[c5c522c] | 1 | # DansGuardian filter group config file for version 2.10.1.1 |
---|
| 2 | # Modified for SYN-3 by DatuX |
---|
| 3 | |
---|
| 4 | |
---|
| 5 | # Filter group mode |
---|
| 6 | # This option determines whether members of this group have their web access |
---|
| 7 | # unfiltered, filtered, or banned. This mechanism replaces the "banneduserlist" |
---|
| 8 | # and "exceptionuserlist" files from previous versions. |
---|
| 9 | # |
---|
| 10 | # 0 = banned |
---|
| 11 | # 1 = filtered |
---|
| 12 | # 2 = unfiltered (exception) |
---|
| 13 | # |
---|
| 14 | # Only filter groups with a mode of 1 need to define phrase, URL, site, extension, |
---|
| 15 | # mimetype and PICS lists; in other modes, these options are ignored to conserve |
---|
| 16 | # memory. |
---|
| 17 | # |
---|
| 18 | # Defaults to 0 if unspecified. |
---|
| 19 | # Unauthenticated users are treated as being in the first filter group. |
---|
| 20 | groupmode = 1 |
---|
| 21 | |
---|
| 22 | # Filter group name |
---|
| 23 | # Used to fill in the -FILTERGROUP- placeholder in the HTML template file, and to |
---|
| 24 | # name the group in the access logs |
---|
| 25 | # Defaults to empty string |
---|
| 26 | #groupname = '' |
---|
| 27 | |
---|
| 28 | # Content filtering files location |
---|
| 29 | bannedphraselist = '/home/system/dansguardian/lists/bannedphraselist' |
---|
| 30 | weightedphraselist = '/home/system/dansguardian/lists/weightedphraselist' |
---|
| 31 | exceptionphraselist = '/home/system/dansguardian/lists/exceptionphraselist' |
---|
| 32 | bannedsitelist = '/home/system/dansguardian/lists/bannedsitelist' |
---|
| 33 | greysitelist = '/home/system/dansguardian/lists/greysitelist' |
---|
| 34 | exceptionsitelist = '/home/system/dansguardian/lists/exceptionsitelist' |
---|
| 35 | bannedurllist = '/home/system/dansguardian/lists/bannedurllist' |
---|
| 36 | greyurllist = '/home/system/dansguardian/lists/greyurllist' |
---|
| 37 | exceptionurllist = '/home/system/dansguardian/lists/exceptionurllist' |
---|
| 38 | exceptionregexpurllist = '/home/system/dansguardian/lists/exceptionregexpurllist' |
---|
| 39 | bannedregexpurllist = '/home/system/dansguardian/lists/bannedregexpurllist' |
---|
| 40 | picsfile = '/home/system/dansguardian/lists/pics' |
---|
| 41 | contentregexplist = '/home/system/dansguardian/lists/contentregexplist' |
---|
| 42 | urlregexplist = '/home/system/dansguardian/lists/urlregexplist' |
---|
| 43 | |
---|
| 44 | # Filetype filtering |
---|
| 45 | # |
---|
| 46 | # Blanket download blocking |
---|
| 47 | # If enabled, all files will be blocked, unless they match the |
---|
| 48 | # exceptionextensionlist or exceptionmimetypelist. |
---|
| 49 | # These lists do not override virus scanning. |
---|
| 50 | # Exception lists defined above override all types of filtering, including |
---|
| 51 | # the blanket download block. |
---|
| 52 | # Defaults to disabled. |
---|
| 53 | # (on | off) |
---|
| 54 | # |
---|
| 55 | blockdownloads = off |
---|
| 56 | exceptionextensionlist = '/home/system/dansguardian/lists/exceptionextensionlist' |
---|
| 57 | exceptionmimetypelist = '/home/system/dansguardian/lists/exceptionmimetypelist' |
---|
| 58 | # |
---|
| 59 | # Use the following lists to block specific kinds of file downloads. |
---|
| 60 | # The two exception lists above can be used to override these. |
---|
| 61 | # |
---|
| 62 | bannedextensionlist = '/home/system/dansguardian/lists/bannedextensionlist' |
---|
| 63 | bannedmimetypelist = '/home/system/dansguardian/lists/bannedmimetypelist' |
---|
| 64 | # |
---|
| 65 | # In either file filtering mode, the following list can be used to override |
---|
| 66 | # MIME type & extension blocks for particular domains & URLs (trusted download sites). |
---|
| 67 | # |
---|
| 68 | exceptionfilesitelist = '/home/system/dansguardian/lists/exceptionfilesitelist' |
---|
| 69 | exceptionfileurllist = '/home/system/dansguardian/lists/exceptionfileurllist' |
---|
| 70 | |
---|
| 71 | # Categorise without blocking: |
---|
