Bitcoin Forum
May 27, 2018, 08:32:46 PM *
News: Latest stable version of Bitcoin Core: 0.16.0  [Torrent]. (New!)
 
   Home   Help Search Donate Login Register  
Pages: 1 2 [All]
  Print  
Author Topic: TOR Nodes  (Read 2465 times)
miguelmorales85
Hero Member
*****
Offline Offline

Activity: 547
Merit: 501


View Profile
September 27, 2017, 09:19:02 PM
 #1

I would like to ask your opinion about TOR enabled nodes.
Do you think it is worthy to enabled TOR in every one of our nodes?

I can see in bitnodes21.co the amount of TOR nodes in the network and it is not even then half. I'm considering my self to enable TOR network in mine.
Also, because I think it is better to enabled it to accept incoming connections rather than open the 8333 port on my router.

What are my odds of my privacy and security being compromised if I enable TOR network? I have read is not 100% fail safe.

If my ISP start sharing public my public IP with another clients I wont be able to open the 8333 port.

If anyone can send me links or publish here the pros and cons of enabling TOR network in my nodes you are welcome.

Thanks,
1527453166
Hero Member
*
Offline Offline

Posts: 1527453166

View Profile Personal Message (Offline)

Ignore
1527453166
Reply with quote  #2

1527453166
Report to moderator
1527453166
Hero Member
*
Offline Offline

Posts: 1527453166

View Profile Personal Message (Offline)

Ignore
1527453166
Reply with quote  #2

1527453166
Report to moderator
The Bitcoin software, network, and concept is called "Bitcoin" with a capitalized "B". Bitcoin currency units are called "bitcoins" with a lowercase "b" -- this is often abbreviated BTC.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
aleksej996
Sr. Member
****
Offline Offline

Activity: 322
Merit: 259


★777Coin.com★ Fun BTC Casino!


View Profile WWW
September 28, 2017, 05:54:31 AM
 #2

Nothing is 100%, but Tor is the best way to anonymously run a node. The other benefit is, as you said, that you don't need to forward posts. Anonymity also brings a bit of security as well, since no one will know your IP.

The only real downside of using Tor is bandwith speeds, that are maybe a half or a third of the direct connection on average, but since Bitcoin really doesn't require much bandwith, unless it is doing an initial sync, then it isn't even noticeable.

I would suggest you enable Tor, you don't really lose anything and you gain more nodes.

BillyBobZorton
Legendary
*
Offline Offline

Activity: 1162
Merit: 1017


View Profile
September 28, 2017, 02:36:45 PM
 #3

Nothing is 100%, but Tor is the best way to anonymously run a node. The other benefit is, as you said, that you don't need to forward posts. Anonymity also brings a bit of security as well, since no one will know your IP.

The only real downside of using Tor is bandwith speeds, that are maybe a half or a third of the direct connection on average, but since Bitcoin really doesn't require much bandwith, unless it is doing an initial sync, then it isn't even noticeable.

I would suggest you enable Tor, you don't really lose anything and you gain more nodes.


It's very noticeable when you run a node under Tor and try to sync the network, it becomes too slow to download sometimes, but it's not the end of world, it's still reasonable to download the entire chain with Tor.

But if it's really a problem, I guess a solution is to download the entire chain under your normal connection at high speeds. Once you have your node synced, close it, then open the Tor Browser, then open your node again and now you can do transactions under Tor. I think that would do.


                        ▗▗▗                   
                    ▗▗████▖▘                 
                  ▖████████▌                 
               ▗███████████▖                 
              ▞████████████▞                 
            ▗██████████████▝                 
           ▗███████████████▐        ▄██▖     
          ▗█████████████████▘    ▗███▀▝       
          ▞█████████████████▗   ████ █▖       
         ▝██████████████████▗  ███▘▗██▞       
         ▚██████████████████▖ ▗██▗████▘▘     
         ▌██████████████████▝   ▐████ █       
        ▝██████████████████▗▚  ████ ██▌       
        ▐██████████████████▞▖  █ ████▜▝       
        ▖██████████████████▖▚  █▗████▌▌       
        ▝██████████████████▀  █▞████▚▚▗       
        ▝██████████████████▘▗█▚████▞▙▚       
        ▝████████████████▝▖ ██▐▚████▐▗       
         ▚██████████████▘▖█████████▞▞         
        ▝██████████████▖██████████▞▚         
         ▐██████████████▚▚████████▘▘         
         ▖████████████▜▐████████▖▝           
          ▚████████▌▛████████▝               
          ▘████████▛▞████▘▘                   
          ▝████████▞▀▝▝                       
           ▘██▘▘▘▝                           
           ▝                                 
Bonpay
miguelmorales85
Hero Member
*****
Offline Offline

