NIP-10: Nym Exit Policy Update – Opening Ports for Dash, SIP, Voice, TeamSpeak, and Litecoin Services
| ID | title | created | status | kind | author(s) | champions |
|---|---|---|---|---|---|---|
| NIP-10 | Nym Exit Policy Update – Opening Ports for Dash, SIP, Voice, TeamSpeak, and Litecoin Services | 31-03-2026 | proposed | standard | Serinko, Nym network technical lead & devrel serinko@nymtech.net, Jaya, Chief of strategy jaya@nymtech.net | Merve, Operator technical mentor merve@nymtech.net |
NIP-10 proposes updating the Nym exit policy to open specific TCP and UDP ports, enabling NymVPN users to access Dash network, SIP, Voice, Filetransfer, TeamSpeak, and Litecoin P2P services while maintaining privacy and network security.
Motivation
The Nym exit policy defines which ports are accessible on exit nodes to ensure privacy, security, and reliable service.
Dash, SIP, Voice, TeamSpeak, and Litecoin P2P services require specific TCP/UDP ports. Currently, these ports are blocked, limiting NymVPN users who rely on these services. Opening these ports improves usability without compromising privacy or security.
This update will follow operator governance, consistent with previous exit policy changes (example).
Since NIP-1, exit policy decisions are managed via Nym Governator to ensure transparency and accountability.
Proposal to Enable Ports for NymVPN Users
Proposal to Enable Ports for NymVPN Users
TeamSpeak Services
- Voice: UDP 9987
- Filetransfer: TCP 30033
- ServerQuery (raw): TCP 10011
- ServerQuery (SSH): TCP 10022
- WebQuery (HTTP): TCP 10080
- WebQuery (HTTPS): TCP 10443
- TSDNS: TCP 41144
Cryptocurrency / P2P Services
- Litecoin P2P: TCP/UDP 9333
- Dash network: TCP/UDP 9999
Voting options
Voting takes place at Nym Governator. Proposed options:
- YES: Approve opening the above ports.
- NO: Reject the proposal entirely.
Submit any concerns with supporting documentation for review before finalizing.
Process
If the vote meets quorum and a majority approves:
- A pull request will update the exit policy.
- The Network Tunnel Manager (NTM) will be updated to allow operators to configure WireGuard exit policy ports in line with the Mixnet policy.
Background
The Nym exit policy protects operators and users by controlling accessible ports.
Previously, Network Requesters used a centralized allow list. To decentralize control and enhance privacy, Nym transitioned to a deny list, forming the current exit policy.
Exit nodes in Gateway mode act both as:
- SOCKS5 Network Requesters
- Exit nodes for IP traffic from mixnet and VPN clients
Applying a uniform policy ensures reliable, privacy-preserving service for all NymVPN users.