# cat config.toml qmdl_store_path = "/data/rayhunter/qmdl" port = 8080 debug_mode = false colorblind_mode = false # Device selection. This will be overwritten by the installer. Defaults to "orbic". #device = "orbic" # UI Levels: # # Orbic and TP-Link with color display: # 0 = invisible mode, no indicator that rayhunter is running # 1 = Subtle mode, display a colored line at the top of the screen when rayhunter is running (green=running, white=paused, red=warnings) # 2 = Demo Mode, display a fun orca gif # 3 = display the EFF logo # 4 = High Visibility mode, fill the entire screen with the status color (green=running, white=paused, red=warnings) # # TP-Link with one-bit display: # 0 = invisible mode # 1..3 = show emoji for status. :) for running, ! for warnings, no mouth for paused. ui_level = 1 # 0 = rayhunter does not read button presses # 1 = double-tapping the power button starts new recording key_input_mode = 0 # If set, attempts to send a notification to the url when a new warning is triggered # ntfy_url = "https://ntfy.sh/your-topic" # What notification types to enable. Does nothing if the above ntfy_url is not set. enabled_notifications = ["Warning", "LowBattery"] # Disk Space Management # Minimum free space (MB) required to start recording min_space_to_start_recording_mb = 1 # Minimum free space (MB) to continue recording (stops if below this) min_space_to_continue_recording_mb = 1 # WiFi Client Mode # Toggle wifi_enabled to connect the device to an existing WiFi network. # Credentials are stored separately in wpa_sta.conf and managed via the web UI. wifi_enabled = false # DNS servers to use when WiFi client mode is active. # Defaults to ["9.9.9.9", "149.112.112.112"] (Quad9) if not specified. # dns_servers = ["9.9.9.9", "149.112.112.112"] # Device Security # Restrict outbound traffic to essential services only (DHCP, DNS, # HTTPS, and replies to inbound connections). Applies to all outbound # interfaces (WiFi and cellular). Loopback and hotspot bridge traffic # are always allowed. Defaults to true (recommended). firewall_restrict_outbound = true # Additional TCP ports to allow outbound when the firewall is active. # DHCP (67-68), DNS (53), and HTTPS (443) are always allowed. # Example: allow HTTP (80) and SSH (22). # firewall_allowed_ports = [80, 22] # Analyzer Configuration # Enable/disable specific IMSI catcher detection heuristics # See https://github.com/EFForg/rayhunter/blob/main/doc/heuristics.md for details [analyzers] imsi_requested = true connection_redirect_2g_downgrade = true lte_sib6_and_7_downgrade = true null_cipher = true nas_null_cipher = true incomplete_sib = true test_analyzer = false diagnostic_analyzer = true