Activity: 547
Merit: 501


View Profile
September 29, 2017, 01:00:04 PM
 #4

Nothing is 100%, but Tor is the best way to anonymously run a node. The other benefit is, as you said, that you don't need to forward posts. Anonymity also brings a bit of security as well, since no one will know your IP.

The only real downside of using Tor is bandwith speeds, that are maybe a half or a third of the direct connection on average, but since Bitcoin really doesn't require much bandwith, unless it is doing an initial sync, then it isn't even noticeable.

I would suggest you enable Tor, you don't really lose anything and you gain more nodes.


It's very noticeable when you run a node under Tor and try to sync the network, it becomes too slow to download sometimes, but it's not the end of world, it's still reasonable to download the entire chain with Tor.

But if it's really a problem, I guess a solution is to download the entire chain under your normal connection at high speeds. Once you have your node synced, close it, then open the Tor Browser, then open your node again and now you can do transactions under Tor. I think that would do.

Hi Hilly, have you turn the node to TOR network after syncing from the regular network? I looking for people with some experience in this. I dont want to mess my node. It is a pruned rPi and at this moment has been behaving good so far.

Would I need more processing power to run a TOR node or the issue is the amount of bandwidth/speed?

peace
aleksej996
Sr. Member
****
Offline Offline

Activity: 322
Merit: 259


★777Coin.com★ Fun BTC Casino!


View Profile WWW
September 29, 2017, 10:14:10 PM
 #5

Nothing is 100%, but Tor is the best way to anonymously run a node. The other benefit is, as you said, that you don't need to forward posts. Anonymity also brings a bit of security as well, since no one will know your IP.

The only real downside of using Tor is bandwith speeds, that are maybe a half or a third of the direct connection on average, but since Bitcoin really doesn't require much bandwith, unless it is doing an initial sync, then it isn't even noticeable.

I would suggest you enable Tor, you don't really lose anything and you gain more nodes.


It's very noticeable when you run a node under Tor and try to sync the network, it becomes too slow to download sometimes, but it's not the end of world, it's still reasonable to download the entire chain with Tor.

But if it's really a problem, I guess a solution is to download the entire chain under your normal connection at high speeds. Once you have your node synced, close it, then open the Tor Browser, then open your node again and now you can do transactions under Tor. I think that would do.

Hi Hilly, have you turn the node to TOR network after syncing from the regular network? I looking for people with some experience in this. I dont want to mess my node. It is a pruned rPi and at this moment has been behaving good so far.

Would I need more processing power to run a TOR node or the issue is the amount of bandwidth/speed?

peace

I have been running a node over Tor for years now. It will not mess up your node, it is a recommend to use Tor and Tor configuration is very well integrated in to the Bitcoin Core wallet, it even has a command line argument to automatically create Tor hidden service for you.

Tor uses a negligible amount of processing power and bandwith. I even agree with Billy that it is completely ok to even sync up using Tor, since most of the syncing process is limited in speed due to the processing power and not bandwith, and Tor takes almost no processing power, but does take some bandwith that is, as I mentioned, negligible for all purposes of the Bitcoin Core node.

posternat
Hero Member
*****
Offline Offline

Activity: 770
Merit: 500



View Profile
October 04, 2017, 05:21:32 PM
 #6

Do you have reason to turn them on? There is no way that anyone is going to steal from you that way, but there is no reason to turn them on if not needed either. Just because the new car comes with a few toys does not mean you have to use them all in one day. There are aspects that you will never touch in there. And the only way that people get stolen from is out right wrong actions.

