Update mans
Some checks are pending
C/C++ CI Linux / ${{ matrix.target }} (ubuntu-24.04-arm) (push) Waiting to run
C/C++ CI Linux / ${{ matrix.target }} (ubuntu-latest) (push) Waiting to run
C/C++ CI MacOS / ${{ matrix.target }} (macos-15) (push) Waiting to run
C/C++ CI Windows / ${{ matrix.target }} (windows-2022) (push) Waiting to run
C/C++ CI cmake / ${{ matrix.target }} (macos-15) (push) Waiting to run
C/C++ CI cmake / ${{ matrix.target }} (ubuntu-24.04-arm) (push) Waiting to run
C/C++ CI cmake / ${{ matrix.target }} (ubuntu-latest) (push) Waiting to run
C/C++ CI cmake / ${{ matrix.target }} (windows-2022) (push) Waiting to run

This commit is contained in:
Vladimir Dubrovin 2026-04-27 21:11:25 +03:00
parent 319a74de06
commit 6c3c5f31a2
8 changed files with 527 additions and 529 deletions

View File

@ -84,10 +84,10 @@ smtpp</b> [options] <b><br>
ftppr</b> [options] <b><br>
admin</b> [options] <b><br>
dnspr</b> [options] <b><br>
tcppm</b> [options] &lt;SRCPORT&gt; &lt;DSTADDR&gt;
&lt;DSTPORT&gt; <b><br>
udppm</b> [options] &lt;SRCPORT&gt; &lt;DSTADDR&gt;
&lt;DSTPORT&gt; <br>
tcppm</b> [options] <i>&lt;SRCPORT&gt; &lt;DSTADDR&gt;
&lt;DSTPORT&gt;</i> <b><br>
udppm</b> [options] <i>&lt;SRCPORT&gt; &lt;DSTADDR&gt;
&lt;DSTPORT&gt;</i> <br>
Descriptions: <b><br>
proxy</b> HTTP/HTTPS proxy (default port 3128) <b><br>
socks</b> SOCKS 4/4.5/5 proxy (default port 1080) <b><br>
@ -111,15 +111,14 @@ specified for syntax compatibility. <b><br>
udppm</b> UDP portmapper</p>
<p style="margin-left:6%; margin-top: 1em">Options: <b><br>
-pNUMBER</b> change default server port to NUMBER <b><br>
-n</b> disable NTLM authentication (required if passwords
are stored in Unix crypt format). <b><br>
-n1</b> enable NTLMv1 authentication. <b><br>
-g(GRACE_TRAFF,GRACE_NUM,GRACE_DELAY)</b> delay GRACE_DELAY
milliseconds before polling if average polling size is below
GRACE_TRAFF bytes and GRACE_NUM read operations in a single
direction are detected within 1 second. Useful to minimize
polling <b>-s</b> <br>
-p</b><i>NUMBER</i> change default server port to NUMBER
<b><br>
-g(</b><i>GRACE_TRAFF</i><b>,</b><i>GRACE_NUM</i><b>,</b><i>GRACE_DELAY</i>)
delay GRACE_DELAY milliseconds before polling if average
polling size is below GRACE_TRAFF bytes and GRACE_NUM read
operations in a single direction are detected within 1
second. Useful to minimize polling <b>-s</b> <br>
(for admin) secure, allow only secure operations, currently
only traffic counters view without ability to reset. <br>
(for dnspr) simple, do not use resolver and 3proxy cache,
@ -142,35 +141,37 @@ packed in IPv6 in IPV6_V6ONLY compatible way. <b><br>
resolvable <b><br>
-64</b> Resolve IPv4 addresses if IPv6 address is not
resolvable <b><br>
-RHOST:port</b> listen on given local HOST:port for incoming
connections instead of making remote outgoing connection.
Can be used with another 3proxy service running -r option
for connect back functionality. Most commonly used with
tcppm. HOST can be given as IP or hostname, useful in case
of dynamic DNS. <b><br>
-rHOST:port</b> connect to given remote HOST:port instead of
listening local connection on -p or default port. Can be
used with another 3proxy service running -R option for
connect back functionality. Most commonly used with proxy or
socks. HOST can be given as IP or hostname, useful in case
of dynamic DNS. <b><br>
-ocOPTIONS, -osOPTIONS, -olOPTIONS, -orOPTIONS,
-oROPTIONS</b> options for proxy-to-client (oc),
proxy-to-server (os), proxy listening (ol), connect back
client (or), connect back listening (oR) sockets. Options
like TCP_CORK, TCP_NODELAY, TCP_DEFER_ACCEPT, TCP_QUICKACK,
TCP_TIMESTAMPS, USE_TCP_FASTOPEN, SO_REUSEADDR,
SO_REUSEPORT, SO_PORT_SCALABILITY, SO_REUSE_UNICASTPORT,
SO_KEEPALIVE, SO_DONTROUTE may be supported depending on OS.
<b><br>
-DiINTERFACE, -DeINTERFACE</b> bind internal interface /
external interface to given INTERFACE (e.g. eth0) if
SO_BINDTODEVICE is supported by the system. You may need to
run as root or have CAP_NET_RAW capability in order to bind
to an interface, depending on the system, so this option may
-R</b><i>HOST</i><b>:</b><i>port</i> listen on given local
HOST:port for incoming connections instead of making remote
outgoing connection. Can be used with another 3proxy service
running -r option for connect back functionality. Most
commonly used with tcppm. HOST can be given as IP or
hostname, useful in case of dynamic DNS. <b><br>
-r</b><i>HOST</i><b>:</b><i>port</i> connect to given remote
HOST:port instead of listening local connection on -p or
default port. Can be used with another 3proxy service
running -R option for connect back functionality. Most
commonly used with proxy or socks. HOST can be given as IP
or hostname, useful in case of dynamic DNS. <b><br>
-oc</b><i>OPTIONS</i><b>, -os</b><i>OPTIONS</i><b>,
-ol</b><i>OPTIONS</i><b>, -or</b><i>OPTIONS</i><b>,
-oR</b><i>OPTIONS</i> options for proxy-to-client
(<b>-oc</b>), proxy-to-server (<b>-os</b>), proxy listening
(<b>-ol</b>), connect back client (<b>-or</b>), connect back
listening (<b>-oR</b>) sockets. Options like TCP_CORK,
TCP_NODELAY, TCP_DEFER_ACCEPT, TCP_QUICKACK, TCP_TIMESTAMPS,
USE_TCP_FASTOPEN, SO_REUSEADDR, SO_REUSEPORT,
SO_PORT_SCALABILITY, SO_REUSE_UNICASTPORT, SO_KEEPALIVE,
SO_DONTROUTE may be supported depending on OS. <b><br>
-Di</b><i>INTERFACE</i><b>, -De</b><i>INTERFACE</i> bind
internal (<b>-Di</b>) / external (<b>-De</b>) interface to
given INTERFACE (e.g. eth0) if <b>SO_BINDTODEVICE</b> is
supported by the system. You may need to run as root or have
<b>CAP_NET_RAW</b> capability in order to bind to an
interface, depending on the system, so this option may
require root privileges and can be incompatible with some
configuration commands like chroot and setuid (and daemon if
setcap is used). <b><br>
configuration commands like <b>chroot</b> and <b>setuid</b>
(and <b>daemon</b> if setcap is used). <b><br>
-e</b> External address. IP address of the interface the
proxy should initiate connections from. External IP must be
specified if you need incoming connections. By default the
@ -207,10 +208,10 @@ proxy access must be authenticated, you can specify username
as proxy_username:proxy_password:POP3_username@pop3server
<br>
DNS proxy resolves any types of records but only hostnames
are cached. It requires nserver/nscache to be configured. If
nserver is configured as TCP, redirections are applied on
connection, so parent proxy may be used to resolve names to
IP. <br>
are cached. It requires <b>nserver</b>/<b>nscache</b> to be
configured. If <b>nserver</b> is configured as TCP,
redirections are applied on connection, so parent proxy may
be used to resolve names to IP. <br>
FTP proxy can be used as FTP server in any FTP client or
configured as FTP proxy on a client with FTP proxy support.
Username format is one of <br>
@ -224,11 +225,11 @@ authentication use proxyuser:proxypassword:FTPuser as FTP
username, otherwise do not change original FTP user name</p>
<p style="margin-left:6%; margin-top: 1em"><b>include</b>
&lt;path&gt; <br>
<i>&lt;path&gt;</i> <br>
Include config file</p>
<p style="margin-left:6%; margin-top: 1em"><b>config</b>
&lt;path&gt; <br>
<i>&lt;path&gt;</i> <br>
Path to configuration file to use on 3proxy restart or to
save configuration.</p>
@ -244,20 +245,20 @@ using it.</p>
End of configuration</p>
<p style="margin-left:6%; margin-top: 1em"><b>log</b>
[[@|&amp;]logfile] [&lt;LOGTYPE&gt;] <br>
[[@|&amp;]<i>logfile</i>] [<i>&lt;LOGTYPE&gt;</i>] <br>
sets logfile for all gateways <br>
@ (for Unix) use syslog, filename is used as ident name <br>
&amp; use ODBC, filename consists of comma-delimited
datasource,username,password (username and password are
optional) <br>
radius - use RADIUS for logging <br>
LOGTYPE is one of: <br>
c Minutely <br>
H Hourly <br>
D Daily <br>
W Weekly (starting from Sunday) <br>
M Monthly <br>
Y Annually <br>
LOGTYPE is one of: <b><br>
c</b> Minutely <b><br>
H</b> Hourly <b><br>
D</b> Daily <b><br>
W</b> Weekly (starting from Sunday) <b><br>
M</b> Monthly <b><br>
Y</b> Annually <br>
if logfile is not specified logging goes to stdout. You can
specify individual logging options for gateway by using -l
option in gateway configuration. <br>
@ -270,12 +271,12 @@ Grinwitch time zone for all time-based format
specificators.</p>
<p style="margin-left:6%; margin-top: 1em"><b>rotate</b>
&lt;n&gt; <br>
<i>&lt;n&gt;</i> <br>
how many archived log files to keep</p>
<p style="margin-left:6%; margin-top: 1em"><b>logformat</b>
&lt;format&gt; <br>
<i>&lt;format&gt;</i> <br>
Format for log record. First symbol in format must be L
(local time) or G (absolute Grinwitch time). It can be
preceeded with -XXX+Y where XXX is list of characters to be
@ -332,7 +333,8 @@ l_service, l_in, l_out, l_descr) values (&acute;%d-%m-%Y
&acute;%T&acute;)&quot;</p>
<p style="margin-left:6%; margin-top: 1em"><b>logdump</b>
&lt;in_traffic_limit&gt; &lt;out_traffic_limit&gt; <br>
<i>&lt;in_traffic_limit&gt; &lt;out_traffic_limit&gt;</i>
<br>
Immediately creates additional log records if given amount
of incoming/outgoing traffic is achieved for connection,
without waiting for connection to finish. It may be useful
@ -341,7 +343,7 @@ server shutdown.</p>
<p style="margin-left:6%; margin-top: 1em"><b>delimchar</b>
&lt;char&gt; <br>
<i>&lt;char&gt;</i> <br>
Sets the delimiter character used to separate username from
hostname in proxy authentication strings (e.g. for FTP, POP3
proxies). Default is &acute;@&acute;. For example, to use
@ -349,48 +351,50 @@ proxies). Default is &acute;@&acute;. For example, to use
to contain the &acute;@&acute; character.</p>
<p style="margin-left:6%; margin-top: 1em"><b>archiver</b>
&lt;ext&gt; &lt;commandline&gt; <br>
<i>&lt;ext&gt; &lt;commandline&gt;</i> <br>
Archiver to use for log files. &lt;ext&gt; is file extension
produced by archiver. Filename will be last argument to
archiver, optionally you can use %A as produced archive name
and %F as filename.</p>
<p style="margin-left:6%; margin-top: 1em"><b>timeouts</b>
&lt;BYTE_SHORT&gt; &lt;BYTE_LONG&gt; &lt;STRING_SHORT&gt;
<i>&lt;BYTE_SHORT&gt; &lt;BYTE_LONG&gt; &lt;STRING_SHORT&gt;
&lt;STRING_LONG&gt; &lt;CONNECTION_SHORT&gt;
&lt;CONNECTION_LONG&gt; &lt;DNS&gt; &lt;CHAIN&gt;
&lt;CONNECT&gt; &lt;CONNECTBACK&gt; <br>
