2 START_ON_DEMAND = @START_ON_DEMAND@
5 BINARY = gnunet-service-transport
8 # Maximum number of neighbours PER PLUGIN (not in total).
10 ACCEPT_FROM = 127.0.0.1;
13 UNIXPATH = $GNUNET_RUNTIME_DIR/gnunet-service-transport.sock
14 BLACKLIST_FILE = $GNUNET_CONFIG_HOME/transport/blacklist
17 # DISABLE_SOCKET_FORWARDING = NO
25 # PREFIX = valgrind --leak-check=full
27 # Configuration settings related to traffic manipulation for testing purposes
29 # MANIPULATE_DISTANCE_IN = 1
30 # MANIPULATE_DISTANCE_OUT = 1
31 # Delay; WARNING: to large values may lead to peers not connecting!
32 # MANIPULATE_DELAY_IN = 1 ms
33 # MANIPULATE_DELAY_OUT = 1 ms
37 UNIXPATH = $GNUNET_RUNTIME_DIR/gnunet-transport-plugin-unix.sock
38 TESTING_IGNORE_KEYS = ACCEPT_FROM;
41 # Use 0 to ONLY advertise as a peer behind NAT (no port binding)
44 # Obsolete option, to be replaced by HOLE_EXTERNAL (soon)
45 ADVERTISED_PORT = 2086
47 # If we have a manually punched NAT, what is the external IP and port?
48 # Can use DNS names for DynDNS-based detection of external IP.
49 # Can use IPv6 addresses ([fefc::]:PORT).
50 # Use "AUTO" for the hostname to automatically detect external IP.
51 # Do not set if NAT is not manually punched.
52 # HOLE_EXTERNAL = AUTO:2086
54 TESTING_IGNORE_KEYS = ACCEPT_FROM;
56 # Maximum number of open TCP connections allowed
73 # Use 0 to ONLY advertise as a peer behind NAT (no port binding)
76 # Obsolete option, to be replaced by HOLE_EXTERNAL (soon)
77 ADVERTISED_PORT = 2087
79 # If we have a manually punched NAT, what is the external IP and port?
80 # Can use DNS names for DynDNS-based detection of external IP.
81 # Can use IPv6 addresses ([fefc::]:PORT).
82 # Use "AUTO" for the hostname to automatically detect external IP.
83 # Do not set if NAT is not manually punched.
84 # HOLE_EXTERNAL = AUTO:2087
86 TESTING_IGNORE_KEYS = ACCEPT_FROM;
88 # Maximum number of open TCP connections allowed
104 # Use PORT = 0 to autodetect a port available
107 BROADCAST_RECEIVE = YES
108 BROADCAST_INTERVAL = 30 s
110 # This limits UDP to 1MB/s for SENDING. Higher values are advised
111 # for benchmarking or well-connected systems. Note that this quota
112 # applies IN ADDITION to the system-wide transport-wide WAN/LAN
115 TESTING_IGNORE_KEYS = ACCEPT_FROM;
117 # If we have a manually punched NAT, what is the external IP and port?
118 # Can use DNS names for DynDNS-based detection of external IP.
119 # Can use IPv6 addresses ([fefc::]:PORT).
120 # Use "AUTO" for the hostname to automatically detect external IP.
121 # Do not set if NAT is not manually punched.
122 # HOLE_EXTERNAL = AUTO:2086
126 # Use PORT = 0 to autodetect a port available
130 [transport-http_client]
131 MAX_CONNECTIONS = 128
132 TESTING_IGNORE_KEYS = ACCEPT_FROM;
133 # Hostname or IP of proxy server
136 # User name for proxy server
138 # User password for proxy server
141 # Type of proxy server,
142 # Valid values: HTTP, SOCKS4, SOCKS5, SOCKS4A, SOCKS5_HOSTNAME
146 # Enable tunneling proxy request instead of having proxy server evaluate it
147 # Experimental, default: NO
148 # PROXY_HTTP_TUNNELING = NO
151 [transport-http_server]
152 #EXTERNAL_HOSTNAME = <your hostname/path>
155 # Obsolete option, to be replaced by HOLE_EXTERNAL (soon)
156 ADVERTISED_PORT = 1080
158 # If we have a manually punched NAT, what is the external IP and port?
159 # Can use DNS names for DynDNS-based detection of external IP.
160 # Can use IPv6 addresses ([fefc::]:PORT).
161 # Use "AUTO" for the hostname to automatically detect external IP.
162 # Do not set if NAT is not manually punched.
163 # HOLE_EXTERNAL = AUTO:1080
165 MAX_CONNECTIONS = 128
166 TESTING_IGNORE_KEYS = ACCEPT_FROM;
168 # Enable TCP stealth?
172 [transport-https_client]
173 MAX_CONNECTIONS = 128
174 TESTING_IGNORE_KEYS = ACCEPT_FROM;
175 # Hostname or IP of proxy server
178 # User name for proxy server
180 # User password for proxy server
183 # Type of proxy server,
184 # Valid values: HTTP, SOCKS4, SOCKS5, SOCKS4A, SOCKS5_HOSTNAME
188 # Enable tunneling proxy request instead of having proxy server evaluate it
189 # Experimental, default: NO
190 # PROXY_HTTP_TUNNELING = NO
193 [transport-https_server]
194 # EXTERNAL_HOSTNAME = <your hostname/path>
195 # EXTERNAL_HOSTNAME_ONLY = YES
196 # If you have a valid SSL certificate for your external hostname tell,
197 # clients to verify it
198 # VERIFY_EXTERNAL_HOSTNAME = YES
199 # Does the external hostname use the same port?
200 # EXTERNAL_HOSTNAME_USE_PORT = YES
203 # Obsolete option, to be replaced by HOLE_EXTERNAL (soon)
204 ADVERTISED_PORT = 4433
206 # If we have a manually punched NAT, what is the external IP and port?
207 # Can use DNS names for DynDNS-based detection of external IP.
208 # Can use IPv6 addresses ([fefc::]:PORT).
209 # Use "AUTO" for the hostname to automatically detect external IP.
210 # Do not set if NAT is not manually punched.
211 # HOLE_EXTERNAL = AUTO:4433
214 KEY_FILE = $GNUNET_DATA_HOME/transport/https.key
215 CERT_FILE = $GNUNET_DATA_HOME/transport/https.cert
216 MAX_CONNECTIONS = 128
217 TESTING_IGNORE_KEYS = ACCEPT_FROM;
219 # Enable TCP stealth?
224 # Name of the interface in monitor mode (typically monX)
226 # Real hardware, no testing
228 TESTING_IGNORE_KEYS = ACCEPT_FROM;
231 [transport-bluetooth]
232 # Name of the interface (typically hciX)
234 # Real hardware, no testing
236 TESTING_IGNORE_KEYS = ACCEPT_FROM;