source: npl/internetserver/dansguardian/dansguardianf1.conf

Last change on this file was c5c522c, checked in by Edwin Eefting <edwin@datux.nl>, 8 years ago

initial commit, transferred from cleaned syn3 svn tree

  • Property mode set to 100644
File size: 11.6 KB
RevLine 
[c5c522c]1# DansGuardian filter group config file for version 2.10.1.1
2# Modified for SYN-3 by DatuX
3
4
5# Filter group mode
6# This option determines whether members of this group have their web access
7# unfiltered, filtered, or banned. This mechanism replaces the "banneduserlist"
8# and "exceptionuserlist" files from previous versions.
9#
10# 0 = banned
11# 1 = filtered
12# 2 = unfiltered (exception)
13#
14# Only filter groups with a mode of 1 need to define phrase, URL, site, extension,
15# mimetype and PICS lists; in other modes, these options are ignored to conserve
16# memory.
17#
18# Defaults to 0 if unspecified.
19# Unauthenticated users are treated as being in the first filter group.
20groupmode = 1
21
22# Filter group name
23# Used to fill in the -FILTERGROUP- placeholder in the HTML template file, and to
24# name the group in the access logs
25# Defaults to empty string
26#groupname = ''
27
28# Content filtering files location
29bannedphraselist = '/home/system/dansguardian/lists/bannedphraselist'
30weightedphraselist = '/home/system/dansguardian/lists/weightedphraselist'
31exceptionphraselist = '/home/system/dansguardian/lists/exceptionphraselist'
32bannedsitelist = '/home/system/dansguardian/lists/bannedsitelist'
33greysitelist = '/home/system/dansguardian/lists/greysitelist'
34exceptionsitelist = '/home/system/dansguardian/lists/exceptionsitelist'
35bannedurllist = '/home/system/dansguardian/lists/bannedurllist'
36greyurllist = '/home/system/dansguardian/lists/greyurllist'
37exceptionurllist = '/home/system/dansguardian/lists/exceptionurllist'
38exceptionregexpurllist = '/home/system/dansguardian/lists/exceptionregexpurllist'
39bannedregexpurllist = '/home/system/dansguardian/lists/bannedregexpurllist'
40picsfile = '/home/system/dansguardian/lists/pics'
41contentregexplist = '/home/system/dansguardian/lists/contentregexplist'
42urlregexplist = '/home/system/dansguardian/lists/urlregexplist'
43
44# Filetype filtering
45#
46# Blanket download blocking
47# If enabled, all files will be blocked, unless they match the
48# exceptionextensionlist or exceptionmimetypelist.
49# These lists do not override virus scanning.
50# Exception lists defined above override all types of filtering, including
51# the blanket download block.
52# Defaults to disabled.
53# (on | off)
54#
55blockdownloads = off
56exceptionextensionlist = '/home/system/dansguardian/lists/exceptionextensionlist'
57exceptionmimetypelist = '/home/system/dansguardian/lists/exceptionmimetypelist'
58#
59# Use the following lists to block specific kinds of file downloads.
60# The two exception lists above can be used to override these.
61#
62bannedextensionlist = '/home/system/dansguardian/lists/bannedextensionlist'
63bannedmimetypelist = '/home/system/dansguardian/lists/bannedmimetypelist'
64#
65# In either file filtering mode, the following list can be used to override
66# MIME type & extension blocks for particular domains & URLs (trusted download sites).
67#
68exceptionfilesitelist = '/home/system/dansguardian/lists/exceptionfilesitelist'
69exceptionfileurllist = '/home/system/dansguardian/lists/exceptionfileurllist'
70
71# Categorise without blocking:
72# Supply categorised lists here and the category string shall be logged against
73# matching requests, but matching these lists does not perform any filtering
74# action.
75#logsitelist = '/home/system/dansguardian/lists/logsitelist'
76#logurllist = '/home/system/dansguardian/lists/logurllist'
77#logregexpurllist = '/home/system/dansguardian/lists/logregexpurllist'
78
79# Outgoing HTTP header rules:
80# Optional lists for blocking based on, and modification of, outgoing HTTP
81# request headers.  Format for headerregexplist is one modification rule per
82# line, similar to content/URL modifications.  Format for
83# bannedregexpheaderlist is one regular expression per line, with matching
84# headers causing a request to be blocked.
