## Path: Productivity/Networking/Web/Proxy
## Description: Basic configuration of cntlm auth proxy
## Config: cntlm
## Type: string
## Default: "cntlm"
#
CNTLM_USER=""
## Type: string
## Default: ""
#
# -A
[/]
# New ACL allow rule. Address can be an IP or a hostname, net must be a number (CIDR notation)
# -a ntlm | nt | lm
# Authentication parameter - combined NTLM, just LM, or just NT. Default is to,
# send both, NTLM. It is the most versatile setting and likely to work for you.
# -B Enable NTLM-to-basic authentication.
# -c
# Configuration file. Other arguments can be used as well, overriding
# config file settings.
# -D [/]
# New ACL deny rule. Syntax same as -A.
# -d
# Domain/workgroup can be set separately.
# -f Run in foreground, do not fork into daemon mode.
# -F
# NTLM authentication flags.
# -G
# User-Agent matching for the trans-isa-scan plugin.
# -g Gateway mode - listen on all interfaces, not only loopback.
# -L [:]::
# Forwarding/tunneling a la OpenSSH. Same syntax - listen on lport
# and forward all connections through the proxy to rhost:rport.
# Can be used for direct tunneling without corkscrew, etc.
# -O [:]
# Enable SOCKS5 proxy and make it listen on the specified port (and address).
# -p
# Account password. Will not be visible in "ps", /proc, etc.
# -r "HeaderName: value"
# Add a header substitution. All such headers will be added/replaced
# in the client's requests.
# -S
# Enable transparent handler of ISA AV scanner plugin for files up to size_in_kb KiB.
# -s Do not use threads, serialize all requests - for debugging only.
# -U
# Run as uid. It is an important security measure not to run as root.
# -u [@
# Some proxies require correct NetBIOS hostname.
#
CNTLM_OPTS=""
## Type: string
## Default: "127.0.0.1:3128" if not set in cntlm.conf
#
# -l [:]
# Main listening port for the NTLM proxy.
#
CNTLM_LISTEN=""