    ▄█▄
   ██▀  ▄█▄
  ██▀  ▄█▀  ▄▀
 ██▀  ▄█▀  ▄▀
▐█▌  ▄█▀  ▄▀
██   ██   
██   ██   
██   ██   
▐█▌  ▀█▄  ▀▄
 ██▄  ▀█▄  ▀▄
  ██▄  ▀█▄  ▀▄
   ██▄  ▀█▀
    ▀█▀
████
▀▀▀▀
▄▀▀▄▄▄▄▄▄▄▄█████████████▐████
▀▀     ▄▄▄▄▄▀██████████▐████
▄▀▀▄▄▄▄▄█████▀ ▀▄▄▄     ▐████
▀▀     ▄▀███▄▄▄▄       ▐████
▄▄   ▀█▄▄▄▄▄▄▄▄▄▄▄▄▄▄▐████
▀▄▄▀▀▀▀▀██████████████▐████
▄▄   ▄▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▐████

▀▄▄▀▀▀  ██████           ▐████
██████▄▀▀▀▀▀▀▀▀▀ ▐████

▄▄  ████▀▄██████████▐████
▀▄▄▀▀▀▀ ▄████████████▐████
BIDIUM       ▄█▄
   ▄█▄
  ▀██

▀▄  ▀█▄  ▀██
 ▀▄  ▀█▄  ▀██
  ▀▄  ▀█▄  ▐█▌
   █   ██   ██
   █   ██   ██
   █   ██   ██
  ▄▀  ▄█▀  ▐█▌
 ▄▀  ▄█▀  ▄██
▄▀
  ▄█▀  ▄██
   ▀█▀
  ▄██
       ▀█▀






























Andre_Goldman
Sr. Member
****
Offline Offline

Activity: 322
Merit: 251

Property1of1OU


View Profile
October 04, 2017, 07:55:42 PM
 #7

reminds me attack on Priest TOR nodes

https://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption

Patent1number: ****-****
miguelmorales85
Hero Member
*****
Offline Offline

Activity: 547
Merit: 501


View Profile
October 04, 2017, 08:06:23 PM
 #8

Do you have reason to turn them on? There is no way that anyone is going to steal from you that way, but there is no reason to turn them on if not needed either. Just because the new car comes with a few toys does not mean you have to use them all in one day. There are aspects that you will never touch in there. And the only way that people get stolen from is out right wrong actions.

Do you recommend to turn the TOR nodes on only if I'm going to need them?
I think the only purpose of a node is not to self use but to contribute to the network and let others use them too, also another few things about the blockchain that have been previously discussed in other posts.

I just want to help with TOR nodes, I dont fear police knocking on my door. I am not in north America (HELLO NSA)
Kprawn
Legendary
*
Offline Offline

Activity: 1498
Merit: 1034


View Profile
October 05, 2017, 03:36:43 PM
 #9

Tor enabled nodes are not 100% fool proof. A lot of the Tor exit nodes are run by the NSA and snooping is done on all of

them. I think 100% anonymity is a myth and even private VPN's can be honey traps. You have a better chance when you

enable Tor, but you should never feel satisfied that your traffic are not being tracked by these agencies. If you do nothing

illegal, they will most probably leave you alone. {running a Bitcoin node is not illegal in most countries}  Grin

░░░░░░░▄▄▄▄▄▄
░░░░▄██████████▄
░░░██████████████
░░██████▐▌██████
█████░░░░░░░▀█████
██████▄▄░░▄▄░░██████
████████░░▀▀▄██████
████████░░▄▄▄░░█████
██████▀▀░░▀▀▀░░█████
█████░░░░░░░░█████
░░██████▐▌██████
░░░██████████████
░░░░▀██████████▀
░░░░░░░▀▀▀▀▀▀
░░░

                   BitCloak Bitcoin Mixer  
  BTC & BCH | API| MULTIADDRESS| PGP PROOF|  FAST MIX |  ESCROW|  MORE ! 

