diff options
Diffstat (limited to 'src/transport/transport.conf.in')
-rw-r--r-- | src/transport/transport.conf.in | 49 |
1 files changed, 49 insertions, 0 deletions
diff --git a/src/transport/transport.conf.in b/src/transport/transport.conf.in index 95e3f9944..7b5413bbe 100644 --- a/src/transport/transport.conf.in +++ b/src/transport/transport.conf.in | |||
@@ -38,7 +38,17 @@ TESTING_IGNORE_KEYS = ACCEPT_FROM; | |||
38 | [transport-tcp] | 38 | [transport-tcp] |
39 | # Use 0 to ONLY advertise as a peer behind NAT (no port binding) | 39 | # Use 0 to ONLY advertise as a peer behind NAT (no port binding) |
40 | PORT = 2086 | 40 | PORT = 2086 |
41 | |||
42 | # Obsolete option, to be replaced by HOLE_EXTERNAL (soon) | ||
41 | ADVERTISED_PORT = 2086 | 43 | ADVERTISED_PORT = 2086 |
44 | |||
45 | # If we have a manually punched NAT, what is the external IP and port? | ||
46 | # Can use DNS names for DynDNS-based detection of external IP. | ||
47 | # Can use IPv6 addresses ([fefc::]:PORT). | ||
48 | # Use "AUTO" for the hostname to automatically detect external IP. | ||
49 | # Do not set if NAT is not manually punched. | ||
50 | # HOLE_EXTERNAL = AUTO:2086 | ||
51 | |||
42 | TESTING_IGNORE_KEYS = ACCEPT_FROM; | 52 | TESTING_IGNORE_KEYS = ACCEPT_FROM; |
43 | 53 | ||
44 | # Maximum number of open TCP connections allowed | 54 | # Maximum number of open TCP connections allowed |
@@ -55,6 +65,9 @@ MAX_CONNECTIONS = 128 | |||
55 | # Enable TCP stealth? | 65 | # Enable TCP stealth? |
56 | TCP_STEALTH = NO | 66 | TCP_STEALTH = NO |
57 | 67 | ||
68 | # Configuration for manually punched holes in NAT. | ||
69 | # HOLE_EXTERNAL = auto:2086 | ||
70 | |||
58 | [transport-udp] | 71 | [transport-udp] |
59 | # Use PORT = 0 to autodetect a port available | 72 | # Use PORT = 0 to autodetect a port available |
60 | PORT = 2086 | 73 | PORT = 2086 |
@@ -69,6 +82,14 @@ BROADCAST_INTERVAL = 30 s | |||
69 | MAX_BPS = 1000000 | 82 | MAX_BPS = 1000000 |
70 | TESTING_IGNORE_KEYS = ACCEPT_FROM; | 83 | TESTING_IGNORE_KEYS = ACCEPT_FROM; |
71 | 84 | ||
85 | # If we have a manually punched NAT, what is the external IP and port? | ||
86 | # Can use DNS names for DynDNS-based detection of external IP. | ||
87 | # Can use IPv6 addresses ([fefc::]:PORT). | ||
88 | # Use "AUTO" for the hostname to automatically detect external IP. | ||
89 | # Do not set if NAT is not manually punched. | ||
90 | # HOLE_EXTERNAL = AUTO:2086 | ||
91 | |||
92 | |||
72 | [transport-http_client] | 93 | [transport-http_client] |
73 | MAX_CONNECTIONS = 128 | 94 | MAX_CONNECTIONS = 128 |
74 | TESTING_IGNORE_KEYS = ACCEPT_FROM; | 95 | TESTING_IGNORE_KEYS = ACCEPT_FROM; |
@@ -92,13 +113,27 @@ TESTING_IGNORE_KEYS = ACCEPT_FROM; | |||
92 | [transport-http_server] | 113 | [transport-http_server] |
93 | #EXTERNAL_HOSTNAME = <your hostname/path> | 114 | #EXTERNAL_HOSTNAME = <your hostname/path> |
