NEIGHBOUR_LIMIT = 50
ACCEPT_FROM = 127.0.0.1;
ACCEPT_FROM6 = ::1;
-PLUGINS = tcp
+PLUGINS = tcp udp
UNIXPATH = /tmp/gnunet-service-transport.sock
BLACKLIST_FILE = $SERVICEHOME/blacklist
# This could possibly be relaxed
# REJECT_FROM6 =
# PREFIX = valgrind --leak-check=full
+[transport-unix]
+PORT = 22086
+TESTING_IGNORE_KEYS = ACCEPT_FROM;
[transport-tcp]
# Use 0 to ONLY advertise as a peer behind NAT (no port binding)
PORT = 2086
ADVERTISED_PORT = 2086
+TESTING_IGNORE_KEYS = ACCEPT_FROM;
# Maximum number of open TCP connections allowed
MAX_CONNECTIONS = 128
[transport-udp]
PORT = 2086
BROADCAST = YES
-BROADCAST_INTERVAL = 30000
+BROADCAST_INTERVAL = 30 s
MAX_BPS = 1000000
+TESTING_IGNORE_KEYS = ACCEPT_FROM;
[transport-http]
PORT = 1080
MAX_CONNECTIONS = 128
+TESTING_IGNORE_KEYS = ACCEPT_FROM;
[transport-https]
PORT = 4433
KEY_FILE = https.key
CERT_FILE = https.cert
MAX_CONNECTIONS = 128
+TESTING_IGNORE_KEYS = ACCEPT_FROM;
[transport-wlan]
# Name of the interface in monitor mode (typically monX)
INTERFACE = mon0
# Real hardware, no testing
TESTMODE = 0
-
+TESTING_IGNORE_KEYS = ACCEPT_FROM;