Advertisement
Guest User

Untitled

a guest
May 9th, 2017
80
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.41 KB | None | 0 0
  1. #========================================================================
  2.  
  3. [GENERAL]
  4.  
  5.  
  6.  
  7. LISTEN_PORT: 3128
  8.  
  9.  
  10. # If you want APS to authenticate you at WWW servers using NTLM then just leave this
  11.  
  12. # value blank like PARENT_PROXY: and APS will connect to web servers directly.
  13.  
  14. # You can specify more than one proxy by leaving a space between each one, and
  15.  
  16. # APS will detect when one fails and automatically fail-over to the next. EG:
  17.  
  18. #PARENT_PROXY:first_proxy second_proxy third_proxy
  19.  
  20. # And NOTE that NTLM cannot pass through another proxy server.
  21.  
  22. PARENT_PROXY: hproxy.iitm.ac.in
  23.  
  24.  
  25. PARENT_PROXY_PORT: 8080
  26.  
  27.  
  28. # APS will poll the upstream proxy and attempt to fail-over to a new one if it doesn't
  29.  
  30. # get a response within an appropriate time frame. The amount of time that it will
  31.  
  32. # wait for a response before attempting fail-over is specified, in seconds, below:
  33.  
  34. PARENT_PROXY_TIMEOUT:15
  35.  
  36.  
  37.  
  38. # Set to 1 if you want to grant this authorization service to clients from other computers.
  39.  
  40. # NOTE: all the users from other hosts that will be using you copy of APS for authentication
  41.  
  42. # will be using your credentials in NTLM auth at the remote host.
  43.  
  44. ALLOW_EXTERNAL_CLIENTS:0
  45.  
  46.  
  47.  
  48. # If you want to allow some other but not all computers to use your proxy for authorization,
  49.  
  50. # just set ALLOW_EXTERNAL_CLIENTS:0 and put friendly IP addresses here.
  51.  
  52. # Use space as a delimiter.
  53.  
  54. # NOTE that special addesses don't work here (192.168.3.0 for example).
  55.  
  56. FRIENDLY_IPS:
  57.  
  58.  
  59.  
  60. # Requested URLs are written to "url.log" file. May be useful.
  61.  
  62. URL_LOG:0
  63.  
  64.  
  65.  
  66. # When a network service listens for connections, there is a maximum number of connection
  67.  
  68. # attempts to that service that the underlying OS will allow to backlog waiting for a response
  69.  
  70. # before the OS will start dropping new connection attempts with 'Connection refused'. The
  71.  
  72. # standard method of determining the maximum number of backlogged connections is to use the
  73.  
  74. # SOMAXCONN constant, which is supposed to represent the maximum number that an OS will support
  75.  
  76. # (for example, 5 on Windows 2000 Pro, and 200 on Windows 2000 server). However, because this
  77.  
  78. # is a statically compiled value in a Python distribution, usually this instead represents the
  79.  
  80. # the most conservative value (5 on all Windows platforms, and 128 on the GNU/Linux variant I
  81.  
  82. # tried). So if you are running (for example) a massively threaded/parallel download manager,
  83.  
  84. # the default value of, say, 5, or whatever SOMAXCONN happens to be set to, may be too low and
  85.  
  86. # cause some connections to fail. The value below can be set to any integer (it seems that
  87.  
  88. # Python just silently caps values above the hard limit for the underlying platform), or it can
  89.  
  90. # be set to the special value of SOMAXCONN (i.e. MAX_CONNECTION_BACKLOG:SOMAXCONN), to use
  91.  
  92. # whatever this value happens to be set to in your Python build. Setting this higher than
  93.  
  94. # necessary may cause APS to consume more memory than you needed to.
  95.  
  96. MAX_CONNECTION_BACKLOG:5
  97.  
  98.  
  99.  
  100. #========================================================================
  101.  
  102. [CLIENT_HEADER]
  103.  
  104.  
  105.  
  106. # This section describes what and how the server should change in the clients headers.
  107.  
  108. # Made in order to prevent parent proxy from seeing that you are using wget instead of IE5.5
  109.  
  110.  
  111.  
  112. Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/vnd.ms-excel, application/msword, application/vnd.ms-powerpoint, */*
  113.  
  114. User-Agent: Mozilla/4.0 (compatible; MSIE 5.5; Windows 98)
  115.  
  116.  
  117.  
  118. # for windows 2000 emulation ;)
  119.  
  120. # User-Agent: Mozilla/4.0 (compatible; MSIE 5.5; Windows NT5)
  121.  
  122.  
  123.  
  124. # You can uncomment these chages in client's header to mimic IE5+ better, but in this case
  125.  
  126. # you may expirience problems with *.html if your client does not really handle compression.
