Project

General

Profile

ConfigFileFormat » History » Version 19

Davide Pesavento, 06/04/2021 11:45 AM

1 15 Davide Pesavento
# Configuration file format
2 1 Alex Afanasyev
3 17 Davide Pesavento
The initial state of NFD is configured using a textual file in [Boost INFO](https://www.boost.org/doc/libs/1_65_1/doc/html/property_tree/parsers.html#property_tree.parsers.info_parser) format.
4 1 Alex Afanasyev
5 11 Alex Afanasyev
    ; The general section contains settings of nfd process.
6 1 Alex Afanasyev
    general
7
    {
8 11 Alex Afanasyev
      ; Specify a user and/or group for NFD to drop privileges to
9
      ; when not performing privileged tasks. NFD does not drop
10
      ; privileges by default.
11 19 Davide Pesavento
12 11 Alex Afanasyev
      ; user ndn-user
13
      ; group ndn-user
14 1 Alex Afanasyev
    }
15 19 Davide Pesavento
16 1 Alex Afanasyev
    log
17
    {
18 11 Alex Afanasyev
      ; default_level specifies the logging level for modules
19
      ; that are not explicitly named. All debugging levels
20
      ; listed above the selected value are enabled.
21
      ;
22
      ; Valid values:
23
      ;
24
      ;  NONE ; no messages
25
      ;  ERROR ; error messages
26
      ;  WARN ; warning messages
27
      ;  INFO ; informational messages (default)
28
      ;  DEBUG ; debugging messages
29
      ;  TRACE ; trace messages (most verbose)
30
      ;  ALL ; all messages
31 19 Davide Pesavento
32 11 Alex Afanasyev
      default_level INFO
33 19 Davide Pesavento
34 11 Alex Afanasyev
      ; You may override default_level by assigning a logging level
35
      ; to the desired module name. Module names can be found in two ways:
36
      ;
37
      ; Run:
38
      ;   nfd --modules
39
      ;
40 18 Davide Pesavento
      ; Or look for NFD_LOG_INIT(<module name>) statements in source files.
41
      ; Note that the "nfd." prefix can be omitted.
42 1 Alex Afanasyev
      ;
43
      ; Example module-level settings:
44
      ;
45
      ; FibManager DEBUG
46
      ; Forwarder INFO
47
    }
48 19 Davide Pesavento
49 1 Alex Afanasyev
    ; The tables section configures the CS, PIT, FIB, Strategy Choice, and Measurements
50
    tables
51
    {
52
      ; ContentStore size limit in number of packets
53
      ; default is 65536, about 500MB with 8KB packet size
54
      cs_max_packets 65536
55 19 Davide Pesavento
56 1 Alex Afanasyev
      ; Set the CS replacement policy.
57 16 Davide Pesavento
      ; Available policies are: priority_fifo, lru
58 18 Davide Pesavento
      cs_policy lru
59 19 Davide Pesavento
60 16 Davide Pesavento
      ; Set a policy to decide whether to cache or drop unsolicited Data.
61
      ; Available policies are: drop-all, admit-local, admit-network, admit-all
62
      cs_unsolicited_policy drop-all
63 19 Davide Pesavento
64 16 Davide Pesavento
      ; Set the forwarding strategy for the specified prefixes:
65
      ;   <prefix> <strategy>
66
      strategy_choice
67
      {
68
        /               /localhost/nfd/strategy/best-route
69
        /localhost      /localhost/nfd/strategy/multicast
70
        /localhost/nfd  /localhost/nfd/strategy/best-route
71
        /ndn/broadcast  /localhost/nfd/strategy/multicast
72
      }
73 19 Davide Pesavento
74 16 Davide Pesavento
      ; Declare network region names
75
      ; These are used for mobility support.  An Interest carrying a Link object is
76
      ; assumed to have reached the producer region if any delegation name in the
77
      ; Link object is a prefix of any region name.
78
      network_region
79
      {
80
        ; /example/region1
81
        ; /example/region2
82
      }
83 11 Alex Afanasyev
    }
84 19 Davide Pesavento
85 1 Alex Afanasyev
    ; The face_system section defines what faces and channels are created.
86
    face_system
87
    {
88 18 Davide Pesavento
      ; This section contains options that apply to multiple face protocols.
89
      general
90
      {
91
        enable_congestion_marking yes ; set to 'no' to disable congestion marking on supported faces, default 'yes'
92
      }
93 19 Davide Pesavento
94 18 Davide Pesavento
      ; The unix section contains settings for Unix stream faces and channels.
95 16 Davide Pesavento
      ; A Unix channel is always listening; delete the unix section to disable
96 1 Alex Afanasyev
      ; Unix stream faces and channels.
97 16 Davide Pesavento
      unix
98
      {
99 18 Davide Pesavento
        ; The default transport is unix:///run/nfd.sock (on Linux) or unix:///var/run/nfd.sock (on
100
        ; other platforms). This should match the "transport" field in client.conf for ndn-cxx. If you
101
        ; wish to use TCP instead of Unix sockets with ndn-cxx, change "transport" to an appropriate
102
        ; TCP FaceUri.
103
        path /run/nfd.sock ; Unix stream listener path
104 1 Alex Afanasyev
      }
105 19 Davide Pesavento
106 18 Davide Pesavento
      ; The tcp section contains settings for TCP faces and channels.
107 1 Alex Afanasyev
      tcp
108
      {
109
        listen yes ; set to 'no' to disable TCP listener, default 'yes'
110
        port 6363 ; TCP listener port number
111
        enable_v4 yes ; set to 'no' to disable IPv4 channels, default 'yes'
112
        enable_v6 yes ; set to 'no' to disable IPv6 channels, default 'yes'
113 19 Davide Pesavento
114 18 Davide Pesavento
        ; A TCP face has local scope if the local and remote IP addresses match the whitelist but not the blacklist
115
        local
116
        {
117
          whitelist
118
          {
119
            subnet 127.0.0.0/8
120
            subnet ::1/128
121
          }
122
          blacklist
123
          {
124
          }
125
        }
126 1 Alex Afanasyev
      }
127 19 Davide Pesavento
128 1 Alex Afanasyev
      ; The udp section contains settings for UDP faces and channels.
129
      udp
130
      {
131
        ; UDP unicast settings.
132
        listen yes ; set to 'no' to disable UDP listener, default 'yes'
133
        port 6363 ; UDP listener port number
134
        enable_v4 yes ; set to 'no' to disable IPv4 channels, default 'yes'
135
        enable_v6 yes ; set to 'no' to disable IPv6 channels, default 'yes'
136 19 Davide Pesavento
137 1 Alex Afanasyev
        ; Time (in seconds) before closing an idle UDP unicast face.
138 16 Davide Pesavento
        ; The actual timeout will occur anytime between idle_timeout and 2*idle_timeout.
139
        ; The default is 600 (10 minutes).
140 18 Davide Pesavento
        idle_timeout 600
141 19 Davide Pesavento
142
        ; Maximum payload size for outgoing packets on unicast faces, used in NDNLPv2 fragmentation.
143
        ; This must be between 64 and 8800. The default is 8800.
144
        ; This value excludes IPv4/IPv6/UDP headers. On an Ethernet link of MTU=1500, setting this
145
        ; to 1452 would leave enough room for IP+UDP headers and prevent IP fragmentation.
146
        ; This option is not changable during runtime configuration reload, but the MTU of an
147
        ; individual face can be updated via NFD Management Protocol or the 'nfdc' tool.
148
        unicast_mtu 8800
149
150 1 Alex Afanasyev
        ; UDP multicast settings.
151
        ; By default, NFD creates one UDP multicast face per NIC.
