Operating rippled Servers
The core server of the Ripple peer-to-peer network is rippled. Anyone can run their own rippled server that follows the network and keeps a complete copy of the Ripple ledger. You can even have your server perform validations and participate in the consensus process.
This page contains instructions for:
Types of rippled Servers
The rippled server software can run in several modes depending on its configuration, including:
- Stock server - follows the network with a local copy of the ledger.
- Validating server, or validator for short - participates in consensus.
rippledserver in stand-alone mode - for basic testing. Does not communicate to otherrippledservers.
You can also run the rippled executable as a client application for accessing rippled APIs locally. (Two instances of the same binary can run side-by-side in this case; one as a server, and the other running briefly as a client and then terminating.)
Reasons to Run a Stock Server
There are lots of reasons you might want to run your own rippled server, but most of them can be summarized as: you can trust your own server, you have control over its workload, and you're not at the mercy of others to decide when and how you can access it.
It is important that you can trust the rippled you use, so you can be certain that the software you are running will behave in the manner specified in its source code. Of course, you must also practice good network security to protect your server from malicious hackers. If you connect to a malicious server, there are myriad ways that it can take advantage of you or cause you to lose money. For example:
- A malicious server could report that you were paid when no such payment was made
- It could selectively show or hide payment paths and currency exchange offers to guarantee its own profit while not providing you the best deal
- If you sent it your account's secret, it could make arbitrary transactions on your behalf, and even transfer or destroy all the money in your account's balances.
Additionally, running your own server gives you admin control over it, which allows you to run important admin-only and load-intensive commands. If you use a shared server, you have to worry about other users of the same server competing with you for the server's computing power. Many of the commands in the WebSocket API can put a lot of strain on the server, so rippled has the option to scale back its responses when it needs to. If you share a server with others, you may not always get the best results possible.
Finally, if you run a validating server, you can use a stock server as a proxy to the public network while keeping your validating server on a private subnet only accessible to the outside world through the stock server. This makes it more difficult to compromise the integrity of your validating server.
Reasons to Run a Validator
The robustness of the Ripple network depends on an interconnected web of validators who each trust a few other validators not to collude. The more operators with different interests there are who run validators, the more certain each member of the network can be that it continues to run impartially. If you or your organization relies on the Ripple peer-to-peer network, it is in your interest to contribute to the consensus process.
Not all rippled servers need to be validators: trusting additional servers from the same operator does not provide additional protection against collusion. It could be useful for an organization to run validators in multiple regions in order to provide better redundancy in case of natural disasters and other emergencies.
If your organization runs a validating server, you may also run one or more stock servers, to balance the computing load of API access, or as a proxy between your validation server and the outside network.
Properties of a Good Validator
There are several properties that define a good validator. The more of these properties your server embodies, the more reason others have to include your server in their list of trusted validators:
- Availability. An ideal validator should always be running, submitting validation votes for every proposed ledger.
- Basically, strive for 100% uptime.
- Agreement. A validator's votes should match the outcome of the consensus process as often as possible. To do otherwise could indicate that the validator's software is outdated, buggy, or intentionally biased.
- Always run the latest
rippledrelease without modifications.
- Always run the latest
- Timeliness. A validator's votes should arrive quickly, and not after a consensus round has already finished.
- A fast internet connection helps with this.
- Identified. It should be clear who runs the validator. Ideally, a list of trusted validators should include validators operated by different owners in multiple legal jurisdictions and geographic areas, to reduce the chance that any localized events could interfere with the validator's impartial operation.
- Setting up Domain Verification is a good start.
At present, Ripple (the company) cannot recommend any validators aside from the 5 core validators run by Ripple (the company): these validators are included in the default rippled configuration. However, we are collecting data on other validators and building tools to report on their performance. For metrics on the validators currently operating, see validators.ripple.com.
Installing rippled
For development, you can compile rippled from source.
Production rippled instances can use Ripple's binary executable, available from the Ripple yum repository.
System Requirements
A rippled server should run comfortably on commodity hardware, to make it easy to participate in the network. At present, we recommend the following:
- Operating System:
- Production: CentOS or RedHat Enterprise Linux (latest release) supported
- Development: Mac OS X, Windows (64-bit), or most Linux distributions
- CPU: 64-bit x86_64, 2+ cores
- Disk: Minimum 50GB SSD recommended (500+ IOPS, more is better) for the database partition
- RAM: 4+GB
Amazon EC2's m3.large VM size may be appropriate depending on your workload. (Validating servers need more resources.)
Naturally, a fast network connection is preferable.
Installation on CentOS/Red Hat with yum
This section assumes that you are using CentOS 7 or Red Hat Enterprise Linux 7.
-
Install the Ripple rpm repository:
$ sudo rpm -Uvh https://mirrors.ripple.com/ripple-repo-el7.rpm -
Install the
rippledsoftware package:$ sudo yum install --enablerepo=ripple-stable rippled -
Configure the
rippledservice to start on system boot:$ sudo systemctl enable rippled.service -
Start the
rippledservice$ sudo systemctl start rippled.service
It can take several minutes for rippled to sync with the rest of the network, during which time it outputs warnings about missing ledgers. After that, you have a fully functional stock rippled server that you can use for local signing and API access to the Ripple peer-to-peer network.
rippled commands can be run with:
$ /opt/ripple/bin/rippled --conf /opt/ripple/etc/rippled.cfg <command>
Updating rippled
Automatic
Automatic rippled updates can be enabled with a one-time Cron configuration:
-
Check that
/opt/ripple/bin/update-rippled.shexists. If it does not, perform a manual update. -
Install
crond:$ sudo yum install cronie -
Open the crontab file for editing
$ sudo crontab -e -
Add the following to the crontab file. Be sure to add a blank line at the end of the file.
RANDOM_DELAY=59 0 * * * * /opt/ripple/bin/update-rippled.sh
The installed rippled package will be updated within an hour of a new release.
Manual
Run the following commands to update to the latest release of rippled:
$ sudo rpm -Uvh --replacepkgs https://mirrors.ripple.com/ripple-repo-el7.rpm
$ sudo yum update --enablerepo=ripple-stable rippled
$ sudo systemctl daemon-reload
$ sudo service rippled restart
You can subscribe to the rippled Google Group to receive notifications of new rippled releases.
Running a Validator
Running a rippled validator that participates in the Consensus process is simple:
- Enable validation on your
rippledserver.- At first, your server is an untrusted validator. Others can see the validations your server issues, but they disregard them in the consensus process.
- Share the public key with the public, especially other
rippledoperators. - When other
rippledoperators add your public key to their list of trusted servers, you have become a trusted validator.- Also see Properties of a Good Validator for best practices.
Validator Setup
-
Start
rippled:$ sudo service rippled start -
Generate a validation public key and seed, and save the output to a secure place:
$ /opt/ripple/bin/rippled --conf /opt/ripple/etc/rippled.cfg -q validation_create { "status" : "success", "validation_key" : "FOLD WERE CHOW WIT SWIM RANK WED DAN LAIN TRIO MURK NELL", "validation_public_key" : "n9KHn8NfbBsZV5q8bLfS72XyGqwFt5mgoPbcTV4c6qKiuPTAtXYk", "validation_seed" : "ssdecohJMDPFuUPDkmG1w4objZyp4" } -
Add the generated validator signing key from above to your
rippled.cfg:[validation_seed] ssdecohJMDPFuUPDkmG1w4objZyp4 -
Restart
rippledvalidator:$ sudo service rippled restart
Public-Facing Server
To protect a production validator from DDoS attacks, you can use a stock rippled server as a proxy between the validator and the outside network.
-
Configure the validator and stock
rippledservers to be clustered with each other. -
Make the following configuration changes to your validator:
- Copy the
[ips_fixed]list and paste it under[ips]. These fields should contain only the IP addresses and ports of the public-facing rippled(s). The validator will connect to only these peers. - Change
[peer_private]to1to prevent its IP address from being forwarded.
- Copy the
-
Configure the validator host machine's firewall to only accept inbound connections from its public-facing rippled(s).
Remember to restart rippled for config changes to take effect.
Take care not to publish the IP address of your validator.
Domain Verification
Network participants are unlikely to trust validators without knowing who is operating them. To address this concern, validator operators can associate their validator with a web domain that they operate. Publishing a ripple.txt and setting the validator's account domain allows services like validators.ripple.com to detect the domain associated with the validator.
ripple.txt
Publish a ripple.txt page at your domain with a signed SSL certificate.
List the validator's validation_public_key (generated above in step 3) in the [validation_public_key] section.
Account domain
A master seed can be used to generate both a validation public key and a Ripple account address. Since the same secret key is used for both, whoever operates the validator also controls the account with the corresponding address. (The validator's public key and the account address both represent the public key for the same keypair.)
The steps below describe how to set the domain field of a validator's Ripple account.
-
Get the validator's account address (
account_id) using thevalidation_seedgenerated above in step 3:$ /opt/ripple/bin/rippled --conf /opt/ripple/etc/rippled.cfg wallet_propose <your-validation-seed> { "result" : { "account_id" : "rU7bM9ENDkybaxNrefAVjdLTyNLuue1KaJ", "key_type" : "secp256k1", "master_key" : "FOLD WERE CHOW WIT SWIM RANK WED DAN LAIN TRIO MURK NELL", "master_seed" : "ssdecohJMDPFuUPDkmG1w4objZyp4", "master_seed_hex" : "434256443542C27BD1A84A2BACC9B8F0", "public_key" : "aBQzwnRdgHVZmr8gLNugihTf5NsWAUpayGdAHtz8YPk1w3L4fh6S", "public_key_hex" : "038ED9785EE7FC687445E0D94065A74FF6CEC6506A03C7380075D81A2B9E7E8681", "status" : "success" } } -
Fund the account by sending it at least 25 XRP.
- See How to Get XRP
-
Set the
Domainfield of the account to match the domain hosting your ripple.txt$ /opt/ripple/bin/rippled --conf /opt/ripple/etc/rippled.cfg submit <your-secret-key> '{"TransactionType": "AccountSet", "Account": "<your-account-id>", "Domain": "<your-hex-encoded-domain>", "Fee": "10000"}' -
Verify that your account's domain has been set.
$ /opt/ripple/bin/rippled --conf /opt/ripple/etc/rippled.cfg account_info <your-account-id>
Additional Configuration
rippled should connect to the Ripple network with the default configuration. However, you can modify your settings by editing the rippled.cfg file (located at /opt/ripple/etc/rippled.cfg when installing rippled with yum).
See the rippled GitHub repository for a description of all configuration options.
Changes to the [debug_logfile] or [database_path] sections may require you to give the rippled user and group ownership to your new configured path:
$ chown -R rippled:rippled <configured path>
You will need to restart rippled for any configuration changes to take effect:
$ sudo service rippled restart
Parallel Networks
Most of the time, we describe the Ripple peer-to-peer network as one collective, singular entity -- and that's mostly true. There is one production Ripple peer-to-peer network, and all business that takes place on Ripple occurs within the production network.
However, sometimes you may want to do tests and experiments without interacting with the core network. That's why Ripple started the Ripple Test Net, an "alternate universe" network, which can act as a testing ground for applications and the rippled server itself, without impacting the business operations of everyday Ripple users. The Ripple Test Net (also known as the AltNet) has a separate supply of TestNet-only XRP, which Ripple gives away for free to parties interested in developing applications on the Test Net.
Caution: Ripple makes no guarantees about the stability of the test network. It has been and continues to be used to test various properties of server configuration, network topology, and network performance.
Over time, there may also be additional, smaller test networks for specific purposes.
Parallel Networks and Consensus
There is no rippled setting that defines which network it uses. Instead, it uses the consensus of validators it trusts to know which ledger to accept as the truth. When different consensus groups of rippled instances only trust other members of the same group, each group continues to operate as a parallel network. Even if malicious or misbehaving computers connect to both networks, the consensus process overrides the confusion as long as the members of each network are not configured to trust members of another network in excess of their quorum settings.
Clustering
If you are running multiple rippled servers in a single datacenter, you can configure those servers to operate in a cluster to maximize efficiency. Operating your rippled servers in a cluster provides the following benefits:
- Clustered
rippledservers share the work of cryptography. If one server has verified the authenticity of a message, the other servers in the cluster trust it and do not re-verify. - Clustered servers share information about peers and API clients that are misbehaving or abusing the network. This makes it harder to attack all servers of the cluster at once.
- Clustered servers always propagate transactions throughout the cluster, even if the transaction does not meet the current load-based transaction fee on some of them.
To enable clustering, modify the following sections of your config file for each server:
-
List the IP address and port of each other server under the
[ips_fixed]section. The port should be the one from the other servers'protocol = peersetting in theirrippled.cfg. Example:[ips_fixed] 192.168.0.1 51235 192.168.0.2 51235 -
Generate a unique seed (using the
validation_createcommand) for each of your servers, and configure it under the[node_seed]section. Therippledserver uses this key to sign its messages to other servers in the peer-to-peer network. Note: This is a different key than the onerippleduses to sign ledger proposals for consensus, but it is in the same format. - Add the public keys (for peer communication) of each of your other servers under the
[cluster_nodes]section.
