next up previous contents
Next: Access control commands Up: Using rq2proxy Previous: Command line options

Configuration file format

The configuration file specifies what the server should proxy. It consists of a sequence of statements, which can be of four forms:

1.
Redirect commands (beginning with redirect). These specify redirections: redirections are processed in order of declaration.
2.
Access control commands (beginning with global). These specify access control list elements: ACL elements are processed in order of declaration.
3.
Miscellaneous commands: these simply set various characteristics of the server, and the last such command fixes the characteristic, unless overridden by a command-line option.
4.
Comments: introduced by # and last until the end of the line.

Options supplied by the configuration file override built-in defaults and are overridden by command-line options.

Whenever an IP address (NOT a netmask) is specified, a hostname can be used instead. Beware, however: DNS cache poisoning attacks can cause you to trust people you don't think you're trusting, and all names are looked up at the server, so if your internal names are invisible from outside your firewall you will need to use IP numbers (and indeed, you're probably better off doing this anyway).

If you want to know exactly what is permitted under certain circumstances, you are referred to the parser.y and lexer.l files in the source distribution.



 
next up previous contents
Next: Access control commands Up: Using rq2proxy Previous: Command line options
Richard Watts
1998-12-22