config tinyproxy
|
|
|
|
#
|
|
# Enable the proxy
|
|
#
|
|
option enabled 0
|
|
|
|
#
|
|
# Name of the user the tinyproxy daemon should switch to after the port
|
|
# has been bound.
|
|
#
|
|
option User nobody
|
|
option Group nogroup
|
|
|
|
#
|
|
# Port to listen on.
|
|
#
|
|
option Port 8888
|
|
|
|
#
|
|
# If you have multiple interfaces this allows you to bind to only one. If
|
|
# this is commented out, tinyproxy will bind to all interfaces present.
|
|
#
|
|
#option Listen 192.168.0.1
|
|
|
|
#
|
|
# The Bind directive allows you to bind the outgoing connections to a
|
|
# particular IP address.
|
|
#
|
|
#option Bind 192.168.0.1
|
|
|
|
#
|
|
# Timeout: The number of seconds of inactivity a connection is allowed to
|
|
# have before it closed by tinyproxy.
|
|
#
|
|
option Timeout 600
|
|
|
|
#
|
|
# ErrorFile: Defines the HTML file to send when a given HTTP error
|
|
# occurs. You will probably need to customize the location to your
|
|
# particular install. The usual locations to check are:
|
|
# /usr/local/share/tinyproxy
|
|
# /usr/share/tinyproxy
|
|
# /etc/tinyproxy
|
|
#
|
|
#option ErrorFile_404 "/usr/share/tinyproxy/404.html"
|
|
#option ErrorFile_400 "/usr/share/tinyproxy/400.html"
|
|
#option ErrorFile_503 "/usr/share/tinyproxy/503.html"
|
|
#option ErrorFile_403 "/usr/share/tinyproxy/403.html"
|
|
#option ErrorFile_408 "/usr/share/tinyproxy/408.html"
|
|
|
|
#
|
|
# DefaultErrorFile: The HTML file that gets sent if there is no
|
|
# HTML file defined with an ErrorFile keyword for the HTTP error
|
|
# that has occurred.
|
|
#
|
|
option DefaultErrorFile "/usr/share/tinyproxy/default.html"
|
|
|
|
#
|
|
# StatFile: The HTML file that gets sent when a request is made
|
|
# for the stathost. If this file doesn't exist a basic page is
|
|
# hardcoded in tinyproxy.
|
|
#
|
|
option StatFile "/usr/share/tinyproxy/stats.html"
|
|
|
|
#
|
|
# Where to log the information. Either LogFile or Syslog should be set,
|
|
# but not both.
|
|
#
|
|
option LogFile "/var/log/tinyproxy.log"