░░░░░░░▄▄▄▄▄▄
░░░░▄██████████▄
░░░██████████████
░░██████▐▌██████
█████░░░░░░░▀█████
██████▄▄░░▄▄░░██████
████████░░▀▀▄██████
████████░░▄▄▄░░█████
██████▀▀░░▀▀▀░░█████
█████░░░░░░░░█████
░░██████▐▌██████
░░░██████████████
░░░░▀██████████▀
░░░░░░░▀▀▀▀▀▀
░░░

aleksej996
Sr. Member
****
Offline Offline

Activity: 322
Merit: 259


★777Coin.com★ Fun BTC Casino!


View Profile WWW
October 05, 2017, 08:35:59 PM
 #10

Tor enabled nodes are not 100% fool proof. A lot of the Tor exit nodes are run by the NSA and snooping is done on all of

them. I think 100% anonymity is a myth and even private VPN's can be honey traps. You have a better chance when you

enable Tor, but you should never feel satisfied that your traffic are not being tracked by these agencies. If you do nothing

illegal, they will most probably leave you alone. {running a Bitcoin node is not illegal in most countries}  Grin

You are right about it not being 100% fool proof, but when you run a hidden service neither you nor the other party ever uses an exit node, Tor is very very good when the traffic doesn't leave the Tor network, it is just harder to make a connection to the clear net securely, since there are bigger costs in running an exit node, so most legit users don't run them. But this still doesn't mean that they monitor ALL the exit nodes, you have to remember that these are nodes all across the world, in Russia, Switzerland,...There is no clear evidence that they can really monitor these ones in the other countries.

miguelmorales85
Hero Member
*****
Offline Offline

Activity: 547
Merit: 501


View Profile
October 05, 2017, 09:03:11 PM
 #11

Tor enabled nodes are not 100% fool proof. A lot of the Tor exit nodes are run by the NSA and snooping is done on all of

them. I think 100% anonymity is a myth and even private VPN's can be honey traps. You have a better chance when you

enable Tor, but you should never feel satisfied that your traffic are not being tracked by these agencies. If you do nothing

illegal, they will most probably leave you alone. {running a Bitcoin node is not illegal in most countries}  Grin

You are right about it not being 100% fool proof, but when you run a hidden service neither you nor the other party ever uses an exit node, Tor is very very good when the traffic doesn't leave the Tor network, it is just harder to make a connection to the clear net securely, since there are bigger costs in running an exit node, so most legit users don't run them. But this still doesn't mean that they monitor ALL the exit nodes, you have to remember that these are nodes all across the world, in Russia, Switzerland,...There is no clear evidence that they can really monitor these ones in the other countries.

Even if the NSA is monitoring ALL nodes in the United States, they can also monitor nodes in "ALLIED" contries, or in countries when they infiltrate the companies (ISP) to install their malware or modified hardware. I agree with you that there must be few countries that are not infected by that cancer.. what a shame in this modern times..  Angry
nelsledma
Sr. Member
****
Offline Offline

Activity: 361
Merit: 250


BLOCKCHAIN BASED REIT


View Profile
October 13, 2017, 05:56:45 AM
 #12

Perhaps embedded into a client, but there is not that much benefit to it. The governments have dropped trying to do things like ban the cryptos, but that is not really giving up on their part. It appears that they give up and in reality they would rather watch the network and the chains.

A node is not something that needs to be hidden unless there is something that node is doing that differs from the common node. That would be something for a new coin and that is something that they will have to consider.

               ▐█▀▄███████▄▀██▄▄            
          ▄██▀█ ▄ █▄▄▄▄▄██▀▀     ▀▄         
       ▄▀█▄███▀███▐█████████        ▄       
      ▄██████▀█████▐█████████▄      ███▄    
    ▐███████ ███████▐█████████▌████▄████▌   
   ▄▐██████▀█████████▐████████▐██████▀███▌  
  ▐█▌█████▌███████████▐██████ ████████ ██ ▌ 
  ███▄▀    ▀███████████▐████▌██████████  ██ 
  ██▌        ▐██████████▐███▐███████▀▀▄▄ ▐█▌
  ██          ███████████▐█ ███▀▀▄▄████ ██▌ 
  ██          ▄▄▄▄▄███▀▀▀  ▐▄▄████████▌████▌
  ▀██        ▄██████████▀▄▄▄▀█████████▐███▀ 
   ██▌▄▄   ▄███████████▄█████▄▀██████▐██▀▄  
    █▐█████▐█████████▀▄████████▄█▀▀▀ ▀▀▄█▀  
     ▀██████▐██████▀▄██████████▀      █▀    
       ▀█████▄███▀▄██████████▀▀     ▄█▀     
         ▀▄█▀▀ ▀ ▀▀▀▀▀▀█▄▄▄████ ▄▄▄▌▀       
            ▀▀▄█▄▀▀██████████▀▄█▀▀          
                ▀▀▀▀ ▀▀▀▀▀▀                 
GLOBAL REIT      
REAL ESTATE INVESTMENT TRUST