&lt;CONNECT&gt; &lt;CONNECTBACK&gt;</i> <br>
Sets timeout values, defaults 1, 5, 30, 60, 180, 1800, 15,
60, 15, 5. <br>
BYTE_SHORT short timeout for single byte, is usually used
for receiving single byte from stream. <br>
BYTE_LONG long timeout for single byte, is usually used for
receiving first byte in frame (for example first byte in
socks request). <br>
STRING_SHORT short timeout, for character string within
stream (for example to wait between 2 HTTP headers) <br>
STRING_LONG long timeout, for first string in stream (for
example to wait for HTTP request). <br>
CONNECTION_SHORT inactivity timeout for short connections
(HTTP, POP3, etc). <br>
CONNECTION_LONG inactivity timeout for long connection
(SOCKS, portmappers, etc). <br>
DNS timeout for DNS request before requesting next server
60, 15, 5. <b><br>
BYTE_SHORT</b> short timeout for single byte, is usually
used for receiving single byte from stream. <b><br>
BYTE_LONG</b> long timeout for single byte, is usually used
for receiving first byte in frame (for example first byte in
socks request). <b><br>
STRING_SHORT</b> short timeout, for character string within
stream (for example to wait between 2 HTTP headers) <b><br>
STRING_LONG</b> long timeout, for first string in stream
(for example to wait for HTTP request). <b><br>
CONNECTION_SHORT</b> inactivity timeout for short
connections (HTTP, POP3, etc). <b><br>
CONNECTION_LONG</b> inactivity timeout for long connection
(SOCKS, portmappers, etc). <b><br>
DNS</b> timeout for DNS request before requesting next
server <b><br>
CHAIN</b> timeout for reading data from chained connection
<br>
CHAIN timeout for reading data from chained connection <br>
default timeouts 1 5 30 60 180 1800 15 60 15 5</p>
<p style="margin-left:6%; margin-top: 1em"><b>maxseg</b>
&lt;value&gt; <br>
<i>&lt;value&gt;</i> <br>
Sets TCP maximum segment size (MSS) for outgoing
connections. This can be used to work around path MTU
discovery issues or to optimize traffic for specific network
conditions.</p>
<p style="margin-left:6%; margin-top: 1em"><b>radius</b>
&lt;NAS_SECRET&gt;
&lt;radius_server_1[:port][/local_address_1]&gt;
&lt;radius_server_2[:port][/local_address_2]&gt; <br>
<i>&lt;NAS_SECRET&gt;
&lt;radius_server_1</i>[:<i>port</i>][/<i>local_address_1</i>]
<i>&lt;radius_server_2</i>[:<i>port</i>][/<i>local_address_2</i>]
<br>
Configures RADIUS servers to be used for logging and
authentication (log and auth types must be set to radius).
port and local address to use with given server may be
@ -409,12 +413,12 @@ CONNECT), Login-TCP-Port: (requested port), Login-IPv6-Host
/ Login-IP-Host: (requested IP). <br>
Supported reply attributes for authentication:
Framed-IP-Address / Framed-IPv6-Address (IP to assign to
user), Reply-Message. Use authcache to speedup
user), Reply-Message. Use <b>authcache</b> to speedup
authentication. RADIUS feature is currently
experimental.</p>
<p style="margin-left:6%; margin-top: 1em"><b>nserver</b>
&lt;ipaddr&gt;[:port][/tcp] <br>
<i>&lt;ipaddr&gt;</i>[:<i>port</i>][/<i>tcp</i>] <br>
Nameserver to use for name resolutions. If none specified
system routines for name resolution is used. Optional port
number may be specified. If optional /tcp is added to IP
@ -422,33 +426,36 @@ address, name resolution is performed over TCP.</p>
<p style="margin-left:6%; margin-top: 1em"><b>authnserver</b>
&lt;ipaddr&gt;[:port][/tcp] <br>
<i>&lt;ipaddr&gt;</i>[:<i>port</i>][/<i>tcp</i>] <br>
Nameserver to use for DNS-based authentication (e.g. dnsname
auth type). If not specified, nserver is used. The syntax is
the same as for nserver.</p>
<p style="margin-left:6%; margin-top: 1em"><b>nscache</b>
&lt;cachesize&gt; <b>nscache6</b> &lt;cachesize&gt; <br>
Cache &lt;cachesize&gt; records for name resolution (nscache
for IPv4, nscache6 for IPv6). The cache size should usually
be large enough (for example, 65536).</p>
<i>&lt;cachesize&gt;</i> <b>nscache6</b>
<i>&lt;cachesize&gt;</i> <br>
Cache <i>&lt;cachesize&gt;</i> records for name resolution
(<b>nscache</b> for IPv4, <b>nscache6</b> for IPv6). The
cache size should usually be large enough (for example,
65536).</p>
<p style="margin-left:6%; margin-top: 1em"><b>nsrecord</b>
&lt;hostname&gt; &lt;hostaddr&gt; <br>
Adds static record to nscache. nscache must be enabled. If
0.0.0.0 is used as a hostaddr host will never resolve, it
can be used to blacklist something or together with
<b>dialer</b> command to set up UDL for dialing.</p>
<i>&lt;hostname&gt; &lt;hostaddr&gt;</i> <br>
Adds static record to nscache. <b>nscache</b> must be
enabled. If 0.0.0.0 is used as a hostaddr host will never
resolve, it can be used to blacklist something or together
with <b>dialer</b> command to set up UDL for dialing.</p>
<p style="margin-left:6%; margin-top: 1em"><b>fakeresolve</b>
<br>
All names are resolved to the 127.0.0.2 address. Useful if
all requests are redirected to a parent proxy with http,
socks4+, connect+ or socks5+.</p>
all requests are redirected to a parent proxy with
<b>http</b>, <b>socks4+</b>, <b>connect+</b> or
<b>socks5+</b>.</p>
<p style="margin-left:6%; margin-top: 1em"><b>dialer</b>
&lt;progname&gt; <br>
<i>&lt;progname&gt;</i> <br>
Execute progname if external name can&acute;t be resolved.
Hint: if you use nscache, dialer may not work, because names
will be resolved through cache. In this case you can use
@ -456,7 +463,7 @@ something like http://dial.right.now/ from browser to set up
connection.</p>
<p style="margin-left:6%; margin-top: 1em"><b>internal</b>
&lt;ipaddr&gt; <br>
<i>&lt;ipaddr&gt;</i> <br>
sets ip address of internal interface. This IP address will
be used to bind gateways. Alternatively you can use -i
option for individual gateways. Since 0.8 version, IPv6
@ -470,27 +477,29 @@ using Unix sockets, the socket file is automatically created
and removed on service start/stop.</p>
<p style="margin-left:6%; margin-top: 1em"><b>external</b>
&lt;ipaddr&gt; <br>
<i>&lt;ipaddr&gt;</i> <br>
sets ip address of external interface. This IP address will
be source address for all connections made by proxy.
Alternatively you can use -e option to specify individual
address for gateway. Since 0.8 version External or -e can be
given twice: once with IPv4 and once with IPv6 address.</p>
address for gateway. Since 0.8 version External or <b>-e</b>
can be given twice: once with IPv4 and once with IPv6
address.</p>
<p style="margin-left:6%; margin-top: 1em"><b>maxconn</b>
&lt;number&gt; <br>
<i>&lt;number&gt;</i> <br>
sets the maximum number of simultaneous connections to each
service started after this command at the network level.
Default is 100. <br>
To limit clients, use connlim instead. maxconn will silently
ignore new connections, while connlim will report back to
the client that the connection limit has been reached.</p>
To limit clients, use <b>connlim</b> instead. <b>maxconn</b>
will silently ignore new connections, while <b>connlim</b>
will report back to the client that the connection limit has
been reached.</p>
<p style="margin-left:6%; margin-top: 1em"><b>backlog</b>
<br>
sets the listening socket backlog of new connections.
Default is 1 + maxconn/8. Maximum value is capped by kernel
tunable somaxconn.</p>
Default is 1 + <b>maxconn</b>/8. Maximum value is capped by
kernel tunable somaxconn.</p>
<p style="margin-left:6%; margin-top: 1em"><b>service</b>
<br>
@ -504,35 +513,35 @@ reinstall the service.</p>
<br>
Should be specified to close the console. Do not use
&acute;daemon&acute; with &acute;service&acute;. At least
under FreeBSD, &acute;daemon&acute; should precede any proxy
under FreeBSD, <b>daemon</b> should precede any proxy
service and log commands to avoid socket problems. Always
place it in the beginning of the configuration file.</p>
<p style="margin-left:6%; margin-top: 1em"><b>auth</b>
&lt;authtype&gt; [...] <br>
Type of user authorization. Currently supported: <br>
none - no authentication or authorization required. <br>
<i>&lt;authtype&gt;</i> [...] <br>
Type of user authorization. Currently supported: <b><br>
none</b> - no authentication or authorization required. <br>
Note: if auth is none, any IP-based limitation, redirection,
etc. will not work. This is the default authentication type
<br>
iponly - authentication by access control list with username
ignored. <br>
Appropriate for most cases <br>
useronly - authentication by username without checking for
any password with authorization by ACLs. Useful for e.g.
<b><br>
iponly</b> - authentication by access control list with
username ignored. <br>
Appropriate for most cases <b><br>
useronly</b> - authentication by username without checking
for any password with authorization by ACLs. Useful for e.g.
SOCKSv4 proxy and icqpr (icqpr set UIN / AOL screen name as
a username) <br>
dnsname - authentication by DNS hostname with authorization
by ACLs. The DNS hostname is resolved via a PTR (reverse)
record and validated (the resolved name must resolve to the
same IP address). It&acute;s recommended to use authcache by
IP for this authentication. NB: there is no password check;
the name may be spoofed. <br>
strong - username/password authentication required. It will
work with SOCKSv5, FTP, POP3 and HTTP proxy. <br>
cache - cached authentication, may be used with
&acute;authcache&acute;. <br>
radius - authentication with RADIUS. <br>
a username) <b><br>
dnsname</b> - authentication by DNS hostname with
authorization by ACLs. The DNS hostname is resolved via a
PTR (reverse) record and validated (the resolved name must
resolve to the same IP address). It&acute;s recommended to
use authcache by IP for this authentication. NB: there is no
password check; the name may be spoofed. <b><br>
strong</b> - username/password authentication required. It
will work with SOCKSv5, FTP, POP3 and HTTP proxy. <b><br>
cache</b> - cached authentication, may be used with
&acute;authcache&acute;. <b><br>
radius</b> - authentication with RADIUS. <br>
Plugins may add additional authentication types.</p>
<p style="margin-left:6%; margin-top: 1em">It&acute;s
@ -550,38 +559,39 @@ shared ones.</p>
<p style="margin-left:6%; margin-top: 1em"><b>authcache</b>
&lt;cachtype&gt; &lt;cachtime&gt; <br>
<i>&lt;cachtype&gt; &lt;cachtime&gt; &lt;cachesize&gt;</i>
<br>
Cache authentication information for a given amount of time
(cachetime) in seconds. Cachetype is one of: <br>
ip - after successful authentication all connections during
caching time from same IP are assigned to the same user,
username is not requested. <br>
ip,user username is requested and all connections from the
same IP are assigned to the same user without actual
authentication. <br>
user - same as above, but IP is not checked. <br>
user,password - both username and password are checked
against cached ones. <br>
limit - limit user to use only one ip, &acute;ip&acute; and
&acute;user&acute; are required <br>
acl - only use cached auth if user access service with same
ACL <br>
ext - cache external IP <br>
Use auth type &acute;cache&acute; for cached
authentication</p>
(cachetime) in seconds. cachesize limits number of cache
entries. Cachetype is one of: <b><br>
ip</b> - after successful authentication all connections
during caching time from same IP are assigned to the same
user, username is not requested. <b><br>
ip,user</b> username is requested and all connections from
the same IP are assigned to the same user without actual
authentication. <b><br>
user</b> - same as above, but IP is not checked. <b><br>
user,password</b> - both username and password are checked
against cached ones. <b><br>
limit</b> - limit user to use only one ip, &acute;ip&acute;
and &acute;user&acute; are required <b><br>
ack</b> - only use cached auth if user access service with
same ACL <b><br>
ext</b> - cache external IP <br>
Use auth type <b>cache</b> for cached authentication</p>
<p style="margin-left:6%; margin-top: 1em"><b>allow</b>
&lt;userlist&gt; &lt;sourcelist&gt; &lt;targetlist&gt;
<i>&lt;userlist&gt; &lt;sourcelist&gt; &lt;targetlist&gt;
&lt;targetportlist&gt; &lt;operationlist&gt;
&lt;weekdayslist&gt; &lt;timeperiodslist&gt; <b><br>
deny</b> &lt;userlist&gt; &lt;sourcelist&gt;
&lt;weekdayslist&gt; &lt;timeperiodslist&gt;</i> <b><br>
deny</b> <i>&lt;userlist&gt; &lt;sourcelist&gt;
&lt;targetlist&gt; &lt;targetportlist&gt;
&lt;operationlist&gt; &lt;weekdayslist&gt;
&lt;timeperiodslist&gt; <b><br>
redirect</b> &lt;ip&gt; &lt;port&gt; &lt;userlist&gt;
&lt;timeperiodslist&gt;</i> <b><br>
redirect</b> <i>&lt;ip&gt; &lt;port&gt; &lt;userlist&gt;
&lt;sourcelist&gt; &lt;targetlist&gt; &lt;targetportlist&gt;
&lt;operationlist&gt; &lt;weekdayslist&gt;
&lt;timeperiodslist&gt; <br>
&lt;timeperiodslist&gt;</i> <br>
Access control entries. All lists are comma-separated, no
spaces are allowed. Usernames are case sensitive (if used
with authtype nbname username must be in uppercase). Source
@ -607,27 +617,28 @@ should either bind proxy to appropriate interface only or to
use ip filters.</p>
<p style="margin-left:6%; margin-top: 1em">Operation is one
of: <br>
CONNECT establish outgoing TCP connection <br>
BIND bind TCP port for listening <br>
UDPASSOC make UDP association <br>
ICMPASSOC make ICMP association (for future use) <br>
HTTP_GET HTTP GET request <br>
HTTP_PUT HTTP PUT request <br>
HTTP_POST HTTP POST request <br>
HTTP_HEAD HTTP HEAD request <br>
HTTP_CONNECT HTTP CONNECT request <br>
HTTP_OTHER over HTTP request <br>
HTTP matches any HTTP request except HTTP_CONNECT <br>
HTTPS same as HTTP_CONNECT <br>
FTP_GET FTP get request <br>
FTP_PUT FTP put request <br>
FTP_LIST FTP list request <br>
FTP_DATA FTP data connection. Note: FTP_DATA requires access
to dynamic non-privileged (1024-65535) ports on the remote
side. <br>
FTP matches any FTP/FTP Data request <br>
ADMIN access to administration interface</p>
of: <b><br>
CONNECT</b> establish outgoing TCP connection <b><br>
BIND</b> bind TCP port for listening <b><br>
UDPASSOC</b> make UDP association <b><br>
ICMPASSOC</b> make ICMP association (for future use) <b><br>
HTTP_GET</b> HTTP GET request <b><br>
HTTP_PUT</b> HTTP PUT request <b><br>
HTTP_POST</b> HTTP POST request <b><br>
HTTP_HEAD</b> HTTP HEAD request <b><br>
HTTP_CONNECT</b> HTTP CONNECT request <b><br>
HTTP_OTHER</b> over HTTP request <b><br>
HTTP</b> matches any HTTP request except HTTP_CONNECT
<b><br>
HTTPS</b> same as HTTP_CONNECT <b><br>
FTP_GET</b> FTP get request <b><br>
FTP_PUT</b> FTP put request <b><br>
FTP_LIST</b> FTP list request <b><br>
FTP_DATA</b> FTP data connection. Note: FTP_DATA requires
access to dynamic non-privileged (1024-65535) ports on the
remote side. <b><br>
FTP</b> matches any FTP/FTP Data request <b><br>
ADMIN</b> access to administration interface</p>
<p style="margin-left:6%; margin-top: 1em">Weekdays are
week day numbers or periods, 0 or 7 means Sunday, 1 is
@ -638,8 +649,8 @@ HH:MM:SS-HH:MM:SS format. For example,
hours.</p>
<p style="margin-left:6%; margin-top: 1em"><b>parent</b>
&lt;weight&gt; &lt;type&gt; &lt;ip&gt; &lt;port&gt;
&lt;username&gt; &lt;password&gt; <br>
<i>&lt;weight&gt; &lt;type&gt; &lt;ip&gt; &lt;port&gt;
&lt;username&gt; &lt;password&gt;</i> <br>
this command must follow &quot;allow&quot; rule. It extends
last allow rule to build proxy chain. Proxies may be
grouped. Proxy inside the group is selected randomly. If few
@ -668,45 +679,51 @@ pipelined (keep-alive) requests in the same connection use
the same chain.</p>
<p style="margin-left:6%; margin-top: 1em">type is one of:
<br>
extip does not actually redirect the request; it sets the
external address for this request to &lt;ip&gt;. It can be
chained with another parent type. It&rsquo;s useful to set
the external IP based on ACL or make it random. <br>
tcp simply redirect connection. TCP is always last in chain.
This type of proxy is a simple TCP redirection, it does not
support parent authentication. <br>
http redirect to HTTP proxy. HTTP is always the last chain.
It should only be used with http (proxy) service, if used
with different service, it works as tcp redirection. <br>
pop3 redirect to POP3 proxy (only local redirection is
supported, can only be used as a first hop in chaining) <br>
ftp redirect to FTP proxy (only local redirection is
supported, can only be used as a first hop in chaining) <br>
connect parent is HTTP CONNECT method proxy <br>
connect+ parent is HTTP CONNECT proxy with name resolution
(hostname is used instead of IP if available) <br>
socks4 parent is SOCKSv4 proxy <br>
socks4+ parent is SOCKSv4 proxy with name resolution
(SOCKSv4a) <br>
socks5 parent is SOCKSv5 proxy <br>
socks5+ parent is SOCKSv5 proxy with name resolution <br>
socks4b parent is SOCKS4b (broken SOCKSv4 implementation
<b><br>
extip</b> does not actually redirect the request; it sets
the external address for this request to <i>&lt;ip&gt;</i>.
It can be chained with another parent type. It&rsquo;s
useful to set the external IP based on ACL or make it
random. <b><br>
tcp</b> simply redirect connection. TCP is always last in
chain. This type of proxy is a simple TCP redirection, it
does not support parent authentication. <b><br>
http</b> redirect to HTTP proxy. HTTP is always the last
chain. It should only be used with http (proxy) service, if
used with different service, it works as tcp redirection.
<b><br>
pop3</b> redirect to POP3 proxy (only local redirection is
supported, can only be used as a first hop in chaining)
<b><br>
ftp</b> redirect to FTP proxy (only local redirection is
supported, can only be used as a first hop in chaining)
<b><br>
connect</b> parent is HTTP CONNECT method proxy <b><br>
connect+</b> parent is HTTP CONNECT proxy with name
resolution (hostname is used instead of IP if available)
<b><br>
socks4</b> parent is SOCKSv4 proxy <b><br>
socks4+</b> parent is SOCKSv4 proxy with name resolution
(SOCKSv4a) <b><br>
socks5</b> parent is SOCKSv5 proxy <b><br>
socks5+</b> parent is SOCKSv5 proxy with name resolution
<b><br>
socks4b</b> parent is SOCKS4b (broken SOCKSv4 implementation
with shortened server reply; I never saw this kind of
server, but they say there are some). Normally you should
not use this option. Do not confuse this option with
SOCKSv4a (socks4+). <br>
socks5b parent is SOCKS5b (broken SOCKSv5 implementation
SOCKSv4a (<b>socks4+</b>). <b><br>
socks5b</b> parent is SOCKS5b (broken SOCKSv5 implementation
with shortened server reply. I think you will never find it
useful). Never use this option unless you know exactly you
need it. <br>
admin redirect request to local &acute;admin&acute; service
(with -s parameter). <br>
ha send HAProxy PROXY protocol v1 header to parent proxy.
Must be the last in the proxy chain. Useful for passing
client IP information to the parent proxy. Example: parent
1000 ha <br>
Use &quot;+&quot; proxy only with &quot;fakeresolve&quot;
need it. <b><br>
admin</b> redirect request to local &acute;admin&acute;
service (with -s parameter). <b><br>
ha</b> send HAProxy PROXY protocol v1 header to parent
proxy. Must be the last in the proxy chain. Useful for
passing client IP information to the parent proxy. Example:
parent 1000 ha <br>
Use &quot;+&quot; proxy only with <b>fakeresolve</b>
option</p>
<p style="margin-left:6%; margin-top: 1em">IP and port are
@ -748,26 +765,26 @@ HTTP proxy, local HTTP proxy parses requests and allows only
GET and POST requests. <br>
parent 1000 http 1.2.3.4 0 <br>
Changes the external address for a given connection to
1.2.3.4 (equivalent to -e1.2.3.4) <br>
1.2.3.4 (equivalent to <b>-e1.2.3.4</b>) <br>
Optional username and password are used to authenticate on
parent proxy. Username of &acute;*&acute; means username
must be supplied by user.</p>
<p style="margin-left:6%; margin-top: 1em"><b>parentretries</b>
&lt;number&gt; <br>
<i>&lt;number&gt;</i> <br>
Number of retries to connect to parent proxy. Default is
1.</p>
<p style="margin-left:6%; margin-top: 1em"><b>nolog</b>
&lt;n&gt; <br>
<i>&lt;n&gt;</i> <br>
extends last allow or deny command to prevent logging, e.g.
<br>
allow * * 192.168.1.1 <br>
nolog</p>
<p style="margin-left:6%; margin-top: 1em"><b>weight</b>
&lt;n&gt; <br>
<i>&lt;n&gt;</i> <br>
extends last allow or deny command to set weight for this
request <br>
allow * * 192.168.1.1 <br>
@ -785,30 +802,31 @@ connections.</p>
<p style="margin-left:6%; margin-top: 1em"><b>bandlimin</b>
&lt;rate&gt; &lt;userlist&gt; &lt;sourcelist&gt;
<i>&lt;rate&gt; &lt;userlist&gt; &lt;sourcelist&gt;
&lt;targetlist&gt; &lt;targetportlist&gt;
&lt;operationlist&gt; &lt;weekdayslist&gt;
&lt;timeperiodslist&gt; <b><br>
nobandlimin</b> &lt;userlist&gt; &lt;sourcelist&gt;
&lt;timeperiodslist&gt;</i> <b><br>
nobandlimin</b> <i>&lt;userlist&gt; &lt;sourcelist&gt;
&lt;targetlist&gt; &lt;targetportlist&gt;
&lt;operationlist&gt; &lt;weekdayslist&gt;
&lt;timeperiodslist&gt; <b><br>
bandlimout</b> &lt;rate&gt; &lt;userlist&gt;
&lt;timeperiodslist&gt;</i> <b><br>
bandlimout</b> <i>&lt;rate&gt; &lt;userlist&gt;
&lt;sourcelist&gt; &lt;targetlist&gt; &lt;targetportlist&gt;
&lt;operationlist&gt; &lt;weekdayslist&gt;
&lt;timeperiodslist&gt; <b><br>
nobandlimout</b> &lt;userlist&gt; &lt;sourcelist&gt;
&lt;timeperiodslist&gt;</i> <b><br>
nobandlimout</b> <i>&lt;userlist&gt; &lt;sourcelist&gt;
&lt;targetlist&gt; &lt;targetportlist&gt;
&lt;operationlist&gt; &lt;weekdayslist&gt;
&lt;timeperiodslist&gt; <br>
bandlim sets a bandwidth limitation filter to &lt;rate&gt;
bps (bits per second). If you want to specify bytes per
second, multiply your value by 8. bandlim rules act in the
same manner as allow/deny rules, except for one thing:
bandwidth limiting is applied to all services, not to some
specific service. bandlimin and nobandlimin apply to
incoming traffic <br>
bandlimout and nobandlimout apply to outgoing traffic <br>
&lt;timeperiodslist&gt;</i> <br>
bandlim sets a bandwidth limitation filter to
<i>&lt;rate&gt;</i> bps (bits per second). If you want to
specify bytes per second, multiply your value by 8. bandlim
rules act in the same manner as allow/deny rules, except for
one thing: bandwidth limiting is applied to all services,
not to some specific service. <b>bandlimin</b> and
<b>nobandlimin</b> apply to incoming traffic <b><br>
bandlimout</b> and <b>nobandlimout</b> apply to outgoing
traffic <br>
If you want to ratelimit your clients with IPs
192.168.10.16/30 (4 addresses) to 57600 bps, you have to
specify 4 rules like <br>
@ -826,53 +844,54 @@ nobandlimin * * * 110 <br>
before the rest of bandlim rules.</p>
<p style="margin-left:6%; margin-top: 1em"><b>connlim</b>
&lt;rate&gt; &lt;period&gt; &lt;userlist&gt;
<i>&lt;rate&gt; &lt;period&gt; &lt;userlist&gt;
&lt;sourcelist&gt; &lt;targetlist&gt; &lt;targetportlist&gt;
&lt;operationlist&gt; &lt;weekdayslist&gt;
&lt;timeperiodslist&gt; <b><br>
noconnlim</b> &lt;userlist&gt; &lt;sourcelist&gt;
&lt;timeperiodslist&gt;</i> <b><br>
noconnlim</b> <i>&lt;userlist&gt; &lt;sourcelist&gt;
&lt;targetlist&gt; &lt;targetportlist&gt;
&lt;operationlist&gt; &lt;weekdayslist&gt;
&lt;timeperiodslist&gt; <br>
&lt;timeperiodslist&gt;</i> <br>
connlim sets connections rate limit per time period for
traffic pattern controlled by ACL. Period is in seconds. If
period is 0, connlim limits a number of parallel
period is 0, <b>connlim</b> limits a number of parallel
connections. <br>
connlim 100 60 * 127.0.0.1 <br>
allows 100 connections per minute for 127.0.0.1. <br>
connlim 20 0 * 127.0.0.1 <br>
allows 20 simultaneous connections for 127.0.0.1. <br>
Like with bandlimin, if an individual limit is required per
client, a separate rule must be added for every client. Like
with nobandlimin, noconnlim adds an exception.</p>
Like with <b>bandlimin</b>, if an individual limit is
required per client, a separate rule must be added for every
client. Like with nobandlimin, noconnlim adds an
exception.</p>
<p style="margin-left:6%; margin-top: 1em"><b>counter</b>
&lt;filename&gt; &lt;reporttype&gt; &lt;reportname&gt;
<b><br>
countin</b> &lt;number&gt; &lt;type&gt; &lt;limit&gt;
<i>&lt;filename&gt; &lt;reporttype&gt;
&lt;reportname&gt;</i> <b><br>
countin</b> <i>&lt;number&gt; &lt;type&gt; &lt;limit&gt;
&lt;userlist&gt; &lt;sourcelist&gt; &lt;targetlist&gt;
&lt;targetportlist&gt; &lt;operationlist&gt;
&lt;weekdayslist&gt; &lt;timeperiodslist&gt; <b><br>
nocountin</b> &lt;userlist&gt; &lt;sourcelist&gt;
&lt;weekdayslist&gt; &lt;timeperiodslist&gt;</i> <b><br>
nocountin</b> <i>&lt;userlist&gt; &lt;sourcelist&gt;
&lt;targetlist&gt; &lt;targetportlist&gt;
&lt;operationlist&gt; &lt;weekdayslist&gt;
&lt;timeperiodslist&gt; <b><br>
countout</b> &lt;number&gt; &lt;type&gt; &lt;limit&gt;
&lt;timeperiodslist&gt;</i> <b><br>
countout</b> <i>&lt;number&gt; &lt;type&gt; &lt;limit&gt;
&lt;userlist&gt; &lt;sourcelist&gt; &lt;targetlist&gt;
&lt;targetportlist&gt; &lt;operationlist&gt;
&lt;weekdayslist&gt; &lt;timeperiodslist&gt; <b><br>
nocountout</b> &lt;userlist&gt; &lt;sourcelist&gt;
&lt;weekdayslist&gt; &lt;timeperiodslist&gt;</i> <b><br>
nocountout</b> <i>&lt;userlist&gt; &lt;sourcelist&gt;
&lt;targetlist&gt; &lt;targetportlist&gt;
&lt;operationlist&gt; &lt;weekdayslist&gt;
&lt;timeperiodslist&gt; <b><br>
countall</b> &lt;number&gt; &lt;type&gt; &lt;limit&gt;
&lt;timeperiodslist&gt;</i> <b><br>
countall</b> <i>&lt;number&gt; &lt;type&gt; &lt;limit&gt;
&lt;userlist&gt; &lt;sourcelist&gt; &lt;targetlist&gt;
&lt;targetportlist&gt; &lt;operationlist&gt;
&lt;weekdayslist&gt; &lt;timeperiodslist&gt; <b><br>
nocountall</b> &lt;userlist&gt; &lt;sourcelist&gt;
&lt;weekdayslist&gt; &lt;timeperiodslist&gt;</i> <b><br>
nocountall</b> <i>&lt;userlist&gt; &lt;sourcelist&gt;
&lt;targetlist&gt; &lt;targetportlist&gt;
&lt;operationlist&gt; &lt;weekdayslist&gt;
&lt;timeperiodslist&gt;</p>
&lt;timeperiodslist&gt;</i></p>
<p style="margin-left:6%; margin-top: 1em">counter,
countin, nocountin, countout, nocountout, countall,
@ -885,48 +904,34 @@ not preserved in the counter file (that is, if the proxy is
restarted, all counters with 0 are flushed); otherwise, it
should be a unique sequential number which points to the
position of the counter within the file. Type specifies a
type of counter. Type is one of: <br>
H - counter is reset hourly <br>
D - counter is reset daily <br>
W - counter is reset weekly <br>
M - counter is reset monthly <br>
type of counter. Type is one of: <b><br>
H</b> - counter is reset hourly <b><br>
D</b> - counter is reset daily <b><br>
W</b> - counter is reset weekly <b><br>
M</b> - counter is reset monthly <br>
reporttype/reportname may be used to generate traffic
reports. Reporttype is one of D, W, M, H (hourly) and
reportname specifies the filename template for reports. The
report is a text file with counter values in the format:
<br>
&lt;COUNTERNUMBER&gt; &lt;TRAF&gt; <br>
<i><br>
&lt;COUNTERNUMBER&gt; &lt;TRAF&gt;</i> <br>
The rest of parameters is identical to
bandlim/nobandlim.</p>
<b>bandlim</b>/<b>nobandlim</b>.</p>
<p style="margin-left:6%; margin-top: 1em"><b>users</b>
username[:pwtype:password] ... <br>
<i>username</i>[:<i>pwtype</i>:<i>password</i>] ... <br>
pwtype is one of: <br>
none (empty) - use system authentication <br>
CL - password is cleartext <br>
CR - password is crypt-style password <br>
NT - password is NT password (in hex) <br>
LM - password is LM password (in hex) <br>
none (empty) - use system authentication <b><br>
CL</b> - password is cleartext <b><br>
CR</b> - password is crypt-style password <b><br>
NT</b> - password is NT password (in hex) <br>
example: <br>
users test1:CL:password1
&quot;test2:CR:$1$lFDGlder$pLRb4cU2D7GAT58YQvY49.&quot; <br>
users test3:NT:BD7DFBF29A93F93C63CB84790DA00E63</p>
<table width="100%" border="0" rules="none" frame="void"
cellspacing="0" cellpadding="0">
<tr valign="top" align="left">
<td width="6%"></td>
<p>Note: double quotes are required because the password
contains a $ sign.</p></td>
<td width="88%"></td>
<td width="6%">
</td></tr>
</table>
<p style="margin-left:6%; margin-top: 1em"><b>flush</b>
<br>
users test3:NT:BD7DFBF29A93F93C63CB84790DA00E63 <br>
Note: double quotes are required because the password
contains a $ sign. <b><br>
flush</b> <br>
empty the active access list. The access list must be
flushed every time you create a new access list for a new
service. For example: <br>
@ -938,42 +943,43 @@ socks <br>
sets different ACLs for <b>pop3p</b> and <b>socks</b></p>
<p style="margin-left:6%; margin-top: 1em"><b>system</b>
&lt;command&gt; <br>
<i>&lt;command&gt;</i> <br>
execute system command</p>
<p style="margin-left:6%; margin-top: 1em"><b>pidfile</b>
&lt;filename&gt; <br>
<i>&lt;filename&gt;</i> <br>
write pid of current process to file. It can be used to
manipulate 3proxy with signals under Unix. Currently next
signals are available:</p>
<p style="margin-left:6%; margin-top: 1em"><b>monitor</b>
&lt;filename&gt; <br>
<i>&lt;filename&gt;</i> <br>
If file monitored changes in modification time or size,
3proxy reloads configuration within one minute. Any number
of files may be monitored.</p>
<p style="margin-left:6%; margin-top: 1em"><b>setuid</b>
&lt;uid&gt; <br>
<i>&lt;uid&gt;</i> <br>
calls setuid(uid), uid can be numeric or since 0.9 username.
Unix only. Warning: under some Linux kernels setuid() works
for current thread only. It makes it impossible to suid for
all threads.</p>
<p style="margin-left:6%; margin-top: 1em"><b>setgid</b>
&lt;gid&gt; <br>
<i>&lt;gid&gt;</i> <br>
calls setgid(gid), gid can be numeric or since 0.9
groupname. Unix only.</p>
<p style="margin-left:6%; margin-top: 1em"><b>chroot</b>
&lt;path&gt; [&lt;uid&gt;] [&lt;gid&gt;] <br>
<i>&lt;path&gt;</i> [<i>&lt;uid&gt;</i>]
[<i>&lt;gid&gt;</i>] <br>
calls chroot(path) and sets gid/uid. Unix only. uid/gid
supported since 0.9, can be numeric or
username/groupname</p>
<p style="margin-left:6%; margin-top: 1em"><b>stacksize</b>
&lt;value_to_add_to_default_stack_size&gt; <br>
<i>&lt;value_to_add_to_default_stack_size&gt;</i> <br>
Change the default size for thread stacks. May be required
in some situations, e.g. with non-default plugins, or on
some platforms (some FreeBSD versions may require adjusting
@ -992,8 +998,8 @@ negative values.</p>
<p style="margin-left:6%; margin-top: 1em"><b>plugin</b>
&lt;path_to_shared_library&gt; &lt;function_to_call&gt;
[&lt;arg1&gt; ...] <br>
<i>&lt;path_to_shared_library&gt;
&lt;function_to_call&gt;</i> [<i>&lt;arg1&gt;</i> ...] <br>
Loads specified library and calls given export function with
given arguments, as <br>
int functions_to_call(struct pluginlink * pl, int argc, char
@ -1003,7 +1009,7 @@ function_to_call must return 0 in case of success, value
<p style="margin-left:6%; margin-top: 1em"><b>filtermaxsize</b>
&lt;max_size_of_data_to_filter&gt; <br>
<i>&lt;max_size_of_data_to_filter&gt;</i> <br>
If Content-length (or another data length) is greater than
the given value, no data filtering will be performed through
filtering plugins to avoid data corruption and/or

View File

@ -198,7 +198,7 @@ with FTP proxy support, configure <i>internal_ip</i> and
FTP proxy support, use <i>internal_ip</i> and <i>port</i> as
the FTP server. The address of the real FTP server must be
configured as a part of the FTP username. The format for the
username is <i>username</i><b>@</b><i>server</i>, where
username is <i>username</i>@<i>server</i>, where
<i>server</i> is the address of the FTP server and
<i>username</i> is the user&acute;s login on this FTP
server. The login itself may contain an &acute;@&acute;

View File

@ -196,8 +196,8 @@ MUA (Mail User Agent) with POP3 support. Set the client to
use <i>internal_ip</i> and <i>port</i> as a POP3 server. The
address of the real POP3 server must be configured as a part
of the POP3 username. The format for the username is
<i>username</i><b>@</b><i>server</i>, where <i>server</i> is
the address of the POP3 server and <i>username</i> is the
<i>username</i>@<i>server</i>, where <i>server</i> is the
address of the POP3 server and <i>username</i> is the
user&acute;s login on this POP3 server. The login itself may
contain an &acute;@&acute; sign. Only cleartext
authentication is supported, because challenge-response

View File

@ -196,7 +196,7 @@ MUA (Mail User Agent) with SMTP authentication support. Set
the client to use <i>internal_ip</i> and <i>port</i> as an
SMTP server. The address of the real SMTP server must be
configured as a part of the SMTP username. The format for
the username is <i>username</i><b>@</b><i>server</i>, where
the username is <i>username</i>@<i>server</i>, where
<i>server</i> is the address of the SMTP server and
<i>username</i> is the user&acute;s login on this SMTP
server. The login itself may contain an &acute;@&acute;