|
|
#option Syslog 1
|
|
|
|
#
|
|
# Set the logging level. Allowed settings are:
|
|
# Critical (least verbose)
|
|
# Error
|
|
# Warning
|
|
# Notice
|
|
# Connect (to log connections without Info's noise)
|
|
# Info (most verbose)
|
|
# The LogLevel logs from the set level and above. For example, if the LogLevel
|
|
# was set to Warning, than all log messages from Warning to Critical would be
|
|
# output, but Notice and below would be suppressed.
|
|
#
|
|
option LogLevel Info
|
|
|
|
#
|
|
# Include the X-Tinyproxy header, which has the client's IP address when
|
|
# connecting to the sites listed.
|
|
#
|
|
# list XTinyproxy mydomain.com
|
|
|
|
#
|
|
# This is the absolute highest number of threads which will be created. In
|
|
# other words, only MaxClients number of clients can be connected at the
|
|
# same time.
|
|
#
|
|
option MaxClients 100
|
|
|
|
#
|
|
# These settings set the upper and lower limit for the number of
|
|
# spare servers which should be available. If the number of spare servers
|
|
# falls below MinSpareServers then new ones will be created. If the number
|
|
# of servers exceeds MaxSpareServers then the extras will be killed off.
|
|
#
|
|
option MinSpareServers 5
|
|
option MaxSpareServers 20
|
|
|
|
#
|
|
# Number of servers to start initially.
|
|
#
|
|
option StartServers 10
|
|
|
|
#
|
|
# MaxRequestsPerChild is the number of connections a thread will handle
|
|
# before it is killed. In practise this should be set to 0, which disables
|
|
# thread reaping. If you do notice problems with memory leakage, then set
|
|
# this to something like 10000
|
|
#
|
|
option MaxRequestsPerChild 0
|
|
|
|
#
|
|
# The following is the authorization controls. If there are any access
|
|
# control keywords then the default action is to DENY. Otherwise, the
|
|
# default action is ALLOW.
|
|
#
|
|
# Also the order of the controls are important. The incoming connections
|
|
# are tested against the controls based on order.
|
|
#
|
|
list Allow 127.0.0.1
|
|
#list Allow 192.168.0.0/16
|
|
#list Allow 172.16.0.0/12
|
|
#list Allow 10.0.0.0/8
|
|
|
|
#
|
|
# The "Via" header is required by the HTTP RFC, but using the real host name
|
|
# is a security concern. If the following directive is enabled, the string
|
|
# supplied will be used as the host name in the Via header; otherwise, the
|
|
# server's host name will be used.
|
|
#
|
|
option ViaProxyName "tinyproxy"
|
|
|
|
#
|
|
# The location of the filter file.
|
|
#
|
|
#option Filter "/etc/tinyproxy/filter"
|
|
|
|
#
|
|
# Filter based on URLs rather than domains.
|
|
#
|
|
#option FilterURLs 1
|
|
|
|
#
|
|
# Use POSIX Extended regular expressions rather than basic.
|
|
#
|
|
#option FilterExtended 1
|
|
|
|
#
|
|
# Use case sensitive regular expressions.
|
|
#
|
|
#option FilterCaseSensitive 1
|
|
|
|
#
|
|
# Change the default policy of the filtering system. If this directive is
|
|
# commented out, or is set to "0" then the default policy is to allow
|
|
# everything which is not specifically denied by the filter file.
|
|
#
|
|
# However, by setting this directive to "1" the default policy becomes to
|
|
# deny everything which is _not_ specifically allowed by the filter file.
|
|
#
|
|
#option FilterDefaultDeny 1
|
|
|
|
#
|
|
# If an Anonymous keyword is present, then anonymous proxying is enabled.
|
|
# The headers listed are allowed through, while all others are denied. If
|
|
# no Anonymous keyword is present, then all header are allowed through.
|
|
# You must include quotes around the headers.
|
|
#
|
|
#list Anonymous "Host"
|
|
#list Anonymous "Authorization"
|
|
|
|
#
|
|
# This is a list of ports allowed by tinyproxy when the CONNECT method
|
|
# is used. To disable the CONNECT method altogether, set the value to 0.
|
|
# If no ConnectPort line is found, all ports are allowed (which is not
|
|
# very secure.)
|
|
#
|
|
# The following two ports are used by SSL.
|
|
#
|
|
list ConnectPort 443
|
|
list ConnectPort 563
|
|
|
|
#
|
|
# Turns on upstream proxy support.
|
|
#
|
|
# The upstream rules allow you to selectively route upstream connections
|
|
# based on the host/domain of the site being accessed.
|
|
#
|
|
# For example:
|
|
# # connection to test domain goes through testproxy
|
|
#
|
|
#config upstream
|
|
# option type proxy
|
|
# option via testproxy:8008
|
|
# option target ".test.domain.invalid"
|
|
#
|
|
#config upstream
|
|
# option type proxy
|
|
# option via testproxy:8008
|
|
# option target ".our_testbed.example.com"
|
|
#
|
|
#config upstream
|
|
# option type proxy
|
|
# option via testproxy:8008
|
|
# option target "192.168.128.0/255.255.254.0"
|
|
#
|
|
# # no upstream proxy for internal websites and unqualified hosts
|
|
#
|
|
#config upstream
|
|
# option type reject
|
|
# option target ".internal.example.com"
|
|
#
|
|
#config upstream
|
|
# option type reject
|
|
# option target "www.example.com"
|
|
#
|
|
#config upstream
|
|
# option type reject
|
|
# option target "10.0.0.0/8"
|
|
#
|
|
#config upstream
|
|
# option type reject
|
|
# option target "192.168.0.0/255.255.254.0"
|
|
#
|
|
#config upstream
|
|
# option type reject
|
|
# option target "."
|
|
#
|
|
# # default upstream is internet firewall
|
|
#
|
|
#config upstream
|
|
# option type proxy
|
|
# option via firewall.internal.example.com:80
|
|
#
|
|
# The LAST matching rule wins the route decision. As you can see, you
|
|
# can use a host, or a domain:
|
|
# name matches host exactly
|
|
# .name matches any host in domain "name"
|
|
# . matches any host with no domain (in 'empty' domain)
|
|
# IP/bits matches network/mask
|
|
# IP/mask matches network/mask
|