From bca070c1bdb74b59c207f3449559d24c1f0ab1f4 Mon Sep 17 00:00:00 2001 From: import this <97586125+serinko@users.noreply.github.com> Date: Thu, 9 Jan 2025 14:44:12 +0000 Subject: [PATCH] [DOCs]: Readiness for nym-dot-com (#5319) * url rewrites and redirects * url rewrites and redirects --- documentation/docs/README.md | 5 +- documentation/docs/components/mix-fetch.tsx | 2 +- .../outputs/api-scraping-outputs/time-now.md | 2 +- .../snippets-general/varible-info-snippet.mdx | 2 +- .../docs/pages/developers/archive/nymvpn.md | 38 --- .../developers/archive/nymvpn/cli-linux.md | 142 ----------- .../developers/archive/nymvpn/cli-mac.md | 123 --------- .../pages/developers/archive/nymvpn/cli.md | 240 ------------------ .../pages/developers/archive/nymvpn/faq.md | 71 ------ .../developers/archive/nymvpn/gui-linux.md | 85 ------- .../developers/archive/nymvpn/gui-mac.md | 65 ----- .../pages/developers/archive/nymvpn/gui.md | 50 ---- .../developers/archive/nymvpn/testing.md | 209 --------------- .../docs/pages/developers/licensing.md | 2 +- .../developers/rust/mixnet/examples/socks.md | 2 +- .../typescript/examples/mix-fetch.mdx | 4 +- .../pages/developers/typescript/start.mdx | 2 +- .../network/architecture/nyx/validator.mdx | 2 +- .../network/concepts/anonymous-replies.mdx | 2 +- .../pages/network/concepts/cover-traffic.mdx | 4 +- .../docs/pages/network/concepts/loopix.mdx | 2 +- .../docs/pages/network/concepts/mixing.mdx | 4 +- documentation/docs/pages/network/licensing.md | 2 +- documentation/docs/pages/network/traffic.mdx | 2 +- .../network/traffic/anonymous-replies.mdx | 2 +- .../pages/operators/binaries/building-nym.mdx | 10 +- .../docs/pages/operators/changelog.mdx | 13 +- .../community-counsel/exit-gateway.mdx | 4 +- .../docs/pages/operators/introduction.mdx | 4 +- .../docs/pages/operators/misc/licensing.md | 2 +- .../operators/nodes/nym-node/bonding.mdx | 4 +- .../nodes/nym-node/configuration.mdx | 8 +- .../configuration/proxy-configuration.mdx | 7 +- .../operators/nodes/preliminary-steps.mdx | 2 +- .../preliminary-steps/wallet-preparation.mdx | 9 +- .../nodes/validator-setup/nym-api.mdx | 5 +- .../docs/pages/operators/sandbox.mdx | 2 +- .../docs/pages/operators/tokenomics.mdx | 10 +- .../pages/operators/troubleshooting/nodes.mdx | 6 +- .../operators/troubleshooting/validators.mdx | 2 +- 40 files changed, 72 insertions(+), 1080 deletions(-) delete mode 100644 documentation/docs/pages/developers/archive/nymvpn.md delete mode 100644 documentation/docs/pages/developers/archive/nymvpn/cli-linux.md delete mode 100644 documentation/docs/pages/developers/archive/nymvpn/cli-mac.md delete mode 100644 documentation/docs/pages/developers/archive/nymvpn/cli.md delete mode 100644 documentation/docs/pages/developers/archive/nymvpn/faq.md delete mode 100644 documentation/docs/pages/developers/archive/nymvpn/gui-linux.md delete mode 100644 documentation/docs/pages/developers/archive/nymvpn/gui-mac.md delete mode 100644 documentation/docs/pages/developers/archive/nymvpn/gui.md delete mode 100644 documentation/docs/pages/developers/archive/nymvpn/testing.md diff --git a/documentation/docs/README.md b/documentation/docs/README.md index 82b2395837f..4bde3ebbdac 100644 --- a/documentation/docs/README.md +++ b/documentation/docs/README.md @@ -2,7 +2,7 @@ This is v2 of the nym docs, condensed from various mdbooks projects that we had previously. -These docs are hosted at [nymtech.net/docs](www.nymtech.net/docs). +These docs are hosted at [nym.com/docs](https://nym.com/docs). ## Doc projects `docs/pages/` contains several subdirs, each hosting a subsection of the docs: @@ -11,6 +11,7 @@ These docs are hosted at [nymtech.net/docs](www.nymtech.net/docs). * `operators` contains node setup and maintenance guides. ## Local development + ### Dependencies Our `prebuild` script relies on the following: - `python` @@ -54,7 +55,7 @@ This is a monorepo and components that make up Nym as a system are licensed indi As a general approach, licensing is as follows this pattern: -*

Nym Documentation by Nym Technologies is licensed under CC BY-NC-SA 4.0

+*

Nym Documentation by Nym Technologies is licensed under CC BY-NC-SA 4.0

* Nym applications and binaries are [GPL-3.0-only](https://www.gnu.org/licenses/) diff --git a/documentation/docs/components/mix-fetch.tsx b/documentation/docs/components/mix-fetch.tsx index 32557baf11f..252dcc1d1cd 100644 --- a/documentation/docs/components/mix-fetch.tsx +++ b/documentation/docs/components/mix-fetch.tsx @@ -9,7 +9,7 @@ import Stack from "@mui/material/Stack"; import Paper from "@mui/material/Paper"; import type { SetupMixFetchOps } from "@nymproject/mix-fetch-full-fat"; -const defaultUrl = "https://nymtech.net/favicon.svg"; +const defaultUrl = "https://nym.com/favicon.svg"; const args = { mode: "unsafe-ignore-cors" }; const mixFetchOptions: SetupMixFetchOps = { diff --git a/documentation/docs/components/outputs/api-scraping-outputs/time-now.md b/documentation/docs/components/outputs/api-scraping-outputs/time-now.md index 9ea1763e81b..1b6e7b90504 100644 --- a/documentation/docs/components/outputs/api-scraping-outputs/time-now.md +++ b/documentation/docs/components/outputs/api-scraping-outputs/time-now.md @@ -1 +1 @@ -Monday, January 6th 2025, 11:03:09 UTC +Wednesday, January 8th 2025, 15:01:28 UTC diff --git a/documentation/docs/components/snippets-general/varible-info-snippet.mdx b/documentation/docs/components/snippets-general/varible-info-snippet.mdx index 08860761534..4ab6ed8f167 100644 --- a/documentation/docs/components/snippets-general/varible-info-snippet.mdx +++ b/documentation/docs/components/snippets-general/varible-info-snippet.mdx @@ -2,5 +2,5 @@ import { Callout } from 'nextra/components' Our documentation often refer to syntax annotated in `<>` brackets. We use this expression for variables that are unique to each user (like path, local moniker, versions etcetra). -Any syntax in `<>` brackets needs to be substituted with your correct name or version, without the `<>` brackets. If you are unsure, please check our table of essential [parameters and variables](https://nymtech.net/docs/operators/variables.html). +Any syntax in `<>` brackets needs to be substituted with your correct name or version, without the `<>` brackets. If you are unsure, please check our table of essential [parameters and variables](https://nym.com/docs/operators/variables). diff --git a/documentation/docs/pages/developers/archive/nymvpn.md b/documentation/docs/pages/developers/archive/nymvpn.md deleted file mode 100644 index 02150ffe5a5..00000000000 --- a/documentation/docs/pages/developers/archive/nymvpn.md +++ /dev/null @@ -1,38 +0,0 @@ -# NymVPN alpha - -
- -```admonish tip title="web3summit testing" -**If you testing NymVPN CLI on Web3 Summit Berlin, visit our event page with all info tailored for the event: [nym-vpn-cli.sandbox.nymtech.net](https://nym-vpn-cli.sandbox.nymtech.net/).** -``` - -**NymVPN alpha** is a client that uses [Nym Mixnet](https://nymtech.net) to anonymise all of a user's internet traffic through either a 5-hop mixnet (for a full network privacy) or the faster 2-hop decentralised VPN (with some extra features). - - -**You are invited to take part in the alpha testing** of this new application. Register for private testing round at [nymvpn.com](https://nymvpn.com/en), that will grant you access to the [download page](https://nymvpn.com/download). Visit [NymVPN Support & FAQ](https://nymvpn.com/en/support) or join the [NymVPN matrix channel](https://matrix.to/#/#NymVPN:nymtech.chat) if you have any questions, comments or blockers. - -Checkout the [release page](https://github.com/nymtech/nym-vpn-client/releases) for available binaries. - -*NOTE: NymVPN alpha is experimental software for testing purposes only.* - - -## NymVPN Overview - -To understand what's under the hood of NymVPN and the mixnet, we recommend interested developers to begin with [Nym network overview](https://nymtech.net/docs/architecture/network-overview.html) and the [Mixnet traffic flow](https://nymtech.net/docs/architecture/traffic-flow.html) pages. - -The default setup of NymVPN is to run in 5-hop mode (mixnet): - -``` - ┌─►mix──┐ mix mix - │ │ - Entry │ │ Exit -client ───► Gateway ──┘ mix │ mix ┌─►mix ───► Gateway ───► internet - │ │ - │ │ - mix └─►mix──┘ mix -``` - -Users can switch to 2-hop only mode, which is a faster but less private option. In this mode traffic is only sent between the two Gateways, and is not passed between Mix Nodes. It uses Mixnet Sphinx packets with shorter, fixed routes, which improve latency, but doesn't offer the same level of protection as the 5 hop mode. - diff --git a/documentation/docs/pages/developers/archive/nymvpn/cli-linux.md b/documentation/docs/pages/developers/archive/nymvpn/cli-linux.md deleted file mode 100644 index ba48dbfa3af..00000000000 --- a/documentation/docs/pages/developers/archive/nymvpn/cli-linux.md +++ /dev/null @@ -1,142 +0,0 @@ -# NymVPN alpha CLI Guide - -```admonish info -NymVPN is an experimental software and it's for testing purposes only. All users testing the client are expected to sign GDPR Information Sheet and Consent Form (shared at the workshop) so we use their results to improve the client, and submit the form [*NymVPN User research*]({{nym_vpn_form_url}}) with the testing results. -``` - -## Installation - -> Any syntax in `<>` brackets is a user's/version unique variable. Exchange with a corresponding name without the `<>` brackets. - -1. Open Github [releases page](https://github.com/nymtech/nym-vpn-client) and download the CLI latest binary for your system - -2. Verify sha hash of your downloaded binary with the one listed on the [releases page](https://github.com/nymtech/nym-vpn-client). You can use a simple `shasum` command and compare strings (ie with Python) or run in the same directory the following command, exchanging `` with the one of your binary, like in the example: -```sh -echo "" | shasum -a 256 -c - -# choose a correct one according to your binary, this is just an example -# echo "0e4abb461e86b2c168577e0294112a3bacd3a24bf8565b49783bfebd9b530e23 nym-vpn-cli__ubuntu-22.04_amd64.tar.gz" | shasum -a 256 -c -``` - -3. Extract files: -```sh -tar -xvf .tar.gz -# for example -# tar -xvf nym-vpn-cli__ubuntu-22.04_x86_64.tar.gz -``` - -4. Make executable: -```sh -# make sure you are in the right sub-directory -chmod u+x ./nym-vpn-cli -``` - -## Run NymVPN - -**For NymVPN to work, all other VPNs must be switched off!** At this alpha stage of NymVPN, the network connection (wifi) must be reconnected after or in between the testing rounds. - -Make sure your terminal is open in the same directory as your `nym-vpn-cli` binary. - -1. Go to [nymvpn.com/en/alpha](https://nymvpn.com/en/alpha) to get the entire command with all the needed arguments' values and your wireguard private key for testing purposes -2. Run it as root with `sudo` - the command will look like this with specified arguments: -```sh -sudo ./nym-vpn-cli -c ./sandbox.env --entry-gateway-id --exit-router-address --enable-wireguard --private-key --wg-ip -``` -3. To choose different Gateways, visit [explorer.nymtech.net/network-components/gateways](https://explorer.nymtech.net/network-components/gateways) and copy-paste an identity key of your choice -4. See all possibilities in [command explanation](#cli-commands-and-options) section below - -In case of errors, see [troubleshooting section](troubleshooting.md). - -### CLI Commands and Options - -The basic syntax of `nym-vpn-cli` is: -```sh -sudo ./nym-vpn-cli <--exit-router-address |--exit-gateway-id |--exit-gateway-country > -``` -* To choose different Gateways, visit [nymvpn.com/en/alpha/api/gateways](https://explorer.nymtech.net/network-components/gateways) -* To see all possibilities run with `--help` flag: -```sh -./nym-vpn-cli --help -``` -~~~admonish example collapsible=true title="Console output" -```sh -Usage: nym-vpn-cli [OPTIONS] <--exit-router-address |--exit-gateway-id |--exit-gateway-country > - -Options: - -c, --config-env-file - Path pointing to an env file describing the network - --mixnet-client-path - Path to the data directory of a previously initialised mixnet client, where the keys reside - --entry-gateway-id - Mixnet public ID of the entry gateway - --entry-gateway-country - Auto-select entry gateway by country ISO - --entry-gateway-low-latency - Auto-select entry gateway by latency - --exit-router-address - Mixnet recipient address - --exit-gateway-id - - --exit-gateway-country - Mixnet recipient address - --enable-wireguard - Enable the wireguard traffic between the client and the entry gateway - --private-key - Associated private key - --wg-ip - The IP address of the wireguard interface used for the first hop to the entry gateway - --nym-ipv4 - The IPv4 address of the nym TUN device that wraps IP packets in sphinx packets - --nym-ipv6 - The IPv6 address of the nym TUN device that wraps IP packets in sphinx packets - --nym-mtu - The MTU of the nym TUN device that wraps IP packets in sphinx packets - --disable-routing - Disable routing all traffic through the nym TUN device. When the flag is set, the nym TUN device will be created, but to route traffic through it you will need to do it manually, e.g. ping -Itun0 - --enable-two-hop - Enable two-hop mixnet traffic. This means that traffic jumps directly from entry gateway to exit gateway - --enable-poisson-rate - Enable Poisson process rate limiting of outbound traffic - --disable-background-cover-traffic - Disable constant rate background loop cover traffic - -h, --help - Print help - -V, --version - Print version -``` -~~~ - -Here is a list of the options and their descriptions. Some are essential, some are more technical and not needed to be adjusted by users. - -**Fundamental commands and arguments** - -- `-c` is a path to the [Sandbox config](https://raw.githubusercontent.com/nymtech/nym/develop/envs/sandbox.env) file saved as `sandbox.env` -- `--entry-gateway-id`: paste one of the values labeled with a key `"identityKey"` (without `" "`) from [here](https://nymvpn.com/en/alpha/api/gateways) -- `--exit-router-address`: paste one of the values labeled with a key `"address"` (without `" "`) from here [here](https://nymvpn.com/en/alpha/api/gateways) -- `--enable-wireguard`: Enable the wireguard traffic between the client and the entry gateway. NymVPN uses Mullvad libraries for wrapping `wireguard-go` and to setup local routing rules to route all traffic to the TUN virtual network device -- `--wg-ip`: The address of the wireguard interface, you can get it [here](https://nymvpn.com/en/alpha) -- `--private-key`: get your private key for testing purposes [here](https://nymvpn.com/en/alpha) -- `--enable-two-hop` is a faster setup where the traffic is routed from the client to Entry Gateway and directly to Exit Gateway (default is 5-hops) - -**Advanced options** - -- `--enable-poisson`: Enables process rate limiting of outbound traffic (disabled by default). It means that NymVPN client will send packets at a steady stream to the Entry Gateway. By default it's on average one sphinx packet per 20ms, but there is some randomness (poisson distribution). When there are no real data to fill the sphinx packets with, cover packets are generated instead. -- `--ip` is the IP address of the TUN device. That is the IP address of the local private network that is set up between local client and the Exit Gateway. -- `--mtu`: The MTU of the TUN device. That is the max IP packet size of the local private network that is set up between local client and the Exit Gateway. -- `--disable-routing`: Disable routing all traffic through the VPN TUN device. - -## Testnet environment - -If you want to run NymVPN CLI in Nym Sandbox environment, there are a few adjustments to be done: - -1. Create Sandbox environment config file by saving [this](https://raw.githubusercontent.com/nymtech/nym/develop/envs/sandbox.env) as `sandbox.env` in the same directory as your NymVPN binaries by running: -```sh -curl -o sandbox.env -L https://raw.githubusercontent.com/nymtech/nym/develop/envs/sandbox.env -``` - -1. Check available Gateways at [nymvpn.com/en/alpha/api/gateways](https://nymvpn.com/en/alpha/api/gateways) - -2. Run with a flag `-c` -```sh -sudo ./nym-vpn-cli -c /sandbox.env <--exit-router-address |--exit-gateway-id |--exit-gateway-country > -``` diff --git a/documentation/docs/pages/developers/archive/nymvpn/cli-mac.md b/documentation/docs/pages/developers/archive/nymvpn/cli-mac.md deleted file mode 100644 index 2f409292f6b..00000000000 --- a/documentation/docs/pages/developers/archive/nymvpn/cli-mac.md +++ /dev/null @@ -1,123 +0,0 @@ -# NymVPN alpha CLI: Guide for MacOS - -```admonish info -NymVPN is an experimental software and it's for testing purposes only. All users testing the client are expected to sign GDPR Information Sheet and Consent Form (shared at the workshop) so we use their results to improve the client, and submit the form [*NymVPN User research*]({{nym_vpn_form_url}}) with the testing results. -``` - -## Preparation - -> Any syntax in `<>` brackets is a user's/version unique variable. Exchange with a corresponding name without the `<>` brackets. - -1. Open Github [releases page](https://github.com/nymtech/nym-vpn-client) and download the binary for MacOS -2. Verify sha hash of your downloaded binary with the one listed on the [releases page](https://github.com/nymtech/nym-vpn-client). You can use a simple `shasum` command and compare strings (ie with Python) or run in the same directory the following command, exchanging `` with the one of your binary, like in the example: -```sh -echo "" | shasum -a 256 -c - -# choose a correct one according to your binary, this is just an example -# echo "96623ccc69bc4cc0e4e3e18528b6dae6be69f645d0a592d926a3158ce2d0c269 nym-vpn-cli__macos_x86_64.zip" | shasum -a 256 -c -``` -3. Extract files: -```sh -tar -xvf -# for example -# tar -xvf nym-vpn-cli__macos_aarch64.tar.gz -``` -4. Make executable by running: -```sh -# possibly you may have to cd into a sub-directory -chmod u+x ./nym-vpn-cli -``` -5. Create Sandbox environment config file by saving [this](https://raw.githubusercontent.com/nymtech/nym/develop/envs/sandbox.env) as `sandbox.env` in the same directory as your NymVPN binaries by running: -```sh -curl -L "https://raw.githubusercontent.com/nymtech/nym/develop/envs/sandbox.env" -o sandbox.env -``` - -## Run NymVPN - -**For NymVPN to work, all other VPNs must be switched off!