View File

@ -1,4 +1,4 @@
.TH 3proxy.cfg "8" "January 2019" "3proxy 0.9" "Universal proxy server"
.TH 3proxy.cfg "5" "January 2019" "3proxy 0.9" "Universal proxy server"
.SH NAME
.B 3proxy.cfg
3proxy configuration file
@ -69,11 +69,11 @@ Recursion is not allowed.
.br
.B tcppm
[options]
<SRCPORT> <DSTADDR> <DSTPORT>
\fI<SRCPORT>\fR \fI<DSTADDR>\fR \fI<DSTPORT>\fR
.br
.B udppm
[options]
<SRCPORT> <DSTADDR> <DSTPORT>
\fI<SRCPORT>\fR \fI<DSTADDR>\fR \fI<DSTPORT>\fR
.br
Descriptions:
.br
@ -119,16 +119,10 @@ UDP portmapper
.br
Options:
.br
.B -pNUMBER
.B -p\fINUMBER\fR
change default server port to NUMBER
.br
.B -n
disable NTLM authentication (required if passwords are stored in Unix crypt format).
.br
.B -n1
enable NTLMv1 authentication.
.br
.B -g(GRACE_TRAFF,GRACE_NUM,GRACE_DELAY)
.B -g(\fIGRACE_TRAFF\fB,\fIGRACE_NUM\fB,\fIGRACE_DELAY\fR)
delay GRACE_DELAY milliseconds before polling if average polling size is below GRACE_TRAFF bytes and GRACE_NUM read operations in a single direction are detected within 1 second. Useful to minimize polling
.B -s
(for admin) secure, allow only secure operations, currently only traffic counters
@ -165,18 +159,18 @@ Resolve IPv6 addresses if IPv4 address is not resolvable
.B -64
Resolve IPv4 addresses if IPv6 address is not resolvable
.br
.B -RHOST:port
.B -R\fIHOST\fB:\fIport\fR
listen on given local HOST:port for incoming connections instead of making remote outgoing connection. Can be used with another 3proxy service running -r option for connect back functionality. Most commonly used with tcppm. HOST can be given as IP or hostname, useful in case of dynamic DNS.
.br
.B -rHOST:port
.B -r\fIHOST\fB:\fIport\fR
connect to given remote HOST:port instead of listening local connection on -p or default port. Can be used with another 3proxy service running -R option for connect back functionality. Most commonly used with proxy or socks. HOST can be given as IP or hostname, useful in case of dynamic DNS.
.br
.B -ocOPTIONS, -osOPTIONS, -olOPTIONS, -orOPTIONS, -oROPTIONS
options for proxy-to-client (oc), proxy-to-server (os), proxy listening (ol), connect back client (or), connect back listening (oR) sockets.
.B -oc\fIOPTIONS\fB, -os\fIOPTIONS\fB, -ol\fIOPTIONS\fB, -or\fIOPTIONS\fB, -oR\fIOPTIONS\fR
options for proxy-to-client (\fB-oc\fR), proxy-to-server (\fB-os\fR), proxy listening (\fB-ol\fR), connect back client (\fB-or\fR), connect back listening (\fB-oR\fR) sockets.
Options like TCP_CORK, TCP_NODELAY, TCP_DEFER_ACCEPT, TCP_QUICKACK, TCP_TIMESTAMPS, USE_TCP_FASTOPEN, SO_REUSEADDR, SO_REUSEPORT, SO_PORT_SCALABILITY, SO_REUSE_UNICASTPORT, SO_KEEPALIVE, SO_DONTROUTE may be supported depending on OS.
.br
.B -DiINTERFACE, -DeINTERFACE
bind internal interface / external interface to given INTERFACE (e.g. eth0) if SO_BINDTODEVICE is supported by the system. You may need to run as root or have CAP_NET_RAW capability in order to bind to an interface, depending on the system, so this option may require root privileges and can be incompatible with some configuration commands like chroot and setuid (and daemon if setcap is used).
.B -Di\fIINTERFACE\fB, -De\fIINTERFACE\fR
bind internal (\fB-Di\fR) / external (\fB-De\fR) interface to given INTERFACE (e.g. eth0) if \fBSO_BINDTODEVICE\fR is supported by the system. You may need to run as root or have \fBCAP_NET_RAW\fR capability in order to bind to an interface, depending on the system, so this option may require root privileges and can be incompatible with some configuration commands like \fBchroot\fR and \fBsetuid\fR (and \fBdaemon\fR if setcap is used).
.br
.B -e
External address. IP address of the interface the proxy should initiate connections
@ -222,7 +216,7 @@ pop3username@pop3server. If POP3 proxy access must be authenticated, you can
specify username as proxy_username:proxy_password:POP3_username@pop3server
.br
DNS proxy resolves any types of records but only hostnames are cached. It
requires nserver/nscache to be configured. If nserver is configured as TCP,
requires \fBnserver\fR/\fBnscache\fR to be configured. If \fBnserver\fR is configured as TCP,
redirections are applied on connection, so parent proxy may be used to resolve
names to IP.
.br
@ -238,14 +232,14 @@ proxy on a client with FTP proxy support. Username format is one of
Please note, if you use FTP client interface for FTP proxy do not add FTPpassword and FTPServer to username, because FTP client does it for you. That is, if you use 3proxy with authentication use proxyuser:proxypassword:FTPuser as FTP username, otherwise do not change original FTP user name
.br
.B include
<path>
.BR include
\fI<path>\fR
.br
Include config file
.br
.B config
<path>
.BR config
\fI<path>\fR
.br
Path to configuration file to use on 3proxy restart or to save configuration.
@ -264,8 +258,8 @@ alternate config file. Think twice before using it.
End of configuration
.br
.B log
[[@|&]logfile] [<LOGTYPE>]
.BR log
[[@|&]\fIlogfile\fR] [\fI<LOGTYPE>\fR]
.br
sets logfile for all gateways
.br
@ -277,17 +271,17 @@ alternate config file. Think twice before using it.
.br
LOGTYPE is one of:
.br
c Minutely
\fBc\fR Minutely
.br
H Hourly
\fBH\fR Hourly
.br
D Daily
\fBD\fR Daily
.br
W Weekly (starting from Sunday)
\fBW\fR Weekly (starting from Sunday)
.br
M Monthly
\fBM\fR Monthly
.br
Y Annually
\fBY\fR Annually
.br
if logfile is not specified logging goes to stdout. You can specify individual logging options for gateway by using -l
option in gateway configuration.
@ -298,13 +292,13 @@ As with "logformat" filename must begin with \'L\' or \'G\' to specify Local or
Grinwitch time zone for all time-based format specificators.
.br
.B rotate
<n>
.BR rotate
\fI<n>\fR
how many archived log files to keep
.br
.B logformat
<format>
.BR logformat
\fI<format>\fR
.br
Format for log record. First symbol in format must be L (local time)
or G (absolute Grinwitch time).
@ -386,8 +380,8 @@ with space and all time based elemnts are in local time zone.
logformat "-\'+_Linsert into log (l_date, l_user, l_service, l_in, l_out, l_descr) values (\'%d-%m-%Y %H:%M:%S\', \'%U\', \'%N\', %I, %O, \'%T\')"
.br
.B logdump
<in_traffic_limit> <out_traffic_limit>
.BR logdump
\fI<in_traffic_limit>\fR \fI<out_traffic_limit>\fR
.br
Immediately creates additional log records if given amount of incoming/outgoing
traffic is achieved for connection, without waiting for connection to finish.
@ -395,56 +389,56 @@ It may be useful to prevent information about long-lasting downloads on server
shutdown.
.br
.B delimchar
<char>
.BR delimchar
\fI<char>\fR
.br
Sets the delimiter character used to separate username from hostname in proxy
authentication strings (e.g. for FTP, POP3 proxies). Default is \'@\'. For example,
to use \'#\' instead: delimchar #. This allows usernames to contain the \'@\' character.
.br
.B archiver
<ext> <commandline>
.BR archiver
\fI<ext>\fR \fI<commandline>\fR
.br
Archiver to use for log files. <ext> is file extension produced by
archiver. Filename will be last argument to archiver, optionally you
can use %A as produced archive name and %F as filename.
.br
.B timeouts
<BYTE_SHORT> <BYTE_LONG> <STRING_SHORT> <STRING_LONG> <CONNECTION_SHORT> <CONNECTION_LONG> <DNS> <CHAIN> <CONNECT> <CONNECTBACK>
.BR timeouts
\fI<BYTE_SHORT>\fR \fI<BYTE_LONG>\fR \fI<STRING_SHORT>\fR \fI<STRING_LONG>\fR \fI<CONNECTION_SHORT>\fR \fI<CONNECTION_LONG>\fR \fI<DNS>\fR \fI<CHAIN>\fR \fI<CONNECT>\fR \fI<CONNECTBACK>\fR
.br
Sets timeout values, defaults 1, 5, 30, 60, 180, 1800, 15, 60, 15, 5.
.br
BYTE_SHORT short timeout for single byte, is usually used for receiving single byte from stream.
\fBBYTE_SHORT\fR short timeout for single byte, is usually used for receiving single byte from stream.
.br
BYTE_LONG long timeout for single byte, is usually used for receiving first byte in frame (for example first byte in socks request).
\fBBYTE_LONG\fR long timeout for single byte, is usually used for receiving first byte in frame (for example first byte in socks request).
.br
STRING_SHORT short timeout, for character string within stream (for example to wait between 2 HTTP headers)
\fBSTRING_SHORT\fR short timeout, for character string within stream (for example to wait between 2 HTTP headers)
.br
STRING_LONG long timeout, for first string in stream (for example to wait for HTTP request).
\fBSTRING_LONG\fR long timeout, for first string in stream (for example to wait for HTTP request).
.br
CONNECTION_SHORT inactivity timeout for short connections (HTTP, POP3, etc).
\fBCONNECTION_SHORT\fR inactivity timeout for short connections (HTTP, POP3, etc).
.br
CONNECTION_LONG inactivity timeout for long connection (SOCKS, portmappers, etc).
\fBCONNECTION_LONG\fR inactivity timeout for long connection (SOCKS, portmappers, etc).
.br
DNS timeout for DNS request before requesting next server
\fBDNS\fR timeout for DNS request before requesting next server
.br
CHAIN timeout for reading data from chained connection
\fBCHAIN\fR timeout for reading data from chained connection
.br
default timeouts 1 5 30 60 180 1800 15 60 15 5
.br
.B maxseg
<value>
.BR maxseg
\fI<value>\fR
.br
Sets TCP maximum segment size (MSS) for outgoing connections. This can be used
to work around path MTU discovery issues or to optimize traffic for specific
network conditions.
.br
.B radius
<NAS_SECRET> <radius_server_1[:port][/local_address_1]> <radius_server_2[:port][/local_address_2]>
.BR radius
\fI<NAS_SECRET>\fR \fI<radius_server_1\fR[:\fIport\fR][/\fIlocal_address_1\fR]\fR \fI<radius_server_2\fR[:\fIport\fR][/\fIlocal_address_2\fR]\fR
.br
Configures RADIUS servers to be used for logging and authentication (log and auth types
must be set to radius). port and local address to use with given server may be specified.
@ -463,11 +457,11 @@ Login-IPv6-Host / Login-IP-Host: (requested IP).
.br
Supported reply attributes for authentication:
Framed-IP-Address / Framed-IPv6-Address (IP to assign to user), Reply-Message.
Use authcache to speedup authentication. RADIUS feature is currently experimental.
Use \fBauthcache\fR to speedup authentication. RADIUS feature is currently experimental.
.br
.B nserver
<ipaddr>[:port][/tcp]
.BR nserver
\fI<ipaddr>\fR[:\fIport\fR][/\fItcp\fR]
.br
Nameserver to use for name resolutions. If none specified
system routines for name resolution is
@ -476,27 +470,27 @@ If optional /tcp is added to IP address, name resolution is
performed over TCP.
.br
.B authnserver
<ipaddr>[:port][/tcp]
.BR authnserver
\fI<ipaddr>\fR[:\fIport\fR][/\fItcp\fR]
.br
Nameserver to use for DNS-based authentication (e.g. dnsname auth type).
If not specified, nserver is used. The syntax is the same as for nserver.
.br
.B nscache
<cachesize>
.B nscache6
<cachesize>
.BR nscache
\fI<cachesize>\fR
.BR nscache6
\fI<cachesize>\fR
.br
Cache <cachesize> records for name resolution (nscache for IPv4,
nscache6 for IPv6). The cache size should usually be large enough
Cache \fI<cachesize>\fR records for name resolution (\fBnscache\fR for IPv4,
\fBnscache6\fR for IPv6). The cache size should usually be large enough
(for example, 65536).
.br
.B nsrecord
<hostname> <hostaddr>
.BR nsrecord
\fI<hostname>\fR \fI<hostaddr>\fR
.br
Adds static record to nscache. nscache must be enabled. If 0.0.0.0
Adds static record to nscache. \fBnscache\fR must be enabled. If 0.0.0.0
is used as a hostaddr host will never resolve, it can be used to
blacklist something or together with
.B dialer
@ -506,11 +500,11 @@ command to set up UDL for dialing.
.B fakeresolve
