initial

zenfyr.dev e729470a

verified
+121
LICENSE
···
+
Creative Commons Legal Code
+
+
CC0 1.0 Universal
+
+
CREATIVE COMMONS CORPORATION IS NOT A LAW FIRM AND DOES NOT PROVIDE
+
LEGAL SERVICES. DISTRIBUTION OF THIS DOCUMENT DOES NOT CREATE AN
+
ATTORNEY-CLIENT RELATIONSHIP. CREATIVE COMMONS PROVIDES THIS
+
INFORMATION ON AN "AS-IS" BASIS. CREATIVE COMMONS MAKES NO WARRANTIES
+
REGARDING THE USE OF THIS DOCUMENT OR THE INFORMATION OR WORKS
+
PROVIDED HEREUNDER, AND DISCLAIMS LIABILITY FOR DAMAGES RESULTING FROM
+
THE USE OF THIS DOCUMENT OR THE INFORMATION OR WORKS PROVIDED
+
HEREUNDER.
+
+
Statement of Purpose
+
+
The laws of most jurisdictions throughout the world automatically confer
+
exclusive Copyright and Related Rights (defined below) upon the creator
+
and subsequent owner(s) (each and all, an "owner") of an original work of
+
authorship and/or a database (each, a "Work").
+
+
Certain owners wish to permanently relinquish those rights to a Work for
+
the purpose of contributing to a commons of creative, cultural and
+
scientific works ("Commons") that the public can reliably and without fear
+
of later claims of infringement build upon, modify, incorporate in other
+
works, reuse and redistribute as freely as possible in any form whatsoever
+
and for any purposes, including without limitation commercial purposes.
+
These owners may contribute to the Commons to promote the ideal of a free
+
culture and the further production of creative, cultural and scientific
+
works, or to gain reputation or greater distribution for their Work in
+
part through the use and efforts of others.
+
+
For these and/or other purposes and motivations, and without any
+
expectation of additional consideration or compensation, the person
+
associating CC0 with a Work (the "Affirmer"), to the extent that he or she
+
is an owner of Copyright and Related Rights in the Work, voluntarily
+
elects to apply CC0 to the Work and publicly distribute the Work under its
+
terms, with knowledge of his or her Copyright and Related Rights in the
+
Work and the meaning and intended legal effect of CC0 on those rights.
+
+
1. Copyright and Related Rights. A Work made available under CC0 may be
+
protected by copyright and related or neighboring rights ("Copyright and
+
Related Rights"). Copyright and Related Rights include, but are not
+
limited to, the following:
+
+
i. the right to reproduce, adapt, distribute, perform, display,
+
communicate, and translate a Work;
+
ii. moral rights retained by the original author(s) and/or performer(s);
+
iii. publicity and privacy rights pertaining to a person's image or
+
likeness depicted in a Work;
+
iv. rights protecting against unfair competition in regards to a Work,
+
subject to the limitations in paragraph 4(a), below;
+
v. rights protecting the extraction, dissemination, use and reuse of data
+
in a Work;
+
vi. database rights (such as those arising under Directive 96/9/EC of the
+
European Parliament and of the Council of 11 March 1996 on the legal
+
protection of databases, and under any national implementation
+
thereof, including any amended or successor version of such
+
directive); and
+
vii. other similar, equivalent or corresponding rights throughout the
+
world based on applicable law or treaty, and any national
+
implementations thereof.
+
+
2. Waiver. To the greatest extent permitted by, but not in contravention
+
of, applicable law, Affirmer hereby overtly, fully, permanently,
+
irrevocably and unconditionally waives, abandons, and surrenders all of
+
Affirmer's Copyright and Related Rights and associated claims and causes
+
of action, whether now known or unknown (including existing as well as
+
future claims and causes of action), in the Work (i) in all territories
+
worldwide, (ii) for the maximum duration provided by applicable law or
+
treaty (including future time extensions), (iii) in any current or future
+
medium and for any number of copies, and (iv) for any purpose whatsoever,
+
including without limitation commercial, advertising or promotional
+
purposes (the "Waiver"). Affirmer makes the Waiver for the benefit of each
+
member of the public at large and to the detriment of Affirmer's heirs and
+
successors, fully intending that such Waiver shall not be subject to
+
revocation, rescission, cancellation, termination, or any other legal or
+
equitable action to disrupt the quiet enjoyment of the Work by the public
+
as contemplated by Affirmer's express Statement of Purpose.
