2 AUTOSTART = @AUTOSTART@
5 BINARY = gnunet-service-transport
8 ACCEPT_FROM = 127.0.0.1;
11 UNIXPATH = $GNUNET_RUNTIME_DIR/gnunet-service-transport.sock
12 BLACKLIST_FILE = $GNUNET_CONFIG_HOME/transport/blacklist
15 # DISABLE_SOCKET_FORWARDING = NO
23 # PREFIX = valgrind --leak-check=full
25 # Configuration settings related to traffic manipulation for testing purposes
27 # MANIPULATE_DISTANCE_IN = 1
28 # MANIPULATE_DISTANCE_OUT = 1
29 # Delay; WARNING: to large values may lead to peers not connecting!
30 # MANIPULATE_DELAY_IN = 1 ms
31 # MANIPULATE_DELAY_OUT = 1 ms
35 UNIXPATH = $GNUNET_RUNTIME_DIR/gnunet-transport-plugin-unix.sock
36 TESTING_IGNORE_KEYS = ACCEPT_FROM;
39 # Use 0 to ONLY advertise as a peer behind NAT (no port binding)
42 # Obsolete option, to be replaced by HOLE_EXTERNAL (soon)
43 ADVERTISED_PORT = 2086
45 # If we have a manually punched NAT, what is the external IP and port?
46 # Can use DNS names for DynDNS-based detection of external IP.
47 # Can use IPv6 addresses ([fefc::]:PORT).
48 # Use "AUTO" for the hostname to automatically detect external IP.
49 # Do not set if NAT is not manually punched.
50 # HOLE_EXTERNAL = AUTO:2086
52 TESTING_IGNORE_KEYS = ACCEPT_FROM;
54 # Maximum number of open TCP connections allowed
70 # Use PORT = 0 to autodetect a port available
73 BROADCAST_RECEIVE = YES
74 BROADCAST_INTERVAL = 30 s
76 # This limits UDP to 1MB/s for SENDING. Higher values are advised
77 # for benchmarking or well-connected systems. Note that this quota
78 # applies IN ADDITION to the system-wide transport-wide WAN/LAN
81 TESTING_IGNORE_KEYS = ACCEPT_FROM;
83 # If we have a manually punched NAT, what is the external IP and port?
84 # Can use DNS names for DynDNS-based detection of external IP.
85 # Can use IPv6 addresses ([fefc::]:PORT).
86 # Use "AUTO" for the hostname to automatically detect external IP.
87 # Do not set if NAT is not manually punched.
88 # HOLE_EXTERNAL = AUTO:2086
91 [transport-http_client]
93 TESTING_IGNORE_KEYS = ACCEPT_FROM;
94 # Hostname or IP of proxy server
97 # User name for proxy server
99 # User password for proxy server
102 # Type of proxy server,
103 # Valid values: HTTP, SOCKS4, SOCKS5, SOCKS4A, SOCKS5_HOSTNAME
107 # Enable tunneling proxy request instead of having proxy server evaluate it
108 # Experimental, default: NO
109 # PROXY_HTTP_TUNNELING = NO
112 [transport-http_server]
113 #EXTERNAL_HOSTNAME = <your hostname/path>
116 # Obsolete option, to be replaced by HOLE_EXTERNAL (soon)
117 ADVERTISED_PORT = 1080
119 # If we have a manually punched NAT, what is the external IP and port?
120 # Can use DNS names for DynDNS-based detection of external IP.
121 # Can use IPv6 addresses ([fefc::]:PORT).
122 # Use "AUTO" for the hostname to automatically detect external IP.
123 # Do not set if NAT is not manually punched.
124 # HOLE_EXTERNAL = AUTO:1080
126 MAX_CONNECTIONS = 128
127 TESTING_IGNORE_KEYS = ACCEPT_FROM;
129 # Enable TCP stealth?
133 [transport-https_client]
134 MAX_CONNECTIONS = 128
135 TESTING_IGNORE_KEYS = ACCEPT_FROM;
136 # Hostname or IP of proxy server
139 # User name for proxy server
141 # User password for proxy server
144 # Type of proxy server,
145 # Valid values: HTTP, SOCKS4, SOCKS5, SOCKS4A, SOCKS5_HOSTNAME
149 # Enable tunneling proxy request instead of having proxy server evaluate it
150 # Experimental, default: NO
151 # PROXY_HTTP_TUNNELING = NO
154 [transport-https_server]
155 # EXTERNAL_HOSTNAME = <your hostname/path>
156 # EXTERNAL_HOSTNAME_ONLY = YES
157 # If you have a valid SSL certificate for your external hostname tell,
158 # clients to verify it
159 # VERIFY_EXTERNAL_HOSTNAME = YES
160 # Does the external hostname use the same port?
161 # EXTERNAL_HOSTNAME_USE_PORT = YES
164 # Obsolete option, to be replaced by HOLE_EXTERNAL (soon)
165 ADVERTISED_PORT = 4433
167 # If we have a manually punched NAT, what is the external IP and port?
168 # Can use DNS names for DynDNS-based detection of external IP.
169 # Can use IPv6 addresses ([fefc::]:PORT).
170 # Use "AUTO" for the hostname to automatically detect external IP.
171 # Do not set if NAT is not manually punched.
172 # HOLE_EXTERNAL = AUTO:4433
175 KEY_FILE = $GNUNET_DATA_HOME/transport/https.key
176 CERT_FILE = $GNUNET_DATA_HOME/transport/https.cert
177 MAX_CONNECTIONS = 128
178 TESTING_IGNORE_KEYS = ACCEPT_FROM;
180 # Enable TCP stealth?
185 # Name of the interface in monitor mode (typically monX)
187 # Real hardware, no testing
189 TESTING_IGNORE_KEYS = ACCEPT_FROM;
192 [transport-bluetooth]
193 # Name of the interface (typically hciX)
195 # Real hardware, no testing
197 TESTING_IGNORE_KEYS = ACCEPT_FROM;