Delivery-Date: Tue, 28 Oct 2014 17:30:59 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-3.0 required=5.0 tests=BAYES_00,DKIM_SIGNED,
	RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD,T_DKIM_INVALID,URIBL_BLACK autolearn=ham
	version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 108C51E0BCE;
	Tue, 28 Oct 2014 17:30:47 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 3A7F030F4F;
	Tue, 28 Oct 2014 21:30:41 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 7EA9F30F02
 for <tor-talk@lists.torproject.org>; Tue, 28 Oct 2014 21:30:37 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id rzbOLOT9yj7k for <tor-talk@lists.torproject.org>;
 Tue, 28 Oct 2014 21:30:37 +0000 (UTC)
Received: from outbound.mailhostbox.com (outbound.mailhostbox.com
 [162.222.225.19])
 by eugeni.torproject.org (Postfix) with ESMTP id 4DACE30530
 for <tor-talk@lists.torproject.org>; Tue, 28 Oct 2014 21:30:37 +0000 (UTC)
Received: from [0.0.0.0] (politkovskaja.torservers.net [77.247.181.165])
 (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits))
 (No client certificate requested)
 (Authenticated sender: s7r@sky-ip.org)
 by outbound.mailhostbox.com (Postfix) with ESMTPSA id B50CF639A8C
 for <tor-talk@lists.torproject.org>; Tue, 28 Oct 2014 21:30:31 +0000 (GMT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sky-ip.org;
 s=20110108; t=1414531834;
 bh=uhKDqMIrJHGdMDndKa7dz6aM+dHXf++IZGf4H9/j5eI=;
 h=Message-ID:Date:From:Reply-To:MIME-Version:To:Subject:References:
 In-Reply-To:Content-Type:Content-Transfer-Encoding;
 b=WAqzPLtNVBEKpiqcqmdalAv6ElknYdkx0KbJJBHc44AMgpLAYsOuxJxNnF6yEr1ea
 h8Frkkecyusp9Q55aU6dFXaIXU5t02yKoa0LMq7+KhF8URUTRHq6l7U4BYm2xvHTV5
 ye35SGBbqntuyxEYS2JHilV3qFxWyjDZvBLqEtpw=
Message-ID: <54500AF1.1060109@sky-ip.org>
Date: Tue, 28 Oct 2014 23:30:25 +0200
From: s7r <s7r@sky-ip.org>
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64;
 rv:31.0) Gecko/20100101 Thunderbird/31.2.0
MIME-Version: 1.0
To: tor-talk@lists.torproject.org
References: <20141023191048.17a50660@meilong>
 <20141023232921.GF21428@torproject.org>
 <20141024103527.fd3ac8eff8862bf101b45d95@mega-nerd.com>
 <CAD2Ti2_QWc1Xq+uTvmurFLqjLVsSACMYYDzTAs7zk5SWyQE7Cw@mail.gmail.com>
 <544EA504.6070201@riseup.net>
 <CAHZ_AjvixZV+Kb=j6F2L=WYg881HbM4PzgcFDudW0D2GbQrJVA@mail.gmail.com>
In-Reply-To: <CAHZ_AjvixZV+Kb=j6F2L=WYg881HbM4PzgcFDudW0D2GbQrJVA@mail.gmail.com>
X-CTCH-RefID: str=0001.0A020203.54500AFA.0250, ss=1, re=0.000, recu=0.000,
 reip=0.000, cl=1, cld=1, fgs=0
X-CTCH-VOD: Unknown
X-CTCH-Spam: Unknown
X-CTCH-Score: 0.000
X-CTCH-Rules: C_4847,
X-CTCH-Flags: 0
X-CTCH-ScoreCust: 0.000
X-CTCH-SenderID: s7r@sky-ip.org
X-CTCH-SenderID-TotalMessages: 1
X-CTCH-SenderID-TotalSpam: 0
X-CTCH-SenderID-TotalSuspected: 0
X-CTCH-SenderID-TotalBulk: 0
X-CTCH-SenderID-TotalConfirmed: 0
X-CTCH-SenderID-TotalRecipients: 0
X-CTCH-SenderID-TotalVirus: 0
X-CTCH-SenderID-BlueWhiteFlag: 0
Subject: Re: [tor-talk]
 =?windows-1252?q?Bitcoin_over_Tor_isn=92t_a_good_idea_?=
 =?windows-1252?q?=28Alex_Biryukov_/_Ivan_Pustogarov_story=29?=
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Great!
One question: how did you configure your Bitcoin node to be functional
on v4,v6 and .onion at the same time?

For example, the Tor hidden service node needs to have the following
setting in bitcoin.conf:
externalip=dsyadrvivtt34s26.onion

This will teach the daemon the .onion IP address it needs to advertise
to other peers. It has no other way to learn this address except if
you manually copy/paste it in bitcoin.conf

I don't know how this affects the v4 and v6 interfaces, do you have
multiple externalip= arguments in bitcoin.conf (in order to advertise
the public v4 and v6 addresses too)? Is it possible this way?

Can you please remove the sensitive data and copy/paste your
bitcoin.conf? I am interested only in Listen=, Bind=, proxy= and
externalip= as well as other connectivity entries.

I don't run Tor hidden bitcoin nodes and clearnet nodes at the same
time on the same instance (or even on the same server). I run bridge
Bitcoin nodes in parallel. The bridge Bitcoin nodes help broadcast the
information received from other Tor hidden peers to clearnet peers
(since we do not want an island or a separate network - the clearnet
and Tor hidden services network need to be glued together as a whole
network).

A bridge Bitcoin node is configured as a regular clearnet Bitcoin
node. Additionally, you install Tor, and simply add in bitcoin.conf:
onion=127.0.0.1:9050

Where 127.0.0.1:9050 is the Tor socks5 listener. Substitute the port
if different. This setting tells the bitcoin daemon about the channel
to reach .onion peers. For the rest of the clearnet peers it will use
as default, its own public IP. Now this node exchanges information
with .onion peers and clearnet peers simultaneous just fine,
broadcasting the information from Tor hidden peers to clearnet peers.


On 10/28/2014 7:18 PM, eric gisse wrote:
> To that end, I setup a bitcoin node that listens on the v4/v6
> internet as well as tor.
> 
> The hidden service address is dsyadrvivtt34s26.onion
> 
> Could some folks please test this for me and make sure it works for
> others? I can see it is quite happily running on v4/v6 (and getting
> traffic) but its' less obvious that it is working over tor.
> 
> On Mon, Oct 27, 2014 at 3:03 PM, Thomas White
> <thomaswhite@riseup.net> wrote:
> 
> I didn't realise my nodes didn't allow the bitcoin port. I'll get 
> right on it.
> 
> Also, if anyone in the Tor community has spare capacity, you can
> also setup a full bitcoin node on the same server you use as an 
> exit/relay/bridge and it doesn't take up a great deal of resources 
> other than disk space (16Gb I think right now and growing slowly).
> On my series of exits there is also full bitcoin nodes accessible 
> exclusively over hidden services and others which are accessible
> over regular clearnet.
> 
> -T
> 
> On 27/10/2014 19:58, grarpamp wrote:
>>>> On Thu, Oct 23, 2014 at 7:35 PM, Erik de Castro Lopo 
>>>> <mle+tools@mega-nerd.com> wrote:
>>>> 
>>>> http://arxiv.org/pdf/1410.6079v1.pdf
>>>> 
>>>>> Could this situation be improved if people ran limited exit
>>>>> nodes that only alloed the bitcoin p2p protocol to exit? I
>>>>> for one don't have enough
>>>> 
>>>> There are about ten exit nodes that do only this today. [One
>>>> of which is run by Mike Hearn who has advocated building in
>>>> censorship capabilities to Tor, and blocking (historically)
>>>> tainted coins (such as you have now or might receive through
>>>> otherwise completely innocent transactions with you, or from
>>>> your own trans/mixing with others).]
>>>> 
>>>> Then there is question if your client will select such 'only
>>>> *coin' nodes versus those with high bandwidth and open exit
>>>> policies.
>>>> 
>>>> There are also a fair number of hidden services in
>>>> Tor/I2P/CJDNS that act as bitcoin nodes.
>>>> 
>>>> As related tangent, yes, the bitcoin protocol needs to be 
>>>> encrypted on the wire, at least bitcoin node to bitcoin node
>>>> with TLS, obviously and urgently so, particularly if you wish
>>>> to guard your trans from wire listeners.
>>>> 
>>>> You might be best to in fact run bitcoin always and entirely
>>>> over Tor, especially while transacting. But then also
>>>> routinely compare that received blockchain to one you receive
>>>> via alternate/trusted sources, such as clearnet or signed
>>>> bittorrent checkpoints.
>>>> 
> 
>> -- tor-talk mailing list - tor-talk@lists.torproject.org To
>> unsubscribe or change other settings go to 
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>> 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (MingW32)

iQEcBAEBAgAGBQJUUArxAAoJEIN/pSyBJlsRwz0H/25uHbfzL5UCXZdGyyXBdy8D
ivwBddOglFO/bpecxlt5GTnfv66tEP74RGh+VEkIdcq3o9pQK1qqhamYNjldhsOJ
pfuuQvZ/XXOtODG8VhTAzgPnDSco0QpTl+kXEVJfwZVsql2SieJAvPnK7A70YqZX
Xn2CIrXfeDInqYP+zn0fPK1URba+b173rh+YoBxNU7DD36d/IyynJc/DaSOmLBCB
FZUApDg9wWRM6VI4WwbsHQJ+vbSTxUThj6mcVKrzBs1gECcHcLmmH/52fZnljHDP
2j2R0dIEkMtW/Cvta3WeycjVVhlsEZXi536BIU1yv3RCx7A1gcwWZvineKiYRqE=
=V4AZ
-----END PGP SIGNATURE-----
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