| 72 | # Supply categorised lists here and the category string shall be logged against |
---|
| 73 | # matching requests, but matching these lists does not perform any filtering |
---|
| 74 | # action. |
---|
| 75 | #logsitelist = '/home/system/dansguardian/lists/logsitelist' |
---|
| 76 | #logurllist = '/home/system/dansguardian/lists/logurllist' |
---|
| 77 | #logregexpurllist = '/home/system/dansguardian/lists/logregexpurllist' |
---|
| 78 | |
---|
| 79 | # Outgoing HTTP header rules: |
---|
| 80 | # Optional lists for blocking based on, and modification of, outgoing HTTP |
---|
| 81 | # request headers. Format for headerregexplist is one modification rule per |
---|
| 82 | # line, similar to content/URL modifications. Format for |
---|
| 83 | # bannedregexpheaderlist is one regular expression per line, with matching |
---|
| 84 | # headers causing a request to be blocked. |
---|
| 85 | # Headers are matched/replaced on a line-by-line basis, not as a contiguous |
---|
| 86 | # block. |
---|
| 87 | # Use for example, to remove cookies or prevent certain user-agents. |
---|
| 88 | headerregexplist = '/home/system/dansguardian/lists/headerregexplist' |
---|
| 89 | bannedregexpheaderlist = '/home/system/dansguardian/lists/bannedregexpheaderlist' |
---|
| 90 | |
---|
| 91 | # Naughtyness limit |
---|
| 92 | # This the limit over which the page will be blocked. Each weighted phrase is given |
---|
| 93 | # a value either positive or negative and the values added up. Phrases to do with |
---|
| 94 | # good subjects will have negative values, and bad subjects will have positive |
---|
| 95 | # values. See the weightedphraselist file for examples. |
---|
| 96 | # As a guide: |
---|
| 97 | # 50 is for young children, 100 for old children, 160 for young adults. |
---|
| 98 | naughtynesslimit = 200 |
---|
| 99 | |
---|
| 100 | # Category display threshold |
---|
| 101 | # This option only applies to pages blocked by weighted phrase filtering. |
---|
| 102 | # Defines the minimum score that must be accumulated within a particular |
---|
| 103 | # category in order for it to show up on the block pages' category list. |
---|
| 104 | # All categories under which the page scores positively will be logged; those |
---|
| 105 | # that were not displayed to the user appear in brackets. |
---|
| 106 | # |
---|
| 107 | # -1 = display only the highest scoring category |
---|
| 108 | # 0 = display all categories (default) |
---|
| 109 | # > 0 = minimum score for a category to be displayed |
---|
| 110 | categorydisplaythreshold = 0 |
---|
| 111 | |
---|
| 112 | # Embedded URL weighting |
---|
| 113 | # When set to something greater than zero, this option causes URLs embedded within a |
---|
| 114 | # page's HTML (from links, image tags, etc.) to be extracted and checked against the |
---|
| 115 | # bannedsitelist and bannedurllist. Each link to a banned page causes the amount set |
---|
| 116 | # here to be added to the page's weighting. |
---|
| 117 | # The behaviour of this option with regards to multiple occurrences of a site/URL is |
---|
| 118 | # affected by the weightedphrasemode setting. |
---|
| 119 | # |
---|
| 120 | # NB: Currently, this feature uses regular expressions that require the PCRE library. |
---|
| 121 | # As such, it is only available if you compiled DansGuardian with '--enable-pcre=yes'. |
---|
| 122 | # You can check compile-time options by running 'dansguardian -v'. |
---|
| 123 | # |
---|
| 124 | # Set to 0 to disable. |
---|
| 125 | # Defaults to 0. |
---|
| 126 | # WARNING: This option is highly CPU intensive! |
---|
| 127 | embeddedurlweight = 0 |
---|
| 128 | |
---|
| 129 | # Enable PICS rating support |
---|
| 130 | # |
---|
| 131 | # Defaults to disabled |
---|
| 132 | # (on | off) |
---|
| 133 | enablepics = off |
---|
| 134 | |
---|
| 135 | # Temporary Denied Page Bypass |
---|
| 136 | # This provides a link on the denied page to bypass the ban for a few minutes. To be |
---|
| 137 | # secure it uses a random hashed secret generated at daemon startup. You define the |
