(Translated by https://www.hiragana.jp/)
Announcing Privoxy 3.0.34 stable
--------------------------------------------------------------------
Privoxy 3.0.34 fixes a few minor bugs and comes with a couple of
general improvements and new features.
Please note that Google started to bounce messages from the Privoxy
mailing lists a couple of months ago. As a result gmail users have
been unsubscribed by Mailman. If you are affected by this, please
resubscribe with a different mail address. The Privoxy project has
limited resources and limited time to investigate an issue that
only affects gmail addresses.
--------------------------------------------------------------------
ChangeLog for Privoxy 3.0.34
--------------------------------------------------------------------
- Bug fixes:
- Improve the handling of chunk-encoded responses by buffering the data
even if filters are disabled and properly keeping track of where the
various chunks are supposed to start and end. Previously Privoxy would
merely check the last bytes received to see if they looked like the
last-chunk. This failed to work if the last-chunk wasn't received in one
read and could also result in actual data being misdetected
as last-chunk.
Should fix: SF support request #1739.
Reported by: withoutname.
- remove_chunked_transfer_coding(): Refuse to de-chunk invalid data
Previously the data could get corrupted even further.
Now we simply pass the unmodified data to the client.
- gif_deanimate(): Tolerate multiple image extensions in a row.
This allows to deanimate all the gifs on:
https://commons.wikimedia.org/wiki/Category:Animated_smilies
Fixes SF bug #795 reported by Celejar.
- OpenSSL generate_host_certificate(): Use X509_get_subject_name()
instead of X509_get_issuer_name() to get the issuer for generated
website certificates so there are no warnings in the browser when using
an intermediate CA certificate instead of a self-signed root certificate.
Problem reported and patch submitted by Chakib Benziane.
- can_filter_request_body(): Fix a log message that contained a spurious u.
- handle_established_connection(): Check for pending TLS data from the client
before checking if data is available on the connection.
The TLS library may have already consumed all the data from the client
response in which case poll() and select() will not detect that data is
available to be read.
Sponsored by: Robert Klemme.
- ssl_send_certificate_error(): Don't crash if there's no certificate
information available. This is only relevant when Privoxy is built with
wolfSSL 5.0.0 or later (code not yet published). Earlier wolfSSL versions
or the other TLS backends don't seem to trigger the crash.
- socks5_connect(): Add support for target hosts specified as IPv4 address
Previously the IP address was sent as domain.
- General improvements:
- Add a client-body-tagger action which creates tags based on
the content of the request body.
Sponsored by: Robert Klemme.
- When client-body filters are enabled, buffer the whole request
before opening a connection to the server.
Makes it less likely that the server connection times out
and we don't open a connection if the buffering fails anyway.
Sponsored by: Robert Klemme.
- Add periods to a couple of log messages.
- accept_connection(): Add missing space to a log message.
- Initialize ca-related defaults with strdup_or_die() so errors
aren't silently ignored.
- make_path: Use malloc_or_die() in cases where allocation errors
were already fatal anyway.
- handle_established_connection(): Improve an error message slightly.
- receive_client_request(): Reject https URLs without CONNECT request.
- Include all requests in the statistics if mutexes are available.
Previously in case of reused connections only the last request got
counted. The statistics still aren't perfect but it's an improvement.
- Add read_socks_reply() and start using it in socks5_connect()
to apply the socket timeout more consistently.
- socks5_connect(): Deal with domain names in the socks reply
- Add a filter for bundeswehr.de that hides the cookie and
privacy info banner.
- Action file improvements:
- Disable filter{banners-by-size} for .freiheitsfoo.de/.
- Disable filter{banners-by-size} for freebsdfoundation.org/.
- Disable fast-redirects for consent.youtube.com/.
- Block requests to ups.xplosion.de/.
- Block requests for elsa.memoinsights.com/t.
- Fix a typo in a test.
- Disable fast-redirects for launchpad.net/.
- Unblock .eff.org/.
- Stop unblocking .org/.*(image|banner) which appears to be too generous
It let requests like:
https://stats.noblogs.org/piwik.php?action_name=anti%20gentrifizierungs%20fest&idsite=10175&rec=1&r=220192&h=17&m=7&s=44&url=https%3A%2F%2Fmuellemcalling.noblogs.org%2F&urlref=https%3A%2F%2Fmuellemcalling.noblogs.org%2Finfostande%2F&_id=&_idn=1&_refts=0&send_image=0&cookie=1&res=1366x768&pv_id=eqr7jX&pf_net=7&pf_srv=3&pf_tfr=2281&pf_dm1=156
pass.
The example URL http://www.gnu.org/graphics/gnu-head-banner.png is
already unblocked due to .gnu.org being unblocked.
- Unblock adfd.org/.
