@orcproject/orc v13.2.0
Installation
We provide Debian packages for Debian 10 (Buster), Ubuntu 18.04 (Bionic), or equivalent newer releases. Packages can be acquired via our APT repository or by direct download.
Make sure you have the required packages to setup the repository source:
sudo apt install gnupg2 lsb-release software-properties-common curl
Install Node.js from the NodeSource repositories to make sure we get a recent enough version.
curl -sL https://deb.nodesource.com/setup_10.x | sudo bash -
sudo apt-get install -y nodejs
Fetch the release signing key, add the repository, update your package cache and install!
sudo apt-key adv --keyserver keyserver.ubuntu.com --recv-keys 0E91E62407FB53DED129BDCC2794A30CB9212297
sudo add-apt-repository "deb http://apt.orc.network/ $(lsb_release -cs) main"
sudo apt update
sudo apt install orc
If you are worried that you may be monitored or if the repository is censored by your ISP or government, you can access the repostiory as a Tor hidden service instead:
sudo apt-key adv --keyserver keyserver.ubuntu.com --recv-keys 0E91E62407FB53DED129BDCC2794A30CB9212297
sudo apt install apt-transport-tor tor
sudo add-apt-repository "deb tor://ijxj7jw2czgi4544xmf63arngmiesddlerisu47yswgf3pbsdpw477qd.onion/ $(lsb_release -cs) main"
sudo apt update
sudo apt install orc
Follow the post installation prompts to encrypt your private key. ORC will be installed as a systemd, sysv-init, or upstart service depending on your system.
Now you can access your node by running the ORC program from your
applications menu! You may also access it by opening a browser and navigating
to http://127.0.0.1:9089
, or remotely by using
Tor Browser and navigating to the onion address that
is contained in the file /etc/orc/bridge_hs/hidden_service/hostname
.
Direct Download
Alternatively you can download a release package from the latest tag. Download links for the package(s) are in the release notes for each tagged release. Once downloaded you can install by running:
sudo dpkg -i orc_x.x.x_all.deb
sudo apt install -f
Process Monitoring
You may discover later that you'd like to tweak some advanced settings. Just
update your configuration as desired at /etc/orc/config
and restart the
service.
sudo systemctl restart orc.service # or...
sudo service orc restart # or...
sudo /etc/init.d/orc restart # ...depending on your system
Depending on the init system you are using, you'll check logs differently.¬
journalctl -u orc # systemd
tail -f /var/log/orc/debug.log # otherwise
Using Docker
If you are on Mac OS or a GNU/Linux distribution that is not based on Debian, just install Docker and run the commands below:
docker pull orcproject/orc
mkdir ~/.config/orc
docker run -it -v ~/.config/orc:/root/.config/orc orcproject/orc --reset-passphrase
This will generate the configuration files and encrypted private keys and exit. Now you can run the ORC daemon, supplying it with these files and publishing the web interface port to the host (if you wish to access it locally):
docker run -it -p 127.0.0.1:9089:9089 -v ~/.config/orc:/root/.config/orc orcproject/orc
You must run the container with the -i
or --interactive
flag so you can set
and/or input your passphrase. There is also a command line option for orc
that will non-interactively read the passphrase from a file, --passphrase
. If
you wish you run the container non-interactively. This is useful for running a
node in the cloud remotely and letting it restart automatically if it exits or
reboots:
echo 'MySecurePassphrase' > ~/.config/orc/passwd
docker run \
--restart always \
--volume ~/.config/orc:/root/.config/orc \
--publish 127.0.0.1:9089:9089 \
--tty --detach \
orcproject/orc --passphrase /root/.config/orc/passwd
Then you can access your node via it's authenticated onion service using
Tor Browser. Note
that in order to run the container detached with automatic restarts, you cannot
use the --interactive
flag and must use the --passphrase
method shown
above. Consult the Docker documentation for details on different options.
Usage
On first run, ORC will generate a fresh configuration and setup the data
directory. Modify the created configuration (/etc/orc/config
or
~/.config/orc/config
) as desired (see the {@tutorial config}) and kill
the process. Once you are satisfied with your configuration, run ORC again.
Once started, you can setup your node through the Web UI which is accessible
via both a local port and onion address printed to the console when running
orc
and written to $ORC_CONFIG_DIR/bridge_hs/hidden_service/hostname
.
You can also use the guide for {@tutorial api} to interact with you node if you
are a developer or advanced user!
ORC works on an explicit trust model. By default, ORC will only trust unknown nodes for discovering peers, retreiving public objects, and storing object metadata. If you want to store objects, you must establish trust with other nodes. This is done explicity by all parties who trust each other. Run ORC with your friends, other activists, or complementary organizations.
Each node is identified by the hash of their public key. You'll see this on
every log line under the name
property. For example,
b605647afc146760fc15ef7cd59720f1ee7d82e1
. To establish trust with a friend,
each of you must provide your identity to each other out of band (we recommend
using Ricochet). Once you've exchanged identity keys,
add a trust policy to your configuration file (or via the web interface).
TrustedIdenties[]=b605647afc146760fc15ef7cd59720f1ee7d82e1
For every node you wish to add to your storage grid, each must add a policy
like the above which says "allow b605647afc146760fc15ef7cd59720f1ee7d82e1
to store and retrieve shards. You can also add new trusted peers using the
web interface. See the {@tutorial config} for more information.
If you are a press organization or activist group and would like help getting setup with ORC, please reach out to us by email at
counterpoint[at]disroot.org
- we'd love to assist you!
Automatic Security Updates
When running the ORC server installation with Docker, you can configure your node to periodically check for updates and automatically download the latest image and restart your node to make sure you are always running the latest stable release. Since you already have Docker installed, pull the image for Watchtower and run it.
docker pull v2tec/watchtower
docker run -d --name watchtower -v /var/run/docker.sock:/var/run/docker.sock v2tec/watchtower
Now, Watchtower will check for the latest stable images for running containers and automatically update them.
Development
To hack on the ORC project, clone this repository and use Docker Compose. See {@tutorial install} for more detailed instructions about installing prerequisites.
git clone https://gitlab.com/orcproject/orc
cd orc
npm install
npm start
This will volume mount the the appropriate directories for development, and
then boots up a complete sandboxed ORC network, including a complete sandboxed
Tor network and once bootstrapped, binds ports 10089
, 11089
, 12089
,
13089
, and 14089
to the host for full end-to-end testing using 5 nodes in
a trusted grid. Each of these nodes can be controlled in your web browser by
visiting their respective ports. The passphrase for each running node is:
Simulation
for accessing the web interfaces.
The development container does not persist state between
runs. Note that stable releases are tagged and the master
branch may contain
unstable or bleeding-edge code. Happy hacking!
Resources
License
ORC - Distributed Anonymous Cloud
Copyright (C) 2017 Counterpoint Hackerspace, Ltd.
Copyright (C) 2017 Gordon Hall
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU Affero General Public License as published
by the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU Affero General Public License for more details.
You should have received a copy of the GNU Affero General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
6 years ago
6 years ago
6 years ago
6 years ago
6 years ago
6 years ago
6 years ago
6 years ago
6 years ago
6 years ago
6 years ago
6 years ago
6 years ago
6 years ago
6 years ago
6 years ago
6 years ago
6 years ago
6 years ago
6 years ago
6 years ago
6 years ago
6 years ago
6 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago
7 years ago