.br
All names are resolved to the 127.0.0.2 address. Useful if all requests are
redirected to a parent proxy with http, socks4+, connect+ or socks5+.
redirected to a parent proxy with \fBhttp\fR, \fBsocks4+\fR, \fBconnect+\fR or \fBsocks5+\fR.
.br
.B dialer
<progname>
.BR dialer
\fI<progname>\fR
.br
Execute progname if external name can\'t be resolved.
Hint: if you use nscache, dialer may not work, because names will
@ -519,8 +513,8 @@ http://dial.right.now/ from browser to set up connection.
.br
.B internal
<ipaddr>
.BR internal
\fI<ipaddr>\fR
.br
sets ip address of internal interface. This IP address will be used
to bind gateways. Alternatively you can use -i option for individual
@ -535,30 +529,30 @@ Unix sockets are supported with the syntax
is automatically created and removed on service start/stop.
.br
.B external
<ipaddr>
.BR external
\fI<ipaddr>\fR
.br
sets ip address of external interface. This IP address will be source
address for all connections made by proxy. Alternatively you can use -e
option to specify individual address for gateway. Since 0.8 version
External or -e can be given twice: once with IPv4 and once with IPv6 address.
External or \fB-e\fR can be given twice: once with IPv4 and once with IPv6 address.
.br
.B maxconn
<number>
.BR maxconn
\fI<number>\fR
.br
sets the maximum number of simultaneous connections to each service
started after this command at the network level. Default is 100.
.br
To limit clients, use connlim instead. maxconn will silently ignore
new connections, while connlim will report back to the client that
To limit clients, use \fBconnlim\fR instead. \fBmaxconn\fR will silently ignore
new connections, while \fBconnlim\fR will report back to the client that
the connection limit has been reached.
.br
.B backlog
.br
sets the listening socket backlog of new connections. Default is
1 + maxconn/8. Maximum value is capped by kernel tunable somaxconn.
1 + \fBmaxconn\fR/8. Maximum value is capped by kernel tunable somaxconn.
.br
.B service
@ -572,40 +566,40 @@ to reinstall the service.
.B daemon
.br
Should be specified to close the console. Do not use \'daemon\' with \'service\'.
At least under FreeBSD, \'daemon\' should precede any proxy service
At least under FreeBSD, \fBdaemon\fR should precede any proxy service
and log commands to avoid socket problems. Always place it in the beginning
of the configuration file.
.br
.B auth
<authtype> [...]
.BR auth
\fI<authtype>\fR [...]
.br
Type of user authorization. Currently supported:
.br
none - no authentication or authorization required.
\fBnone\fR - no authentication or authorization required.
.br
Note: if auth is none, any IP-based limitation, redirection, etc. will not work.
This is the default authentication type
.br
iponly - authentication by access control list with username ignored.
\fBiponly\fR - authentication by access control list with username ignored.
Appropriate for most cases
.br
useronly - authentication by username without checking for any password with
\fBuseronly\fR - authentication by username without checking for any password with
authorization by ACLs. Useful for e.g. SOCKSv4 proxy and icqpr (icqpr set UIN /
AOL screen name as a username)
.br
dnsname - authentication by DNS hostname with authorization by ACLs.
\fBdnsname\fR - authentication by DNS hostname with authorization by ACLs.
The DNS hostname is resolved via a PTR (reverse) record and validated (the resolved
name must resolve to the same IP address). It\'s recommended to use authcache by
IP for this authentication.
NB: there is no password check; the name may be spoofed.
.br
strong - username/password authentication required. It will work with
\fBstrong\fR - username/password authentication required. It will work with
SOCKSv5, FTP, POP3 and HTTP proxy.
.br
cache - cached authentication, may be used with \'authcache\'.
\fBcache\fR - cached authentication, may be used with \'authcache\'.
.br
radius - authentication with RADIUS.
\fBradius\fR - authentication with RADIUS.
.br
Plugins may add additional authentication types.
@ -622,43 +616,43 @@ IP-based authentication for dedicated laptops and request a username/password fo
shared ones.
.br
.B authcache
<cachtype> <cachtime> <cachesize>
.BR authcache
\fI<cachtype>\fR \fI<cachtime>\fR \fI<cachesize>\fR
.br
Cache authentication information for a given amount of time (cachetime) in seconds.
cachesize limits number of cache entries.
Cachetype is one of:
.br
ip - after successful authentication all connections during caching time
\fBip\fR - after successful authentication all connections during caching time
from same IP are assigned to the same user, username is not requested.
.br
ip,user username is requested and all connections from the same IP are
\fBip,user\fR username is requested and all connections from the same IP are
assigned to the same user without actual authentication.
.br
user - same as above, but IP is not checked.
\fBuser\fR - same as above, but IP is not checked.
.br
user,password - both username and password are checked against cached ones.
\fBuser,password\fR - both username and password are checked against cached ones.
.br
limit - limit user to use only one ip, \'ip\' and \'user\' are required
\fBlimit\fR - limit user to use only one ip, \'ip\' and \'user\' are required
.br
acl - only use cached auth if user access service with same ACL
\fBack\fR - only use cached auth if user access service with same ACL
.br
ext - cache external IP
\fBext\fR - cache external IP
.br
Use auth type \'cache\' for cached authentication
Use auth type \fBcache\fR for cached authentication
.br
.B allow
<userlist> <sourcelist> <targetlist> <targetportlist> <operationlist>
<weekdayslist> <timeperiodslist>
.BR allow
\fI<userlist>\fR \fI<sourcelist>\fR \fI<targetlist>\fR \fI<targetportlist>\fR \fI<operationlist>\fR
\fI<weekdayslist>\fR \fI<timeperiodslist>\fR
.br
.B deny
<userlist> <sourcelist> <targetlist> <targetportlist> <operationlist>
<weekdayslist> <timeperiodslist>
.BR deny
\fI<userlist>\fR \fI<sourcelist>\fR \fI<targetlist>\fR \fI<targetportlist>\fR \fI<operationlist>\fR
\fI<weekdayslist>\fR \fI<timeperiodslist>\fR
.br
.B redirect
<ip> <port> <userlist> <sourcelist> <targetlist> <targetportlist> <operationlist>
<weekdayslist> <timeperiodslist>
.BR redirect
\fI<ip>\fR \fI<port>\fR \fI<userlist>\fR \fI<sourcelist>\fR \fI<targetlist>\fR \fI<targetportlist>\fR \fI<operationlist>\fR
\fI<weekdayslist>\fR \fI<timeperiodslist>\fR
.br
Access control entries. All lists are comma-separated, no spaces are
allowed. Usernames are case sensitive (if used with authtype nbname
@ -687,42 +681,42 @@ to appropriate interface only or to use ip filters.
.br
Operation is one of:
.br
CONNECT establish outgoing TCP connection
\fBCONNECT\fR establish outgoing TCP connection
.br
BIND bind TCP port for listening
\fBBIND\fR bind TCP port for listening
.br
UDPASSOC make UDP association
\fBUDPASSOC\fR make UDP association
.br
ICMPASSOC make ICMP association (for future use)
\fBICMPASSOC\fR make ICMP association (for future use)
.br
HTTP_GET HTTP GET request
\fBHTTP_GET\fR HTTP GET request
.br
HTTP_PUT HTTP PUT request
\fBHTTP_PUT\fR HTTP PUT request
.br
HTTP_POST HTTP POST request
\fBHTTP_POST\fR HTTP POST request
.br
HTTP_HEAD HTTP HEAD request
\fBHTTP_HEAD\fR HTTP HEAD request
.br
HTTP_CONNECT HTTP CONNECT request
\fBHTTP_CONNECT\fR HTTP CONNECT request
.br
HTTP_OTHER over HTTP request
\fBHTTP_OTHER\fR over HTTP request
.br
HTTP matches any HTTP request except HTTP_CONNECT
\fBHTTP\fR matches any HTTP request except HTTP_CONNECT
.br
HTTPS same as HTTP_CONNECT
\fBHTTPS\fR same as HTTP_CONNECT
.br
FTP_GET FTP get request
\fBFTP_GET\fR FTP get request
.br
FTP_PUT FTP put request
\fBFTP_PUT\fR FTP put request
.br
FTP_LIST FTP list request
\fBFTP_LIST\fR FTP list request
.br
FTP_DATA FTP data connection. Note: FTP_DATA requires access to dynamic
\fBFTP_DATA\fR FTP data connection. Note: FTP_DATA requires access to dynamic
non-privileged (1024-65535) ports on the remote side.
.br
FTP matches any FTP/FTP Data request
\fBFTP\fR matches any FTP/FTP Data request
.br
ADMIN access to administration interface
\fBADMIN\fR access to administration interface
.br
Weekdays are week day numbers or periods, 0 or 7 means Sunday, 1 is Monday, 1-5 means Monday through Friday.
@ -731,8 +725,8 @@ non-privileged (1024-65535) ports on the remote side.
periods in HH:MM:SS-HH:MM:SS format. For example, 00:00:00-08:00:00,17:00:00-24:00:00 lists non-working hours.
.br
.B parent
<weight> <type> <ip> <port> <username> <password>
.BR parent
\fI<weight>\fR \fI<type>\fR \fI<ip>\fR \fI<port>\fR \fI<username>\fR \fI<password>\fR
.br
this command must follow "allow" rule. It extends last allow rule to
build proxy chain. Proxies may be grouped. Proxy inside the
@ -769,45 +763,45 @@ with probability of 0.7) for outgoing web connections. Chains are only applied t
.br
type is one of:
.br
extip does not actually redirect the request; it sets the external address for this request to <ip>. It can be chained with another parent type. It's useful to set the external IP based on ACL or make it random.
\fBextip\fR does not actually redirect the request; it sets the external address for this request to \fI<ip>\fR. It can be chained with another parent type. It's useful to set the external IP based on ACL or make it random.
.br
tcp simply redirect connection. TCP is always last in chain. This type of proxy is a simple TCP redirection, it does not support parent authentication.
\fBtcp\fR simply redirect connection. TCP is always last in chain. This type of proxy is a simple TCP redirection, it does not support parent authentication.
.br
http redirect to HTTP proxy. HTTP is always the last chain. It should only be used with http (proxy) service,
\fBhttp\fR redirect to HTTP proxy. HTTP is always the last chain. It should only be used with http (proxy) service,
if used with different service, it works as tcp redirection.
.br
pop3 redirect to POP3 proxy (only local redirection is supported, can only be used as a first hop in chaining)
\fBpop3\fR redirect to POP3 proxy (only local redirection is supported, can only be used as a first hop in chaining)
.br
ftp redirect to FTP proxy (only local redirection is supported, can only be used as a first hop in chaining)
\fBftp\fR redirect to FTP proxy (only local redirection is supported, can only be used as a first hop in chaining)
.br
connect parent is HTTP CONNECT method proxy
\fBconnect\fR parent is HTTP CONNECT method proxy
.br
connect+ parent is HTTP CONNECT proxy with name resolution (hostname is used instead of IP if available)
\fBconnect+\fR parent is HTTP CONNECT proxy with name resolution (hostname is used instead of IP if available)
.br
socks4 parent is SOCKSv4 proxy
\fBsocks4\fR parent is SOCKSv4 proxy
.br
socks4+ parent is SOCKSv4 proxy with name resolution (SOCKSv4a)
\fBsocks4+\fR parent is SOCKSv4 proxy with name resolution (SOCKSv4a)
.br
socks5 parent is SOCKSv5 proxy
\fBsocks5\fR parent is SOCKSv5 proxy
.br
socks5+ parent is SOCKSv5 proxy with name resolution
\fBsocks5+\fR parent is SOCKSv5 proxy with name resolution
.br
socks4b parent is SOCKS4b (broken SOCKSv4 implementation with shortened
\fBsocks4b\fR parent is SOCKS4b (broken SOCKSv4 implementation with shortened
server reply; I never saw this kind of server, but they say there are some).
Normally you should not use this option. Do not confuse this option with
SOCKSv4a (socks4+).
