2013-08-06 23:55:22 +02:00
|
|
|
[Application Options]
|
2013-08-07 19:12:46 +02:00
|
|
|
|
2013-09-18 07:13:36 +02:00
|
|
|
; ------------------------------------------------------------------------------
|
|
|
|
; Data settings
|
|
|
|
; ------------------------------------------------------------------------------
|
|
|
|
|
|
|
|
; The directory to store data such as the block chain and peer addresses. The
|
|
|
|
; block chain takes several GB, so this location must have a lot of free space.
|
2013-11-11 00:12:45 +01:00
|
|
|
; The default is ~/.btcd/data on POSIX OSes, $LOCALAPPDATA/Btcd/data on Windows,
|
|
|
|
; ~/Library/Application Support/Btcd/data on Mac OS, and $home/btcd/data on
|
|
|
|
; Plan9. Environment variables are expanded so they may be used. NOTE: Windows
|
2013-09-18 07:13:36 +02:00
|
|
|
; environment variables are typically %VARIABLE%, but they must be accessed with
|
2013-11-11 00:12:45 +01:00
|
|
|
; $VARIABLE here. Also, ~ is expanded to $LOCALAPPDATA on Windows.
|
2013-09-18 07:13:36 +02:00
|
|
|
; datadir=~/.btcd/data
|
|
|
|
|
|
|
|
|
2013-08-07 19:12:46 +02:00
|
|
|
; ------------------------------------------------------------------------------
|
|
|
|
; Network settings
|
|
|
|
; ------------------------------------------------------------------------------
|
2013-08-06 23:55:22 +02:00
|
|
|
|
|
|
|
; Use testnet.
|
|
|
|
; testnet=1
|
|
|
|
|
2013-10-04 08:38:41 +02:00
|
|
|
; Connect via a SOCKS5 proxy. NOTE: Specifying a proxy without the 'tor' option
|
|
|
|
; below will disable listening for incoming connections.
|
2013-08-08 04:49:10 +02:00
|
|
|
; proxy=127.0.0.1:9050
|
|
|
|
; proxyuser=
|
|
|
|
; proxypass=
|
|
|
|
|
|
|
|
; The SOCKS5 proxy above is Tor (https://www.torproject.org).
|
2013-08-08 18:11:39 +02:00
|
|
|
; Although not required if the proxy set is indeed Tor, setting this option
|
|
|
|
; does the following:
|
2013-08-08 19:45:20 +02:00
|
|
|
; - Sends DNS queries over the Tor network (during DNS seed lookup). This
|
2013-08-08 18:11:39 +02:00
|
|
|
; stops your IP from being leaked via DNS.
|
|
|
|
; - Does not disable the listening port. This allows the hidden services
|
|
|
|
; feature of Tor to be used.
|
2013-08-08 04:49:10 +02:00
|
|
|
; tor=1
|
|
|
|
|
2013-10-04 08:38:41 +02:00
|
|
|
; ******************************************************************************
|
|
|
|
; Only one of the following two options, 'addpeer' and 'connect', may be
|
|
|
|
; specified. Both allow you to specify peers that you want to stay connected
|
|
|
|
; with, but the behavior is slightly different. By default, btcd will query DNS
|
|
|
|
; to find peers to connect to, so unless you have a specific reason such as
|
|
|
|
; those described below, you probably won't need to modify anything here.
|
|
|
|
;
|
|
|
|
; 'addpeer' does not prevent connections to other peers discovered from
|
|
|
|
; the peers you are connected to and also lets the remote peers know you are
|
|
|
|
; available so they can notify other peers they can to connect to you. This
|
|
|
|
; option might be useful if you are having problems finding a node for some
|
|
|
|
; reason (perhaps due to a firewall).
|
|
|
|
;
|
|
|
|
; 'connect', on the other hand, will ONLY connect to the specified peers and
|
|
|
|
; no others. It also disables listening and DNS seeding, so you will not be
|
|
|
|
; advertised as an available peer to the peers you connect to and won't accept
|
|
|
|
; connections from any other peers. So, the 'connect' option effectively allows
|
|
|
|
; you to only connect to "trusted" peers.
|
|
|
|
; ******************************************************************************
|
2013-08-08 04:49:10 +02:00
|
|
|
|
2013-09-19 16:17:15 +02:00
|
|
|
; Add persistent peers to connect to as desired. One peer per line.
|
2013-08-07 19:12:46 +02:00
|
|
|
; You may specify each IP address with or without a port. The default port will
|
|
|
|
; be added automatically if one is not specified here.
|
2013-09-19 16:17:15 +02:00
|
|
|
; addpeer=192.168.1.1
|
|
|
|
; addpeer=10.0.0.2:8333
|
|
|
|
; addpeer=fe80::1
|
|
|
|
; addpeer=[fe80::2]:8333
|
2013-08-06 23:55:22 +02:00
|
|
|
|
2013-10-04 08:38:41 +02:00
|
|
|
; Add persistent peers that you ONLY want to connect to as desired. One peer
|
|
|
|
; per line. You may specify each IP address with or without a port. The
|
|
|
|
; default port will be added automatically if one is not specified here.
|
|
|
|
; NOTE: Specifying this option will disable listening for incoming connections
|
|
|
|
; and DNS seeding for peers.
|
|
|
|
; connect=192.168.1.1
|
|
|
|
; connect=10.0.0.2:8333
|
|
|
|
; connect=fe80::1
|
|
|
|
; connect=[fe80::2]:8333
|
|
|
|
|
2013-08-06 23:55:22 +02:00
|
|
|
; Maximum number of inbound and outbound peers.
|
|
|
|
; maxpeers=8
|
|
|
|
|
|
|
|
; How long to ban misbehaving peers. Valid time units are {s, m, h}.
|
|
|
|
; Minimum 1s.
|
|
|
|
; banduration=24h
|
|
|
|
; banduration=11h30m15s
|
2013-08-07 19:12:46 +02:00
|
|
|
|
2013-10-04 08:38:41 +02:00
|
|
|
; Disable DNS seeding for peers. By default, when btcd starts, it will use
|
|
|
|
; DNS to query for available peers to connect with.
|
|
|
|
; nodnsseed=1
|
|
|
|
|
|
|
|
; Disable listening for incoming connections.
|
|
|
|
; nolisten=1
|
|
|
|
|
2013-08-07 19:12:46 +02:00
|
|
|
|
|
|
|
; ------------------------------------------------------------------------------
|
|
|
|
; RPC server options - The following options control the built-in RPC server
|
|
|
|
; which is used to control and query information from a running btcd process.
|
|
|
|
;
|
|
|
|
; NOTE: The RPC server is disabled by default if no rpcuser or rpcpass is
|
|
|
|
; specified.
|
|
|
|
; ------------------------------------------------------------------------------
|
|
|
|
|
2013-08-08 19:45:20 +02:00
|
|
|
; Secure the RPC API by specifying the username and password. You must specify
|
2013-08-07 19:12:46 +02:00
|
|
|
; both or the RPC server will be disabled.
|
|
|
|
; rpcuser=whatever_username_you_want
|
|
|
|
; rpcpass=
|
|
|
|
|
|
|
|
; Use the following setting to disable the RPC server even if the rpcuser and
|
|
|
|
; rpcpass are specified above. This allows one to quickly disable the RPC
|
|
|
|
; server without having to remove credentials from the config file.
|
|
|
|
; norpc=1
|
|
|
|
|
|
|
|
; The port used to listen for RPC connections.
|
2013-10-16 22:01:43 +02:00
|
|
|
; rpcport=8334
|
2013-08-07 19:12:46 +02:00
|
|
|
|
|
|
|
|
|
|
|
; ------------------------------------------------------------------------------
|
|
|
|
; Debug
|
|
|
|
; ------------------------------------------------------------------------------
|
|
|
|
|
|
|
|
; Debug logging level.
|
|
|
|
; Valid options are {trace, debug, info, warn, error, critical}
|
|
|
|
; debuglevel=info
|
2013-09-18 00:28:07 +02:00
|
|
|
|
|
|
|
; The port used to listen for HTTP profile requests. The profile server will
|
|
|
|
; be disabled if this option is not specified. The profile information can be
|
|
|
|
; accessed at http://localhost:<profileport>/debug/pprof once running.
|
|
|
|
; profile=6061
|