| Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
| Name: privoxy | Distribution: openSUSE Tumbleweed |
| Version: 4.0.0 | Vendor: openSUSE |
| Release: 2.1 | Build date: Thu Mar 20 22:51:57 2025 |
| Group: Productivity/Networking/Web/Proxy | Build host: reproducible |
| Size: 1100661 | Source RPM: privoxy-4.0.0-2.1.src.rpm |
| Packager: https://bugs.opensuse.org | |
| Url: https://www.privoxy.org/ | |
| Summary: The Internet Junkbuster - HTTP Proxy Server | |
The Internet Junkbuster - HTTP Proxy Server: A non-caching HTTP proxy server that runs between a web browser and a web server and filters contents as described in the configuration files.
GPL-3.0-or-later
* Thu Mar 20 2025 Andreas Stieger <andreas.stieger@gmx.de>
- build with pcre2
* Tue Jan 28 2025 Carsten Ziepke <kieltux@gmail.com>
- Update to version 4.0.0:
Bug fixes:
* Add missing client-body-tagger data to the action_type_info[]
struct so lookups based on the action index work correctly
again. Prevents assertion failures or segfaults when trying to
edit an action file with the CGI editor.
The type of failure depended on whether or not assertions
were enabled and on whether or not Privoxy had been compiled
with FEATURE_EXTERNAL_FILTERS.
Regression introduced in Privoxy 3.0.34.
Patch submitted by Aaron Li in #940.
* Bump MAX_FILTER_TYPES which should have been done in d128e6aa4
when introducing the client-body-tagger{} action.
Prevents an assertion in cgi_edit_actions_for_url() from
triggering after e32d03e0 when using the CGI editor with
assertions enabled.
* is_untrusted_url(): Search the encrypted headers for the
Referer when the client is using https and https inspection
is enabled. Fixes the trust mechanism for https requests.
Reported by Laurent Caumont in #1767.
* GNUMakefile.in: Let the install target work if no group is
specified.
* GNUMakefile.in: Set GROUP_T when installing configuration
files as root and there is no privoxy user available so the
install target doesn't fail.
Patch by Fabrice Fontaine.
* GNUmakefile.in: Don't exit if configuration files are
installed as root as this can be considered acceptable when
cross-compiling Privoxy inside an autobuilder with only a
root user.
Patch by Fabrice Fontaine.
* configure.in: Fix argument types in gmtime_r() and
localtime_r() probes.
Otherwise these probes always fail with stricter compilers
even if there is C library support for these functions.
Patch submitted by Florian Weimer in SF#149.
* Fix socks4 and socks4a support under glibc's source
fortification. With glibc's source fortification, gcc offers
the compilation warning resulting in a runtime abort() when
using a socks4 or socks4a upstream proxy. Despite the warning,
the strlcpy() call in question is fine: gcc misidentifies the
size of the destination buffer, estimating to hold only a
single char while in fact the buffer stretches beyond the end
of the struct socks_op.
The issue was originally reported in the NixOS issue tracker
at https://github.com/NixOS/nixpkgs/issues/265654
prompted by an upgrade of glibc from 2.37-39 to 2.38-0.
Patch submitted by Ingo Blechschmid, joint work with
@esclear and @richi235.
General improvements:
* Allow to use wolfSSL for https inspection.
wolfSSL supports TLS 1.3 and can be significantly faster than
mbedTLS. Mainly tested on ElectroBSD amd64 where it can
compete with OpenSSL and LibreSSL:
https://www.fabiankeil.de/gehacktes/privoxy-tls-benchmarks/
To enable the support, install wolfSSL and run ./configure
with the --with-wolfssl option.
Sponsored by Privoxy project funds collected at SPI.
* Add an test framework that leverages the curl test suite.
Sponsored by Privoxy project funds collected at SPI.
* Add pcre2 support. Closes bug #935.
Initial patch submitted by Gagan Sidhu.
* Use SHA256 as hash algorithm for the certificate and key file
names instead of MD5. The known MD5 vulnerabilities shouldn't
matter for Privoxy's use case but it doesn't hurt to use a
hash algorithm that isn't deprecated.
Sponsored by: Robert Klemme
* Add support for mbedTLS 3.x. This removes a sanity check
(whether issuer key and issuer certificate match) that seems
overly cautious and fails to compile with mbedTLS 3.x as the
struct members are private. We don't have an equivalent check
in the OpenSSL or wolfSSL code either.
* Factor out newer_privoxy_version_required() and improve the
logic Previously 3.0.11 was considered newer than 4.0.0.
* init_error_log(): Include the reason for failures to open the
log file.
* create_client_ssl_connection(): Don't keep the certificate
lock longer than necessary.
