1 | # DansGuardian filter group config file for version 2.10.1.1 |
---|
2 | # Modified for SYN-3 by DatuX |
---|
3 | |
---|
4 | |
---|
5 | # Filter group mode |
---|
6 | # This option determines whether members of this group have their web access |
---|
7 | # unfiltered, filtered, or banned. This mechanism replaces the "banneduserlist" |
---|
8 | # and "exceptionuserlist" files from previous versions. |
---|
9 | # |
---|
10 | # 0 = banned |
---|
11 | # 1 = filtered |
---|
12 | # 2 = unfiltered (exception) |
---|
13 | # |
---|
14 | # Only filter groups with a mode of 1 need to define phrase, URL, site, extension, |
---|
15 | # mimetype and PICS lists; in other modes, these options are ignored to conserve |
---|
16 | # memory. |
---|
17 | # |
---|
18 | # Defaults to 0 if unspecified. |
---|
19 | # Unauthenticated users are treated as being in the first filter group. |
---|
20 | groupmode = 1 |
---|
21 | |
---|
22 | # Filter group name |
---|
23 | # Used to fill in the -FILTERGROUP- placeholder in the HTML template file, and to |
---|
24 | # name the group in the access logs |
---|
25 | # Defaults to empty string |
---|
26 | #groupname = '' |
---|
27 | |
---|
28 | # Content filtering files location |
---|
29 | bannedphraselist = '/home/system/dansguardian/lists/bannedphraselist' |
---|
30 | weightedphraselist = '/home/system/dansguardian/lists/weightedphraselist' |
---|
31 | exceptionphraselist = '/home/system/dansguardian/lists/exceptionphraselist' |
---|
32 | bannedsitelist = '/home/system/dansguardian/lists/bannedsitelist' |
---|
33 | greysitelist = '/home/system/dansguardian/lists/greysitelist' |
---|
34 | exceptionsitelist = '/home/system/dansguardian/lists/exceptionsitelist' |
---|
35 | bannedurllist = '/home/system/dansguardian/lists/bannedurllist' |
---|
36 | greyurllist = '/home/system/dansguardian/lists/greyurllist' |
---|
37 | exceptionurllist = '/home/system/dansguardian/lists/exceptionurllist' |
---|
38 | exceptionregexpurllist = '/home/system/dansguardian/lists/exceptionregexpurllist' |
---|
39 | bannedregexpurllist = '/home/system/dansguardian/lists/bannedregexpurllist' |
---|
40 | picsfile = '/home/system/dansguardian/lists/pics' |
---|
41 | contentregexplist = '/home/system/dansguardian/lists/contentregexplist' |
---|
42 | urlregexplist = '/home/system/dansguardian/lists/urlregexplist' |
---|
43 | |
---|
44 | # Filetype filtering |
---|
45 | # |
---|
46 | # Blanket download blocking |
---|
47 | # If enabled, all files will be blocked, unless they match the |
---|
48 | # exceptionextensionlist or exceptionmimetypelist. |
---|
49 | # These lists do not override virus scanning. |
---|
50 | # Exception lists defined above override all types of filtering, including |
---|
51 | # the blanket download block. |
---|
52 | # Defaults to disabled. |
---|
53 | # (on | off) |
---|
54 | # |
---|
55 | blockdownloads = off |
---|
56 | exceptionextensionlist = '/home/system/dansguardian/lists/exceptionextensionlist' |
---|
57 | exceptionmimetypelist = '/home/system/dansguardian/lists/exceptionmimetypelist' |
---|
58 | # |
---|
59 | # Use the following lists to block specific kinds of file downloads. |
---|
60 | # The two exception lists above can be used to override these. |
---|
61 | # |
---|
62 | bannedextensionlist = '/home/system/dansguardian/lists/bannedextensionlist' |
---|
63 | bannedmimetypelist = '/home/system/dansguardian/lists/bannedmimetypelist' |
---|
64 | # |
---|
65 | # In either file filtering mode, the following list can be used to override |
---|
66 | # MIME type & extension blocks for particular domains & URLs (trusted download sites). |
---|
67 | # |
---|
68 | exceptionfilesitelist = '/home/system/dansguardian/lists/exceptionfilesitelist' |
---|
69 | exceptionfileurllist = '/home/system/dansguardian/lists/exceptionfileurllist' |
---|
70 | |
---|
71 | # Categorise without blocking: |
---|
