From 51bb796496dc39c543c7e45fada5777bb25f094d Mon Sep 17 00:00:00 2001 From: hal9 Date: Thu, 25 Apr 2002 14:45:25 +0000 Subject: [PATCH] More updates for multipe actions files, etc. --- doc/source/privoxy-man-page.sgml | 165 +++++++++++++++---------------- 1 file changed, 79 insertions(+), 86 deletions(-) diff --git a/doc/source/privoxy-man-page.sgml b/doc/source/privoxy-man-page.sgml index ee3364fd..8b22861f 100644 --- a/doc/source/privoxy-man-page.sgml +++ b/doc/source/privoxy-man-page.sgml @@ -5,7 +5,7 @@ This file belongs into ijbswa.sourceforge.net:/home/groups/i/ij/ijbswa/htdocs/ - $Id: privoxy-man-page.sgml,v 1.7 2002/04/12 23:07:40 hal9 Exp $ + $Id: privoxy-man-page.sgml,v 1.8 2002/04/24 04:53:37 hal9 Exp $ Written by and Copyright (C) 2001 the SourceForge Privoxy team. http://www.privoxy.org/ @@ -40,7 +40,7 @@ --> + @@ -205,11 +205,14 @@ Privoxy can be configured with the various configuration files. The default configuration files are: config, - default.action, and - default.filter. These are well commented. On Unix and - Unix-like systems, these are located in /etc/privoxy/ by - default. On Windows, OS/2 and AmigaOS, these files are in the same directory - as the Privoxy executable. + default.filter, and + default.action. user.action should + be used for locally defined exceptions to the default rules of + default.action These are all well commented. On Unix + and Unix-like systems, these are located in + /etc/privoxy/ by default. On Windows, OS/2 and AmigaOS, + these files are in the same directory as the Privoxy + executable. The name and number of configuration files has changed from previous @@ -231,100 +234,90 @@ Sample Configuration - A brief example of what a default.action configuration - might look like: + A brief example of what a simple default.action + configuration might look like: - # Define a few useful custom aliases for later use {{alias}} - # Don't accept cookies - +no-cookies = +no-cookies-set +no-cookies-read - - # Do accept cookies - -no-cookies = -no-cookies-set -no-cookies-read + # Useful aliases + +prevent-cookies = +prevent-setting-cookies +prevent-reading-cookies + -prevent-cookies = -prevent-setting-cookies -prevent-reading-cookies + +imageblock = +block +handle-as-image - # Treat these blocked URLs as images. - +imageblock = +block +image + # Fragile sites should have the minimum changes + fragile = -block -deanimate-gifs -fast-redirects -filter \ + -hide-referer -prevent-cookies -kill-popups - # Define page filters we want to use. - myfilters = +filter{html-annoyances} +filter{js-annoyances}\ - +filter{no-popups} +filter{webbugs} - - ## Default Policies (actions) ############################ + ## Turn some actions on ################################ { \ - -block \ - -downgrade \ - +fast-redirects \ - myfilters \ - +no-compression \ - +hide-forwarded \ - +hide-from{block} \ - +hide-referer{forge} \ - -hide-user-agent \ - -image \ - +image-blocker{blank} \ - +no-cookies-keep \ - -no-cookies-read \ - -no-cookies-set \ - +no-popups \ - -vanilla-wafer \ - -wafer \ + -add-header \ + -block \ + +deanimate-gifs{last} \ + -downgrade-http-version \ + -fast-redirects \ + +filter{html-annoyances} \ + +filter{js-annoyances} \ + +filter{content-cookies} \ + +filter{webbugs} \ + +filter{banners-by-size} \ + +hide-forwarded-for-headers \ + +hide-from-header{block} \ + +hide-referrer{forge} \ + -hide-user-agent \ + -handle-as-image \ + +set-image-blocker{pattern} \ + -limit-connect \ + +prevent-compression \ + +session-cookies-only \ + +prevent-reading-cookies \ + +prevent-setting-cookies \ + -kill-popups \ } - / + / # Match all URLs + + # Block, and treat these URL patterns as if they were 'images'. + {+imageblock} + .ad.doubleclick.net + .a[0-9].yimg.com/(?:(?!/i/).)*$ + ad.*.doubleclick.net - # Now set exceptions to the above defined policies ####### + # Block any URLs that match these patterns + {+block} + ad*. + .*ads. + banner?. + /.*count(er)?\.(pl|cgi|exe|dll|asp|php[34]?) + /(?:.*/)?(publicite|werbung|rekla(ma|me|am)|maino(kset|nta|s)?)/ + .hitbox.com + + # Make exceptions for these harmless ones that would be + # caught by +block above. + {-block} + adsl. + advice. + .*downloads. + + + + + Then for a user.action, we would put local, + narrowly defined exceptions: + + + + # Set personal exceptions to the policies in default.action ####### # Sites where we want persistant cookies - {-no-cookies -no-cookies-keep} + {-prevent-reading-cookies -prevent-setting-cookies -session-cookies-only} .redhat.com .sun.com - .yahoo.com .msdn.microsoft.com - - # This site requires cookies AND 'fast-redirects' on - {-no-cookies -no-cookies-keep -fast-redirects} - .nytimes.com - - # Add custom headers, and turn off filtering of page source - {+add-header{X-Privacy: Yes please} #-add-header{*} \ - +add-header{X-User-Tracking: No thanks!} -filter} - privacy.net - - # Block, and treat these URLs as 'images'. - {+imageblock} - .ad.preferences.com/image.* - .ads.web.aol.com - .ad-adex3.flycast.com - .ad.doubleclick.net - .ln.doubleclick.net - .ad.de.doubleclick.net - /.*/count\.cgi\?.*df= - 194.221.183.22[1-7] - a196.g.akamai.net/7/196/2670/000[12]/images.gmx.net/i4/images/.*/ - - # Block any URLs that match these patterns - {+block} - /.*/(.*[-_.])?ads?[0-9]?(/|[-_.].*|\.(gif|jpe?g)) - /.*/(plain|live|rotate)[-_.]?ads?/ - /.*/(sponsor)s?[0-9]?/ - /.*/ad(server|stream|juggler)\.(cgi|pl|dll|exe) - /.*/adbanners/ - /.*/adv((er)?ts?|ertis(ing|ements?))?/ - /.*/banners?/ - /.*/popupads/ - /.*/advert[0-9]+\.jpg - /ad_images/ - /.*/ads/ - /images/.*/.*_anim\.gif - /rotations/ - /.*(ms)?backoff(ice)?.*\.(gif|jpe?g) - 195.63.104.*/(inbox|log|meld|folderlu|folderru|log(in|out)[lmr]u|) - .images.nytimes.com - .images.yahoo.com/adv/ - /.*cnnstore\.gif + + {-block -fast-redirects} + .forbes.com @@ -407,7 +400,7 @@ Copyright and License - + ©right; -- 2.39.2