* Add periods to a bunch of log messages.
* normalize_lws(): Only log the 'Reducing whitespace ...'
message once per header
* log_error() Win32: Only call LogShowActivity() for debug level
LOG_LEVEL_REQUEST. As of b94bbe62a950, which was part of
Privoxy 3.0.29,
LOG_LEVEL_REQUEST is used for all requests including crunched
ones.
Previously LogShowActivity() was called twice for crunched
requests, (presumably) resulting in an aborted animation.
* Remove ./ prefix from tarball-dist files.
* create_client_ssl_connection(): Make it more obvious from an
error message that a function failed.
* Use stringify() instead of section_target() and remove
section_target(). Like the XXX comment suggested this could be
done my moving the hash into the templates which seems
preferable anyway.
* Prevent some compiler warnings.
* parse_numeric_value(): Expect a base-ten number.
* windows/MYconfigure: Have gcc diagnostics in color.
Action file improvements:
* Block requests to .amazon-adsystem.com/
* Block requests to 0.css-load.com/
* Block requests to html-load.com/ and 1.html-load.com/
* Block requests to b.6sc.co/
* Block requests to i.clean.gg/
* Block requests to s.cpx.to/
* Block requests to track.venatusmedia.com/
* Block requests to secure-eu.nmrodam.com/
* Block requests to o2.mouseflow.com/
* Disable fast-redirects for services.akteneinsichtsportal.de/
* Disable fast-redirects for
/wp-content/plugins/pdf-viewer-for-elementor
* Disable fast-redirects for syndication.twitter.com/
* Disable fast-redirects for archive.softwareheritage.org/
* Disable fast-redirects to
duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/
* Disable fast-redirects for .creator-spring.com/_next/image
* Disable fast redirects for accounts.bahn.de/
* Unblock .datenschmutz.de/
* Unblock requests for 'adventur*.'
* Unblock adl.windows.com/
as it is apparently required to update from Windows 10 to 11.
Reported by Sam Varshavchik.
Privoxy-Log-Parser:
* Highlight 'Couldn't deliver the error message for [...]'.
* Highlight 'Failed to accept() incoming connection: Software
caused connection abort'.
* Highlight 'Keeping chunk offset at 0 despite flushing
31 bytes.'.
* Highlight 'Not shutting down client connection on socket 8.
The socket is no longer alive.'.
* Bump version to 0.9.6.
Privoxy-Regression-Test.pl:
* Let the --min-level option increase the --max-level
if the latter is smaller than the former.
* Add --curl option to use a non-default curl binary.
* Bump version to 0.7.5.
uagen:
* Bump BROWSER_VERSION and BROWSER_REVISION to match
Firefox ESR 128.
* Bump version to 1.2.6.
Documentation:
* Add HOWTOs for https inspection and client-tags to user-manual.
* Suggest to use the force-text-mode action when filtering
binary content with external filters.
* Declare https-inspection non-experimental.
* FAQ: Mention that Privoxy Moral Licenses are available as well.
* Fix LibreSSL URL.
* Update perlre perldoc URL.
* config: Add SOCKS 5 to the list of supported protocols.
* In the Windows build section, note that one only needs tidy
to build the docs. If you're not building the docbook stuff
you don't need tidy.
* trust: Use the words 'allowlists' and 'blocklists'
instead of "whitelists" and "blacklists" which some
people consider to be less inclusive.
* Tue Feb 06 2024 Carsten Ziepke <kieltux@gmail.com>
- Provide user/group privoxy as required by RPM 4.19
* Mon Jan 01 2024 Andreas Schwab <schwab@linux-m68k.org>
- Fix misplaced missingok
* Sun Feb 12 2023 Carsten Ziepke <kieltux@gmail.com>
- Update to version 3.0.34:
Bug fixes:
* Improve the handling of chunk-encoded responses by buffering
the data even if filters are disabled and properly keeping track
of where the various chunks are supposed to start and end.
Previously Privoxy would merely check the last bytes received
to see if they looked like the last-chunk. This failed to work
if the last-chunk wasn't received in one read and could also
result in actual data being misdetected as last-chunk.
Should fix: SF support request #1739.
* remove_chunked_transfer_coding(): Refuse to de-chunk invalid
data. Previously the data could get corrupted even further.
Now we simply pass the unmodified data to the client.
* gif_deanimate(): Tolerate multiple image extensions in a row.
This allows to deanimate all the gifs on:
https://commons.wikimedia.org/wiki/Category:Animated_smilies
Fixes SF bug #795 reported by Celejar.
* OpenSSL generate_host_certificate(): Use X509_get_subject_name()
instead of X509_get_issuer_name() to get the issuer for
generated website certificates so there are no warnings in the
browser when using an intermediate CA certificate instead of a
self-signed root certificate.
