1 # Hiawatha main configuration file
10 SystemLogfile = /var/log/hiawatha/system.log
11 GarbageLogfile = /var/log/hiawatha/garbage.log
15 # A binding is where a client can connect to.
19 # Interface = 127.0.0.1
21 # TimeForRequest = 3,20
28 # TimeForRequest = 3,20
29 # ServerKey = hiawatha.pem
35 # Deny service to clients who misbehave.
39 #BanOnMaxReqSize = 300
44 # COMMON GATEWAY INTERFACE (CGI) SETTINGS
45 # These settings can be used to run CGI applications. Use the 'php-fcgi'
46 # tool to start PHP as a FastCGI daemon.
48 #CGIhandler = /usr/bin/php-cgi:php
49 #CGIhandler = /usr/bin/perl:pl
50 #CGIhandler = /usr/bin/python:py
55 # ConnectTo = 127.0.0.1:2004
56 # Extension = php, php4
61 # ConnectTo = 10.0.0.100:2005, 10.0.0.101:2005
62 # Extension = php, php5
68 # These URL toolkit rules are made for the Skeleton PHP framework,
69 # which can be downloaded from: http://skeleton.leisink.org/
72 # ToolkitID = skeleton
74 # RequestURI isfile Exit
75 # Match (.*)\?(.*) Rewrite $1&$2
76 # Match /(.*) Rewrite /index.php?page=$1
81 # It is wise to use your IP address as the hostname of the default website
82 # and give it a blank webpage. By doing so, automated webscanners won't find
83 # your possible vulnerable website.
87 StartFile = index.html
88 AccessLogfile = /var/log/hiawatha/access.log
89 ErrorLogfile = /var/log/hiawatha/error.log
90 #ErrorHandler = 404:/error.cgi
94 # Use a VirtualHost section to declare the websites you want to host.
97 # Hostname = www.my-domain.com
98 # WebsiteRoot = /var/www/my-domain/public
99 # StartFile = index.php
100 # AccessLogfile = /var/www/my-domain/log/access.log
101 # ErrorLogfile = /var/www/my-domain/log/error.log
109 # You can specify some settings per directory.
112 # Path = /home/baduser