SOCKSv4a (\fBsocks4+\fR).
.br
socks5b parent is SOCKS5b (broken SOCKSv5 implementation with shortened
\fBsocks5b\fR parent is SOCKS5b (broken SOCKSv5 implementation with shortened
server reply. I think you will never find it useful). Never use this option
unless you know exactly you need it.
.br
admin redirect request to local \'admin\' service (with -s parameter).
\fBadmin\fR redirect request to local \'admin\' service (with -s parameter).
.br
ha send HAProxy PROXY protocol v1 header to parent proxy. Must be the last
\fBha\fR send HAProxy PROXY protocol v1 header to parent proxy. Must be the last
in the proxy chain. Useful for passing client IP information to the parent proxy.
Example: parent 1000 ha
.br
Use "+" proxy only with "fakeresolve" option
Use "+" proxy only with \fBfakeresolve\fR option
.br
IP and port are ip addres and port of parent proxy server.
@ -859,21 +853,21 @@ local HTTP proxy parses requests and allows only GET and POST requests.
.br
parent 1000 http 1.2.3.4 0
.br
Changes the external address for a given connection to 1.2.3.4 (equivalent to -e1.2.3.4)
Changes the external address for a given connection to 1.2.3.4 (equivalent to \fB-e1.2.3.4\fR)
.br
Optional username and password are used to authenticate on parent
proxy. Username of \'*\' means username must be supplied by user.
.br
.B parentretries
<number>
.BR parentretries
\fI<number>\fR
.br
Number of retries to connect to parent proxy. Default is 1.
.br
.B nolog
<n>
.BR nolog
\fI<n>\fR
.br
extends last allow or deny command to prevent logging, e.g.
.br
@ -883,8 +877,8 @@ nolog
.br
.B weight
<n>
.BR weight
\fI<n>\fR
.br
extends last allow or deny command to set weight for this request
.br
@ -906,30 +900,30 @@ is removed, old connections which do not match current are closed.
noforce allows to keep previously authenticated connections.
.br
.B bandlimin
<rate> <userlist> <sourcelist> <targetlist> <targetportlist> <operationlist>
<weekdayslist> <timeperiodslist>
.BR bandlimin
\fI<rate>\fR \fI<userlist>\fR \fI<sourcelist>\fR \fI<targetlist>\fR \fI<targetportlist>\fR \fI<operationlist>\fR
\fI<weekdayslist>\fR \fI<timeperiodslist>\fR
.br
.B nobandlimin
<userlist> <sourcelist> <targetlist> <targetportlist> <operationlist>
<weekdayslist> <timeperiodslist>
.BR nobandlimin
\fI<userlist>\fR \fI<sourcelist>\fR \fI<targetlist>\fR \fI<targetportlist>\fR \fI<operationlist>\fR
\fI<weekdayslist>\fR \fI<timeperiodslist>\fR
.br
.B bandlimout
<rate> <userlist> <sourcelist> <targetlist> <targetportlist> <operationlist>
<weekdayslist> <timeperiodslist>
.BR bandlimout
\fI<rate>\fR \fI<userlist>\fR \fI<sourcelist>\fR \fI<targetlist>\fR \fI<targetportlist>\fR \fI<operationlist>\fR
\fI<weekdayslist>\fR \fI<timeperiodslist>\fR
.br
.B nobandlimout
<userlist> <sourcelist> <targetlist> <targetportlist> <operationlist>
<weekdayslist> <timeperiodslist>
.BR nobandlimout
\fI<userlist>\fR \fI<sourcelist>\fR \fI<targetlist>\fR \fI<targetportlist>\fR \fI<operationlist>\fR
\fI<weekdayslist>\fR \fI<timeperiodslist>\fR
.br
bandlim sets a bandwidth limitation filter to <rate> bps (bits per second).
bandlim sets a bandwidth limitation filter to \fI<rate>\fR bps (bits per second).
If you want to specify bytes per second, multiply your value by 8.
bandlim rules act in the same manner as allow/deny rules, except for
one thing: bandwidth limiting is applied to all services, not to some
specific service.
bandlimin and nobandlimin apply to incoming traffic
\fBbandlimin\fR and \fBnobandlimin\fR apply to incoming traffic
.br
bandlimout and nobandlimout apply to outgoing traffic
\fBbandlimout\fR and \fBnobandlimout\fR apply to outgoing traffic
.br
If you want to ratelimit your clients with IPs 192.168.10.16/30 (4
addresses) to 57600 bps, you have to specify 4 rules like
@ -954,17 +948,17 @@ If you want, for example, to limit all speed except access to POP3, you can use
before the rest of bandlim rules.
.br
.B connlim
<rate> <period> <userlist> <sourcelist> <targetlist> <targetportlist> <operationlist>
<weekdayslist> <timeperiodslist>
.BR connlim
\fI<rate>\fR \fI<period>\fR \fI<userlist>\fR \fI<sourcelist>\fR \fI<targetlist>\fR \fI<targetportlist>\fR \fI<operationlist>\fR
\fI<weekdayslist>\fR \fI<timeperiodslist>\fR
.br
.B noconnlim
<userlist> <sourcelist> <targetlist> <targetportlist> <operationlist>
<weekdayslist> <timeperiodslist>
.BR noconnlim
\fI<userlist>\fR \fI<sourcelist>\fR \fI<targetlist>\fR \fI<targetportlist>\fR \fI<operationlist>\fR
\fI<weekdayslist>\fR \fI<timeperiodslist>\fR
.br
connlim sets connections rate limit per time period for traffic
pattern controlled by ACL. Period is in seconds. If period is 0,
connlim limits a number of parallel connections.
\fBconnlim\fR limits a number of parallel connections.
.br
connlim 100 60 * 127.0.0.1
.br
@ -974,39 +968,39 @@ connlim limits a number of parallel connections.
.br
allows 20 simultaneous connections for 127.0.0.1.
.br
Like with bandlimin, if an individual limit is required per client, a separate
Like with \fBbandlimin\fR, if an individual limit is required per client, a separate
rule must be added for every client. Like with nobandlimin, noconnlim adds an
exception.
.br
.B counter
<filename> <reporttype> <reportname>
.BR counter
\fI<filename>\fR \fI<reporttype>\fR \fI<reportname>\fR
.br
.B countin
<number> <type> <limit> <userlist> <sourcelist> <targetlist> <targetportlist> <operationlist>
<weekdayslist> <timeperiodslist>
.BR countin
\fI<number>\fR \fI<type>\fR \fI<limit>\fR \fI<userlist>\fR \fI<sourcelist>\fR \fI<targetlist>\fR \fI<targetportlist>\fR \fI<operationlist>\fR
\fI<weekdayslist>\fR \fI<timeperiodslist>\fR
.br
.B nocountin
<userlist> <sourcelist> <targetlist> <targetportlist> <operationlist>
<weekdayslist> <timeperiodslist>
.BR nocountin
\fI<userlist>\fR \fI<sourcelist>\fR \fI<targetlist>\fR \fI<targetportlist>\fR \fI<operationlist>\fR
\fI<weekdayslist>\fR \fI<timeperiodslist>\fR
.br
.B countout
<number> <type> <limit> <userlist> <sourcelist> <targetlist> <targetportlist> <operationlist>
<weekdayslist> <timeperiodslist>
.BR countout
\fI<number>\fR \fI<type>\fR \fI<limit>\fR \fI<userlist>\fR \fI<sourcelist>\fR \fI<targetlist>\fR \fI<targetportlist>\fR \fI<operationlist>\fR
\fI<weekdayslist>\fR \fI<timeperiodslist>\fR
.br
.B nocountout
<userlist> <sourcelist> <targetlist> <targetportlist> <operationlist>
<weekdayslist> <timeperiodslist>
.BR nocountout
\fI<userlist>\fR \fI<sourcelist>\fR \fI<targetlist>\fR \fI<targetportlist>\fR \fI<operationlist>\fR
\fI<weekdayslist>\fR \fI<timeperiodslist>\fR
.br
.B countall
<number> <type> <limit> <userlist> <sourcelist> <targetlist> <targetportlist> <operationlist>
<weekdayslist> <timeperiodslist>
.BR countall
\fI<number>\fR \fI<type>\fR \fI<limit>\fR \fI<userlist>\fR \fI<sourcelist>\fR \fI<targetlist>\fR \fI<targetportlist>\fR \fI<operationlist>\fR
\fI<weekdayslist>\fR \fI<timeperiodslist>\fR
.br
.B nocountall
<userlist> <sourcelist> <targetlist> <targetportlist> <operationlist>
<weekdayslist> <timeperiodslist>
.BR nocountall
\fI<userlist>\fR \fI<sourcelist>\fR \fI<targetlist>\fR \fI<targetportlist>\fR \fI<operationlist>\fR
\fI<weekdayslist>\fR \fI<timeperiodslist>\fR
.br
counter, countin, nocountin, countout, nocountout, countall,
@ -1020,38 +1014,36 @@ should be a unique sequential number which points to the position of
the counter within the file.
Type specifies a type of counter. Type is one of:
.br
H - counter is reset hourly
\fBH\fR - counter is reset hourly
.br
D - counter is reset daily
\fBD\fR - counter is reset daily
.br
W - counter is reset weekly
\fBW\fR - counter is reset weekly
.br
M - counter is reset monthly
\fBM\fR - counter is reset monthly
.br
reporttype/reportname may be used to generate traffic reports.
Reporttype is one of D, W, M, H (hourly) and reportname specifies the filename
template for reports. The report is a text file with counter values in
the format:
.br
<COUNTERNUMBER> <TRAF>
\fI<COUNTERNUMBER>\fR \fI<TRAF>\fR
.br
The rest of parameters is identical to bandlim/nobandlim.
The rest of parameters is identical to \fBbandlim\fR/\fBnobandlim\fR.
.br
.B users
username[:pwtype:password] ...
.BR users
\fIusername\fR[:\fIpwtype\fR:\fIpassword\fR] ...
.br
pwtype is one of:
.br
none (empty) - use system authentication
.br
CL - password is cleartext
\fBCL\fR - password is cleartext
.br
CR - password is crypt-style password
\fBCR\fR - password is crypt-style password
.br
NT - password is NT password (in hex)
.br
LM - password is LM password (in hex)
\fBNT\fR - password is NT password (in hex)
.br
example:
.br
@ -1083,48 +1075,48 @@ and
.B socks
.br
.B system
<command>
.BR system
\fI<command>\fR
.br
execute system command
.br
.B pidfile
<filename>
.BR pidfile
\fI<filename>\fR
.br
write pid of current process to file. It can be used to manipulate
3proxy with signals under Unix. Currently next signals are available:
.br
.B monitor
<filename>
.BR monitor
\fI<filename>\fR
.br
If file monitored changes in modification time or size, 3proxy reloads
configuration within one minute. Any number of files may be monitored.
.br
.B setuid
<uid>
.BR setuid
\fI<uid>\fR
.br
calls setuid(uid), uid can be numeric or since 0.9 username. Unix only. Warning: under some Linux
kernels setuid() works for current thread only. It makes it impossible to suid
for all threads.
.br
.B setgid
<gid>
.BR setgid
\fI<gid>\fR
.br
calls setgid(gid), gid can be numeric or since 0.9 groupname. Unix only.
.br
.B chroot
<path> [<uid>] [<gid>]
.BR chroot
\fI<path>\fR [\fI<uid>\fR] [\fI<gid>\fR]
.br
calls chroot(path) and sets gid/uid. Unix only. uid/gid supported since 0.9, can be numeric or username/groupname
.br
.B stacksize
<value_to_add_to_default_stack_size>
.BR stacksize
\fI<value_to_add_to_default_stack_size>\fR
.br
Change the default size for thread stacks. May be required in some situations,
e.g. with non-default plugins, or on some platforms (some FreeBSD versions
@ -1139,8 +1131,8 @@ memory shortage, you can try to experiment with negative values.
.SH PLUGINS
.br
.B plugin
<path_to_shared_library> <function_to_call> [<arg1> ...]
.BR plugin
\fI<path_to_shared_library>\fR \fI<function_to_call>\fR [\fI<arg1>\fR ...]
.br
Loads specified library and calls given export function with given arguments,
as
@ -1150,8 +1142,8 @@ as
function_to_call must return 0 in case of success, value > 0 to indicate error.
.br
.B filtermaxsize
<max_size_of_data_to_filter>
.BR filtermaxsize
\fI<max_size_of_data_to_filter>\fR
.br
If Content-length (or another data length) is greater than the given value, no
data filtering will be performed through filtering plugins to avoid data

View File

@ -73,7 +73,7 @@ and
.IR port
as the FTP server. The address of the real FTP server must be configured as a part of
the FTP username. The format for the username is
.IR username \fB@ server ,
.IR username @ server ,
where
.I server
is the address of the FTP server and

View File

@ -67,7 +67,7 @@ and
.IR port
as a POP3 server. The address of the real POP3 server must be configured as a part of
the POP3 username. The format for the username is
.IR username \fB@ server ,
.IR username @ server ,
where
.I server
is the address of the POP3 server and

View File

@ -68,7 +68,7 @@ and
.IR port
as an SMTP server. The address of the real SMTP server must be configured as a part of
the SMTP username. The format for the username is
.IR username \fB@ server ,
.IR username @ server ,
where
.I server
is the address of the SMTP server and