* can_filter_request_body(): Fix a log message that contained a
spurious u.
* handle_established_connection(): Check for pending TLS data
from the client before checking if data is available on the
connection. The TLS library may have already consumed all the
data from the client response in which case poll() and select()
will not detect that data is available to be read.
* ssl_send_certificate_error(): Don't crash if there's no
certificate information available. This is only relevant when
Privoxy is built with wolfSSL 5.0.0 or later (code not yet
published). Earlier wolfSSL versions or the other TLS backends
don't seem to trigger the crash.
* socks5_connect(): Add support for target hosts specified as
IPv4 address. Previously the IP address was sent as domain.
General improvements:
* Add a client-body-tagger action which creates tags based on
the content of the request body.
* When client-body filters are enabled, buffer the whole request
before opening a connection to the server.
Makes it less likely that the server connection times out
and we don't open a connection if the buffering fails anyway.
* Add periods to a couple of log messages.
* accept_connection(): Add missing space to a log message.
* Initialize ca-related defaults with strdup_or_die() so errors
aren't silently ignored.
* make_path: Use malloc_or_die() in cases where allocation errors
were already fatal anyway.
* handle_established_connection(): Improve an error message slightly.
* receive_client_request(): Reject https URLs without CONNECT request.
* Include all requests in the statistics if mutexes are available.
Previously in case of reused connections only the last request got
counted. The statistics still aren't perfect but it's an improvement.
* Add read_socks_reply() and start using it in socks5_connect()
to apply the socket timeout more consistently.
* socks5_connect(): Deal with domain names in the socks reply
* Add a filter for bundeswehr.de that hides the cookie and
privacy info banner.
Action file improvements:
* Disable filter{banners-by-size} for .freiheitsfoo.de/.
* Disable filter{banners-by-size} for freebsdfoundation.org/.
* Disable fast-redirects for consent.youtube.com/.
* Block requests to ups.xplosion.de/.
* Block requests for elsa.memoinsights.com/t.
* Fix a typo in a test.
* Disable fast-redirects for launchpad.net/.
* Unblock .eff.org/.
* Stop unblocking .org/.*(image|banner) which appears to be too generous
* Unblock adfd.org/.
* Disable filter{banners-by-link} for .eff.org/.
* Block requests to odb.outbrain.com/.
* Disable fast-redirects for .gandi.net/.
* Disable fast-redirects{} for .onion/.*/status/.
* Disable fast-redirects{} for twitter.com/.*/status/.
* Unblock pinkstinks.de/.
* Disable fast-redirects for .hagalil.com/.
Privoxy-Log-Parser:
* Bump version to 0.9.5.
* Highlight more log messages.
* Highlight the Crunch reason only once. Previously the "crunch reason"
could also be highlighted when the URL contained a matching string.
The real crunch reason only occurs once per line, so there's no need
to continue looking for it after it has been found once.
While at it, add a comment with an example log line.
uagen:
* Bump version to 1.2.4.
* Update BROWSER_VERSION and BROWSER_REVISION to 102.0
to match the User-Agent of the current Firefox ESR.
* Explicitly document that changing the 'Gecko token' is suspicious.
* Consistently use a lower-case 'c' as copyright symbol.
* Bump copyright.
* Add 'aarch64' as Linux architecture.
Build system:
* Makefile: Add a 'dok' target that depends on the 'error' target
to show the "You are not using GNU make or did nor run configure"
message.
* configure: Fix --with-msan option.
Documentation:
* Add OpenSSL to the list of libraries that may be licensed under the
Apache 2.0 license in which case the linked Privoxy binary has to be
distributed under the GPLv3 or later.
* config: Fix the documented ca-directory default value.
* Update developer manual with new macOS packaging instructions.
- Add missingok to privoxy.logrotate.systemd
* Fri Dec 10 2021 Andreas Stieger <andreas.stieger@gmx.de>
- privoxy 3.0.33 (boo#1193584):
* CVE-2021-44543: Encode the template name to prevent XSS
(cross-side scripting) when Privoxy is configured to servce
the user-manual itself
* CVE-2021-44540: Free memory of compiled pattern spec
before bailing
* CVE-2021-44541: Free header memory when failing to get the
request destination.
* CVE-2021-44542: Prevent memory leaks when handling errors
* Disable fast-redirects for a number of domains
* Update default block lists
* Many bug fixes and minor enhancements
* Wed Oct 20 2021 Johannes Segitz <jsegitz@suse.com>
- Added hardening to systemd service(s) (bsc#1181400). Modified:
* privoxy.service
* Fri Oct 15 2021 Michael Du <duyizhaozj321@yahoo.com>
- Revert privoxy-nopcreposix.patch because of bsc#1184945.
