2b. TEE Validators
Validators on Subnet 42 run in a secure TEE (Trusted Execution Environment) enclave to validate and verify data from miners. This ensures secure and tamper-proof validation of network data through hardware-level security.
Hardware Prerequisites
Required Hardware
🔒 Intel SGX Support
- Intel SGX 2.0+ enabled CPU required
- Hardware-level security enclave
- Secure computation environment
💻 Compatible Processors
- 11th Gen+ Intel Core series
- Modern Intel Xeon processors
- Must have SGX feature enabled in BIOS
Verify your CPU supports Intel SGX 2.0 or higher before setting up mining operations. The SGX feature must also be enabled in your system BIOS.
Network Requirements
🌐 Port Configuration
- Port 8080 must be open and accessible
- Optional port 8092 for validator exposure
- Configure firewall rules accordingly
Ensure port 8080 is open on your firewall and accessible from the internet. This is critical for validator operations and communication with the network. Port 8092 is optional and only needed if you want to expose your validator.
Cloud Provider Recommendations
For optimal TEE mining performance and reliability, we recommend using Microsoft Azure. This provider has been extensively tested and validated by our team to ensure seamless compatibility with Masa Network’s TEE mining requirements:
Microsoft Azure
✓ Offers SGX-enabled virtual machines
✓ Proven reliability for TEE workloads
✓ Validated for Masa Network mining
✓ Our recommended provider
System Setup & Configuration
Prerequisites
Before starting TEE mining operations, ensure you have:
Docker Setup
✓ Docker installed and running
✓ Permissions to run containers
Network Keys
✓ BTCLI to installation to manage your wallet
✓ Generate coldkey and hotkey mnemonics and register your validator
Keep your coldkey and hotkey mnemonics secure and backed up. These are required for mining operations and cannot be recovered if lost.
Optional: Delegate with Child Key
If you’re running a validator, you can optionally delegate using a child hotkey for enhanced security. This allows you to:
- Keep your cold key secure
- Isolate operational risk
- Manage multiple delegations
- Set custom take rates (up to 18% of rewards)
The Masa validator charges 0% take rate - you keep 100% of your rewards when delegating to us! See our Validator Child Key Delegation Guide for detailed instructions on secure delegation with child hotkeys. The take rate is subject to change in the near future.
Subnet 42 TEE worker setup
To begin mining on Subnet 42, follow these steps to set up your TEE worker:
Clone Repository
First, clone the Subnet 42 repository which contains the TEE mining software:
Navigate to Directory
Change into the repository directory:
Copy Environment File
Create your environment configuration file:
Edit Environment File
Configure your .env file by updating the following fields:
- Your coldkey mnemonic from wallet creation
- Your hotkey mnemonic from wallet creation
- Your role (miner or validator)
- Your machine’s public IP address and port 8080
- Network UID (165 for testnet, 42 for mainnet)
- Network name (test or finney) finney is for mainnet.
- Telemetry Result Worker Address (This is the address of the telemetry result worker)
The .env file comes pre-configured for the Subnet 165 testnet environment. No additional network configuration is needed.
Start Your Node
Start your node with Docker Compose based on your configured role:
For validators:
This will:
- Launch the required containers for your node type
- Initialize your validator node
- Connect to the subnet network
Verify TEE Worker
Once your node is running, verify the TEE worker is accessible by visiting your configured address in a browser:
You should see a response indicating the TEE worker is running. If you get a connection error:
- Verify your IP address is correct in the .env file
- Check that port 8080 is open in your firewall
- Ensure the TEE worker container is running properly
The browser may show a security warning due to the self-signed certificate. This is expected and you can proceed to verify the endpoint is responding.
Monitor Logs
Monitor your validator’s logs to ensure everything is running properly:
To see TEE worker logs:
To see your validator’s logs:
Watch for:
- Successful network connections
- Mining activity
- Any potential errors or warnings
It may take a few minutes for your validator to fully sync with the network and begin mining operations.