This repository has been archived by the owner on May 27, 2021. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 135
/
config
executable file
·116 lines (90 loc) · 4 KB
/
config
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
#!/bin/bash
####################################################################
# PREY Configuration File - by Tomas Pollak (bootlog.org)
# URL: http://preyproject.com
# License: GPLv3
####################################################################
# language, en (english) or es (espanol)
lang='en'
# autoconnect feature, disabled by default until we are 200% sure it
# works flawlessly in all platforms. feel free to try it out though.
auto_connect='n'
# verification URL, if left empty Prey will always activate and run,
# which is certainly *not* recommended.
check_url='https://control.preyproject.com'
# IMPORTANT: on what HTTP response code will Prey be activated (200 or 404)
# control panel users don't touch this! standalone users may want to
# change it back to 200 (previous setting), if you wish to wake Prey up by
# creating the URL (as before) instead of removing an existing one
missing_status_code='404'
# you can use send the report via email or to the web service
# valid values: http, email, scp or sftp
post_method='http'
####################################################################
# http posting configuration
####################################################################
# you can get both of these from Prey's web service
api_key=''
device_key=''
####################################################################
# SMTP settings, for email posting
####################################################################
# mailbox to send the report
mail_to='[email protected]'
# the password is now stored base64 encrypted
# if you wish to generate it by hand, run
# $ echo -n "password" | openssl enc -base64
smtp_server='smtp.gmail.com:587'
smtp_username='[email protected]'
smtp_password='password'
# you dont need to change this
mail_from='Prey <[email protected]>'
mail_subject='[Prey] Status Report'
####################################################################
# additional http options
####################################################################
# include additional options for curl here. if you're having trouble getting
# requests across your firewall, you can try adding '-0' to make curl perform
# HTTP 1.0 requests
curl_options='--compress --connect-timeout 60'
# by adding proxy here, prey will attempt to use it in case a direct request is
# unsuccessful. example: http://proxy.server.com:3378
try_proxy=''
# this option prepends a random number as a subdomain to the check URL on http mode
# makes it harder for other programs to block Prey so its a good idea to be on
randomize_check_host='n'
# whether to send your device's LAN and gateway IP address as headers when
# checking its status. currently only for testing purposes, but maybe in the
# future it may prove useful. :)
extended_headers='n'
####################################################################
# scp/sftp posting configuration -- EXPERIMENTAL!
# we dont use user/pass but RSA keys
####################################################################
# this applies both to scp and sftp posting methods
ssh_options='-oStrictHostKeyChecking=no'
# remember you should have write access to the folder
scp_user='username'
scp_server='my.server.com'
scp_path='~'
# same as above, make sure you have write access
sftp_user='username'
sftp_server='my.server.com'
sftp_path='.'
####################################################################
# SSH Tunnel config
# you can log in either by RSA key or entering the pass below
####################################################################
remote_tunnel_port=''
remote_tunnel_host='my.server.com'
remote_tunnel_user='username'
remote_tunnel_pass='password'
####################################################################
# Amazon S3 keys
####################################################################
s3_access_key_id=''
s3_secret_access_key=''
s3_bucket_name=''
####################################################################
# if you have any questions please visit preyproject.com
####################################################################