* Fri Apr 09 2021 Cristian RodrÃguez <crrodriguez@opensuse.org>
- Using pcre is good, however using the pcreposix library is not and will
lead to undefined behaviour as symbol clashes with glibc.
(privoxy-nopcreposix.patch)
* Sat Mar 06 2021 Carsten Ziepke <kieltux@gmail.com>
- Update to version 3.0.32:
- Security/Reliability (boo#1183129)
- ssplit(): Remove an assertion that could be triggered with a
crafted CGI request.
Commit 2256d7b4d67. OVE-20210203-0001. CVE-2021-20272
Reported by: Joshua Rogers (Opera)
- cgi_send_banner(): Overrule invalid image types. Prevents a
crash with a crafted CGI request if Privoxy is toggled off.
Commit e711c505c48. OVE-20210206-0001. CVE-2021-20273
Reported by: Joshua Rogers (Opera)
- socks5_connect(): Don't try to send credentials when none are
configured. Fixes a crash due to a NULL-pointer dereference
when the socks server misbehaves.
Commit 85817cc55b9. OVE-20210207-0001. CVE-2021-20274
Reported by: Joshua Rogers (Opera)
- chunked_body_is_complete(): Prevent an invalid read of size
two.
Commit a912ba7bc9c. OVE-20210205-0001. CVE-2021-20275
Reported by: Joshua Rogers (Opera)
- Obsolete pcre: Prevent invalid memory accesses with an invalid
pattern passed to pcre_compile(). Note that the obsolete pcre
code is scheduled to be removed before the 3.0.33 release.
There has been a warning since 2008 already.
Commit 28512e5b624. OVE-20210222-0001. CVE-2021-20276
Reported by: Joshua Rogers (Opera)
- Bug fixes:
- Properly parse the client-tag-lifetime directive. Previously it was
not accepted as an obsolete hash value was being used.
Reported by: Joshua Rogers (Opera)
- decompress_iob(): Prevent reading of uninitialized data.
Reported by: Joshua Rogers (Opera).
- decompress_iob(): Don't advance cur past eod when looking
for the end of the file name and comment.
- decompress_iob(): Cast value to unsigned char before shifting.
Prevents a left-shift of a negative value which is undefined behaviour.
Reported by: Joshua Rogers (Opera)
- gif_deanimate(): Confirm that that we have enough data before doing
any work. Fixes a crash when fuzzing with an empty document.
Reported by: Joshua Rogers (Opera).
- buf_copy(): Fail if there's no data to write or nothing to do.
Prevents undefined behaviour "applying zero offset to null pointer".
Reported by: Joshua Rogers (Opera)
- log_error(): Treat LOG_LEVEL_FATAL as fatal even when --stfu is
being used while fuzzing.
Reported by: Joshua Rogers (Opera).
- Respect DESTDIR when considering whether or not to install
config files with ".new" extension.
- OpenSSL ssl_store_cert(): Fix two error messages.
- Fix a couple of format specifiers.
- Silence compiler warnings when compiling with NDEBUG.
- fuzz_server_header(): Fix compiler warning.
- fuzz_client_header(): Fix compiler warning.
- cgi_send_user_manual(): Also reject requests if the user-manual
directive specifies a https:// URL. Previously Privoxy would try and
fail to open a local file.
- General improvements:
- Log the TLS version and the the cipher when debug 2 is enabled.
- ssl_send_certificate_error(): Respect HEAD requests by not sending a body.
- ssl_send_certificate_error(): End the body with a single new line.
- serve(): Increase the chances that the host is logged when closing
a server socket.
- handle_established_connection(): Add parentheses to clarify an expression
Suggested by: David Binderman
- continue_https_chat(): Explicitly unset CSP_FLAG_CLIENT_CONNECTION_KEEP_ALIVE
if process_encrypted_request() fails. This makes it more obvious that the
connection will not be reused. Previously serve() relied on
CSP_FLAG_SERVER_CONTENT_LENGTH_SET and CSP_FLAG_CHUNKED being unset.
Inspired by a patch from Joshua Rogers (Opera).
- decompress_iob(): Add periods to a couple of log messages
- Terminate the body of the HTTP snipplets with a single new line
instead of "\r\n".
- configure: Add --with-assertions option and only enable assertions
when it is used
- windows build: Use --with-brotli and --with-mbedtls by default and
enable dynamic error checking.
- gif_deanimate(): Confirm we've got an image before trying to write it
Saves a pointless buf_copy() call.
- OpenSSL ssl_store_cert(): Remove a superfluous space before the serial number.
- Action file improvements:
- Disable fast-redirects for .golem.de/
- Unblock requests to adri*.
- Block requests for trc*.taboola.com/
- Disable fast-redirects for .linkedin.com/
- Filter file improvements:
- Make the second pcrs job of the img-reorder filter greedy again.
The ungreedy version broke the img tags on:
https://bulk.fefe.de/scalability/.
- Privoxy-Log-Parser:
- Highlight a few more messages.
- Clarify the --statistics output. The shown "Reused connections"
are server connections so name them appropriately.
- Bump version to 0.9.3.
- Privoxy-Regression-Test:
- Add the --check-bad-ssl option to the --help output.
- Bump version to 0.7.3.
- Documentation:
- Add pushing the created tag to the release steps in the developer manual.
- Clarify that 'debug 32768' should be used in addition to the other debug
directives when reporting problems.
- Add a 'Third-party licenses and copyrights' section to the user manual.
* Mon Feb 01 2021 Carsten Ziepke <kieltux@gmail.com>
- Update to version 3.0.31:
- Security/Reliability (boo#1181650)
- Prevent an assertion from getting triggered by a crafted
CGI request.
Commit 5bba5b89193fa. OVE-20210130-0001. CVE-2021-20217
Reported by: Joshua Rogers (Opera)
- Fixed a memory leak when decompression fails "unexpectedly".
Commit f431d61740cc0. OVE-20210128-0001. CVE-2021-20216
- Bug fixes:
- Fixed detection of insufficient data for decompression.
Previously Privoxy could try to decompress a partly
uninitialized buffer.
- Update to version 3.0.30:
- Bug fixes:
- Check the actual URL for redirects when https inspecting requests.
Previously Privoxy would only check the path which resulted in
rewrite results being rejected as invalid URLs.
Reported by withoutname in #1736.
- Let the hide-referrer code tolerate Referer headers with https:// URLs.
Previously they would always be treated like a changed host.
- Use the https headers if the show-request handler is reached through
https://. Previously Privoxy would use the http headers which
may be empty on a reused connection.
- Make CGI_PREFIX protocol-relative when building with FEATURE_HTTPS_INSPECTION.
This unbreaks (at least) https://config.privoxy.org/client-tags whose
buttons would previously use a http:// URL resulting in browser warnings.
- Support using https-inspection and client-header-order at the same time.
Previously Privoxy would crash.
Reported by: Kai Raven
- Properly reject rewrites from http to https as they currently
aren't supported. Previously Privoxy would wait for the client
to establish an encrypted connection which obviously would not happen.
- When https inspection is enabled and Privoxy has been compiled with
FEATURE_GRACEFUL_TERMINATION (not recommended for production builds),
the TLS backend resources are free'd later on and only if no active
connections are left. Prevents crashes when exiting "gracefully" at the
wrong time.
- Let the uninstall target remove the config file even if DESTDIR
is set and properly announce the deletion of the configuration files.
- General improvements:
- Allow to rewrite the request destination for https-inspected
requests behind the client's back. The documentation already sort
of claimed that it was supported by not especially mentioning that
it didn't work for https-inspected requests.
Fixes SF bug #923 reported by withoutname.
- Add support for filtering client request bodies by using
CLIENT-BODY-FILTER filters which can be enabled with the
client-body-filter action.
Patch submitted by Maxim Antonov.
Sponsored by: Robert Klemme
- Add the new action suppress-tag{} which can be used to prevent
a tagger from adding a tag. Patch submitted by Maxim Antonov.
Sponsored by: Robert Klemme
- Gracefully handle existing website keys without matching certificates.
This can happen if Privoxy was previously running with an invalid
TLS configuration that didn't allow it to create a certificate.
- Recycle debug bit 4 for Tagging-related messages.
- Improve the message shown when the client-tags CGI page
is requested with no tags configured.
- Shorten the 'donate' and 'participate' links used by templates
using redirects. Currently the redirects lead to the FAQ entries
but in the future we may want to relocate the content and using
redirects makes this more convenient.
- Log an error when a PCRE-HOST-PATTERN is used with
FEATURE_PCRE_HOST_PATTERNS disabled. Don't treat this a
fatal error so the regression tests can be used with and
without FEATURE_PCRE_HOST_PATTERNS.
- The code compiles with older C compilers again.
- The chdir() return code is checked to fix a compiler warning.
- The packages feed has been removed from the source tarball.
It's usually out of date when the source tarball is generated
for the release.
- Fixed harmless compiler warnings from GCC9 with -D_FORTIFY_SOURCE=2.
- windows: Remove obsolete '$(DEST)/doc/images' target.
- windows: Install the images referenced in the user manual.
- Remove obsolete 'gnu_regex.@OBJEXT@' target.
