123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237 |
- [transport]
- START_ON_DEMAND = @START_ON_DEMAND@
- @JAVAPORT@PORT = 2091
- HOSTNAME = localhost
- BINARY = gnunet-service-transport
- # PREFIX = valgrind
- # Maximum number of neighbours PER PLUGIN (not in total).
- NEIGHBOUR_LIMIT = 50
- ACCEPT_FROM = 127.0.0.1;
- ACCEPT_FROM6 = ::1;
- # TCP is the only transport plugin known to work "reliably"
- PLUGINS = tcp
- UNIXPATH = $GNUNET_RUNTIME_DIR/gnunet-service-transport.sock
- BLACKLIST_FILE = $GNUNET_CONFIG_HOME/transport/blacklist
- UNIX_MATCH_UID = NO
- UNIX_MATCH_GID = YES
- # DISABLE_SOCKET_FORWARDING = NO
- # USERNAME =
- # MAXBUF =
- # TIMEOUT =
- # DISABLEV6 =
- # BINDTO =
- # REJECT_FROM =
- # REJECT_FROM6 =
- # PREFIX = valgrind --leak-check=full
- # Configuration settings related to traffic manipulation for testing purposes
- # Distance
- # MANIPULATE_DISTANCE_IN = 1
- # MANIPULATE_DISTANCE_OUT = 1
- # Delay; WARNING: to large values may lead to peers not connecting!
- # MANIPULATE_DELAY_IN = 1 ms
- # MANIPULATE_DELAY_OUT = 1 ms
- [transport-unix]
- UNIXPATH = $GNUNET_RUNTIME_DIR/gnunet-transport-plugin-unix.sock
- TESTING_IGNORE_KEYS = ACCEPT_FROM;
- [transport-tcp]
- # Use 0 to ONLY advertise as a peer behind NAT (no port binding)
- PORT = 2086
- # Obsolete option, to be replaced by HOLE_EXTERNAL (soon)
- ADVERTISED_PORT = 2086
- # If we have a manually punched NAT, what is the external IP and port?
- # Can use DNS names for DynDNS-based detection of external IP.
- # Can use IPv6 addresses ([fefc::]:PORT).
- # Use "AUTO" for the hostname to automatically detect external IP.
- # Do not set if NAT is not manually punched.
- # HOLE_EXTERNAL = AUTO:2086
- TESTING_IGNORE_KEYS = ACCEPT_FROM;
- # Maximum number of open TCP connections allowed
- MAX_CONNECTIONS = 128
- TIMEOUT = 5 s
- # ACCEPT_FROM =
- # ACCEPT_FROM6 =
- # REJECT_FROM =
- # REJECT_FROM6 =
- # BINDTO =
- MAX_CONNECTIONS = 128
- # Enable TCP stealth?
- TCP_STEALTH = NO
- [transport-xt]
- # Use 0 to ONLY advertise as a peer behind NAT (no port binding)
- PORT = 2087
- # Obsolete option, to be replaced by HOLE_EXTERNAL (soon)
- ADVERTISED_PORT = 2087
- # If we have a manually punched NAT, what is the external IP and port?
- # Can use DNS names for DynDNS-based detection of external IP.
- # Can use IPv6 addresses ([fefc::]:PORT).
- # Use "AUTO" for the hostname to automatically detect external IP.
- # Do not set if NAT is not manually punched.
- # HOLE_EXTERNAL = AUTO:2087
- TESTING_IGNORE_KEYS = ACCEPT_FROM;
- # Maximum number of open TCP connections allowed
- MAX_CONNECTIONS = 128
- TIMEOUT = 5 s
- # ACCEPT_FROM =
- # ACCEPT_FROM6 =
- # REJECT_FROM =
- # REJECT_FROM6 =
- # BINDTO =
- MAX_CONNECTIONS = 128
- # Enable TCP stealth?
- TCP_STEALTH = NO
- [transport-udp]
- # Use PORT = 0 to autodetect a port available
- PORT = 2086
- BROADCAST = YES
- BROADCAST_RECEIVE = YES
- BROADCAST_INTERVAL = 30 s
- # This limits UDP to 1MB/s for SENDING. Higher values are advised
- # for benchmarking or well-connected systems. Note that this quota
- # applies IN ADDITION to the system-wide transport-wide WAN/LAN
- # quotas.
- MAX_BPS = 1000000
- TESTING_IGNORE_KEYS = ACCEPT_FROM;
- # If we have a manually punched NAT, what is the external IP and port?
