dns hijacker code review
[oweals/gnunet.git] / src / transport / transport.conf
1 [transport]
2 AUTOSTART = YES
3 PORT = 2091
4 HOSTNAME = localhost
5 HOME = $SERVICEHOME
6 CONFIG = $DEFAULTCONFIG
7 BINARY = gnunet-service-transport
8 #PREFIX = valgrind
9 NEIGHBOUR_LIMIT = 50
10 ACCEPT_FROM = 127.0.0.1;
11 ACCEPT_FROM6 = ::1;
12 PLUGINS = tcp
13 UNIXPATH = /tmp/gnunet-service-transport.sock
14 BLACKLIST_FILE = $SERVICEHOME/blacklist
15 UNIX_MATCH_UID = YES
16 UNIX_MATCH_GID = YES
17 # DISABLE_SOCKET_FORWARDING = NO
18 # USERNAME = 
19 # MAXBUF =
20 # TIMEOUT =
21 # DISABLEV6 =
22 # BINDTO =
23 # REJECT_FROM =
24 # REJECT_FROM6 =
25 # PREFIX = valgrind --leak-check=full
26
27
28 [transport-tcp]
29 # Use 0 to ONLY advertise as a peer behind NAT (no port binding)
30 PORT = 2086
31 ADVERTISED_PORT = 2086
32
33 # Maximum number of open TCP connections allowed
34 MAX_CONNECTIONS = 128
35
36 TIMEOUT = 5 s
37 # ACCEPT_FROM =
38 # ACCEPT_FROM6 =
39 # REJECT_FROM =
40 # REJECT_FROM6 =
41 # BINDTO =
42 MAX_CONNECTIONS = 128
43
44 [transport-udp]
45 PORT = 2086
46 BROADCAST = YES
47 BROADCAST_INTERVAL = 30000
48 MAX_BPS = 1000000
49
50 [transport-http]
51 PORT = 1080
52 MAX_CONNECTIONS = 128
53
54 [transport-https]
55 PORT = 4433
56 CRYPTO_INIT = NORMAL
57 KEY_FILE = https.key
58 CERT_FILE = https.cert
59 MAX_CONNECTIONS = 128
60
61 [transport-wlan]
62 # Name of the interface in monitor mode (typically monX)
63 INTERFACE = mon0
64 # Real hardware, no testing
65 TESTMODE = 0
66