72 | # Supply categorised lists here and the category string shall be logged against |
---|
73 | # matching requests, but matching these lists does not perform any filtering |
---|
74 | # action. |
---|
75 | #logsitelist = '/home/system/dansguardian/lists/logsitelist' |
---|
76 | #logurllist = '/home/system/dansguardian/lists/logurllist' |
---|
77 | #logregexpurllist = '/home/system/dansguardian/lists/logregexpurllist' |
---|
78 | |
---|
79 | # Outgoing HTTP header rules: |
---|
80 | # Optional lists for blocking based on, and modification of, outgoing HTTP |
---|
81 | # request headers. Format for headerregexplist is one modification rule per |
---|
82 | # line, similar to content/URL modifications. Format for |
---|
83 | # bannedregexpheaderlist is one regular expression per line, with matching |
---|
84 | # headers causing a request to be blocked. |
---|
85 | # Headers are matched/replaced on a line-by-line basis, not as a contiguous |
---|
86 | # block. |
---|
87 | # Use for example, to remove cookies or prevent certain user-agents. |
---|
88 | headerregexplist = '/home/system/dansguardian/lists/headerregexplist' |
---|
89 | bannedregexpheaderlist = '/home/system/dansguardian/lists/bannedregexpheaderlist' |
---|
90 | |
---|
91 | # Naughtyness limit |
---|
92 | # This the limit over which the page will be blocked. Each weighted phrase is given |
---|
93 | # a value either positive or negative and the values added up. Phrases to do with |
---|
94 | # good subjects will have negative values, and bad subjects will have positive |
---|
95 | # values. See the weightedphraselist file for examples. |
---|
96 | # As a guide: |
---|
97 | # 50 is for young children, 100 for old children, 160 for young adults. |
---|
98 | naughtynesslimit = 200 |
---|
99 | |
---|
100 | # Category display threshold |
---|
101 | # This option only applies to pages blocked by weighted phrase filtering. |
---|
102 | # Defines the minimum score that must be accumulated within a particular |
---|
103 | # category in order for it to show up on the block pages' category list. |
---|
104 | # All categories under which the page scores positively will be logged; those |
---|
105 | # that were not displayed to the user appear in brackets. |
---|
106 | # |
---|
107 | # -1 = display only the highest scoring category |
---|
108 | # 0 = display all categories (default) |
---|
109 | # > 0 = minimum score for a category to be displayed |
---|
110 | categorydisplaythreshold = 0 |
---|
111 | |
---|
112 | # Embedded URL weighting |
---|
113 | # When set to something greater than zero, this option causes URLs embedded within a |
---|
114 | # page's HTML (from links, image tags, etc.) to be extracted and checked against the |
---|
115 | # bannedsitelist and bannedurllist. Each link to a banned page causes the amount set |
---|
116 | # here to be added to the page's weighting. |
---|
117 | # The behaviour of this option with regards to multiple occurrences of a site/URL is |
---|
118 | # affected by the weightedphrasemode setting. |
---|
119 | # |
---|
120 | # NB: Currently, this feature uses regular expressions that require the PCRE library. |
---|
121 | # As such, it is only available if you compiled DansGuardian with '--enable-pcre=yes'. |
---|
122 | # You can check compile-time options by running 'dansguardian -v'. |
---|
123 | # |
---|
124 | # Set to 0 to disable. |
---|
125 | # Defaults to 0. |
---|
126 | # WARNING: This option is highly CPU intensive! |
---|
127 | embeddedurlweight = 0 |
---|
128 | |
---|
129 | # Enable PICS rating support |
---|
130 | # |
---|
131 | # Defaults to disabled |
---|
132 | # (on | off) |
---|
133 | enablepics = off |
---|
134 | |
---|
135 | # Temporary Denied Page Bypass |
---|
136 | # This provides a link on the denied page to bypass the ban for a few minutes. To be |
---|
137 | # secure it uses a random hashed secret generated at daemon startup. You define the |
