transport.conf.in 6.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237
  1. [transport]
  2. START_ON_DEMAND = @START_ON_DEMAND@
  3. @JAVAPORT@PORT = 2091
  4. HOSTNAME = localhost
  5. BINARY = gnunet-service-transport
  6. # PREFIX = valgrind
  7. # Maximum number of neighbours PER PLUGIN (not in total).
  8. NEIGHBOUR_LIMIT = 50
  9. ACCEPT_FROM = 127.0.0.1;
  10. ACCEPT_FROM6 = ::1;
  11. # TCP is the only transport plugin known to work "reliably"
  12. PLUGINS = tcp
  13. UNIXPATH = $GNUNET_RUNTIME_DIR/gnunet-service-transport.sock
  14. BLACKLIST_FILE = $GNUNET_CONFIG_HOME/transport/blacklist
  15. UNIX_MATCH_UID = NO
  16. UNIX_MATCH_GID = YES
  17. # DISABLE_SOCKET_FORWARDING = NO
  18. # USERNAME =
  19. # MAXBUF =
  20. # TIMEOUT =
  21. # DISABLEV6 =
  22. # BINDTO =
  23. # REJECT_FROM =
  24. # REJECT_FROM6 =
  25. # PREFIX = valgrind --leak-check=full
  26. # Configuration settings related to traffic manipulation for testing purposes
  27. # Distance
  28. # MANIPULATE_DISTANCE_IN = 1
  29. # MANIPULATE_DISTANCE_OUT = 1
  30. # Delay; WARNING: to large values may lead to peers not connecting!
  31. # MANIPULATE_DELAY_IN = 1 ms
  32. # MANIPULATE_DELAY_OUT = 1 ms
  33. [transport-unix]
  34. UNIXPATH = $GNUNET_RUNTIME_DIR/gnunet-transport-plugin-unix.sock
  35. TESTING_IGNORE_KEYS = ACCEPT_FROM;
  36. [transport-tcp]
  37. # Use 0 to ONLY advertise as a peer behind NAT (no port binding)
  38. PORT = 2086
  39. # Obsolete option, to be replaced by HOLE_EXTERNAL (soon)
  40. ADVERTISED_PORT = 2086
  41. # If we have a manually punched NAT, what is the external IP and port?
  42. # Can use DNS names for DynDNS-based detection of external IP.
  43. # Can use IPv6 addresses ([fefc::]:PORT).
  44. # Use "AUTO" for the hostname to automatically detect external IP.
  45. # Do not set if NAT is not manually punched.
  46. # HOLE_EXTERNAL = AUTO:2086
  47. TESTING_IGNORE_KEYS = ACCEPT_FROM;
  48. # Maximum number of open TCP connections allowed
  49. MAX_CONNECTIONS = 128
  50. TIMEOUT = 5 s
  51. # ACCEPT_FROM =
  52. # ACCEPT_FROM6 =
  53. # REJECT_FROM =
  54. # REJECT_FROM6 =
  55. # BINDTO =
  56. MAX_CONNECTIONS = 128
  57. # Enable TCP stealth?
  58. TCP_STEALTH = NO
  59. [transport-xt]
  60. # Use 0 to ONLY advertise as a peer behind NAT (no port binding)
  61. PORT = 2087
  62. # Obsolete option, to be replaced by HOLE_EXTERNAL (soon)
  63. ADVERTISED_PORT = 2087
  64. # If we have a manually punched NAT, what is the external IP and port?
  65. # Can use DNS names for DynDNS-based detection of external IP.
  66. # Can use IPv6 addresses ([fefc::]:PORT).
  67. # Use "AUTO" for the hostname to automatically detect external IP.
  68. # Do not set if NAT is not manually punched.
  69. # HOLE_EXTERNAL = AUTO:2087
  70. TESTING_IGNORE_KEYS = ACCEPT_FROM;
  71. # Maximum number of open TCP connections allowed
  72. MAX_CONNECTIONS = 128
  73. TIMEOUT = 5 s
  74. # ACCEPT_FROM =
  75. # ACCEPT_FROM6 =
  76. # REJECT_FROM =
  77. # REJECT_FROM6 =
  78. # BINDTO =
  79. MAX_CONNECTIONS = 128
  80. # Enable TCP stealth?
  81. TCP_STEALTH = NO
  82. [transport-udp]
  83. # Use PORT = 0 to autodetect a port available
  84. PORT = 2086
  85. BROADCAST = YES
  86. BROADCAST_RECEIVE = YES
  87. BROADCAST_INTERVAL = 30 s
  88. # This limits UDP to 1MB/s for SENDING. Higher values are advised
  89. # for benchmarking or well-connected systems. Note that this quota
  90. # applies IN ADDITION to the system-wide transport-wide WAN/LAN
  91. # quotas.
  92. MAX_BPS = 1000000
  93. TESTING_IGNORE_KEYS = ACCEPT_FROM;
  94. # If we have a manually punched NAT, what is the external IP and port?
  95. # Can use DNS names for DynDNS-based detection of external IP.
  96. # Can use IPv6 addresses ([fefc::]:PORT).
  97. # Use "AUTO" for the hostname to automatically detect external IP.
  98. # Do not set if NAT is not manually punched.
  99. # HOLE_EXTERNAL = AUTO:2086
  100. [transport-xu]
  101. # Use PORT = 0 to autodetect a port available
  102. PORT = 2087
  103. [transport-http_client]
  104. MAX_CONNECTIONS = 128
  105. TESTING_IGNORE_KEYS = ACCEPT_FROM;
  106. # Hostname or IP of proxy server
  107. # PROXY =
  108. # User name for proxy server
  109. # PROXY_USERNAME =
  110. # User password for proxy server
  111. # PROXY_PASSWORD =
  112. # Type of proxy server,
  113. # Valid values: HTTP, SOCKS4, SOCKS5, SOCKS4A, SOCKS5_HOSTNAME
  114. # Default: HTTP
  115. # PROXY_TYPE = HTTP
  116. # Enable tunneling proxy request instead of having proxy server evaluate it
  117. # Experimental, default: NO
  118. # PROXY_HTTP_TUNNELING = NO
  119. [transport-http_server]
  120. #EXTERNAL_HOSTNAME = <your hostname/path>
  121. PORT = 1080
  122. # Obsolete option, to be replaced by HOLE_EXTERNAL (soon)
  123. ADVERTISED_PORT = 1080
  124. # If we have a manually punched NAT, what is the external IP and port?
  125. # Can use DNS names for DynDNS-based detection of external IP.
  126. # Can use IPv6 addresses ([fefc::]:PORT).
  127. # Use "AUTO" for the hostname to automatically detect external IP.
  128. # Do not set if NAT is not manually punched.
  129. # HOLE_EXTERNAL = AUTO:1080
  130. MAX_CONNECTIONS = 128
  131. TESTING_IGNORE_KEYS = ACCEPT_FROM;
  132. # Enable TCP stealth?
  133. TCP_STEALTH = NO
  134. [transport-https_client]
  135. MAX_CONNECTIONS = 128
  136. TESTING_IGNORE_KEYS = ACCEPT_FROM;
  137. # Hostname or IP of proxy server
  138. # PROXY =
  139. # User name for proxy server
  140. # PROXY_USERNAME =
  141. # User password for proxy server
  142. # PROXY_PASSWORD =
  143. # Type of proxy server,
  144. # Valid values: HTTP, SOCKS4, SOCKS5, SOCKS4A, SOCKS5_HOSTNAME
  145. # Default: HTTP
  146. # PROXY_TYPE = HTTP
  147. # Enable tunneling proxy request instead of having proxy server evaluate it
  148. # Experimental, default: NO
  149. # PROXY_HTTP_TUNNELING = NO
  150. [transport-https_server]
  151. # EXTERNAL_HOSTNAME = <your hostname/path>
  152. # EXTERNAL_HOSTNAME_ONLY = YES
  153. # If you have a valid SSL certificate for your external hostname tell,
  154. # clients to verify it
  155. # VERIFY_EXTERNAL_HOSTNAME = YES
  156. # Does the external hostname use the same port?
  157. # EXTERNAL_HOSTNAME_USE_PORT = YES
  158. PORT = 4433
  159. # Obsolete option, to be replaced by HOLE_EXTERNAL (soon)
  160. ADVERTISED_PORT = 4433
  161. # If we have a manually punched NAT, what is the external IP and port?
  162. # Can use DNS names for DynDNS-based detection of external IP.
  163. # Can use IPv6 addresses ([fefc::]:PORT).
  164. # Use "AUTO" for the hostname to automatically detect external IP.
  165. # Do not set if NAT is not manually punched.
  166. # HOLE_EXTERNAL = AUTO:4433
  167. CRYPTO_INIT = NORMAL
  168. KEY_FILE = $GNUNET_DATA_HOME/transport/https.key
  169. CERT_FILE = $GNUNET_DATA_HOME/transport/https.cert
  170. MAX_CONNECTIONS = 128
  171. TESTING_IGNORE_KEYS = ACCEPT_FROM;
  172. # Enable TCP stealth?
  173. TCP_STEALTH = NO
  174. [transport-wlan]
  175. # Name of the interface in monitor mode (typically monX)
  176. INTERFACE = mon0
  177. # Real hardware, no testing
  178. TESTMODE = 0
  179. TESTING_IGNORE_KEYS = ACCEPT_FROM;
  180. [transport-bluetooth]
  181. # Name of the interface (typically hciX)
  182. INTERFACE = hci0
  183. # Real hardware, no testing
  184. TESTMODE = 0
  185. TESTING_IGNORE_KEYS = ACCEPT_FROM;