+
+
3. Public License Fallback. Should any part of the Waiver for any reason
+
be judged legally invalid or ineffective under applicable law, then the
+
Waiver shall be preserved to the maximum extent permitted taking into
+
account Affirmer's express Statement of Purpose. In addition, to the
+
extent the Waiver is so judged Affirmer hereby grants to each affected
+
person a royalty-free, non transferable, non sublicensable, non exclusive,
+
irrevocable and unconditional license to exercise Affirmer's Copyright and
+
Related Rights in the Work (i) in all territories worldwide, (ii) for the
+
maximum duration provided by applicable law or treaty (including future
+
time extensions), (iii) in any current or future medium and for any number
+
of copies, and (iv) for any purpose whatsoever, including without
+
limitation commercial, advertising or promotional purposes (the
+
"License"). The License shall be deemed effective as of the date CC0 was
+
applied by Affirmer to the Work. Should any part of the License for any
+
reason be judged legally invalid or ineffective under applicable law, such
+
partial invalidity or ineffectiveness shall not invalidate the remainder
+
of the License, and in such case Affirmer hereby affirms that he or she
+
will not (i) exercise any of his or her remaining Copyright and Related
+
Rights in the Work or (ii) assert any associated claims and causes of
+
action with respect to the Work, in either case contrary to Affirmer's
+
express Statement of Purpose.
+
+
4. Limitations and Disclaimers.
+
+
a. No trademark or patent rights held by Affirmer are waived, abandoned,
+
surrendered, licensed or otherwise affected by this document.
+
b. Affirmer offers the Work as-is and makes no representations or
+
warranties of any kind concerning the Work, express, implied,
+
statutory or otherwise, including without limitation warranties of
+
title, merchantability, fitness for a particular purpose, non
+
infringement, or the absence of latent or other defects, accuracy, or
+
the present or absence of errors, whether or not discoverable, all to
+
the greatest extent permissible under applicable law.
+
c. Affirmer disclaims responsibility for clearing rights of other persons
+
that may apply to the Work or any use thereof, including without
+
limitation any person's Copyright and Related Rights in the Work.
+
Further, Affirmer disclaims responsibility for obtaining any necessary
+
consents, permissions or other rights required for any use of the
+
Work.
+
d. Affirmer understands and acknowledges that Creative Commons is not a
+
party to this document and has no duty or obligation with respect to
+
this CC0 or use of the Work.
+3
README.md
···
+
# composition
+
+
a collection of docker-compose related stuff, mainly service configs
+57
i2pd-tools/Dockerfile
···
+
# Use the official Debian stable slim image
+
FROM debian:stable-slim AS base
+
+
# prevent interactive prompts during package installation
+
ARG DEBIAN_FRONTEND=noninteractive
+
+
# Install dependencies
+
RUN apt-get update && apt-get install -y --no-install-recommends \
+
libboost-dev \
+
libboost-chrono-dev \
+
libboost-date-time-dev \
+
libboost-filesystem-dev \
+
libboost-program-options-dev \
+
libboost-system-dev \
+
libboost-thread-dev \
+
libssl-dev \
+
zlib1g-dev
+
+
FROM base AS builder
+
+
# Install build dependencies
+
RUN apt-get install -y --no-install-recommends \
+
make \
+
gcc g++
+
+
# Copy sources into the layer
+
COPY . /opt/i2pd-tools
+
WORKDIR /opt/i2pd-tools
+
+
# Build all the tools
+
RUN make -j"$(nproc)"
+
+
FROM base
+
+
# Copy binaries to base layer
+
COPY --from=builder \
+
/opt/i2pd-tools/autoconf \
+
/opt/i2pd-tools/keygen \
+
/opt/i2pd-tools/keyinfo \
+
/opt/i2pd-tools/famtool \
+
/opt/i2pd-tools/i2pbase64 \
+
/opt/i2pd-tools/regaddr \
+
/opt/i2pd-tools/regaddralias \
+
/opt/i2pd-tools/routerinfo \
+
/opt/i2pd-tools/vain \
+
/opt/i2pd-tools/b33address \
+
/opt/i2pd-tools/offlinekeys \
+
/opt/i2pd-tools/regaddr_3ld \
+
/opt/i2pd-tools/verifyhost \
+
/opt/i2pd-tools/x25519 \
+
/usr/local/bin/
+
+
WORKDIR /data
+
+
# Drop into a shell by default so you can run any tool interactively
+
CMD ["bash"]
+
+21
i2pd-tools/README.md
···
+
# i2pd-tools
+
+
this is a Dockerfile for [i2pd-tools](https://github.com/purplei2p/i2pd-tools), mainly to use with `vain`.