██
██ ██
██ ██
██ ██
██ ██
   ██

██
██ ██
██ ██
██ ██
██ ██
   ██




█████████████████████████
██ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ██
██ ████████████▀▀▀████ ██
██ ████████▀▀     ████ ██
██ █████▀    ▄▀  ▐████ ██
██ ██▀     ▄▀    ▐████ ██
██ ████▄▄ █▀     █████ ██
██ ██████ ▄▄█   ▐█████ ██
██ ████████████ ██████ ██
██ ███████████████████ ██
██▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄██
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀

                We Are Everywhere 

Pre ICO: 20% Bonus! Get Whitelisted now!
miguelmorales85
Hero Member
*****
Offline Offline

Activity: 547
Merit: 501


View Profile
October 13, 2017, 07:50:24 PM
 #13

Hello all, thank for your comments. Just a quick update: I dont know if it is because I have a IPv6 or a TOR enabled service but my node just got 1 incoming connection. it gets stuck at 9 connections.
I wonder If there is something I could do.
If having a TOR node is the right path to have a incoming connection enabled node but only permit ONE connection then I think I would rather have a regular node.
The log keeps showing this:

Quote
2017-10-13 19:38:59 connect() to 79.10.132.141:8333 failed after select(): Connection refused (111)
2017-10-13 19:41:16 connect() to 72.48.98.106:8333 failed after select(): Connection refused (111)
2017-10-13 19:41:58 connect() to 217.33.94.163:8333 failed after select(): Connection refused (111)
aleksej996
Sr. Member
****
Offline Offline

Activity: 322
Merit: 259


★777Coin.com★ Fun BTC Casino!


View Profile WWW
October 13, 2017, 08:41:10 PM
 #14

Hello all, thank for your comments. Just a quick update: I dont know if it is because I have a IPv6 or a TOR enabled service but my node just got 1 incoming connection. it gets stuck at 9 connections.
I wonder If there is something I could do.
If having a TOR node is the right path to have a incoming connection enabled node but only permit ONE connection then I think I would rather have a regular node.
The log keeps showing this:

Quote
2017-10-13 19:38:59 connect() to 79.10.132.141:8333 failed after select(): Connection refused (111)
2017-10-13 19:41:16 connect() to 72.48.98.106:8333 failed after select(): Connection refused (111)
2017-10-13 19:41:58 connect() to 217.33.94.163:8333 failed after select(): Connection refused (111)

Don't worry, that is all normal. It is hard to get incoming connections, but eventually they do increase. If you got one, and it is not from some local app and is indeed from Tor, then you should get more then one as well, as time goes by. Look at that incoming connection and if it says "via <your onion address>.onion", and you didn't do it yourself, then there is no reason that others won't connect as well. Just make sure to setup "externalip <onionaddrees>.onion" in bitcoin.conf so you can advertise your onion to the network.

Those failed connections in the log might be outgoing connections (to my understanding your node isn't reachable through IPv4 and only with the hidden service, so it must be, since it wouldn't report IP addresses otherwise). Some nodes just might not like Tor nodes or are more likely just failing due to Tor being a bit slower and less reliable then a direct connection, but you still offer bigger anonymity to the network and as you can see you still get 8 outgoing connections, so it is worth it.

miguelmorales85
Hero Member
*****
Offline Offline

Activity: 547
Merit: 501


View Profile
October 13, 2017, 08:58:27 PM
 #15

Hello all, thank for your comments. Just a quick update: I dont know if it is because I have a IPv6 or a TOR enabled service but my node just got 1 incoming connection. it gets stuck at 9 connections.
I wonder If there is something I could do.
If having a TOR node is the right path to have a incoming connection enabled node but only permit ONE connection then I think I would rather have a regular node.
The log keeps showing this:

