privoxy | This repo is unofficial mirror
kandi X-RAY | privoxy Summary
kandi X-RAY | privoxy Summary
This README is included with Privoxy 3.0.24. See for more information. The current code maturity level is "stable". Privoxy is a non-caching web proxy with advanced filtering capabilities for enhancing privacy, modifying web page data and HTTP headers, controlling access, and removing ads and other obnoxious Internet junk. Privoxy has a flexible configuration and can be customized to suit individual needs and tastes. It has application for both stand-alone systems and multi-user networks. Privoxy is Free Software and licensed under the GNU GPLv2. Privoxy is an associated project of Software in the Public Interest (SPI).
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of privoxy
privoxy Key Features
privoxy Examples and Code Snippets
Community Discussions
Trending Discussions on privoxy
QUESTION
I have privoxy configured and working on port 8118. I can forward HTTP and HTTPS traffic when defining the http_proxy
and https_proxy
variables to point out to the proxy. Examples:
ANSWER
Answered 2022-Apr-02 at 11:45I'm not entirely familiar with how Privoxy works, however I do know how intercepting proxy works on Linux.
HTTP proxies and intercepting proxies work in very different ways. An HTTP proxy get the destination from the first line of the query, which would contain the domain name (e.g. it should be GET http://www.google.com/ HTTP/1.1
). For HTTPS, it does an HTTP CONNECT request with the domain:port to connect to (e.g. CONNECT www.google.com:443 HTTP/1.1
).
An intercepting proxy get the original destination address from the kernel by doing a getsockopt() with some specific parameters. It has no knowledge of higher level protocol.
In general redirecting with iptables a request to an HTTP proxy does not work because of theses differences. That said, Privoxy seems to have a configuration option accept-intercepted-requests
that you can use so it read the target from the Host: HTTP header. With that configuration, it should be able to handle HTTP requests redirected using iptables. As the documentation says, this is not supported for HTTPS. You will need to use some additional software which can do the forwarding to an HTTP proxy, probably much like Proxifier does. I know moproxy can do that. It ought to not be the only one, but I don't know others.
Additional questions:
- Why setting the variables works, and through iptables doesn't?
because HTTP and transparent/intercepting proxy works in different ways. When the variables are present, curl (and other) alter how they send the query, but with iptables, they don't (as they don't know you use a proxy).
- Why do I have to set the https_proxy to point to http://...? Is that privoxy-related?
the http:// in your environment variable is to describe how you connect to the proxy (it could actually be https:// if your proxy had a tls certificate, and it would work with http requests too, though they would be encrypted only from you to the proxy, not from the proxy to the remote server).
- Regarding the comment "HTTPS is not supposed to be used with transparent proxies": So how does Proxifier work on Windows? If that is not transparent a proxy, is there another term for it? Why can't we have something similar on WSL/Linux?
I don't know the specifics of how transparent proxies work on Windows. Assuming it works a lot like Linux, Proxifier probably redirect the request to a local port, get the actual destination, wrap the data in a way it's understood by HTTP/SOCKS proxy and send that to the proxy you told it to use. Maybe the capture part is a bit different (creating a new network interface, ask Windows to send the traffic their, reconstruct the stream from raw tcp packets, wrap the data). This is often called transparent proxy as the client doesn't know a proxy is used, some call it an intercepting proxy instead. And we can have something similar, moproxy is an example (probably not the only one)
QUESTION
A normal COPY line in my Dockerfile is preventing the image from being built.
...ANSWER
Answered 2021-May-26 at 14:48COPY
will create the destination directory in the image if it doesn't already exist. However, if the destination already exists but it's a file (or something else that's not a directory) you can get this error.
You can verify this with a temporary container:
QUESTION
I am trying to deploy a mastodon server using this project: https://github.com/tootsuite/mastodon
I am running Docker-Compose and Podman on a Fedora 33 server.
...ANSWER
Answered 2021-Apr-09 at 17:01I have found a solution: removing networks' definition.
It sounds cheap, but it worked.
So the final docker-compose.yml
looks like this:
QUESTION
I'm using this library and all works well when I run my application locally. I've implemented TorSharp in a NetworkHelper class:
...ANSWER
Answered 2021-Feb-02 at 08:09Maybe your application requires special Linux capabilities not available to a Docker container by default, especially Network-related capabilities. Try running your container with --privileged
flag (or privileged: true
with Docker Compose).
For finer-grained capabilities, see Runtime privilege and Linux caps docs
QUESTION
I installed Android Studio 4.1 and installed all of SDK and JDK 8 and etc.
When I want to run this flutter run
in my project, I see this error:
ANSWER
Answered 2020-Oct-26 at 15:53if you are from iran and cuba or syria or other some other countries
this error will be showing
because of filtering, i think android studio forbade those countries
you can use vpn and try again please tell me the result
QUESTION
I am using docker-compose
to run multiple celery workers and struggling to make workers use this zeta0/alpine-tor
rotating proxy pool image the way I want.
Currently my docker-compose.yml
looks like this:
ANSWER
Answered 2020-Sep-30 at 19:12You could try running the worker
as 5 different docker-compose services(but all using the same worker
image), and also running the tor
service as 5 different docker-compose services(again, using the same tor
image).
For each of the 5 worker
services, you could pass in an environment variable indicating which tor
service you want the worker to communicate with. Then in your worker, you can use this environment variable in the tor
URL.
So your docker-compose.yml would look like this(some config removed for brevity):
QUESTION
The code for my scanner is below. If I decide to check if only port 2220 is open on 176.9.9.172, it tells me that it is. However, when I run option 0 to check ALL the ports up to 10000, it only registers that port 22 and port 80 are open. It's multi-threaded and runs up to 4 threads at a time. It waits for the 4 threads to complete and then deletes them and resets the vector of threads to reduce memory issues. I'm not sure what's causing the problem.
UPDATE - I added a section of code after myNetworkSocket = socket(AF_INET, SOCK_STREAM, 0);
in the TestPortConnection() function, and as I ran it, I found that the socket creation failed after I scanned ports 1 - 1023. I realized that I forgot to close the ports if they failed to connect in some situations. I inserted the code to close them, and it works now!
ANSWER
Answered 2020-Sep-09 at 02:11You are starting multiple execution threads, passing the pointer to the same std::vector
, named "buffer" to all of these threads:
QUESTION
I have a python FastAPI app that runs in a Kubernetes cluster on GKE. I'm trying to get the outbound traffic from the containers (pods) to route through privoxy. To test this I'm building/running the container on my local machine, but when I run the docker run -p 8080:8080 privoxy
command I get the following output/log that hangs on the last line:
ANSWER
Answered 2020-Sep-09 at 14:16Based on the operating system being used, the startup command for privoxy is incorrect. Per the privoxy startup manual the startup command should be /etc/init.d/privoxy start --no-daemon
for a debian linux OS. Also, the gosu
command before this command is not required and will crash the privoxy startup. The start.sh should look like this:
QUESTION
Why task(docker) don't use more than 32GB
of ec2, with more than 32GB
available in ec2 and task definition?
I don't know why docker doesn't use more than 32GB
, because I use an ec2 with 122GB
, and I declared in the task definition that the task has 122GB
of RAM.
I execute a task with:
...ANSWER
Answered 2020-Jul-13 at 02:41There is no such limitation of memory for ECS task, I will recommend removing memory restriction so your task will able to use Maximum
memory of underlying EC2 instance if required.
Just use memoryReservation
parameter and remove memory
configuration from the task defintion.
QUESTION
Collecting autopep8
Retrying (Retry(total=4, connect=None, read=None, redirect=None, status=None)) after connection broken by 'ProxyError('Cannot connect to proxy.', OSError('Tunnel connection failed: 500 Internal Privoxy Error',))': /simple/autopep8/
Retrying (Retry(total=3, connect=None, read=None, redirect=None, status=None)) after connection broken by 'ProxyError('Cannot connect to proxy.', OSError('Tunnel connection failed: 500 Internal Privoxy Error',))': /simple/autopep8/
Retrying (Retry(total=2, connect=None, read=None, redirect=None, status=None)) after connection broken by 'ProxyError('Cannot connect to proxy.', OSError('Tunnel connection failed: 500 Internal Privoxy Error',))': /simple/autopep8/
Retrying (Retry(total=1, connect=None, read=None, redirect=None, status=None)) after connection broken by 'ProxyError('Cannot connect to proxy.', OSError('Tunnel connection failed: 500 Internal Privoxy Error',))': /simple/autopep8/
Retrying (Retry(total=0, connect=None, read=None, redirect=None, status=None)) after connection broken by 'ProxyError('Cannot connect to proxy.', OSError('Tunnel connection failed: 500 Internal Privoxy Error',))': /simple/autopep8/
Could not find a version that satisfies the requirement autopep8 (from versions: )
No matching distribution found for autopep8
...ANSWER
Answered 2020-Jul-02 at 14:15You can specify the proxy as a parameter to pip install:
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install privoxy
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page