+
+
to build, first clone the i2pd-tools repo:
+
+
```
+
git clone --recursive https://github.com/purplei2p/i2pd-tools
+
```
+
+
then:
+
+
```
+
docker build -t melontini/i2pd-tools .
+
```
+
+
now you can run, for example, `vain` to get a vanity address:
+
+
```
+
docker run --rm -it -v "$PWD":/data melontini/i2pd-tools:latest vain hawk2
+
```
+14
i2pd/README.md
···
+
# i2pd
+
+
based on the https://hub.docker.com/r/purplei2p/i2pd image. this doesn't require host networking, but this config uses it anyway because it's easier.
+
+
if you're facing permission issues, before starting, make the data dir world writable.
+
+
```
+
mkdir -p ./data
+
chmod -R 777 ./data
+
```
+
+
check and modify i2pd.conf and tunnels.conf before starting the service! enables ssh access over i2p on port 22 by default!
+
+
learn more about i2p https://geti2p.net/en/ and i2pd https://i2pd.website/
+8
i2pd/compose.yml
···
+
services:
+
i2pd:
+
image: purplei2p/i2pd
+
container_name: i2pd
+
network_mode: host
+
restart: unless-stopped
+
volumes:
+
- "./data:/home/i2pd/data"
+279
i2pd/data/i2pd.conf
···
+
## Configuration file for a typical i2pd user
+
## See https://i2pd.readthedocs.io/en/latest/user-guide/configuration/
+
## for more options you can use in this file.
+
+
## Lines that begin with "## " try to explain what's going on. Lines
+
## that begin with just "#" are disabled commands: you can enable them
+
## by removing the "#" symbol.
+
+
## Tunnels config file
+
## Default: ~/.i2pd/tunnels.conf or /var/lib/i2pd/tunnels.conf
+
# tunconf = /var/lib/i2pd/tunnels.conf
+
+
## Tunnels config files path
+
## Use that path to store separated tunnels in different config files.
+
## Default: ~/.i2pd/tunnels.d or /var/lib/i2pd/tunnels.d
+
# tunnelsdir = /var/lib/i2pd/tunnels.d
+
+
## Path to certificates used for verifying .su3, families
+
## Default: ~/.i2pd/certificates or /var/lib/i2pd/certificates
+
# certsdir = /var/lib/i2pd/certificates
+
+
## Where to write pidfile (default: /run/i2pd.pid, not used in Windows)
+
# pidfile = /run/i2pd.pid
+
+
## Logging configuration section
+
## By default logs go to stdout with level 'info' and higher
+
## For Windows OS by default logs go to file with level 'warn' and higher
+
##
+
## Logs destination (valid values: stdout, file, syslog)
+
## * stdout - print log entries to stdout
+
## * file - log entries to a file
+
## * syslog - use syslog, see man 3 syslog
+
# log = file
+
## Path to logfile (default: autodetect)
+
# logfile = /var/log/i2pd/i2pd.log
+
## Log messages above this level (debug, info, *warn, error, critical, none)
+
## If you set it to none, logging will be disabled
+
# loglevel = warn
+
## Write full CLF-formatted date and time to log (default: write only time)
+
# logclftime = true
+
+
## Daemon mode. Router will go to background after start. Ignored on Windows
+
## (default: true)
+
# daemon = true
+
+
## Specify a family, router belongs to (default - none)
+
# family =
+
+
## Network interface to bind to
+
## Updates address4/6 options if they are not set
+
# ifname =
+
## You can specify different interfaces for IPv4 and IPv6
+
# ifname4 =
+
# ifname6 =
+
+
## Local address to bind transport sockets to
+
## Overrides host option if:
+
## For ipv4: if ipv4 = true and nat = false
+
## For ipv6: if 'host' is not set or ipv4 = true
+
# address4 =
+
# address6 =
+
+
## External IPv4 or IPv6 address to listen for connections
+
## By default i2pd sets IP automatically
+
