-
Notifications
You must be signed in to change notification settings - Fork 1
/
default.action
2023 lines (1951 loc) · 91.7 KB
/
default.action
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
######################################################################
#
# File : $Source: /cvsroot/ijbswa/current/default.action.master,v $
#
# $Id: default.action.master,v 1.329 2016/05/12 08:42:25 fabiankeil Exp $
#
# Requires : This version requires Privoxy v3.0.11 or later due to
# syntax changes.
#
# Purpose : Default actions file, see
# http://www.privoxy.org/user-manual/actions-file.html.
# This file is subject to periodic updating. It is
# not supposed to be edited by the user. Local exceptions
# and enhancements are better placed in user.action,
# the match-all section has been moved to match-all.action.
#
# Copyright : Written by and Copyright (C) 2001-2016 the
# Privoxy team. http://www.privoxy.org/
#
# Feedback welcome, for details please have a look at:
# http://www.privoxy.org/user-manual/contact.html
#
# The current development version of this file is located:
# http://ijbswa.cvs.sourceforge.net/viewvc/ijbswa/current/default.action.master
#
#############################################################################
# Syntax
#############################################################################
#
# A much better explanation can be found in the user manual which is
# part of the distribution and can be found at http://www.privoxy.org/user-manual
#
# To determine which actions apply to a request, the URL of the request is
# compared to all patterns in this file. Every time it matches, the list of
# applicable actions for this URL is incrementally updated. You can trace
# this process by visiting http://config.privoxy.org/show-url-info
#
# There are 4 types of lines in this file: comments (like this line),
# actions, aliases and patterns, all of which are explained below.
#
#############################################################################
# Pattern Syntax
#############################################################################
#
# 1. On Domains and Paths
# -----------------------
#
# Generally, a pattern has the form <domain>/<path>, where both the <domain>
# and <path> part are optional. The pattern matching syntax is different for
# each. If you only specify a domain part, the "/" can be left out, but it is
# required for the path part.
#
# www.example.com
# is a domain-only pattern and will match any request to www.example.com
#
# www.example.com/
# means exactly the same (but is slightly less efficient)
#
# www.example.com/index.html
# matches only the document /index.html on www.example.com
#
# /index.html
# matches the document /index.html, regardless of the domain
#
# index.html
# matches nothing, since it would be interpreted as a domain name and
# there is no top-level domain called ".html".
#
# 2. Domain Syntax
# ----------------
#
# The matching of the domain part offers some flexible options: If the
# domain starts or ends with a dot, it becomes unanchored at that end:
#
# www.example.com
# matches only www.example.com
#
# .example.com
# matches any domain that ENDS in .example.com
#
# www.
# matches any domain that STARTS with www.
#
# .example.
# matches any domain that CONTAINS example
#
#
# Additionally, there are wildcards that you can use in the domain names
# themselves. They work pretty similar to shell wildcards: "*" stands for
# zero or more arbitrary characters, "?" stands for one, and you can define
# character classes in square brackets and they can be freely mixed:
#
# ad*.example.com
# matches adserver.example.com, ads.example.com, etc but not sfads.example.com
#
# *ad*.example.com
# matches all of the above
#
# .?pix.com
# matches www.ipix.com, pictures.epix.com, a.b.c.d.e.upix.com etc
#
# www[1-9a-ez].example.com
# matches www1.example.com, www4.example.com, wwwd.example.com,
# wwwz.example.com etc, but not wwww.example.com
#
# You get the idea?
#
# 2. Path Syntax
# --------------
#
# Paths are specified as full regular expressions, and are more flexible than
# the domain syntax above. A comprehensive discussion of regular expressions
# wouldn't fit here.
#
# Perl compatible regular expressions are used. See the pcre/docs/ direcory or
# man perlre (also available at http://perldoc.perl.org/perlre.html) for
# details. The appendix to our User Manual also has some detail.
#
# Please note that matching in the path is CASE INSENSITIVE by default, but
# you can switch to case sensitive by starting the pattern with the "(?-i)"
# switch:
#
# www.example.com/(?-i)PaTtErN.*
# will match only documents whose path starts with PaTtErN in exactly this
# capitalization.
#
# Partially case-sensitive and partially case-insensitive patterns are
# possible, but the rules about splitting them up are extremely complex
# - see the PCRE documentation for more information.
#
#############################################################################
# Action Syntax
#############################################################################
#
# There are 3 kinds of actions:
#
# Boolean (e.g. "handle-as-image"):
# +name # enable
# -name # disable
#
# Parameterized (e.g. "hide-user-agent"):
# +name{param} # enable and set parameter to "param"
# -name # disable
#
# Multi-value (e.g. "add-header", "filter"):
# +name{param} # enable and add parameter "param"
# -name{param} # remove the parameter "param"
# -name # disable totally
#
# The default (if you don't specify anything in this file) is not to take
# any actions - i.e completely disabled, so Privoxy will just be a
# normal, non-blocking, non-anonymizing proxy. You must specifically
# enable the privacy and blocking features you need (although the
# provided default actions file will do that for you).
#
# Later actions always override earlier ones. For multi-valued actions,
# the actions are applied in the order they are specified.
#
#############################################################################
# Valid actions are:
#############################################################################