152
        ;
153
        ; In multi-homed Linux machines these settings will NOT work without
154 16 Davide Pesavento
        ; root or setting the appropriate permissions:
155
        ;
156
        ;    sudo setcap cap_net_raw=eip /path/to/nfd
157
        ;
158
        mcast yes ; set to 'no' to disable UDP multicast, default 'yes'
159
        mcast_group 224.0.23.170 ; UDP multicast group (IPv4)
160
        mcast_port 56363 ; UDP multicast port number (IPv4)
161
        mcast_group_v6 ff02::1234 ; UDP multicast group (IPv6)
162 1 Alex Afanasyev
        mcast_port_v6 56363 ; UDP multicast port number (IPv6)
163
        mcast_ad_hoc no ; set to 'yes' to make all UDP multicast faces "ad hoc", default 'no'
164 19 Davide Pesavento
165 16 Davide Pesavento
        ; Whitelist and blacklist can contain, in no particular order:
166
        ; - interface names, including wildcard patterns (e.g., 'ifname eth0', 'ifname en*', 'ifname wlp?s0')
167 18 Davide Pesavento
        ; - MAC addresses (e.g., 'ether 85:3b:4d:d3:5f:c2')
168
        ; - IPv4 subnets (e.g., 'subnet 192.0.2.0/24')
169
        ; - IPv6 subnets (e.g., 'subnet 2001:db8::/32')
170 16 Davide Pesavento
        ; - a single asterisk ('*') that matches all interfaces
171
        ; By default, all interfaces are whitelisted.
172 1 Alex Afanasyev
        whitelist
173 16 Davide Pesavento
        {
174
          *
175
        }
176
        blacklist
177 11 Alex Afanasyev
        {
178 1 Alex Afanasyev
        }
179
      }
180 19 Davide Pesavento
181 18 Davide Pesavento
      ; The ether section contains settings for Ethernet faces and channels.
182 16 Davide Pesavento
      ; These settings will NOT work without root or setting the appropriate
183 1 Alex Afanasyev
      ; permissions:
184
      ;
185
      ;    sudo setcap cap_net_raw,cap_net_admin=eip /path/to/nfd
186
      ;
187
      ; You may need to install a package to use setcap:
188
      ;
189
      ; **Ubuntu:**
190 18 Davide Pesavento
      ;
191 1 Alex Afanasyev
      ;    sudo apt install libcap2-bin
192
      ;
193
      ; **Mac OS X:**
194
      ;
195
      ;    curl https://bugs.wireshark.org/bugzilla/attachment.cgi?id=3373 -o ChmodBPF.tar.gz
196
      ;    tar zxvf ChmodBPF.tar.gz
197 16 Davide Pesavento
      ;    open ChmodBPF/Install\ ChmodBPF.app
198 1 Alex Afanasyev
      ;
199 11 Alex Afanasyev
      ; or manually:
200
      ;
201 1 Alex Afanasyev
      ;    sudo chgrp admin /dev/bpf*
202
      ;    sudo chmod g+rw /dev/bpf*
203
      ;
204 16 Davide Pesavento
      ether
205
      {
206
        ; Ethernet unicast settings.
207
        listen yes ; set to 'no' to disable Ethernet listener, default 'yes'
208 19 Davide Pesavento
209 16 Davide Pesavento
        ; Time (in seconds) before closing an idle Ethernet unicast face.
210
        ; The actual timeout will occur anytime between idle_timeout and 2*idle_timeout.
211
        ; The default is 600 (10 minutes).
212
        idle_timeout 600
213 19 Davide Pesavento
214 11 Alex Afanasyev
        ; Ethernet multicast settings.
215
        ; By default, NFD creates one Ethernet multicast face per NIC.
216 16 Davide Pesavento
        mcast yes ; set to 'no' to disable Ethernet multicast, default 'yes'
217
        mcast_group 01:00:5E:00:17:AA ; Ethernet multicast group
218
        mcast_ad_hoc no ; set to 'yes' to make all Ethernet multicast faces "ad hoc", default 'no'
219 19 Davide Pesavento
220 18 Davide Pesavento
        ; Whitelist and blacklist can contain, in no particular order:
221 1 Alex Afanasyev
        ; - interface names, including wildcard patterns (e.g., 'ifname eth0', 'ifname en*', 'ifname wlp?s0')
222 18 Davide Pesavento
        ; - MAC addresses (e.g., 'ether 85:3b:4d:d3:5f:c2')
223
        ; - IPv4 subnets (e.g., 'subnet 192.0.2.0/24')
224 1 Alex Afanasyev
        ; - IPv6 subnets (e.g., 'subnet 2001:db8::/32')
225
        ; - a single asterisk ('*') that matches all interfaces
226
        ; By default, all interfaces are whitelisted.
227
        whitelist
228
        {
229
          *
230
        }
231
        blacklist
232
        {
233
        }
234
      }
235 19 Davide Pesavento
236 18 Davide Pesavento
      ; The websocket section contains settings for WebSocket faces and channels.
237 1 Alex Afanasyev
      websocket
238
      {
239
        listen yes ; set to 'no' to disable WebSocket listener, default 'yes'
240
        port 9696 ; WebSocket listener port number
241
        enable_v4 yes ; set to 'no' to disable listening on IPv4 socket, default 'yes'
242
        enable_v6 yes ; set to 'no' to disable listening on IPv6 socket, default 'yes'
243
      }
244 19 Davide Pesavento
245 18 Davide Pesavento
      ; The netdev_bound section defines faces bound to netdevices.
246
      netdev_bound
247
      {
248
        ; A rule consists of a whitelist, a blacklist, and a set of remote FaceUris, and will cause the
249
        ; creation of zero or more faces bound to netdevices. One face will be created per accepted
250
        ; netdev per remote. There can be any number of rules in the netdev_bound section.
251 19 Davide Pesavento
252 18 Davide Pesavento
        ; rule
253
        ; {
254
        ;   ; Remote FaceUri to which the netdev-bound faces will connect.
255
        ;   ; Rule can contain multiple remotes. One face will be created for each remote.
256
        ;   ; All FaceUris must be in canonical form. Currently only udp4 and udp6 are supported.
257
        ;   remote udp4://192.0.2.1:6363
258
        ;
259
        ;   ; Whitelist and blacklist can contain, in no particular order:
260 1 Alex Afanasyev
        ;   ; - interface names, including wildcard patterns (e.g., 'ifname eth0', 'ifname en*', 'ifname wlp?s0')
261
        ;   ; - MAC addresses (e.g., 'ether 85:3b:4d:d3:5f:c2')
262
        ;   ; - IPv4 subnets (e.g., 'subnet 192.0.2.0/24')
263
        ;   ; - IPv6 subnets (e.g., 'subnet 2001:db8::/32')
264 18 Davide Pesavento
        ;   ; - a single asterisk ('*') that matches all interfaces
265
        ;   ; By default, all interfaces are whitelisted.
266
        ;   whitelist
267 1 Alex Afanasyev
        ;   {
268 18 Davide Pesavento
        ;     *
269
        ;   }
270
        ;   blacklist
271
        ;   {
272 1 Alex Afanasyev
        ;   }
273 18 Davide Pesavento
        ; }
274 11 Alex Afanasyev
      }
275
    }
276 19 Davide Pesavento
277 11 Alex Afanasyev
    ; The authorizations section grants privileges to authorized keys.
278
    authorizations
279
    {
280
      ; An authorize section grants privileges to a NDN certificate.
281
      authorize
282
      {
283 1 Alex Afanasyev
        ; If you do not already have NDN certificate, you can generate
284 11 Alex Afanasyev
        ; one with the following commands.
285 1 Alex Afanasyev
        ;
286 11 Alex Afanasyev
        ; 1. Generate and install a self-signed identity certificate:
287
        ;
288 19 Davide Pesavento
        ;      ndnsec key-gen /$(whoami) | ndnsec cert-install -
289 11 Alex Afanasyev
        ;
290 19 Davide Pesavento
        ; Note that the argument to 'ndnsec key-gen' will be the identity name of
291
        ; the new key (in this case, /your-username). Identities are hierarchical
292
        ; NDN names and may have multiple components (e.g., /ndn/ucla/edu/alice).
293
        ; You may create additional keys and identities as needed.
294 11 Alex Afanasyev
        ;
295 1 Alex Afanasyev
        ; 2. Dump the NDN certificate to a file:
296 10 Alex Afanasyev
        ;
297
        ;      sudo mkdir -p /usr/local/etc/ndn/keys/
298 19 Davide Pesavento
        ;      ndnsec cert-dump -i /$(whoami) >  default.ndncert
299 10 Alex Afanasyev
        ;      sudo mv default.ndncert /usr/local/etc/ndn/keys/default.ndncert
300 11 Alex Afanasyev
        ;
301
        ; The "certfile" field below specifies the default key directory for
302
        ; your machine. You may move your newly created key to the location it
303
        ; specifies or path.
