In this instructable I'll show all the steps to get a nice, web managed, aMule node on a Raspberry Pi.

The idea born from the need to have a low-cost and low-consuming aMule node always running and connected to internet.

I don't like to use my desktop pc to run aMule because I use it only for work. Furthermore my old laptop, that was running aMule, died some weeks ago after a long agony. So I bought a Raspberry Pi B+, a nice white case and a 32GB class 10 Sd card; and now I have an always on-line aMule node that consume only 5W and cost about 50€.

Yes I know... you are thinking: 50€ to get an aMule node?

Ok, it's not exactly a low-cost solution but it is also the chance to start using this nice and powerful hardware.

So... when you'll be tired you can reuse it to realize many other projects. :-)

Step 1: What Do You Need to Start?

Before starting with this project you need:

  1. A Raspberry Pi board. Currently you can buy the B+ model at discounted price, I bought it on RS;
  2. A fast Sd card, I suggest a 32Gb class 10 card. I bought it from Banggood;
  3. A smart phone re-charger that can supply 1A or more;
  4. A case (optional) for your Raspberry, I bought it on RS;
  5. A LAN cable to connect your Raspberry to your router;
  6. The latest Raspbian Image that you can get here; This tutorial is based on 2015-05-05 release.

I'm writing supposing that you are working on a Linux PC, and I hope you usually do it. But, if you are unfortunately using windows you can install and run Cygwin.

In the following steps you'll find many command lines to be executed on your local PC or on your Raspberry Pi.

All lines starting with anzalone@medeadea have been executed on my local pc and you should execute them locally on your pc. All lines starting with pi@raspberry have been remotely executed on my Rasberry board and you should do the same.

Step 2: Flash the Rspbian Image on Your SD-Card

Here following the steps to install the original Raspbian image on your Raspberry Pi. If you need more info about, you can read the official how to.

2.1. Check the image file

Before installing, you should check that the SHA-1 digest of the downloaded zip file match the one that you can find in the official download page. This is an useful check to be sure the image you are going to install is exactly the one provided by the official Raspberry website.

To calculate the digest you can run:

anzalone@medeadea:~/Desktop/temp$ sha1sum raspbian_latest.zip

if you are installing the 2015-05-05 release, you should get: cb799af077930ff7cbcfaa251b4c6e25b11483de

2.2. Unzip the image file

anzalone@medeadea:~/Desktop/temp$ unzip raspbian_latest.zip
Archive:  raspbian_latest.zip
  inflating: 2015-05-05-raspbian-wheezy.img

2.3. Prepare your Card

Insert you SD Card on your Pc card reader, and look for it and unmount it:

anzalone@medeadea:~/Desktop/temp$ ls /dev/mmc*
/dev/mmcblk0  /dev/mmcblk0p1  /dev/mmcblk0p2
anzalone@medeadea:~/Desktop/temp$ sudo umount /dev/mmcblk0p1
anzalone@medeadea:~/Desktop/temp$ sudo umount /dev/mmcblk0p2

In my case the card was mapped by the file /dev/mmcblk0. It was not empty and it had two partitions (/dev/mmcblk0p1 and /dev/mmcblk0p2) that I unmounted.

Check the device file that maps your Card and unmount every partitions it has.

Be careful: after flashing the image all data in your SD Card will be overwritten, If the SD Card contains some data you don't want to loose, copy it to your hd before unmounting the card.

2.4. Flash the image

To flash the image on the SD Card you'll use the dd command as superuser. Be careful because if you do some mistake in specifying the "of" (output file) argument you can overwrite data on you pc and lost them.

anzalone@medeadea:~/Desktop/temp$ sudo dd bs=4M if=2015-05-05-raspbian-wheezy.img of=/dev/mmcblk0

The above command will copy the Raspbian image on you SD card.

Replace the "0" with the number indicating your SD Card.

Note that the "of" parameter, that is the output file of the dd command, must be the whole SD Card and not one of its partition.

To check the progress of image coping (that could take several minutes) you can open a new terminal and run:

anzalone@medeadea:~/Desktop/temp$ sudo pkill -USR1 -n -x dd

The progress will be showed in the terminal where the dd command is running.

2.5. Verify the flashed image

To check the written image we will use again the "dd" command to copy the content of the SD Card to a new image file. We will then calculate the SHA-1 digest of this new image file and check that it match the one of the original image.