#
# +add-header{Name: value}
# Adds the specified HTTP header, which is not checked for validity.
# You may specify this many times to specify many headers.
#
# +block{reason}
# Block this URL. Instead of forwarding the request, Privoxy will
# send a "block" page containing the specified reason.
#
# +change-x-forwarded-for{add}
# +change-x-forwarded-for{block}
# Adds or blocks the "X-Forwarded-For:" HTTP header in client
# requests.
#
# +client-header-filter{name}
# All client headers to which this action applies are filtered on-the-fly
# through the specified regular expression based substitutions.
#
# Client-header filters predefined in the supplied default.filter include:
#
# hide-tor-exit-notation: Removes the Tor exit node notation in Host and Referer headers.
# privoxy-control: Removes X-Privoxy-Control headers.
#
# +client-header-tagger{string}
# Tag requests based on their headers. Client headers to which this
# action applies are filtered on-the-fly through the specified regular
# expression based substitutions, the result is used as a tag.
# Client-header taggers are the first actions that are executed and their
# tags can be used to control every other action.
#
# Client-header taggers predefined in the supplied default.filter include:
#
# image-requests: Tags detected image requests as "IMAGE-REQUEST".
# css-requests: Tags detected CSS requests as "CSS-REQUEST".
# range-requests: Tags range requests as "RANGE-REQUEST".
# client-ip-address: Tags the request with the client's IP address.
# http-method: Tags the request with its HTTP method.
# allow-post: Tags POST requests as "ALLOWED-POST".
# complete-url: Tags the request with the whole request URL.
# user-agent: Tags the request with the complete User-Agent header.
# referer: Tags the request with the complete Referer header.
# privoxy-control: Creates tags with the content of X-Privoxy-Control headers.
#
# +content-type-overwrite
# Replaces the "Content-Type:" HTTP server header, so that unwanted
# download menus will not pop up, or changes the browser's rendering mode.
#
# +crunch-client-header{string}
# Deletes every header sent by the client that contains the string the
# user supplied as parameter.
#
# +crunch-if-none-match
# Deletes the "If-None-Match:" HTTP client header.
#
# +crunch-server-header{string}
# Deletes every header sent by the server that contains the string the
# user supplied as a parameter.
#
# +deanimate-gifs{last}
# +deanimate-gifs{first}
# Deanimate all animated GIF images, i.e. reduce them to their last
# frame. This will also shrink the images considerably. (In bytes,
# not pixels!)
# If the option "first" is given, the first frame of the animation
# is used as the replacement. If "last" is given, the last frame of
# the animation is used instead, which propably makes more sense for
# most banner animations, but also has the risk of not showing the
# entire last frame (if it is only a delta to an earlier frame).
#
# +downgrade-http-version
# Downgrade HTTP/1.1 client requests to HTTP/1.0 and downgrade the
# responses as well. Use this action for servers that use HTTP/1.1
# protocol features that Privoxy currently can't handle yet.
#
# +fast-redirects{check-decoded-url}
# +fast-redirects{simple-check}
# Many sites, like yahoo.com, don't just link to other sites.
# Instead, they will link to some script on their own server,
# giving the destination as a parameter, which will then redirect
# you to the final target.
#
# URLs resulting from this scheme typically look like:
# http://some.place/some_script?http://some.where-else
#
# Sometimes, there are even multiple consecutive redirects encoded
# in the URL. These redirections via scripts make your web browsing
# more traceable, since the server from which you follow such a link
# can see where you go to. Apart from that, valuable bandwidth and
# time is wasted, while your browser asks the server for one redirect
# after the other. Plus, it feeds the advertisers.
#
# The +fast-redirects{check-decoded-url} option enables interception of
# these requests by Privoxy, who will cut off all but the last valid URL
# in the request and send a local redirect back to your browser without
# contacting the intermediate sites. NOTE: Syntax change as of v.3.0.4.
#
# +filter{name}
# All files of text-based type, most notably HTML and JavaScript, to which
# this action applies, can be filtered on-the-fly through the specified
# regular expression based substitutions. (Note: plain text documents are
# exempted from filtering, because web servers often use the text/plain
# MIME type for all files whose type they don't know.) By default,
# filtering works only on the raw document content itself (that which can
# be seen with View Source), not the headers. Repeat for multiple filters.
# Use with caution: filters can be very intrusive.
#
# Filters predefined in the supplied default.filter include:
#
# js-annoyances: Get rid of particularly annoying JavaScript abuse.
# js-events: Kill JavaScript event bindings and timers (Radically destructive! Only for extra nasty sites).
# html-annoyances: Get rid of particularly annoying HTML abuse.
# content-cookies: Kill cookies that come in the HTML or JS content.
# refresh-tags: Kill automatic refresh tags if refresh time is larger than 9 seconds.
# unsolicited-popups: Disable only unsolicited pop-up windows.
# all-popups: Kill all popups in JavaScript and HTML.
# img-reorder: Reorder attributes in <img> tags to make the banners-by-* filters more effective.
# banners-by-size: Kill banners by size.
# banners-by-link: Kill banners by their links to known clicktrackers.
# webbugs: Squish WebBugs (1x1 invisible GIFs used for user tracking).
# tiny-textforms: Extend those tiny textareas up to 40x80 and kill the hard wrap.
# jumping-windows: Prevent windows from resizing and moving themselves.
# frameset-borders: Give frames a border and make them resizable.
# iframes: Removes all detected iframes. Should only be enabled for individual sites.
# demoronizer: Fix MS's non-standard use of standard charsets.
# shockwave-flash: Kill embedded Shockwave Flash objects.
# quicktime-kioskmode: Make Quicktime movies saveable.
# fun: Text replacements for subversive browsing fun!
# crude-parental: Crude parental filtering. Note that this filter doesn't work reliably.
# ie-exploits: Disable some known Internet Explorer bug exploits.
# site-specifics: Cure for site-specific problems. Don't apply generally!
# no-ping: Removes non-standard ping attributes in <a> and <area> tags.
# google: CSS-based block for Google text ads. Also removes a width limitation and the toolbar advertisement.
# yahoo: CSS-based block for Yahoo text ads. Also removes a width limitation.
