+/* These are the OPM settings.
+ * This is similar to the functionality provided by BOPM. It will scan incoming
+ * connections for open proxies by connecting to clients and attempting several
+ * different open proxy handshakes. If they connect back to us (via a dedicated
+ * listening port), and send back the data we send them, they are considered
+ * an open proxy. For politeness reasons (users may be confused by the incoming
+ * connection attempts if they are logging incoming connections), the user is
+ * notified upon connect if they are being scanned.
+ *
+ * WARNING:
+ * These settings are considered experimental. Only the most common proxy types
+ * are checked for (Charybdis is immune from POST and GET proxies). If you are
+ * not comfortable with experimental code, remove or comment out the *entire*
+ * block below to disable the proxy scanner.
+ */
+opm {
+ /* IPv4 address to listen on. This must be a publicly facing IP address
+ * to be effective.
+ * If omitted, it defaults to serverinfo::vhost.
+ */
+ #listen_ipv4 = "127.0.0.1";
+
+ /* IPv4 port to listen on.
+ * This should not be the same as any existing listeners.
+ */
+ #port_ipv4 = 32000;
+
+ /* IPv6 address to listen on. This must be a publicly facing IP address
+ * to be effective.
+ * If omitted, it defaults to serverinfo::vhost6.
+ */
+ #listen_ipv6 = "::1";
+
+ /* IPv6 port to listen on.
+ * This should not be the same as any existing listeners.
+ */
+ #port_ipv6 = 32000;
+
+ /* You can also set the listen_port directive which will set both the
+ * IPv4 and IPv6 ports at once.
+ */
+ listen_port = 32000;
+
+ /* This sets the timeout in seconds before ending open proxy scans.
+ * Values less than 1 or greater than 60 are ignored.
+ * It is advisable to keep it as short as feasible, so clients do not
+ * get held up by excessively long scan times.
+ */
+ timeout = 5;
+
+ /* These are the ports to scan for SOCKS4 proxies on. They may overlap
+ * with other scan types. Sensible defaults are given below.
+ */
+ socks4_ports = 80, 443, 1080, 8000, 8080, 10800;
+
+ /* These are the ports to scan for SOCKS5 proxies on. They may overlap
+ * with other scan types. Sensible defaults are given below.
+ */
+ socks5_ports = 80, 443, 1080, 8000, 8080, 10800;
+
+ /* These are the ports to scan for HTTP CONNECT proxies on (plaintext).
+ * They may overlap with other scan types. Sensible defaults are given
+ * below.
+ */
+ httpconnect_ports = 80, 8080, 8000;
+
+ /* These are the ports to scan for HTTPS CONNECT proxies on (SSL).
+ * They may overlap with other scan types. Sensible defaults are given
+ * below.
+ */
+ httpsconnect_ports = 443, 4443;
+};
+