** At this alpha stage of NymVPN, the network connection (wifi) must be reconnected after or in between the testing rounds. - -Make sure your terminal is open in the same directory as your `nym-vpn-cli` binary. - -1. Go to [nymvpn.com/en/alpha](https://nymvpn.com/en/alpha) to get the entire command with all the needed arguments' values and your wireguard private key for testing purposes -2. Run it as root with `sudo` - the command will look like this with specified arguments: -```sh -sudo ./nym-vpn-cli -c ./sandbox.env --entry-gateway-id --exit-router-address --enable-wireguard --private-key --wg-ip -``` -3. To choose different Gateways, visit [nymvpn.com/en/alpha/api/gateways](https://nymvpn.com/en/alpha/api/gateways) and pick one -4. See all possibilities in [command explanation](#cli-commands-and-options) section below - -In case of errors, see [troubleshooting section](troubleshooting.md). - -### CLI Commands and Options - -The basic syntax of `nym-vpn-cli` is: -```sh -sudo ./nym-vpn-cli -c ./sandbox.env --entry-gateway-id --exit-router-address --enable-wireguard --private-key --wg-ip -``` -* To choose different Gateways, visit [nymvpn.com/en/alpha/api/gateways](https://nymvpn.com/en/alpha/api/gateways) -* To see all possibilities run with `--help` flag: -```sh -./nym-vpn-cli --help -``` -~~~admonish example collapsible=true title="Console output" -```sh -Usage: nym-vpn-cli [OPTIONS] - -Options: - -c, --config-env-file - Path pointing to an env file describing the network - --mixnet-client-path - Path to the data directory of a previously initialised mixnet client, where the keys reside - --entry-gateway-id - Mixnet public ID of the entry gateway - --entry-gateway-country - Auto-select entry gateway by country ISO - --exit-router-address - Mixnet recipient address - --exit-gateway-id - - --exit-router-country - Mixnet recipient address - --enable-wireguard - Enable the wireguard traffic between the client and the entry gateway - --private-key - Associated private key - --wg-ip - The IP address of the wireguard interface used for the first hop to the entry gateway - --nym-ip - The IP address of the nym TUN device that wraps IP packets in sphinx packets - --nym-mtu - The MTU of the nym TUN device that wraps IP packets in sphinx packets - --disable-routing - Disable routing all traffic through the nym TUN device. When the flag is set, the nym TUN device will be created, but to route traffic through it you will need to do it manually, e.g. ping -Itun0 - --enable-two-hop - Enable two-hop mixnet traffic. This means that traffic jumps directly from entry gateway to exit gateway - --enable-poisson-rate - Enable Poisson process rate limiting of outbound traffic - --disable-background-cover-traffic - Disable constant rate background loop cover traffic - -h, --help - Print help - -V, --version - Print version -``` -~~~ - -Here is a list of the options and their descriptions. Some are essential, some are more technical and not needed to be adjusted by users. - -**Fundamental commands and arguments** - -- `-c` is a path to the [Sandbox config](https://raw.githubusercontent.com/nymtech/nym/develop/envs/sandbox.env) file saved as `sandbox.env` -- `--entry-gateway-id`: paste one of the values labeled with a key `"identityKey"` (without `" "`) from [here](https://nymvpn.com/en/alpha/api/gateways) -- `--exit-router-address`: paste one of the values labeled with a key `"address"` (without `" "`) from here [here](https://nymvpn.com/en/alpha/api/gateways) -- `--enable-wireguard`: Enable the wireguard traffic between the client and the entry gateway. NymVPN uses Mullvad libraries for wrapping `wireguard-go` and to setup local routing rules to route all traffic to the TUN virtual network device -- `--wg-ip`: The address of the wireguard interface, you can get it [here](https://nymvpn.com/en/alpha) -- `--private-key`: get your private key for testing purposes [here](https://nymvpn.com/en/alpha) -- `--enable-two-hop` is a faster setup where the traffic is routed from the client to Entry Gateway and directly to Exit Gateway (default is 5-hops) - -**Advanced options** - -- `--enable-poisson`: Enables process rate limiting of outbound traffic (disabled by default). It means that NymVPN client will send packets at a steady stream to the Entry Gateway. By default it's on average one sphinx packet per 20ms, but there is some randomness (poisson distribution). When there are no real data to fill the sphinx packets with, cover packets are generated instead. -- `--ip` is the IP address of the TUN device. That is the IP address of the local private network that is set up between local client and the Exit Gateway. -- `--mtu`: The MTU of the TUN device. That is the max IP packet size of the local private network that is set up between local client and the Exit Gateway. -- `--disable-routing`: Disable routing all traffic through the VPN TUN device. diff --git a/documentation/docs/pages/developers/archive/nymvpn/cli.md b/documentation/docs/pages/developers/archive/nymvpn/cli.md deleted file mode 100644 index 8eb1541282e..00000000000 --- a/documentation/docs/pages/developers/archive/nymvpn/cli.md +++ /dev/null @@ -1,240 +0,0 @@ -# NymVPN CLI Guide - -```admonish tip title="web3summit testing" -**If you testing NymVPN CLI on Web3 Summit Berlin, visit our event page with all info tailored for the event: [nym-vpn-cli.sandbox.nymtech.net](https://nym-vpn-cli.sandbox.nymtech.net/).** -``` - -```admonish info -To download NymVPN desktop version, visit [nymvpn.com/en/download](https://nymvpn.com/en/download). - -NymVPN is an experimental software and it's for testing purposes only. Anyone can submit a registration to the private alpha round on [nymvpn.com](https://nymvpn.com/en). -``` - -## Overview - -The core binaries consist of: - -- **`nym-vpn-cli`**: Basic commandline client for running the vpn. This runs in the foreground. - -- **`nym-vpnd`**: Daemon implementation of the vpn client that can run in the background and interacted with using `nym-vpnc`. - -- **`nym-vpnc`**: The commandline client used to interact with `nym-vpnd`. - - -## Installation - -> Any syntax in `<>` brackets is a user's/version unique variable. Exchange with a corresponding name without the `<>` brackets. - -1. Open Github [releases page](https://github.com/nymtech/nym-vpn-client) and download the CLI latest binary for your system (labelled as `nym-vpn-core`) - -2. Verify sha hash of your downloaded binary with the one listed on the [releases page](https://github.com/nymtech/nym-vpn-client). You can use a simple `shasum` command and compare strings (ie with Python) or run in the same directory the following command, exchanging `` with the one of your binary, like in the example: -```sh -echo "" | shasum -a 256 -c - -# choose a correct one according to your binary, this is just an example -# echo "0e4abb461e86b2c168577e0294112a3bacd3a24bf8565b49783bfebd9b530e23 nym-vpn-cli__ubuntu-22.04_amd64.tar.gz" | shasum -a 256 -c -``` - -3. Extract files: -```sh -tar -xvf .tar.gz -# for example -# tar -xvf nym-vpn-cli__ubuntu-22.04_x86_64.tar.gz -``` - -### Building From Source - -NymVPN CLI can be built from source. This process is recommended for more advanced users as the installation may require different dependencies based on the operating system used. - -Start by installing [Go](https://go.dev/doc/install) and [Rust](https://rustup.rs/) languages on your system and then follow these steps: - -1. Clone NymVPN repository: -```sh -git clone https://github.com/nymtech/nym-vpn-client.git -``` - -2. Move to `nym-vpn-client` directory and compile `wireguard`: - -```sh -cd nym-vpn-client - -make build-wireguard -``` - -3. Compile NymVPN CLI -```sh -make build-nym-vpn-core -``` - -Now your NymVPN CLI is installed. Navigate to `nym-vpn-core/target/release` and use the commands the section below to run the client. - -## Running - -If you are running Debian/Ubuntu/PopOS or any other distributio supporting debian packages and systemd, see the [relevant section below](#debian-package-for-debianubuntupopos). - -### Daemon - -Start the daemon with - -```sh -sudo -E ./nym-vpnd -``` - -Then run - -```sh -./nym-vpnc status -./nym-vpnc connect -./nym-vpnc disconnect -``` - -### CLI - -An alternative to the daemon is to run the `nym-vpn-cli` commandline client that runs in the foreground. -```sh -./nym-vpn-cli run -``` - -## Credentials - -NymVPN uses [zkNym bandwidth credentials](https://nymtech.net/docs/bandwidth-credentials.html). Those can be imported as a file or base58 encoded string. - - -```sh -sudo -E ./nym-vpn-cli import-credential --credential-path -sudo -E ./nym-vpn-cli import-credential --credential-data "" -``` - -## Debian package for Debian/Ubuntu/PopOS - -For linux platforms using deb packages and systemd, there are also debian packages. - -```sh -sudo apt install ./nym-vpnd_-1_amd64.deb ./nym-vpnc_-1_amd64.deb - -# In case of error please substitute the correct version -``` - -Installing the `nym-vpnd` deb package starts a `nym-vpnd.service`. Check that the daemon is running with -```sh -systemctl status nym-vpnd.service -``` -and check its logs with -```sh -sudo journalctl -u nym-vpnd.service -f -``` -To stop the background service -```sh -systemctl stop nym-vpnd.service -``` -It will start again on startup, so disable with -```sh -systemctl disable nym-vpnd.service -``` - -Interact with it with `nym-vpnc` -```sh -nym-vpnc status -nym-vpnc connect -nym-vpnc disconnect -``` - -## Commands & Options - -```admonish note -Nym Exit Gateway functionality was implemented just recently and not all the Gateways are upgraded and ready to handle the VPN connections. If you want to make sure you are connecting to a Gateway with an embedded Network Requester, IP Packet Router and applied Nym exit policy, visit [harbourmaster.nymtech.net](https://harbourmaster.nymtech.net/) and search Gateways with all the functionalities enabled. -``` - -The basic syntax of `nym-vpn-cli` is: -```sh -# choose only one conditional --argument listed in {brackets} -sudo ./nym-vpn-cli { --exit-router-address |--exit-gateway-id |--exit-gateway-country } -``` - -To see all the possibilities run with `--help` flag: -```sh -./nym-vpn-cli --help -``` - -~~~admonish example collapsible=true title="nym-vpn-cli --help" -```sh -Usage: nym-vpn-cli [OPTIONS] - -Commands: - run Run the client - import-credential Import credential - help Print this message or the help of the given subcommand(s) - -Options: - -c, --config-env-file Path pointing to an env file describing the network - --data-path Path to the data directory of the mixnet client - -h, --help Print help - -V, --version Print version -``` -~~~ - -You can also run any command with `--help` flag to see a list of all options associated witht that command, the most important may be `run` command, like in this example. - -~~~admonish example collapsible=true title="nym-vpn-cli run --help" -```sh -Run the client - -Usage: nym-vpn-cli run [OPTIONS] - -Options: - --entry-gateway-id - Mixnet public ID of the entry gateway - --entry-gateway-country - Auto-select entry gateway by country ISO - --entry-gateway-low-latency - Auto-select entry gateway by latency - --exit-router-address - Mixnet recipient address - --exit-gateway-id - Mixnet public ID of the exit gateway - --exit-gateway-country - Auto-select exit gateway by country ISO - --wireguard-mode - Enable the wireguard mode - --nym-ipv4 - The IPv4 address of the nym TUN device that wraps IP packets in sphinx packets - --nym-ipv6 - The IPv6 address of the nym TUN device that wraps IP packets in sphinx packets - --nym-mtu - The MTU of the nym TUN device that wraps IP packets in sphinx packets - --dns - The DNS server to use - --disable-routing - Disable routing all traffic through the nym TUN device. When the flag is set, the nym TUN device will be created, but to route traffic through it you will need to do it manually, e.g. ping -Itun0 - --enable-two-hop - Enable two-hop mixnet traffic. This means that traffic jumps directly from entry gateway to exit gateway - --enable-poisson-rate - Enable Poisson process rate limiting of outbound traffic - --disable-background-cover-traffic - Disable constant rate background loop cover traffic - --enable-credentials-mode - Enable credentials mode - --min-mixnode-performance - Set the minimum performance level for mixnodes - -h, --help - Print help - -``` -~~~ - - -## Testnet environment - -If you want to run NymVPN CLI in Nym Sandbox environment, there are a few adjustments to be done: - -1. Create Sandbox environment config file by saving [this](https://raw.githubusercontent.com/nymtech/nym/develop/envs/sandbox.env) as `sandbox.env` in the same directory as your NymVPN binaries: -```sh -curl -o sandbox.env -L https://raw.githubusercontent.com/nymtech/nym/develop/envs/sandbox.env -``` - -2. Check available Gateways at [Sandbox API](https://sandbox-nym-api1.nymtech.net/api/v1/gateways) or [Sandbox Swagger page](https://sandbox-nym-api1.nymtech.net/api/swagger/index.html) - -3. Run with a flag `-c` -```sh -sudo ./nym-vpn-cli -c /sandbox.env <--exit-router-address |--exit-gateway-id |--exit-gateway-country > -``` diff --git a/documentation/docs/pages/developers/archive/nymvpn/faq.md b/documentation/docs/pages/developers/archive/nymvpn/faq.md deleted file mode 100644 index d05df2d0519..00000000000 --- a/documentation/docs/pages/developers/archive/nymvpn/faq.md +++ /dev/null @@ -1,71 +0,0 @@ -# Frequently Asked Questions - -**NymVPN [*Support & FAQ page*](https://nymvpn.com/en/support)** contains all essential FAQs regarding the client. This page (below) is a source of additional information often seeked by users, operators and developers testing NymVPN. - -If you interested to read more about Nym platform, you can have a look at [Nym general FAQ](https://nymtech.net/developers/faq/general-faq.html) and read through Nym's technical [documentation](https://nymtech.net/docs), [Developer Portal](https://nymtech.net/developers) and [Operators Guide](https://nymtech.net/operators). - -## NymVPN - -If this your first time hearing about NymVPN, make sure you visit [NymVPN webpage](https://nymvpn.com/en), the official NymVPN [support & FAQ page](https://nymvpn.com/en/support) and the proceed to the introduction and guide on how to [install, run and test](intro.md#nymvpn-guides) the client. - -Below are some extra FAQs which came out during the previous alpha testing rounds. - -### What's the difference between 2-hops and 5-hops - -The default is 5-hops (including Entry and Exit Gateways), which means that the traffic goes from the local client to Entry Gateway -> through 3 layers of Mix Nodes -> to Exit Gateway -> internet. this option uses all the Nym Mixnet features for maximum privacy. - -``` - ┌─►mix──┐ mix mix - │ │ - Entry │ │ Exit -client ───► Gateway ──┘ mix │ mix ┌─►mix ───► Gateway ───► internet - │ │ - │ │ - mix └─►mix──┘ mix -``` - -The 2-hop option is going from the local client -> Entry Gateway -> directly to Exit Gateway -> internet. This option is good for operations demanding faster connection. Keep in mind that this setup by-passes the 3 layers of Mix Nodes. The anonymising features done by your local client like breaking data into same-size packets with inserting additional "dummy" ones to break the time and volume patterns is done in both options. - -``` - Entry Exit -client ───► Gateway ────► Gateway ───► internet -``` - -We highly recommend to read more about [Nym network overview](https://nymtech.net/docs/architecture/network-overview.html) and the [Mixnet traffic flow](https://nymtech.net/docs/architecture/traffic-flow.html). - -### Why do I see different sizes of packets in my terminal log? - -One of features of Nym Mixnet's clients is to break data into the same size packets called Sphinx, which is currently ~2kb. When running NymVPN, the data log shows payload sizes, which are the raw sizes of the IP packets, not Sphinx. The payload sizes will be capped by the configured MTU, which is set around 1500 bytes. - -### What is 'poisson filter' about? - -By default `--enable-poisson` is disabled and packets are sent from the local client to the Entry Gateway as quickly as possible. With the poisson process enabled the Nym client will send packets at a steady stream to the Entry Gateway. By default it's on average one sphinx packet per 20ms, but there is some randomness (poisson distribution). When there are no real data to fill the sphinx packets with, cover packets are generated instead. - -Enabling the poisson filter is one of the key mechanisms to de-correlate input and output traffic to the Mixnet. The performance impact however is dramatic: -1 packer per 20ms is 50 packets / sec so ballpark 100kb/s. -For mobile clients that means constantly sending data eating up data allowance. - - -## Nym Mixnet Architecture and Rewards - -We have a list of questions related to Nym Nodes and the incentives behind running them under [FAQ pages](https://nymtech.net/operators/faq/mixnodes-faq.html) in our [Operators Guide](https://nymtech.net/operators). For better knowledge about Nym architecture we recommend to read [Nym network overview](https://nymtech.net/docs/architecture/network-overview.html) and the [Mixnet traffic flow](https://nymtech.net/docs/architecture/traffic-flow.html) in our [technical documentation](https://nymtech.net/docs). - -## Project Smoosh - -Project Smoosh is a code name for a process in which different components of Nym Mixnet architecture get *smooshed* into one binary. Check out [Smoosh FAQ](https://nymtech.net/operators/faq/smoosh-faq.html) in Operators Guide to read more. - -## Exit Gateway - -Part of the the transition under code name [Project Smoosh](#project-smoosh) is a creation of [Nym Exit Gateway](https://nymtech.net/operators/legal/exit-gateway.html) functionality. The operators running Gateways would have to “open” their nodes to a wider range of online services, in a similar fashion to Tor exit relays. The main change will be to expand the original short [allowed.list](https://nymtech.net/.wellknown/network-requester/standard-allowed-list.txt) to a more permissive setup. An [exit policy](https://nymtech.net/.wellknown/network-requester/exit-policy.txt) will constrain the hosts that the users of the Nym VPN and Mixnet can connect to. This will be done in an effort to protect the operators, as Gateways will act both as SOCKS5 Network Requesters, and exit nodes for IP traffic from Nym VPN and Mixnet clients. - -* Read more how the exit policy gets implemented [here](https://nymtech.net/operators/faq/smoosh-faq.html#how-will-the-exit-policy-be-implemented) -* Check out [Nym Operators Legal Forum](https://nymtech.net/operators/legal/exit-gateway.html) -* Do reach out to us with any experiences you may have running Tor Exit relays or legal findings and suggestions for Nym Exit Gateway operators - -## Nym Integrations and SDKs - -If you are a dev who is interested to integrate Nym, have a look on our SDK tutorials: - -* [Rust SDKs](https://nymtech.net/developers/tutorials/cosmos-service/intro.html) -* [TypeScript SDKs](https://sdk.nymtech.net/) -* [Integration FAQ](https://nymtech.net/developers/faq/integrations-faq.html) diff --git a/documentation/docs/pages/developers/archive/nymvpn/gui-linux.md b/documentation/docs/pages/developers/archive/nymvpn/gui-linux.md deleted file mode 100644 index bed55f54220..00000000000 --- a/documentation/docs/pages/developers/archive/nymvpn/gui-linux.md +++ /dev/null @@ -1,85 +0,0 @@ -# NymVPN alpha - Desktop: Guide for GNU/Linux - -
- -```admonish info -NymVPN is an experimental software and it's for testing purposes only. All users testing the client are expected to sign GDPR Information Sheet and Consent Form (shared at the workshop) so we use their results to improve the client, and submit the form [*NymVPN User research*]({{nym_vpn_form_url}}) with the testing results. -``` - -## Preparation - -> Any syntax in `<>` brackets is a user's/version unique variable. Exchange with a corresponding name without the `<>` brackets. - -### Installation - -1. Open Github [releases page](https://github.com/nymtech/nym-vpn-client) and download the binary for Debian based Linux - -2. (Optional: if you don't want to check shasum, skip this point) Verify sha hash of your downloaded binary with the one listed on the [releases page](https://github.com/nymtech/nym-vpn-client). You can use a simple `shasum` command and compare strings (ie with Python) or run in the same directory the following command, exchanging `` with the one of your binary, like in the example: -```sh -echo "" | shasum -a 256 -c - -# choose a correct one according to your binary, this is just an example -# echo "a5f91f20d587975e30b6a75d3a9e195234cf1269eac278139a5b9c39b039e807 nym-vpn-desktop__ubuntu-22.04_x86_64.tar.gz" | shasum -a 256 -c -``` - -3. Extract files: -```sh -tar -xvf .tar.gz -# for example -# tar -xvf nym-vpn-desktop__ubuntu-22.04_x86_64.tar.gz -``` - -4. If you prefer to run `.AppImage` make executable by running: -```sh -# make sure you cd into the right sub-directory after extraction -chmod u+x ./nym-vpn__amd64.AppImage -``` - -5. If you prefer to use the `.deb` version for installation (works on Debian based Linux only), open terminal in the same directory and run: -```sh -# make sure you cd into the right sub-directory after extraction -sudo dpkg -i ./nym-vpn__amd64.deb -# or -sudo apt-get install -f ./nym-vpn__amd64.deb -``` - - - -## Run NymVPN - -**For NymVPN to work, all other VPNs must be switched off!** At this alpha stage of NymVPN, the network connection (wifi) must be reconnected after or in between the testing rounds. - -In case you used `.deb` package and installed the client, you may be able to have a NymVPN application icon in your app menu. However this may not work as the application needs root permission. - -Open terminal and run: - -```sh -# .AppImage must be run from the same directory as the binary -sudo -E ./nym-vpn__amd64.AppImage - -# .deb installation shall be executable from anywhere as -sudo -E nym-vpn -``` - -In case of errors, see [troubleshooting section](troubleshooting.md). diff --git a/documentation/docs/pages/developers/archive/nymvpn/gui-mac.md b/documentation/docs/pages/developers/archive/nymvpn/gui-mac.md deleted file mode 100644 index 09c2517b59e..00000000000 --- a/documentation/docs/pages/developers/archive/nymvpn/gui-mac.md +++ /dev/null @@ -1,65 +0,0 @@ -# NymVPN alpha - Desktop: Guide for Mac OS - -```admonish info -NymVPN is an experimental software and it's for testing purposes only. All users testing the client are expected to sign GDPR Information Sheet and Consent Form (shared at the workshop) so we use their results to improve the client, and submit the form [*NymVPN User research*]({{nym_vpn_form_url}}) with the testing results. -``` - -## Preparation - -> Any syntax in `<>` brackets is a user's/version unique variable. Exchange with a corresponding name without the `<>` brackets. - -### Installation - -1. Open Github [releases page](https://github.com/nymtech/nym-vpn-client) and download the binary for your version of MacOS - -2. Recommended (skip this point if you don't want to verify): Verify sha hash of your downloaded binary with the one listed on the [releases page](https://github.com/nymtech/nym-vpn-client). You can use a simple `shasum` command and compare strings (ie with Python) or run in the same directory the following command, exchanging `` with the one of your binary, like in the example: -```sh -echo "" | shasum -a 256 -c - -# choose a correct one according to your binary, this is just an example -# echo "da4c0bf8e8b52658312d341fa3581954cfcb6efd516d9a448c76d042a454b5df nym-vpn-desktop__macos_x86_64.zip" | shasum -a 256 -c -``` - -3. Extract the downloaded file manually or by a command: -```sh -tar -xvf .tar.gz -# for example -# tar -xvf nym-vpn-desktop__macos_aarch64.tar.gz -``` -4. Mount the `.dmg` image you extracted by double clicking on it and move it (drag it) to your `/Application` folder - - - -## Run NymVPN - -**For NymVPN to work, all other VPNs must be switched off!