- When installing from the GNUMAkefile, don't create an 'images'
directory which is no longer used. The images were relocated to
the user-manual directory years ago.
- Add new FEATURES to the show-status page and resort list.
- Remove unused variable in the OpenSSL-specific code.
- Update bug tracker URL in cgi_error_unknown().
- Saved a couple of memory allocations when sorting client headers.
- Improved a couple of error messages.
- Saved memory allocations when using OpenSSL and checking if a
key already exists.
- The configure script will bail out if OpenSSL and mbedTLS are
enabled at the same time.
- Log a message right before exiting gracefully.
- A couple of structures have been rearranged to require slightly
less memory.
- When https inspection is enabled and the certificate is invalid
the error message is now sent with status code 403 instead of 200.
- The Slackware rc script template has been renamed to
slackware/rc.privoxy.in to silence complaints when building
Debian packages.
- When building with MbedTLS support, mbedtls_md5_ret() is used
instead of mbedtls_md5() which is deprecated and causes a warning
on Debian GNU/Linux.
- Action file improvements:
- Block requests to eu-tlp03.kameleoon.com/.
- Unblock metrics.sr.ht/.
- Disable fast-redirects for .fsf.org/.
- Disable fast-redirects for .gravater.com/.
- Disable fast-redirects for .ksta.de/.
- Block requests to tag.crsspxl.com/.
- Block requests to analytics.slashdotmedia.com/.
- Block requests to ml314.com/.
- Block requests to .adroll.com/.
- Block requests to fastlane.rubiconproject.com/.
- Block requests to api.theadex.com/.
- Block requests to ih.adscale.de/.
- Block requests to .s400.meetrics.net/.
- Block requests for pp.lp4.io/.
- Block requests for trc-events.taboola.com/.
- Filter file improvements:
- A allow-autocompletion filter has been added which changes
autocomplete="off" to "on" on input fields to allow autocompletion.
Requested by Jamie Zawinski in #370.
Filter based on a submission by Aaron Linville.
- Added an imdb filter.
- Added a sourceforge filter that reduces the amount of ads
for proprietary software.
- Added a github filter that removes the annoying "Sign-Up"
banner and the Cookie disclaimer.
- Removed a duplicated pcrs command from the js-annoyances filter.
- The crude-parental filter now provides a short reason when blocking,
inserts a link to Privoxy's webinterface and adds a new line at
the end of the generated page.
- Privoxy-Log-Parser:
- Highlight a few more messages.
- Add a handler for tagging messages.
- Properly deal with 'Certificate error' crunches
Previously the error description was highlighted as 'host'.
- Log truncated LOG_LEVEL_CLF messages more gracefully
and note that the statistics will be imprecise.
- Fixed perldoc typo.
- Bump version to 0.9.2.
- Privoxy-Regression-Test:
- Use http://127.0.0.1:8118/ as default Privoxy address
unless http_proxy is set through the environment.
- Add a --privoxy-cgi-prefix option that specifies the prefix
to use when building URLs that are supposed to reach Privoxy's
CGI interface. If it's not set, http://p.p/ is used, which is
supposed to work with the default Privoxy configuration.
If Privoxy has been built with FEATURE_HTTPS_INSPECTION enabled,
and if https inspection is activated with the +https-inspection
action, this option can be used with "https://p.p/" provided the
system running Privoxy-Regression-Test has been configured to
trust the certificate used by Privoxy.
Note that there are currently two tests in the official
regression-tests.action file that are expected to fail
when using "https://p.p/" as privoxy-cgi-prefix.
- Skip the connection-established response in get_status_code()
when looking for the status code with a CGI prefix
that starts with https://. We care about the status code
sent by the impersonated web server.
- Use --proxy-header when using a CGI prefix with https://
and a "Host:" header.
- Allow '|' in tokens and values to allow tag patterns like
"TAG:^(application|text)/(x-)?javascript$".
- When get_cgi_page_or_else() fails, include the URL of the
requested page in the log message.
- Added a --check-bad-ssl option that can be used to verify that
Privoxy detects certificate problems when accessing the test
sites from badssl.com.
- Bumped version to 0.7.2
- uagen:
- Update example output.
- Recommend the use of the https-inspection action in the documentation.
- Upgrade a couple of URLs to https://.
- Add ElectroBSD to the list of operating systems.
- Bumped generated Firefox version to 78 (ESR).
- Bumped version to 1.2.2.
- User documentation:
- Remove reference to 'How to Report Bugs Effectively'.
It was only rendered as text without URL in the README anyway
and there's no indication that users read it ...
- Let the dok-readme target fix the location embedded into the
README file. This used to be done by CVS but since the git migration
it has to be done through other means.
