# Part 4 – Proxy configuration

This section will help you set up the proxy setting on your node.

## Setup SSL

Pocket requires that nodes have an SSL certificate for secure communications. SSL (Secure Sockets Layer) is a layer of security that sits on top of TCP/IP. It’s used to encrypt the data sent between a client and a server. To use SSL, you need to have a certificate and a key. Thankfully, getting an SSL certificate is straightforward and free.

To get a certificate, we’ll be using Let’s Encrypt which is a service that issues SSL certificates for free. We’ll also be using software called certbot to register, install, and renew the certificate.

### Registering an SSL certificate

We installed certbot in a previous step so we just need to use it to request a certificate.

To get a certificate, we’ll need to use the certbot command with the following options:

• --register-unsafely-without-email: This option is required to get a certificate without an email address.
• --agree-tos: This option is required to agree to the Let’s Encrypt Terms of Service.
• --nginx: This option is required to use the nginx plugin.
• --no-redirect: This option is required to disable the redirect to the Let’s Encrypt website.
• --domain: This option is required to specify the domain name.

Here’s an example of how to request a certificate. Just replace $HOSTNAME with the DNS name of your node: sudo certbot --nginx --domain$HOSTNAME --register-unsafely-without-email --no-redirect --agree-tos

Obtaining a new certificate
Performing the following challenges:
http-01 challenge for pokt001.pokt.run
Waiting for verification...
Cleaning up challenges
Deploying Certificate to VirtualHost /etc/nginx/sites-enabled/default

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Congratulations! You have successfully enabled
https://pokt001.pokt.run
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -


The output from this command should confirm that the certificate was successfully registered.

### Testing your certificate

To be sure, you’ll also want to test that the certificate is working.

There is a command that certbot provides to test your certificate. It’s used for testing the auto-renewal of the certificate but it also confirms that the certificate is working. You can run it using the following command:

sudo certbot renew --dry-run

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
** DRY RUN: simulating 'certbot renew' close to cert expiry
**          (The test certificates below have not been saved.)

Congratulations, all renewals succeeded. The following certs have been renewed:
/etc/letsencrypt/live/pokt001.pokt.run/fullchain.pem (success)
** DRY RUN: simulating 'certbot renew' close to cert expiry
**          (The test certificates above have not been saved.)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -


The resulting output should confirm that the certificate is working.

## Configure Nginx

Nginx is a web server. We installed it in a previous step but we need to do some additional configuration.

Nginx uses config files to define servers and routes for incoming requests. For Pocket nodes, nginx needs to relay public requests to a local HTTP server that pocket core is running. This is referred to as the proxy. We’ll also need to proxy requests made by the Pocket CLI. For example, when we run the command pocket query height, the CLI makes an http request to the node’s local HTTP server.

### Config files

The nginx configuration files we’re interested in are located in the /etc/nginx/sites-available/ directory. In that directory there is a default configuration file named default. This is the configuration that is created when you install nginx, but we’ll be creating our own for our node.

To configure nginx:

1. Confirm the name of your SSL certificate:
sudo ls /etc/letsencrypt/live/

2. Create a new config file with nano:
sudo nano /etc/nginx/sites-available/pocket

3. Add the following code, making sure to change the hostname values (pokt001.pokt.run) to your node’s DNS hostname in the three places found below:
server {
listen 80 default_server;
listen [::]:80 default_server;

root /var/www/html;

index index.html index.htm index.nginx-debian.html;

server_name _;

location / {
try_files $uri$uri/ =404;
}
}

server {
listen 80 ;
listen [::]:80 ;
listen 8081 ssl;
listen [::]:8081 ssl;

root /var/www/html;

index index.html index.htm index.nginx-debian.html;

server_name pokt001.pokt.run;

location / {
try_files $uri$uri/ =404;
}

listen [::]:443 ssl ipv6only=on;
listen 443 ssl;

ssl_certificate /etc/letsencrypt/live/pokt001.pokt.run/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/pokt001.pokt.run/privkey.pem;

include /etc/letsencrypt/options-ssl-nginx.conf;
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem;

access_log /var/log/nginx/reverse-access.log;
error_log /var/log/nginx/reverse-error.log;

location ~* ^/v1/client/(dispatch|relay|challenge|sim) {
proxy_pass http://127.0.0.1:8082;
allow all;
}

location = /v1 {
proxy_pass http://127.0.0.1:8082;
allow all;
}
}

4. Save the change with Ctrl+O.
5. Exit nano with Ctrl+X.
6. Stop nginx with:
sudo systemctl stop nginx

7. Disable the default configuration:
sudo rm /etc/nginx/sites-enabled/default

8. Enable our new configuration:
sudo ln -s /etc/nginx/sites-available/pocket /etc/nginx/sites-enabled/pocket

9. Start nginx:
sudo systemctl start nginx


## Enable UFW

We’re almost done, but before we finish we’ll make our server more secure by setting firewall rules to limit network exposure. The Uncomplicated Firewall (UFW) is a security tool that makes configuring the firewall reasonably simple. We’ll use it to disable unnecessary ports.

### Ports you need to open

For running a Pocket node, you’ll need to open the following ports:

• 22: SSH
• 80: HTTP
• 443: HTTPS
• 8081: For the Pocket HTTP API
• 26656: For the Pocket RPC API

### Use UFW to disable unnecessary ports

To use UFW to configure the firewall:

1. Enable UFW. When prompted, press y to confirm:

sudo ufw enable

2. Set the default to deny all incoming connections:

sudo ufw default deny

3. Allow the SSH port:

sudo ufw allow ssh

4. Allow port 80:

sudo ufw allow 80

5. Allow port 443:

sudo ufw allow 443

6. Allow port 8081:

sudo ufw allow 8081

7. Allow port 26656:

sudo ufw allow 26656


That’s it for the UFW setup. Let’s just check the status to confirm the ports are open. To do that, run the following command:

sudo ufw status


After confirming only the necessary ports are open, you can move on to the final steps.