2 START_ON_DEMAND = @START_ON_DEMAND@
5 BINARY = gnunet-service-transport
8 # Maximum number of neighbours PER PLUGIN (not in total).
10 ACCEPT_FROM = 127.0.0.1;
12 # TCP is the only transport plugin known to work "reliably"
14 UNIXPATH = $GNUNET_RUNTIME_DIR/gnunet-service-transport.sock
15 BLACKLIST_FILE = $GNUNET_CONFIG_HOME/transport/blacklist
18 # DISABLE_SOCKET_FORWARDING = NO
26 # PREFIX = valgrind --leak-check=full
28 # Configuration settings related to traffic manipulation for testing purposes
30 # MANIPULATE_DISTANCE_IN = 1
31 # MANIPULATE_DISTANCE_OUT = 1
32 # Delay; WARNING: to large values may lead to peers not connecting!
33 # MANIPULATE_DELAY_IN = 1 ms
34 # MANIPULATE_DELAY_OUT = 1 ms
38 UNIXPATH = $GNUNET_RUNTIME_DIR/gnunet-transport-plugin-unix.sock
39 TESTING_IGNORE_KEYS = ACCEPT_FROM;
42 # Use 0 to ONLY advertise as a peer behind NAT (no port binding)
45 # Obsolete option, to be replaced by HOLE_EXTERNAL (soon)
46 ADVERTISED_PORT = 2086
48 # If we have a manually punched NAT, what is the external IP and port?
49 # Can use DNS names for DynDNS-based detection of external IP.
50 # Can use IPv6 addresses ([fefc::]:PORT).
51 # Use "AUTO" for the hostname to automatically detect external IP.
52 # Do not set if NAT is not manually punched.
53 # HOLE_EXTERNAL = AUTO:2086
55 TESTING_IGNORE_KEYS = ACCEPT_FROM;
57 # Maximum number of open TCP connections allowed
74 # Use 0 to ONLY advertise as a peer behind NAT (no port binding)
77 # Obsolete option, to be replaced by HOLE_EXTERNAL (soon)
78 ADVERTISED_PORT = 2087
80 # If we have a manually punched NAT, what is the external IP and port?
81 # Can use DNS names for DynDNS-based detection of external IP.
82 # Can use IPv6 addresses ([fefc::]:PORT).
83 # Use "AUTO" for the hostname to automatically detect external IP.
84 # Do not set if NAT is not manually punched.
85 # HOLE_EXTERNAL = AUTO:2087
87 TESTING_IGNORE_KEYS = ACCEPT_FROM;
89 # Maximum number of open TCP connections allowed
100 # Enable TCP stealth?
105 # Use PORT = 0 to autodetect a port available
108 BROADCAST_RECEIVE = YES
109 BROADCAST_INTERVAL = 30 s
111 # This limits UDP to 1MB/s for SENDING. Higher values are advised
112 # for benchmarking or well-connected systems. Note that this quota
113 # applies IN ADDITION to the system-wide transport-wide WAN/LAN
116 TESTING_IGNORE_KEYS = ACCEPT_FROM;
118 # If we have a manually punched NAT, what is the external IP and port?
119 # Can use DNS names for DynDNS-based detection of external IP.
120 # Can use IPv6 addresses ([fefc::]:PORT).
121 # Use "AUTO" for the hostname to automatically detect external IP.
122 # Do not set if NAT is not manually punched.
123 # HOLE_EXTERNAL = AUTO:2086
127 # Use PORT = 0 to autodetect a port available
131 [transport-http_client]
132 MAX_CONNECTIONS = 128
133 TESTING_IGNORE_KEYS = ACCEPT_FROM;
134 # Hostname or IP of proxy server
137 # User name for proxy server
139 # User password for proxy server
142 # Type of proxy server,
143 # Valid values: HTTP, SOCKS4, SOCKS5, SOCKS4A, SOCKS5_HOSTNAME
147 # Enable tunneling proxy request instead of having proxy server evaluate it
148 # Experimental, default: NO
149 # PROXY_HTTP_TUNNELING = NO
152 [transport-http_server]
153 #EXTERNAL_HOSTNAME = <your hostname/path>
156 # Obsolete option, to be replaced by HOLE_EXTERNAL (soon)
157 ADVERTISED_PORT = 1080
159 # If we have a manually punched NAT, what is the external IP and port?
160 # Can use DNS names for DynDNS-based detection of external IP.
161 # Can use IPv6 addresses ([fefc::]:PORT).
162 # Use "AUTO" for the hostname to automatically detect external IP.
163 # Do not set if NAT is not manually punched.
164 # HOLE_EXTERNAL = AUTO:1080
166 MAX_CONNECTIONS = 128
167 TESTING_IGNORE_KEYS = ACCEPT_FROM;
169 # Enable TCP stealth?
173 [transport-https_client]
174 MAX_CONNECTIONS = 128
175 TESTING_IGNORE_KEYS = ACCEPT_FROM;
176 # Hostname or IP of proxy server
179 # User name for proxy server
181 # User password for proxy server
184 # Type of proxy server,
185 # Valid values: HTTP, SOCKS4, SOCKS5, SOCKS4A, SOCKS5_HOSTNAME
189 # Enable tunneling proxy request instead of having proxy server evaluate it
190 # Experimental, default: NO
191 # PROXY_HTTP_TUNNELING = NO
194 [transport-https_server]
195 # EXTERNAL_HOSTNAME = <your hostname/path>
196 # EXTERNAL_HOSTNAME_ONLY = YES
197 # If you have a valid SSL certificate for your external hostname tell,
198 # clients to verify it
199 # VERIFY_EXTERNAL_HOSTNAME = YES
200 # Does the external hostname use the same port?
201 # EXTERNAL_HOSTNAME_USE_PORT = YES
204 # Obsolete option, to be replaced by HOLE_EXTERNAL (soon)
205 ADVERTISED_PORT = 4433
207 # If we have a manually punched NAT, what is the external IP and port?
208 # Can use DNS names for DynDNS-based detection of external IP.
209 # Can use IPv6 addresses ([fefc::]:PORT).
210 # Use "AUTO" for the hostname to automatically detect external IP.
211 # Do not set if NAT is not manually punched.
212 # HOLE_EXTERNAL = AUTO:4433
215 KEY_FILE = $GNUNET_DATA_HOME/transport/https.key
216 CERT_FILE = $GNUNET_DATA_HOME/transport/https.cert
217 MAX_CONNECTIONS = 128
218 TESTING_IGNORE_KEYS = ACCEPT_FROM;
220 # Enable TCP stealth?
225 # Name of the interface in monitor mode (typically monX)
227 # Real hardware, no testing
229 TESTING_IGNORE_KEYS = ACCEPT_FROM;
232 [transport-bluetooth]
233 # Name of the interface (typically hciX)
235 # Real hardware, no testing
237 TESTING_IGNORE_KEYS = ACCEPT_FROM;