- Remove 'experimental' warning for client-specific-tag-related directives.
They seem to work reliably and there is no obvious reason
why we would change the syntax in the near future.
- Describe how to check if Privoxy has been built with
FEATURE_HTTPS_INSPECTION.
- Add a link to the trusted-cas-file documentation
that explains how the user can create the file herself.
- Don't explicitly mention the license for the code coming from
'Anonymous Coders' and Junkbusters. It's obviously licensed under
the GNU GPL like the rest of Privoxy or we wouldn't be allowed to
distribute it.
- Update the +hide-user-agent example with uagen output.
- Slightly improve the wording of the ca-key-file documentation.
- Explicitly mention Windows 10 as supported so search engines and
users looking for it can find it.
- Import a bunch of contributors from the ChangeLog.
- Remove obsolete doc/gpl.html.
- Upgrade a couple of links to https://.
- Don't prefer the SourceForge patch tracker over the
privoxy-devel mailing list. While at it, link to the
SourceForge patch tracker.
- Mention http-inspection in the 'my browser warns me about
unauthenticated content' FAQ entry.
- Simplify the 'Is there is a license or fee?' FAQ entry.
- Add another +redirect{} example.
- Explicitly mention that interested sponsors should include
the link target in their first mail.
- Clarify that only Privoxy team members can object to new sponsors
and link to the list of current team members.
- Note that sponsor URLs may not contain keyword spam.
- Garbage collect doc/webserver/images which isn't referenced anymore.
- Update the method to reach the proxy settings in Firefox.
- Update proxy_setup.jpg description to refer to Firefox.
- Regenerate proxy_setup.jpg with a more recent Firefox (78.0).
- Regenerate files-in-use.jpg without obsolete standard.action
with modern colors and a slightly better quality.
- Update URL to the actionsfile tracker.
- Update a support request URL.
- Rephrase the 'Can Privoxy run as service' FAQ entry and
remove an obsolete paragraph.
- Let the 'Where can I get updated Actions Files?' entry link to
the gitweb version of default.action.master.
- Update a link to the default.action file.
- Update URLs for trackers and mailing lists.
- Replace CVS reference with git.
- Mention regression-tests.action in the config file.
- Explicitly mention in the config file that access to the
CA key should be limited to Privoxy.
- List more client-specific-tag examples for inspiration.
- Add additional headers to the client-header-order example.
- Note that actions aren't updated after rewrites.
- Explicitly mention that upgrading from http to https with
a client-header filter is not supported
- Note that protocol and host have to be added when rewriting
the destination host for https-inspected requests.
- Explicitly mention that the CA key is used to sign certificates.
- Put openssl command in 'command' tags.
- The man page has been moved from section 1 to man section 8.
- Developer manual:
- Flesh out the build instructions for Debian.
- Remove the packaging instructions for RPM-based systems.
They don't work and we don't release RPM packages anymore anyway.
- Remove the packaging instructions for Solaris.
They don't work and we don't release Solaris packages anymore anyway.
- Update the suggested subject for the announce mails.
- Update upload instructions.
ftp://upload.sourceforge.net is no longer functional.
- Remove a couple of package-dependent upload instructions
that don't actually work.
- Remove 'cd current' that no longer works.
- Add regression-tests.action to the list of files that should be installed.
- Stop claiming that there are text versions of the manuals.
We stopped building them in 2008 (9ed36a3c5e6f12).
- Note that the 'webserver' target creates the link needed for the user-manual.
- Suggest to use the master branch as reference when creating
the ChangeLog so the steps work when the current branch differs
from master which is likely as the developer manual
suggests to use a local branch for development.
- Add the -s flag to the suggested 'git tag' command. We prefer signed tags.
- Mention that merges into 'master' should be avoided.
- Add git commands that should result in a merge-free history.
- Mention Privoxy-Regression-Test.
- Add a section id to reduce link churn.
- Recommend the dok-tidy target when building docs for the webserver.
- Add another plug for the privoxy-devel mailing list.
- Let the intro link the copyright section in the user manual instead
of giving an incomplete summary of the license status.
- Clarify that the webserver target uploads to the SourceForge webserver.
- Mark the documentation for the Mac OS X installers as out of date and
change the SCM name back to CVS.
- Fix the location of the installer modules for Mac OS X.
They are not actually available through git (yet).
- Don't speak of Privoxy version 3 in the past tense.
- Update the list of programs required for the release process.
- Update description of the webserver target which uses ssh, not scp.
- Remove obsolete reference to config.new.
- Tests:
- Add another hide-referrer{conditional-block} test.
- Add another hide-referrer{conditional-forge} test.
- Fix a hide-referrer{conditional-forge} test
that expected an acceptable header to be forged.
- Fix a hide-referrer{conditional-block} test
that expected an acceptable Referer to be removed.
- Explain why the "Set Header = Host: whatever.example.org" test is
expected to fail when using a CGI prefix that starts with "https://".
- Explain why a connection-sharing test is known to fail
when using "https://p.p/" as CGI prefix.
- Add a link to Privoxy-Regression-Test to regression-tests.action
in case it isn't packaged.
- Add regression tests for pcre host patterns.
- Fixed a regression test that is executed when
FEATURE_GRACEFUL_TERMINATION is enabled.
- Privoxy infrastructure:
- Import a Privoxy logo for the website.
- Update Tor onion service to HiddenServiceVersion 3.
- Display the "model" photos in a single row and remove placeholder images.
- Regenerate homepage with updated sponsor list.
- Use the '/sponsor' redirect for the link to the sponsor page.
- Git commit messages are sent to the Privoxy-commits mailing list.
/etc/NetworkManager /etc/NetworkManager/dispatcher.d /etc/NetworkManager/dispatcher.d/privoxyd /etc/logrotate.d/privoxy /etc/privoxy /usr/lib/systemd/system/privoxy.service /usr/sbin/privoxy /usr/sbin/rcprivoxy /usr/share/doc/packages/privoxy /usr/share/doc/packages/privoxy/AUTHORS /usr/share/doc/packages/privoxy/ChangeLog /usr/share/doc/packages/privoxy/README /usr/share/licenses/privoxy /usr/share/licenses/privoxy/LICENSE /usr/share/man/man8/privoxy.8.gz /var/lib/privoxy /var/lib/privoxy/etc /var/lib/privoxy/etc/config /var/lib/privoxy/etc/default.action /var/lib/privoxy/etc/default.filter /var/lib/privoxy/etc/match-all.action /var/lib/privoxy/etc/regression-tests.action /var/lib/privoxy/etc/templates /var/lib/privoxy/etc/templates/blocked /var/lib/privoxy/etc/templates/cgi-error-404 /var/lib/privoxy/etc/templates/cgi-error-bad-param /var/lib/privoxy/etc/templates/cgi-error-disabled /var/lib/privoxy/etc/templates/cgi-error-file /var/lib/privoxy/etc/templates/cgi-error-file-read-only /var/lib/privoxy/etc/templates/cgi-error-modified /var/lib/privoxy/etc/templates/cgi-error-parse /var/lib/privoxy/etc/templates/cgi-style.css /var/lib/privoxy/etc/templates/client-tags /var/lib/privoxy/etc/templates/connect-failed /var/lib/privoxy/etc/templates/connection-timeout /var/lib/privoxy/etc/templates/default /var/lib/privoxy/etc/templates/edit-actions-add-url-form /var/lib/privoxy/etc/templates/edit-actions-for-url /var/lib/privoxy/etc/templates/edit-actions-for-url-filter /var/lib/privoxy/etc/templates/edit-actions-for-url-string-action /var/lib/privoxy/etc/templates/edit-actions-list /var/lib/privoxy/etc/templates/edit-actions-list-button /var/lib/privoxy/etc/templates/edit-actions-list-section /var/lib/privoxy/etc/templates/edit-actions-list-url /var/lib/privoxy/etc/templates/edit-actions-remove-url-form /var/lib/privoxy/etc/templates/edit-actions-url-form /var/lib/privoxy/etc/templates/forwarding-failed /var/lib/privoxy/etc/templates/mod-local-help /var/lib/privoxy/etc/templates/mod-support-and-service /var/lib/privoxy/etc/templates/mod-title /var/lib/privoxy/etc/templates/mod-unstable-warning /var/lib/privoxy/etc/templates/no-server-data /var/lib/privoxy/etc/templates/no-such-domain /var/lib/privoxy/etc/templates/show-request /var/lib/privoxy/etc/templates/show-status /var/lib/privoxy/etc/templates/show-status-file /var/lib/privoxy/etc/templates/show-url-info /var/lib/privoxy/etc/templates/toggle /var/lib/privoxy/etc/templates/toggle-mini /var/lib/privoxy/etc/templates/untrusted /var/lib/privoxy/etc/templates/url-info-osd.xml /var/lib/privoxy/etc/templates/wpad.dat /var/lib/privoxy/etc/trust /var/lib/privoxy/etc/user.action /var/lib/privoxy/etc/user.filter /var/lib/privoxy/lib64 /var/lib/privoxy/log /var/lib/privoxy/var /var/lib/privoxy/var/log /var/lib/privoxy/var/log/privoxy /var/lib/privoxy/var/run
Generated by rpm2html 1.8.1
Fabrice Bellet, Sun Nov 16 22:44:16 2025