|
|
- config tinyproxy
-
- #
- # Enable the proxy
- #
- option enabled 0
-
- #
- # Name of the user the tinyproxy daemon should switch to after the port
- # has been bound.
- #
- option User nobody
- option Group nogroup
-
- #
- # Port to listen on.
- #
- option Port 8888
-
- #
- # If you have multiple interfaces this allows you to bind to only one. If
- # this is commented out, tinyproxy will bind to all interfaces present.
- #
- #option Listen 192.168.0.1
-
- #
- # The Bind directive allows you to bind the outgoing connections to a
- # particular IP address.
- #
- #option Bind 192.168.0.1
-
- #
- # Timeout: The number of seconds of inactivity a connection is allowed to
- # have before it closed by tinyproxy.
- #
- option Timeout 600
-
- #
- # ErrorFile: Defines the HTML file to send when a given HTTP error
- # occurs. You will probably need to customize the location to your
- # particular install. The usual locations to check are:
- # /usr/local/share/tinyproxy
- # /usr/share/tinyproxy
- # /etc/tinyproxy
- #
- #option ErrorFile_404 "/usr/share/tinyproxy/404.html"
- #option ErrorFile_400 "/usr/share/tinyproxy/400.html"
- #option ErrorFile_503 "/usr/share/tinyproxy/503.html"
- #option ErrorFile_403 "/usr/share/tinyproxy/403.html"
- #option ErrorFile_408 "/usr/share/tinyproxy/408.html"
-
- #
- # DefaultErrorFile: The HTML file that gets sent if there is no
- # HTML file defined with an ErrorFile keyword for the HTTP error
- # that has occurred.
- #
- option DefaultErrorFile "/usr/share/tinyproxy/default.html"
-
- #
- # StatFile: The HTML file that gets sent when a request is made
- # for the stathost. If this file doesn't exist a basic page is
- # hardcoded in tinyproxy.
- #
- option StatFile "/usr/share/tinyproxy/stats.html"
-
- #
- # Where to log the information. Either LogFile or Syslog should be set,
- # but not both.
- #
- option LogFile "/var/log/tinyproxy.log"
- #option Syslog 1
-
- #
- # Set the logging level. Allowed settings are:
- # Critical (least verbose)
- # Error
- # Warning
- # Notice
- # Connect (to log connections without Info's noise)
- # Info (most verbose)
- # The LogLevel logs from the set level and above. For example, if the LogLevel
- # was set to Warning, than all log messages from Warning to Critical would be
- # output, but Notice and below would be suppressed.
- #
- option LogLevel Info
-
- #
- # Include the X-Tinyproxy header, which has the client's IP address when
- # connecting to the sites listed.
- #
- # list XTinyproxy mydomain.com
-
- #
- # This is the absolute highest number of threads which will be created. In
- # other words, only MaxClients number of clients can be connected at the
- # same time.
- #
- option MaxClients 100
-
- #
- # These settings set the upper and lower limit for the number of
- # spare servers which should be available. If the number of spare servers
- # falls below MinSpareServers then new ones will be created. If the number
- # of servers exceeds MaxSpareServers then the extras will be killed off.
- #
- option MinSpareServers 5
- option MaxSpareServers 20
-
- #
- # Number of servers to start initially.
- #
- option StartServers 10
-
- #
- # MaxRequestsPerChild is the number of connections a thread will handle
- # before it is killed. In practise this should be set to 0, which disables
- # thread reaping. If you do notice problems with memory leakage, then set
- # this to something like 10000
- #
- option MaxRequestsPerChild 0
-
- #
- # The following is the authorization controls. If there are any access
- # control keywords then the default action is to DENY. Otherwise, the
- # default action is ALLOW.
- #
- # Also the order of the controls are important. The incoming connections
- # are tested against the controls based on order.
- #
- list Allow 127.0.0.1
- #list Allow 192.168.0.0/16
- #list Allow 172.16.0.0/12
- #list Allow 10.0.0.0/8
-
- #
- # The "Via" header is required by the HTTP RFC, but using the real host name
- # is a security concern. If the following directive is enabled, the string
- # supplied will be used as the host name in the Via header; otherwise, the
- # server's host name will be used.
- #
- option ViaProxyName "tinyproxy"
-
- #
- # The location of the filter file.
- #
- #option Filter "/etc/tinyproxy/filter"
-
- #
- # Filter based on URLs rather than domains.
- #
- #option FilterURLs 1
-
- #
- # Use POSIX Extended regular expressions rather than basic.
- #
- #option FilterExtended 1
-
- #
- # Use case sensitive regular expressions.
- #
- #option FilterCaseSensitive 1
-
- #
- # Change the default policy of the filtering system. If this directive is
- # commented out, or is set to "0" then the default policy is to allow
- # everything which is not specifically denied by the filter file.
- #
- # However, by setting this directive to "1" the default policy becomes to
- # deny everything which is _not_ specifically allowed by the filter file.
- #
- #option FilterDefaultDeny 1
-
- #
- # If an Anonymous keyword is present, then anonymous proxying is enabled.
- # The headers listed are allowed through, while all others are denied. If
- # no Anonymous keyword is present, then all header are allowed through.
- # You must include quotes around the headers.
- #
- #list Anonymous "Host"
- #list Anonymous "Authorization"
-
- #
- # This is a list of ports allowed by tinyproxy when the CONNECT method
- # is used. To disable the CONNECT method altogether, set the value to 0.
- # If no ConnectPort line is found, all ports are allowed (which is not
- # very secure.)
- #
- # The following two ports are used by SSL.
- #
- list ConnectPort 443
- list ConnectPort 563
-
- #
- # Turns on upstream proxy support.
- #
- # The upstream rules allow you to selectively route upstream connections
- # based on the host/domain of the site being accessed.
- #
- # For example:
- # # connection to test domain goes through testproxy
- #
- #config upstream
- # option type proxy
- # option via testproxy:8008
- # option target ".test.domain.invalid"
- #
- #config upstream
- # option type proxy
- # option via testproxy:8008
- # option target ".our_testbed.example.com"
- #
- #config upstream
- # option type proxy
- # option via testproxy:8008
- # option target "192.168.128.0/255.255.254.0"
- #
- # # no upstream proxy for internal websites and unqualified hosts
- #
- #config upstream
- # option type reject
- # option target ".internal.example.com"
- #
- #config upstream
- # option type reject
- # option target "www.example.com"
- #
- #config upstream
- # option type reject
- # option target "10.0.0.0/8"
- #
- #config upstream
- # option type reject
- # option target "192.168.0.0/255.255.254.0"
- #
- #config upstream
- # option type reject
- # option target "."
- #
- # # default upstream is internet firewall
- #
- #config upstream
- # option type proxy
- # option via firewall.internal.example.com:80
- #
- # The LAST matching rule wins the route decision. As you can see, you
- # can use a host, or a domain:
- # name matches host exactly
- # .name matches any host in domain "name"
- # . matches any host with no domain (in 'empty' domain)
- # IP/bits matches network/mask
- # IP/mask matches network/mask
|