304 19 Davide Pesavento
305 1 Alex Afanasyev
        ; certfile keys/default.ndncert ; NDN identity certificate file
306
        certfile any ; "any" authorizes command interests signed under any certificate,
307
                     ; i.e., no actual validation.
308 11 Alex Afanasyev
        privileges ; set of privileges granted to this identity
309
        {
310
          faces
311 18 Davide Pesavento
          fib
312 11 Alex Afanasyev
          cs
313
          strategy-choice
314
        }
315
      }
316 19 Davide Pesavento
317 11 Alex Afanasyev
      ; You may have multiple authorize sections that specify additional
318
      ; certificates and their privileges.
319 19 Davide Pesavento
320 11 Alex Afanasyev
      ; authorize
321
      ; {
322
      ;   certfile keys/this_cert_does_not_exist.ndncert
323 16 Davide Pesavento
      ;   authorize
324 11 Alex Afanasyev
      ;   privileges
325 16 Davide Pesavento
      ;   {
326 11 Alex Afanasyev
      ;     faces
327
      ;   }
328
      ; }
329
    }
330 19 Davide Pesavento
331 11 Alex Afanasyev
    rib
332
    {
333 1 Alex Afanasyev
      ; The following localhost_security allows anyone to register routing entries in local RIB
334 11 Alex Afanasyev
      localhost_security
335
      {
336
        trust-anchor
337
        {
338
          type any
339
        }
340
      }
341 19 Davide Pesavento
342 11 Alex Afanasyev
      ; localhop_security should be enabled when NFD runs on a hub.
343
      ; "/localhop/nfd/fib" command prefix will be disabled when localhop_security section is missing.
344
      ; localhop_security
345 1 Alex Afanasyev
      ; {
346
      ;   ; This section defines the trust model for NFD RIB Management. It consists of rules and
347
      ;   ; trust-anchors, which are briefly defined in this file.  For more information refer to
348
      ;   ; validator configuration file format documentation:
349
      ;   ;
350
      ;   ;    https://named-data.net/doc/ndn-cxx/current/tutorials/security-validator-config.html
351
      ;   ;
352 16 Davide Pesavento
      ;   ; A trust-anchor is a pre-trusted certificate.  This can be any certificate that is the
353 11 Alex Afanasyev
      ;   ; root of certification chain (e.g., NDN testbed root certificate) or an existing
354
      ;   ; default system certificate `default.ndncert`.
355 1 Alex Afanasyev
      ;   ;
356
      ;   ; A rule defines conditions a valid packet MUST have. A packet must satisfy one of the
357
      ;   ; rules defined here. A rule can be broken into two parts: matching & checking. A packet
358 11 Alex Afanasyev
      ;   ; will be matched against rules from the first to the last until a matched rule is
359 16 Davide Pesavento
      ;   ; encountered. The matched rule will be used to check the packet. If a packet does not
360
      ;   ; match any rule, it will be treated as invalid.  The matching part of a rule consists
361 1 Alex Afanasyev
      ;   ; of `for` and `filter` sections. They collectively define which packets can be checked
362
      ;   ; with this rule. `for` defines packet type (data or interest) and `filter` defines
363
      ;   ; conditions on other properties of a packet. Right now, you can only define conditions
364
      ;   ; on packet name, and you can only specify ONLY ONE filter for packet name.  The
365
      ;   ; checking part of a rule consists of `checker`, which defines the conditions that a
366
      ;   ; VALID packet MUST have. See comments in checker section for more details.
