2 AUTOSTART = @AUTOSTART@
5 BINARY = gnunet-service-transport
8 ACCEPT_FROM = 127.0.0.1;
11 UNIXPATH = $GNUNET_RUNTIME_DIR/gnunet-service-transport.sock
12 BLACKLIST_FILE = $GNUNET_CONFIG_HOME/transport/blacklist
15 # DISABLE_SOCKET_FORWARDING = NO
23 # PREFIX = valgrind --leak-check=full
25 # Configuration settings related to traffic manipulation for testing purposes
27 # MANIPULATE_DISTANCE_IN = 1
28 # MANIPULATE_DISTANCE_OUT = 1
29 # Delay; WARNING: to large values may lead to peers not connecting!
30 # MANIPULATE_DELAY_IN = 1 ms
31 # MANIPULATE_DELAY_OUT = 1 ms
35 UNIXPATH = $GNUNET_RUNTIME_DIR/gnunet-transport-plugin-unix.sock
36 TESTING_IGNORE_KEYS = ACCEPT_FROM;
39 # Use 0 to ONLY advertise as a peer behind NAT (no port binding)
41 ADVERTISED_PORT = 2086
42 TESTING_IGNORE_KEYS = ACCEPT_FROM;
44 # Maximum number of open TCP connections allowed
58 # Configuration for manually punched holes in NAT.
59 # HOLE_EXTERNAL = auto:2086
62 # Use PORT = 0 to autodetect a port available
65 BROADCAST_RECEIVE = YES
66 BROADCAST_INTERVAL = 30 s
68 # This limits UDP to 1MB/s for SENDING. Higher values are advised
69 # for benchmarking or well-connected systems. Note that this quota
70 # applies IN ADDITION to the system-wide transport-wide WAN/LAN
73 TESTING_IGNORE_KEYS = ACCEPT_FROM;
75 # Configuration for manually punched holes in NAT.
76 # HOLE_EXTERNAL = auto:2086
78 [transport-http_client]
80 TESTING_IGNORE_KEYS = ACCEPT_FROM;
81 # Hostname or IP of proxy server
84 # User name for proxy server
86 # User password for proxy server
89 # Type of proxy server,
90 # Valid values: HTTP, SOCKS4, SOCKS5, SOCKS4A, SOCKS5_HOSTNAME
94 # Enable tunneling proxy request instead of having proxy server evaluate it
95 # Experimental, default: NO
96 # PROXY_HTTP_TUNNELING = NO
98 [transport-http_server]
99 #EXTERNAL_HOSTNAME = <your hostname/path>
101 ADVERTISED_PORT = 1080
102 MAX_CONNECTIONS = 128
103 TESTING_IGNORE_KEYS = ACCEPT_FROM;
105 # Enable TCP stealth?
108 # Configuration for manually punched holes in NAT.
109 # HOLE_EXTERNAL = auto:2086
111 [transport-https_client]
112 MAX_CONNECTIONS = 128
113 TESTING_IGNORE_KEYS = ACCEPT_FROM;
114 # Hostname or IP of proxy server
117 # User name for proxy server
119 # User password for proxy server
122 # Type of proxy server,
123 # Valid values: HTTP, SOCKS4, SOCKS5, SOCKS4A, SOCKS5_HOSTNAME
127 # Enable tunneling proxy request instead of having proxy server evaluate it
128 # Experimental, default: NO
129 # PROXY_HTTP_TUNNELING = NO
133 [transport-https_server]
134 # EXTERNAL_HOSTNAME = <your hostname/path>
135 # EXTERNAL_HOSTNAME_ONLY = YES
136 # If you have a valid SSL certificate for your external hostname tell,
137 # clients to verify it
138 # VERIFY_EXTERNAL_HOSTNAME = YES
139 # Does the external hostname use the same port?
140 # EXTERNAL_HOSTNAME_USE_PORT = YES
142 ADVERTISED_PORT = 4433
144 KEY_FILE = $GNUNET_DATA_HOME/transport/https.key
145 CERT_FILE = $GNUNET_DATA_HOME/transport/https.cert
146 MAX_CONNECTIONS = 128
147 TESTING_IGNORE_KEYS = ACCEPT_FROM;
149 # Enable TCP stealth?
152 # Configuration for manually punched holes in NAT.
153 # HOLE_EXTERNAL = auto:2086
157 # Name of the interface in monitor mode (typically monX)
159 # Real hardware, no testing
161 TESTING_IGNORE_KEYS = ACCEPT_FROM;
163 [transport-bluetooth]
164 # Name of the interface (typically hciX)
166 # Real hardware, no testing
168 TESTING_IGNORE_KEYS = ACCEPT_FROM;