X-Git-Url: http://www.privoxy.org/gitweb/?p=privoxy.git;a=blobdiff_plain;f=privoxy.1;h=801eda7b9521fb2789acac8f260f09b1526c6024;hp=f8eb2248b61dfa858367c31097a53b4af6001eb7;hb=b0184cb983140a641d30ebfb4942759f48c010a9;hpb=95003f9dd76862e9e349f04b3c093c9244a1c56e diff --git a/privoxy.1 b/privoxy.1 index f8eb2248..801eda7b 100644 --- a/privoxy.1 +++ b/privoxy.1 @@ -3,15 +3,12 @@ .\" .\" Please send any bug reports, improvements, comments, patches, .\" etc. to Steve Cheng . -.TH "PRIVOXY" "1" "11 April 2002" "Privoxy 2.9.14 beta" "" +.TH "PRIVOXY" "1" "13 November 2006" "Privoxy 3.0.6" "" .SH NAME privoxy \- Privacy Enhancing Proxy .SH SYNOPSIS -\fBprivoxy\fR [\fB--help\fR] [\fB--version\fR] [\fB--no-daemon\fR] [\fB--pidfile \fIpidfile\fB\fR] [\fB--user \fIuser[.group]\fB\fR] [\fB\fIconfigfile\fB\fR] (UNIX) - - -\fBprivoxy.exe\fR [\fB\fIconfigfile\fB\fR] (Windows) +\fBprivoxy\fR [\fB--help\fR ] [\fB--version\fR ] [\fB--no-daemon\fR ] [\fB--pidfile \fIpidfile\fB\fR ] [\fB--user \fIuser[.group]\fB\fR ] [\fB--chroot\fR ] [\fB\fIconfigfile\fB\fR ] .SH "OPTIONS" .PP @@ -31,7 +28,7 @@ leader, don't detach from controlling tty, and do all logging there. \fB--pidfile \fIpidfile\fB\fR On startup, write the process ID to \fIpidfile\fR. Delete the \fIpidfile\fR on exit. -Failiure to create or delete the \fIpidfile\fR +Failure to create or delete the \fIpidfile\fR is non-fatal. If no \fB--pidfile\fR option is given, no PID file will be used. .TP \fB--user \fIuser[.group]\fB\fR @@ -41,33 +38,33 @@ After (optionally) writing the PID file, assume the user ID of \fIgroup\fR was not given, the default group of \fIuser\fR. Exit if the privileges are not sufficient to do so. +.TP +\fB--chroot\fR +Before changing to the user ID given in the --user option, chroot to +that user's home directory, i.e. make the kernel pretend to the +\fBPrivoxy\fR process that the directory tree starts +there. If set up carefully, this can limit the impact of possible +vulnerabilities in \fBPrivoxy\fR to the files contained in +that hierarchy. .PP If the \fIconfigfile\fR is not specified on the command line, \fBPrivoxy\fR will look for a file named -\fIconfig\fR in the current directory (except on Win32 where -it will try \fIconfig.txt\fR). If no +\fIconfig\fR in the current directory . If no \fIconfigfile\fR is found, \fBPrivoxy\fR will fail to start. .SH "DESCRIPTION" .PP -\fBPrivoxy\fR is a web proxy with advanced filtering -capabilities for protecting privacy, filtering web page content, managing -cookies, controlling access, and removing ads, banners, pop-ups and other -obnoxious Internet junk. \fBPrivoxy\fR has a very -flexible configuration and can be customized to suit individual needs and -tastes. \fBPrivoxy\fR has application for both -stand-alone systems and multi-user networks. -.PP -\fBPrivoxy\fR is based on the code of the -\fBInternet Junkbuster\fR (tm). -\fBJunkbuster\fR was originally written by Junkbusters -Corporation, and was released as free open-source software under the GNU GPL. -Stefan Waldherr made many improvements, and started the SourceForge project -to continue development. +Privoxy is a +web proxy +with advanced filtering capabilities for protecting +privacy, modifying web page data, managing +cookies, +controlling access, and removing ads, banners, pop-ups and other obnoxious +Internet junk. Privoxy has a very flexible configuration and can be +customized to suit individual needs and tastes. Privoxy has application for +both stand-alone systems and multi-user networks. .PP -\fBPrivoxy\fR continues the -\fBJunkbuster\fR