Installing carml¶
Note (for PyPI or development installs) you’ll need to install
libffi
and liblzma
development libraries. How to do this on
various architectures (please send missing ones!):
- Debian + Ubuntu:
apt-get install build-essential python-dev python-virtualenv libffi-dev liblzma-dev
.
PyPI¶
Once you have libraries installed as above, you should be able to do a
simple pip install carml
. It’s also possible to point to the
.whl
file (e.g. after signature verification).
It is recommended to use virtualenv
to try without affecting
system packages:
virtualenv venv
. ./venv/bin/activate
pip install carml
Development/Source¶
From a fresh clone (git clone https://github.com/meejah/carml.git
)
type make venv
. Then activate your new virtualenv with source
./venv/bin/activate
and then pip install --editable .
which
should install all the dependencies (listed in requirements.txt
).
To do this and use peep
, you need pip version 6.1.1. So, you you
can try something like this (from the root of a fresh clone):
virtualenv venv
. ./venv/bin/activate
pip install --upgrade pip setuptools # esp. for Debian
pip install --editable .
Dependencies:
Tor Setup¶
For Tor setup, make sure you have at least the following in
/etc/tor/torrc
:
CookieAuthentication 1
CookieAuthFileGroupReadable 1
ControlPort 9051
# corresponding carml option: "--connect tcp:127.0.0.1:9051"
Or, if you prefer Unix sockets (recommended):
CookieAuthentication 1
ControlSocketsGroupWritable 1
ControlSocket /var/run/tor/control
# corresponding carml option: "--connect unix:/var/run/tor/control"
The port or unix-socket can obviously be whatever; the above are Tor’s defaults on Debian. The Tor Browser Bundle defaults to using 9151 for the control socket (and DOES use cookie authentication by default).
On Debian/Ubuntu you need to be part of the debian-tor
group. To
check, type groups
and verify debian-tor
is on the list. If
not, add yourself (as root, do):
# usermod username --append --groups debian-tor
If you changed Tor’s configuration, don’t forget to tell it (as root):
# service tor reload