## Sets published NTCP2v4/SSUv4 address to 'host' value if nat = true
+
## Sets published NTCP2v6/SSUv6 address to 'host' value if ipv4 = false
+
# host = 1.2.3.4
+
+
## Port to listen for connections
+
## By default i2pd picks random port. You MUST pick a random number too,
+
## don't just uncomment this
+
# port = 60668
+
+
## Enable communication through ipv4 (default: true)
+
ipv4 = true
+
## Enable communication through ipv6 (default: false)
+
ipv6 = true
+
+
## Bandwidth configuration
+
## L limit bandwidth to 32 KB/sec, O - to 256 KB/sec, P - to 2048 KB/sec,
+
## X - unlimited
+
## Default is L (regular node) and X if floodfill mode enabled.
+
## If you want to share more bandwidth without floodfill mode, uncomment
+
## that line and adjust value to your possibilities. Value can be set to
+
## integer in kilobytes, it will apply that limit and flag will be used
+
## from next upper limit (example: if you set 4096 flag will be X, but real
+
## limit will be 4096 KB/s). Same can be done when floodfill mode is used,
+
## but keep in mind that low values may be negatively evaluated by Java
+
## router algorithms.
+
# bandwidth = L
+
## Max % of bandwidth limit for transit. 0-100 (default: 100)
+
# share = 100
+
+
## Router will not accept transit tunnels, disabling transit traffic completely
+
## (default: false)
+
# notransit = true
+
+
## Router will be floodfill (default: false)
+
## Note: that mode uses much more network connections and CPU!
+
# floodfill = true
+
+
[ntcp2]
+
## Enable NTCP2 transport (default: true)
+
# enabled = true
+
## Publish address in RouterInfo (default: true)
+
# published = true
+
## Port for incoming connections (default is global port option value)
+
# port = 4567
+
+
[ssu2]
+
## Enable SSU2 transport (default: true)
+
# enabled = true
+
## Publish address in RouterInfo (default: true)
+
# published = true
+
## Port for incoming connections (default is global port option value)
+
# port = 4567
+
+
[http]
+
## Web Console settings
+
## Enable the Web Console (default: true)
+
# enabled = true
+
## Address and port service will listen on (default: 127.0.0.1:7070)
+
# address = 127.0.0.1
+
# port = 7070
+
## Path to web console (default: /)
+
# webroot = /
+
## Enable Web Console authentication (default: false)
+
## You should not use Web Console via public networks without additional encryption.
+
## HTTP authentication is not encryption layer!
+
# auth = true
+
# user = i2pd
+
# pass = changeme
+
## Select webconsole language
+
## Currently supported english (default), afrikaans, armenian, chinese, czech, french,
+
## german, italian, polish, portuguese, russian, spanish, turkish, turkmen, ukrainian
+
## and uzbek languages
+
# lang = english
+
+
[httpproxy]
+
## Enable the HTTP proxy (default: true)
+
enabled = false
+
## Address and port service will listen on (default: 127.0.0.1:4444)
+
# address = 127.0.0.1
+
# port = 4444
+
## Optional keys file for proxy local destination (default: http-proxy-keys.dat)
+
# keys = http-proxy-keys.dat
+
## Enable address helper for adding .i2p domains with "jump URLs" (default: true)
+
## You should disable this feature if your i2pd HTTP Proxy is public,
+
## because anyone could spoof the short domain via addresshelper and forward other users to phishing links
+
# addresshelper = true
+
## Address of a proxy server inside I2P, which is used to visit regular Internet
+
# outproxy = http://false.i2p
+
## httpproxy section also accepts I2CP parameters, like "inbound.length" etc.
+
+
[socksproxy]
+
## Enable the SOCKS proxy (default: true)
+
enabled = false
+
## Address and port service will listen on (default: 127.0.0.1:4447)
+
# address = 127.0.0.1
+
# port = 4447
+
## Optional keys file for proxy local destination (default: socks-proxy-keys.dat)
+
# keys = socks-proxy-keys.dat
+
## Socks outproxy. Example below is set to use Tor for all connections except i2p
+
## Enable using of SOCKS outproxy (works only with SOCKS4, default: false)
+
# outproxy.enabled = false
+
## Address and port of outproxy
+
# outproxy = 127.0.0.1
+
# outproxyport = 9050
+
## socksproxy section also accepts I2CP parameters, like "inbound.length" etc.
+
+
[sam]
+
## Enable the SAM bridge (default: true)
+
# enabled = false
+
## Address and ports service will listen on (default: 127.0.0.1:7656, udp: 7655)
+
# address = 127.0.0.1
+
# port = 7656
+
# portudp = 7655
+
+
[bob]
+
## Enable the BOB command channel (default: false)
+
# enabled = false
+
## Address and port service will listen on (default: 127.0.0.1:2827)
+
# address = 127.0.0.1
+
# port = 2827
+
+
[i2cp]
+
## Enable the I2CP protocol (default: false)
+
# enabled = false
+
## Address and port service will listen on (default: 127.0.0.1:7654)
+
# address = 127.0.0.1
+
# port = 7654
+
+
[i2pcontrol]
+
## Enable the I2PControl protocol (default: false)
+
# enabled = false
+
## Address and port service will listen on (default: 127.0.0.1:7650)
+
# address = 127.0.0.1
+
# port = 7650
+
## Authentication password (default: itoopie)
+
# password = itoopie
+
+
[precomputation]
+
## Enable or disable elgamal precomputation table
+
## By default, enabled on i386 hosts
+
# elgamal = true
+
+
[upnp]
+
## Enable or disable UPnP: automatic port forwarding (enabled by default in WINDOWS, ANDROID)
+
# enabled = false
+
## Name i2pd appears in UPnP forwardings list (default: I2Pd)
+
# name = I2Pd
+
+
[meshnets]
+
## Enable connectivity over the Yggdrasil network (default: false)
+
# yggdrasil = true
+
## You can bind address from your Yggdrasil subnet 300::/64
+
## The address must first be added to the network interface
+
# yggaddress =
+
+
[reseed]
+
## Options for bootstrapping into I2P network, aka reseeding
+
## Enable reseed data verification (default: true)
+
verify = true
+
## URLs to request reseed data from, separated by comma
+
## Default: "mainline" I2P Network reseeds
+
# urls = https://reseed.i2p-projekt.de/,https://i2p.mooo.com/netDb/,https://netdb.i2p2.no/
+
## Reseed URLs through the Yggdrasil, separated by comma
+
# yggurls = http://[324:71e:281a:9ed3::ace]:7070/
+
## Path to local reseed data file (.su3) for manual reseeding
+
# file = /path/to/i2pseeds.su3
+
## or HTTPS URL to reseed from
+
# file = https://legit-website.com/i2pseeds.su3
+
## Path to local ZIP file or HTTPS URL to reseed from
+
# zipfile = /path/to/netDb.zip
+
## If you run i2pd behind a proxy server, set proxy server for reseeding here
+
## Should be http://address:port or socks://address:port
+
# proxy = http://127.0.0.1:8118
+
## Minimum number of known routers, below which i2pd triggers reseeding (default: 25)
+
# threshold = 25
+
+
[addressbook]
+
## AddressBook subscription URL for initial setup
+
## Default: reg.i2p at "mainline" I2P Network
+
# defaulturl = http://shx5vqsw7usdaunyzr2qmes2fq37oumybpudrd4jjj4e4vk4uusa.b32.i2p/hosts.txt
+
## Optional subscriptions URLs, separated by comma
+
# subscriptions = http://reg.i2p/hosts.txt,http://identiguy.i2p/hosts.txt,http://stats.i2p/cgi-bin/newhosts.txt
+
+
[limits]
+
## Maximum active transit sessions (default: 10000)
+
## This value is doubled if floodfill mode is enabled!
+
# transittunnels = 10000
+
## Limit number of open file descriptors (0 - use system limit)
+
# openfiles = 0
+
## Maximum size of corefile in Kb (0 - use system limit)
+
# coresize = 0
+
+
[trust]
+
## Enable explicit trust options. (default: false)
+
# enabled = true
+
## Make direct I2P connections only to routers in specified Family.
+
# family = MyFamily
+
## Make direct I2P connections only to routers specified here. Comma separated list of base64 identities.
+
# routers =
+
## Should we hide our router from other routers? (default: false)
+
# hidden = true
+
+
[exploratory]
+
## Exploratory tunnels settings with default values
+
# inbound.length = 2
+
# inbound.quantity = 3
+
# outbound.length = 2
+
# outbound.quantity = 3
+
+
[persist]
+
## Save peer profiles on disk (default: true)
+
# profiles = true
+
## Save full addresses on disk (default: true)
+
# addressbook = true
+
+10
i2pd/data/tunnels.conf
···
+
[ssh-server]
+
type = server
+
host = 127.0.0.1
+
port = 22
+
inbound.length = 1
+
outbound.length = 1
+
inbound.quantity = 5
+
outbound.quantity = 5
+
i2cp.reduceOnIdle = true
+
keys = ssh-in.dat
+7
yggdrasil/README.md
···
+
# yggdrasil
+
+
based on the https://hub.docker.com/r/jauderho/yggdrasil-go image. this doesn't work with podman due to networling stuff. ygg requires /dev/tun and net admin to route traffic to the daemon.
