Post Reply 
Privoxy
Oct. 10, 2008, 02:13 AM
Post: #1
Privoxy
I've been playing around with Privoxy as a HTTP web-filter proxy at work, and it's been co-operating very nicely. You can find it at http://www.privoxy.org/

I just stumbled upon this link: http://www.neilvandyke.org/privoxy-rules/
Seems to be a well-maintained "blocklist", and I'm going to have to see how well it functions by surfing around the Internet Wink
Visit this user's website
Add Thank You Quote this message in a reply
Oct. 21, 2008, 02:51 AM
Post: #2
RE: Privoxy
Just a small update, my connection now looks like:

Browser => Privoxy => Proxomitron => Internet

In Privoxy's Main Configuation file, I've added the following to the top:

Code:
forward   /      127.0.0.1:8080
forward   :443   .

This forwards all connection requests to Proxomitron, but with SSL connections bypassed. (I don't have any need to filter SSL pages)

I've also done one more change; in "c:\Program Files\Privoxy\templates\", I've renamed "blocked" to "blocked_orig" and created a 0-byte "blocked" file. This removes/hides the "BLOCKED" page injected into pages where ads/banners previously were.

I intend for Privoxy to remove the ads/banners, and Proxomitron to offer its web-filtering power (rewriting and manipulating code) ;)

In Proxomitron, I've created a completely blank config file, and am slowly writing filters to encounter any nuisance I run across.

I just wanted to see how/if this combination works out. I'll keep everyone posted on how nicely the two play together! (So far pages are loading noticeably quicker)

I'm using the above filterset in conjunction with the default Privoxy rules.
Memory-wise, Privoxy is using 2,760 K, Proxomitron 2,696 K.
Visit this user's website
Add Thank You Quote this message in a reply
Oct. 21, 2008, 12:12 PM
Post: #3
RE: Privoxy
Quote:In Proxomitron, I've created a completely blank config file


I started doing my own config from a blank file three months ago and i don't reccomend you Kye. Of course you have more experience than me, but to start writing our own config we first need filters to:

-decide what pages to filter. It's not sufficient $TYPE
-correct MIME types to decide if filter them or not
-decide what parts of files to filter. Usefull to fast remove of server addons.
-stablish global variables to be tested inside other filters in different situations (inside script, inside anchor...)
-use lists as url parser and count. To hava good techniques to detect offsite
-convert addreses from relative to absolute
-add to a blocklist clicking on a link
-measure the use of cpu by proxomitron of your different techniques to decide wich is best
-(optional but nice) use clever caching. Maximum 5 minutes for html, 10 minutes for big images,15 for js and css files, and 2 or 1 days for small images (useful for forums like castlecops), etc...

I assure you this is a hard work, and its only to start writing your own filters. I have some WIP of these things, but maybe it's time to do something between all: ¡¡¡The Starting Config!!!
Add Thank You Quote this message in a reply
Oct. 27, 2008, 05:31 PM (This post was last modified: Oct. 27, 2008 05:32 PM by turtle.)
Post: #4
RE: Privoxy
Question,
Which way is best and why?
Browser => Privoxy => Proxomitron => Internet
or
Browser => Proxomiton => Privoxy => Internet
--either way I see a slight slow down on large searches with google.
Dosen't Proxomitron with the right filters do all that Privoxy can do?
So why use Privoxy, and run slower, and more headaces when some thing stops working(knowing where the problem is)?
Add Thank You Quote this message in a reply
Oct. 28, 2008, 08:22 AM (This post was last modified: Oct. 28, 2008 09:06 AM by ramsy.)
Post: #5
RE: Privoxy
The Vidalia project & Tor development may be exploring alternatives to Privoxy. This project is garnering more support from EFF & other deep pockets.

The TOR/Privoxy combo historically was most suited to anonymity; Privoxy preventing SOCKS DNS leakage.
You might check if Privoxy filtering efforts/limits were examined/duplicated here, and what alternatives are being developed.

http://www.vidalia-project.net/
https://www.torproject.org/

This Vidalia bundle runs with my STD-Sidki config. by checking Proxo's "Use Remote Proxy" box, with these lines added to default.cfg

[Proxies]
OpenLog = TRUE

>localhost:8118 Tor

Connection security can then be tested manually at
http://network-tools.com/analyze/

network-tools shows my only visible trace is browser type and local time, and Proxo's log window shows filtering data from port 8118 (Tor/Privoxy's protected network).

Presumably, this makes my online shopping habits & marketing statistics private from destination sites, but perhaps not from AT&T's exploited backbone policy, if user logs occur before Tor-connection points.

If so, ISP subpoenaed usage tracks remain visible, and illegality prosecutable, regardless of client's use of Tor.
(Oct. 10, 2008 02:13 AM)Kye-U Wrote:  I just stumbled upon this link: http://www.neilvandyke.org/privoxy-rules/
Seems to be a well-maintained "blocklist"

Safer Networking Ltd's freeware "Spybot Search & Destroy" maintains a blocklist for maleware sources, designed by setting each blocked domain to 127.0.0.1 in the Windows OS "hosts" file. This file grows each month, currently at 263 kb.
http://www.safer-networking.ie/en/index.html
Some network slowdowns have been reported by doing this.
http://accs-net.com/hosts/faq.html
Add Thank You Quote this message in a reply
Post Reply 


Forum Jump: