From 6967444fb9096e84497d257f0c25c73bb53c3778 Mon Sep 17 00:00:00 2001 From: rnhmjoj Date: Wed, 18 Sep 2019 22:08:46 +0200 Subject: [PATCH] Add full configuration file example --- README.md | 47 +++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 47 insertions(+) diff --git a/README.md b/README.md index 7b0956e..c6130a6 100644 --- a/README.md +++ b/README.md @@ -65,6 +65,53 @@ python src/cert.py -f output applications may use their own store and won't trust it. You will need to add the CA manually in that case. +## Configuration settings + +Below is an example configuration file that shows all settings: + +```ini +[GENERAL] +; The URL of privoxy +proxAddr = http://localhost:8080 + +; The port the front proxy will bind to +frontPort = 8079 + +; The port the rear proxy will bind to +rearPort = 8081 + +; An upstream HTTP proxy if required by the network +DefaultProxy = http://127.0.0.1:8118 + +; The Logging level: either ERROR, WARNING, INFO or DEBUG +LogLevel = INFO + +; Proxy the following URLs to this HTTP or SOCKS proxy. +; This option can be repeated. +; Python regular expression are also allowed. +[proxy http://192.168.178.1:8123] +https?://*.test.com + +; Skip TLS certificate verification for these URLS. +; This is dangerous, use with care. +[noVerify] +self-signed.example.com + +; Block requests to the following URLs +[blacklist] +*.ads.example.net + +; Passthrough the MitM proxying and Privoxy, +; but still use the default proxy for these URLs. +[passthru] +broken.example.com + +; Bypass all proxying for these URLs +[bypassURL] +http://www.example.com/* +*.zip +*.pdf +``` ## License