2024-04-29 17:49:02 +00:00
< h1 > Additional Information< / h1 >
< h2 > Table of Contents< / h2 >
- [Introduction ](#introduction )
- [Connect to Other Nodes ](#connect-to-other-nodes )
2024-05-14 19:12:18 +00:00
- [Hosted Public Nodes ](#hosted-public-nodes )
2024-04-29 17:49:02 +00:00
- [Default Port ](#default-port )
- [Check Network Information ](#check-network-information )
- [Test the Network ](#test-the-network )
- [Key Pair ](#key-pair )
- [Running without TUN interface ](#running-without-tun-interface )
- [API ](#api )
- [Message System ](#message-system )
- [Inspecting Node Keys ](#inspecting-node-keys )
2024-05-14 21:06:21 +00:00
- [Troubleshooting ](#troubleshooting )
- [Root Access ](#root-access )
- [Enable IPv6 at the OS Level ](#enable-ipv6-at-the-os-level )
- [VPN Can Block Mycelium ](#vpn-can-block-mycelium )
- [Add Peers ](#add-peers )
2024-04-29 17:49:02 +00:00
***
## Introduction
We provide additional information concerning Mycelium and how to properly use it.
## Connect to Other Nodes
If you want to connect to other nodes, you can specify their listening address as
part of the command (combined with the protocol they are listening on, usually TCP);
```sh
mycelium --peers tcp://83.231.240.31:9651 quic://185.206.122.71:9651
```
If you are using other tun inferface, e.g. utun3 (default), you can set a different utun inferface
```sh
mycelium --peers tcp://83.231.240.31:9651 quic://185.206.122.71:9651 --tun-name utun9
```
2024-05-14 19:12:18 +00:00
## Hosted Public Nodes
2024-04-29 17:49:02 +00:00
2024-05-14 19:12:18 +00:00
A couple of public nodes are provided, which can be freely connected to. This allows
anyone to join the global network. These are hosted in 3 geographic regions, on both
IPv4 and IPv6, and supporting both the Tcp and Quic protocols. The nodes are the
following:
2024-04-29 17:49:02 +00:00
2024-05-14 19:12:18 +00:00
| Node ID | Region | IPv4 | IPv6 | Tcp port | Quic port |
| --- | --- | --- | --- | --- | --- |
| 01 | DE | 188.40.132.242 | 2a01:4f8:221:1e0b::2 | 9651 | 9651 |
| 02 | DE | 136.243.47.186 | 2a01:4f8:212:fa6::2 | 9651 | 9651 |
| 03 | BE | 185.69.166.7 | 2a02:1802:5e:0:8478:51ff:fee2:3331 | 9651 | 9651 |
| 04 | BE | 185.69.166.8 | 2a02:1802:5e:0:8c9e:7dff:fec9:f0d2 | 9651 | 9651 |
| 05 | FI | 65.21.231.58 | 2a01:4f9:6a:1dc5::2 | 9651 | 9651 |
| 06 | FI | 65.109.18.113 | 2a01:4f9:5a:1042::2 | 9651 | 9651 |
These nodes are all interconnected, so 2 peers who each connect to a different node
(or set of disjoint nodes) will still be able to reach each other. For optimal performance,
it is recommended to connect to all of the above at once however. An example connection
string could be:
`--peers tcp://188.40.132.242:9651 "tcp://[2a01:4f8:212:fa6::2]:9651" quic://185.69.166.7:9651 "tcp://[2a02:1802:5e:0:8c9e:7dff:fec9:f0d2]:9651" tcp://65.21.231.58:9651 "quic://[2a01:4f9:5a:1042::2]:9651"`
It is up to the user to decide which peers he wants to use, over which protocol.
Note that quotation may or may not be required, depending on which shell is being
used.
2024-04-29 17:49:02 +00:00
## Default Port
By default, the node will listen on port `9651` , though this can be overwritten with the `-p` flag.
## Check Network Information
You can check your Mycelium network information by running the following line:
```bash
mycelium inspect --json
```
Where a typical output would be:
```
{
"publicKey": "abd16194646defe7ad2318a0f0a69eb2e3fe939c3b0b51cf0bb88bb8028ecd1d",
"address": "3c4:c176:bf44:b2ab:5e7e:f6a:b7e2:11ca"
}
```
## Test the Network
You can easily test that the network works by pinging to anyone in the network.
```
ping6 3c4:c176:bf44:b2ab:5e7e:f6a:b7e2:11ca
```
## Key Pair
The node uses a `x25519` key pair from which its identity is derived. The private key of this key pair
is saved in a local file (32 bytes in binary format). You can specify the path to this file with the
`-k` flag. By default, the file is saved in the current working directory as `priv_key.bin` .
## Running without TUN interface
It is possible to run the system without creating a TUN interface, by starting with the `--no-tun` flag.
Obviously, this means that your node won't be able to send or receive L3 traffic. There is no interface
to send packets on, and consequently no interface to send received packets out of. From the point of
other nodes, your node will simply drop all incoming L3 traffic destined for it. The node **will still
route traffic** as normal. It takes part in routing, exchanges route info, and forwards packets not
intended for itself.
The node also still allows access to the [message subsystem ](#message-system ).
## API
The node starts an HTTP API, which by default listens on `localhost:8989` . A different listening address
can be specified on the CLI when starting the system through the `--api-server-addr` flag. The API
allows access to [send and receive messages ](#message-system ), and will later be expanded to allow
admin functionality on the system. Note that message are sent using the identity of the node, and a
future admin API can be used to change the system behavior. As such, care should be taken that this
API is not accessible to unauthorized users.
## Message System
A message system is provided which allows users to send a message, which is essentially just "some data"
to a remote. Since the system is end-to-end encrypted, a receiver of a message is sure of the authenticity
and confidentiality of the content. The system does not interpret the data in any way and handles it
as an opaque block of bytes. Messages are sent with a deadline. This means the system continuously
tries to send (part of) the message, until it either succeeds, or the deadline expires. This happens
similar to the way TCP handles data. Messages are transmitted in chunks, which are embedded in the
same data stream used by L3 packets. As such, intermediate nodes can't distinguish between regular L3
and message data.
The primary way to interact with the message system is through [the API ](#API ). The message API is
2024-05-13 23:28:23 +00:00
documented in [here ](api_yaml.md ). For some more info about how to
use the message system, see [the Message section ](message.md ).
2024-04-29 17:49:02 +00:00
## Inspecting Node Keys
Using the `inspect` subcommand, you can view the address associated with a public key. If no public key is provided, the node will show
its own public key. In either case, the derived address is also printed. You can specify the path to the private key with the `-k` flag.
If the file does not exist, a new private key will be generated. The optional `--json` flag can be used to print the information in json
format.
```sh
mycelium inspect a47c1d6f2a15b2c670d3a88fbe0aeb301ced12f7bcb4c8e3aa877b20f8559c02
```
Where the output could be something like this:
```sh
Public key: a47c1d6f2a15b2c670d3a88fbe0aeb301ced12f7bcb4c8e3aa877b20f8559c02
Address: 27f:b2c5:a944:4dad:9cb1:da4:8bf7:7e65
2024-05-14 20:21:27 +00:00
```
2024-05-14 21:06:21 +00:00
## Troubleshooting
2024-05-14 20:21:27 +00:00
2024-05-14 21:06:21 +00:00
### Root Access
You might need to run Mycelium as root. Some error messages could be something like: `Error: NixError(EPERM)` .
### Enable IPv6 at the OS Level
You need to enable IPv6 at the OS level. Some error messages could be something like: `Permission denied (os error 13)` .
- Check if IPv66 is enabled
- If disabled, output is 1, if enabled, output is 0
```
sysctl net.ipv6.conf.all.disable_ipv6
```
- Enable IPv6
```
sudo sysctl net.ipv6.conf.all.disable_ipv6=0
```
Here's some commands to troubleshoot IPv6:
2024-05-14 20:21:27 +00:00
```
2024-05-14 21:06:21 +00:00
sudo ip6tables -S INPUT
sudo ip6tables -S OUTPUT
```
### VPN Can Block Mycelium
You might need to disconnect your VPN when using Mycelium.
### Add Peers
It can help to connect to other peers. Check the Mycelium repository for [peers ](https://github.com/threefoldtech/mycelium?tab=readme-ov-file#hosted-public-nodes ).