Because the SD Card is usually bigger than the image we wrote, we need to copy only a number of bytes equal to the size of the original image. We can get the size of the original image using the "ls" command:

anzalone@medeadea:~/Desktop/temp$ ls -la 2015-05-05-raspbian-wheezy.img
-rw-r--r-- 1 anzalone anzalone 3276800000 2015-05-07 02:00 2015-05-05-raspbian-wheezy.img

To copy the first 3276800000 bytes we will set the buffer size (bs) parameter of the dd command to 1MiB and set the count parameter to 3125.

In this way dd will write a number of bytes equal to 3125*1MiB=3125*1024*1024=3276800000.

anzalone@medeadea:~/Desktop/temp$ sudo dd bs=1M if=/dev/mmcblk0 of=./fromSD.img count=3125
anzalone@medeadea:~/Desktop/temp$ ls -la
total 6400036
drwxr-xr-x 2 anzalone anzalone       4096 2015-07-21 15:27 .
drwxr-xr-x 6 anzalone anzalone       4096 2015-07-21 11:50 ..
-rw-r--r-- 1 anzalone anzalone 3276800000 2015-05-07 02:00 2015-05-05-raspbian-wheezy.img
-rw-r--r-- 1 root     root     3276800000 2015-07-21 16:30 fromSD.img

anzalone@medeadea:~/Desktop/temp$ sha1sum   2015-05-05-raspbian-wheezy.img
fd11a319a8e93fc5f93902c67d337ad419706e5e  2015-05-05-raspbian-wheezy.img

anzalone@medeadea:~/Desktop/temp$ sha1sum   fromSD.img
fd11a319a8e93fc5f93902c67d337ad419706e5e  fromSD.img

If the two SHA-1 digests match you can go to next step.

Step 3: Run Raspbian, Upgrade and Configure It

Well, It's time to run the new installed Raspbian Operative System.

3.1. Switch on your board

Insert the SD Card on your Raspberry Pi, connect the board to your router and then connect the power supply to the micro-USB connector.

3.2. Connect to your board

By default, your Raspberry will use DHCP to receive an IP from your router and will listen for an SSH connection on port 22.

If you don't know the IP address of your board you can find it using a port scanner like nmap to search for open SSH port on your network.

anzalone@medeadea:~$ nmap -p22
Starting Nmap 6.40 (http://nmap.org) at 2015-08-03 17:19 CEST
Nmap scan report for
Host is up (0.020s latency).
22/tcp open ssh

Nmap scan report for
Host is up (0.00017s latency).
22/tcp closed ssh

Nmap done: 16 IP addresses (2 hosts up) scanned in 1.39 seconds

In the above command you should replace the IP address with the address assigned from your router to your local PC.

In my example nmap told me that an SSH service is listening on IP

Now that you know your Rasperry IP address you can connect via SSH using the default login credentials:

Username: pi

Password: raspberry

anzalone@medeadea:~$ ssh pi@ 

pi@raspberrypi ~ $

3.3. Configure your board

3.3.1. Software update

Update all installed software to the latest version. To do it run:

pi@raspberrypi ~ $ sudo apt-get update

pi@raspberrypi ~ $ sudo apt-get upgrade

3.3.2. Configure the board using raspi-config script

Running the following script as superuser you can access the configuration menu visible on screen-shot above.

pi@raspberrypi ~ $ sudo raspi-config 

Use it to:

  • change your password
  • set your time zone and your keyboard layout

3.3.3. configure the SSH server

If you connect a pc to internet and it has a 22 port open you will note an huge quantity of automatic login attempting coming from internet. For this reason I usually prefer do not use the default port 22 for SSH connection.

Edit the configuration file of the SSH daemon to change the port:

pi@raspberrypi ~ $ sudo nano /etc/ssh/sshd_config 

Change the port from 22 to another, for example 3295:

# What ports, IPs and protocols we listen for
#Port 22
Port 3295

For security reasons each SSH server should use different public and private keys and the private key should be absolutely secret. For this reason you need to delete the old keys, that where encoded in the Raspbian image that you just installed, and regenerate them.

Delete the old keys:

pi@raspberrypi ~ $ sudo rm /etc/ssh/ssh_host_*

Regenerate the keys:

pi@raspberrypi ~ $ sudo  dpkg-reconfigure openssh-server
Creating SSH2 RSA key; this may take some time ...
Creating SSH2 DSA key; this may take some time ...
Creating SSH2 ECDSA key; this may take some time ...
[ ok ] Restarting OpenBSD Secure Shell server: sshd.

