X-Git-Url: http://www.privoxy.org/gitweb/?p=privoxy.git;a=blobdiff_plain;f=privoxy.1;h=2046f66ba785c607a1ea0c6a7dfcdfc6fd62a0e7;hp=de4b32ab2555537cbf48efa6d654c064968f365b;hb=0203e70f17efca4e98d29807bcb22bda5466400b;hpb=d12c46e2ec2bfc06ef6f5b0e710d21b1211088ec diff --git a/privoxy.1 b/privoxy.1 index de4b32ab..2046f66b 100644 --- a/privoxy.1 +++ b/privoxy.1 @@ -3,12 +3,12 @@ .\" .\" Please send any bug reports, improvements, comments, patches, .\" etc. to Steve Cheng . -.TH "PRIVOXY" "1" "05 September 2006" "Privoxy 3.0.4 beta" "" +.TH "PRIVOXY" "1" "14 August 2008" "Privoxy 3.0.10" "" .SH NAME privoxy \- Privacy Enhancing Proxy .SH SYNOPSIS -\fBprivoxy\fR [\fB--help\fR ] [\fB--version\fR ] [\fB--no-daemon\fR ] [\fB--pidfile \fIpidfile\fB\fR ] [\fB--user \fIuser[.group]\fB\fR ] [\fB--chroot\fR ] [\fB\fIconfigfile\fB\fR ] +\fBprivoxy\fR [\fB--help\fR ] [\fB--version\fR ] [\fB--no-daemon\fR ] [\fB--pidfile \fIpidfile\fB\fR ] [\fB--user \fIuser[.group]\fB\fR ] [\fB--chroot\fR ] [\fB--pre-chroot-nslookup \fIhostname\fB\fR ] [\fB\fIconfigfile\fB\fR ] .SH "OPTIONS" .PP @@ -46,6 +46,11 @@ that user's home directory, i.e. make the kernel pretend to the there. If set up carefully, this can limit the impact of possible vulnerabilities in \fBPrivoxy\fR to the files contained in that hierarchy. +.TP +\fB--pre-chroot-nslookup \fIhostname\fB\fR +Initialize the resolver library using \fIhostname\fR +before chroot'ing. On some systems this reduces the number of files +that must be copied into the chroot tree. .PP If the \fIconfigfile\fR is not specified on the command line, \fBPrivoxy\fR will look for a file named @@ -54,22 +59,26 @@ If the \fIconfigfile\fR is not specified on the command line, fail to start. .SH "DESCRIPTION" .PP -\fBPrivoxy\fR is a web proxy with advanced filtering -capabilities for protecting privacy, modifying web page data, managing -cookies, controlling access, and removing ads, banners, pop-ups and other -obnoxious Internet junk. \fBPrivoxy\fR has a very -flexible configuration and can be customized to suit individual needs and -tastes. \fBPrivoxy\fR has application for both -stand-alone systems and multi-user networks. +Privoxy is a non-caching +web proxy +with advanced filtering capabilities for enhancing privacy, +modifying web page data, managing HTTP +cookies, +controlling access, and removing ads, banners, pop-ups and other obnoxious +Internet junk. Privoxy has a flexible configuration and can be +customized to suit individual needs and tastes. Privoxy has application for +both stand-alone systems and multi-user networks. .PP -\fBPrivoxy\fR is based on \fBInternet -Junkbuster\fR (tm). +Privoxy is based on Internet Junkbuster (tm). .SH "INSTALLATION AND USAGE" .PP -Browsers must be individually configured to use \fBPrivoxy\fR as -a HTTP proxy. The default setting is for localhost, on port 8118 -(configurable in the main config file). To set the HTTP proxy in Netscape -and Mozilla, go through: \fBEdit\fR; +Browsers can either be individually configured to use +\fBPrivoxy\fR as a HTTP proxy (recommended), +or \fBPrivoxy\fR can be combined with a packet +filter to build an intercepting proxy +(see \fIconfig\fR). The default setting is for +localhost, on port 8118 (configurable in the main config file). To set the +HTTP proxy in Netscape and Mozilla, go through: \fBEdit\fR; \fBPreferences\fR; \fBAdvanced\fR; \fBProxies\fR; \fBManual Proxy Configuration\fR; \fBView\fR. @@ -102,15 +111,24 @@ locally defined filters. These are well commented. On Unix and Unix-like systems, these are located in \fI/etc/privoxy/\fR by default. .PP -See the \fIUser Manual\fR for a detailed -explanation of installation, general usage, all configuration options, new -features and notes on upgrading. +\fBPrivoxy\fR uses the concept of \fBactions\fR +in order to manipulate the data stream between the browser and remote sites. +There are various actions available with specific functions for such things +as blocking web sites, managing cookies, etc. These actions can be invoked +individually or combined, and used against individual URLs, or groups of URLs +that can be defined using wildcards and regular expressions. The result is +that the user has greatly enhanced control and freedom. .PP The actions list (ad blocks, etc) can also be configured with your -web browser at http://config.privoxy.org/. +web browser at http://config.privoxy.org/ +(assuming the configuration allows it). \fBPrivoxy's\fR configuration parameters can also be viewed at the same page. In addition, \fBPrivoxy\fR can be toggled on/off. This is an internal page, and does not require Internet access. +.PP +See the \fIUser Manual\fR for a detailed +explanation of installation, general usage, all configuration options, new +features and notes on upgrading. .SH "SAMPLE CONFIGURATION" .PP A brief example of what a simple \fIdefault.action\fR @@ -120,100 +138,62 @@ configuration might look like: # Define a few useful custom aliases for later use {{alias}} - # Useful aliases + # Useful aliases that combine more than one action +crunch-cookies = +crunch-incoming-cookies +crunch-outgoing-cookies -crunch-cookies = -crunch-incoming-cookies -crunch-outgoing-cookies - +imageblock = +block +handle-as-image + +block-as-image = +block +handle-as-image # Fragile sites should have the minimum changes fragile = -block -deanimate-gifs -fast-redirects -filter \\ - -hide-referer -prevent-cookies -kill-popups + -hide-referer -prevent-cookies ## Turn some actions on ################################ ## NOTE: Actions are off by default, unless explictily turned on ## otherwise with the '+' operator. { \\ --add-header \\ --block \\ --content-type-overwrite \\ --crunch-client-header \\ --crunch-if-none-match \\ --crunch-outgoing-cookies \\ --crunch-incoming-cookies \\ --crunch-server-header \\ +deanimate-gifs{last} \\ --downgrade-http-version \\ --fast-redirects \\ -+filter{js-annoyances} \\ --filter{js-events} \\ -+filter{html-annoyances} \\ --filter{content-cookies} \\ +filter{refresh-tags} \\ -+filter{unsolicited-popups} \\ --filter{all-popups} \\ +filter{img-reorder} \\ +filter{banners-by-size} \\ --filter{banners-by-link} \\ +filter{webbugs} \\ --filter{tiny-textforms} \\ +filter{jumping-windows} \\ --filter{frameset-borders} \\ --filter{demoronizer} \\ --filter{shockwave-flash} \\ --filter{quicktime-kioskmode} \\ --filter{fun} \\ --filter{crude-parental} \\ +filter{ie-exploits} \\ --filter{site-specifics} \\ --filter-client-headers \\ --filter-server-headers \\ --force-text-mode \\ --handle-as-empty-document --handle-as-image \\ --hide-accept-language \\ --hide-content-disposition \\ --hide-if-modified-since \\ +hide-forwarded-for-headers \\ +hide-from-header{block} \\ -+hide-referrer{forge} \\ --hide-user-agent \\ --inspect-jpegs \\ --kill-popups \\ --limit-connect \\ --overwrite-last-modified \\ --redirect \\ -+prevent-compression \\ --send-vanilla-wafer \\ --send-wafer \\ ++hide-referrer{conditional-block} \\ +session-cookies-only \\ +set-image-blocker{pattern} \\ --treat-forbidden-connects-like-blocks \\ } / # '/' Match *all* URL patterns + # Block all URLs that match these patterns + { +block } + ad. + ad[sv]. + .*ads. + banner?. + /.*count(er)?\\.(pl|cgi|exe|dll|asp|php[34]?) + .hitbox.com + media./.*(ads|banner) + # Block, and treat these URL patterns as if they were 'images'. # We would expect these to be ads. - {+imageblock} + { +block-as-image } .ad.doubleclick.net .a[0-9].yimg.com/(?:(?!/i/).)*$ ad.*.doubleclick.net - # Block any URLs that match these patterns - {+block} - ad*. - .*ads. - banner?. - /.*count(er)?\\.(pl|cgi|exe|dll|asp|php[34]?) - .hitbox.com - # Make exceptions for these harmless ones that would be # caught by our +block patterns just above. - {-block} + { -block } adsl. + adobe. advice. .*downloads. + # uploads or downloads + /.*loads .fi .PP Then for a \fIuser.action\fR, we would put local, @@ -228,15 +208,20 @@ narrowly defined exceptions: # Set personal exceptions to the policies in default.action ####### - # Sites where we want persistant cookies, so allow *all* cookies - {-crunch-cookies -session-cookies-only} + # Sites where we want persistent cookies, so allow *all* cookies + { -crunch-cookies -session-cookies-only } .redhat.com .sun.com .msdn.microsoft.com - # This site breaks easily. - {-block -fast-redirects} + # These sites break easily. Use our "fragile" alias here. + { fragile } .forbes.com + mybank.example.com + + # Replace example.com's style sheet with one of my choosing + { +redirect{http://localhost/css-replacements/example.com.css} } + .example.com/stylesheet.css .fi .PP See the comments in the configuration files themselves, or the @@ -273,9 +258,6 @@ config file changes by \fBSIGHUP\fR -- it will detect them automatically. .SH "NOTES" .PP -This is a beta version of \fBPrivoxy\fR. Not -all features are well tested. -.PP Please see the \fIUser Manual\fR on how to contact the developers, for feature requests, reporting problems, and other questions. .SH "SEE ALSO" @@ -310,11 +292,16 @@ the original Internet Junkbuster. http://privacy.net/, a useful site to check what information about you is leaked while you browse the web. -http://www.squid-cache.org/, a very popular +http://www.squid-cache.org/, a popular caching proxy, which is often used together with \fBPrivoxy\fR. +http://www.pps.jussieu.fr/~jch/software/polipo/, +\fBPolipo\fR is a caching proxy with advanced features +like pipelining, multiplexing and caching of partial instances. In many setups +it can be used as \fBSquid\fR replacement. + http://tor.eff.org/, -\fBTOR\fR can help anonymize web browsing, +\fBTor\fR can help anonymize web browsing, web publishing, instant messaging, IRC, SSH, and other applications. http://www.privoxy.org/developer-manual/, @@ -322,20 +309,20 @@ the \fBPrivoxy\fR developer manual. .SH "DEVELOPMENT TEAM" .nf - Fabian Keil - David Schmidt - - - Johny Agotnes - Moritz Barsnick + Fabian Keil, lead developer + David Schmidt, developer + Hal Burgiss - Mattes Dolak + Mark Miller + Gerry Murphy + Lee Rian Roland Rosenfeld + Jörg Strohmayer .fi .SH "COPYRIGHT AND LICENSE" .SS "COPYRIGHT" .PP -Copyright (C) 2001 - 2006 by Privoxy Developers +Copyright (C) 2001-2008 by Privoxy Developers .PP Some source code is based on code Copyright (C) 1997 by Anonymous Coders and Junkbusters, Inc. and licensed under the \fIGNU General Public @@ -344,18 +331,15 @@ License\fR. .PP \fBPrivoxy\fR is free software; you can redistribute it and/or modify it under the terms of the -\fIGNU General Public -License\fR, version 2, as published by the Free Software Foundation. +\fIGNU General Public License\fR, version 2, +as published by the Free Software Foundation. .PP This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or -FITNESS FOR A PARTICULAR PURPOSE. See the -\fIGNU General Public License\fR for -more details, which is available from the Free Software Foundation, Inc, 59 -Temple Place - Suite 330, Boston, MA 02111-1307, USA. +FITNESS FOR A PARTICULAR PURPOSE. See the \fIGNU General Public License\fR for details. .PP -You should have received a copy of the \fIGNU General Public License\fR +You should have received a copy of the \fIGNU GPL\fR along with this program; if not, write to the Free Software -Foundation, Inc. 59 Temple Place - Suite 330 -Boston, MA 02111-1307 +Foundation, Inc. 51 Franklin Street, Fifth Floor +Boston, MA 02110-1301 USA