---|
| 138 | # number of seconds the bypass will function for before the deny will appear again. |
---|
| 139 | # To allow the link on the denied page to appear you will need to edit the template.html |
---|
| 140 | # or dansguardian.pl file for your language. |
---|
| 141 | # 300 = enable for 5 minutes |
---|
| 142 | # 0 = disable ( defaults to 0 ) |
---|
| 143 | # -1 = enable but you require a separate program/CGI to generate a valid link |
---|
| 144 | bypass = 0 |
---|
| 145 | |
---|
| 146 | # Temporary Denied Page Bypass Secret Key |
---|
| 147 | # Rather than generating a random key you can specify one. It must be more than 8 chars. |
---|
| 148 | # '' = generate a random one (recommended and default) |
---|
| 149 | # 'Mary had a little lamb.' = an example |
---|
| 150 | # '76b42abc1cd0fdcaf6e943dcbc93b826' = an example |
---|
| 151 | bypasskey = '' |
---|
| 152 | |
---|
| 153 | # Infection/Scan Error Bypass |
---|
| 154 | # Similar to the 'bypass' setting, but specifically for bypassing files scanned and found |
---|
| 155 | # to be infected, or files that trigger scanner errors - for example, archive types with |
---|
| 156 | # recognised but unsupported compression schemes, or corrupt archives. |
---|
| 157 | # The option specifies the number of seconds for which the bypass link will be valid. |
---|
| 158 | # 300 = enable for 5 minutes |
---|
| 159 | # 0 = disable (default) |
---|
| 160 | # -1 = enable, but require a separate program/CGI to generate a valid link |
---|
| 161 | infectionbypass = 0 |
---|
| 162 | |
---|
| 163 | # Infection/Scan Error Bypass Secret Key |
---|
| 164 | # Same as the 'bypasskey' option, but used for infection bypass mode. |
---|
| 165 | infectionbypasskey = '' |
---|
| 166 | |
---|
| 167 | # Infection/Scan Error Bypass on Scan Errors Only |
---|
| 168 | # Enable this option to allow infectionbypass links only when virus scanning fails, |
---|
| 169 | # not when a file is found to contain a virus. |
---|
| 170 | # on = enable (default and highly recommended) |
---|
| 171 | # off = disable |
---|
| 172 | infectionbypasserrorsonly = on |
---|
| 173 | |
---|
| 174 | # Disable content scanning |
---|
| 175 | # If you enable this option you will disable content scanning for this group. |
---|
| 176 | # Content scanning primarily is AV scanning (if enabled) but could include |
---|
| 177 | # other types. |
---|
| 178 | # (on|off) default = off. |
---|
| 179 | disablecontentscan = off |
---|
| 180 | |
---|
| 181 | # Enable Deep URL Analysis |
---|
| 182 | # When enabled, DG looks for URLs within URLs, checking against the bannedsitelist and |
---|
| 183 | # bannedurllist. This can be used, for example, to block images originating from banned |
---|
| 184 | # sites from appearing in Google Images search results, as the original URLs are |
---|
| 185 | # embedded in the thumbnail GET requests. |
---|
| 186 | # (on|off) default = off |
---|
| 187 | deepurlanalysis = off |
---|
| 188 | |
---|
| 189 | # reportinglevel |
---|
| 190 | # |
---|
| 191 | # -1 = log, but do not block - Stealth mode |
---|
| 192 | # 0 = just say 'Access Denied' |
---|
| 193 | # 1 = report why but not what denied phrase |
---|
| 194 | # 2 = report fully |
---|
| 195 | # 3 = use HTML template file (accessdeniedaddress ignored) - recommended |
---|
| 196 | # |
---|
| 197 | # If defined, this overrides the global setting in dansguardian.conf for |
---|
| 198 | # members of this filter group. |
---|
| 199 | # |
---|
| 200 | #reportinglevel = 3 |
---|
| 201 | |
---|
| 202 | # accessdeniedaddress is the address of your web server to which the cgi |
---|
| 203 | # dansguardian reporting script was copied. Only used in reporting levels |
---|
| 204 | # 1 and 2. |
---|
| 205 | # |
---|
| 206 | # This webserver must be either: |
---|
| 207 | # 1. Non-proxied. Either a machine on the local network, or listed as an |
---|
| 208 | # exception in your browser's proxy configuration. |
---|
| 209 | # 2. Added to the exceptionsitelist. Option 1 is preferable; this option is |