You can see the new generated keys and check the creation date:

pi@raspberrypi ~ $ ls -ls /etc/ssh/ssh_host_*
4 -rw------- 1 root root  672 Jul 21 17:59 /etc/ssh/ssh_host_dsa_key
4 -rw-r--r-- 1 root root  606 Jul 21 17:59 /etc/ssh/ssh_host_dsa_key.pub
4 -rw------- 1 root root  227 Jul 21 17:59 /etc/ssh/ssh_host_ecdsa_key
4 -rw-r--r-- 1 root root  178 Jul 21 17:59 /etc/ssh/ssh_host_ecdsa_key.pub
4 -rw------- 1 root root 1679 Jul 21 17:59 /etc/ssh/ssh_host_rsa_key
4 -rw-r--r-- 1 root root  398 Jul 21 17:59 /etc/ssh/ssh_host_rsa_key.pub

Step 4: Install and Configure AMule

4.1 install aMule

To use aMule via a web browser you shold install aMule and aMule daemon. The daemon will automatically start at the boot of your board and will start the aMule and a web server used to control it.

You can get both aMule and Amule daemon via apt:

pi@raspberrypi ~ $ sudo apt-get install amule amule-daemon

At the end of the installation you could get the following message:

[warn] Not starting aMule daemon, AMULED_USER not set in /etc/default/amule-daemon. ... (warning).

don't worry, it is because there is not yet an user to run the aMule server, we'll fix it immediately.

4.2 configure aMule daemon

Create a new user called amule, choosing a strong password and letting blank all the other information that the system will ask for:

pi@raspberrypi ~ $ sudo adduser amule
pw: <typeapasswordhere>

This user will be used to run the aMule daemon but you can also use it to connect via SSH to your board.

Once created the new user, we must configure the daemon to use it to run aMule:

pi@raspberrypi ~ $ sudo nano /etc/default/amule-daemon 

Modify the file like this:

# Configuration for /etc/init.d/amule-daemon

# The init.d script will only run if this variable non-empty.

# You can set this variable to make the daemon use an alternative HOME.
# The daemon will use $AMULED_HOME/.aMule as the directory, so if you
# want to have $AMULED_HOME the real root (with an Incoming and Temp
# directories), you can do `ln -s . $AMULED_HOME/.aMule`.

then press Ctrl+o to save and Ctrl+x to exit.

Start the daemon with the following command:

pi@raspberrypi ~ $ sudo /etc/init.d/amule-daemon start

The daemon will automatically create a default aMule configuration file in the this folder:


4.3 Configure aMule

Before editing the configuration file we need to choose two password and to calculate their MD5 digest.

The first password is the External Connection Password and will be requested by the aMule daemon in order to accept an external connection. This password will also be used by the amule web-server to connect to aMule daemon.

The second password is the Web Password and will be requested by the amule web-server to accept a connection via web-browser.

In my example I chosen the following passwords:

  • External Connection Password: amuleberryec
  • Web password: amuleberryweb

of course you should choose different and stronger passwords and use them to get the digest as the following code shows:

pi@raspberrypi ~ $ echo -n amuleberryec | md5sum
35deae36144400e842ffe4e8a508f03a  -
pi@raspberrypi ~ $ echo -n amuleberryweb | md5sum
2a2bdb142ec114669041efc9de10a58a  -

Now you can edit the configuration file in order to enable the external connection, enable the web-server and save the digest of your passwords.

In the following code I highlighted with ">>>" the line you have to modify.

pi@raspberrypi ~ $ sudo nano /home/amule/.aMule/amule.conf
>>> AcceptExternalConnections=1
>>> ECPassword=35deae36144400e842ffe4e8a508f03a
>>> Enabled=1
>>> Password=2a2bdb142ec114669041efc9de10a58a
>>> Port=8080 

As you can see I also changed the port used by the web-server but you are free to left the default one.

4.4 Adding server.met and nodes.dat

To properly work with eDonkey an KADemila network you need to download two files:

  • the server.met file containing a list of eDonkey server
  • the nodes.dat file containing a list of KADemila nodes

you can search these files on web choosing the more appropriate to your geographical location and your internet connection. Bee careful to verify that the source from which you are downloading them is trusty.