94 | PORT = 1080 | 115 | PORT = 1080 |
116 | |||
117 | # Obsolete option, to be replaced by HOLE_EXTERNAL (soon) | ||
95 | ADVERTISED_PORT = 1080 | 118 | ADVERTISED_PORT = 1080 |
119 | |||
120 | # If we have a manually punched NAT, what is the external IP and port? | ||
121 | # Can use DNS names for DynDNS-based detection of external IP. | ||
122 | # Can use IPv6 addresses ([fefc::]:PORT). | ||
123 | # Use "AUTO" for the hostname to automatically detect external IP. | ||
124 | # Do not set if NAT is not manually punched. | ||
125 | # HOLE_EXTERNAL = AUTO:2086 | ||
126 | |||
127 | |||
96 | MAX_CONNECTIONS = 128 | 128 | MAX_CONNECTIONS = 128 |
97 | TESTING_IGNORE_KEYS = ACCEPT_FROM; | 129 | TESTING_IGNORE_KEYS = ACCEPT_FROM; |
98 | 130 | ||
99 | # Enable TCP stealth? | 131 | # Enable TCP stealth? |
100 | TCP_STEALTH = NO | 132 | TCP_STEALTH = NO |
101 | 133 | ||
134 | # Configuration for manually punched holes in NAT. | ||
135 | # HOLE_EXTERNAL = auto:2086 | ||
136 | |||
102 | [transport-https_client] | 137 | [transport-https_client] |
103 | MAX_CONNECTIONS = 128 | 138 | MAX_CONNECTIONS = 128 |
104 | TESTING_IGNORE_KEYS = ACCEPT_FROM; | 139 | TESTING_IGNORE_KEYS = ACCEPT_FROM; |
@@ -130,7 +165,17 @@ TESTING_IGNORE_KEYS = ACCEPT_FROM; | |||
130 | # Does the external hostname use the same port? | 165 | # Does the external hostname use the same port? |
131 | # EXTERNAL_HOSTNAME_USE_PORT = YES | 166 | # EXTERNAL_HOSTNAME_USE_PORT = YES |
132 | PORT = 4433 | 167 | PORT = 4433 |
168 | |||
169 | # Obsolete option, to be replaced by HOLE_EXTERNAL (soon) | ||
133 | ADVERTISED_PORT = 4433 | 170 | ADVERTISED_PORT = 4433 |
171 | |||
172 | # If we have a manually punched NAT, what is the external IP and port? | ||
173 | # Can use DNS names for DynDNS-based detection of external IP. | ||
174 | # Can use IPv6 addresses ([fefc::]:PORT). | ||
175 | # Use "AUTO" for the hostname to automatically detect external IP. | ||
176 | # Do not set if NAT is not manually punched. | ||
177 | # HOLE_EXTERNAL = AUTO:2086 | ||
178 | |||
134 | CRYPTO_INIT = NORMAL | 179 | CRYPTO_INIT = NORMAL |
135 | KEY_FILE = $GNUNET_DATA_HOME/transport/https.key | 180 | KEY_FILE = $GNUNET_DATA_HOME/transport/https.key |
136 | CERT_FILE = $GNUNET_DATA_HOME/transport/https.cert | 181 | CERT_FILE = $GNUNET_DATA_HOME/transport/https.cert |
@@ -140,6 +185,10 @@ TESTING_IGNORE_KEYS = ACCEPT_FROM; | |||
140 | # Enable TCP stealth? | 185 | # Enable TCP stealth? |
141 | TCP_STEALTH = NO | 186 | TCP_STEALTH = NO |
142 | 187 | ||
188 | # Configuration for manually punched holes in NAT. | ||
189 | # HOLE_EXTERNAL = auto:2086 | ||
190 | |||
191 | |||
143 | [transport-wlan] | 192 | [transport-wlan] |
144 | # Name of the interface in monitor mode (typically monX) | 193 | # Name of the interface in monitor mode (typically monX) |
145 | INTERFACE = mon0 | 194 | INTERFACE = mon0 |