From: Fabian Keil Date: Sat, 24 Nov 2007 19:07:17 +0000 (+0000) Subject: - Mention request rewriting. X-Git-Tag: v_3_0_7~31 X-Git-Url: http://www.privoxy.org/gitweb/?p=privoxy.git;a=commitdiff_plain;h=ccb2cc9ce5c57bf8e028cf95923a20b6ab6f5716 - Mention request rewriting. - Enable the conditional-forge paragraph. - Minor rewordings. --- diff --git a/doc/source/user-manual.sgml b/doc/source/user-manual.sgml index af55df16..de0723fb 100644 --- a/doc/source/user-manual.sgml +++ b/doc/source/user-manual.sgml @@ -33,7 +33,7 @@ This file belongs into ijbswa.sourceforge.net:/home/groups/i/ij/ijbswa/htdocs/ - $Id: user-manual.sgml,v 2.46 2007/11/17 17:24:44 fabiankeil Exp $ + $Id: user-manual.sgml,v 2.47 2007/11/18 14:59:47 fabiankeil Exp $ Copyright (C) 2001-2007 Privoxy Developers http://www.privoxy.org/ See LICENSE. @@ -59,7 +59,7 @@ -$Id: user-manual.sgml,v 2.46 2007/11/17 17:24:44 fabiankeil Exp $ +$Id: user-manual.sgml,v 2.47 2007/11/18 14:59:47 fabiankeil Exp $ block to delete the header unconditionally. @@ -5012,7 +5018,7 @@ new action Always blocking the referrer, or using a custom one, can lead to failures on servers that check the referrer before they answer any - requests, in an attempt to prevent their valuable content from being + requests, in an attempt to prevent their content from being embedded or linked to elsewhere. @@ -5051,7 +5057,7 @@ new action Typical use: - Conceal your type of browser and client operating system + Try to conceal your type of browser and client operating system @@ -5091,10 +5097,6 @@ new action order to customize their content for different browsers (which, by the way, is NOT the right thing to do: good web sites work browser-independently). - @@ -5134,14 +5136,11 @@ new action inspect-jpegs - Typical use: - To protect against the MS buffer over-run in JPEG processing + Try to protect against a MS buffer over-run in JPEG processing @@ -5180,12 +5179,13 @@ new action allow execution of code on the target system, giving an attacker access to the system in question by merely planting an altered JPEG image, which would have no obvious indications of what lurks inside. This action - prevents this exploit. + tries to prevent this exploit if delivered through unencrypted HTTP. - Note that the described exploit is only one of many, - using this action does not mean that you no longer - have to patch the client. + Note that the exploit mentioned is several years old + and it's unlikely that your client is still vulnerable + against it. This action may be removed in one of the + next releases. @@ -5280,13 +5280,9 @@ new action This action is most appropriate for browsers that don't have any controls for unwanted pop-ups. Not recommended for general usage. - - @@ -5354,8 +5350,7 @@ new action (https:// URLs) through proxies. It works very simply: the proxy connects to the server on the specified port, and then short-circuits its connections to the client and to the remote server. - This can be a big security hole, since CONNECT-enabled proxies can be - abused as TCP relays very easily. + This means CONNECT-enabled proxies can be used as TCP relays very easily. Privoxy relays HTTPS traffic without seeing @@ -9087,6 +9082,9 @@ In file: user.action [ View ] [ Edit ]