Quote
2017-10-13 19:38:59 connect() to 79.10.132.141:8333 failed after select(): Connection refused (111)
2017-10-13 19:41:16 connect() to 72.48.98.106:8333 failed after select(): Connection refused (111)
2017-10-13 19:41:58 connect() to 217.33.94.163:8333 failed after select(): Connection refused (111)

Don't worry, that is all normal. It is hard to get incoming connections, but eventually they do increase. If you got one, and it is not from some local app and is indeed from Tor, then you should get more then one as well, as time goes by. Look at that incoming connection and if it says "via <your onion address>.onion", and you didn't do it yourself, then there is no reason that others won't connect as well. Just make sure to setup "externalip <onionaddrees>.onion" in bitcoin.conf so you can advertise your onion to the network.

Those failed connections in the log might be outgoing connections (to my understanding your node isn't reachable through IPv4 and only with the hidden service, so it must be, since it wouldn't report IP addresses otherwise). Some nodes just might not like Tor nodes or are more likely just failing due to Tor being a bit slower and less reliable then a direct connection, but you still offer bigger anonymity to the network and as you can see you still get 8 outgoing connections, so it is worth it.

I checked using getpeerinfo and the only incoming connection is though IPv6. I guess I will wait for more. Thank you for your comment.
I wonder if the incoming connections would be more if I create a whitelist with the most stable nodes from bitcoin21.co

Have anyone tried that?
elliottflz65
Member
**
Offline Offline

Activity: 107
Merit: 10


View Profile
October 13, 2017, 09:00:45 PM
 #16

From what I understand about tor is that anyone who does this will be exposing their information to a tor exit node which can be hosted by anyone. so any sensitive information will be in clear text and be stolen by the person who is hosting the exit node.
aleksej996
Sr. Member
****
Offline Offline

Activity: 322
Merit: 259


★777Coin.com★ Fun BTC Casino!


View Profile WWW
October 13, 2017, 09:08:19 PM
 #17

I checked using getpeerinfo and the only incoming connection is though IPv6. I guess I will wait for more. Thank you for your comment.
I wonder if the incoming connections would be more if I create a whitelist with the most stable nodes from bitcoin21.co

Have anyone tried that?

That is a bad sign. You might not have something setup properly. There is a bit of a privacy risk to using your Bitcoin node with and without Tor at the same time, but not really very worrying, but still.
I don't know how you setup your Tor node, but check bitcoin.conf in your data directory.
I set it up by installing tor and creating a hidden service in the torrc file. Then I run Bitcoin Core with bitcoin.conf looking something like this:

Code:
proxy=127.0.0.1:9050
listen=1
bind=127.0.0.1
externalip=examplehiddenservice.onion

This makes routes all the traffic through Tor and the node is only accessible with the hidden service. You can alternatively bind it to a external ip and therefor allow IP connections, but as I said, might be a privacy concern.

miguelmorales85
Hero Member
*****
Offline Offline

Activity: 547
Merit: 501


View Profile
October 14, 2017, 08:35:33 AM
 #18

I checked using getpeerinfo and the only incoming connection is though IPv6. I guess I will wait for more. Thank you for your comment.
I wonder if the incoming connections would be more if I create a whitelist with the most stable nodes from bitcoin21.co

Have anyone tried that?

That is a bad sign. You might not have something setup properly. There is a bit of a privacy risk to using your Bitcoin node with and without Tor at the same time, but not really very worrying, but still.
I don't know how you setup your Tor node, but check bitcoin.conf in your data directory.
I set it up by installing tor and creating a hidden service in the torrc file. Then I run Bitcoin Core with bitcoin.conf looking something like this:

Code:
proxy=127.0.0.1:9050
listen=1
bind=127.0.0.1
externalip=examplehiddenservice.onion

This makes routes all the traffic through Tor and the node is only accessible with the hidden service. You can alternatively bind it to a external ip and therefor allow IP connections, but as I said, might be a privacy concern.