85# Headers are matched/replaced on a line-by-line basis, not as a contiguous
86# block.
87# Use for example, to remove cookies or prevent certain user-agents.
88headerregexplist = '/home/system/dansguardian/lists/headerregexplist'
89bannedregexpheaderlist = '/home/system/dansguardian/lists/bannedregexpheaderlist'
90
91# Naughtyness limit
92# This the limit over which the page will be blocked.  Each weighted phrase is given
93# a value either positive or negative and the values added up.  Phrases to do with
94# good subjects will have negative values, and bad subjects will have positive
95# values.  See the weightedphraselist file for examples.
96# As a guide:
97# 50 is for young children,  100 for old children,  160 for young adults.
98naughtynesslimit = 200
99
100# Category display threshold
101# This option only applies to pages blocked by weighted phrase filtering.
102# Defines the minimum score that must be accumulated within a particular
103# category in order for it to show up on the block pages' category list.
104# All categories under which the page scores positively will be logged; those
105# that were not displayed to the user appear in brackets.
106#
107# -1 = display only the highest scoring category
108# 0 = display all categories (default)
109# > 0 = minimum score for a category to be displayed
110categorydisplaythreshold = 0
111
112# Embedded URL weighting
113# When set to something greater than zero, this option causes URLs embedded within a
114# page's HTML (from links, image tags, etc.) to be extracted and checked against the
115# bannedsitelist and bannedurllist. Each link to a banned page causes the amount set
116# here to be added to the page's weighting.
117# The behaviour of this option with regards to multiple occurrences of a site/URL is
118# affected by the weightedphrasemode setting.
119#
120# NB: Currently, this feature uses regular expressions that require the PCRE library.
121# As such, it is only available if you compiled DansGuardian with '--enable-pcre=yes'.
122# You can check compile-time options by running 'dansguardian -v'.
123#
124# Set to 0 to disable.
125# Defaults to 0.
126# WARNING: This option is highly CPU intensive!
127embeddedurlweight = 0
128
129# Enable PICS rating support
130#
131# Defaults to disabled
132# (on | off)
133enablepics = off
134
135# Temporary Denied Page Bypass
136# This provides a link on the denied page to bypass the ban for a few minutes.  To be
137# secure it uses a random hashed secret generated at daemon startup.  You define the
138# number of seconds the bypass will function for before the deny will appear again.
139# To allow the link on the denied page to appear you will need to edit the template.html
140# or dansguardian.pl file for your language.
141# 300 = enable for 5 minutes
142# 0 = disable ( defaults to 0 )
143# -1 = enable but you require a separate program/CGI to generate a valid link
144bypass = 0
145
146# Temporary Denied Page Bypass Secret Key
147# Rather than generating a random key you can specify one.  It must be more than 8 chars.
148# '' = generate a random one (recommended and default)
149# 'Mary had a little lamb.' = an example
150# '76b42abc1cd0fdcaf6e943dcbc93b826' = an example
151bypasskey = ''
152
153# Infection/Scan Error Bypass
154# Similar to the 'bypass' setting, but specifically for bypassing files scanned and found
155# to be infected, or files that trigger scanner errors - for example, archive types with
156# recognised but unsupported compression schemes, or corrupt archives.
157# The option specifies the number of seconds for which the bypass link will be valid.
158# 300 = enable for 5 minutes
159# 0 = disable (default)
160# -1 = enable, but require a separate program/CGI to generate a valid link
161infectionbypass = 0
162
163# Infection/Scan Error Bypass Secret Key
164# Same as the 'bypasskey' option, but used for infection bypass mode.
165infectionbypasskey = ''
166
167# Infection/Scan Error Bypass on Scan Errors Only
168# Enable this option to allow infectionbypass links only when virus scanning fails,
169# not when a file is found to contain a virus.
170# on = enable (default and highly recommended)
171# off = disable
172infectionbypasserrorsonly = on
173
174# Disable content scanning
175# If you enable this option you will disable content scanning for this group.
176# Content scanning primarily is AV scanning (if enabled) but could include
177# other types.
178# (on|off) default = off.
179disablecontentscan = off
180
181# Enable Deep URL Analysis
182# When enabled, DG looks for URLs within URLs, checking against the bannedsitelist and
183# bannedurllist. This can be used, for example, to block images originating from banned
184# sites from appearing in Google Images search results, as the original URLs are
185# embedded in the thumbnail GET requests.
186# (on|off) default = off
187deepurlanalysis = off
188
189# reportinglevel
190#
191# -1 = log, but do not block - Stealth mode
192#  0 = just say 'Access Denied'
193#  1 = report why but not what denied phrase
194#  2 = report fully
195#  3 = use HTML template file (accessdeniedaddress ignored) - recommended
196#
197# If defined, this overrides the global setting in dansguardian.conf for
198# members of this filter group.
199#
200#reportinglevel = 3
201
202# accessdeniedaddress is the address of your web server to which the cgi
203# dansguardian reporting script was copied. Only used in reporting levels
204# 1 and 2.
205#
206# This webserver must be either:
207#  1. Non-proxied. Either a machine on the local network, or listed as an
208#     exception in your browser's proxy configuration.
209#  2. Added to the exceptionsitelist. Option 1 is preferable; this option is
210#     only for users using both transparent proxying and a non-local server
211#     to host this script.
212#
213# If defined, this overrides the global setting in dansguardian.conf for
214# members of this filter group.
215#
216#accessdeniedaddress = 'http://YOURSERVER.YOURDOMAIN/cgi-bin/dansguardian.pl'
217
218# HTML Template override
219# If defined, this specifies a custom HTML template file for members of this
220# filter group, overriding the global setting in dansguardian.conf. This is
221# only used in reporting level 3.
222#
223# The default template file path is <languagedir>/<language>/template.html
224# e.g. /usr/share/dansguardian/languages/ukenglish/template.html when using 'ukenglish'
225# language.
226#
227# This option generates a file path of the form:
228# <languagedir>/<language>/<htmltemplate>
229# e.g. /usr/share/dansguardian/languages/ukenglish/custom.html
230#
231#htmltemplate = 'custom.html'
232
233# Email reporting - original patch by J. Gauthier
234
235# Use SMTP
236# If on, will enable system wide events to be reported by email.
237# need to configure mail program (see 'mailer' in global config)
238# and email recipients
239# default usesmtp = off
240usesmtp = off
241
242# mailfrom
243# who the email would come from
244# example: mailfrom = 'dansguardian@mycompany.com'
245mailfrom = ''
246
247# avadmin
248# who the virus emails go to (if notify av is on)
249# example: avadmin = 'admin@mycompany.com'
250avadmin = ''
251
252# contentdmin
253# who the content emails go to (when thresholds are exceeded)
254# and contentnotify is on
255# example: contentadmin = 'admin@mycompany.com'
256contentadmin = ''
257
258# avsubject
259# Subject of the email sent when a virus is caught.
260# only applicable if notifyav is on
261# default avsubject = 'dansguardian virus block'
262avsubject = 'dansguardian virus block'
263
264# content
265# Subject of the email sent when violation thresholds are exceeded
266# default contentsubject = 'dansguardian violation'
267contentsubject = 'dansguardian violation'
268
269# notifyAV
270# This will send a notification, if usesmtp/notifyav is on, any time an
271# infection is found.
272# Important: If this option is off, viruses will still be recorded like a
273# content infraction.
274notifyav = off
275
276# notifycontent
277# This will send a notification, if usesmtp is on, based on thresholds
278# below
279notifycontent = off
280
281# thresholdbyuser
282# results are only predictable with user authenticated configs
283# if enabled the violation/threshold count is kept track of by the user
284thresholdbyuser = off
285
286#violations
287# number of violations before notification
288# setting to 0 will never trigger a notification
289violations = 0
290
291#threshold
292# this is in seconds. If 'violations' occur in 'threshold' seconds, then
293# a notification is made.
294# if this is set to 0, then whenever the set number of violations are made a
295# notifaction will be sent.
296threshold = 0
297
Note: See TracBrowser for help on using the repository browser.