367
      ;
368
      ;   rule
369 18 Davide Pesavento
      ;   {
370
      ;     id "RIB Command Interest"
371
      ;     for interest
372
      ;     ; match Commmand Interest name
373
      ;     ; last three components are ControlParameters, timestamp, and random-value
374 1 Alex Afanasyev
      ;     ; SignatureInfo and SignatureValue are stripped before passing to the filter
375
      ;     filter
376 18 Davide Pesavento
      ;     {
377
      ;       type name
378 1 Alex Afanasyev
      ;       regex ^<localhop><nfd><rib>[<register><unregister>]<>{3}$
379
      ;     }
380
      ;     checker
381 11 Alex Afanasyev
      ;     {
382 18 Davide Pesavento
      ;       type customized
383
      ;       sig-type ecdsa-sha256
384 1 Alex Afanasyev
      ;       ; KeyLocator must be either a key name or a certificate name
385 18 Davide Pesavento
      ;       key-locator
386
      ;       {
387 1 Alex Afanasyev
      ;         type name
388
      ;         regex ^<>*<KEY><>{1,3}$
389
      ;       }
390
      ;     }
391
      ;   }
392
      ;   rule
393 18 Davide Pesavento
      ;   {
394
      ;     id "NDN Testbed Certificate Hierarchy"
395 1 Alex Afanasyev
      ;     for data
396
      ;     ; match certificate name only
397 18 Davide Pesavento
      ;     filter
398
      ;     {
399 1 Alex Afanasyev
      ;       type name
400
      ;       regex ^<>*<KEY><>{3}$
401
      ;     }
402 18 Davide Pesavento
      ;     checker
403
      ;     {
404
      ;       type customized
405
      ;       sig-type ecdsa-sha256
406
      ;       key-locator
407
      ;       {
408
      ;         type name
409 1 Alex Afanasyev
      ;         ; issuer subject name must be a prefix of issued certificate name
410 18 Davide Pesavento
      ;         hyper-relation
411
      ;         {
412
      ;           k-regex ^(<>*)<KEY><>{1,3}$
413 1 Alex Afanasyev
      ;           k-expand \\1
414 18 Davide Pesavento
      ;           h-relation is-prefix-of
415
      ;           p-regex ^(<>*)$
416 1 Alex Afanasyev
      ;           p-expand \\1
417 11 Alex Afanasyev
      ;         }
418
      ;       }
419
      ;     }
420
      ;   }
421
      ;   trust-anchor
422 1 Alex Afanasyev
      ;   {
423 18 Davide Pesavento
      ;     type file
424
      ;     ; certificate path, relative to this config file
425 11 Alex Afanasyev
      ;     file-name keys/default.ndncert
426 18 Davide Pesavento
      ;   }
427 11 Alex Afanasyev
      ;   ; trust-anchor entry may be repeated to specify multiple trust anchors
428
      ; }
429 19 Davide Pesavento
430 11 Alex Afanasyev
      ; The following localhop_security should be enabled when NFD runs on a hub,
431
      ; which accepts all remote registrations and is a short-term solution.
432
      ; localhop_security
433
      ; {
434 16 Davide Pesavento
      ;   trust-anchor
435
      ;   {
436
      ;     type any
437
      ;   }
438 18 Davide Pesavento
      ; }
439 19 Davide Pesavento
440 18 Davide Pesavento
      ; The following prefix_announcement_validation accepts any prefix announcement
441
      prefix_announcement_validation
442
      {
443
        trust-anchor
444
        {
445
          type any
446
        }
447 16 Davide Pesavento
      }
448 19 Davide Pesavento
449 16 Davide Pesavento
      auto_prefix_propagate
450
      {
451
        cost 15 ; forwarding cost of prefix registered on remote router
452
        timeout 10000 ; timeout (in milliseconds) of prefix registration command for propagation
453 19 Davide Pesavento
454 16 Davide Pesavento
        refresh_interval 300 ; interval (in seconds) before refreshing the propagation
455
        ; This setting should be less than face_system.udp.idle_time,
456
        ; so that the face is kept alive on the remote router.
457 19 Davide Pesavento
458 16 Davide Pesavento
        base_retry_wait 50 ; base wait time (in seconds) before retrying propagation
459 1 Alex Afanasyev
        max_retry_wait 3600 ; maximum wait time (in seconds) before retrying propagation
460 16 Davide Pesavento
        ; for consequent retries, the wait time before each retry is calculated based on the back-off
461
        ; policy. Initially, the wait time is set to base_retry_wait, then it will be doubled for every
462
        ; retry unless beyond the max_retry_wait, in which case max_retry_wait is set as the wait time.
463
      }
464 19 Davide Pesavento
465 1 Alex Afanasyev
      ; If enabled, routes registered with origin=client (typically from auto_prefix_propagate)
466
      ; will be readvertised into local NLSR daemon.
467
      readvertise_nlsr no
468
    }