+
+
the included config file enables NodeInfoPrivacy and changes AdminListen to tcp instead of a socket.
+
+
learn more about the yggdrasil router here: https://yggdrasil-network.github.io/
+16
yggdrasil/compose.yml
···
+
services:
+
yggdrasil:
+
container_name: yggdrasil
+
image: jauderho/yggdrasil-go
+
restart: unless-stopped
+
network_mode: host
+
cap_add:
+
- NET_ADMIN
+
devices:
+
- /dev/net/tun:/dev/net/tun
+
volumes:
+
- "./yggdrasil.conf:/etc/yggdrasil.conf"
+
command:
+
- "yggdrasil"
+
- "-useconffile"
+
- "/etc/yggdrasil.conf"
+82
yggdrasil/yggdrasil.conf
···
+
{
+
# Your private key. DO NOT share this with anyone!
+
PrivateKey: CHANGE_ME
+
+
# List of outbound peer connection strings (e.g. tls://a.b.c.d:e or
+
# socks://a.b.c.d:e/f.g.h.i:j). Connection strings can contain options,
+
# see https://yggdrasil-network.github.io/configurationref.html#peers.
+
# Yggdrasil has no concept of bootstrap nodes - all network traffic
+
# will transit peer connections. Therefore make sure to only peer with
+
# nearby nodes that have good connectivity and low latency. Avoid adding
+
# peers to this list from distant countries as this will worsen your
+
# node's connectivity and performance considerably.
+
Peers: [
+
ADD_PEERS_HERE
+
]
+
+
# List of connection strings for outbound peer connections in URI format,
+
# arranged by source interface, e.g. { "eth0": [ "tls://a.b.c.d:e" ] }.
+
# You should only use this option if your machine is multi-homed and you
+
# want to establish outbound peer connections on different interfaces.
+
# Otherwise you should use "Peers".
+
InterfacePeers: {}
+
+
# Listen addresses for incoming connections. You will need to add
+
# listeners in order to accept incoming peerings from non-local nodes.
+
# This is not required if you wish to establish outbound peerings only.
+
# Multicast peer discovery will work regardless of any listeners set
+
# here. Each listener should be specified in URI format as above, e.g.
+
# tls://0.0.0.0:0 or tls://[::]:0 to listen on all interfaces.
+
Listen: [
+
+
]
+
+
AdminListen: tcp://localhost:9001
+
+
# Configuration for which interfaces multicast peer discovery should be
+
# enabled on. Regex is a regular expression which is matched against an
+
# interface name, and interfaces use the first configuration that they
+
# match against. Beacon controls whether or not your node advertises its
+
# presence to others, whereas Listen controls whether or not your node
+
# listens out for and tries to connect to other advertising nodes. See
+
# https://yggdrasil-network.github.io/configurationref.html#multicastinterfaces
+
# for more supported options.
+
MulticastInterfaces: [
+
{
+
Regex: .*
+
Beacon: true
+
Listen: true
+
Password: ""
+
}
+
]
+
+
# List of peer public keys to allow incoming peering connections
+
# from. If left empty/undefined then all connections will be allowed
+
# by default. This does not affect outgoing peerings, nor does it
+
# affect link-local peers discovered via multicast.
+
# WARNING: THIS IS NOT A FIREWALL and DOES NOT limit who can reach
+
# open ports or services running on your machine!
+
AllowedPublicKeys: []
+
+
# Local network interface name for TUN adapter, or "auto" to select
+
# an interface automatically, or "none" to run without TUN.
+
IfName: auto
+
+
# Maximum Transmission Unit (MTU) size for your local TUN interface.
+
# Default is the largest supported size for your platform. The lowest
+
# possible value is 1280.
+
IfMTU: 65535
+
+
# By default, nodeinfo contains some defaults including the platform,
+
# architecture and Yggdrasil version. These can help when surveying
+
# the network and diagnosing network routing problems. Enabling
+
# nodeinfo privacy prevents this, so that only items specified in
+
# "NodeInfo" are sent back if specified.
+
NodeInfoPrivacy: true
+
+
# Optional nodeinfo. This must be a { "key": "value", ... } map
+
# or set as null. This is entirely optional but, if set, is visible
+
# to the whole network on request.
+
NodeInfo: {
+
}
+
}