---|
138 | # number of seconds the bypass will function for before the deny will appear again. |
---|
139 | # To allow the link on the denied page to appear you will need to edit the template.html |
---|
140 | # or dansguardian.pl file for your language. |
---|
141 | # 300 = enable for 5 minutes |
---|
142 | # 0 = disable ( defaults to 0 ) |
---|
143 | # -1 = enable but you require a separate program/CGI to generate a valid link |
---|
144 | bypass = 0 |
---|
145 | |
---|
146 | # Temporary Denied Page Bypass Secret Key |
---|
147 | # Rather than generating a random key you can specify one. It must be more than 8 chars. |
---|
148 | # '' = generate a random one (recommended and default) |
---|
149 | # 'Mary had a little lamb.' = an example |
---|
150 | # '76b42abc1cd0fdcaf6e943dcbc93b826' = an example |
---|
151 | bypasskey = '' |
---|
152 | |
---|
153 | # Infection/Scan Error Bypass |
---|
154 | # Similar to the 'bypass' setting, but specifically for bypassing files scanned and found |
---|
155 | # to be infected, or files that trigger scanner errors - for example, archive types with |
---|
156 | # recognised but unsupported compression schemes, or corrupt archives. |
---|
157 | # The option specifies the number of seconds for which the bypass link will be valid. |
---|
158 | # 300 = enable for 5 minutes |
---|
159 | # 0 = disable (default) |
---|
160 | # -1 = enable, but require a separate program/CGI to generate a valid link |
---|
161 | infectionbypass = 0 |
---|
162 | |
---|
163 | # Infection/Scan Error Bypass Secret Key |
---|
164 | # Same as the 'bypasskey' option, but used for infection bypass mode. |
---|
165 | infectionbypasskey = '' |
---|
166 | |
---|
167 | # Infection/Scan Error Bypass on Scan Errors Only |
---|
168 | # Enable this option to allow infectionbypass links only when virus scanning fails, |
---|
169 | # not when a file is found to contain a virus. |
---|
170 | # on = enable (default and highly recommended) |
---|
171 | # off = disable |
---|
172 | infectionbypasserrorsonly = on |
---|
173 | |
---|
174 | # Disable content scanning |
---|
175 | # If you enable this option you will disable content scanning for this group. |
---|
176 | # Content scanning primarily is AV scanning (if enabled) but could include |
---|
177 | # other types. |
---|
178 | # (on|off) default = off. |
---|
179 | disablecontentscan = off |
---|
180 | |
---|
181 | # Enable Deep URL Analysis |
---|
182 | # When enabled, DG looks for URLs within URLs, checking against the bannedsitelist and |
---|
183 | # bannedurllist. This can be used, for example, to block images originating from banned |
---|
184 | # sites from appearing in Google Images search results, as the original URLs are |
---|
185 | # embedded in the thumbnail GET requests. |
---|
186 | # (on|off) default = off |
---|
187 | deepurlanalysis = off |
---|
188 | |
---|
189 | # reportinglevel |
---|
190 | # |
---|
191 | # -1 = log, but do not block - Stealth mode |
---|
192 | # 0 = just say 'Access Denied' |
---|
193 | # 1 = report why but not what denied phrase |
---|
194 | # 2 = report fully |
---|
195 | # 3 = use HTML template file (accessdeniedaddress ignored) - recommended |
---|
196 | # |
---|
197 | # If defined, this overrides the global setting in dansguardian.conf for |
---|
198 | # members of this filter group. |
---|
199 | # |
---|
200 | #reportinglevel = 3 |
---|
201 | |
---|
202 | # accessdeniedaddress is the address of your web server to which the cgi |
---|
203 | # dansguardian reporting script was copied. Only used in reporting levels |
---|
204 | # 1 and 2. |
---|
205 | # |
---|
206 | # This webserver must be either: |
---|
207 | # 1. Non-proxied. Either a machine on the local network, or listed as an |
---|
208 | # exception in your browser's proxy configuration. |
---|
209 | # 2. Added to the exceptionsitelist. Option 1 is preferable; this option is |