---|
| 210 | # only for users using both transparent proxying and a non-local server |
---|
| 211 | # to host this script. |
---|
| 212 | # |
---|
| 213 | # If defined, this overrides the global setting in dansguardian.conf for |
---|
| 214 | # members of this filter group. |
---|
| 215 | # |
---|
| 216 | #accessdeniedaddress = 'http://YOURSERVER.YOURDOMAIN/cgi-bin/dansguardian.pl' |
---|
| 217 | |
---|
| 218 | # HTML Template override |
---|
| 219 | # If defined, this specifies a custom HTML template file for members of this |
---|
| 220 | # filter group, overriding the global setting in dansguardian.conf. This is |
---|
| 221 | # only used in reporting level 3. |
---|
| 222 | # |
---|
| 223 | # The default template file path is <languagedir>/<language>/template.html |
---|
| 224 | # e.g. /usr/share/dansguardian/languages/ukenglish/template.html when using 'ukenglish' |
---|
| 225 | # language. |
---|
| 226 | # |
---|
| 227 | # This option generates a file path of the form: |
---|
| 228 | # <languagedir>/<language>/<htmltemplate> |
---|
| 229 | # e.g. /usr/share/dansguardian/languages/ukenglish/custom.html |
---|
| 230 | # |
---|
| 231 | #htmltemplate = 'custom.html' |
---|
| 232 | |
---|
| 233 | # Email reporting - original patch by J. Gauthier |
---|
| 234 | |
---|
| 235 | # Use SMTP |
---|
| 236 | # If on, will enable system wide events to be reported by email. |
---|
| 237 | # need to configure mail program (see 'mailer' in global config) |
---|
| 238 | # and email recipients |
---|
| 239 | # default usesmtp = off |
---|
| 240 | usesmtp = off |
---|
| 241 | |
---|
| 242 | # mailfrom |
---|
| 243 | # who the email would come from |
---|
| 244 | # example: mailfrom = 'dansguardian@mycompany.com' |
---|
| 245 | mailfrom = '' |
---|
| 246 | |
---|
| 247 | # avadmin |
---|
| 248 | # who the virus emails go to (if notify av is on) |
---|
| 249 | # example: avadmin = 'admin@mycompany.com' |
---|
| 250 | avadmin = '' |
---|
| 251 | |
---|
| 252 | # contentdmin |
---|
| 253 | # who the content emails go to (when thresholds are exceeded) |
---|
| 254 | # and contentnotify is on |
---|
| 255 | # example: contentadmin = 'admin@mycompany.com' |
---|
| 256 | contentadmin = '' |
---|
| 257 | |
---|
| 258 | # avsubject |
---|
| 259 | # Subject of the email sent when a virus is caught. |
---|
| 260 | # only applicable if notifyav is on |
---|
| 261 | # default avsubject = 'dansguardian virus block' |
---|
| 262 | avsubject = 'dansguardian virus block' |
---|
| 263 | |
---|
| 264 | # content |
---|
| 265 | # Subject of the email sent when violation thresholds are exceeded |
---|
| 266 | # default contentsubject = 'dansguardian violation' |
---|
| 267 | contentsubject = 'dansguardian violation' |
---|
| 268 | |
---|
| 269 | # notifyAV |
---|
| 270 | # This will send a notification, if usesmtp/notifyav is on, any time an |
---|
| 271 | # infection is found. |
---|
| 272 | # Important: If this option is off, viruses will still be recorded like a |
---|
| 273 | # content infraction. |
---|
| 274 | notifyav = off |
---|
| 275 | |
---|
| 276 | # notifycontent |
---|
| 277 | # This will send a notification, if usesmtp is on, based on thresholds |
---|
| 278 | # below |
---|
| 279 | notifycontent = off |
---|
| 280 | |
---|
| 281 | # thresholdbyuser |
---|
| 282 | # results are only predictable with user authenticated configs |
---|
| 283 | # if enabled the violation/threshold count is kept track of by the user |
---|
| 284 | thresholdbyuser = off |
---|
| 285 | |
---|
| 286 | #violations |
---|
| 287 | # number of violations before notification |
---|
| 288 | # setting to 0 will never trigger a notification |
---|
| 289 | violations = 0 |
---|
| 290 | |
---|
| 291 | #threshold |
---|
| 292 | # this is in seconds. If 'violations' occur in 'threshold' seconds, then |
---|
| 293 | # a notification is made. |
---|
| 294 | # if this is set to 0, then whenever the set number of violations are made a |
---|
| 295 | # notifaction will be sent. |
---|
| 296 | threshold = 0 |
---|
| 297 | |
---|