1. How can I see information about the port numbers
You can get the port numbers1 from the
--help parameters passed to
Look for the following line:
--rpclisten= Add an interface/port to listen for RPC connections (default port: 9109, testnet: 19109)
It is also logged when you start
12:01:46 2016-02-08 [INF] RPCS: RPC server listening on [::1]:9109 12:01:46 2016-02-08 [INF] RPCS: RPC server listening on 127.0.0.1:9109
2. What do you mean by configuration files for
Each application (
dcrctl) can have their own configuration files2. Use
-h and look at the path in parenthesis of the configuration file option (
--configfile) to see the default path. Create a text file at the path and named according to that path you just looked up.
Then you can use the
dcrd sample config file and
dcrwallet sample config file to set whatever options you want. You can do the same thing for
dcrctl too. The format is the same. Every command line option listed by
-h can be specified in the config files (just use the long option name).
Once those are created and in place, you do not have to add all of the options to the command line all the time. That is why you can do:
dcrctl getnetworkhashps 2547036949350
3. Can I run mainnet and testnet daemons and wallets at the same time and on the same machine?¶
Yes3, just add
--testnet to the appropriate spots (
dcrctl) and everything will work. This is why they use different ports and data/log directories!
4. What are the security implications of using the same RPC server authentication passwords with
There is a lot less you can do with access to
dcrd than you can to
dcrwallet. The key point is that RPC access4 to
dcrwallet, when the wallet is unlocked, can be used to spend coins.
When they are both on the same machine, it probably does not matter all that much, but when you are running more secure setups where the wallet is on a separate machine than
dcrd, you would pretty clearly not want to use the same credentials for both. Remember that
dcrd has to be on an Internet-facing machine in order to stay synced to the network (download the block chain data, broadcast transactions, and so on).
On the other hand, the
dcrwallet that contains your funds, for best security, should really not be on a system that has Internet access as it is significantly more difficult for someone to steal your coins if the wallet that contains them is not even on a machine that is accessible via the Internet. Obviously, if you are staking your coins, you will need at least one Internet-facing
dcrwallet instance. Thus, the most secure setup involves having one “cold”
dcrwallet instance that is on a machine that is not Internet-accessible, and a second “hot”
dcrwallet instance (using a different seed of course) to which the cold dcrwallet instance delegates voting right via the
--ticketaddress parameter, both of which use different credentials.
5. Why am I connecting to only 8 outbound peers?¶
There is an intentional unconfigurable limit of 8 outbound peers5. More outbound peers than that does not help you in any way and is actually worse for both you and the network. This has been tested extremely thoroughly in Bitcoin, including btcsuite (the upstream project for Decred). All you would do by upping your outbound connections is waste valuable slots of the relatively few public peers there are (there are always a much higher number of “leechers” than there are “seeders”).
On the other hand, increasing your maximum connections, which really just increases the number of allowed inbound connections, helps the network by ensuring there are more slots available for new nodes and SPV clients which Decred does not have yet, but it will.