aboutsummaryrefslogtreecommitdiff
path: root/src/transport/transport.conf.in
diff options
context:
space:
mode:
Diffstat (limited to 'src/transport/transport.conf.in')
-rw-r--r--src/transport/transport.conf.in237
1 files changed, 0 insertions, 237 deletions
diff --git a/src/transport/transport.conf.in b/src/transport/transport.conf.in
deleted file mode 100644
index c6b207ad7..000000000
--- a/src/transport/transport.conf.in
+++ /dev/null
@@ -1,237 +0,0 @@
1[transport]
2START_ON_DEMAND = @START_ON_DEMAND@
3@JAVAPORT@PORT = 2091
4HOSTNAME = localhost
5BINARY = gnunet-service-transport
6# PREFIX = valgrind
7
8# Maximum number of neighbours PER PLUGIN (not in total).
9NEIGHBOUR_LIMIT = 50
10ACCEPT_FROM = 127.0.0.1;
11ACCEPT_FROM6 = ::1;
12# TCP is the only transport plugin known to work "reliably"
13PLUGINS = tcp
14UNIXPATH = $GNUNET_RUNTIME_DIR/gnunet-service-transport.sock
15BLACKLIST_FILE = $GNUNET_CONFIG_HOME/transport/blacklist
16UNIX_MATCH_UID = NO
17UNIX_MATCH_GID = YES
18# DISABLE_SOCKET_FORWARDING = NO
19# USERNAME =
20# MAXBUF =
21# TIMEOUT =
22# DISABLEV6 =
23# BINDTO =
24# REJECT_FROM =
25# REJECT_FROM6 =
26# PREFIX = valgrind --leak-check=full
27
28# Configuration settings related to traffic manipulation for testing purposes
29# Distance
30# MANIPULATE_DISTANCE_IN = 1
31# MANIPULATE_DISTANCE_OUT = 1
32# Delay; WARNING: to large values may lead to peers not connecting!
33# MANIPULATE_DELAY_IN = 1 ms
34# MANIPULATE_DELAY_OUT = 1 ms
35
36
37[transport-unix]
38UNIXPATH = $GNUNET_RUNTIME_DIR/gnunet-transport-plugin-unix.sock
39TESTING_IGNORE_KEYS = ACCEPT_FROM;
40
41[transport-tcp]
42# Use 0 to ONLY advertise as a peer behind NAT (no port binding)
43PORT = 2086
44
45# Obsolete option, to be replaced by HOLE_EXTERNAL (soon)
46ADVERTISED_PORT = 2086
47
48# If we have a manually punched NAT, what is the external IP and port?
49# Can use DNS names for DynDNS-based detection of external IP.
50# Can use IPv6 addresses ([fefc::]:PORT).
51# Use "AUTO" for the hostname to automatically detect external IP.
52# Do not set if NAT is not manually punched.
53# HOLE_EXTERNAL = AUTO:2086
54
55TESTING_IGNORE_KEYS = ACCEPT_FROM;
56
57# Maximum number of open TCP connections allowed
58MAX_CONNECTIONS = 128
59
60TIMEOUT = 5 s
61# ACCEPT_FROM =
62# ACCEPT_FROM6 =
63# REJECT_FROM =
64# REJECT_FROM6 =
65# BINDTO =
66MAX_CONNECTIONS = 128
67
68# Enable TCP stealth?
69TCP_STEALTH = NO
70
71
72
73[transport-xt]
74# Use 0 to ONLY advertise as a peer behind NAT (no port binding)
75PORT = 2087
76
77# Obsolete option, to be replaced by HOLE_EXTERNAL (soon)
78ADVERTISED_PORT = 2087
79
80# If we have a manually punched NAT, what is the external IP and port?
81# Can use DNS names for DynDNS-based detection of external IP.
82# Can use IPv6 addresses ([fefc::]:PORT).
83# Use "AUTO" for the hostname to automatically detect external IP.
84# Do not set if NAT is not manually punched.
85# HOLE_EXTERNAL = AUTO:2087
86
87TESTING_IGNORE_KEYS = ACCEPT_FROM;
88
89# Maximum number of open TCP connections allowed
90MAX_CONNECTIONS = 128
91
92TIMEOUT = 5 s
93# ACCEPT_FROM =
94# ACCEPT_FROM6 =
95# REJECT_FROM =
96# REJECT_FROM6 =
97# BINDTO =
98MAX_CONNECTIONS = 128
99
100# Enable TCP stealth?
101TCP_STEALTH = NO
102
103
104[transport-udp]
105# Use PORT = 0 to autodetect a port available
106PORT = 2086
107BROADCAST = YES
108BROADCAST_RECEIVE = YES
109BROADCAST_INTERVAL = 30 s
110
111# This limits UDP to 1MB/s for SENDING. Higher values are advised
112# for benchmarking or well-connected systems. Note that this quota
113# applies IN ADDITION to the system-wide transport-wide WAN/LAN
114# quotas.
