Options · Checking Options · Installation · Copyright · (FAQ)
junkbuster - The Internet Junkbuster Proxy TM
junkbuster
[-a]
[-y]
[-s]
[-c]
[-v]
[-u user_agent]
[-r referer]
[-t from]
[-b blockfile]
[-j jarfile]
[-l logfile]
[-w NAME=VALUE]
[-x Header_text]
[-h [bind_host_address][:bind_port]]
[-f forward_host[:port]]
[-d N]
[-g gw_protocol[:[gw_host][:gw_port]]]
junkbuster is an instrumentable proxy that filters the HTTP stream between web servers and browsers.
To compare the domains, the pattern domain and the target domain specified in the URL are each broken into their components. (Components are separated by the . (period) character.) Next each of the target components is compared with the corresponding pattern component: last with last, next-to-last with next-to-last, and so on. (This is called right-anchored matching.) If all of the pattern components find their match in the target, then the domains are considered a match. Case is irrelevant when comparing domain components.
A successfully matching pattern can be an anchored substring of a target, but not vice versa. Thus if a pattern doesn't specify a domain, it matches all domains. Furthermore, when comparing two components, the components must either match in their entirety or up to a wildcard * (star character) in the pattern. The wildcard feature implements only a "prefix" match capability ("abc*" vs. "abcdefg"), not suffix matching ("*efg" vs. "abcdefg") or infix matching ("abc*efg" vs. "abcdefg"). The feature is restricted to the domain component; it is unrelated to the optional regular expression feature in the path (described below).
If a numeric port is specified in the pattern domain, then the target port must match as well. The default port in a target is port 80.
If the domain and port match, then the target URL path is checked for a match against the path in the pattern. Paths are compared with a simple case-sensitive left-anchored substring comparison. Once again, the pattern can be an anchored substring of the target, but not vice versa. A path of / (slash) would match all paths. Wildcards are not considered in path comparisons.
For example, the target
URL
the.yellow-brick-road.com/TinMan/has_no_brain
would be matched (and blocked) by the following patterns
yellow-brick-road.com
and
Yellow*.COM
and
/TinM
but not
follow.the.yellow-brick-road.com
or
/tinman
Comments in a blockfile start with a # (hash) character and end at a new line. Blank lines are also ignored.
Lines beginning with a ~ (tilde) character are taken to be exceptions: a URL blocked by previous patterns that matches the rest of the line is let through. (The last match wins.)
Patterns may contain POSIX regular expressions provided the junkbuster was compiled with this option. The idiom /*.*/ad can then be used.
In version 1.3 and later the blockfile and cookiefile are checked for changes before each request.
In Version 1.2 and later this option must be followed by a filename containing instructions on which sites are allowed to receive and set cookies. By default cookies are dropped in both the browser's request and the server's response, unless the URL requested matches an entry in the cookiefile. The matching algorithm is the same as for the blockfile. A leading > character allows server-bound cookies only; a < allows only browser-bound cookies; a ~ character stops cookies in both directions. Thus a cookiefile containing a single line with the two characters >* will pass on all cookies to servers but not give any new ones to the browser.
The user's browser should not be configured to use SOCKS; the proxy conducts the negotiations, not the browser.
The user identification capabilities of SOCKS4 are deliberately not used; the user is always identified to the SOCKS server as userid=anonymous. If the server's policy is to reject requests from anonymous, the proxy will not work. Use -d 3 to see the status returned by the server.
Because most browsers send several requests in parallel their contents may appear intermingled, so the -s option is recommended when using -d with N greater than 1.
Browsers must be told to find the junkbuster (e.g. localhost port 8000). To set the HTTP proxy in Netscape 3.0, go through: Options; Network Preferences; Proxies; Manual Proxy Configuration; View. See the FAQ for other browsers. The Security Proxy should also be set to the same values, otherwise shttp: URLs won't work.
Note the limitations explained in the FAQ.
To allow users to check that a junkbuster is running and how it is configured, it intercepts requests for any URL ending in /show-proxy-args and blocks it, returning instead information on its version number and current configuration including the contents of its blockfile. To get an explicit warning that no junkbuster intervened if the proxy was not configured, it's best to point it to a URL that does this, such as Junkbusters' one.
http://www.junkbusters.com/ht/en/ijbfaq.html
http://www.junkbusters.com/ht/en/cookies.html
http://internet.junkbuster.com/cgi-bin/show-proxy-args
http://www.netscape.com/newsref/std/cookie_spec.html
http://www.ds.internic.net/rfc/rfc2109.txt
http://squid.nlanr.net/Squid/
http://www.math.ucsb.edu/%7Eboldt/
Written and copyright by the Anonymous Coders and Junkbusters Corporation and made available under the GNU General Public License (GPL). This software comes with NO WARRANTY. Internet Junkbuster is a trademark of Junkbusters Corporation.
Home · Next · Site Map · Privacy · Web Ads · Telemarketing · Junk Mail · Junk E-mail · SearchCopyright © 1996-7 Junkbusters Corporation. (TM) Copying and distribution permitted under the GNU General Public License: view document's source. 1997/04/22 http://www.junkbusters.com/ht/en/ijbman.html
webmaster@junkbusters.com