** At this alpha stage of NymVPN, the network connection (wifi) must be reconnected after or in between the testing rounds. - -Run: -```sh -sudo /Applications/nym-vpn.app/Contents/MacOS/nym-vpn - -# If it didn't start try to run with -E flag -sudo -E /Applications/nym-vpn.app/Contents/MacOS/nym-vpn -``` - -In case of errors check out the [troubleshooting](troubleshooting.md#running-gui-failed-due-to-toml-parse-error) section. diff --git a/documentation/docs/pages/developers/archive/nymvpn/gui.md b/documentation/docs/pages/developers/archive/nymvpn/gui.md deleted file mode 100644 index b1494e6e1ce..00000000000 --- a/documentation/docs/pages/developers/archive/nymvpn/gui.md +++ /dev/null @@ -1,50 +0,0 @@ -# NymVPN - Desktop (GUI) - -```admonish info -Our alpha testing round is done with participants at live workshop events and the application in this stage may not work for everyone. - -**If you commit to test NymVPN alpha, please start with the [user research form]({{nym_vpn_form_url}}) where all the steps will be provided**. If you disagree with any of the conditions listed, please leave this page. -``` - -This is a desktop (GUI) version of NymVPN client. A demo of how the application will look like for majority of day-to-day users. - -Follow the simple [automated script](#automated-script-for-gui-installation) below to install and run NymVPN GUI. If the script didn't work for your distribution or you prefer to do a manual setup follow the steps in the guide for [Linux](gui-linux.md) or [MacOS](gui-mac.md) . - -Visit NymVPN alpha latest [release page](https://github.com/nymtech/nym-vpn-client) to check sha sums or download the binaries directly. - -## Linux AppImage Automated Installation Method - -The latest releases contain `appimage.sh` script. This method makes the installation simple for Linux users who want to run NymVPN from AppImmage. Executing the command below will download the binary to `~/.local/bin` and verify the checksum: -```sh -curl -fsSL https://github.com/nymtech/nym-vpn-client/releases/download/nym-vpn-desktop-v/appimage.sh | bash -``` - -Run with the command: -```sh -sudo -E ~/.local/bin/nym-vpn.appimage -``` - -## Automated Script for GUI Installation (Linux and Mac) - -We wrote a [script](https://gist.github.com/tommyv1987/7d210d4daa8f7abc61f9a696d0321f19) which does download of dependencies and the application, sha256 verification, extraction, installation and configuration for Linux and MacOS users automatically. Turn off all VPNs and follow the steps below. - -1. Open a terminal window in a directory where you want the script to be downloaded and run -```sh -curl -o nym-vpn-desktop-install-run.sh -L https://gist.githubusercontent.com/tommyv1987/7d210d4daa8f7abc61f9a696d0321f19/raw/939ac8d0afed69f43739b9cf2e5728454ea2c437/nym-vpn-client-install-run.sh && chmod u+x nym-vpn-desktop-install-run.sh && sudo -E ./nym-vpn-desktop-install-run.sh -``` - -2. Follow the prompts in the program - -To start the application again, reconnect your wifi and run -```sh -# Linux .AppImage -sudo -E ~/nym-vpn-latest/nym-vpn-desktop__ubuntu-22.04_x86_64/nym-vpn__amd64.AppImage - -# Linux .deb -sudo -E nym-vpn - -# MacOS -sudo -E $HOME/nym-vpn-latest/nym-vpn -``` - -In case of errors check out the [troubleshooting](troubleshooting.md#running-gui-failed-due-to-toml-parse-error) section. diff --git a/documentation/docs/pages/developers/archive/nymvpn/testing.md b/documentation/docs/pages/developers/archive/nymvpn/testing.md deleted file mode 100644 index c511a2152e8..00000000000 --- a/documentation/docs/pages/developers/archive/nymvpn/testing.md +++ /dev/null @@ -1,209 +0,0 @@ -# Testing NymVPN alpha - -
- -```admonish info -NymVPN is an experimental software and it's for [testing](./testing.md) purposes only. All users testing the client are expected to sign GDPR Information Sheet and Consent Form (shared at the workshop) so we use their results to improve the client, and submit the form [*NymVPN User research*]({{nym_vpn_form_url}}) with the testing results. -``` - -> Before you get into testing NymVPN, make sure to go through the preparation steps for NymVPN [CLI](cli.md). - -One of the main aims of NymVPN alpha release is testing; your results will help us to make NymVPN robust and stabilise both the client and the network through provided measurements. - -## Steps to test NymVPN - -> Any syntax in `<>` brackets is a user's/version unique variable. Exchange with a corresponding name without the `<>` brackets. - -1. Create a directory called `nym-vpn-tests` and copy your `nym-vpn-cli` binary ([download here](https://github.com/nymtech/nym-vpn-client)) -2. Copy or download [`sandbox.env`](https://raw.githubusercontent.com/nymtech/nym/develop/envs/sandbox.env) testnet config file to the same directory -```sh -curl -o sandbox.env -L https://raw.githubusercontent.com/nymtech/nym/develop/envs/sandbox.env -``` -3. Copy the [block below](#testssh) and save it as `tests.sh` to the same folder -4. Open terminal in the same directory and make the script executable -```sh -chmod u+x ./tests.sh -``` -5. Turn off any existing VPN's (including NymVPN instances), reconnect your wifi and run the `tests.sh` script -```sh -sudo ./tests.sh -```` -6. In case of errors, see the [troubleshooting section](troubleshooting.md#missing-jq-error) -7. The script will print a JSON view of existing Gateways and prompt you to: - - *Make sure to use two different Gateways for entry and exit!* - - `enter a gateway ID:` paste one of the values labeled with a key `"identityKey"` printed above (without `" "`) - - `enter an exit address:` paste one of the values labeled with a key `"address"` printed above (without `" "`) - - `enable WireGuard? (yes/no):` if you chose yes, find your private key and wireguard IP [here](https://nymvpn.com/en/alpha) -8. Note that the testing script doesn't print many logs, in case of doubts you can check logs in the log file `temp_log.txt` located in the same directory. -9. The script shall run the tests and generate a folder called `tests_` and files `perf_test_results.log` or `two_hop_perf_test_results.log` as well as some temp files. This is how the directory structure will look like: -```sh -nym-vpn-tests -├── tests.sh -├── nym-vpn-cli -├── sandbox.env -├── perf_test_results.log -├── tests_ -│   ├── api_response_times.txt -│   ├── download_time.txt -│   └── ping_results.txt -├── timeout -└── two_hop_perf_test_results.log -``` -10. When the tests are finished, remove the `nym-vpn-cli` binary from the folder and compress the entire folder as `nym-vpn-tests.zip` (both of these can be done in your graphical environment) -11. Upload this compressed file to the [form]({{nym_vpn_form_url}}) drop field when prompted - -#### tests.sh - -This is the testing script which needs to be copied and saved as `tests.sh` to your `nym-vpn-tests` folder and then run from there as described [above](#steps-to-test-nymvpn). - -```sh -#!/bin/bash - -ENDPOINT="https://sandbox-nym-api1.nymtech.net/api/v1/gateways/described" -json_array=() -echo "🚀 🏎 - please be patient, i'm fetching you your entry points - 🚀 🏎 " - -data=$(curl -s "$ENDPOINT" | jq -c '.[] | {host: .bond.gateway.host, hostname: .self_described.host_information.hostname, identity_key: .bond.gateway.identity_key, exitGateway: .self_described.ip_packet_router.address}') - -while IFS= read -r entry; do - host=$(echo "$entry" | jq -r '.host') - hostname=$(echo "$entry" | jq -r '.hostname') - identity_key=$(echo "$entry" | jq -r '.identity_key') - exit_gateway_address=$(echo "$entry" | jq -r '.exitGateway // empty') - valid_ip=$(echo "$host") - - if [ -n "$exit_gateway_address" ]; then - exit_gateway="{\"address\": \"${exit_gateway_address}\"}" - else - exit_gateway="{}" - fi - if [[ $valid_ip =~ ^[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+$ ]]; then - country_info=$(curl -s "http://ipinfo.io/${valid_ip}/country" | tr -d '\n') - country_info_escaped=$(echo "$country_info" | tr -d '\n' | jq -aRs . | tr -d '"') - else - country_info_escaped="" - fi - json_object="{\"hostname\": \"${hostname}\", \"identityKey\": \"${identity_key}\", \"exitGateway\": ${exit_gateway}, \"location\": \"${country_info_escaped}\"}" - json_array+=("$json_object") -done < <(echo "$data") - -if [ $? -ne 0 ]; then - echo "error fetching data from endpoint" - exit 1 -fi - -download_file() { - local file_url=$1 - local output_file=$2 - local time_file=$3 - - echo "starting download speed test..." - local start_time=$(date +%s) - if [[ "$OSTYPE" == "linux-gnu"* ]]; then - wget -O $output_file $file_url - elif [[ "$OSTYPE" == "darwin"* ]]; then - curl -o $output_file $file_url - fi - local end_time=$(date +%s) - local elapsed_time=$((end_time - start_time)) - echo "download speed test completed in $elapsed_time seconds." >"$time_file" -} - -if ! command -v jq &>/dev/null; then - echo "jq is not installed. Please install jq to proceed." - exit 1 -fi - -temp_log_file="temp_log.txt" - -perform_tests() { - local gateway_id=$1 - local exit_address=$2 - local test_directory="tests_${gateway_id}_${exit_address}" - local file_url="http://ipv4.download.thinkbroadband.com/2MB.zip" - - mkdir -p "$test_directory" - local ping_results_file="${test_directory}/ping_results.txt" - local download_time_file="${test_directory}/download_time.txt" - local api_response_file="${test_directory}/api_response_times.txt" - - # ping test - echo "starting ping test..." - for site in google.com youtube.com facebook.com baidu.com wikipedia.org amazon.com twitter.com instagram.com yahoo.com ebay.com netflix.com; do - ping -c 4 $site >>"$ping_results_file" - done - echo "ping test completed. Results saved in $ping_results_file" - - # download speed test - download_file $file_url /dev/null "$download_time_file" - - # api test - local api_endpoint="https://validator.nymtech.net/api/v1/mixnodes" - local iterations=10 - >"$api_response_file" - for i in $(seq 1 $iterations); do - local start_time=$(date +%s) - local response=$(curl -s -o /dev/null -w '%{http_code}' $api_endpoint) - local end_time=$(date +%s) - - local elapsed_seconds=$((end_time - start_time)) - local hours=$((elapsed_seconds / 3600)) - local minutes=$(((elapsed_seconds % 3600) / 60)) - local seconds=$((elapsed_seconds % 60)) - - local human_readable_time=$(printf "%02dh:%02dm:%02ds" $hours $minutes $seconds) - echo "iteration $i: response Time = ${human_readable_time}, status code = $response" >>"$api_response_file" - done - echo "api response test completed. Results saved in $api_response_file." -} - -printf "%s\n" "${json_array[@]}" | jq -s . - -read -p "enter a gateway ID: " identity_key -read -p "enter an exit address: " exit_address - -while true; do - read -p "enable WireGuard? (yes/no): " enable_wireguard - enable_wireguard=$(echo "$enable_wireguard" | tr '[:upper:]' '[:lower:]') - - case "$enable_wireguard" in - "yes") - read -p "enter your WireGuard private key: " priv_key - read -p "enter your WireGuard IP: " wg_ip - wireguard_options="--enable-wireguard --private-key $priv_key --wg-ip $wg_ip" - break - ;; - "no") - wireguard_options="" - break - ;; - *) - echo "invalid response. please enter 'yes' or 'no'." - ;; - esac -done - -sudo ./nym-vpn-cli -c sandbox.env --entry-gateway-id ${identity_key} --exit-router-address ${exit_address} --enable-two-hop $wireguard_options >"$temp_log_file" 2>&1 & - -timeout=15 -start_time=$(date +%s) -while true; do - current_time=$(date +%s) - if grep -q "received plain" "$temp_log_file"; then - echo "successful configuration with identity_key: $identity_key and exit address: $exit_address" >>perf_test_results.log - perform_tests "$identity_key" "$exit_address" - break - fi - if ((current_time - start_time > timeout)); then - echo "failed to connect with identity_key: $identity_key using the exit address: $exit_address" >>perf_test_results.log - break - fi - sleep 1 -done - -echo "terminating nym-vpn-cli..." -pkill -f './nym-vpn-cli' -sleep 5 -rm -f "$temp_log_file" - -``` diff --git a/documentation/docs/pages/developers/licensing.md b/documentation/docs/pages/developers/licensing.md index b569231b757..daff62dcb62 100644 --- a/documentation/docs/pages/developers/licensing.md +++ b/documentation/docs/pages/developers/licensing.md @@ -2,7 +2,7 @@ As a general approach, licensing is as follows this pattern: -*

Nym Documentation by Nym Technologies is licensed under CC BY-NC-SA 4.0

+*

Nym Documentation by Nym Technologies is licensed under CC BY-NC-SA 4.0

* Nym applications and binaries are [GPL-3.0-only](https://www.gnu.org/licenses/) diff --git a/documentation/docs/pages/developers/rust/mixnet/examples/socks.md b/documentation/docs/pages/developers/rust/mixnet/examples/socks.md index 01ff8485130..6daf6e5c075 100644 --- a/documentation/docs/pages/developers/rust/mixnet/examples/socks.md +++ b/documentation/docs/pages/developers/rust/mixnet/examples/socks.md @@ -29,7 +29,7 @@ async fn main() { println!("Sending socks5-wrapped http request"); // Message should be sent through the mixnet, via socks5 // We don't expect to get anything, as there is no network requester on the other end - reqwest_client.get("https://nymtech.net").send().await.ok() + reqwest_client.get("https://nym.com").send().await.ok() }); println!("Waiting for message"); diff --git a/documentation/docs/pages/developers/typescript/examples/mix-fetch.mdx b/documentation/docs/pages/developers/typescript/examples/mix-fetch.mdx index ac81356d3b8..1633c4f4a4d 100644 --- a/documentation/docs/pages/developers/typescript/examples/mix-fetch.mdx +++ b/documentation/docs/pages/developers/typescript/examples/mix-fetch.mdx @@ -15,7 +15,7 @@ Sounds great, are there any catches? Well, there are a few (for now): - For now, `mixFetch` cannot deal with concurrent requests with the same base URL. -Read [this article](https://blog.nymtech.net/mixfetch-like-the-fetch-api-but-via-the-mixnet-82acfd435c62) to learn more. +Read [this article](https://blog.nym.com/mixfetch-like-the-fetch-api-but-via-the-mixnet-82acfd435c62) to learn more. Right now Gateways are not required to run a Secure Websocket (WSS) listener, so only a subset of nodes running in Gateway mode have configured their nodes to do so. @@ -104,7 +104,7 @@ export function HttpGET() { const [html, setHtml] = React.useState(''); async function get() { //Make sure the URL is whitelisted (see 'standard allowed list') otherwise you will get a network requester filter check error - const response = await mixFetch('https://nymtech.net/favicon.svg', { mode: 'unsafe-ignore-cors' }, mixFetchOptions); + const response = await mixFetch('https://nym.com/favicon.svg', { mode: 'unsafe-ignore-cors' }, mixFetchOptions); const text = await response.text(); console.log('response was', text); setHtml(html); diff --git a/documentation/docs/pages/developers/typescript/start.mdx b/documentation/docs/pages/developers/typescript/start.mdx index f22330241e3..0d3c5b4c0ff 100644 --- a/documentation/docs/pages/developers/typescript/start.mdx +++ b/documentation/docs/pages/developers/typescript/start.mdx @@ -9,7 +9,7 @@ Use the [`mixFetch`](https://www.npmjs.com/package/@nymproject/mix-fetch) packag import { mixFetch } from '@nymproject/mix-fetch'; // HTTP GET -const response = await mixFetch('https://nymtech.net'); +const response = await mixFetch('https://nym.com'); const html = await response.text(); // HTTP POST diff --git a/documentation/docs/pages/network/architecture/nyx/validator.mdx b/documentation/docs/pages/network/architecture/nyx/validator.mdx index 4dd3abe6bfd..2668f190df7 100644 --- a/documentation/docs/pages/network/architecture/nyx/validator.mdx +++ b/documentation/docs/pages/network/architecture/nyx/validator.mdx @@ -12,4 +12,4 @@ The blockchain plays a supporting but fundamental role in the mixnet: the `NYM` ## Further Reading * Detailed info on Nyx Validators and token flow can be found in [Nym Reward Sharing for Mixnets document](https://nymtech.net/nym-cryptoecon-paper.pdf) in section 2.3 and 2.4. -* [Nym Whitepaper](https://nymtech.net/nym-whitepaper.pdf) section 3.1 +* [Nym Whitepaper](https://nym.com/nym-whitepaper.pdf) section 3.1 diff --git a/documentation/docs/pages/network/concepts/anonymous-replies.mdx b/documentation/docs/pages/network/concepts/anonymous-replies.mdx index dcd7e0155f4..3876b6438b9 100644 --- a/documentation/docs/pages/network/concepts/anonymous-replies.mdx +++ b/documentation/docs/pages/network/concepts/anonymous-replies.mdx @@ -4,7 +4,7 @@ > > SURBs are the Sphinx equivalent of "onion addresses" in Tor, with the caveat that a SURB can only be used once (to prevent replay attacks) and within its epoch of validity (the mix node public keys used to prepare the SURB are only valid for a limited period). SURB headers are encrypted by the sender, so the recipient sending it back cannot infer from it any information about the message route, the per-hop latency, or the sender’s address, which is encoded in the innermost (last) routing layer of the SURB. SURBs ('Single Use Reply Blocks') allow clients to reply to incoming messages anonymously. > -> [Nym Whitepaper](https://nymtech.net/nym-whitepaper.pdf) §4.5 +> [Nym Whitepaper](https://nym.com/nym-whitepaper.pdf) §4.5 It will often be the case that a client app wants to interact with a service of some kind, or a P2P application on someone else's machine. It defeats the purpose of the whole system if a client app needs to reveal its own gateway public key and client public key in order to get a response. diff --git a/documentation/docs/pages/network/concepts/cover-traffic.mdx b/documentation/docs/pages/network/concepts/cover-traffic.mdx index 62461cfd0c0..15812e8790e 100644 --- a/documentation/docs/pages/network/concepts/cover-traffic.mdx +++ b/documentation/docs/pages/network/concepts/cover-traffic.mdx @@ -2,10 +2,10 @@ > The Nym mixnet generates cover traffic "loops" ... [l]oops generated by mix nodes ensure a minimum level of anonymity at all times, while end users can generate loops to obfuscate the timing and volume of their active communication through Nym and thus achieve unobservability. > -> [Nym Whitepaper](https://nymtech.net/nym-whitepaper.pdf) §4 +> [Nym Whitepaper](https://nym.com/nym-whitepaper.pdf) §4 In order to avoid timing attacks where an attacker tries to deanonymise which clients are communicating with each other, cover traffic is implemented. As soon as any client is connected to the mixnet, they will send [Sphinx](../cryptography/sphinx) packets in 'loops' between nodes at a steady rate, inserting packets containing actual payload data (i.e. actual messages being sent between clients) when they are available. In this way, Sphinx packets containing actual payload data are hidden in a steady stream of 'background noise' in the form of 'cover' Sphinx packets with empty payloads, but which are indistinguishable to an observer. -An in-depth explainer can be found in §4.6 of the [Nym Whitepaper](https://nymtech.net/nym-whitepaper.pdf). +An in-depth explainer can be found in §4.6 of the [Nym Whitepaper](https://nym.com/nym-whitepaper.pdf). diff --git a/documentation/docs/pages/network/concepts/loopix.mdx b/documentation/docs/pages/network/concepts/loopix.mdx index 8d50377035a..72af2088cbf 100644 --- a/documentation/docs/pages/network/concepts/loopix.mdx +++ b/documentation/docs/pages/network/concepts/loopix.mdx @@ -4,7 +4,7 @@ > > Cover traffic disguises real traffic patterns by adding “dummy” messages that carry no payload data and are simply discarded at their final destination. While routing a message, mix nodes cannot distinguish whether it is a dummy message or a normal message carrying user data. Routing dummy traffic to circle back to the sender rather than ending at a randomly chosen destination was originally proposed to proactively detect active attacks on mixnets. Loopix, the name of which refers to its use of "loops" of dummy traffic, extends this approach to guarantee both a lower bound on anonymity and unobservability properties for end users. Nym follows a similar approach, with participants generating dummy messages that travel in a loop and have themselves as final destination. > -> [Nym Whitepaper](https://nymtech.net/nym-whitepaper.pdf) §4.6 +> [Nym Whitepaper](https://nym.com/nym-whitepaper.pdf) §4.6 The Nym Mixnet is based upon the [Loopix](https://arxiv.org/pdf/1703.00536) design. diff --git a/documentation/docs/pages/network/concepts/mixing.mdx b/documentation/docs/pages/network/concepts/mixing.mdx index 7027182d142..cd1eb2ca7e3 100644 --- a/documentation/docs/pages/network/concepts/mixing.mdx +++ b/documentation/docs/pages/network/concepts/mixing.mdx @@ -7,13 +7,13 @@ description: Mixnets are networks of nodes that route traffic in a way that make > Continuous-time mixing strategies ... delay each message independently, forwarding it to its next destination once a specified delay has timed out. The aggregate effect of independently delaying each message is an output sequence of messages that is randomly reordered with respect to the input sequence. > -> [Nym Whitepaper](https://nymtech.net/nym-whitepaper.pdf) §4.4 +> [Nym Whitepaper](https://nym.com/nym-whitepaper.pdf) §4.4 Mixnets are networks of nodes that route traffic in a way that makes it untraceable, even for Global Passive Adversaries employing Machine Learning to try and deanonymise traffic based on timing and fingerprinting attacks. One of the key features of a Mixnet - unsurprisingly - is that these nodes 'mix' traffic. As traffic moves through the network, each node, on receiving a message, will wait a variable length amount of time before sending it onwards - aka nodes do **not** pass messages on in a FIFO manner. An easy analogy is each node constantly receiving and sending out cards, shuffling their local deck each time and randomly selecting a card to pass along in the chain of messages. -The Mixnet employs continuous-time mixing, in which each message is dealt with independently of the other messages in the node's local storage. This is in contrast to other Mixnet designs which rely on nodes sending out periodic bursts of accrued messages, such as the Chaumian Mixnet design _"which collects a number of input messages and outputs a random permutation of those messages, is known to suffer from some disadvantages: the end-to-end latency of messages in such mixnets is neither bounded nor predictable, and the bursty communication caused by periodically flushing batches of messages makes these mix designs inefficient at utilizing bandwidth. In terms of anonymity, simple batching strategies are known to offer low anonymity as well as being particularly vulnerable to attacks"_ ([Nym Whitepaper](https://nymtech.net/nym-whitepaper.pdf) §4.4) +The Mixnet employs continuous-time mixing, in which each message is dealt with independently of the other messages in the node's local storage. This is in contrast to other Mixnet designs which rely on nodes sending out periodic bursts of accrued messages, such as the Chaumian Mixnet design _"which collects a number of input messages and outputs a random permutation of those messages, is known to suffer from some disadvantages: the end-to-end latency of messages in such mixnets is neither bounded nor predictable, and the bursty communication caused by periodically flushing batches of messages makes these mix designs inefficient at utilizing bandwidth. In terms of anonymity, simple batching strategies are known to offer low anonymity as well as being particularly vulnerable to attacks"_ ([Nym Whitepaper](https://nym.com/nym-whitepaper.pdf) §4.4) Continuous-time mixing, in contrast: - _"offer[s] optimal anonymity properties for a given mean end-to-end latency"_ due to the per-message randomised delay amount: by using an exponential delay distribution, we acheive a situation in which _"if we observe two messages going into the mix node at times t0 < t1, and a message coming out at a later time t2, the probability that the output is any of the two inputs is equal, regardless of diff --git a/documentation/docs/pages/network/licensing.md b/documentation/docs/pages/network/licensing.md index b569231b757..daff62dcb62 100644 --- a/documentation/docs/pages/network/licensing.md +++ b/documentation/docs/pages/network/licensing.md @@ -2,7 +2,7 @@ As a general approach, licensing is as follows this pattern: -*

Nym Documentation by Nym Technologies is licensed under CC BY-NC-SA 4.0

+*

Nym Documentation by Nym Technologies is licensed under CC BY-NC-SA 4.0

* Nym applications and binaries are [GPL-3.0-only](https://www.gnu.org/licenses/) diff --git a/documentation/docs/pages/network/traffic.mdx b/documentation/docs/pages/network/traffic.mdx index acc1ca2fc03..472507dc5c6 100644 --- a/documentation/docs/pages/network/traffic.mdx +++ b/documentation/docs/pages/network/traffic.mdx @@ -6,7 +6,7 @@ > > Nym uses the Sphinx packet format to encapsulate and anonymously route data payloads. Senders prepare Sphinx messages by encrypting them multiple times in reverse routing order. First, a message is encrypted for the recipient; then, for the last mix node in the path; then, for its predecessors in the path, ending with the outermost encryption, which corresponds to the mix node in the first layer. The complete Sphinx packet is finally encrypted with a key shared with the gateway, which forwards decrypted Sphinx packets to the mixnet. > -> [Nym Whitepaper](https://nymtech.net/nym-whitepaper.pdf) §4 +> [Nym Whitepaper](https://nym.com/nym-whitepaper.pdf) §4 The Nym mixnet re-orders encrypted, indistinguishable [Sphinx](cryptography/sphinx) packets as they travel through the network. diff --git a/documentation/docs/pages/network/traffic/anonymous-replies.mdx b/documentation/docs/pages/network/traffic/anonymous-replies.mdx index 97098c89965..ae9c5382c93 100644 --- a/documentation/docs/pages/network/traffic/anonymous-replies.mdx +++ b/documentation/docs/pages/network/traffic/anonymous-replies.mdx @@ -9,7 +9,7 @@ import { Callout } from 'nextra/components' > ... > > A SURB effectively contains: (1) the encrypted headers of a Sphinx message that, if sent to the mixnet, will be routed back to the original sender; (2) the address of the first-layer mix node where the message should be sent; and (3) a cryptographic key to encrypt the reply payload. -> [Nym Whitepaper](https://nymtech.net/nym-whitepaper.pdf) §4.5 +> [Nym Whitepaper](https://nym.com/nym-whitepaper.pdf) §4.5 As outlined in the [concepts](../concepts/anonymous-replies) section, SURBs are layer encrypted sets of Sphinx headers detailing a reply path ending in the sending client's [Nym address](../traffic/addressing-system). Clients receiving messages with SURBs attached are able to write a payload to the provided headers without ever learning about anything other than the first hop back into the Mixnet - the Gateway they (the sender of the reply) are currently registered with. diff --git a/documentation/docs/pages/operators/binaries/building-nym.mdx b/documentation/docs/pages/operators/binaries/building-nym.mdx index 1699ff58562..2bda63a9058 100644 --- a/documentation/docs/pages/operators/binaries/building-nym.mdx +++ b/documentation/docs/pages/operators/binaries/building-nym.mdx @@ -66,13 +66,15 @@ Quite a bit of stuff gets built. The key working parts are: * [Nym Node](../nodes/nym-node/nym-node.mdx): `nym-node` * [Validator](../nodes/validator-setup.mdx) -* [websocket client](https://nymtech.net/developers/clients/websocket-client.html): `nym-client` -* [socks5 client](https://nymtech.net/developers/clients/socks5-client.html): `nym-socks5-client` -* [webassembly client](https://nymtech.net/developers/clients/webassembly-client.html): `webassembly-client` -* [nym-cli tool](https://nymtech.net/docs/tools/nym-cli.html): `nym-cli` +* [websocket client](../../developers/clients/websocket): `nym-client` +* [socks5 client](../../developers/clients/socks5): `nym-socks5-client` +* [webassembly client](../../developers/clients/webassembly-client): `webassembly-client` +* [nym-cli tool](../../developers/tools/nym-cli): `nym-cli` * [nym-api](../nodes/validator-setup/nym-api.mdx): `nym-api` * [nymvisor](../nodes/maintenance/nymvisor-upgrade.mdx): `nymvisor` +{/* The repository also contains Typescript applications which aren't built in this process. These can be built by following the instructions on their respective docs pages. * [Nym Wallet](https://nymtech.net/docs/wallet/desktop-wallet.html) * [Network Explorer UI](https://nymtech.net/docs/explorers/mixnet-explorer.html) +*/} diff --git a/documentation/docs/pages/operators/changelog.mdx b/documentation/docs/pages/operators/changelog.mdx index 7fd6aa21867..1aa52d4f8df 100644 --- a/documentation/docs/pages/operators/changelog.mdx +++ b/documentation/docs/pages/operators/changelog.mdx @@ -37,8 +37,17 @@ export const TunnelManagerCommands = () => ( This page displays a full list of all the changes during our release cycle from `v2024.3-eclipse` onward. Operators can find here the newest updates together with links to relevant documentation. The list is sorted so that the newest changes appear first. +**Note:** Any information shared on this page was up to date at the time of writing. We do *not* maintain changelog retrospectively. + +## Archived Changelog + +To allow reading through older changelogs, we store them below sorted by years. + +
+ + ## `v2024.14-crunch-patched` Patch for `v2024.14-crunch` release. [Fixes an issue](https://github.com/nymtech/nym/commit/b656003306184061588f25df0b8b4555b41157f4) to allow only one private IP pair & compatibility issues between nym-nodes and older clients. @@ -375,7 +384,7 @@ After changes coming along with `v2024.13-magura` (`nym-node v1.1.10`), Nym Expl - Updated [`network_tunnel_manager.sh`](https://github.com/nymtech/nym/blob/develop/scripts/network_tunnel_manager.sh) (moved to our monorepo) helps operators to configure their IP tables rules for `nymtun` and `wireguard` routing. -- **Please re-run [routing configuration steps](https://nymtech.net/docs/operators/nodes/nym-node/configuration#routing-configuration) to update your routing settings.** +- **Please re-run [routing configuration steps](nodes/nym-node/configuration#routing-configuration) to update your routing settings.** - We found out that some operators have a wrong value for wireguard IP. Follow these steps to ensure your value is set to `10.1.0.1` (default on new nodes): @@ -2818,3 +2827,5 @@ called Result::unwrap() on an Err value: ClientCoreError(ValidatorClientError(Ny | `http://:8000/stats` | `http://:8000/api/v1/metrics/mixing` | | `http://:8000/hardware` | `http://:8000/api/v1/system-info` | | `http://:8000/description` | `http://:8000/api/v1/description` | + + diff --git a/documentation/docs/pages/operators/community-counsel/exit-gateway.mdx b/documentation/docs/pages/operators/community-counsel/exit-gateway.mdx index f7efe40a75c..836937b2382 100644 --- a/documentation/docs/pages/operators/community-counsel/exit-gateway.mdx +++ b/documentation/docs/pages/operators/community-counsel/exit-gateway.mdx @@ -8,7 +8,7 @@ import { MyTab } from 'components/generic-tabs.tsx'; This page is a part of Nym Community Counsel (before Legal Forum) and its content is composed by shared advices in [Node Operators Legal Forum](https://matrix.to/#/!YfoUFsJjsXbWmijbPG:nymtech.chat?via=nymtech.chat&via=matrix.org) (Matrix chat) as well as though pull requests done by the node operators directly to our [repository](https://github.com/nymtech/nym/tree/develop/documentation/docs/pages/operators), reviewed by Nym DevRels. -This document presents an initiative to further support Nym’s mission of allowing privacy for everyone everywhere. This would be achieved with the support of Nym node operators operating Gateways and opening these to any online service. Such setup needs a **clear policy**, one which will remain the **same for all operators** running Nym nodes. [**Nym exit policy**](https://nymtech.net/.wellknown/network-requester/exit-policy.txt) was inspired by (nowadays deprecated) Tor Null deny list and Tor reduced policy and created to meet the changes decided by Nym operators community through the governance (like in this [vote](https://forum.nymtech.net/t/poll-a-new-nym-exit-policy-for-exit-gateways-and-the-nym-mixnet-is-inbound/464)). This policy aims to find a healthy compromise between protecting the operators and NymVPN users against attacks while allowing for as wide experience when accessing the internet through Nym Network. +This document presents an initiative to further support Nym’s mission of allowing privacy for everyone everywhere. This would be achieved with the support of Nym node operators operating Gateways and opening these to any online service. Such setup needs a **clear policy**, one which will remain the **same for all operators** running Nym nodes. [**Nym exit policy**](https://nymtech.net/.wellknown/network-requester/exit-policy.txt) was inspired by (nowadays deprecated) Tor Null deny list and Tor reduced policy and created to meet the changes decided by Nym operators community through the governance (like in this [vote](https://forum.nym.com/t/poll-a-new-nym-exit-policy-for-exit-gateways-and-the-nym-mixnet-is-inbound/464)). This policy aims to find a healthy compromise between protecting the operators and NymVPN users against attacks while allowing for as wide experience when accessing the internet through Nym Network. @@ -28,7 +28,7 @@ To achieve this, operators running Exit Gateways would have to “open” their * To decentralise and enable privacy for a broader range of services, Nym transitioned from allow list to a deny list - creating a new [Nym exit policy](https://nymtech.net/.wellknown/network-requester/exit-policy.txt). -* Future changes of the exit policy is done via an off-chain governance, like in this [vote](https://forum.nymtech.net/t/poll-a-new-nym-exit-policy-for-exit-gateways-and-the-nym-mixnet-is-inbound/464). +* Future changes of the exit policy is done via an off-chain governance, like in this [vote](https://forum.nym.com/t/poll-a-new-nym-exit-policy-for-exit-gateways-and-the-nym-mixnet-is-inbound/464). * This will enhance the usage and appeal of Nym products for end users. As a result, increased usage will ultimately lead to higher revenues for Nym operators. diff --git a/documentation/docs/pages/operators/introduction.mdx b/documentation/docs/pages/operators/introduction.mdx index 3ecfabf6ce4..5109ea78f6a 100644 --- a/documentation/docs/pages/operators/introduction.mdx +++ b/documentation/docs/pages/operators/introduction.mdx @@ -14,9 +14,9 @@ client ───► Gateway ──┘ mix │ mix ┌─►mix ───► mix └─►mix──┘ mix ``` -If you want to dive deeper into Nym Network architecture, clients and nodes visit the [Network docs](https://nymtech.net/docs/network). +If you want to dive deeper into Nym Network architecture, clients and nodes visit the [Network docs](../network). -If you want to explore kickstart options and examples, learn how to integrate with the network, and follow developer tutorials check out the [Developer Portal](https://nymtech.net/docs/developers/). +If you want to explore kickstart options and examples, learn how to integrate with the network, and follow developer tutorials check out the [Developer Portal](../developers). ## Minimum Requirements diff --git a/documentation/docs/pages/operators/misc/licensing.md b/documentation/docs/pages/operators/misc/licensing.md index b569231b757..92d751853dc 100644 --- a/documentation/docs/pages/operators/misc/licensing.md +++ b/documentation/docs/pages/operators/misc/licensing.md @@ -2,7 +2,7 @@ As a general approach, licensing is as follows this pattern: -*

Nym Documentation by Nym Technologies is licensed under CC BY-NC-SA 4.0

+*

Nym Documentation by Nym Technologies is licensed under CC BY-NC-SA 4.0

* Nym applications and binaries are [GPL-3.0-only](https://www.gnu.org/licenses/) diff --git a/documentation/docs/pages/operators/nodes/nym-node/bonding.mdx b/documentation/docs/pages/operators/nodes/nym-node/bonding.mdx index 3c64fe9b291..50dc8f400fc 100644 --- a/documentation/docs/pages/operators/nodes/nym-node/bonding.mdx +++ b/documentation/docs/pages/operators/nodes/nym-node/bonding.mdx @@ -69,7 +69,7 @@ echo "$(curl -4 https://ifconfig.me)" - Enter the `Amount`, `Operating cost` and `Profit margin` and press `Next` -If you are part of [Nym Delegation Program](https://delegations.explorenym.net) or Service Grants Program, make sure your values are within the [rules](https://forum.nymtech.net/t/nym-delegations-program-update/466) of the programs. Operators setting up larger OP or PM than defined in the rules will be excluded from the program without prior warning! +If you are part of [Nym Delegation Program](https://delegations.explorenym.net) or Service Grants Program, make sure your values are within the [rules](https://forum.nym.com/t/nym-delegations-program-update/466) of the programs. Operators setting up larger OP or PM than defined in the rules will be excluded from the program without prior warning! - You will be asked to run a `sign` command with your `nym-node` - copy and paste the long signature as the value of `--contract-msg` and sing it on your VPS: @@ -149,4 +149,4 @@ Versions older than `nym-wallet v 1.2.15` will not allow bonding new nodes. ## Bond via the CLI (power users) -If you want to bond your Mix Node via the CLI, then check out the [relevant section in the Nym CLI](https://nymtech.net/docs/tools/nym-cli.html#bond-a-mix-node) docs. +If you want to bond your Mix Node via the CLI, then check out the [relevant section in the Nym CLI](../../../developers/tools/nym-cli/usage#usage) docs. diff --git a/documentation/docs/pages/operators/nodes/nym-node/configuration.mdx b/documentation/docs/pages/operators/nodes/nym-node/configuration.mdx index 9a82c0081f6..19edb7d619e 100644 --- a/documentation/docs/pages/operators/nodes/nym-node/configuration.mdx +++ b/documentation/docs/pages/operators/nodes/nym-node/configuration.mdx @@ -217,7 +217,7 @@ This lets your operating system know it's ok to reload the service configuration ## Connectivity Test and Configuration -During our ongoing testing events [Fast and Furious](https://nymtech.net/events/fast-and-furious) we found out, that after introducing IP Packet Router (IPR) and [Nym exit policy](https://nymtech.net/.wellknown/network-requester/exit-policy.txt) on embedded Network Requester (NR) by default, only a fragment of Gateways routes correctly through IPv4 and IPv6. We built a useful monitor to check out your Gateway (`nym-node --mode exit-gateway`) at [harbourmaster.nymtech.net](https://harbourmaster.nymtech.net/). +During our ongoing testing events we found out, that after introducing IP Packet Router (IPR) and [Nym exit policy](https://nymtech.net/.wellknown/network-requester/exit-policy.txt) on embedded Network Requester (NR) by default, only a fragment of Gateways routes correctly through IPv4 and IPv6. We built a useful monitor to check out your Gateway (`nym-node --mode exit-gateway`) at [harbourmaster.nymtech.net](https://harbourmaster.nymtech.net/). IPv6 routing is not only a case for gateways. Imagine a rare occasion when you run a `mixnode` without IPv6 enabled and a client will sent IPv6 packets through the Mixnet through such route: ```ascii @@ -491,7 +491,7 @@ sudo setcap 'cap_net_bind_service=+ep cap_net_admin=+ep' nym-node - `After=network.target` - `Group=` - `Type=simple` - + - Your service file will then look like this: ```ini @@ -500,7 +500,7 @@ Description=Nym Node After=network.target StartLimitInterval=350 StartLimitBurst=10 - + [Service] User= Group= @@ -510,7 +510,7 @@ ExecStart=/nym-node run # add all the flags you use to run you KillSignal=SIGINT Restart=on-failure RestartSec=30 - + [Install] WantedBy=multi-user.target ``` diff --git a/documentation/docs/pages/operators/nodes/nym-node/configuration/proxy-configuration.mdx b/documentation/docs/pages/operators/nodes/nym-node/configuration/proxy-configuration.mdx index 8e655493327..b4ec5ac88af 100644 --- a/documentation/docs/pages/operators/nodes/nym-node/configuration/proxy-configuration.mdx +++ b/documentation/docs/pages/operators/nodes/nym-node/configuration/proxy-configuration.mdx @@ -119,8 +119,8 @@ white-space: nowrap;

You are most likely accessing this website because you've had some issue with the traffic coming from this IP. This router is part of the NYM project, which is -dedicated to create outstanding +href="https://nym.com/">NYM project, which is +dedicated to create outstanding privacy software that is legally compliant without sacrificing integrity or having any backdoors. This router IP should be generating no other traffic, unless it has been @@ -180,7 +180,7 @@ stroke: var(--text-color);

-Read more about how Nym works.

+Read more about how Nym works.

Nym relies on a growing ecosystem of users, developers and researcher partners @@ -576,4 +576,3 @@ wscat -c wss://: ``` - Check Swagger API of your node using the hostname: `https:///api/v1/swagger/#/` - diff --git a/documentation/docs/pages/operators/nodes/preliminary-steps.mdx b/documentation/docs/pages/operators/nodes/preliminary-steps.mdx index 178d5746cac..4f0e7370526 100644 --- a/documentation/docs/pages/operators/nodes/preliminary-steps.mdx +++ b/documentation/docs/pages/operators/nodes/preliminary-steps.mdx @@ -4,7 +4,7 @@ There are a couple of steps that need completing before starting to set up your `nym-node`: -1. **[Prepare your wallet](preliminary-steps/wallet-preparation.mdx):** [desktop](https://nymtech.net/docs/wallet/desktop-wallet.html) or [CLI](../../developers/tools/nym-cli/commands.mdx). +1. **[Prepare your wallet](preliminary-steps/wallet-preparation.mdx):** [desktop](https://nym.com/download/wallet) or [CLI](../../developers/tools/nym-cli/commands.mdx). 2. **[Requisition and setup a VPS](preliminary-steps/vps-setup.mdx)** (Virtual Private Server) Make sure to follow these steps carefully as it prevents a lot of troubleshooting later on. diff --git a/documentation/docs/pages/operators/nodes/preliminary-steps/wallet-preparation.mdx b/documentation/docs/pages/operators/nodes/preliminary-steps/wallet-preparation.mdx index 7c21959991d..d6aa2bb45d5 100644 --- a/documentation/docs/pages/operators/nodes/preliminary-steps/wallet-preparation.mdx +++ b/documentation/docs/pages/operators/nodes/preliminary-steps/wallet-preparation.mdx @@ -2,7 +2,12 @@ ## Mainnet -Head to our [website](https://nymtech.net/download) and download the Nym wallet for your operating system. If pre-compiled binaries for your operating system aren't available, you can build the wallet yourself with instructions [here](https://nymtech.net/docs/wallet/desktop-wallet.html). +Head to our [website](https://nym.com/download/wallet) and download Nym wallet for your operating system. + +{/* + +If pre-compiled binaries for your operating system aren't available, you can build the wallet yourself with instructions [here](https://nymtech.net/docs/wallet/desktop-wallet.html). +*/} If you don't already have one, please create a Nym address using the wallet, and fund it with NYM tokens. The minimum amount required to bond a node is 100 `NYM`, but make sure you have a bit more to account for gas costs. @@ -14,5 +19,3 @@ If you don't already have one, please create a Nym address using the wallet, and ## Sandbox testnet Make sure to download a wallet and create an account as outlined above. Then head to our [Sandbox Testnet page](../../sandbox.mdx#sandbox-token-faucet) and request testnet NYM tokens. - - diff --git a/documentation/docs/pages/operators/nodes/validator-setup/nym-api.mdx b/documentation/docs/pages/operators/nodes/validator-setup/nym-api.mdx index 42420b9e6d8..23cc443f4b1 100644 --- a/documentation/docs/pages/operators/nodes/validator-setup/nym-api.mdx +++ b/documentation/docs/pages/operators/nodes/validator-setup/nym-api.mdx @@ -18,7 +18,7 @@ import { AccordionTemplate } from 'components/accordion-template.tsx'; The Nym API is a binary that will be operated by the Nyx validator set. This binary can be run in several different modes, and has two main bits of functionality: * Network monitoring (calculating the routing score of Mixnet nodes) -* Generation and validation of [zk-nyms](https://blog.nymtech.net/zk-nyms-are-here-a-major-milestone-towards-a-market-ready-mixnet-a3470c9ab10a), our implementation of the Coconut Selective Disclosure Credential Scheme. +* Generation and validation of [zk-nyms](../../../network/cryptography/zk-nym), our implementation of the Coconut Selective Disclosure Credential Scheme. This is important for both the proper decentralisation of the network uptime calculation and, more pressingly, enabling the NymVPN to utilise privacy preserving payments. @@ -94,7 +94,7 @@ The example value of `100` for `pruning-interval` can be customised as per your ### Credential Generation -Validators that took part in the DKG ceremony became part of the 'quorum' generating and verifying zk-nym credentials. These will initially be used for private proof of payment for NymVPN (see our blogposts [here](https://blog.nymtech.net/nymvpn-an-invitation-for-privacy-experts-and-enthusiasts-63644139d09d) and [here](https://blog.nymtech.net/zk-nyms-are-here-a-major-milestone-towards-a-market-ready-mixnet-a3470c9ab10a) for more on this), and in the future will be expanded into more general use-cases such as [offline ecash](https://arxiv.org/abs/2303.08221). +Validators that took part in the DKG ceremony became part of the 'quorum' generating and verifying zk-nym credentials. These will initially be used for private proof of payment for NymVPN (moe [here](https://blog.nym.com/nymvpn-an-invitation-for-privacy-experts-and-enthusiasts-63644139d09d) and [here](https://blog.nym.com/zk-nyms-are-here-a-major-milestone-towards-a-market-ready-mixnet-a3470c9ab10a)), and in the future will be expanded into more general use-cases such as [offline ecash](https://arxiv.org/abs/2303.08221). The DKG ceremony was used to create a subset of existing validators who run `nym-api` alongside a Nyx full-node. As outlined above, they are the ones taking part in the generation and verification of zk-nym credentials. The size of the 'minimum viable quorum' is 10 - the intial set taking part in DKG was 17 validators. This is in order to have some redundancy in the case of a validator dropping or going offline. @@ -301,4 +301,3 @@ You can also use `nymvisor` to automatically update the `nym-api` node. The step It is recommended to expose the webserver over HTTPS by using a webserver like Nginx. An example configuration for configuring Nginx is listed on [Reverse proxy page](../nym-node/configuration/proxy-configuration.mdx). If you're using a custom solution, ensure to allow requests from anywhere by setting a permissive CORS policy. For example, it is configured in Nginx using: `add_header 'Access-Control-Allow-Origin' '*';` - diff --git a/documentation/docs/pages/operators/sandbox.mdx b/documentation/docs/pages/operators/sandbox.mdx index a39ca790c74..76a0f5ac060 100644 --- a/documentation/docs/pages/operators/sandbox.mdx +++ b/documentation/docs/pages/operators/sandbox.mdx @@ -47,7 +47,7 @@ curl -o sandbox.env -L https://raw.githubusercontent.com/nymtech/nym/develop/env - In case you downloaded `sandbox.env` to same directory, `` is not needed ###### 3. Bond your node to Nym Sandbox environment -- Open [Nym Wallet](https://nymtech.net/download/wallet) and switch to testnet +- Open [Nym Wallet](https://nym.com/download/wallet) and switch to testnet - Go to [faucet.nymtech.net](https://faucet.nymtech.net) and aquire 101 testnet NYM tokens - Follow the steps on the [bonding page](nodes/nym-node/bonding.mdx) diff --git a/documentation/docs/pages/operators/tokenomics.mdx b/documentation/docs/pages/operators/tokenomics.mdx index 0a65a0051f5..ef5986df043 100644 --- a/documentation/docs/pages/operators/tokenomics.mdx +++ b/documentation/docs/pages/operators/tokenomics.mdx @@ -20,8 +20,8 @@ import { AccordionTemplate } from 'components/accordion-template.tsx'; Nym Network is composed of two main elements, the Mixnet represented by [Nym Nodes](nodes/nym-node/nym-node.mdx) routing and mixing the data packets, and Nyx blockchain distributted accros [validator set](tokenomics/validator-rewards.mdx), using smart contracts (based on [cosmwasm](https://cosmwasm.com/)) to monitor and reward Nym Nodes by querying API endpoints and distributing NYM token to operators according to work done by their nodes. All Nym nodes and validators are run by decentralised community of operators. -* Nym tokenomics are based on the research paper [*Reward Sharing for Mixnets*](https://nymtech.net/nym-cryptoecon-paper.pdf) -* For a more comprehensive overview, token live data and supply graphs, visit [*nymtech.net/about/token*](https://nymtech.net/about/token) +* Nym tokenomics are based on the research paper [*Reward Sharing for Mixnets*](https://nym.com/nym-cryptoecon-paper.pdf) +* For a more comprehensive overview, token live data and supply graphs, visit [*nym.com/about/token*](https://nymtech.net/about/token) * To read about rewards calculation, visit [Nym Node rewards page](tokenomics/mixnet-rewards.mdx) * To understand the implementation and release plan, see [Nym operators roadmap](tokenomics/mixnet-rewards.mdx#roadmap) @@ -83,11 +83,11 @@ Below is a table with token supply distribution. -To get live data, visit [Nym token page](https://nymtech.net/about/token) or see how to [query API endpoints](#query-tokenomics-api). +To get live data, visit [Nym token page](https://nym.com.net/about/token) or see how to [query API endpoints](#query-tokenomics-api). ### Calculation & Explanation -To get a full comprehension of [node operators rewards](tokenomics/mixnet-rewards.mdx) calculation and [delegators APR height](https://nymtech.net/about/token), we need to understand some basic logic behind the numbers presented. This chapter covers some of the most essential variables in Nym tokenomics flow. +To get a full comprehension of [node operators rewards](tokenomics/mixnet-rewards.mdx) calculation and [delegators APR height](https://nym.com/about/token), we need to understand some basic logic behind the numbers presented. This chapter covers some of the most essential variables in Nym tokenomics flow. ```ascii @@ -104,7 +104,7 @@ To get a full comprehension of [node operators rewards](tokenomics/mixnet-reward
Circulating supply is NYM. -NYM token is capped at 1b. Visit [Nym token page](https://nymtech.net/about/token) to see live data and graphs. +NYM token is capped at 1b. Visit [Nym token page](https://nym.com/about/token) to see live data and graphs. #### Staking target diff --git a/documentation/docs/pages/operators/troubleshooting/nodes.mdx b/documentation/docs/pages/operators/troubleshooting/nodes.mdx index 0bfe8a756d3..2838ef67305 100644 --- a/documentation/docs/pages/operators/troubleshooting/nodes.mdx +++ b/documentation/docs/pages/operators/troubleshooting/nodes.mdx @@ -439,7 +439,7 @@ wscat -c ws://: -### My exit Gateway "is still not online..." +### My Exit Gateway "is still not online..." The Nyx chain epoch takes up to 60 min. To prevent the Gateway getting blacklisted, it's essential to start it before the bonding process and let it running. In case it already got [blacklisted](#my-gateway-is-backlisted) check the steps above. @@ -482,7 +482,7 @@ http://:8080/api/v1/roles # in case of hostname domain https:///api/v1/roles ``` -3. Make sure all your [ports are open](https://nymtech.net/operators/nodes/maintenance.html#configure-your-firewall) properly +3. Make sure all your [ports are open](../nodes/preliminary-steps/vps-setup#install-dependencies--configure-firewall) properly 4. Make sure to run your Gateway with embedded IPR as root. Either in a root shell with your configs in `/root/.nym/` or with a command `sudo -E` which gives root privileges but looks for user config folder -5. If it's all good in the API but you don't see the right tick/badge in the [Performance testing list](https://nymtech.net/events/fast-and-furious), just wait some time and then try to refresh the page +5. If it's all good in the API but you don't see the right tick/badge in the [Performance testing list](https://nym.com/events/fast-and-furious), just wait some time and then try to refresh the page */} diff --git a/documentation/docs/pages/operators/troubleshooting/validators.mdx b/documentation/docs/pages/operators/troubleshooting/validators.mdx index 8c99a698ebd..e0b8250e31a 100644 --- a/documentation/docs/pages/operators/troubleshooting/validators.mdx +++ b/documentation/docs/pages/operators/troubleshooting/validators.mdx @@ -13,6 +13,6 @@ The most common reason for your validator being jailed is that your validator is ## Where can I get more help? -The fastest way to reach one of us or get a help from the community, visit our [Telegram Node Setup Help Chat](https://t.me/nymchan_help_chat) or head to our [Discord](https://nymtech.net/go/discord). +The fastest way to reach one of us or get a help from the community, visit our [Telegram Node Setup Help Chat](https://t.me/nymchan_help_chat) or head to our [Discord](https://nym.com/go/discord). For more tech heavy question join our [Matrix core community channel](https://matrix.to/#/#general:nymtech.chat), where you can meet other builders and Nym core team members.