115MAX_BPS = 1000000
116TESTING_IGNORE_KEYS = ACCEPT_FROM;
117
118# If we have a manually punched NAT, what is the external IP and port?
119# Can use DNS names for DynDNS-based detection of external IP.
120# Can use IPv6 addresses ([fefc::]:PORT).
121# Use "AUTO" for the hostname to automatically detect external IP.
122# Do not set if NAT is not manually punched.
123# HOLE_EXTERNAL = AUTO:2086
124
125
126[transport-xu]
127# Use PORT = 0 to autodetect a port available
128PORT = 2087
129
130
131[transport-http_client]
132MAX_CONNECTIONS = 128
133TESTING_IGNORE_KEYS = ACCEPT_FROM;
134# Hostname or IP of proxy server
135# PROXY =
136
137# User name for proxy server
138# PROXY_USERNAME =
139# User password for proxy server
140# PROXY_PASSWORD =
141
142# Type of proxy server,
143# Valid values: HTTP, SOCKS4, SOCKS5, SOCKS4A, SOCKS5_HOSTNAME
144# Default: HTTP
145# PROXY_TYPE = HTTP
146
147# Enable tunneling proxy request instead of having proxy server evaluate it
148# Experimental, default: NO
149# PROXY_HTTP_TUNNELING = NO
150
151
152[transport-http_server]
153#EXTERNAL_HOSTNAME = <your hostname/path>
154PORT = 1080
155
156# Obsolete option, to be replaced by HOLE_EXTERNAL (soon)
157ADVERTISED_PORT = 1080
158
159# If we have a manually punched NAT, what is the external IP and port?
160# Can use DNS names for DynDNS-based detection of external IP.
161# Can use IPv6 addresses ([fefc::]:PORT).
162# Use "AUTO" for the hostname to automatically detect external IP.
163# Do not set if NAT is not manually punched.
164# HOLE_EXTERNAL = AUTO:1080
165
166MAX_CONNECTIONS = 128
167TESTING_IGNORE_KEYS = ACCEPT_FROM;
168
169# Enable TCP stealth?
170TCP_STEALTH = NO
171
172
173[transport-https_client]
174MAX_CONNECTIONS = 128
175TESTING_IGNORE_KEYS = ACCEPT_FROM;
176# Hostname or IP of proxy server
177# PROXY =
178
179# User name for proxy server
180# PROXY_USERNAME =
181# User password for proxy server
182# PROXY_PASSWORD =
183
184# Type of proxy server,
185# Valid values: HTTP, SOCKS4, SOCKS5, SOCKS4A, SOCKS5_HOSTNAME
186# Default: HTTP
187# PROXY_TYPE = HTTP
188
189# Enable tunneling proxy request instead of having proxy server evaluate it
190# Experimental, default: NO
191# PROXY_HTTP_TUNNELING = NO
192
193
194[transport-https_server]
195# EXTERNAL_HOSTNAME = <your hostname/path>
196# EXTERNAL_HOSTNAME_ONLY = YES
197# If you have a valid SSL certificate for your external hostname tell,
198# clients to verify it
199# VERIFY_EXTERNAL_HOSTNAME = YES
200# Does the external hostname use the same port?
201# EXTERNAL_HOSTNAME_USE_PORT = YES
202PORT = 4433
203
204# Obsolete option, to be replaced by HOLE_EXTERNAL (soon)
205ADVERTISED_PORT = 4433
206
207# If we have a manually punched NAT, what is the external IP and port?
208# Can use DNS names for DynDNS-based detection of external IP.
209# Can use IPv6 addresses ([fefc::]:PORT).
210# Use "AUTO" for the hostname to automatically detect external IP.
211# Do not set if NAT is not manually punched.
212# HOLE_EXTERNAL = AUTO:4433
213
214CRYPTO_INIT = NORMAL
215KEY_FILE = $GNUNET_DATA_HOME/transport/https.key
216CERT_FILE = $GNUNET_DATA_HOME/transport/https.cert
217MAX_CONNECTIONS = 128
218TESTING_IGNORE_KEYS = ACCEPT_FROM;
219
220# Enable TCP stealth?
221TCP_STEALTH = NO
222
223
224[transport-wlan]
225# Name of the interface in monitor mode (typically monX)
226INTERFACE = mon0
227# Real hardware, no testing
228TESTMODE = 0
229TESTING_IGNORE_KEYS = ACCEPT_FROM;
230
231
232[transport-bluetooth]
233# Name of the interface (typically hciX)
234INTERFACE = hci0
235# Real hardware, no testing
236TESTMODE = 0
237TESTING_IGNORE_KEYS = ACCEPT_FROM;