[transport]
AUTOSTART = @AUTOSTART@
@JAVAPORT@PORT = 2091
HOSTNAME = localhost
BINARY = gnunet-service-transport
# PREFIX = valgrind

# Maximum number of neighbours PER PLUGIN (not in total).
NEIGHBOUR_LIMIT = 50
ACCEPT_FROM = 127.0.0.1;
ACCEPT_FROM6 = ::1;
PLUGINS = tcp udp
UNIXPATH = $GNUNET_RUNTIME_DIR/gnunet-service-transport.sock
BLACKLIST_FILE = $GNUNET_CONFIG_HOME/transport/blacklist
UNIX_MATCH_UID = NO
UNIX_MATCH_GID = YES
# DISABLE_SOCKET_FORWARDING = NO
# USERNAME =
# MAXBUF =
# TIMEOUT =
# DISABLEV6 =
# BINDTO =
# REJECT_FROM =
# REJECT_FROM6 =
# PREFIX = valgrind --leak-check=full

# Configuration settings related to traffic manipulation for testing purposes
# Distance
# MANIPULATE_DISTANCE_IN = 1
# MANIPULATE_DISTANCE_OUT = 1
# Delay; WARNING: to large values may lead to peers not connecting!
# MANIPULATE_DELAY_IN = 1 ms
# MANIPULATE_DELAY_OUT = 1 ms


[transport-unix]
UNIXPATH = $GNUNET_RUNTIME_DIR/gnunet-transport-plugin-unix.sock
TESTING_IGNORE_KEYS = ACCEPT_FROM;

[transport-tcp]
# Use 0 to ONLY advertise as a peer behind NAT (no port binding)
PORT = 2086

# Obsolete option, to be replaced by HOLE_EXTERNAL (soon)
ADVERTISED_PORT = 2086

# If we have a manually punched NAT, what is the external IP and port?
# Can use DNS names for DynDNS-based detection of external IP.
# Can use IPv6 addresses ([fefc::]:PORT).
# Use "AUTO" for the hostname to automatically detect external IP.
# Do not set if NAT is not manually punched.
# HOLE_EXTERNAL = AUTO:2086

TESTING_IGNORE_KEYS = ACCEPT_FROM;

# Maximum number of open TCP connections allowed
MAX_CONNECTIONS = 128

TIMEOUT = 5 s
# ACCEPT_FROM =
# ACCEPT_FROM6 =
# REJECT_FROM =
# REJECT_FROM6 =
# BINDTO =
MAX_CONNECTIONS = 128

# Enable TCP stealth?
TCP_STEALTH = NO



[transport-xt]
# Use 0 to ONLY advertise as a peer behind NAT (no port binding)
PORT = 2087

# Obsolete option, to be replaced by HOLE_EXTERNAL (soon)
ADVERTISED_PORT = 2087

# If we have a manually punched NAT, what is the external IP and port?
# Can use DNS names for DynDNS-based detection of external IP.
# Can use IPv6 addresses ([fefc::]:PORT).
# Use "AUTO" for the hostname to automatically detect external IP.
# Do not set if NAT is not manually punched.
# HOLE_EXTERNAL = AUTO:2087

TESTING_IGNORE_KEYS = ACCEPT_FROM;

# Maximum number of open TCP connections allowed
MAX_CONNECTIONS = 128

TIMEOUT = 5 s
# ACCEPT_FROM =
# ACCEPT_FROM6 =
# REJECT_FROM =
# REJECT_FROM6 =
# BINDTO =
MAX_CONNECTIONS = 128

# Enable TCP stealth?
TCP_STEALTH = NO


[transport-udp]
# Use PORT = 0 to autodetect a port available
PORT = 2086
BROADCAST = YES
BROADCAST_RECEIVE = YES
BROADCAST_INTERVAL = 30 s

# This limits UDP to 1MB/s for SENDING. Higher values are advised
# for benchmarking or well-connected systems.  Note that this quota
# applies IN ADDITION to the system-wide transport-wide WAN/LAN
# quotas.
MAX_BPS = 1000000
TESTING_IGNORE_KEYS = ACCEPT_FROM;