- # Can use DNS names for DynDNS-based detection of external IP.
- # Can use IPv6 addresses ([fefc::]:PORT).
- # Use "AUTO" for the hostname to automatically detect external IP.
- # Do not set if NAT is not manually punched.
- # HOLE_EXTERNAL = AUTO:2086
- [transport-xu]
- # Use PORT = 0 to autodetect a port available
- PORT = 2087
- [transport-http_client]
- MAX_CONNECTIONS = 128
- TESTING_IGNORE_KEYS = ACCEPT_FROM;
- # Hostname or IP of proxy server
- # PROXY =
- # User name for proxy server
- # PROXY_USERNAME =
- # User password for proxy server
- # PROXY_PASSWORD =
- # Type of proxy server,
- # Valid values: HTTP, SOCKS4, SOCKS5, SOCKS4A, SOCKS5_HOSTNAME
- # Default: HTTP
- # PROXY_TYPE = HTTP
- # Enable tunneling proxy request instead of having proxy server evaluate it
- # Experimental, default: NO
- # PROXY_HTTP_TUNNELING = NO
- [transport-http_server]
- #EXTERNAL_HOSTNAME = <your hostname/path>
- PORT = 1080
- # Obsolete option, to be replaced by HOLE_EXTERNAL (soon)
- ADVERTISED_PORT = 1080
- # If we have a manually punched NAT, what is the external IP and port?
- # Can use DNS names for DynDNS-based detection of external IP.
- # Can use IPv6 addresses ([fefc::]:PORT).
- # Use "AUTO" for the hostname to automatically detect external IP.
- # Do not set if NAT is not manually punched.
- # HOLE_EXTERNAL = AUTO:1080
- MAX_CONNECTIONS = 128
- TESTING_IGNORE_KEYS = ACCEPT_FROM;
- # Enable TCP stealth?
- TCP_STEALTH = NO
- [transport-https_client]
- MAX_CONNECTIONS = 128
- TESTING_IGNORE_KEYS = ACCEPT_FROM;
- # Hostname or IP of proxy server
- # PROXY =
- # User name for proxy server
- # PROXY_USERNAME =
- # User password for proxy server
- # PROXY_PASSWORD =
- # Type of proxy server,
- # Valid values: HTTP, SOCKS4, SOCKS5, SOCKS4A, SOCKS5_HOSTNAME
- # Default: HTTP
- # PROXY_TYPE = HTTP
- # Enable tunneling proxy request instead of having proxy server evaluate it
- # Experimental, default: NO
- # PROXY_HTTP_TUNNELING = NO
- [transport-https_server]
- # EXTERNAL_HOSTNAME = <your hostname/path>
- # EXTERNAL_HOSTNAME_ONLY = YES
- # If you have a valid SSL certificate for your external hostname tell,
- # clients to verify it
- # VERIFY_EXTERNAL_HOSTNAME = YES
- # Does the external hostname use the same port?
- # EXTERNAL_HOSTNAME_USE_PORT = YES
- PORT = 4433
- # Obsolete option, to be replaced by HOLE_EXTERNAL (soon)
- ADVERTISED_PORT = 4433
- # If we have a manually punched NAT, what is the external IP and port?
- # Can use DNS names for DynDNS-based detection of external IP.
- # Can use IPv6 addresses ([fefc::]:PORT).
- # Use "AUTO" for the hostname to automatically detect external IP.
- # Do not set if NAT is not manually punched.
- # HOLE_EXTERNAL = AUTO:4433
- CRYPTO_INIT = NORMAL
- KEY_FILE = $GNUNET_DATA_HOME/transport/https.key
- CERT_FILE = $GNUNET_DATA_HOME/transport/https.cert
- MAX_CONNECTIONS = 128
- TESTING_IGNORE_KEYS = ACCEPT_FROM;
- # Enable TCP stealth?
- TCP_STEALTH = NO
- [transport-wlan]
- # Name of the interface in monitor mode (typically monX)
- INTERFACE = mon0
- # Real hardware, no testing
- TESTMODE = 0
- TESTING_IGNORE_KEYS = ACCEPT_FROM;
- [transport-bluetooth]
- # Name of the interface (typically hciX)
- INTERFACE = hci0
- # Real hardware, no testing
- TESTMODE = 0
- TESTING_IGNORE_KEYS = ACCEPT_FROM;
|