[nat] # Are we behind NAT? BEHIND_NAT = NO # Is the NAT hole-punched? PUNCHED_NAT = NO # Enable UPNP by default? ENABLE_UPNP = NO # Use addresses from the local network interfaces (inluding loopback, but also others) USE_LOCALADDR = YES # Use address obtained from a DNS lookup of our hostname USE_HOSTNAME = NO # External IP address of the NAT box (if known); IPv4 dotted-decimal ONLY at this time (should allow DynDNS!) # normal interface IP address for non-NATed peers; # possibly auto-detected (using UPnP) if possible if not specified # EXTERNAL_ADDRESS = # Should we use ICMP-based NAT traversal to try connect to NATed peers # or, if we are behind NAT, to allow connections to us? ENABLE_ICMP_CLIENT = NO ENABLE_ICMP_SERVER = NO # IP address of the interface connected to the NAT box; IPv4 dotted-decimal ONLY; # normal interface IP address for non-NATed peers; # likely auto-detected (via interface list) if not specified (!) # INTERNAL_ADDRESS = # Disable IPv6 support DISABLEV6 = NO # Do we use addresses from localhost address ranges? (::1, 127.0.0.0/8) RETURN_LOCAL_ADDRESSES = NO # How often do we query the DNS resolver # for our hostname (to get our own IP) HOSTNAME_DNS_FREQUENCY = 20 min # How often do we iterate over our # network interfaces to check for changes # in our IP address? IFC_SCAN_FREQUENCY = 15 min # How often do we query the DNS resolver # for our hostname (to get our own IP) DYNDNS_FREQUENCY = 7 min # SHOULD USE STUN ? USE_STUN = YES STUN_FREQUENCY = 2 min # Default list of stun servers STUN_SERVERS = stun.services.mozilla.com:3478 stun2.l.google.com:19302 [gnunet-nat-server] HOSTNAME = gnunet.org PORT = 5724 NOARMBIND = YES