---|
210 | # only for users using both transparent proxying and a non-local server |
---|
211 | # to host this script. |
---|
212 | # |
---|
213 | # If defined, this overrides the global setting in dansguardian.conf for |
---|
214 | # members of this filter group. |
---|
215 | # |
---|
216 | #accessdeniedaddress = 'http://YOURSERVER.YOURDOMAIN/cgi-bin/dansguardian.pl' |
---|
217 | |
---|
218 | # HTML Template override |
---|
219 | # If defined, this specifies a custom HTML template file for members of this |
---|
220 | # filter group, overriding the global setting in dansguardian.conf. This is |
---|
221 | # only used in reporting level 3. |
---|
222 | # |
---|
223 | # The default template file path is <languagedir>/<language>/template.html |
---|
224 | # e.g. /usr/share/dansguardian/languages/ukenglish/template.html when using 'ukenglish' |
---|
225 | # language. |
---|
226 | # |
---|
227 | # This option generates a file path of the form: |
---|
228 | # <languagedir>/<language>/<htmltemplate> |
---|
229 | # e.g. /usr/share/dansguardian/languages/ukenglish/custom.html |
---|
230 | # |
---|
231 | #htmltemplate = 'custom.html' |
---|
232 | |
---|
233 | # Email reporting - original patch by J. Gauthier |
---|
234 | |
---|
235 | # Use SMTP |
---|
236 | # If on, will enable system wide events to be reported by email. |
---|
237 | # need to configure mail program (see 'mailer' in global config) |
---|
238 | # and email recipients |
---|
239 | # default usesmtp = off |
---|
240 | usesmtp = off |
---|
241 | |
---|
242 | # mailfrom |
---|
243 | # who the email would come from |
---|
244 | # example: mailfrom = 'dansguardian@mycompany.com' |
---|
245 | mailfrom = '' |
---|
246 | |
---|
247 | # avadmin |
---|
248 | # who the virus emails go to (if notify av is on) |
---|
249 | # example: avadmin = 'admin@mycompany.com' |
---|
250 | avadmin = '' |
---|
251 | |
---|
252 | # contentdmin |
---|
253 | # who the content emails go to (when thresholds are exceeded) |
---|
254 | # and contentnotify is on |
---|
255 | # example: contentadmin = 'admin@mycompany.com' |
---|
256 | contentadmin = '' |
---|
257 | |
---|
258 | # avsubject |
---|
259 | # Subject of the email sent when a virus is caught. |
---|
260 | # only applicable if notifyav is on |
---|
261 | # default avsubject = 'dansguardian virus block' |
---|
262 | avsubject = 'dansguardian virus block' |
---|
263 | |
---|
264 | # content |
---|
265 | # Subject of the email sent when violation thresholds are exceeded |
---|
266 | # default contentsubject = 'dansguardian violation' |
---|
267 | contentsubject = 'dansguardian violation' |
---|
268 | |
---|
269 | # notifyAV |
---|
270 | # This will send a notification, if usesmtp/notifyav is on, any time an |
---|
271 | # infection is found. |
---|
272 | # Important: If this option is off, viruses will still be recorded like a |
---|
273 | # content infraction. |
---|
274 | notifyav = off |
---|
275 | |
---|
276 | # notifycontent |
---|
277 | # This will send a notification, if usesmtp is on, based on thresholds |
---|
278 | # below |
---|
279 | notifycontent = off |
---|
280 | |
---|
281 | # thresholdbyuser |
---|
282 | # results are only predictable with user authenticated configs |
---|
283 | # if enabled the violation/threshold count is kept track of by the user |
---|
284 | thresholdbyuser = off |
---|
285 | |
---|
286 | #violations |
---|
287 | # number of violations before notification |
---|
288 | # setting to 0 will never trigger a notification |
---|
289 | violations = 0 |
---|
290 | |
---|
291 | #threshold |
---|
292 | # this is in seconds. If 'violations' occur in 'threshold' seconds, then |
---|
293 | # a notification is made. |
---|
294 | # if this is set to 0, then whenever the set number of violations are made a |
---|
295 | # notifaction will be sent. |
---|
296 | threshold = 0 |
---|
297 | |
---|