tradition, but adds many -refinements, enhancements and new features. +Privoxy is based on Internet Junkbuster (tm). .SH "INSTALLATION AND USAGE" .PP Browsers must be individually configured to use \fBPrivoxy\fR as @@ -78,136 +75,200 @@ and Mozilla, go through: \fBEdit\fR; \fBProxies\fR; \fBManual Proxy Configuration\fR; \fBView\fR. .PP +For Firefox, go through: \fBTools\fR; +\fBOptions\fR; \fBGeneral\fR; +\fBConnection Settings\fR; +\fBManual Proxy Configuration\fR. +.PP For Internet Explorer, go through: \fBTools\fR; \fBInternet Properties\fR; \fBConnections\fR; \fBLAN Settings\fR. .PP The Secure (SSL) Proxy should also be set to the same values, otherwise -https: URLs will not be proxied. +https: URLs will not be proxied. Note: \fBPrivoxy\fR can only +proxy HTTP and HTTPS traffic. Do not try it with FTP or other protocols. +HTTPS presents some limitations, and not all features will work with HTTPS +connections. .PP For other browsers, check the documentation. .SH "CONFIGURATION" .PP \fBPrivoxy\fR can be configured with the various configuration files. The default configuration files are: \fIconfig\fR, -\fIdefault.action\fR, and -\fIdefault.filter\fR. These are well commented. On Unix and -Unix-like systems, these are located in \fI/etc/privoxy/\fR by -default. On Windows, OS/2 and AmigaOS, these files are in the same directory -as the \fBPrivoxy\fR executable. +\fIdefault.filter\fR, and +\fIdefault.action\fR. \fIuser.action\fR should +be used for locally defined exceptions to the default rules of +\fIdefault.action\fR, and \fIuser.filter\fR for +locally defined filters. These are well commented. On Unix +and Unix-like systems, these are located in +\fI/etc/privoxy/\fR by default. .PP -The name and number of configuration files has changed from previous -versions, and is subject to change as development progresses. In fact, the -configuration itself is changed and much more sophisticated. See the -user-manual for a -brief explanation of all configuration options. +\fBPrivoxy\fR uses the concept of \fBactions\fR +in order to manipulate the data stream between the browser and remote sites. +There are various actions available with specific functions for such things +as blocking web sites, managing cookies, etc. These actions can be invoked +individually or combined, and used against individual URLs, or groups of URLs +that can be defined using wildcards and regular expressions. The result is +that the user has greatly enhanced control and freedom. .PP The actions list (ad blocks, etc) can also be configured with your -web browser at http://ijbswa.sourceforge.net/config. +web browser at http://config.privoxy.org/. \fBPrivoxy's\fR configuration parameters can also be viewed at the same page. In addition, \fBPrivoxy\fR can be toggled on/off. -This is an internal page. +This is an internal page, and does not require Internet access. +.PP +See the \fIUser Manual\fR for a detailed +explanation of installation, general usage, all configuration options, new +features and notes on upgrading. .SH "SAMPLE CONFIGURATION" .PP -A brief example of what a \fIdefault.action\fR configuration -might look like: +A brief example of what a simple \fIdefault.action\fR +configuration might look like: .nf - # Define a few useful custom aliases for later use {{alias}} - # Don't accept cookies - +no-cookies = +no-cookies-set +no-cookies-read + # Useful aliases that combine more than one action + +crunch-cookies = +crunch-incoming-cookies +crunch-outgoing-cookies + -crunch-cookies = -crunch-incoming-cookies -crunch-outgoing-cookies + +block-as-image = +block +handle-as-image - # Do accept cookies - -no-cookies = -no-cookies-set -no-cookies-read + # Fragile sites should have the minimum changes + fragile = -block -deanimate-gifs -fast-redirects -filter \\ + -hide-referer -prevent-cookies -kill-popups - # Treat these blocked URLs as images. - +imageblock = +block +image + ## Turn some actions on ################################ + ## NOTE: Actions are off by default, unless explictily turned on + ## otherwise with the '+' operator. - # Define page filters we want to use. - myfilters = +filter{html-annoyances} +filter{js-annoyances}\\ - +filter{no-popups} +filter{webbugs} +{ \\ +-add-header \\ +-block \\ +-content-type-overwrite \\ +-crunch-client-header \\ +-crunch-if-none-match \\ +-crunch-outgoing-cookies \\ +-crunch-incoming-cookies \\ +-crunch-server-header \\ ++deanimate-gifs{last} \\ +-downgrade-http-version \\ +-fast-redirects \\ +-filter{js-annoyances} \\ +-filter{js-events} \\ +-filter{html-annoyances} \\ +-filter{content-cookies} \\ ++filter{refresh-tags} \\ +-filter{unsolicited-popups} \\ +-filter{all-popups} \\ +-filter{img-reorder} \\ +-filter{banners-by-size} \\ +-filter{banners-by-link} \\ ++filter{webbugs} \\ +-filter{tiny-textforms} \\ ++filter{jumping-windows} \\ +-filter{frameset-borders} \\ +-filter{demoronizer} \\ +-filter{shockwave-flash} \\ +-filter{quicktime-kioskmode} \\ +-filter{fun} \\ +-filter{crude-parental} \\ ++filter{ie-exploits} \\ +-filter{site-specifics} \\ +-filter{google} \\ +-filter{yahoo} \\ +-filter{msn} \\ +-filter{blogspot} \\ +-filter{xml-to-html} \\ +-filter{html-to-xml} \\ +-filter{no-ping} \\ +-filter{hide-tor-exit-notation} \\ +-filter-client-headers \\ +-filter-server-headers \\ +-force-text-mode \\ +-handle-as-empty-document +-handle-as-image \\ +-hide-accept-language \\ +-hide-content-disposition \\ +-hide-if-modified-since \\ ++hide-forwarded-for-headers \\ ++hide-from-header{block} \\ ++hide-referrer{forge} \\ +-hide-user-agent \\ +-inspect-jpegs \\ +-kill-popups \\ +-limit-connect \\ +-overwrite-last-modified \\ +-redirect \\ ++prevent-compression \\ +-send-vanilla-wafer \\ +-send-wafer \\ ++session-cookies-only \\ ++set-image-blocker{pattern} \\ +-treat-forbidden-connects-like-blocks \\ +} +/ # '/' Match *all* URL patterns - ## Default Policies (actions) ############################ - { \\ - -block \\ - -downgrade \\ - +fast-redirects \\ - myfilters \\ - +no-compression \\ - +hide-forwarded \\ - +hide-from{block} \\ - +hide-referer{forge} \\ - -hide-user-agent \\ - -image \\ - +image-blocker{blank} \\ - +no-cookies-keep \\ - -no-cookies-read \\ - -no-cookies-set \\ - +no-popups \\ - -vanilla-wafer \\ - -wafer \\ - } - / + + # Block all URLs that match these patterns + { +block } + ad. + ad[sv]. + .*ads. + banner?. + /.*count(er)?\\.(pl|cgi|exe|dll|asp|php[34]?) + .hitbox.com + media./.*(ads|banner) - # Now set exceptions to the above defined policies ####### + # Block, and treat these URL patterns as if they were 'images'. + # We would expect these to be ads. + { +block-as-image } + .ad.doubleclick.net + .a[0-9].yimg.com/(?:(?!/i/).)*$ + ad.*.doubleclick.net - # Sites where we want persistant cookies - {-no-cookies -no-cookies-keep} - .redhat.com - .sun.com - .yahoo.com - .msdn.microsoft.com + # Make exceptions for these harmless ones that would be + # caught by our +block patterns just above. + { -block } + adsl. + adobe. + advice. + .*downloads. + # uploads or downloads + /.*loads +.fi +.PP +Then for a \fIuser.action\fR, we would put local, +narrowly defined exceptions: - # This site requires cookies AND 'fast-redirects' on - {-no-cookies -no-cookies-keep -fast-redirects} - .nytimes.com +.nf + # Re-define aliases as needed here + {{alias}} - # Add custom headers, and turn off filtering of page source - {+add-header{X-Privacy: Yes please} #-add-header{*} \\ - +add-header{X-User-Tracking: No thanks!} -filter} - privacy.net + # Useful aliases + -crunch-cookies = -crunch-incoming-cookies -crunch-outgoing-cookies + + # Set personal exceptions to the policies in default.action ####### - # Block, and treat these URLs as 'images'. - {+imageblock} - .adforce.imgis.com - .ad.preferences.com/image.* - .ads.web.aol.com - .ad-adex3.flycast.com - .ad.doubleclick.net - .ln.doubleclick.net - .ad.de.doubleclick.net - /.*/count\\.cgi\\?.*df= - 194.221.183.22[1-7] - a196.g.akamai.net/7/196/2670/000[12]/images.gmx.net/i4/images/.*/ + # Sites where we want persistent cookies, so allow *all* cookies + { -crunch-cookies -session-cookies-only } + .redhat.com + .sun.com + .msdn.microsoft.com + + # These sites breaks easily. Use our "fragile" alias here. + { fragile } + .forbes.com + mybank.example.com - # Block any URLs that match these patterns - {+block} - /.*/(.*[-_.])?ads?[0-9]?(/|[-_.].*|\\.(gif|jpe?g)) - /.*/(plain|live|rotate)[-_.]?ads?/ - /.*/(sponsor)s?[0-9]?/ - /.*/ad(server|stream|juggler)\\.(cgi|pl|dll|exe) - /.*/adbanners/ - /.*/adv((er)?ts?|ertis(ing|ements?))?/ - /.*/banners?/ - /.*/popupads/ - /.*/advert[0-9]+\\.jpg - /ad_images/ - /.*/ads/ - /images/.*/.*_anim\\.gif - /rotations/ - /.*(ms)?backoff(ice)?.*\\.(gif|jpe?g) - 195.63.104.*/(inbox|log|meld|folderlu|folderru|log(in|out)[lmr]u|) - .images.nytimes.com - .images.yahoo.com/adv/ - /.*cnnstore\\.gif + # Replace example.com's style sheet with one of my choosing + { +redirect{http://localhost/css-replacements/example.com.css} } + example.com/stylesheet.css .fi .PP See the comments in the configuration files themselves, or the -\fIuser-manual\fR -for explanations of the above syntax, and other \fBPrivoxy\fR +\fIUser Manual\fR +for full explanations of the above syntax, and other \fBPrivoxy\fR configuration options. .SH "FILES" @@ -216,18 +277,18 @@ configuration options. \fI/usr/sbin/privoxy\fR \fI/etc/privoxy/config\fR \fI/etc/privoxy/default.action\fR - \fI/etc/privoxy/advanced.action\fR - \fI/etc/privoxy/basic.action\fR - \fI/etc/privoxy/intermediate.action\fR + \fI/etc/privoxy/standard.action\fR + \fI/etc/privoxy/user.action\fR \fI/etc/privoxy/default.filter\fR + \fI/etc/privoxy/user.filter\fR \fI/etc/privoxy/trust\fR \fI/etc/privoxy/templates/*\fR \fI/var/log/privoxy/logfile\fR .fi .PP Various other files should be included, but may vary depending on platform -and build configuration. More documentation should be included in the local -documentation directory, though is not complete at this time. +and build configuration. Additional documentation should be included in the local +documentation directory. .SH "SIGNALS" .PP \fBPrivoxy\fR terminates on the \fBSIGINT\fR, @@ -239,11 +300,8 @@ config file changes by \fBSIGHUP\fR -- it will detect them automatically. .SH "NOTES" .PP -This is a beta version of \fBPrivoxy\fR. Not -all features are well tested. -.PP -Please see the \fIuser-manual\fR on how to contact the -developers for feature requests, reporting problems, and other questions. +Please see the \fIUser Manual\fR on how to contact the +developers, for feature requests, reporting problems, and other questions. .SH "SEE ALSO" .PP Other references and sites of interest to \fBPrivoxy\fR @@ -251,61 +309,74 @@ users: .PP http://www.privoxy.org/, -The \fBPrivoxy\fR Home page. +the \fBPrivoxy\fR Home page. + +http://www.privoxy.org/faq/, +the \fBPrivoxy\fR FAQ. -http://sourceforge.net/projects/ijbswa, +http://sourceforge.net/projects/ijbswa/, the Project Page for \fBPrivoxy\fR on -Sourceforge. +SourceForge. + +http://config.privoxy.org/, +the web-based user interface. \fBPrivoxy\fR must be +running for this to work. Shortcut: http://p.p/ + +http://sourceforge.net/tracker/?group_id=11118&atid=460288, to submit ``misses'' and other +configuration related suggestions to the developers. -http://p.p/, access -\fBPrivoxy\fR from your browser. Alternately, -http://config.privoxy.org -may work in some situations where the first does not. +http://www.junkbusters.com/ht/en/cookies.html, +an explanation how cookies are used to track web users. -http://p.p/ -to submit ``misses'' to the developers. +http://www.junkbusters.com/ijb.html, +the original Internet Junkbuster. -http://www.junkbusters.com/ht/en/cookies.html +http://privacy.net/, a useful site +to check what information about you is leaked while you browse the web. -http://www.waldherr.org/junkbuster/ +http://www.squid-cache.org/, a very popular +caching proxy, which is often used together with \fBPrivoxy\fR. -http://privacy.net/analyze/ +http://tor.eff.org/, +\fBTor\fR can help anonymize web browsing, +web publishing, instant messaging, IRC, SSH, and other applications. -http://www.squid-cache.org/ +http://www.privoxy.org/developer-manual/, +the \fBPrivoxy\fR developer manual. .SH "DEVELOPMENT TEAM" .nf - Stefan Waldherr - Andreas Oesterhelt - Jon Foster - Markus Breitenbach - Thomas Steudten - David Schmidt (OS/2, Mac OSX ports) - Gabriel L. Somlo - Hal Burgiss (docs) - Haroon Rafique - John Venvertloh - Joerg Strohmayer - Rodney Stromlund - Rodrigo Barbosa (RPM specfiles) - Sarantis Paskalis - Shamim Mohamed - Gábor Lipták - Alexander Lazic + Fabian Keil, developer + David Schmidt, developer + + Hal Burgiss + Ian Cummings + Roland Rosenfeld .fi .SH "COPYRIGHT AND LICENSE" +.SS "COPYRIGHT" +.PP +Copyright (C) 2001 - 2006 by Privoxy Developers +.PP +Some source code is based on code Copyright (C) 1997 by Anonymous Coders +and Junkbusters, Inc. and licensed under the \fIGNU General Public +License\fR. +.SS "LICENSE" .PP \fBPrivoxy\fR is free software; you can -redistribute it and/or modify it under the terms of the GNU General Public -License as published by the Free Software Foundation; either version 2 of the -License, or (at your option) any later version. +redistribute it and/or modify it under the terms of the +\fIGNU General Public +License\fR, version 2, as published by the Free Software Foundation. .PP This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or -FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for -more details, which is available from the Free Software Foundation, Inc, 59 -Temple Place - Suite 330, Boston, MA 02111-1307, USA. +FITNESS FOR A PARTICULAR PURPOSE. See the +\fIGNU General Public License\fR for +more details, which is available from the Free Software Foundation, Inc, +51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA .PP -You should have received a copy of the GNU General Public License -along with this program; if not, write to the Free Software Foundation, Inc., -59 Temple Place, Suite 330, Boston, MA 02111-1307 USA. +You should have received a copy of the \fIGNU General Public License\fR +along with this program; if not, write to the Free Software +Foundation, Inc. 51 Franklin Street, Fifth Floor +Boston, MA 02110-1301 +USA