Here following the command to install those file. Please replace the URL of the two files with your favourite ones.

pi@raspberrypi ~ $ sudo su - amule 
amule@raspberrypi ~ $ cd .aMule/
amule@raspberrypi ~/.aMule $ wget "http://update.adunanza.net/servers.met"amule@raspberrypi ~/.aMule $ mv servers.met server.met

amule@raspberrypi ~/.aMule $ wget http://upd.emule-security.org/nodes.datamule@raspberrypi ~/.aMule $ exit

Step 5: Restart the Server and Connect Via Web Browser

You can now restart the aMule daemon:

pi@raspberrypi ~ $ sudo /etc/init.d/amule-daemon restart

and take a look at service listening on yuor board:

pi@raspberrypi ~ $ sudo netstat -ltnp

you should get something like this:

Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address           Foreign Address         State       PID/Program name
tcp        0      0  *               LISTEN      2292/sshd       
tcp        0      0  *               LISTEN      3493/amuled     
tcp        0      0  *               LISTEN      3497/amuleweb   
tcp        0      0  *               LISTEN      3493/amuled   
  • The 8080 port is used by the web-server to get connection from a web browser.
  • The 4712 port is used by aMule to accept external connection from other application like aMule web-server or aMuleGUI.
  • The 4662 is used by aMule for client to client transfers.
  • The 3295 is the one used by SSH server.

You can now open your favourite browser and type the address of your board, in my example:

Type the Web Password you chose. You should be able to get the control of your aMule as in the above image.

Step 6: Configure the Firewall Via Iptables

The goal of this step is to activate the firewall on Raspberry pi in order to protect the board and let aMule work properly.

This can be easily achieved using iptables. It configures the packet filtering rule-set used by the Linux kernel running on the board.

6.1. Define the firewall rules

I defined some rules in order to:

  • make the SSH port (3295) and the Web Server port (8080) available on local network only. If you need to access the Web Server from outside your local network you should change these rules.
  • make the aMule port (4662) available to everyone via tcp
  • make the aMule ports (4672 and 4665) available to everyone via udp, see https://en.wikipedia.org/wiki/AMule for info about the port used by aMule
  • make the aMule External Connection port (4712) available via tcp on local network only. If you want to connect to your aMule board with aMuleGUI from outside your local network you should change this rule.
  • drop traffic on other ports
  • enable ping from local network only

I'll show how to implement these rules in section 6.3.

6.2. Get info about your local network

Type the following command to get info about your local network:

pi@raspberrypi ~ $ ifconfig

eth0      Link encap:Ethernet  HWaddr b8:27:eb:cf:b5:16  
          inet addr:  Bcast:  Mask:
          RX packets:19965227 errors:0 dropped:101 overruns:0 frame:0
          TX packets:20545261 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000 
          RX bytes:456059094 (434.9 MiB)  TX bytes:1869433273 (1.7 GiB)

lo        Link encap:Local Loopback  
          inet addr:  Mask:
          UP LOOPBACK RUNNING  MTU:65536  Metric:1
          RX packets:170888 errors:0 dropped:0 overruns:0 frame:0
          TX packets:170888 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0 
          RX bytes:29218418 (27.8 MiB)  TX bytes:29218418 (27.8 MiB)

You can get your local network information looking at the inet addr and Mask.

In my example I got:

inet addr:


I can then identify my local network with the CIDR Subnet Mask Notation: .

If you don't know how to get the CIDR Subnet Mask Notation starting from "inet addr" and "Mask" you can get more info here CIDR; or, if you prefer, you can install ipcalc:

pi@raspberrypi ~ $ sudo apt-get install ipcalc

then type the following command after replacing *inet addr* and *Mask* with the ones found in your ifconfig output:

pi@raspberrypi ~ $ ipcalc -n  *inet addr*  *Mask*

in my example:

pi@raspberrypi ~ $ ipcalc -n

Address:        11000000.10101000.00000001. 10000000<br>Netmask: = 24   11111111.11111111.11111111. 00000000
Wildcard:            00000000.00000000.00000000. 11111111
Network:       11000000.10101000.00000001. 00000000
HostMin:          11000000.10101000.00000001. 00000001
HostMax:        11000000.10101000.00000001. 11111110
Broadcast:        11000000.10101000.00000001. 11111111
Hosts/Net: 254                   Class C, Private Internet

Look at the line starting with Network and copy the CIDR Subnet Mask Notation address, you will use it in the next section.

6.3 Create an iptables configuration script

After defined the rules and identified the local network, we are going to write a simple script to add the rules to netfilter.

pi@raspberrypi ~ $ sudo nano /etc/init.d/iptablesconf

Edit the file like this and replace the "" network with the one you have found in previous section.

