Bitcoin Forum
May 11, 2024, 03:19:13 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Any easy way to have armory run over tor?  (Read 924 times)
402blownstroker (OP)
Newbie
*
Offline Offline

Activity: 51
Merit: 0


View Profile
August 26, 2016, 04:06:59 AM
 #1

I can't figure this out for the life of me.
1715440753
Hero Member
*
Offline Offline

Posts: 1715440753

View Profile Personal Message (Offline)

Ignore
1715440753
Reply with quote  #2

1715440753
Report to moderator
The forum strives to allow free discussion of any ideas. All policies are built around this principle. This doesn't mean you can post garbage, though: posts should actually contain ideas, and these ideas should be argued reasonably.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715440753
Hero Member
*
Offline Offline

Posts: 1715440753

View Profile Personal Message (Offline)

Ignore
1715440753
Reply with quote  #2

1715440753
Report to moderator
goatpig
Moderator
Legendary
*
Offline Offline

Activity: 3668
Merit: 1347

Armory Developer


View Profile
August 26, 2016, 04:17:24 AM
 #2

Tails

biolizard89
Member
**
Offline Offline

Activity: 77
Merit: 52


View Profile
August 28, 2016, 10:35:25 AM
 #3

Tails

Whonix should work fine too.  (At least, I did so a couple years ago without trouble.)  Whether Tails or Whonix is better depends on use case, threat model, and personal preference.
Rampion
Legendary
*
Offline Offline

Activity: 1148
Merit: 1018


View Profile
September 07, 2016, 04:02:54 PM
 #4

Why Tails or Whonix? Running Bitcoin Core (which is needed for Armory) in either Tails or Whonix is a pain in the ass - the blockchain is simply too big.

I'd say the best option is to run a standalone Bitcoin Core (not managed by Armory) over Tor - you just need the Tor Browser Bundle to do that.

In Bitcoin Core: go to Preferences/Network and check "connect through SOCKS5 Proxy". Proxy IP: 127.0.0.1, Port: 9150 - and then have Tor Browser Bundle open together with Bitcoin Core.

After the above, in Armory just check check "enable settings for proxies/Tor" in Privacy Settings.

402blownstroker (OP)
Newbie
*
Offline Offline

Activity: 51
Merit: 0


View Profile
September 08, 2016, 04:34:10 AM
 #5

Why Tails or Whonix? Running Bitcoin Core (which is needed for Armory) in either Tails or Whonix is a pain in the ass - the blockchain is simply too big.

I'd say the best option is to run a standalone Bitcoin Core (not managed by Armory) over Tor - you just need the Tor Browser Bundle to do that.

In Bitcoin Core: go to Preferences/Network and check "connect through SOCKS5 Proxy". Proxy IP: 127.0.0.1, Port: 9150 - and then have Tor Browser Bundle open together with Bitcoin Core.

After the above, in Armory just check check "enable settings for proxies/Tor" in Privacy Settings.


This is what I was after - thank you.
goatpig
Moderator
Legendary
*
Offline Offline

Activity: 3668
Merit: 1347

Armory Developer


View Profile
September 08, 2016, 07:42:42 AM
 #6

Why Tails or Whonix? Running Bitcoin Core (which is needed for Armory) in either Tails or Whonix is a pain in the ass - the blockchain is simply too big.

I'd say the best option is to run a standalone Bitcoin Core (not managed by Armory) over Tor - you just need the Tor Browser Bundle to do that.

In Bitcoin Core: go to Preferences/Network and check "connect through SOCKS5 Proxy". Proxy IP: 127.0.0.1, Port: 9150 - and then have Tor Browser Bundle open together with Bitcoin Core.

After the above, in Armory just check check "enable settings for proxies/Tor" in Privacy Settings.


The issue with connecting to a anon/private network through a proxy is that any traffic that doesn't go through the proxy can reveal you. As long you use something like the Tor bundle on top of a regular system, that remains a possibility. The main offenders in these setups are DNS lookups: regular traffic will go through the proxy, but your machine will be sending domains in plain text to your ISP for resolution.

It is fairly hard to sanitize an application/system to avoid this kind of (otherwise) routine and harmless side channel traffic. With an OS like Tails or Whonix, that problem goes out the way.

The other point is your OS spying on you. That's a given for Windows so let's not touch on this topic here. For Unix flavors, while the purpose isn't actually spying, there is a wealth of phone home code that will ignore the Tor proxy.

From my perspective it's easier to keep Bitcoin and its blockchain data in an encrypted removable disk for using on Tails than to try and sanitize my regular Debian install. Also, AFAIK Tails is the live Tor OS whereas Whonix is the perma install one. It would be an even easier setup with Whonix.

Searinox
Full Member
***
Offline Offline

Activity: 147
Merit: 100


Do you like fire? I'm full of it.


View Profile
October 10, 2016, 08:53:25 AM
 #7

Is Tor Armory connection used strictly to relay new transactions? Or does it reroute the entire bitcoind traffic?
achow101
Staff
Legendary
*
Offline Offline

Activity: 3388
Merit: 6635


Just writing some code


View Profile WWW
October 10, 2016, 12:14:14 PM
 #8

Is Tor Armory connection used strictly to relay new transactions? Or does it reroute the entire bitcoind traffic?
Armory doesn't actually do anything with Tor since it is a local connection to a local bitcoind. The bitcoind is what actually uses Tor. The bitcoind will use Tor for all of its traffic.

goatpig
Moderator
Legendary
*
Offline Offline

Activity: 3668
Merit: 1347

Armory Developer


View Profile
October 10, 2016, 01:17:48 PM
 #9

Is Tor Armory connection used strictly to relay new transactions? Or does it reroute the entire bitcoind traffic?

In the ATI era, Armory would probe google.com to test for connectivity, as well as run some phone home code. A tor switch was introduced to disable that traffic.

Since 0.94, there is no more phone home code in Armory. By default, it only tries to connect to a Bitcoin node over a local socket. The tor encapsulation/proxying needs only happen at the node layer in this scenario.

Careful of hotlinks within Armory though, these will spawn your default browser which will connect over the open WAN if not setup to run through Tor.

Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!