1PRIVOXY(1)                                                          PRIVOXY(1)
2
3
4

NAME

6       privoxy - Privacy Enhancing Proxy
7

SYNOPSIS

9       privoxy  [--help  ]  [--version  ]  [--no-daemon ] [--pidfile pidfile ]
10       [--user user[.group] ] [--chroot ]  [--pre-chroot-nslookup  hostname  ]
11       [configfile ]
12
13

OPTIONS

15       Privoxy may be invoked with the following command line options:
16
17       --help Print brief usage info and exit.
18
19       --version
20              Print version info and exit.
21
22       --no-daemon
23              Don't   become   a  daemon,  i.e.  don't fork and become process
24              group leader, don't detach from controlling tty, and do all log‐
25              ging there.
26
27       --pidfile pidfile
28              On startup, write the process ID to pidfile.  Delete the pidfile
29              on exit.  Failure to create or delete the pidfile is  non-fatal.
30              If no --pidfile option is given, no PID file will be used.
31
32       --user user[.group]
33              After  (optionally)  writing the PID file, assume the user ID of
34              user and the GID of group, or, if the  optional  group  was  not
35              given, the default group of user. Exit if the privileges are not
36              sufficient to do so.
37
38       --chroot
39              Before changing to the user  ID  given  in  the  --user  option,
40              chroot  to that user's home directory, i.e. make the kernel pre‐
41              tend to the Privoxy  process  that  the  directory  tree  starts
42              there.  If set up carefully, this can limit the impact of possi‐
43              ble vulnerabilities in Privoxy to the files  contained  in  that
44              hierarchy.
45
46       --pre-chroot-nslookup hostname
47              Initialize   the   resolver   library   using   hostname  before
48              chroot'ing. On some systems this reduces  the  number  of  files
49              that must be copied into the chroot tree.
50
51       If  the  configfile  is  not  specified on  the  command  line, Privoxy
52       will  look for a file named config in the current directory. If no con‐
53       figfile is found, Privoxy will fail to start.
54

DESCRIPTION

56       Privoxy is a non-caching web proxy with advanced filtering capabilities
57       for enhancing privacy, modifying web page data and HTTP  headers,  con‐
58       trolling  access,  and  removing ads and other obnoxious Internet junk.
59       Privoxy has a flexible configuration and  can  be  customized  to  suit
60       individual  needs  and tastes.  It has application for both stand-alone
61       systems and multi-user networks.
62
63       Privoxy is Free Software and licensed under the GPL2.
64
65       Privoxy is an associated project of Software  in  the  Public  Interest
66       (SPI).  Donations are welcome.
67

INSTALLATION AND USAGE

69       Browsers can either be individually configured to use Privoxy as a HTTP
70       proxy (recommended), or Privoxy can be combined with a packet filter to
71       build  an intercepting proxy (see config).  The default setting is  for
72       localhost,  on port  8118 (configurable in the main config  file).   To
73       set  the  HTTP  proxy  in Firefox, go through: Tools; Options; General;
74       Connection Settings; Manual Proxy Configuration.
75
76       For Internet Explorer, go through: Tools; Internet Properties;  Connec‐
77       tions; LAN Settings.
78
79       The Secure (SSL) Proxy should also be set to the same values, otherwise
80       https: URLs will not be proxied. Note: Privoxy can only proxy HTTP  and
81       HTTPS  traffic.  Do  not  try  it  with  FTP or other protocols.  HTTPS
82       presents some limitations, and not all features will  work  with  HTTPS
83       connections.
84
85       For other browsers, check the documentation.
86

CONFIGURATION

88       Privoxy  can  be  configured  with the various configuration files. The
89       default configuration files are: config, default.filter, default.action
90       and  default.action.  user.action  should  be  used for locally defined
91       exceptions to the default rules in match-all.action and default.action,
92       and  user.filter for locally defined filters. These are well commented.
93       On Unix and Unix-like systems, these are located  in  /etc/privoxy/  by
94       default.
95
96       Privoxy  uses  the  concept  of actions in order to manipulate the data
97       stream between the browser and remote sites.  There are various actions
98       available  with  specific  functions  for  such  things as blocking web
99       sites, managing cookies, etc. These actions can be invoked individually
100       or  combined,  and used against individual URLs, or groups of URLs that
101       can be defined using wildcards and regular expressions. The  result  is
102       that the user has greatly enhanced control and freedom.
103
104       The  actions list (ad blocks, etc) can also be configured with your web
105       browser  at  http://config.privoxy.org/  (assuming  the   configuration
106       allows it).  Privoxy's configuration parameters  can also  be viewed at
107       the same page. In addition, Privoxy can be toggled on/off.  This is  an
108       internal page, and does not require Internet access.
109
110       See the User Manual for a detailed explanation of installation, general
111       usage, all configuration options, new features and notes on upgrading.
112

FILES

114        /usr/sbin/privoxy
115        /etc/privoxy/config
116        /etc/privoxy/match-all.action
117        /etc/privoxy/default.action
118        /etc/privoxy/user.action
119        /etc/privoxy/default.filter
120        /etc/privoxy/user.filter
121        /etc/privoxy/trust
122        /etc/privoxy/templates/*
123        /var/log/privoxy/logfile
124
125       Various other files should be included, but may vary depending on plat‐
126       form  and  build  configuration.  Additional  documentation  should  be
127       included in the local documentation directory.
128

SIGNALS

130       Privoxy terminates on the SIGINT,  SIGTERM  and  SIGABRT  signals.  Log
131       rotation  scripts  may  cause  a re-opening of the logfile by sending a
132       SIGHUP to Privoxy. Note that unlike other daemons,   Privoxy  does  not
133       need  to  be  made  aware  of  config file changes by SIGHUP -- it will
134       detect them automatically.
135

NOTES

137       Please see the User Manual on how to contact the developers,  for  fea‐
138       ture requests, reporting problems, and other questions.
139

SEE ALSO

141       Other references and sites of interest to Privoxy users:
142
143       http://www.privoxy.org/, the Privoxy Home page.
144
145       http://www.privoxy.org/faq/, the Privoxy FAQ.
146
147       http://www.privoxy.org/developer-manual/, the Privoxy developer manual.
148
149       https://sourceforge.net/projects/ijbswa/,  the Project Page for Privoxy
150       on SourceForge.
151
152       http://config.privoxy.org/, the web-based user interface. Privoxy  must
153       be running for this to work. Shortcut: http://p.p/
154
155       https://sourceforge.net/tracker/?group_id=11118&atid=460288,  to submit
156       ``misses'' and other configuration related suggestions to the  develop‐
157       ers.
158

DEVELOPMENT TEAM

160        Fabian Keil, lead developer
161        David Schmidt, developer
162
163        Hal Burgiss
164        Mark Miller
165        Gerry Murphy
166        Lee Rian
167        Roland Rosenfeld
168
170   COPYRIGHT
171       Copyright   (C)   2001-2010   by  Privoxy  Developers  <ijbswa-develop‐
172       ers@lists.sourceforge.net>
173
174       Some source code is based on  code  Copyright  (C)  1997  by  Anonymous
175       Coders  and Junkbusters, Inc. and licensed under the GNU General Public
176       License.
177
178   LICENSE
179       Privoxy is free software; you can  redistribute  it  and/or  modify  it
180       under  the  terms of the GNU General Public License, version 2, as pub‐
181       lished by the Free Software Foundation.
182
183       This program is distributed in the hope that it  will  be  useful,  but
184       WITHOUT  ANY  WARRANTY;  without  even  the  implied  warranty  of MER‐
185       CHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the  GNU General
186       Public License for details.
187
188       You should have received a copy of the GNU GPL along with this program;
189       if not, write to  the   Free  Software  Foundation,  Inc.  51  Franklin
190       Street, Fifth Floor Boston, MA 02110-1301 USA
191
192
193
194Privoxy 3.0.16                  13 Februar 2010                     PRIVOXY(1)
Impressum