  127.  
  128. #Accept-Encoding: gzip, deflate
  129.  
  130.  
  131.  
  132. #========================================================================
  133.  
  134. [NTLM_AUTH]
  135.  
  136.  
  137.  
  138. # Optional value, if leaved blank then APS will use gethostname() to determine
  139.  
  140. # host's name.
  141.  
  142. # NOTE1: If you Linux host name differs from Windows host name then it may be that
  143.  
  144. # MS server wont recognize you host at all and wont grant you access
  145.  
  146. # to resources requested. Then you have to use this option and APS will use
  147.  
  148. # this name in NTLM negotiations.
  149.  
  150. # NOTE2: There are several reports that you can successfully use "foreign" host name
  151.  
  152. # here. Say, if user may access a resource from 'host1' and may not from 'host2'
  153.  
  154. # then there is a chance that APS running on 'host2' with NT_HOSTNAME:host1 will
  155.  
  156. # be able to be granted access to the restricted resource. However use this on
  157.  
  158. # you own risk as such a trick may be considered as a hack or something.
  159.  
  160. NT_HOSTNAME:
  161.  
  162.  
  163.  
  164. # Windows Domain.
  165.  
  166. # NOTE: it is not full qualified internet domain, but windows network domain.
  167.  
  168. NT_DOMAIN:
  169.  
  170.  
  171. # What user's name to use during authorization. It may differ form real current username.
  172.  
  173. # If you enable NTLM_TO_BASIC, below, you can either leave this blank or simply
  174.  
  175. # hash it out.
  176.  
  177. USER: cs08b039
  178.  
  179.  
  180. # Password. Just leave it blank here and server will request it at the start time,
  181.  
  182. # or, if you enable NTLM_TO_BASIC, below, you can either leave this blank or simply
  183.  
  184. # hash it out, and you *won't* be prompted for a password at start time.
  185.  
  186. PASSWORD:iitmcse7437
  187.  
  188.  
  189.  
  190. # These two options replace old FULL_NTLM option.
  191.  
  192. # NTLM authentication consists virtually of two parts: LM and NT. Windows95/98 use
  193.  
  194. # only LM part, WindowsNT/2000 can use NT and LM or just NT part.
  195.  
  196. # Almost always using just LM part will be enough. I had several reports
  197.  
  198. # about LM and NT requirement and no about just NT.
  199.  
  200. # So try to setup 1, 1 only if you have enough reasons to do so and when you understand
  201.  
  202. # what you are doing.
  203.  
  204. # 0, 0 is an illegal combination
  205.  
  206. # NOTE: if you change these options then you have to setup flag option accordingly.
  207.  
  208. LM_PART:1
  209.  
  210. NT_PART:0
  211.  
  212.  
  213.  
  214. # Highly experimental option. See research.txt for details.
  215.  
  216. # LM - 06820000
  217.  
  218. # NT - 05820000
  219.  
  220. # LM + NT - 07820000
  221.  
  222. NTLM_FLAGS: 06820000
  223.  
  224.  
  225.  
  226. # This option makes APS try to translate NTLM authentication to very usual "Basic"
  227.  
  228. # scheme. Almost all http clients know it. With this option set to 1 user will be requested
  229.  
  230. # by his browser to enter his credentials and these username and password will be used by
  231.  
  232. # APS for NTLM authentication at MS Proxy server or Web server.
  233.  
  234. # In such a case different users can use one runnig APS with their own credentials.
  235.  
  236. # NOTE1: currently translation works so it allows only one try for entering
  237.  
  238. # username/password. If you make a mistake you will have to restart you browser.
  239.  
  240. # NOTE2: With debug:1 basic username/password will be written in log file in clear
  241.  
  242. # text format. I could try hide it, but the basic scheme is so weak that anybody
  243.  
  244. # who had access to APS would be able to get it.
  245.  
  246. NTLM_TO_BASIC:0
  247.  
  248.  
  249.  
  250. #========================================================================
  251.  
  252. [DEBUG]
  253.  
  254.  
  255.  
  256. # Set this to 1 if you want to see debug info in many log files. One per connection.
  257.  
  258. DEBUG:0
  259.  
  260.  
  261.  
  262. # Set this to 1 to get even more debug info.
  263.  
  264. BIN_DEBUG:0
  265.  
  266.  
  267.  
  268. # Set this to 1 to see some strange activity on screen. Actually you won't want it.
  269.  
  270. SCR_DEBUG:0
  271.  
  272.  
  273.  
  274. # Not actually a debug option but gives you some details on authentication process
  275.  
  276. # into *.auth logs. Also see research.txt.
  277.  
  278. AUTH_DEBUG:0
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement