

It has no knowledge of higher level protocol. CONNECT HTTP/1.1).Īn intercepting proxy get the original destination address from the kernel by doing a getsockopt() with some specific parameters. For HTTPS, it does an HTTP CONNECT request with the domain:port to connect to (e.g. An HTTP proxy get the destination from the first line of the query, which would contain the domain name (e.g. HTTP proxies and intercepting proxies work in very different ways. I'm not entirely familiar with how Privoxy works, however I do know how intercepting proxy works on Linux.

Privoxy does not work with traffic from iptables There are some hacks, but it doesn't make any sense and is useless. HTTPS cannot be used with a transparent proxy. How to use iptables in linux to forward http and https traffic to a transparent proxy iptables -t nat -A PREROUTING -p tcp -dport 80 -j REDIRECT -to 9090