# msn: CSS-based block for MSN text ads. Also removes tracking URLs and a width limitation.
# blogspot: Cleans up some Blogspot blogs. Read the fine print before using this.
#
# +force-text-mode
# Declares a document as plain text, even if the "Content-Type:" isn't detected
# as such.
#
# +forward-override{forward .}
# +forward-override{forward 127.0.0.1:8123}
# +forward-override{forward-socks4a 127.0.0.1:9050 .}
# +forward-override{forward-socks4a 127.0.0.1:9050 proxy.example.org:8000}
# +forward-override{forward-socks5 127.0.0.1:9050 .}
# +forward-override{forward-socks5 127.0.0.1:9050 proxy.example.org:8000}
# This action overrules the forward directives in the configuration file.
#
# +handle-as-empty-document
# This action alone doesn't do anything noticeable. It just marks URLs. If
# the block action also applies, the presence or absence of this mark
# decides whether an HTML "blocked" page, or an empty document will be sent
# to the client as a substitute for the blocked content.
#
# +handle-as-image
# Treat this URL as an image. This only matters if it's also "+block"ed,
# in which case a "blocked" image can be sent rather than a HTML page.
# See +set-image-blocker{} for the control over what is actually sent.
#
# +hide-accept-language{lang}
# +hide-accept-language{block}
# Deletes or replaces the "Accept-Language:" HTTP header in client
# requests.
#
# +hide-content-disposition{block}
# +hide-content-disposition{string}
# Deletes or replaces the "Content-Disposition:" HTTP header set by some
# servers. This can be used to prevent download menus for content you
# prefer to view inside the browser, for example.
#
# +hide-from-header{block}
# +hide-from-header{[email protected]}
# If the browser sends a "From:" header containing your e-mail address,
# either completely removes the header ("block"), or change it to the
# specified e-mail address.
#
# +hide-if-modified-since{block}
# +hide-if-modified-since{-60}
# Deletes the "If-Modified-Since:" HTTP client header or modifies its
# value, preventing another way to track users.
#
# +hide-referer{block}
# +hide-referer{forge}
# +hide-referer{http://nowhere.com}
# Don't send the "Referer:" (sic) header to the web site. You can
# block it, forge a URL to the same server as the request (which is
# preferred because some sites will not send images otherwise) or
# set it to a constant string.
#
# +hide-referrer{...}
# Alternative spelling of +hide-referer. Has the same parameters,
# and can be freely mixed with, "+hide-referer". ("referrer" is the
# correct English spelling, however the HTTP specification has a
# bug - it requires it to be spelt "referer").
#
# +hide-user-agent{browser-type}
# Change the "User-Agent:" header so web servers can't tell your
# browser type. (Breaks many web sites). Specify the user-agent
# value you want - e.g., to pretend to be using Netscape on Linux:
# +hide-user-agent{Mozilla (X11; I; Linux 2.0.32 i586)}
# Or to identify yourself explicitly as a Privoxy user:
# +hide-user-agent{Privoxy/1.0}
# (Don't change the version number from 1.0 - after all, why tell them?)
#
# +limit-connect{portlist}
#
# By default, i.e. if no limit-connect action applies, Privoxy
# allows HTTP CONNECT requests to all ports. Use limit-connect
# if fine-grained control is desired for some or all destinations.
# The CONNECT methods exists in HTTP to allow access to secure websites
# ("https://" URLs) through proxies. It works very simply: the proxy
# connects to the server on the specified port, and then short-circuits
# its connections to the client and to the remote server. This means
# CONNECT-enabled proxies can be used as TCP relays very easily. Privoxy
# relays HTTPS traffic without seeing the decoded content. Websites can
# leverage this limitation to circumvent Privoxy's filters. By specifying
# an invalid port range you can disable HTTPS entirely.
#
# +limit-connect{443} # Only port 443 is OK.
# +limit-connect{80,443} # Ports 80 and 443 are OK.
# +limit-connect{-3, 7, 20-100, 500-} # Ports less than 3, 7, 20 to 100 and above 500 are OK.
# +limit-connect{-} # All ports are OK
# +limit-connect{,} # No HTTPS/SSL traffic is allowed
#
# +limit-cookie-lifetime{lifetime in minutes}
#
# This action reduces the lifetime of HTTP cookies coming from the
# server to the specified number of minutes, starting from the time
# the cookie passes Privoxy.
#
# Cookies with a lifetime below the limit are not modified.
# The lifetime of session cookies is set to the specified limit.
# The effect of this action depends on the server.
# If the parameter is "0", this action behaves like session-cookies-only.
#
# +overwrite-last-modified{block}
# +overwrite-last-modified{reset-to-request-time}
# +overwrite-last-modified{randomize}
# Removing the "Last-Modified:" header is useful for filter testing, where
# you want to force a real reload instead of getting status code "304",
# which would cause the browser to reuse the old version of the page.
#
# The "randomize" option overwrites the value of the "Last-Modified:"
# header with a randomly chosen time between the original value and the
# current time. In theory the server could send each document with a
# different "Last-Modified:" header to track visits without using cookies.
# "Randomize" makes it impossible and the browser can still revalidate
# cached documents.
#
# "reset-to-request-time" overwrites the value of the "Last-Modified:"
# header with the current time. You could use this option together with
# hide-if-modified-since to further customize your random range.
#
# +prevent-compression
# Prevent the website from compressing the data. Some websites do
# that, which is a problem for Privoxy when built without zlib support,
# since +filter and +gif-deanimate will not work on compressed data.
# Will slow down connections to those websites, though.
#
# +server-header-filter{name}
# All server headers to which this action applies are filtered on-the-fly
# through the specified regular expression based substitutions.
#
# Server-header filters predefined in the supplied default.filter include:
#
# x-httpd-php-to-html: Changes the Content-Type header from x-httpd-php to html.
# html-to-xml: Changes the Content-Type header from html to xml.
# xml-to-html: Changes the Content-Type header from xml to html.
# less-download-windows: Prevent annoying download windows for content types the browser can handle itself.
# privoxy-control: Removes X-Privoxy-Control headers.
