Reth
Generate the JWT file
We first need to create a JSON Web Token (JWT) that will allow the execution layer software (Reth) and the consensus layer software to talk to each other.
Run the following commands one line at a time to create a folder on the server to store the JWT file and generate the JWT file:
sudo mkdir -p /var/lib/jwtsecret
openssl rand -hex 32 | sudo tee /var/lib/jwtsecret/jwt.hex > /dev/null
We will be pointing the configuration files of the execution and consensus clients to this JWT file later.
Download Reth and configure the service
Download the latest version of Reth and it's digital signature (.asc) file. for verifying the checksum to ensure that the downloaded file has not been tampered with.
cd
curl -LO https://github.com/paradigmxyz/reth/releases/download/v1.1.0/reth-v1.1.0-x86_64-unknown-linux-gnu.tar.gz
curl -LO https://github.com/paradigmxyz/reth/releases/download/v1.1.0/reth-v1.1.0-x86_64-unknown-linux-gnu.tar.gz.asc
Run the checksum verification process.
gpg --keyserver keyserver.ubuntu.com --recv-keys A3AE097C89093A124049DF1F5391A3C4100530B4
gpg --verify reth-v1.1.0-x86_64-unknown-linux-gnu.tar.gz.asc reth-v1.1.0-x86_64-unknown-linux-gnu.tar.gz
Verify the release signing key (--recv-keys
) in the first command above here.
Expected output: Verify output of the checksum verification
-linux-gnu.tar.gz.asc reth-v0.1.0-alpha.23-x86_64-unknown-linux-gnu.tar.gz
gpg: Signature made Mon Apr 22 16:57:36 2024 UTC
gpg: using EDDSA key A3AE097C89093A124049DF1F5391A3C4100530B4
gpg: Good signature from "Georgios Konstantopoulos (This is the key used by gakonst to sign Reth releases) <georgios@paradigm.xyz>" [expired]
gpg: Note: This key has expired!
Primary key fingerprint: A3AE 097C 8909 3A12 4049 DF1F 5391 A3C4 1005 30B4
If checksum is verified, extract the files and move them into the (/usr/local/bin)
directory for neatness and best practice. Then, clean up the duplicated copies.
tar xvf reth-v1.1.0-x86_64-unknown-linux-gnu.tar.gz
sudo cp reth /usr/local/bin
rm -r reth*
Create an account (reth
) without server access for Reth to run as a background service. This type of user account will not have root access so it restricts potential attackers to only the Reth service in the unlikely event that they manage to infiltrate via a compromised client update.
sudo useradd --no-create-home --shell /bin/false reth
Create a directory for Reth to store the blockchain data of the execution layer. Then set the owner of this directory to reth
so that this user can read and write to the directory.
sudo mkdir -p /var/lib/reth
sudo chown -R reth:reth /var/lib/reth
Create a systemd configuration file for the Reth service to run in the background.
sudo nano /etc/systemd/system/reth.service
Paste the configuration parameters below into the file:
[Unit]
Description=Reth Execution Client (Holesky)
After=network.target
Wants=network.target
[Service]
User=reth
Group=reth
Type=simple
Restart=always
RestartSec=5
ExecStart=/usr/local/bin/reth node \
--chain holesky \
--datadir=/var/lib/reth \
--log.file.directory=/var/lib/reth/logs \
--authrpc.jwtsecret=/var/lib/jwtsecret/jwt.hex \
--full \
--port 30303 \
--http \
--http.api eth,web3,net,txpool,debug,trace \
--http.addr <Internal_IP_address> \
--http.port 8547 \
--ws \
--ws.addr <Internal_IP_address> \
--ws.port 8548 \
--metrics 127.0.0.1:6060
[Install]
WantedBy=default.target
Once you're done, save with Ctrl+O
and Enter
, then exit with Ctrl+X
. Understand and review your configuration summary below, and amend if needed.
Reth configuration summary:
--chain
: Run the on the Holesky testnet--datadir
: The directory for Reth to store the blockchain data of the execution layer--log.file.directory
: The path to put log files in--authrpc.jwtsecret
: The directory pointing to the JWT secret we generated earlier--full:
Run full node.--port
: Sets the port used for peer-to-peer communication. Defaults to 30303.--http
: Enables the HTTP-RPC service on http and websocket. This is so that DVT clients such as the Diva service can connect to your execution client--http.api
: Rpc modules to be configured for the HTTP server.--http.addr
: Sets the IP address to connect to the JSON RPC service. Use the internal IP address of your device here (check by runningip a
) - e.g.192.168.x.x
. Defaults to127.0.0.1
otherwise--http.port
: Sets the port to connect to the HTTP-RPC service that will be used by the DVT services. You may choose any unused port number but remember to allow incoming connections into your chosen port in your firewall (ufw
) rules. Defaults to 8545.--ws
: ws=Websocket. Enable the WS-RPC server. This is so that DVT clients can connect to your execution client.--ws.addr
: Websocket server address to listen on. Used by DVT clients.--ws.port
: Websocket server port to listen on. Used by DVT clients.--metrics
: Enable monitoring metrics on the Reth service.
Start Reth
Reload the systemd daemon to register the changes made, start Reth, and check its status to make sure its running.
sudo systemctl daemon-reload
sudo systemctl start reth.service
sudo systemctl status reth.service
Expected output: The output should say Reth is “active (running)”. Press CTRL-C to exit and Reth will continue to run. It should take around 6 hours for Reth to sync on the Holesky testnet.
Use the following command to check the logs of Reth’s syncing process. Watch out for any warnings or errors.
sudo apt install ccze -y
sudo journalctl -fu reth -o cat | ccze -A
Expected output:
Press CTRL-C
to exit.
If the Reth service is running smoothly, we can now enable it to fire up automatically when rebooting the system.
sudo systemctl enable reth.service
Expected output:
Created symlink /etc/systemd/system/default.target.wants/reth.service → /etc/systemd/system/reth.service.
Resources:
Documentation: https://reth.rs/
Telegram: https://t.me/paradigm_reth
Last updated