Hi, thanks for your comment. I am testing the bitcoin.conf settings you mentioned.
on externalip I have set my .onion hiddenservice

Now I can see when I execute getnetworkinfo that my only local address is the .onion one
The IPv6 address is not longer published.

I will give it a few days to see how is it going and keep you all updated.

peace
miguelmorales85
Hero Member
*****
Offline Offline

Activity: 547
Merit: 501


View Profile
October 17, 2017, 06:06:56 AM
 #19

All right, as promised I am here to update the result of the test.

Finally today after a few days with just 9 connections (only 1 inbound) my TOR node stop receiving incoming connections.

I could successfully connect to other .onion nodes using the addnode command but it seem my only incoming connection was MYSELF
Why I say this? Because part of the result of getpeerinfo was this:

Code:
"id": 9,
    "addr": "127.0.0.1:59768",
    "addrlocal": "zmuzcuoflsycriya.onion:8333",

zmuzcuoflsycriya.onion:8333 was my onion address

On the debug I got a lot of these

Code:
2017-10-17 02:30:12 receive version message: /bitnodes.21.co:0.1/: version 70015, blocks=490235, us=
zmuzcuoflsycriya.onion:8333, peer=1848
2017-10-17 02:31:05 Socks5() connect to 46.146.20.179:8333 failed: connection refused
2017-10-17 02:32:05 UpdateTip: new best=000000000000000000769c19d1723e0f53569e154d63fd5c79cffabb8540
9914 height=490236 version=0x20000000 log2_work=87.295696 tx=262776454 date='2017-10-17 02:32:00' pr
ogress=1.000000 cache=72.0MiB(635737txo)
2017-10-17 02:34:03 receive version message: /bitnodes.21.co:0.1/: version 70015, blocks=490235, us=
zmuzcuoflsycriya.onion:8333, peer=1849
2017-10-17 02:35:55 Socks5() connect to 2a00:1298:8011:212::165:8333 failed: general failure
2017-10-17 02:37:17 Socks5() connect to 71.199.96.202:8333 failed: TTL expired
2017-10-17 02:39:53 receive version message: /bitnodes.21.co:0.1/: version 70015, blocks=490236, us=
zmuzcuoflsycriya.onion:8333, peer=1850
2017-10-17 02:41:38 Socks5() connect to 95.154.99.150:8333 failed: connection refused

I got connected to bitnodes21.co and that was my only incoming connection. It seems the purpose was to keep my node status on their website.

I have got a good netscore for the onion address but for me it is not a useful node if it doesnt have incoming connections  Undecided
Code:
{
  "version": 150001,
  "subversion": "/Satoshi:0.15.0.1/",
  "protocolversion": 70015,
  "localservices": "000000000000000c",
  "localrelay": true,
  "timeoffset": -1,
  "networkactive": true,
  "connections": 16,
  "networks": [
    {
      "name": "ipv4",
      "limited": false,
      "reachable": true,
      "proxy": "127.0.0.1:9050",
      "proxy_randomize_credentials": true
    },
    {
      "name": "ipv6",
      "limited": false,
      "reachable": true,
      "proxy": "127.0.0.1:9050",
      "proxy_randomize_credentials": true
    },
    {
      "name": "onion",
      "limited": false,
      "reachable": true,
      "proxy": "127.0.0.1:9050",
      "proxy_randomize_credentials": true
    }
  ],
  "relayfee": 0.00001000,
  "incrementalfee": 0.00001000,
  "localaddresses": [
    {
      "address": "zmuzcuoflsycriya.onion",
      "port": 8333,
      "score": 573
    }
  ],
  "warnings": ""
}

JohnnyNnex
Member
**
Offline Offline

Activity: 69
Merit: 10


View Profile
October 17, 2017, 11:59:23 AM
 #20

You can be sure that there is nothing in the world that lasts for ever or works at 100%. But Tor provides you with more security than any other browser potentially would. But that also means less speed Sad (which proves to be really irritating). I use TOR rarely, but when I do, I love the feeling of complete security
775011934
Sr. Member
****
Offline Offline