- Disable filter{banners-by-link} for .eff.org/.
- Block requests to odb.outbrain.com/.
- Disable fast-redirects for .gandi.net/.
- Disable fast-redirects{} for .onion/.*/status/.
- Disable fast-redirects{} for twitter.com/.*/status/.
- Unblock pinkstinks.de/.
- Disable fast-redirects for .hagalil.com/.
- Privoxy-Log-Parser:
- Bump version to 0.9.5.
- Highlight more log messages.
- Highlight the Crunch reason only once. Previously the "crunch reason"
could also be highlighted when the URL contained a matching string.
The real crunch reason only occurs once per line, so there's no need
to continue looking for it after it has been found once.
While at it, add a comment with an example log line.
- uagen:
- Bump version to 1.2.4.
- Update BROWSER_VERSION and BROWSER_REVISION to 102.0
to match the User-Agent of the current Firefox ESR.
- Explicitly document that changing the 'Gecko token' is suspicious.
- Consistently use a lower-case 'c' as copyright symbol.
- Bump copyright.
- Add 'aarch64' as Linux architecture.
- Add OpenBSD architecture 'arm64'.
- Stop using sparc64 as FreeBSD architecture.
It hasn't been supported for a while now.
- Build system:
- Makefile: Add a 'dok' target that depends on the 'error' target
to show the "You are not using GNU make or did nor run configure"
message.
- configure: Fix --with-msan option.
Also (probably) reported by Andrew Savchenko.
- macOS build system:
- Enable HTTPS inspection when building the macOS binary
(using OpenSSL as TLS library).
- Documentation:
- Add OpenSSL to the list of libraries that may be licensed under the
Apache 2.0 license in which case the linked Privoxy binary has to be
distributed under the GPLv3 or later.
- config: Fix the documented ca-directory default value.
Reported by avoidr.
- Rebuild developer-manual and tidy with 'HTML Tidy for FreeBSD version 5.8.0'.
- Update developer manual with new macOS packaging instructions.
- Note that the FreeBSD installation instructions work for
ElectroBSD as well.
- Note that FreeBSD/ElectroBSD users can try to install Privoxy
as binary package using 'pkg'.
-----------------------------------------------------------------
About Privoxy:
-----------------------------------------------------------------
Privoxy is a non-caching web proxy with advanced filtering capabilities for
enhancing privacy, modifying web page data and HTTP headers, controlling
access, and removing ads and other obnoxious Internet junk. Privoxy has a
flexible configuration and can be customized to suit individual needs and
tastes. It has application for both stand-alone systems and multi-user
networks.
Privoxy is Free Software and licensed under the GNU GPLv2 or later.
Our TODO list is rather long. Helping hands and donations are welcome:
* https://www.privoxy.org/participate
* https://www.privoxy.org/donate
At present, Privoxy is known to run on Windows 95 and later versions
(98, ME, 2000, XP, Vista, Windows 7, Windows 10 etc.), GNU/Linux
(RedHat, SuSE, Debian, Fedora, Gentoo, Slackware and others),
Mac OS X (10.4 and upwards on PPC and Intel processors), Haiku,
DragonFly, ElectroBSD, FreeBSD, NetBSD, OpenBSD, Solaris,
and various other flavors of Unix.
In addition to the core features of ad blocking and cookie management,
Privoxy provides many supplemental features, that give the end-user
more control, more privacy and more freedom:
* Supports "Connection: keep-alive". Outgoing connections can be kept
alive independently from the client. Currently not available on all
platforms.
* Supports IPv6, provided the operating system does so too,
and the configure script detects it.
* Supports tagging which allows to change the behaviour based on client
and server headers.
* Supports https inspection which allows to filter https requests.
* Can be run as an "intercepting" proxy, which obviates the need to
configure browsers individually.
* Sophisticated actions and filters for manipulating both server and
client headers.
* Can be chained with other proxies.
* Integrated browser based configuration and control utility at
http://config.privoxy.org/ (shortcut: http://p.p/). Browser-based
tracing of rule and filter effects. Remote toggling.
* Web page filtering (text replacements, removes banners based on size,
invisible "web-bugs" and HTML annoyances, etc.)
* Modularized configuration that allows for standard settings and user
settings to reside in separate files, so that installing updated actions
files won't overwrite individual user settings.
* Support for Perl Compatible Regular Expressions in the configuration
files, and a more sophisticated and flexible configuration syntax.
* GIF de-animation.
* Bypass many click-tracking scripts (avoids script redirection).
* User-customizable HTML templates for most proxy-generated pages (e.g.
"blocked" page).
* Auto-detection and re-reading of config file changes.
* Most features are controllable on a per-site or per-location basis.
Home Page:
https://www.privoxy.org/
- Privoxy Developers