open TUN/TAP
chmod 777 /dev/net
zerotier
open TUN/TAP
chmod 777 /dev/net
zerotier
We’ve found a way to make the easy but infamous “curl|bash” more secure. If your system has GPG, try this:
curl -s 'https://pgp.mit.edu/pks/lookup?op=get&search=0x1657198823E52A61' | gpg --import && \
if z=$(curl -s 'https://install.zerotier.com/' | gpg); then echo "$z" | sudo bash; fi
Some users may need to replace gpg with gpg2 in the above commands.
This first makes sure you have the contact@zerotier.com GPG key. If this succeeds it then fetches our install script and pipes it through GPG. This verifies the script against its embedded signature, and if it is valid only the verified portion is forwarded through to “sudo bash.” Otherwise the script is not executed and you will see a GPG error about signature check failure.
The install.zerotier.com script first characterizes your Linux distribution and adds the ZeroTier official package repository if we have one available for you. It then installs the zerotier-one package, enables and starts the service, and prints your new 10-digit ZeroTier address.
For those who are a bit more careless lazy brave, the script also works without GPG:
curl -s https://install.zerotier.com/ | sudo bash
RPMs are available for x86 and x64. DEBs for a wide variety of architectures are present, with x86 and x64 for almost any distribution and armhf, armel, mipsel, mips64, aarch64, etc. available for certain others.
If you want to manually add our repositories they can be found on download.zerotier.com and source code can be found on GitHub.
if install on OpenVZ, enable TUN/Tap, then start/stop the server
chmod 777 /dev/net