Source code of Windows XP (NT5)
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

354 lines
13 KiB

//
// This is the default hive definition for the Web server
//
\registry\machine
SYSTEM
CurrentControlSet
Services
InetInfo
Parameters
//
// This is maximum size of the shared memory cache
//
MemoryCacheSize = REG_DWORD 512000
//
// This is the maximum number of outstanding listens
// to backlog. Each entry costs 1k of physical RAM
// and 16k of quota.
//
ListenBacklog = REG_DWORD 15
MimeMap
//
// MIME mappings are in the form of:
//
// <mime type>,<file extension>,<image file>,<gopher type>
//
// There must not white space between the commas
//
// Note: We really want a Multi-SZ here, but
// Chicago doesn't support it
//
// This list is used for both directory browsing
// *and* processing client HTTP Accept: headers
//
//
// Default mapping type uses "*" for the
// file extension
//
text/plain,*,/images/default.gif,1 =
application/wav,wav,/images/sound.gif,1 =
application/zip,zip,/images/binary.gif,1 =
application/rtf,rtf,/images/doc.gif,1 =
application/postscript,ps,/images/image.gif,1 =
application/msword,doc,/images/doc.gif,1 =
text/html,html,/images/doc.gif,1 =
text/html,htm,/images/doc.gif,1 =
text/html,stm,/images/doc.gif,1 =
text/plain,txt,/images/doc.gif,1 =
image/gif,gif,/images/image.gif,1 =
image/jpeg,jpeg,/images/image.gif,1 =
image/jpeg,jpg,/images/image.gif,1 =
image/tiff,tiff,/images/image.gif,1 =
image/tiff,tif,/images/image.gif,1 =
video/mpeg,mpeg,/images/video.gif,1 =
video/mpeg,mpg,/images/video.gif,1 =
video/avi,avi,/images/video.gif,1 =
audio/basic,au,/images/sound.gif,1 =
W3Svc
//
// These shouldn't need to be changed
//
DependOnGroup = REG_MULTI_SZ
DependOnService = REG_MULTI_SZ TCPIP
DisplayName = REG_SZ Microsoft HTTP World Wide Web Server
ErrorControl = REG_DWORD 0x1
ImagePath = REG_EXPAND_SZ %SystemRoot%\system32\inetsvcs.exe
ObjectName = REG_SZ LocalSystem
Start = REG_DWORD 0x3
Type = REG_DWORD 0x20
//
// W3 parameters are kept under the parameters key
//
Parameters
AdminName = Administrator Name
AdminEmail = [email protected]
ServerComment = Server Comment
//
// Maximum number of simultaneous connections allowed
//
MaxConnections = REG_DWORD 2000
//
// Location of the log file
//
LogFileDirectory = %SystemRoot%
//
// Operation of the log file
//
// No log file = 0
// Log to periodic file = 1
// Log to SQL = 2
//
LogType = REG_DWORD 1
//
// If type is Log to periodic file, the period can be:
//
// No period = 0
// Daily = 1
// Weekly = 2
// Monthly = 3
//
LogFilePeriod = REG_DWORD 3
//
// The maximum size of the log file (in bytes)
//
LogFileTruncateSize = REG_DWORD 5000000
//
// Values if logging to SQL are selected
//
LogSqlDataSource = HTTPLog
LogSqlTableName = InternetLog
LogSqlUserName = InternetAdmin
LogSqlPassword = sqllog
//
// Authentication control
//
// if only anonymous, then
// Ignore all authentication information and force
// users to the anonymous token
//
// if anonymous and Basic or NT then
// Authorize using Basic or NT (denies if bad
// username/password), force all others to the
// anonymous token
//
// if only Basic or NT then
// Basic or NT authentication is required,
// anonymous/unknown authentication is denied access
//
//
// Allow anonymous = 0x00000001
// Allow Basic = 0x00000002
// Allow NT = 0x00000004
//
Authorization = REG_DWORD 0x00000007
//
// The account anonymous connections are impersonated
// as and UNC connections are connected with. The password
// is stored as an LSA secret
//
AnonymousUserName = Guest
//
// Comma separated list of NT authentication packages to
// return to clients when access is denied and NT auth.
