Subversion Repositories ALCASAR

Rev

Go to most recent revision | Details | Last modification | View Log

Rev Author Line No. Line
77 richard 1
#
2
# This is the configuration file for HAVP
3
#
4
# All lines starting with a hash (#) or empty lines are ignored.
5
# Uncomment parameters you want to change!
6
#
7
# All parameters configurable in this file are explained and their default
8
# values are shown. If no default value is defined "NONE" is specified.
9
# 
10
# General syntax: Parameter Value
11
# Value can be: true/false, number, or path
12
#
13
# Extra spaces and tabs are ignored.
14
#
15
 
16
# You must remove this line for HAVP to start.
17
# This makes sure you have (hopefully) reviewed the configuration. :)
18
# Hint: You must enable some scanner! Find them in the end..
19
# REMOVETHISLINE deleteme
20
 
21
#
22
# For reasons of security it is recommended to run a proxy program
23
# without root rights. It is recommended to create user that is not
24
# used by any other program.
25
#
26
# Default:
27
# USER havp
28
# GROUP havp
29
 
30
# If this is true HAVP is running as daemon in background.
31
# For testing you may run HAVP at your text console.
32
#
33
# Default:
34
# DAEMON true
35
 
36
#
37
# Process id (PID) of the main HAVP process is written to this file.
38
# Be sure that it is writeable by the user under which HAVP is running.
39
# /etc/init.d/havp script requires this to work.
40
#
41
# Default:
42
# PIDFILE /var/run/havp/havp.pid
43
 
44
#
45
# For performance reasons several instances of HAVP have to run.
46
# Specify how many servers (child processes) are simultaneously
47
# listening on port PORT for a connection. Minimum value should be
48
# the peak requests-per-second expected + 5 for headroom. For best
49
# performance, you should have atleast 1 CPU core per 16 processes.
50
#
51
# For single user home use, 8 should be minimum.
52
# For 500+ users corporate use, start at 40.
53
#
54
# Value can and should be higher than recommended. Memory and
55
# CPU usage is only affected by the number of concurrent requests.
56
#
57
# More childs are automatically created when needed, up to MAXSERVERS.
58
#
59
# Default:
60
# SERVERNUMBER 8
61
# MAXSERVERS 100
62
 
63
#
64
# Files where to log requests and info/errors.
65
# Needs to have write permission for HAVP user.
66
#
67
# Default:
68
# ACCESSLOG /var/log/havp/access.log
69
# ERRORLOG /var/log/havp/havp.log
70
 
71
#
72
# Syslog can be used instead of logging to file.
73
# For facilities and levels, see "man syslog".
74
#
75
# Default:
76
# USESYSLOG false
77
# SYSLOGNAME havp
78
# SYSLOGFACILITY daemon
79
# SYSLOGLEVEL info
80
# SYSLOGVIRUSLEVEL warning
81
 
82
#
83
# true: Log every request to access log
84
# false: Log only viruses to access log
85
#
86
# Default:
87
LOG_OKS false
88
 
89
#
90
# Level of HAVP logging
91
#  0 = Only serious errors and information
92
#  1 = Less interesting information is included
93
#
94
# Default:
95
# LOGLEVEL 0
96
 
97
#
98
# Temporary scan file.
99
# This file must reside on a partition for which mandatory
100
# locking is enabled. For Linux, use "-o mand" in mount command.
101
# See "man mount" for details. Solaris does not need any special
102
# steps, it works directly.
103
#
104
# Specify absolute path to a file which name must contain "XXXXXX".
105
# These characters are used by system to create unique named files.
106
#
107
# Default:
108
# SCANTEMPFILE /var/tmp/havp/havp-XXXXXX
109
 
110
#
111
# Directory for ClamAV and other scanner created tempfiles.
112
# Needs to be writable by HAVP user. Use ramdisk for best performance.
113
#
114
# Default:
115
# TEMPDIR /var/tmp
116
 