# If we have a manually punched NAT, what is the external IP and port?
# Can use DNS names for DynDNS-based detection of external IP.
# Can use IPv6 addresses ([fefc::]:PORT).
# Use "AUTO" for the hostname to automatically detect external IP.
# Do not set if NAT is not manually punched.
# HOLE_EXTERNAL = AUTO:2086


[transport-xu]
# Use PORT = 0 to autodetect a port available
PORT = 2087


[transport-http_client]
MAX_CONNECTIONS = 128
TESTING_IGNORE_KEYS = ACCEPT_FROM;
# Hostname or IP of proxy server
# PROXY =

# User name for proxy server
# PROXY_USERNAME =
# User password for proxy server
# PROXY_PASSWORD =

# Type of proxy server,
# Valid values: HTTP, SOCKS4, SOCKS5, SOCKS4A, SOCKS5_HOSTNAME
# Default: HTTP
# PROXY_TYPE = HTTP

# Enable tunneling proxy request instead of having proxy server evaluate it
# Experimental, default: NO
# PROXY_HTTP_TUNNELING = NO


[transport-http_server]
#EXTERNAL_HOSTNAME = <your hostname/path>
PORT = 1080

# Obsolete option, to be replaced by HOLE_EXTERNAL (soon)
ADVERTISED_PORT = 1080

# If we have a manually punched NAT, what is the external IP and port?
# Can use DNS names for DynDNS-based detection of external IP.
# Can use IPv6 addresses ([fefc::]:PORT).
# Use "AUTO" for the hostname to automatically detect external IP.
# Do not set if NAT is not manually punched.
# HOLE_EXTERNAL = AUTO:1080

MAX_CONNECTIONS = 128
TESTING_IGNORE_KEYS = ACCEPT_FROM;

# Enable TCP stealth?
TCP_STEALTH = NO


[transport-https_client]
MAX_CONNECTIONS = 128
TESTING_IGNORE_KEYS = ACCEPT_FROM;
# Hostname or IP of proxy server
# PROXY =

# User name for proxy server
# PROXY_USERNAME =
# User password for proxy server
# PROXY_PASSWORD =

# Type of proxy server,
# Valid values: HTTP, SOCKS4, SOCKS5, SOCKS4A, SOCKS5_HOSTNAME
# Default: HTTP
# PROXY_TYPE = HTTP

# Enable tunneling proxy request instead of having proxy server evaluate it
# Experimental, default: NO
# PROXY_HTTP_TUNNELING = NO


[transport-https_server]
# EXTERNAL_HOSTNAME = <your hostname/path>
# EXTERNAL_HOSTNAME_ONLY = YES
# If you have a valid SSL certificate for your external hostname tell,
# clients to verify it
# VERIFY_EXTERNAL_HOSTNAME = YES
# Does the external hostname use the same port?
# EXTERNAL_HOSTNAME_USE_PORT = YES
PORT = 4433

# Obsolete option, to be replaced by HOLE_EXTERNAL (soon)
ADVERTISED_PORT = 4433

# If we have a manually punched NAT, what is the external IP and port?
# Can use DNS names for DynDNS-based detection of external IP.
# Can use IPv6 addresses ([fefc::]:PORT).
# Use "AUTO" for the hostname to automatically detect external IP.
# Do not set if NAT is not manually punched.
# HOLE_EXTERNAL = AUTO:4433

CRYPTO_INIT = NORMAL
KEY_FILE = $GNUNET_DATA_HOME/transport/https.key
CERT_FILE = $GNUNET_DATA_HOME/transport/https.cert
MAX_CONNECTIONS = 128
TESTING_IGNORE_KEYS = ACCEPT_FROM;

# Enable TCP stealth?
TCP_STEALTH = NO


[transport-wlan]
# Name of the interface in monitor mode (typically monX)
INTERFACE = mon0
# Real hardware, no testing
TESTMODE = 0
TESTING_IGNORE_KEYS = ACCEPT_FROM;


[transport-bluetooth]
# Name of the interface (typically hciX)
INTERFACE = hci0
# Real hardware, no testing
TESTMODE = 0
TESTING_IGNORE_KEYS = ACCEPT_FROM;
