Source code of Windows XP (NT5)
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

353 lines
13 KiB

  1. //
  2. // This is the default hive definition for the Web server
  3. //
  4. \registry\machine
  5. SYSTEM
  6. CurrentControlSet
  7. Services
  8. InetInfo
  9. Parameters
  10. //
  11. // This is maximum size of the shared memory cache
  12. //
  13. MemoryCacheSize = REG_DWORD 512000
  14. //
  15. // This is the maximum number of outstanding listens
  16. // to backlog. Each entry costs 1k of physical RAM
  17. // and 16k of quota.
  18. //
  19. ListenBacklog = REG_DWORD 15
  20. MimeMap
  21. //
  22. // MIME mappings are in the form of:
  23. //
  24. // <mime type>,<file extension>,<image file>,<gopher type>
  25. //
  26. // There must not white space between the commas
  27. //
  28. // Note: We really want a Multi-SZ here, but
  29. // Chicago doesn't support it
  30. //
  31. // This list is used for both directory browsing
  32. // *and* processing client HTTP Accept: headers
  33. //
  34. //
  35. // Default mapping type uses "*" for the
  36. // file extension
  37. //
  38. text/plain,*,/images/default.gif,1 =
  39. application/wav,wav,/images/sound.gif,1 =
  40. application/zip,zip,/images/binary.gif,1 =
  41. application/rtf,rtf,/images/doc.gif,1 =
  42. application/postscript,ps,/images/image.gif,1 =
  43. application/msword,doc,/images/doc.gif,1 =
  44. text/html,html,/images/doc.gif,1 =
  45. text/html,htm,/images/doc.gif,1 =
  46. text/html,stm,/images/doc.gif,1 =
  47. text/plain,txt,/images/doc.gif,1 =
  48. image/gif,gif,/images/image.gif,1 =
  49. image/jpeg,jpeg,/images/image.gif,1 =
  50. image/jpeg,jpg,/images/image.gif,1 =
  51. image/tiff,tiff,/images/image.gif,1 =
  52. image/tiff,tif,/images/image.gif,1 =
  53. video/mpeg,mpeg,/images/video.gif,1 =
  54. video/mpeg,mpg,/images/video.gif,1 =
  55. video/avi,avi,/images/video.gif,1 =
  56. audio/basic,au,/images/sound.gif,1 =
  57. W3Svc
  58. //
  59. // These shouldn't need to be changed
  60. //
  61. DependOnGroup = REG_MULTI_SZ
  62. DependOnService = REG_MULTI_SZ TCPIP
  63. DisplayName = REG_SZ Microsoft HTTP World Wide Web Server
  64. ErrorControl = REG_DWORD 0x1
  65. ImagePath = REG_EXPAND_SZ %SystemRoot%\system32\inetsvcs.exe
  66. ObjectName = REG_SZ LocalSystem
  67. Start = REG_DWORD 0x3
  68. Type = REG_DWORD 0x20
  69. //
  70. // W3 parameters are kept under the parameters key
  71. //
  72. Parameters
  73. AdminName = Administrator Name
  74. AdminEmail = [email protected]
  75. ServerComment = Server Comment
  76. //
  77. // Maximum number of simultaneous connections allowed
  78. //
  79. MaxConnections = REG_DWORD 2000
  80. //
  81. // Location of the log file
  82. //
  83. LogFileDirectory = %SystemRoot%
  84. //
  85. // Operation of the log file
  86. //
  87. // No log file = 0
  88. // Log to periodic file = 1
  89. // Log to SQL = 2
  90. //
  91. LogType = REG_DWORD 1
  92. //
  93. // If type is Log to periodic file, the period can be:
  94. //
  95. // No period = 0
  96. // Daily = 1
  97. // Weekly = 2
  98. // Monthly = 3
  99. //
  100. LogFilePeriod = REG_DWORD 3
  101. //
  102. // The maximum size of the log file (in bytes)
  103. //
  104. LogFileTruncateSize = REG_DWORD 5000000
  105. //
  106. // Values if logging to SQL are selected
  107. //
  108. LogSqlDataSource = HTTPLog
  109. LogSqlTableName = InternetLog
  110. LogSqlUserName = InternetAdmin
  111. LogSqlPassword = sqllog
  112. //
  113. // Authentication control
  114. //
  115. // if only anonymous, then
  116. // Ignore all authentication information and force
  117. // users to the anonymous token
  118. //
  119. // if anonymous and Basic or NT then
  120. // Authorize using Basic or NT (denies if bad
  121. // username/password), force all others to the
  122. // anonymous token
  123. //
  124. // if only Basic or NT then
  125. // Basic or NT authentication is required,
  126. // anonymous/unknown authentication is denied access
  127. //
  128. //
  129. // Allow anonymous = 0x00000001
  130. // Allow Basic = 0x00000002
  131. // Allow NT = 0x00000004
  132. //
  133. Authorization = REG_DWORD 0x00000007
  134. //
  135. // The account anonymous connections are impersonated
  136. // as and UNC connections are connected with. The password
  137. // is stored as an LSA secret
  138. //
  139. AnonymousUserName = Guest
  140. //
  141. // Comma separated list of NT authentication packages to
  142. // return to clients when access is denied and NT auth.
