Skip to main content

Server Setup

Configure Hardware​

Let's save some power, raise the governor on the CPU a bit, and set GPU ram as low as we can.

caution

Here are some links for overclocking and testing your drive speeds. If you have heat sinks you can safely go to 2000. Just pay attention to over volt recommendations to go with your chosen clock speed.

Take note that Ubuntu stores config.txt in a different location than Raspbian.

Overclock, memory & radios​

Edit /boot/firmware/config.txt. Just paste Pi Node additions in at the bottom.

>_ Terminal
sudo nano /boot/firmware/config.txt
/boot/firmware/config.txt
## Pi Node ##
over_voltage=6
arm_freq=2000
gpu_mem=16
dtoverlay=disable-wifi
dtoverlay=disable-bt

Save and reboot.

>_ Terminal
sudo reboot

Configure Ubuntu​

Disable the root user​

>_ Terminal
sudo passwd -l root

Secure shared memory​

Mount shared memory as read only. Open /etc/fstab.

>_ Terminal
sudo nano /etc/fstab

Add this line at the bottom, save & exit.

/etc/fstab
tmpfs    /run/shm    tmpfs    ro,noexec,nosuid    0 0

Increase open file limit for $USER​

Add a couple lines to the bottom of /etc/security/limits.conf

>_ Terminal
sudo bash -c "echo -e '${USER} soft nofile 800000\n${USER} hard nofile 1048576\n' >> /etc/security/limits.conf"

Confirm it was added to the bottom.

>_ Terminal
cat /etc/security/limits.conf

Optimize performance & security​

caution

If you would like to disable ipv6 or turn on forwarding you can below.

Add the following to the bottom of /etc/sysctl.d/99-sysctl.conf. Save and exit.

>_ Terminal
sudo nano /etc/sysctl.d/99-sysctl.conf
/etc/sysctl.d/99-sysctl.conf

fs.file-max = 10000000
fs.nr_open = 10000000

# ignore ICMP redirects
net.ipv4.conf.all.send_redirects = 0
net.ipv4.conf.default.send_redirects = 0
net.ipv4.conf.all.accept_redirects = 0
net.ipv4.conf.default.accept_redirects = 0

net.ipv4.icmp_ignore_bogus_error_responses = 1

# disable IPv6
#net.ipv6.conf.all.disable_ipv6 = 1
#net.ipv6.conf.default.disable_ipv6 = 1

# block SYN attacks
net.ipv4.tcp_syncookies = 1
net.ipv4.tcp_max_syn_backlog = 2048
net.ipv4.tcp_synack_retries = 3
net.ipv4.netfilter.ip_conntrack_tcp_timeout_syn_recv=45

# in progress tasks
net.ipv4.tcp_keepalive_time = 240
net.ipv4.tcp_keepalive_intvl = 4
net.ipv4.tcp_keepalive_probes = 5

# reboot if we run out of memory
vm.panic_on_oom = 1
kernel.panic = 10

# Use Google's congestion control algorithm
net.core.default_qdisc = fq
net.ipv4.tcp_congestion_control = bbr

Disable IRQ balance​

You should turn off IRQ Balance to make sure you do not get hardware interrupts in your threads. Turning off IRQ Balance will optimize the balance between power savings and performance through the distribution of hardware interrupts across multiple processors.

Open /etc/default/irqbalance and add to the bottom. Save, exit and reboot.

>_ Terminal
sudo nano /etc/default/irqbalance
/etc/default/irqbalance
ENABLED="0"

Chrony​

We need to get our time synchronization as accurate as possible. Open /etc/chrony/chrony.conf

>_ Terminal
sudo apt install chrony
>_ Terminal
sudo nano /etc/chrony/chrony.conf

Replace the contents of the file with below, Save and exit.

/etc/chrony/chrony.conf
pool time.google.com       iburst minpoll 2 maxpoll 2 maxsources 3 maxdelay 0.3
pool time.euro.apple.com iburst minpoll 2 maxpoll 2 maxsources 3 maxdelay 0.3
pool time.apple.com iburst minpoll 2 maxpoll 2 maxsources 3 maxdelay 0.3
pool ntp.ubuntu.com iburst minpoll 2 maxpoll 2 maxsources 3 maxdelay 0.3

# This directive specify the location of the file containing ID/key pairs for
# NTP authentication.
keyfile /etc/chrony/chrony.keys

# This directive specify the file into which chronyd will store the rate
# information.
driftfile /var/lib/chrony/chrony.drift

# Uncomment the following line to turn logging on.
#log tracking measurements statistics

# Log files location.
logdir /var/log/chrony

# Stop bad estimates upsetting machine clock.
maxupdateskew 5.0

# This directive enables kernel synchronisation (every 11 minutes) of the
# real-time clock. Note that it can’t be used along with the 'rtcfile' directive.
rtcsync

# Step the system clock instead of slewing it if the adjustment is larger than
# one second, but only in the first three clock updates.
makestep 0.1 -1

# Get TAI-UTC offset and leap seconds from the system tz database
leapsectz right/UTC

# Serve time even if not synchronized to a time source.
local stratum 10
>_ Terminal
sudo service chrony restart

Zram swap​

info

We have found that cardano-node can safely use this compressed swap in ram essentially giving us around 20gb of ram. We already set kernel parameters for zram in /etc/sysctl.conf

Swapping to disk is slow, swapping to compressed ram space is faster and gives us some overhead before out of memory (oom).

>_ Terminal
sudo apt install zram-config linux-modules-extra-raspi
>_ Terminal
sudo nano /usr/bin/init-zram-swapping

Switch compression algorithm to lz4. Multiply the default mem variable by 3 like below. This will give the instance 35gb of compressed virtual swap in RAM. Increase vm.swappiness to 150.

/usr/bin/init-zram-swapping
mem=$((totalmem / 2 * 1024 * 3))
/usr/bin/init-zram-swapping
#!/bin/sh

modprobe zram

# Calculate memory to use for zram (1/2 of ram)
totalmem=`LC_ALL=C free | grep -e "^Mem:" | sed -e 's/^Mem: *//' -e 's/ *.*//'`
echo lz4 > /sys/block/zram0/comp_algorithm
mem=$((totalmem / 2 * 1024 * 3))

# initialize the devices
echo $mem > /sys/block/zram0/disksize
mkswap /dev/zram0
swapon -p 150 /dev/zram0

Raspberry Pi & entropy​

Before we start generating keys with a headless server we should have a safe amount of entropy.

But consider the fate of a standalone, headless server (or a micro controller for that matter) with no human typing or mousing around, and no spinning iron drive providing mechanical irregularity. Where does it get entropy after it starts up? What if an attacker, or bad luck, forces periodic reboots? This is a real problem.

>_ Terminal
sudo apt-get install rng-tools

Automatic security updates​

Enable automatic security updates.

>_ Terminal
sudo dpkg-reconfigure -plow unattended-upgrades

Install packages​

Install the packages we will need.

>_ Terminal
sudo apt install build-essential libssl-dev tcptraceroute python3-pip flex \
make automake unzip net-tools ssl-cert pkg-config g++ bison \
libffi-dev libgmp-dev libssl-dev libtinfo-dev libsystemd-dev autoconf \
zlib1g-dev libncursesw5 llvm-12 numactl libnuma-dev libtool libsecp256k1-dev -y
>_ Terminal
sudo reboot

Optionally test drive speed​

Write speed​

>_ Terminal
sudo dd if=/dev/zero of=/tmp/output conv=fdatasync bs=384k count=1k; sudo rm -f /tmp/output

Read speed​

>_ Terminal
sudo hdparm -Tt /dev/sda