1PRIVOXY(1)                                                          PRIVOXY(1)
2
3
4

NAME

6       privoxy - Privacy Enhancing Proxy
7

SYNOPSIS

9       privoxy  [--chroot  ] [--config-test ] [--help ] [--no-daemon ] [--pid‐
10       file pidfile ] [--pre-chroot-nslookup hostname ] [--user user[.group] ]
11       [--version ] [configfile ]
12
13

OPTIONS

15       Privoxy may be invoked with the following command line options:
16
17       --chroot
18              Before  changing  to  the  user  ID  given in the --user option,
19              chroot to that user's home directory, i.e. make the kernel  pre‐
20              tend  to  the  Privoxy  process  that  the directory tree starts
21              there. If set up carefully, this can limit the impact of  possi‐
22              ble  vulnerabilities  in  Privoxy to the files contained in that
23              hierarchy.
24
25       --config-test
26              Exit after loading the configuration files before binding to the
27              listen address. The exit code signals whether or not the config‐
28              uration files have been successfully loaded.
29
30              If the exit code is 1, at least one of the  configuration  files
31              is  invalid,  if  it is 0, all the configuration files have been
32              successfully loaded (but may still contain errors that can  cur‐
33              rently only be detected at run time).
34
35              This  option  doesn't  affect  the log setting, combination with
36              "--no-daemon" is recommended if a configured log file  shouldn't
37              be used.
38
39       --help Print brief usage info and exit.
40
41       --no-daemon
42              Don't   become   a  daemon,  i.e.  don't fork and become process
43              group leader, don't detach from controlling tty, and do all log‐
44              ging there.
45
46       --pidfile pidfile
47              On startup, write the process ID to pidfile.  Delete the pidfile
48              on exit.  Failure to create or delete the pidfile is  non-fatal.
49              If no --pidfile option is given, no PID file will be used.
50
51       --pre-chroot-nslookup hostname
52              Initialize   the   resolver   library   using   hostname  before
53              chroot'ing. On some systems this reduces  the  number  of  files
54              that must be copied into the chroot tree.
55
56       --user user[.group]
57              After  (optionally)  writing the PID file, assume the user ID of
58              user and the GID of group, or, if the  optional  group  was  not
59              given, the default group of user. Exit if the privileges are not
60              sufficient to do so.
61
62       --version
63              Print version info and exit.
64
65       If the configfile is not specified  on   the   command   line,  Privoxy
66       will  look for a file named config in the current directory. If no con‐
67       figfile is found, Privoxy will fail to start.
68

DESCRIPTION

70       Privoxy is a non-caching web proxy with advanced filtering capabilities
71       for  enhancing  privacy, modifying web page data and HTTP headers, con‐
72       trolling access, and removing ads and other  obnoxious  Internet  junk.
73       Privoxy  has  a  flexible  configuration  and can be customized to suit
74       individual needs and tastes.  It has application for  both  stand-alone
75       systems and multi-user networks.
76
77       Privoxy is Free Software and licensed under the GNU GPLv2.
78
79       Privoxy  is  an  associated  project of Software in the Public Interest
80       (SPI).
81
82       Helping hands and donations are welcome:
83
84       · https://www.privoxy.org/faq/general.html#PARTICIPATE
85
86       · https://www.privoxy.org/faq/general.html#DONATE
87

INSTALLATION AND USAGE

89       Browsers can either be individually configured to use Privoxy as a HTTP
90       proxy (recommended), or Privoxy can be combined with a packet filter to
91       build an intercepting proxy (see config).  The default setting is   for
92       localhost,   on  port  8118 (configurable in the main config file).  To
93       set the HTTP proxy in Firefox, go  through:  Tools;  Options;  General;
94       Connection Settings; Manual Proxy Configuration.
95
96       For  Internet Explorer, go through: Tools; Internet Properties; Connec‐
97       tions; LAN Settings.
98
99       The Secure (SSL) Proxy should also be set to the same values, otherwise
100       https:  URLs will not be proxied. Note: Privoxy can only proxy HTTP and
101       HTTPS traffic. Do not try  it  with  FTP  or  other  protocols.   HTTPS
102       presents  some  limitations,  and not all features will work with HTTPS
103       connections.
104
105       For other browsers, check the documentation.
106

CONFIGURATION

108       Privoxy can be configured with the  various  configuration  files.  The
109       default configuration files are: config, default.filter, default.action
110       and default.action. user.action should  be  used  for  locally  defined
111       exceptions to the default rules in match-all.action and default.action,
112       and user.filter for locally defined filters. These are well  commented.
113       On  Unix  and  Unix-like systems, these are located in /etc/privoxy/ by
114       default.
115
116       Privoxy uses the concept of actions in order  to  manipulate  the  data
117       stream between the browser and remote sites.  There are various actions
118       available with specific functions  for  such  things  as  blocking  web
119       sites, managing cookies, etc. These actions can be invoked individually
120       or combined, and used against individual URLs, or groups of  URLs  that
121       can  be  defined using wildcards and regular expressions. The result is
122       that the user has greatly enhanced control and freedom.
123
124       The actions list (ad blocks, etc) can also be configured with your  web
125       browser   at  http://config.privoxy.org/  (assuming  the  configuration
126       allows it).  Privoxy's configuration parameters  can also  be viewed at
127       the  same page. In addition, Privoxy can be toggled on/off.  This is an
128       internal page, and does not require Internet access.
129
130       See the User Manual for a detailed explanation of installation, general
131       usage, all configuration options, new features and notes on upgrading.
132

FILES

134        /usr/sbin/privoxy
135        /etc/privoxy/config
136        /etc/privoxy/match-all.action
137        /etc/privoxy/default.action
138        /etc/privoxy/user.action
139        /etc/privoxy/default.filter
140        /etc/privoxy/user.filter
141        /etc/privoxy/trust
142        /etc/privoxy/templates/*
143        /var/log/privoxy/logfile
144
145       Various other files should be included, but may vary depending on plat‐
146       form  and  build  configuration.  Additional  documentation  should  be
147       included in the local documentation directory.
148

SIGNALS

150       Privoxy  terminates  on  the  SIGINT  and SIGTERM signals. Log rotation
151       scripts may cause a re-opening of the logfile by sending  a  SIGHUP  to
152       Privoxy.  Note  that unlike other daemons,  Privoxy does not need to be
153       made aware of config file changes by SIGHUP  --  it  will  detect  them
154       automatically.  Signals other than the ones listed above aren't explic‐
155       itly handled and result in the default action defined by the  operating
156       system.
157

NOTES

159       Please  see  the User Manual on how to contact the developers, for fea‐
160       ture requests, reporting problems, and other questions.
161

SEE ALSO

163       Other references and sites of interest to Privoxy users:
164
165       https://www.privoxy.org/, the Privoxy Home page.
166
167       https://www.privoxy.org/faq/, the Privoxy FAQ.
168
169       https://www.privoxy.org/developer-manual/, the Privoxy  developer  man‐
170       ual.
171
172       https://sourceforge.net/projects/ijbswa/,  the Project Page for Privoxy
173       on SourceForge.
174
175       http://config.privoxy.org/, the web-based user interface. Privoxy  must
176       be running for this to work. Shortcut: http://p.p/
177
178       https://sourceforge.net/tracker/?group_id=11118&atid=460288,  to submit
179       ``misses'' and other configuration related suggestions to the  develop‐
180       ers.
181

DEVELOPMENT TEAM

183        Fabian Keil, lead developer
184        David Schmidt
185        Hal Burgiss
186        Lee Rian
187        Roland Rosenfeld
188        Ian Silvester
189
191   COPYRIGHT
192       Copyright    (C)    2001-2016    by    Privoxy   Developers   <privoxy-
193       devel@lists.privoxy.org>
194
195       Some source code is based on  code  Copyright  (C)  1997  by  Anonymous
196       Coders  and Junkbusters, Inc. and licensed under the GNU General Public
197       License.
198
199   LICENSE
200       Privoxy is free software; you can  redistribute  it  and/or  modify  it
201       under  the  terms of the GNU General Public License, version 2, as pub‐
202       lished by the Free Software Foundation.
203
204       Privoxy is distributed in the hope that it will be useful, but  WITHOUT
205       ANY  WARRANTY;  without even the implied warranty of MERCHANTABILITY or
206       FITNESS FOR A PARTICULAR PURPOSE.  See the  license for details.
207
208
209
210Privoxy 3.0.26                  26 August 2016                      PRIVOXY(1)
Impressum