117
#
118
# HAVP reloads scanners virus database by receiving a signal
119
# (send SIGHUP to PID from PIDFILE, see "man kill") or after
120
# a specified period of time. Specify here the number of
121
# minutes to wait for reloading.
122
#
123
# This only affects library scanners (clamlib, trophie).
124
# Other scanners must be updated manually.
125
#
126
# Default:
127
# DBRELOAD 60 
128
 
129
#
130
# Run HAVP as transparent Proxy?
131
#
132
# If you don't know what this means read the mini-howto
133
# TransparentProxy written by Daniel Kiracofe.
134
# (e.g.: http://www.tldp.org/HOWTO/mini/TransparentProxy.html)
135
# Definitely you have more to do than setting this to true.
136
# You are warned!
137
#
138
# Default:
139
# TRANSPARENT false
140
 
141
#
142
# Specify a parent proxy (e.g. Squid) HAVP should use.
143
#
144
# Default: NONE
145
PARENTPROXY localhost
146
PARENTPORT 3128
147
 
148
#
149
# Write X-Forwarded-For: to log instead of connecters IP?
150
#
151
# If HAVP is used as parent proxy by some other proxy, this allows
152
# to write the real users IP to log, instead of proxy IP.
153
#
154
# Default:
155
# FORWARDED_IP false
156
 
157
#
158
# Send X-Forwarded-For: header to servers?
159
#
160
# If client sent this header, FORWARDED_IP setting defines the value,
161
# then it is passed on. You might want to keep this disabled for security
162
# reasons. Enable this if you use your own parent proxy after HAVP, so it
163
# will see the original client IP.
164
#
165
# Disabling this also disables Via: header generation.
166
#
167
# Default:
168
# X_FORWARDED_FOR false
169
 
170
#
171
# Port HAVP is listening on.
172
#
173
# Default:
174
PORT 8090
175
 
176
#
177
# IP address that HAVP listens on.
178
# Let it be undefined to bind all addresses.
179
#
180
# Default: NONE
181
BIND_ADDRESS 127.0.0.1
182
 
183
#
184
# IP address used for sending outbound packets.
185
# Let it be undefined if you want OS to handle right address.
186
#
187
# Default: NONE
188
# SOURCE_ADDRESS 1.2.3.4
189
 
190
#
191
# Path to template files.
192
#
193
# Default:
194
TEMPLATEPATH /usr/local/etc/havp/templates/fr
195
 
196
#
197
# Set to true if you want to prefer Whitelist.
198
# If URL is Whitelisted, then Blacklist is ignored.
199
# Otherwise Blacklist is preferred.
200
#
201
# Default:
202
# WHITELISTFIRST true
203
 
204
#
205
# List of URLs not to scan.
206
#
207
# Default:
208
# WHITELIST /usr/local/etc/havp/whitelist
209
 
210
#
211
# List of URLs that are denied access.
212
#
213
# Default:
214
# BLACKLIST /usr/local/etc/havp/blacklist
215
 
216
#
217
# Is scanner error fatal?
218
#
219
# For example, archive types that are not supported by scanner
220
# may return error. Also if scanner has invalid pattern files etc.
221
#
222
# true: User gets error page
223
# false: No error is reported (viruses might not be detected)
224
#
225
# Default:
226
# FAILSCANERROR true
227
 
228
#
229
# When scanning takes longer than this, it will be aborted.
230
# Timer is started after HAVP has fully received all data.
231
# If set too low, complex files/archives might produce timeout.
232
# Timeout is always a fatal error regardless of FAILSCANERROR.
233
#
234
# Time in minutes!
235
#
236
# Default:
237
# SCANNERTIMEOUT 10
238
 
239
#
240
# Allow HTTP Range requests?
241
#
242
# false: Broken downloads can NOT be resumed
243
# true: Broken downloads can be resumed
244
#
245
# Allowing Range is a security risk, because partial
246
# HTTP requests may not be properly scanned.
247
#
248
# Whitelisted sites are allowed to use Range in any case.
249
#
250
# Default:
251
# RANGE false
252
 
253
#
254
# Allow HTTP Range request to get the ZIP header first?
255
#
256
# This allows (partial) scanning of ZIP files that are bigger than
257
# MAXSCANSIZE. Scanning is done up to that many bytes into the file.
258
#
259
# Default:
260
# PRELOADZIPHEADER true
261
 
262
#
263
# If you really need more performance, you can disable scanning of
264
# JPG, GIF and PNG files. These are probably the most common files
265
# around, so it will save lots of CPU. But be warned, image exploits
266
# exist and more could be found. Think twice if you want to disable!
267
#
268
# Default:
269
# SCANIMAGES true
270
 
271
#
272
# Temporary file will grow only up to this size. This means scanner
273
# will scan data until this limit is reached.
274
#
275
# There are two sides to this setting. By limiting the size, you gain
276
# performance, less waiting for big files and less needed temporary space.
277
# But there is slightly higher chance of virus slipping through (though
278
# scanning large archives should not be gateways function, HAVP is more
279
# geared towards small exploit detection etc).
280
#
281
# VALUE IN BYTES NOT KB OR MB!!!!
282
#  0 = No size limit
283
#
284
# Default:
285
# MAXSCANSIZE 5000000
286
 
287
#
288
# Amount of data going to browser that is held back, until it
289
# is scanned. When we know file is clean, this held back data
290
# can be sent to browser. You can safely set bigger value, only
291
# thing you will notice is some "delay" in beginning of download.
292
# Virus found in files bigger than this might not produce HAVP
293
# error page, but result in a "broken" download.
294
#
295
# VALUE IN BYTES NOT KB OR MB!!!!
296
#
297
# Default:
298
# KEEPBACKBUFFER 200000
299
 
300
#
301
# This setting complements KEEPBACKBUFFER. It tells how many Seconds to
302
# initially receive data from server, before sending anything to client.
303
# Even trickling is not done before this time elapses. This way files that
304
# are received fast are more secure and user can get virus report page for
305
# files bigger than KEEPBACKBUFFER.
306
#
307
# Setting to 0 will disable this, and only KEEPBACKBUFFER is used.
308
#
309
# Default:
310
# KEEPBACKTIME 5
311
 
312
#
313
# After Trickling Time (seconds), some bytes are sent to browser
314
# to keep the connection alive. Trickling is not needed if timeouts
315
# are not expected for files smaller than KEEPBACKBUFFER, but it is
316
# recommended to set anyway.
317
#
318
# 0 = No Trickling
319
#
320
# Default:
321
# TRICKLING 30
322
 
323
#
324
# Send this many bytes to browser every TRICKLING seconds, see above
325
#
326
# Default:
327
# TRICKLINGBYTES 1
328
 
329
#
330
# Downloads larger than MAXDOWNLOADSIZE will be blocked.
331
# Only if not Whitelisted!
332
#
333
# VALUE IN BYTES NOT KB OR MB!!!!
334
#  0 = Unlimited Downloads
335
#
336
# Default:
337
# MAXDOWNLOADSIZE 0
338
 
339
#
340
# Space separated list of strings to partially match User-Agent: header.
341
# These are used for streaming content, so scanning is generally not needed
342
# and tempfiles grow unnecessary. Remember when enabled, that user could
343
# fake header and pass some scanning. HTTP Range requests are allowed for
344
# these, so players can seek content.
345
#
346
# You can uncomment here a list of most popular players.
347
#
348
# Default: NONE
349
# STREAMUSERAGENT Player Winamp iTunes QuickTime Audio RMA/ MAD/ Foobar2000 XMMS
350
 
351
#
352
# Bytes to scan from beginning of streams.
353
# When set to 0, STREAMUSERAGENT scanning will be completely disabled.
354
# It is not recommended as there are some exploits for players.
355
#
356
# Default:
357
# STREAMSCANSIZE 20000
358
 
359
#
360
# Disable mandatory locking (dynamic scanning) for certain file types.
361
# This is intended for fixing cases where a scanner forces use of mmap()
362
# call. Mandatory locking might not allow this, so you could get errors
363
# regarding memory allocation or I/O. You can test the "None" option
364
# anyway, as it might even work depending on your OS (some Linux seems
365
# to allow mand+mmap).
366
# 
367
# Allowed values:
368
#   None
369
#   ClamAV:BinHex  (mmap forced in all versions, no ETA for fix)
370
#   ClamAV:PDF     (mmap forced in all versions, no ETA for fix)
371
#   ClamAV:ZIP     (mmap forced in 0.93.x, should work in 0.94)
372
#   AVG:ALL        (AVG 8.5 does not work, uses mmap MAP_SHARED)
373
#
374
# Default:
375
# DISABLELOCKINGFOR ClamAV:BinHex ClamAV:PDF ClamAV:ZIP AVG:ALL
376
 
377
#
378
# Whitelist specific viruses by case-insensitive substring match.
379
# For example, "Oversized." and "Encrypted." are good candidates,
380
# if you can't disable those checks any other way.
381
#
382
# Default: NONE
383
# IGNOREVIRUS Oversized. Encrypted. Phishing.
384
 
385
 
386
#####
387
##### ClamAV Library Scanner (libclamav)
388
#####
389
 
390
ENABLECLAMLIB true
391
 
392
# HAVP uses libclamav hardcoded pattern directory, which usually is
393
# /usr/local/share/clamav. You only need to set CLAMDBDIR, if you are
394
# using non-default DatabaseDirectory setting in clamd.conf.
395
#
396
# Default: NONE
397
# CLAMDBDIR /path/to/directory
398
 
399
# Should we block broken executables?
400
#
401
# Default:
402
# CLAMBLOCKBROKEN false
403
 
404
# Should we block encrypted archives?
405
#
406
# Default:
407
# CLAMBLOCKENCRYPTED false
408
 
409
# Should we block files that go over maximum archive limits?
410
#
411
# Default:
412
# CLAMBLOCKMAX false
413
 
414
# Scanning limits?
415
# You can find some additional info from documentation or clamd.conf
416
#
417
# Stop when this many total bytes scanned (MB)
418
# CLAMMAXSCANSIZE 20
419
#
420
# Stop when this many files have been scanned
421
# CLAMMAXFILES 50
422
#
423
# Don't scan files over this size (MB)
424
# CLAMMAXFILESIZE 100
425
#
426
# Maximum archive recursion
427
# CLAMMAXRECURSION 8
428
 
429
 
430
#####
431
##### ClamAV Socket Scanner (clamd)
432
#####
433
##### NOTE: ClamAV Library Scanner should be preferred (less overhead)
434
#####
435
 
436
ENABLECLAMD false
437
 
438
# Path to clamd socket
439
#
440
# Default:
441
# CLAMDSOCKET /tmp/clamd
442
 
443
# ..OR if you use clamd TCP socket, uncomment to enable use
444
#
445
# Clamd daemon needs to run on the same server as HAVP
446
#
447
# Default: NONE
448
# CLAMDSERVER 127.0.0.1
449
# CLAMDPORT 3310
450
 
451
 
452
#####
453
##### F-Prot Socket Scanner
454
#####
455
 
456
ENABLEFPROT false
457
 
458
# F-Prot daemon needs to run on same server as HAVP
459
#
460
# Default:
461
# FPROTSERVER 127.0.0.1
462
# FPROTPORT 10200
463
 
464
# F-Prot options (only for version 6+ !)
465
#
466
# See "fpscand-client.sh --help" for possible options.
467
#
468
# At the moment:
469
#  --scanlevel=<n>  Which scanlevel to use, 0-4 (2).
470
#  --heurlevel=<n>  How aggressive heuristics should be used, 0-4 (2).
471
#  --archive=<n>    Scan inside supported archives n levels deep 1-99 (5).
472
#  --adware         Instructs the daemon to flag adware.
473
#  --applications   Instructs the daemon to flag potentially unwanted applications.
474
#
475
# Default: NONE
476
# FPROTOPTIONS --scanlevel=2 --heurlevel=2
477
 
