File: config.default

package info (click to toggle)
prey 0.6.2-1.1
  • links: PTS, VCS
  • area: main
  • in suites: stretch
  • size: 2,016 kB
  • ctags: 174
  • sloc: sh: 2,108; perl: 1,258; python: 628; makefile: 21
file content (116 lines) | stat: -rwxr-xr-x 4,101 bytes parent folder | download | duplicates (4)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
#!/bin/bash
####################################################################
# PREY Configuration File - by Tomas Pollak (bootlog.org)
# URL: http://preyproject.com
# License: GPLv3
####################################################################

# language, en (english) or es (espanol)
lang='en'

# autoconnect feature, disabled by default until we are 200% sure it
# works flawlessly in all platforms. feel free to try it out though.
auto_connect='n'

# verification URL, if left empty Prey will always activate and run,
# which is certainly *not* recommended.
check_url='https://control.preyproject.com'

# IMPORTANT: on what HTTP response code will Prey be activated (200 or 404)
# control panel users don't touch this! standalone users may want to
# change it back to 200 (previous setting), if you wish to wake Prey up by
# creating the URL (as before) instead of removing an existing one
missing_status_code='404'

# you can use send the report via email or to the web service
# valid values: http, email, scp or sftp
post_method='http'

####################################################################
# http posting configuration
####################################################################

# you can get both of these from Prey's web service
api_key=''
device_key=''

####################################################################
# SMTP settings, for email posting
####################################################################

# mailbox to send the report
mail_to='mailbox@domain.com'

# the password is now stored base64 encrypted
# if you wish to generate it by hand, run
# $ echo -n "password" | openssl enc -base64
smtp_server='smtp.gmail.com:587'
smtp_username='username@gmail.com'
smtp_password='password'

# you dont need to change this
mail_from='Prey <no-reply@gmail.com>'
mail_subject='[Prey] Status Report'

####################################################################
# additional http options
####################################################################

# include additional options for curl here. if you're having trouble getting
# requests across your firewall, you can try adding '-0' to make curl perform
# HTTP 1.0 requests
curl_options='--compress --connect-timeout 60'

# by adding proxy here, prey will attempt to use it in case a direct request is
# unsuccessful. example: http://proxy.server.com:3378
try_proxy=''

# this option prepends a random number as a subdomain to the check URL on http mode
# makes it harder for other programs to block Prey so its a good idea to be on
randomize_check_host='n'

# whether to send your device's LAN and gateway IP address as headers when
# checking its status. currently only for testing purposes, but maybe in the
# future it may prove useful. :)
extended_headers='n'

####################################################################
# scp/sftp posting configuration -- EXPERIMENTAL!
# we dont use user/pass but RSA keys
####################################################################

# this applies both to scp and sftp posting methods
ssh_options='-oStrictHostKeyChecking=no'

# remember you should have write access to the folder
scp_user='username'
scp_server='my.server.com'
scp_path='~'

# same as above, make sure you have write access
sftp_user='username'
sftp_server='my.server.com'
sftp_path='.'


####################################################################
# SSH Tunnel config
# you can log in either by RSA key or entering the pass below
####################################################################

remote_tunnel_port=''
remote_tunnel_host='my.server.com'
remote_tunnel_user='username'
remote_tunnel_pass='password'

####################################################################
# Amazon S3 keys
####################################################################

s3_access_key_id=''
s3_secret_access_key=''
s3_bucket_name=''

####################################################################
# if you have any questions please visit preyproject.com
####################################################################