config tinyproxy # # Enable the proxy # option enabled 0 # # Name of the user the tinyproxy daemon should switch to after the port # has been bound. # option User nobody option Group nogroup # # Port to listen on. # option Port 8888 # # If you have multiple interfaces this allows you to bind to only one. If # this is commented out, tinyproxy will bind to all interfaces present. # #option Listen 192.168.0.1 # # The Bind directive allows you to bind the outgoing connections to a # particular IP address. # #option Bind 192.168.0.1 # # Timeout: The number of seconds of inactivity a connection is allowed to # have before it closed by tinyproxy. # option Timeout 600 # # ErrorFile: Defines the HTML file to send when a given HTTP error # occurs. You will probably need to customize the location to your # particular install. The usual locations to check are: # /usr/local/share/tinyproxy # /usr/share/tinyproxy # /etc/tinyproxy # #option ErrorFile_404 "/usr/share/tinyproxy/404.html" #option ErrorFile_400 "/usr/share/tinyproxy/400.html" #option ErrorFile_503 "/usr/share/tinyproxy/503.html" #option ErrorFile_403 "/usr/share/tinyproxy/403.html" #option ErrorFile_408 "/usr/share/tinyproxy/408.html" # # DefaultErrorFile: The HTML file that gets sent if there is no # HTML file defined with an ErrorFile keyword for the HTTP error # that has occurred. # option DefaultErrorFile "/usr/share/tinyproxy/default.html" # # StatFile: The HTML file that gets sent when a request is made # for the stathost. If this file doesn't exist a basic page is # hardcoded in tinyproxy. # option StatFile "/usr/share/tinyproxy/stats.html" # # Where to log the information. Either LogFile or Syslog should be set, # but not both. # option LogFile "/var/log/tinyproxy.log" #option Syslog 1 # # Set the logging level. Allowed settings are: # Critical (least verbose) # Error # Warning # Notice # Connect (to log connections without Info's noise) # Info (most verbose) # The LogLevel logs from the set level and above. For example, if the LogLevel # was set to Warning, than all log messages from Warning to Critical would be # output, but Notice and below would be suppressed. # option LogLevel Info # # Include the X-Tinyproxy header, which has the client's IP address when # connecting to the sites listed. # # list XTinyproxy mydomain.com # # This is the absolute highest number of threads which will be created. In # other words, only MaxClients number of clients can be connected at the # same time. # option MaxClients 100 # # These settings set the upper and lower limit for the number of # spare servers which should be available. If the number of spare servers # falls below MinSpareServers then new ones will be created. If the number # of servers exceeds MaxSpareServers then the extras will be killed off. # option MinSpareServers 5 option MaxSpareServers 20 # # Number of servers to start initially. # option StartServers 10 # # MaxRequestsPerChild is the number of connections a thread will handle # before it is killed. In practise this should be set to 0, which disables # thread reaping. If you do notice problems with memory leakage, then set # this to something like 10000 # option MaxRequestsPerChild 0 # # The following is the authorization controls. If there are any access # control keywords then the default action is to DENY. Otherwise, the # default action is ALLOW. # # Also the order of the controls are important. The incoming connections # are tested against the controls based on order. # list Allow 127.0.0.1 #list Allow 192.168.0.0/16 #list Allow 172.16.0.0/12 #list Allow 10.0.0.0/8 # # The "Via" header is required by the HTTP RFC, but using the real host name # is a security concern. If the following directive is enabled, the string # supplied will be used as the host name in the Via header; otherwise, the # server's host name will be used. # option ViaProxyName "tinyproxy" # # The location of the filter file. # #option Filter "/etc/tinyproxy/filter" # # Filter based on URLs rather than domains. # #option FilterURLs 1 # # Use POSIX Extended regular expressions rather than basic. # #option FilterExtended 1 # # Use case sensitive regular expressions. # #option FilterCaseSensitive 1 # # Change the default policy of the filtering system. If this directive is # commented out, or is set to "0" then the default policy is to allow # everything which is not specifically denied by the filter file. # # However, by setting this directive to "1" the default policy becomes to # deny everything which is _not_ specifically allowed by the filter file. # #option FilterDefaultDeny 1 # # If an Anonymous keyword is present, then anonymous proxying is enabled. # The headers listed are allowed through, while all others are denied. If # no Anonymous keyword is present, then all header are allowed through. # You must include quotes around the headers. # #list Anonymous "Host" #list Anonymous "Authorization" # # This is a list of ports allowed by tinyproxy when the CONNECT method # is used. To disable the CONNECT method altogether, set the value to 0. # If no ConnectPort line is found, all ports are allowed (which is not # very secure.) # # The following two ports are used by SSL. # list ConnectPort 443 list ConnectPort 563 # # Turns on upstream proxy support. # # The upstream rules allow you to selectively route upstream connections # based on the host/domain of the site being accessed. # # For example: # # connection to test domain goes through testproxy # #config upstream # option type proxy # option via testproxy:8008 # option target ".test.domain.invalid" # #config upstream # option type proxy # option via testproxy:8008 # option target ".our_testbed.example.com" # #config upstream # option type proxy # option via testproxy:8008 # option target "192.168.128.0/255.255.254.0" # # # no upstream proxy for internal websites and unqualified hosts # #config upstream # option type reject # option target ".internal.example.com" # #config upstream # option type reject # option target "www.example.com" # #config upstream # option type reject # option target "10.0.0.0/8" # #config upstream # option type reject # option target "192.168.0.0/255.255.254.0" # #config upstream # option type reject # option target "." # # # default upstream is internet firewall # #config upstream # option type proxy # option via firewall.internal.example.com:80 # # The LAST matching rule wins the route decision. As you can see, you # can use a host, or a domain: # name matches host exactly # .name matches any host in domain "name" # . matches any host with no domain (in 'empty' domain) # IP/bits matches network/mask # IP/mask matches network/mask