// is allowed
//
NTAuthenticationProviders = NTLM
//
// IP Based security keys
//
// The first value is the network mask, the second value
// is the network number.
//
// The incoming IP address is "anded" with the mask, then
// compared to the network number. If the network number
// matches then the connection is accepted or rejected.
//
Deny IP List
//255.255.255.255 101.12.15.63 =
Grant IP List
//255.255.0.0 101.12.0.0 =
//
// Virtual Volumes
//
// The first value is the symbolic link for the physical
// directory specified by the second value.
//
// If an IP address is specified, then the root applies
// to the locally connected IP address (machine must
// be multi-homed). No space can be on either side of
// the comma. The virtual root permissions are the last
// component, it consists of a bit mask where:
//
// 0x1 = Read
// 0x2 = Write
// 0x4 = Execute
// 0x8 = SSL Access required
//
Virtual Roots
/ = e:\webroot,,7
// /Root1/ = d:\OtherRoot\,,7
// /,127.0.0.1 = e:\root2,,7
// /unc = \\server\share\dir,UserName,F
//
// Everything below here is HTTP Server Specific
//
//
// Maps extensions to their corresponding binary
//
// The first %s is the path info
// The second %s are the params from the URL
//
Script Map
pl = d:\webbin\perl.exe
bat = d:\webbin\cmd.exe /k %s %s
cmd = d:\webbin\cmd.exe /k %s %s
wdg = d:\webbin\httpodbc.dll
//
// If a get request is made on a directory and
// the default file exists in the directory,
// then auto load this file if "Load Default File"
// is set in the Dir Browse Control flags
//
Default Load File = REG_SZ Default.htm
//
// Browsing display control
//
// Show Date = 0x00000002
// Show Time = 0x00000004
// Show Size = 0x00000008
// Show Ext. = 0x00000010
// Display long date = 0x00000020
//
// Allow client to browse directories?
//
// Enabled = 0x80000000
//
// If this bit is set, then load the file specified
// by "Default Load File" if it is in a directory to
// be browsed
//
// Load Default File = 0x40000000
//
Dir Browse Control = REG_DWORD 0xC000001e
//
// If the request is a "GET", the object being retrieved
// has the same name (minus extension) as the WAIS data-
// base and there are search strings, spawn Waislook with
// the database (name of object minus extension). This
// provides compatibility with EMWAC's HTTP server.
//
CheckForWAISDB = REG_DWORD 1
//
// For tracing debug output
//
// Output to debugger= 0x40000000
// Output to logfile = 0x80000000
//
DebugFlags = REG_DWORD 0x00000000
//
// The URL of the image to display next to directory
// entries when doing a directory listing. This is
// similar to the image specified in the MIME Mapping
// list
//
Directory Image = /images/dir.gif
//
// Installable filter dlls that can be used to implement
// custom authentication, encryption or signing services.
//
// The list is a comma seperated list of fully qualified
// paths to filter dlls. The server calls the dlls
// in the order they are specified in the list.
//
//Filter DLLs = c:\http\filter1.dll,c:\http\filter2.dll
//
// Puts the server in Proxy Mode if set to 1
//
ServerAsProxy = REG_DWORD 0
//
// This is the time a CGI script is allowed to run. If
// it hangs out longer then this without any output then
// the server kills the process. Specified in seconds,
// default is 15 minutes.
//
ScriptTimeout = REG_DWORD 900
//
// If one, then DLL extensions are cached the first
// time they are used. One is the default value.
//
CacheExtensions = REG_DWORD 1
//
// Controls whether server side includes are enabled and
// what extension to look for if they are
//
ServerSideIncludesEnabled = REG_DWORD 1
ServerSideIncludesExtension = .stm
//
// The time in seconds of the global expiration header
//
// Set to 0xffffffff for no expiration header
//
GlobalExpire = REG_DWORD 0xffffffff