#! /bin/sh
# Provides:          iptablesconfig
# Required-Start:    $network $remote_fs $syslog 
# Required-Stop:     
# Default-Start:     2 3 4 5 
# Default-Stop:      
# Short-Description: firewall
# Description:       This file sets firewall

iptables -P INPUT DROP
iptables -P FORWARD DROP
iptables -A INPUT  -i lo -j ACCEPT
iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
iptables -A INPUT -p icmp -s -j ACCEPT
iptables -A INPUT -p tcp --dport 3295 -s -j ACCEPT
iptables -A INPUT -p tcp --dport 8080 -s -j ACCEPT
iptables -A INPUT -p tcp --dport 4712 -s -j ACCEPT
iptables -A INPUT -p tcp --dport 4662    -j ACCEPT
iptables -A INPUT -p udp --dport 4665    -j ACCEPT
iptables -A INPUT -p udp --dport 4672    -j ACCEPT

iptables -A INPUT -j LOG --log-prefix="INPUT: "

iptables -A FORWARD -j LOG --log-prefix="FORWARD: "

then press Ctrl+o to save and Ctrl+x to exit.

If you need help to change these rules feel free to contact me writing a comment.

Make the script executable:

pi@raspberrypi ~ $ sudo chmod +x  /etc/init.d/iptablesconf

You can make the configuration script automatically executed when Raspbian starts:

pi@raspberrypi ~ $ sudo update-rc.d iptablesconf start 65  2 3 4 5 .

6.4 Reboot and test

After rebooting you can check that the rules are automatically applied running iptables -L -v and obtaining something like this:

pi@raspberrypi ~ $ sudo reboot 

anzalone@medeadea:~$ ssh pi@ -p3295

pi@raspberrypi ~ $  sudo iptables -L -v 
Chain INPUT (policy DROP 1492 packets, 288K bytes)
 pkts bytes target     prot opt in     out     source               destination         
 172K   29M ACCEPT     all  --  lo     any     anywhere             anywhere            
  20M   18G ACCEPT     all  --  any    any     anywhere             anywhere             state RELATED,ESTABLISHED
    0     0 ACCEPT     icmp --  any    any       anywhere            
   22   948 ACCEPT     tcp  --  any    any       anywhere             tcp dpt:3295
43277 1904K ACCEPT     tcp  --  any    any       anywhere             tcp dpt:http-alt
    4   176 ACCEPT     tcp  --  any    any       anywhere             tcp dpt:4712
   32  1812 ACCEPT     tcp  --  any    any     anywhere             anywhere             tcp dpt:4662
    0     0 ACCEPT     udp  --  any    any     anywhere             anywhere             udp dpt:4665
  290 28565 ACCEPT     udp  --  any    any     anywhere             anywhere             udp dpt:4672
 1657  428K LOG        all  --  any    any     anywhere             anywhere             LOG level warning prefix "INPUT: "

Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination         
    0     0 LOG        all  --  any    any     anywhere             anywhere             LOG level warning prefix "FORWARD: "

Chain OUTPUT (policy ACCEPT 20M packets, 14G bytes)
 pkts bytes target     prot opt in     out     source               destination

Step 7: Configure the Port Forwarding on Your Router

If you are using a common ADSL modem and router, your Raspberry board is almost surely connected to internet through a NAT.

In order to make the aMule ports reachable to other aMule user located outside your local network, you should configure your router and activate the port forwarding to your Raspberry Pi board ( forward port 4662 via TCP and ports 4672 and 4665 via UDP).

The steps to right configure the port forwarding depends on your ADSL router brand and model, for this reason I can't cover this step here and I recommend to follow the instruction that you can get from the router manufacturer website.

After configuring the port forwarding, the router usually will assign a static IP to your Raspberry board. If your router doesn't do it automatically you should manually configure a static IP assignation to your board.

Step 8: Get More Control With AMuleGUI

Once you finished all previous steps, you can access and control aMule via web browser (see step 6) or, if you want more control on aMule activities, you can install on your pc aMuleGUI

anzalone@medeadea:~$ sudo apt-get install amule-utils-gui

then run

anzalone@medeadea:~$ amulegui

Type: the ip address of your Board, the external connection port for aMule and the password (see the image above).

Now you can access aMule.

Step 9: Transfer Files From and to Your Board

After downloading a file you will need of course to access to your Raspberry board to copy or move it to your local PC.

You can do it easily without installing any FTP server, by using the sftp protocol that is based on SSH and is already available on your board.

Open nautilus on your local PC and, in the address bar, type: sftp://

by replacing first the IP address with the one of your board.

Then login with the amule user credential (see section 4.2) and explore till you reach the folder containing the downloaded files:


That's all!

Please feel free to comment for any questions and suggestions, I'll try to reply asap.

Thank you for reading!

<p>Cool pi project.</p>
<p>Thank you, Jason.</p>

About This Instructable




More by giuseppea:How to get aMule on Raspberry Pi 
Add instructable to: