list of ports or port ranges (the latter using dashes, with the minimum
+ defaulting to 0 and the maximum to 65K).
Notes:
See Microsoft Security Bulletin MS04-028. JPEG images are one of the most
- common image types found across the Internet. The exploit as described can
- allow execution of code on the target system, giving an attacker access
- to the system in question by merely planting an altered JPEG image, which
- would have no obvious indications of what lurks inside. This action
- prevents this exploit.
+> By default, i.e. if no limit-connect action applies,
+ Privoxy allows HTTP CONNECT requests to all
+ ports. Use limit-connect if fine-grained control
+ is desired for some or all destinations.
Note that the described exploit is only one of many,
- using this action does not mean that you no longer
- have to patch the client.
-
The CONNECT methods exists in HTTP to allow access to secure websites
+ ("https://" URLs) through proxies. It works very simply:
+ the proxy connects to the server on the specified port, and then
+ short-circuits its connections to the client and to the remote server.
+ This means CONNECT-enabled proxies can be used as TCP relays very easily.
+
Privoxy relays HTTPS traffic without seeing
+ the decoded content. Websites can leverage this limitation to circumvent Privoxy's
+ filters. By specifying an invalid port range you can disable HTTPS entirely.
+
Example usage:
Example usages:
+inspect-jpegs
+limit-connect{443} # Port 443 is OK.
++limit-connect{80,443} # Ports 80 and 443 are OK.
++limit-connect{-3, 7, 20-100, 500-} # Ports less than 3, 7, 20 to 100 and above 500 are OK.
++limit-connect{-} # All ports are OK
++limit-connect{,} # No HTTPS/SSL traffic is allowed
Eliminate those annoying pop-up windows (deprecated)
Ensure that servers send the content uncompressed, so it can be
+ passed through filters.
+
Effect:
While loading the document, replace JavaScript code that opens
- pop-up windows with (syntactically neutral) dummy code on the fly.
+> Removes the Accept-Encoding header which can be used to ask for compressed transfer.
Notes:
This action is basically a built-in, hardwired special-purpose filter
- action, but there are important differences: For kill-popups,
- the document need not be buffered, so it can be incrementally rendered while
- downloading. But kill-popups doesn't catch as many pop-ups as
- More and more websites send their content compressed by default, which
+ is generally a good idea and saves bandwidth. But the filter{all-popups}filter
- does and is not as smart as and
+ filter{unsolicited-popupsdeanimate-gifs}
- is.
+ actions need access to the uncompressed data.
Think of it as a fast and efficient replacement for a filter that you
- can use if you don't want any filtering at all. Note that it doesn't make
- sense to combine it with any filter action,
- since as soon as one filter applies,
- the whole document needs to be buffered anyway, which destroys the advantage of
- the kill-popups action over its filter equivalent.
+> When compiled with zlib support (available since Privoxy 3.0.7), content that should be
+ filtered is decompressed on-the-fly and you don't have to worry about this action.
+ If you are using an older Privoxy version, or one that hasn't been compiled with zlib
+ support, this action can be used to convince the server to send the content uncompressed.
Killing all pop-ups unconditionally is problematic. Many shops and banks rely on
- pop-ups to display forms, shopping carts etc, and the filter{unsolicited-popups}
- does a better job of catching only the unwanted ones.
+> Most text-based instances compress very well, the size is seldom decreased by less than 50%,
+ for markup-heavy instances like news feeds saving more than 90% of the original size isn't
+ unusual.
If the only kind of pop-ups that you want to kill are exit consoles (those
- really nasty windows that appear when you close an other
- one), you might want to use
- filter{js-annoyances}
- instead.
+> Not using compression will therefore slow down the transfer, and you should only
+ enable this action if you really need it. As of Privoxy 3.0.7 it's disabled in all
+ predefined action settings.
This action is most appropriate for browsers that don't have any controls
- for unwanted pop-ups. Not recommended for general usage.
+> Note that some (rare) ill-configured sites don't handle requests for uncompressed
+ documents correctly. Broken PHP applications tend to send an empty document body,
+ some IIS versions only send the beginning of the content. If you enable
+ prevent-compression per default, you might want to add
+ exceptions for those sites. See the example for how to do that.
Example usage:
Example usage (sections):
+kill-popups
# Selectively turn off compression, and enable a filter
+#
+{ +filter{tiny-textforms} +prevent-compression }
+# Match only these sites
+ .google.
+ sourceforge.net
+ sf.net
+
+# Or instead, we could set a universal default:
+#
+{ +prevent-compression }
+ / # Match all sites
+
+# Then maybe make exceptions for broken sites:
+#
+{ -prevent-compression }
+.compusa.com/
Prevent abuse of Privoxy as a TCP proxy relay or disable SSL for untrusted sites
Effect:
Specifies to which ports HTTP CONNECT requests are allowable.
-
Type:
Parameterized.
Parameter:
A comma-separated list of ports or port ranges (the latter using dashes, with the minimum
- defaulting to 0 and the maximum to 65K).
-
Notes:
By default, i.e. if no limit-connect action applies,
- Privoxy only allows HTTP CONNECT
- requests to port 443 (the standard, secure HTTPS port). Use
- limit-connect if more fine-grained control is desired
- for some or all destinations.
-
The CONNECT methods exists in HTTP to allow access to secure websites
- ("https://" URLs) through proxies. It works very simply:
- the proxy connects to the server on the specified port, and then
- short-circuits its connections to the client and to the remote server.
- This can be a big security hole, since CONNECT-enabled proxies can be
- abused as TCP relays very easily.
-
Privoxy relays HTTPS traffic without seeing
- the decoded content. Websites can leverage this limitation to circumvent Privoxy's
- filters. By specifying an invalid port range you can disable HTTPS entirely.
- If you plan to disable SSL by default, consider enabling
- treat-forbidden-connects-like-blocks
- as well, to be able to quickly create exceptions.
-
Example usages:
+limit-connect{443} # This is the default and need not be specified.
-+limit-connect{80,443} # Ports 80 and 443 are OK.
-+limit-connect{-3, 7, 20-100, 500-} # Ports less than 3, 7, 20 to 100 and above 500 are OK.
-+limit-connect{-} # All ports are OK
-+limit-connect{,} # No HTTPS/SSL traffic is allowed
Ensure that servers send the content uncompressed, so it can be
- passed through filters.
-
Effect:
Removes the Accept-Encoding header which can be used to ask for compressed transfer.
-
Type:
Boolean.
Parameter:
N/A
-
Notes:
More and more websites send their content compressed by default, which
- is generally a good idea and saves bandwidth. But the filter, deanimate-gifs
- and kill-popups actions need
- access to the uncompressed data.
-
When compiled with zlib support (available since Privoxy 3.0.7), content that should be
- filtered is decompressed on-the-fly and you don't have to worry about this action.
- If you are using an older Privoxy version, or one that hasn't been compiled with zlib
- support, this action can be used to convince the server to send the content uncompressed.
-
Most text-based instances compress very well, the size is seldom decreased by less than 50%,
- for markup-heavy instances like news feeds saving more than 90% of the original size isn't
- unusual.
-
Not using compression will therefore slow down the transfer, and you should only
- enable this action if you really need it. As of Privoxy 3.0.7 it's disabled in all
- predefined action settings.
-
Note that some (rare) ill-configured sites don't handle requests for uncompressed
- documents correctly. Broken PHP applications tend to send an empty document body,
- some IIS versions only send the beginning of the content. If you enable
- prevent-compression per default, you might want to add
- exceptions for those sites. See the example for how to do that.
-
Example usage (sections):
# Selectively turn off compression, and enable a filter
-#
-{ +filter{tiny-textforms} +prevent-compression }
-# Match only these sites
- .google.
- sourceforge.net
- sf.net
-
-# Or instead, we could set a universal default:
-#
-{ +prevent-compression }
- / # Match all sites
-
-# Then maybe make exceptions for broken sites:
-#
-{ -prevent-compression }
-.compusa.com/
Prevent yet another way to track the user's steps between sessions.
Prevent yet another way to track the user's steps between sessions.
Effect:
hided-if-modified-sincehide-if-modified-since
to further customize your random range.
@@ -6161,7 +5977,7 @@ CLASS="SECT3"
CLASS="SECT3"
>8.5.31. redirect8.5.29. redirect
In case of problems with your redirects, or simply to watch
+ them working, enable debug 128.
+
Sends a cookie with each request stating that you do not accept any copyright
- on cookies sent to you, and asking the site operator not to track you.
-
Type:
Boolean.
Parameter:
N/A
-
Notes:
The vanilla wafer is a (relatively) unique header and could conceivably be used to track you.
-
This action is rarely used and not enabled in the default configuration.
-
Block forbidden connects with an easy to find error message.
Effect:
If this action is enabled, Privoxy no longer
- makes a difference between forbidden connects and ordinary blocks.
-
Type:
Boolean
Parameter:
N/A
Notes:
By default Privoxy answers
- forbidden "Connect" requests
- with a short error message inside the headers. If the browser doesn't display
- headers (most don't), you just see an empty page.
-
With this action enabled, Privoxy displays
- the message that is used for ordinary blocks instead. If you decide
- to make an exception for the page in question, you can do so by
- following the "See why" link.
-
For "Connect" requests the clients tell
- Privoxy which host they are interested
- in, but not which document they plan to get later. As a result, the
- "Go there anyway" wouldn't work and is therefore suppressed.
+> Redirect to the built-in pattern for better caching:
Note that many of these actions have the potential to cause a page to
@@ -7324,7 +6890,7 @@ HREF="actions-file.html#CRUNCH-INCOMING-COOKIES"
HREF="actions-file.html#CRUNCH-OUTGOING-COOKIES"
>crunch-outgoing-cookies
- +block-as-image = +block +handle-as-image
+ +block-as-image = +block{Blocked image.} +handle-as-image
allow-all-cookies = -crunch-all-cookies -session-cookies-onlyhide-referrer -kill-popups -prevent-compression
@@ -7359,9 +6922,6 @@ HREF="actions-file.html#PREVENT-COMPRESSION"
shop = -crunch-all-cookies -filter{all-popups} -kill-popups
# Short names for other aliases, for really lazy people ;-)
@@ -7407,7 +6967,7 @@ CLASS="SCREEN"
# These shops require pop-ups:
#
- {-kill-popups -filter{all-popups} -filter{unsolicited-popups}}
+ {-filter{all-popups} -filter{unsolicited-popups}}
.dabs.com
.overclockers.co.uk. Now, let's look at an
example match-all.action, default.action and
+ and user.action
- file and see how all these pieces come together:
Every config file should start with a short comment stating its purpose:
Remember all actions are disabled when matching starts,
+ so we have to explicitly enable the ones we want.
While the match-all.action file only contains a
+ single section, it is probably the most important one. It has only one
+ pattern, "/", but this pattern
+ matches all URLs. Therefore, the set of
+ actions used in this "default" section will
+ be applied to all requests as a start. It can be partly or
+ wholly overridden by other actions files like default.action
+ and user.action, but it will still be largely responsible
+ for your overall browsing experience.
Again, at the start of matching, all actions are disabled, so there is
+ no need to disable any actions here. (Remember: a "+"
+ preceding the action name enables the action, a "-" disables!).
+ Also note how this long line has been made more readable by splitting it into
+ multiple lines with line continuation.
If you aren't a developer, there's no need for you to edit the
+ default.action file. It is maintained by
+ the Privoxy developers and if you disagree with some of the
+ sections, you should overrule them in your user.action.
Understanding the default.action file, the
-first section is a special section for internal use that you needn't
-change or worry about:
file can
+ help you with your user.action, though.
The first section in this file is a special section for internal use
+ that prevents older Privoxy versions from reading the file:
##########################################################################
# Settings -- Don't change! For internal Privoxy use ONLY.
##########################################################################
-
{{settings}}
-for-privoxy-version=3.0
Now come the regular sections, i.e. sets of actions, accompanied
- by URL patterns to which they apply. Remember all actions
- are disabled when matching starts, so we have to explicitly
- enable the ones we want.
The first regular section is probably the most important. It has only
- one pattern, "/", but this pattern
- matches all URLs. Therefore, the
- set of actions used in this "default" section will
- be applied to all requests as a start. It can be partly or
- wholly overridden by later matches further down this file, or in user.action,
- but it will still be largely responsible for your overall browsing
- experience.
Again, at the start of matching, all actions are disabled, so there is
- no need to disable any actions here. (Remember: a "+"
- preceding the action name enables the action, a "-" disables!).
- Also note how this long line has been made more readable by splitting it into
- multiple lines with line continuation.
The first of our specialized sections is concerned with "fragile"fast-redirects
- action, which we enabled per default above, breaks some sites. So disable
- it for popular sites where we know it misbehaves:
match-all.action,
+ breaks some sites. So disable it for popular sites where we know it misbehaves:
and
- information). We can mark any URL as an image with the +block+block{Banner ads.} }
# Generic patterns:
@@ -8190,8 +7731,8 @@ CLASS="SECT3"
>