#
# +server-header-tagger{content-type}
# Server headers to which this action applies are filtered on-the-fly
# through the specified regular expression based substitutions, the result
# is used as a tag. Server-header taggers are executed before all other
# header actions that modify server headers. Their tags can be used to
# control all of the other server-header actions, the content filters and
# the crunch actions (redirect and block).
#
# Server-header taggers predefined in the supplied default.filter include:
#
# content-type: Tags the request with the content type declared by the server.
# privoxy-control: Creates tags with the content of X-Privoxy-Control headers.
#
# +session-cookies-only
# If the website sets cookies, make sure they are erased when you exit
# and restart your web browser. This makes profiling cookies useless,
# but won't break sites which require cookies so that you can log in
# or for transactions.
#
# +set-image-blocker{blank}
# +set-image-blocker{pattern}
# +set-image-blocker{<URL>} with <url> being any valid image URL
# Decides what to do with URLs that end up tagged with {+block +handle-as-image}.
# There are 4 options:
# * "-set-image-blocker" will send a HTML "blocked" page, usually
# resulting in a "broken image" icon.
# * "+set-image-blocker{blank}" will send a 1x1 transparent image
# * "+set-image-blocker{pattern}" will send a 4x4 grey/white pattern
# which is less intrusive than the logo but easier to recognize
# than the transparent one.
# * "+set-image-blocker{<URL>}" will send a HTTP temporary redirect
# to the specified image URL.
#
#
# +crunch-outgoing-cookies
# Prevent the website from reading cookies
#
# +crunch-incoming-cookies
# Prevent the website from setting cookies
#
# +redirect{<URL>}
# +redirect{<pcrs command>}
# Convinces the browser that the requested document has been moved to
# another location and the browser should get it from the specified
# URL.
#
#############################################################################
#############################################################################
# Settings -- Don't change.
#############################################################################
{{settings}}
#############################################################################
for-privoxy-version=3.0.11
#############################################################################
# Aliases
#############################################################################
{{alias}}
#############################################################################
#
# You can define a short form for a list of permissions - e.g., instead
# of "-crunch-incoming-cookies -crunch-outgoing-cookies -filter -fast-redirects",
# you can just write "shop". This is called an alias.
#
# Currently, an alias can contain any character except space, tab, '=', '{'
# or '}'.
# But please use only 'a'-'z', '0'-'9', '+', and '-'.
#
# Alias names are not case sensitive.
#
# Aliases beginning with '+' or '-' may be used for system action names
# in future releases - so try to avoid alias names like this. (e.g.
# "+crunch-all-cookies" below is not a good name)
#
# Aliases must be defined before they are used.
#
# These aliases just save typing later:
#
+crunch-all-cookies = +crunch-incoming-cookies +crunch-outgoing-cookies
-crunch-all-cookies = -crunch-incoming-cookies -crunch-outgoing-cookies
allow-all-cookies = -crunch-all-cookies -session-cookies-only
allow-popups = -filter{all-popups} -filter{unsolicited-popups}
+block-as-image = +block{Blocked image request.} +handle-as-image
-block-as-image = -block
# These aliases define combinations of actions
# that are useful for certain types of sites:
#
fragile = -block -crunch-all-cookies -filter -fast-redirects -hide-referer
shop = -crunch-all-cookies allow-popups
# Your favourite blend of filters:
#
myfilters = +filter{html-annoyances} +filter{js-annoyances} +filter{all-popups}\
+filter{webbugs} +filter{banners-by-size}
# Allow ads for selected useful free sites:
#
allow-ads = -block -filter{banners-by-size} -filter{banners-by-link}
################
#
# Cautious settings -- safe for all sites, but offer little privacy protection
#
{ \
+change-x-forwarded-for{block} \
+client-header-tagger{css-requests} \
+client-header-tagger{image-requests} \
+client-header-tagger{range-requests} \
+hide-from-header{block} \
+set-image-blocker{pattern} \
}
standard.Cautious
################
#
# Medium settings -- safe for most sites, with reasonable protection/damage tradeoff
#
{ \
+change-x-forwarded-for{block} \
+client-header-tagger{css-requests} \
+client-header-tagger{image-requests} \
+client-header-tagger{range-requests} \
+deanimate-gifs{last} \
+filter{refresh-tags} \
+filter{img-reorder} \
+filter{banners-by-size} \
+filter{webbugs} \
+filter{jumping-windows} \
+filter{ie-exploits} \
+hide-from-header{block} \
+hide-referrer{conditional-block} \
+session-cookies-only \
+set-image-blocker{pattern} \
}
standard.Medium
################
#
# Advanced settings -- reasonable privacy protection but
# require some exceptions for trusted sites, most likely
# because of cookies or SSL. Also testing ground for
# new options.
#
# CAUTION: These settings can still be subverted by a
# misconfigured client that executes code from untrusted
# sources.
#
{ \
+change-x-forwarded-for{block} \
+client-header-tagger{css-requests} \
+client-header-tagger{image-requests} \
+client-header-tagger{range-requests} \
+crunch-if-none-match \
+crunch-outgoing-cookies \
+crunch-incoming-cookies \
+deanimate-gifs{last} \
+fast-redirects{check-decoded-url} \
+filter{html-annoyances} \
+filter{content-cookies} \
+filter{refresh-tags} \
+filter{img-reorder} \
+filter{banners-by-size} \
+filter{banners-by-link} \
+filter{webbugs} \
+filter{jumping-windows} \
+filter{frameset-borders} \
+filter{quicktime-kioskmode} \
+hide-if-modified-since{-60} \
+hide-from-header{block} \
+hide-referrer{conditional-block} \
+limit-connect{,} \
+overwrite-last-modified{randomize} \
+set-image-blocker{pattern} \
}
standard.Advanced
#############################################################################
# These extensions belong to images:
#############################################################################
{+handle-as-image -filter}
#############################################################################
/.*\.(gif|jpe?g|png|bmp|ico)($|\?)