478
 
479
#####
480
##### AVG Socket Scanner
481
#####
482
 
483
ENABLEAVG false
484
 
485
# AVG daemon needs to run on the same server as HAVP
486
#
487
# Default:
488
# AVGSERVER 127.0.0.1
489
# AVGPORT 55555
490
 
491
 
492
#####
493
##### Kaspersky Socket Scanner
494
#####
495
 
496
ENABLEAVESERVER false
497
 
498
# Path to aveserver socket
499
#
500
# Default:
501
# AVESOCKET /var/run/aveserver
502
 
503
 
504
#####
505
##### Sophos Scanner (Sophie)
506
#####
507
 
508
ENABLESOPHIE false
509
 
510
# Path to sophie socket
511
#
512
# Default:
513
# SOPHIESOCKET /var/run/sophie
514
 
515
 
516
#####
517
##### Trend Micro Library Scanner (Trophie)
518
#####
519
 
520
ENABLETROPHIE false
521
 
522
# Scanning limits inside archives (filesize = MB):
523
#
524
# Default:
525
# TROPHIEMAXFILES 50
526
# TROPHIEMAXFILESIZE 10
527
# TROPHIEMAXRATIO 250
528
 
529
 
530
#####
531
##### NOD32 Socket Scanner
532
#####
533
 
534
ENABLENOD32 false
535
 
536
# Path to nod32d socket
537
#
538
# For 3.0+ version, try /tmp/esets.sock
539
#
540
# Default:
541
# NOD32SOCKET /tmp/nod32d.sock
542
 
543
# Used NOD32 Version
544
#
545
#  30 = 3.0+
546
#  25 = 2.5+
547
#  21 = 2.x (very old)
548
#
549
# Default:
550
# NOD32VERSION 25
551
 
552
 
553
#####
554
##### Avast! Socket Scanner
555
#####
556
 
557
ENABLEAVAST false
558
 
559
# Path to avastd socket
560
#
561
# Default:
562
# AVASTSOCKET /var/run/avast4/local.sock
563
 
564
# ..OR if you use avastd TCP socket, uncomment to enable use
565
#
566
# Avast daemon needs to run on the same server as HAVP
567
#
568
# Default: NONE
569
# AVASTSERVER 127.0.0.1
570
# AVASTPORT 5036
571
 
572
 
573
#####
574
##### Arcavir Socket Scanner
575
#####
576
 
577
ENABLEARCAVIR false
578
 
579
# Path to arcavird socket
580
#
581
# For version 2008, default socket is /var/run/arcad.ctl
582
#
583
# Default:
584
# ARCAVIRSOCKET /var/run/arcavird.socket
585
 
586
# Used Arcavir version
587
#  2007 = Version 2007 and earlier
588
#  2008 = Version 2008 and later
589
#
590
# Default:
591
# ARCAVIRVERSION 2007
592
 
593
 
594
#####
595
##### DrWeb Socket Scanner
596
#####
597
 
598
ENABLEDRWEB false
599
 
600
# Enable heuristic scanning?
601
#
602
# Default:
603
# DRWEBHEURISTIC true
604
 
605
# Enable malware detection?
606
# (Adware, Dialer, Joke, Riskware, Hacktool)
607
#
608
# Default:
609
# DRWEBMALWARE true
610
 
611
# Path to drwebd socket
612
#
613
# Default:
614
# DRWEBSOCKET /var/drweb/run/.daemon
615
 
616
# ..OR if you use drwebd TCP socket, uncomment to enable use
617
#
618
# DrWeb daemon needs to run on the same server as HAVP
619
#
620
# Default: NONE
621
# DRWEBSERVER 127.0.0.1
622
# DRWEBPORT 3000
623