  143. // is allowed
  144. //
  145. NTAuthenticationProviders = NTLM
  146. //
  147. // IP Based security keys
  148. //
  149. // The first value is the network mask, the second value
  150. // is the network number.
  151. //
  152. // The incoming IP address is "anded" with the mask, then
  153. // compared to the network number. If the network number
  154. // matches then the connection is accepted or rejected.
  155. //
  156. Deny IP List
  157. //255.255.255.255 101.12.15.63 =
  158. Grant IP List
  159. //255.255.0.0 101.12.0.0 =
  160. //
  161. // Virtual Volumes
  162. //
  163. // The first value is the symbolic link for the physical
  164. // directory specified by the second value.
  165. //
  166. // If an IP address is specified, then the root applies
  167. // to the locally connected IP address (machine must
  168. // be multi-homed). No space can be on either side of
  169. // the comma. The virtual root permissions are the last
  170. // component, it consists of a bit mask where:
  171. //
  172. // 0x1 = Read
  173. // 0x2 = Write
  174. // 0x4 = Execute
  175. // 0x8 = SSL Access required
  176. //
  177. Virtual Roots
  178. / = e:\webroot,,7
  179. // /Root1/ = d:\OtherRoot\,,7
  180. // /,127.0.0.1 = e:\root2,,7
  181. // /unc = \\server\share\dir,UserName,F
  182. //
  183. // Everything below here is HTTP Server Specific
  184. //
  185. //
  186. // Maps extensions to their corresponding binary
  187. //
  188. // The first %s is the path info
  189. // The second %s are the params from the URL
  190. //
  191. Script Map
  192. pl = d:\webbin\perl.exe
  193. bat = d:\webbin\cmd.exe /k %s %s
  194. cmd = d:\webbin\cmd.exe /k %s %s
  195. wdg = d:\webbin\httpodbc.dll
  196. //
  197. // If a get request is made on a directory and
  198. // the default file exists in the directory,
  199. // then auto load this file if "Load Default File"
  200. // is set in the Dir Browse Control flags
  201. //
  202. Default Load File = REG_SZ Default.htm
  203. //
  204. // Browsing display control
  205. //
  206. // Show Date = 0x00000002
  207. // Show Time = 0x00000004
  208. // Show Size = 0x00000008
  209. // Show Ext. = 0x00000010
  210. // Display long date = 0x00000020
  211. //
  212. // Allow client to browse directories?
  213. //
  214. // Enabled = 0x80000000
  215. //
  216. // If this bit is set, then load the file specified
  217. // by "Default Load File" if it is in a directory to
  218. // be browsed
  219. //
  220. // Load Default File = 0x40000000
  221. //
  222. Dir Browse Control = REG_DWORD 0xC000001e
  223. //
  224. // If the request is a "GET", the object being retrieved
  225. // has the same name (minus extension) as the WAIS data-
  226. // base and there are search strings, spawn Waislook with
  227. // the database (name of object minus extension). This
  228. // provides compatibility with EMWAC's HTTP server.
  229. //
  230. CheckForWAISDB = REG_DWORD 1
  231. //
  232. // For tracing debug output
  233. //
  234. // Output to debugger= 0x40000000
  235. // Output to logfile = 0x80000000
  236. //
  237. DebugFlags = REG_DWORD 0x00000000
  238. //
  239. // The URL of the image to display next to directory
  240. // entries when doing a directory listing. This is
  241. // similar to the image specified in the MIME Mapping
  242. // list
  243. //
  244. Directory Image = /images/dir.gif
  245. //
  246. // Installable filter dlls that can be used to implement
  247. // custom authentication, encryption or signing services.
  248. //
  249. // The list is a comma seperated list of fully qualified
  250. // paths to filter dlls. The server calls the dlls
  251. // in the order they are specified in the list.
  252. //
  253. //Filter DLLs = c:\http\filter1.dll,c:\http\filter2.dll
  254. //
  255. // Puts the server in Proxy Mode if set to 1
  256. //
  257. ServerAsProxy = REG_DWORD 0
  258. //
  259. // This is the time a CGI script is allowed to run. If
  260. // it hangs out longer then this without any output then
  261. // the server kills the process. Specified in seconds,
  262. // default is 15 minutes.
  263. //
  264. ScriptTimeout = REG_DWORD 900
  265. //
  266. // If one, then DLL extensions are cached the first
  267. // time they are used. One is the default value.
  268. //
  269. CacheExtensions = REG_DWORD 1
  270. //
  271. // Controls whether server side includes are enabled and
  272. // what extension to look for if they are
  273. //
  274. ServerSideIncludesEnabled = REG_DWORD 1
  275. ServerSideIncludesExtension = .stm
  276. //
  277. // The time in seconds of the global expiration header
  278. //
  279. // Set to 0xffffffff for no expiration header
  280. //
  281. GlobalExpire = REG_DWORD 0xffffffff
  282.