


User Commands					       PRIVOXY(1)



NAME
     privoxy - Privacy Enhancing Proxy

SYNOPSIS
     privoxy [--help ] [--version  ]  [--no-daemon  ]  [--pidfile
     pidfile  ]	[--user	user[.group] ] [--chroot ] [--pre-chroot-
     nslookup hostname ] [configfile ]


OPTIONS
     Privoxy may be  invoked  with  the	 following  command  line
     options:

     --help
	  Print	brief usage info and exit.

     --version
	  Print	version	info and exit.

     --no-daemon
	  Don't	 become	 a daemon, i.e.	 don't	fork  and  become
	  process  group  leader,  don't  detach from controlling
	  tty, and do all logging there.

     --pidfile pidfile
	  On startup, write the	process	ID  to	pidfile.   Delete
	  the  pidfile	on exit.  Failure to create or delete the
	  pidfile is non-fatal.	If no --pidfile	option is  given,
	  no PID file will be used.

     --user user[.group]
	  After	(optionally) writing the  PID  file,  assume  the
	  user	ID  of	user  and  the	GID  of	group, or, if the
	  optional group was not  given,  the  default	group  of
	  user.	 Exit  if the privileges are not sufficient to do
	  so.

     --chroot
	  Before changing to the user  ID  given  in  the  --user
	  option, chroot to that user's	home directory,	i.e. make
	  the kernel pretend to	 the  Privoxy  process	that  the
	  directory  tree starts there.	If set up carefully, this
	  can limit the	impact	of  possible  vulnerabilities  in
	  Privoxy to the files contained in that hierarchy.

     --pre-chroot-nslookup hostname
	  Initialize the resolver library using	 hostname  before
	  chroot'ing.  On some systems this reduces the	number of
	  files	that must be copied into the chroot tree.

     If	the configfile is not specified	on  the	  command   line,
     Privoxy   will   look for a file named config in the current



Privoxy	3.0.8	  Last change: 19 January 2008			1






User Commands					       PRIVOXY(1)



     directory . If no configfile is found, Privoxy will fail  to
     start.

DESCRIPTION
     Privoxy is	a non-caching web proxy	with  advanced	filtering
     capabilities for enhancing	privacy, modifying web page data,
     managing HTTP cookies, controlling	access,	and removing ads,
     banners,  pop-ups and other obnoxious Internet junk. Privoxy
     has a flexible configuration and can be customized	 to  suit
     individual	 needs	and  tastes.  Privoxy has application for
     both stand-alone systems and multi-user networks.

     Privoxy is	based on Internet Junkbuster (tm).

INSTALLATION AND USAGE
     Browsers  can  either  be	individually  configured  to  use
     Privoxy  as  a  HTTP  proxy (recommended),	or Privoxy can be
     combined with a packet filter to build an intercepting proxy
     (see  config).   The  default setting is  for localhost,  on
     port  8118	(configurable in the main config file).	  To  set
     the  HTTP	proxy in Netscape and Mozilla, go through:  Edit;
     Preferences;  Advanced; Proxies;	Manual	Proxy  Configura-
     tion; View.

     For Firefox, go through: Tools; Options; General; Connection
     Settings; Manual Proxy Configuration.

     For Internet Explorer, go through:	Tools;	Internet  Proper-
     ties; Connections;	LAN Settings.

     The Secure	(SSL) Proxy  should  also  be  set  to	the  same
     values,  otherwise	 https:	 URLs  will not	be proxied. Note:
     Privoxy can only proxy HTTP and HTTPS traffic. Do not try it
     with  FTP	or  other protocols.  HTTPS presents some limita-
     tions, and	not all	features will  work  with  HTTPS  connec-
     tions.

     For other browsers, check the documentation.

CONFIGURATION
     Privoxy can be configured	with  the  various  configuration
     files.   The   default   configuration  files  are:  config,
     default.filter, and default.action.  user.action  should  be
     used  for locally defined exceptions to the default rules of
     default.action, and user.filter for locally defined filters.
     These  are	 well  commented.  On Unix and Unix-like systems,
     these are located in /etc/privoxy/	by default.

     Privoxy uses the concept of actions in order  to  manipulate
     the data stream between the browser and remote sites.  There
     are various actions available with	 specific  functions  for
     such  things  as  blocking	web sites, managing cookies, etc.



Privoxy	3.0.8	  Last change: 19 January 2008			2






User Commands					       PRIVOXY(1)



     These actions can be invoked individually or  combined,  and
     used  against individual URLs, or groups of URLs that can be
     defined using wildcards and regular expressions. The  result
     is	that the user has greatly enhanced control and freedom.

     The actions list (ad blocks, etc)	can  also  be  configured
     with  your	web browser at http://config.privoxy.org/ (assum-
     ing the configuration allows it).	 Privoxy's  configuration
     parameters	  can  also  be	viewed at the same page. In addi-
     tion, Privoxy can be toggled on/off.  This	 is  an	 internal
     page, and does not	require	Internet access.

     See the User Manual for a detailed	explanation of	installa-
     tion, general usage, all configuration options, new features
     and notes on upgrading.

SAMPLE CONFIGURATION
     A brief example of	what a simple  default.action  configura-
     tion might	look like:

      #	Define a few useful custom aliases for later use
      {{alias}}

      #	Useful aliases that combine more than one action
      +crunch-cookies =	+crunch-incoming-cookies +crunch-outgoing-cookies
      -crunch-cookies =	-crunch-incoming-cookies -crunch-outgoing-cookies
      +block-as-image =	+block +handle-as-image

      #	Fragile	sites should have the minimum changes
      fragile	  = -block -deanimate-gifs -fast-redirects -filter \
		    -hide-referer -prevent-cookies -kill-popups

      ## Turn some actions on ################################
      ## NOTE: Actions are off by default, unless explictily turned on
      ## otherwise with	the '+'	operator.

     { \
     +deanimate-gifs{last} \
     +filter{refresh-tags} \
     +filter{img-reorder} \
     +filter{banners-by-size} \
     +filter{webbugs} \
     +filter{jumping-windows} \
     +filter{ie-exploits} \
     +hide-forwarded-for-headers \
     +hide-from-header{block} \
     +hide-referrer{conditional-block} \
     +session-cookies-only \
     +set-image-blocker{pattern} \
     }
     / # '/' Match *all* URL patterns




Privoxy	3.0.8	  Last change: 19 January 2008			3






User Commands					       PRIVOXY(1)




      #	Block all URLs that match these	patterns
      {	+block }
       ad.
       ad[sv].
       .*ads.
       banner?.
       /.*count(er)?\.(pl|cgi|exe|dll|asp|php[34]?)
       .hitbox.com
       media./.*(ads|banner)

      #	Block, and treat these URL patterns as if they were 'images'.
      #	We would expect	these to be ads.
      {	+block-as-image	}
       .ad.doubleclick.net
       .a[0-9].yimg.com/(?:(?!/i/).)*$
       ad.*.doubleclick.net

      #	Make exceptions	for these harmless ones	that would be
      #	caught by our +block patterns just above.
      {	-block }
       adsl.
       adobe.
       advice.
       .*downloads.
       # uploads or downloads
       /.*loads

     Then for a	user.action, we	would put local, narrowly defined
     exceptions:

      #	Re-define aliases as needed here
      {{alias}}

      #	Useful aliases
      -crunch-cookies =	-crunch-incoming-cookies -crunch-outgoing-cookies

      #	Set personal exceptions	to the policies	in default.action #######

      #	Sites where we want persistent cookies,	so allow *all* cookies
      {	-crunch-cookies	-session-cookies-only }
       .redhat.com
       .sun.com
       .msdn.microsoft.com

      #	These sites break easily. Use our "fragile" alias here.
      {	fragile	}
       .forbes.com
       mybank.example.com

      #	Replace	example.com's style sheet with one of my choosing
      {	+redirect{http://localhost/css-replacements/example.com.css} }



Privoxy	3.0.8	  Last change: 19 January 2008			4






User Commands					       PRIVOXY(1)



       .example.com/stylesheet.css

     See the comments in the configuration files  themselves,  or
     the  User	Manual for full	explanations of	the above syntax,
     and other Privoxy configuration options.

FILES

      /usr/sbin/privoxy
      /etc/privoxy/config
      /etc/privoxy/default.action
      /etc/privoxy/standard.action
      /etc/privoxy/user.action
      /etc/privoxy/default.filter
      /etc/privoxy/user.filter
      /etc/privoxy/trust
      /etc/privoxy/templates/*
      /var/log/privoxy/logfile

     Various other files should	be included, but may vary depend-
     ing on platform and build configuration. Additional documen-
     tation should be included in the local documentation  direc-
     tory.

SIGNALS
     Privoxy terminates	on the SIGINT, SIGTERM and  SIGABRT  sig-
     nals.  Log	 rotation  scripts  may	cause a	re-opening of the
     logfile by	sending	a SIGHUP to  Privoxy.  Note  that  unlike
     other  daemons,   Privoxy	does not need to be made aware of
     config file  changes  by  SIGHUP  --  it  will  detect  them
     automatically.

NOTES
     Please see	the User Manual	on how to contact the developers,
     for  feature  requests,  reporting	problems, and other ques-
     tions.

SEE ALSO
     Other references and sites	of interest to Privoxy users:

     http://www.privoxy.org/, the Privoxy Home page.

     http://www.privoxy.org/faq/, the Privoxy FAQ.

     http://sourceforge.net/projects/ijbswa/,  the  Project  Page
     for Privoxy on SourceForge.

     http://config.privoxy.org/, the  web-based	 user  interface.
     Privoxy   must  be	 running  for  this  to	 work.	Shortcut:
     http://p.p/

     http://sourceforge.net/tracker/?group_id=11118&atid=460288,



Privoxy	3.0.8	  Last change: 19 January 2008			5






User Commands					       PRIVOXY(1)



     to	submit ``misses'' and other configuration related sugges-
     tions to the developers.

     http://www.junkbusters.com/ht/en/cookies.html,  an	 explana-
     tion how cookies are used to track	web users.

     http://www.junkbusters.com/ijb.html, the  original	 Internet
     Junkbuster.

     http://privacy.net/, a useful site	to check what information
     about you is leaked while you browse the web.

     http://www.squid-cache.org/, a popular caching proxy,  which
     is	often used together with Privoxy.

     http://www.pps.jussieu.fr/~jch/software/polipo/, Polipo is	a
     caching proxy with	advanced features like pipelining, multi-
     plexing and caching of partial instances. In many setups  it
     can be used as Squid replacement.

     http://tor.eff.org/, Tor can help	anonymize  web	browsing,
     web  publishing,  instant	messaging,  IRC,  SSH,	and other
     applications.

     http://www.privoxy.org/developer-manual/,	  the	  Privoxy
     developer manual.

DEVELOPMENT TEAM
      Fabian Keil, lead	developer
      David Schmidt, developer

      Hal Burgiss
      Gerry Murphy
      Roland Rosenfeld
      Jrg Strohmayer

COPYRIGHT AND LICENSE
  COPYRIGHT
     Copyright	(C)  2001-2008	by  Privoxy  Developers	 <ijbswa-
     developers@lists.sourceforge.net>

     Some source code is based on  code	 Copyright  (C)	 1997  by
     Anonymous	Coders	and  Junkbusters, Inc. and licensed under
     the GNU General Public License.

  LICENSE
     Privoxy is	free software; you  can	 redistribute  it  and/or
     modify it under the terms of the GNU General Public License,
     version 2,	as published by	the Free Software Foundation.

     This program is distributed in the	hope that it will be use-
     ful,  but	WITHOUT	 ANY  WARRANTY;	 without even the implied



Privoxy	3.0.8	  Last change: 19 January 2008			6






User Commands					       PRIVOXY(1)



     warranty of MERCHANTABILITY or FITNESS FOR	A PARTICULAR PUR-
     POSE.   See the GNU General Public	License	for more details,
     which is available	from the Free Software	Foundation,  Inc,
     51	Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA

     You should	have received a	copy of	the  GNU  General  Public
     License  along with this program; if not, write to	the  Free
     Software Foundation, Inc. 51 Franklin  Street,  Fifth  Floor
     Boston, MA	02110-1301 USA














































Privoxy	3.0.8	  Last change: 19 January 2008			7



