#Allow 127.0.0.1 #Deny 0/0 # GFI WebMonitor-handling plugin parameters, disabled by default #ISAScannerSize 1024 #ISAScannerAgent Wget/ #ISAScannerAgent APT-HTTP/ #ISAScannerAgent Yum/ # Headers which should be replaced if present in the request #Header User-Agent: Mozilla/4.0 (compatible MSIE 5.5 Windows 98) # Tunnels mapping local port to a machine behind the proxy. #Auth LM #Flags 0x06820000 # Enable to allow access from other computers #Gateway yes # Useful in Gateway mode to allow/restrict certain IPs # Specifiy individual IPs or subnets one rule per line. I won't have it's usage on my # conscience. # This example is the most universal setup known to man, but it # uses the weakest hash ever. # Default is to use the only secure hash, NTLMv2, but it is not # as available as the older stuff. #SOCKS5Proxy 8010 #SOCKS5User dave:password # Use -M first to detect the best NTLM settings for your proxy. SOCKS5User # can be used repeatedly for a whole bunch of individual accounts. # WARNING: The service accepts all requests, unless you use # SOCKS5User and make authentication mandatory. It can be used several times # to have SOCKS5 on more than one port or on different network # interfaces (specify explicit source address for that).
More proxies can be defined # one per line in format : #Proxy 10.0.0.41:8080 #Proxy 10.0.0.42:8080 # MY CORPORATE PROXY Proxy :8080 Proxy :8080 # List addresses you do not want to pass to parent proxies # * and ? wildcards can be used # NoProxy localhost, 127.0.0.*, 10.*, 192.168.* # Specify the port cntlm will listen on # You can bind cntlm to specific interface by specifying # the appropriate IP address also in format : # Cntlm listens on 127.0.0.1:3128 by default # Listen 3128 # If you wish to use the SOCKS5 proxy feature as well, uncomment # the following option. # Workstation netbios_hostname # List of parent proxies to use. # See cntlm man page # Example secure config shown below. You can use a "cntlm -M" and "cntlm -H" # command sequence to get the right config for your environment.
#EDGE FOR OS X PASSWORD#
# Username Domain #Password password # NOTE: Use plaintext password only at your own risk # Use hashes instead. Use 0600 perms if you use plaintext password. # Cntlm Corporate Authentication Proxy Configuration # Olivier HO-A-CHUCK (olivier hoachuck at gmail dot com) # NOTE: all values are parsed literally, do NOT escape spaces, # do not quote. By default when installed from homebrew I beleive the config file is in: /usr/local/etc/nf otherwise it might be in /etc/nf depending of your compilation settings.
#EDGE FOR OS X INSTALL#
Personaly I have installed it with homebrew: brew install cntlm
But in mosts cases (in particular under linux platforms) you would probably get if from, uncompress the downloaded package and run. I haven’t installed myself cntlm by compiling it. Whenever you request a TCP/IP connexion it will play for you your NTML proxy authentication. It’s role is to stands between your applications and your corporate proxy server. In short, cntlm is fully written in C and have no dependencies. If you are this guy (girls included), I have a solution for you: cntlm.
#EDGE FOR OS X MAC#
If you are the kind of mac user that use command line tools in Terminal and work behind an Office NTLM proxy, it’s almost sure that from times to times you unplug your ethernet adaptor to get connected to Wifi just for being able to do “git clone something” or “brew install somestuff”!