#############################################################################
# These don't:
#############################################################################
{-handle-as-image}
/.*\.(js|php|css|.?html?)
#############################################################################
# These belong to multimedia files of which Firefox occasionally only
# requests parts. #2816708
#############################################################################
{-filter -deanimate-gifs}
# Sticky Actions = -filter -deanimate-gifs
# URL = http://www.example.org/foo/bar.ogg
# URL = http://www.example.net/bar.ogv
/.*\.og[gv]$
#############################################################################
# Generic block patterns by host:
#############################################################################
{+block{Host matches generic block pattern.}}
ad*.
.*ads.
.ad.?.
.ad.[a-ik-z][a-oq-z].
.ad.jp.*.
.ad.???*.
# Blocked URL = http://alternativos.iw-advertising.com/
.*advert*.
*banner*.
count*.
*counter.
# Blocked URL = http://metrics.performancing.com/
metrics.
#############################################################################
# Generic unblockers by host:
#############################################################################
{-block}
# Sticky Actions = -block
adsl.
ad[udmw]*.
adbl*.
adam*.
adapt*.
adob*.
adrenaline.
adtp*.
adv[oia]*.
adventure*.
.*road*.
.olympiad*.
.*load*.
.*[epu]ad*.
county*.
countr*.
# URL = http://metrics.torproject.org/consensus-graphs.html
metrics.torproject.org/
# URL = http://linuxcounter.net/
linuxcounter.net/
# URL = http://adinablafasel.example.org/
adina*.
# URL = http://adelelimedesign.deviantart.com/
adele*.
#############################################################################
# Generic block patterns by path:
#############################################################################
{+block{Path matches generic block pattern.}}
# Blocked URL = http://www.example.org/adimage
# Blocked URL = http://www.example.org/adspace
/(.*/)?ad(\?|/|s|v|_?(image|se?rv|box)|cycle|rotate|mentor|click|f[ra]m|script|stream|fetch|log|space)
/phpads(new)?/
/(.*/)?(ad|all|nn|db|promo(tion)?)?[-_]?banner
/(.*/)?(publicite|werbung|rekla(me|am)|annonse|maino(kset|nta|s)?/)
/.*(count|track|compteur|(?<!relo)adframe|adse?rve?|banner)(er|run)?(\?|\.(pl|cgi|exe|dll|asp|php|cpt))
/(.*/)?clicktrack
/(.*/)?(full)?pop[-_]?(up|over|under|open(er)?)?s?(/|\.)
/(.*/)?((flash)?pop|live(cnt|count(er)?)).*\.(js|php|cgi)
# Blocked URL = http://thequietus.com/openx/www/delivery/ck.php?n=ae777ee2&cb=INSERT_RANDOM_NUMBER_HERE
/openx/www/delivery/
# Blocked URL = http://mem.brandreachsys.com/www/delivery/lg.php?bannerid=13783&campaignid=0&zoneid=550&cb=f22df9acaa
/.*bannerid=
# MASTER# BLOCK-REFERRER: http://www.augsburger-allgemeine.de/donauwoerth/Grosseinsatz-Polizist-schiesst-um-sich-Er-hat-mehrere-Waffen-id30561822.html
# Blocked URL = http://bilder.augsburger-allgemeine.de/img/incoming/orig30444932/2560007661/DigiAd-Zeopexx-03072014.gif
# Blocked URL = http://bilder.augsburger-allgemeine.de/img/incoming/orig30463337/9180008457/DigiAd-AugenblickOptik-04072014.gif
/.*DigiAd
#############################################################################
# Generic unblockers by path:
#############################################################################
{-block}
# Sticky Actions = -block
/.*ad(sl|v(i[cs]|o|an|ertencia|ent|.*search|erse)) # advice/advisories/advan*/advertencia (spanish) adverse
/.*(lo|thre|he|d|gr|l|ro|re|squ|class(ified)?)ads
/.*account
support./(.*/)?track
# URL = http://repo.or.cz/r/vlc.git/objects/ad/1d316efd83157217fdf9b5d417dddca54bbf41
/.*\.git/objects/
# URL = http://code.google.com/p/sm-ssc/wiki/Bugtracker?tm=3
/.*Bugtracker
# URL = http://tiggit.net/forum/jscripts/popup_menu.js?ver=1600
# URL = http://www.av-comparatives.org/forum/wcf/js/PopupMenuList.class.js
# URL = http://oystatic.ignimgs.com/src/ve3d/sites/ve3d.ign.com/js/production/popupmenu.js
# URL = http://www.cutepdf.com/include/popmenu.js
# URL = http://www.cutepdf.com/include/popmenuv.js
/(.*/)?pop[a-z_-]*menu
#############################################################################
# Exceptions for academia and non-profits
#############################################################################
.edu
.ac.*/
.uni-*.de
.tu-*.de
.gov
.hs-*.de
.fh-*.de
# URL = http://www.gnu.org/graphics/gnu-head-banner.png
.org/.*(image|banner)
#############################################################################
# Catch-all for false-positives that are just TOO obvious to let go
#############################################################################
{+block{Catch-all block for false-positives.}}
.ads[erv][rv]*.
# Blocked URL = http://ads.facebook.com/ads/spreadshirt/banner120x600.jpg
.ads.
/(.*/)?ad(se?rv|click|stream|image|log|farm|script)
# Blocked URL = http://www.torrentportal.com/topad.html
/.*(top|bottom|left|right|text)_?ad
#############################################################################
# Catch-all exceptions
#############################################################################
{-block}
# Sticky Actions = -block
# URL = http://support.apple.com/downloads/DL985/en_US/RemoteDesktopAdmin332.dmg
/.*desktopadmin
# URL = http://www.rai.it/dl/RaiTV/popup/player_radio.html?v=9
# URL = http://www.rai.tv/dl/RaiTV/popup/player_radio.html?v=9
# URL = http://static.bbci.co.uk/radio/player/popup.js
/(.*/)?(player|radio|tv|television).?pop
/(.*/)?pop[-_]?(up|over|under|open(er)?)?s?(/|\.)(player|radio|tv|television)
# URL = http://popplers5.bandcamp.com/download/track?enc=mp3-128&fsig=bad421a4c31dda49faceefb0f3923630&id=342903379&stream=1&ts=1355881937.0
/.*download
#----------------------------------------------------------------------------
# Misc Web-bugs, JS and just plain Junk. Images here aren't normal images.
#----------------------------------------------------------------------------
{+block{Might be a web-bug.} +handle-as-empty-document -handle-as-image}
/b/ss/.+
/HG\?hc=
.visistat.com
.google-analytics./
.overture.
.doubleclick.net/adi
.doubleclick.net/(.*/)?adj/
view.atdmt.com/(.*/)?iview/
tracking.
/(.*/)?adjs\.php\?
.bc.yahoo.com/b\?P=
x*.alexa.com
/event.ng/
# MASTER# BLOCK-REFERRER: http://www.play.com/PC/PCs/-/653/860/-/12068815/Asus-VK192S-19-Widescreen-LCD-Monitor-With-Webcam-White/Product.html
# Blocked URL = http://sd.play.com/eluminate?ci=90121638&st=1296424516858&vn1=4.3.1&ec=UTF-8&vn...
# Blocked URL = http://data.coremetrics.com/cm?ci=90121638&st=1296435164623&vn1=4.3.1&ec=UTF-8&vn...
/(eluminate|cm)\?[tc]i=\d+&st=\d+&
.snapfiles.net/rotation/.*\.asp
spa.snap.com/
.insitemetrics.com/
.extreme-dm.com/
stats.reinvigorate.net/
.getclicky.com/
.quantserve.com
# Blocked URL = http://media.adrevolver.com/adrevolver/trace?sip=123&cpy=123
media.adrevolver.com/
# Blocked URL = http://static.chartbeat.com/js/chartbeat.js
.chartbeat.com/(.*/)?chartbeat\.js$
# Blocked URL = http://js.adlink.net/js?lang=de&s=duesseldorf-international.de&z=home&d=1274103403564
js.adlink.net/
# Blocked URL = nl.sitestat.com/rdw/rdw/s?www.nl.voertuigeigenaar.voertuigeigenaar&ns__t=1274099350343
.sitestat.com/
# Blocked URL = http://pagead.googlesyndication.example.com/foo/bar/baz.js
pagead*.googlesyndication./.*\.js
scripts.chitika.net/.*\.js
.adinterax.com/.*\.js
# Blocked URL = http://partner.googleadservices.com/gampad/google_service.js
# Blocked URL = http://partner.googleadservices.com/gampad/google_ads.js
# Blocked URL = http://partner.googleadservices.com/gampad/slotdata.js?callback=_GA_googleAdData.setAdSlotAttributes&client=ca-gam-lexico
.googleadservices.com/gampad/.*\.js
# Blocked URL = http://richmedia.yimg.com/js/123/personnals_banners/PER_happy_sara1_4_425x600/ad.js?q=123
/.*/ad\.js\?
# Blocked URL = http://i.cmpnet.com/shared/omniture/s_code_remote.js
/.*omniture.*\.js
# Blocked URL = http://gadk.hit.gemius.pl/*/_1274097577014/rexdot.gif?l=30&id=..DlR.vCLZGB56RmfkYNSWZVLSqB3ueYOP.Oec5WWiv.h7&fr=1&fv=WIN%2010%2C0%2C45%2C2&tz=-120&href=http%3A//www.baadgalleri.dk/&ref=&screen=1440x900&col=32
.gemius.pl/
# Blocked URL = http://farm.plista.com/widgetdata.php?clientrev=12&domainid=4211&publickey=fdc5a7f9d15be004aa03fc4d&cb=PLISTA5_7ed57c93e0d17&requestID=5&5=widgetintegration%3A%02pictureads%03&6=pictureads%3A%1Cpictureid%1F%026716%03%1Eimgdim%1F%1Cx%1F547%1Ey%1F410%1D%1Ewidgetname%1F%02pictureads%03%1D
farm.plista.com/widgetdata.php
# Blocked URL = http://ib.adnxs.com/bounce?%2Fseg%3Fadd%3D279412
.adnxs.com/
# Blocked URL = http://service.maxymiser.net/cdn/zoover/js/mmcore.js
service.maxymiser.net/
# Blocked URL = http://tcr.tynt.com/javascripts/Tracer.js?user=cT9yCKGeer3PWlab7jrHtB&s=62
.tynt.com/
# Blocked URL = http://pool.sanoma.adhese.com/tag/tag.js
pool.*.adhese.com/
# Blocked URL = http://www.canon.nl/scripts/webtrends.js
/scripts/webtrends\.js
# Blocked URL = http://oskar.tradera.com/script.js
oskar.tradera.com/
# Blocked URL = http://www.adcash.com/script/java.php?option=rotateur&rotateur=146355
.adcash.com/script/
{+block{Might be a web-bug.} -handle-as-empty-document +handle-as-image}
/(.*/)?__utm.gif\?
/.*\.gif\?D=DM
#stats.surfaid.ihost.com/(crc/)?images/(bounce/)?uc.GIF
# Blocked URL = http://stats.surfaid.ihost.com/crc/images/bounce/uc.GIF
# Blocked URL = http://stats.surfaid.ihost.com/rc/images/bounce/uc.GIF
stats./c?rc/.*/uc.gif
/(.*/)?dcs.gif\?&?dcs
/(.*/)?c(lear)?\.gif\?.
#/(.*/)?(clear|(trans_?1x|blank)?1).gif
/(.*/)?(clear|blank|(trans_?|1x)?1).gif\?.
stats./.*\.gif\?
# Blocked URL = http://ad.yieldmanager.com/pixel?id=123456&t=2
.yieldmanager.com/pixel\?
# Blocked URL = http://a.analytics.yahoo.com/p.pl?a=1000226660965&js=no
# Blocked URL = http://s.analytics.yahoo.com/fpc.pl?a=1000461640983&v=4.43&enc=utf-8&f=http%3A//www.zoover.nl/nederland/limburg/maasbracht/weer%23tabs&b=Het%20Weer%20in%20Maasbracht.%20Bekijk%20Weersverwachting%20van%20Maasbracht%20%7C%20Zoover%23tabs&flv=WIN%2010%2C0%2C45%2C2&d=Mon%2C%2017%20May%202010%2014%3A09%3A26%20UTC&n=-2&g=nl&h=Y&j=1440x900&k=32&l=true&ittidx=0&fpc=uP04C7j4%7ClaDQjglKaa%7Cfses1000461640983%3D%7CkbSSgv6Jaa%7CuP04C7j4%7Cfvis1000461640983%3DZj1odHRwJTNBLy93d3cuem9vdmVyLm5sLyZiPVpvb3ZlciUyMCU3QyUyMFZha2FudGllYmVvb3JkZWxpbmdlbiUyMHZvb3IlMjBlbiUyMGRvb3IlMjByZWl6aWdlcnM%3D%7C8sHTYo10oM%7C8sHTYo10oM%7C8sHTYo10oM%7CT%7C8sHTYo10oM%7C8sHTYo10oM
.analytics.yahoo.com
# Blocked URL = http://go.idmnet.bbelements.com/please/showit/46/1/1/1/?typkodu=img&keywords=
go.idmnet.bbelements.com/please/showit/
# Blocked URL = http://gm-link.com/tm_image.asp?c=12345&x=0&[email protected]&orc.gif
gm-link.com/
#############################################################################
# Site-specific block patterns;
#############################################################################
{+block{Domain parking site}}
# Blocked URL = http://www.sedoparking.com/www.inetcat.org
.sedoparking.com/
# Blocked URL = http://landing.trafficz.com/index.php?domain=www.inetcat.org
landing.trafficz.com/
# Blocked URL = http://www.searchnut.com/?domain=www.inetcat.org
.searchnut.com/\?domain
# Blocked URL = http://wwwz.websearch.verizon.net/search?qo=www.qwetyhjkl.com
wwwz.websearch.verizon.net/search\?qo=
{+block{Site-specific block pattern matches.}}
# Blocked URL = http://www.hitbox.com/foobar
.hitbox.com
# Blocked URL = http://www..the-gadgeteer.com/cgi-bin/getimage.cgi/
.the-gadgeteer.com/cgi-bin/getimage.cgi/
# Blocked URL = http://dest.travelocity.com/website/destinations/images/partner_frommers.gif
# Blocked URL = http://dest.travelocity.com/website/destinations/images/travelex_logo.gif
dest.travelocity.com/website/destinations/images/partner_frommers.gif
dest.travelocity.com/website/destinations/images/travelex_logo.gif
i.imdb.com/Photos/CMSIcons/(?!buttons|emoticons)
rcm.amazon.com
# Blocked URL = http://www.nytimes.com/adx/foo
.nytimes.com/adx/
#www.popupad.net/ats/
.adtrak.net
.elitemediagroup.net
.popuptraffic.com
.hit-now.com
[a-v]*.valueclick.com
.cpays.com
.oxado.com
.adult*finder.com
/scripts/cms/xcms.asp
/.*intellitxt/
.intellitxt.com
.kontera.com
.tribalfusion.com/ctxt
.klipmart.com
ad*.com.com
sales.liveperson.net
.iad.liveperson.net
.coremetrics.com/
.realmedia.com/data/
.revsci.net
.clickability.com
/.*clickability(.com)?/
stats.*.ihost.com
.2o7.net
.webtrends.com
.tacoda.
ad.theadhost.com
.adbureau.net
.adgardener.com
.revenue.net
.geocities.com/js_source
.dartsearch.net
.zedo.com
.trk.sodoit.com/
.espace.netavenir.com
.hitfarm.com
.topnemo.com/engine
.top100categories.com/engine
/(t|search)\.php\?uid=ws[a-z0-9]+\.[a-z0-9]+
.adinterax.com/(?!(.*)\.(js|gif|jpg))
img.bluehost.com
linuxinsider.com/images/sda/
[a-z].clickdensity.com
.widgetbucks.com
# Blocked URL = http://img.dailymail.co.uk/i/promo_boxes/groTime_promo.jpg
# Blocked URL = http://img.dailymail.co.uk/i/promo_boxes/idealhome_promo.gif
img.dailymail.co.uk/i/promo_boxes/
# Blocked URL = http://cache.opt.fimserve.com/contents/325/84/84325/LIN728x90.swf?%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20clickTag=http%3A//delb.opt.fimserve.com/lnk/%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%3Fk%3DODk1ODc7Mzs0MDA7ODQzMjU7Zi44LjkuaHYuaGdseHBzbG9uaCBvem0uNzYuZkBAeHp5b3ZAQGxobmxAQCs4XzlAQHhsbnN2biBoZHZ3dm1AQGh2QEBmOzEyMTQ1MTE1MjgzMzA7Mjs7MTMxfDsxOzQ7NzIxODs4ODAyODc3NQ%3D%3Dhref%3Dhttp%3A//www.myspace.com/liveinnordics&clickTarget=_new
.fimserve.com
# Blocked URL = http://static.lycos-europe.net/lea/se/pricerunner/040608_728x90_payback_digitalkamer.gif
static.lycos-europe.net
# Blocked URL = http://82.99.18.195/media.1/112/9460/146016/150x175_Hitta_FV_Feb08.gif
82.99.18.195
# Blocked URL = http://clk.atdmt.com/
# Blocked URL = http://view.atdmt.com/action/mrtiwy_FY10Office2010BetaHomeandBiz1_1
.atdmt.com/
# Blocked URL = http://www.awin1.com/cread.php?s=123049&v=1983&q=80970&r=79561
.awin1.com
# Blocked URL = http://rotator.adjuggler.com/servlet/ajrotator/616245/0/vh?z=csm&dim=616028
.adjuggler.com/servlet/ajrotator/
# Blocked URL = http://bcc.co.uk/
bcc.co.uk/
# Blocked URL = http://fusion.adtoma.com:80/125AFFE801/1DC59C7801.swf
# Blocked URL = http://fusion.adtoma.com/1254D5CC01/1E43C76801.jpg
fusion.adtoma.com/
# Blocked URL = http://ping.chartbeat.net/ping?h=uservoice.com&p=%2Fsuggestions%2Fping-chartbeat-net-sucks&u=3
.chartbeat.net/(.*/)?ping\?
# Blocked URL = http://s.atemda.com/Admeta.js
# Blocked URL = http://atemda.com/ClickThrough.ashx?pId=9616&mId=14484&tId=634102151426089505&opS=1&admetac=mR3sJ3%2b9yleq%2bHowITh0hw%3d%3d
.atemda.com/
# Blocked URL = http://ciscosystemsinc.tt.omtrdc.net/m2/ciscosystemsinc/mbox/standard?mboxHost=www.cisco.com&mboxSession=12
.omtrdc.net/
# Blocked URL = http://www91.intel.com/b/ss/intelcorp,intelcorpdc/...ONDataProvider.aspx%3FDownloadType%3DDrivers&ot=A&AQE=1
www91.intel.com/
# Blocked URL = http://reklamy.sfd.pl/sportpl.ashx?clickTag=http://gazeta.hit.gemius.pl/hitredir/id=ApuVHydwkYW81VSL0PZYqnXoDosBucMur1zZqGEAJa7.X7/stparam=sifgmrnlfi/url=http://reklamy.sfd.pl/sportpl_redirect.ashx
reklamy.sfd.pl/
# Blocked URL = http://rotation.linuxnewmedia.com/www/delivery/avw.php?zoneid=26&n=aa584766
rotation.linuxnewmedia.com/
# Blocked URL = http://de17a.com/a/33039/26891.swf
de17a.com/
# Blocked URL = http://cltomedia.info/delivery/afr.php?zoneid=7&cb=1279946132
cltomedia.info/delivery/
# Blocked URL = http://cdn2.adexprt.com/clkads/sky2.html
.adexprt.com/
# Blocked URL = http://data.gosquared.com/pv?a=GSN-311503-M&cs=UTF-8&cd=24&fl=11.7%20r700&je=0&la=de-de&sw=1280&sh=1024&dm=adn.speedtest.net&pa=%2F&pt=Speedtest.net%20-%20Der%20Globale%20Breitband-Geschwindigkeitstest&pr=http%3A&po=-&pl=0&tl=82&ri=1&ru=http%3A%2F%2Fadn.speedtest.net%2F&ui=1876309225&re=1&vi=1&pv=5&lv=1369129426&vw=1280&vh=878&dw=1263&dh=1325&st=0&sl=0&tv=4.0
data.gosquared.com/
# Blocked URL = http://resources.infolinks.com/js/infolinks_main.js
resources.infolinks.com/
# Blocked URL = http://abs.proxistore.com/abe/js/psuniversaltag.js?v=
abs.proxistore.com/abe/
# Blocked URL = http://rtax.criteo.com/delivery/rta/rta.js?netId=
rtax.criteo.com/
static.criteo.net/
static.criteo.com/
static.*.criteo.net/
cas.*.criteo.com/
cas.criteo.com/
#----------------------------------------------------------------------------
# JavaScripts and Texts for ad and popup generation
#----------------------------------------------------------------------------
# Blocked URL = http://a.tfag.de/js.ng/
/js\.ng/
/popunder
/t\.php\?cat=.*&kw=.*&sc=
jlinks.industrybrains.com/
js.adsonar.
# Blocked URL = http://bwp.zdnet.com/search?dw-siteid=2&dw-ptid=2100&dw-edid=2&dw-ontid=800004
bwp.
# Blocked URL = http://us.mc123.mail.yahoo.com/mc/stampNonJs
.yahoo.com/mc/stampNonJs
#############################################################################
# Generic block-as-image patterns:
#############################################################################
{+block-as-image}
# XXX: Should use "+block{Blocked image request.}", but Privoxy-Regression-Test