Activity: 269
Merit: 250

love is first


View Profile
October 17, 2017, 01:42:52 PM
 #21

Running tor nodes, nothing is worth it!
The more tor nodes, the more complex the tor network,
the higher the anonymity!The future of the Internet is to connect everything,
 but some people don't want to be connected again and  being monitored. For this part, tor is very necessary!
swogerino
Hero Member
*****
Online Online

Activity: 980
Merit: 1004



View Profile
October 18, 2017, 11:44:02 AM
 #22

You risk visits from the FBI when running TOR nodes if you are in the States. You don't know what other people are doing on the TOR network and if yours is an exit node, pretty much the NSA or FBI can use traffic analyses to connect the offender on the TOR network to your node and you may receive an unpleasant visit soon after. Be very careful running TOR if you are in the States, a few neighbors of mine have had such visits but I don't know if they were running nodes or only using TOR browser.

..///Augment Your Portfolio..████  ████
████  ████
████  ████
████  ████
████  ████
████  ████
████  ████
████  ████
████  ████
████  ████
████  ████
████  ████
████  ████
       ▄▄█████████▄▄
     ▄█▀▀▀       ▀▀▀█▄
   ▄▀                 ▀▄
  █       ▄▄▄▄▄▄▄       █
 █    ▄▀▀▀▄▄▄▄▄▄▄▀▀▀▄    █
▐▌  ▄▀▄▀▀▀       ▀▀▀▄▀▄  ▐▌
█  ▐▌█ ▐█▌       ▐█▌ █▐▌  █
▐▌ █▐▌ ███  ▄▄▄  ███ ▐▌█ ▐▌
▐█ ▐▌█  ▀    ▀    ▀  █▐▌ █▌
███ ▀▄▀▄▄▄       ▄▄▄▀▄▀ ███
██▀█▄ ▀▄▄▄▀▀▀▀▀▀▀▄▄▄▀ ▄█▀██
▀    ▀█▄▄▄▀▀▀▀▀▀▀▄▄▄█▀    ▀
       ▀▀█████████▀▀
Vivid

████  ████
████  ████
████  ████
████  ████
████  ████
████  ████
████  ████
████  ████
████  ████
████  ████
████  ████
████  ████
████  ████
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬   WHITEPAPER  ● ● ●.
..FACEBOOK  TWITTER  DISCORD  REDDIT  TELEGRAM  BOUNTY..
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬   ANN THREAD  ● ● ●.
monkeydominicorobin
Full Member
***
Offline Offline

Activity: 210
Merit: 103


✪ NEXCHANGE | BTC, LTC, ETH & DOGE ✪


View Profile
October 20, 2017, 07:24:07 AM
 #23

I would like to ask your opinion about TOR enabled nodes.
Do you think it is worthy to enabled TOR in every one of our nodes?

I can see in bitnodes21.co the amount of TOR nodes in the network and it is not even then half. I'm considering my self to enable TOR network in mine.
Also, because I think it is better to enabled it to accept incoming connections rather than open the 8333 port on my router.

What are my odds of my privacy and security being compromised if I enable TOR network? I have read is not 100% fail safe.

If my ISP start sharing public my public IP with another clients I wont be able to open the 8333 port.

If anyone can send me links or publish here the pros and cons of enabling TOR network in my nodes you are welcome.

Thanks,

You came to the right place since I know a lot about Tor nodes. There are three types of nodes to choose from. But since you are worried about your ISP. It is better to turn your nodes into Entry node or a Middle node. No fuss. No mess. You don't have to worry about anything. But if want tips exit node is your choice. You will get bitcoin tips. Very rare but if you put your bitcoin address in the settings people will donate because only a few people are setting up exit nodes. But this one is messy because you are the exit node authorities will always target the nodes especially when your node was used to download copyrighted content. Since most authorities are ignorant about nodes. You will always have to explain that you are just a node. Through email. You are not doing anything illegal. That will be your  job if you are going to set up an exit node. Really messy. 

miguelmorales85
Hero Member
*****
Offline Offline

Activity: 547
Merit: 501


View Profile
October 20, 2017, 09:47:50 AM
 #24

I would like to ask your opinion about TOR enabled nodes.
Do you think it is worthy to enabled TOR in every one of our nodes?

I can see in bitnodes21.co the amount of TOR nodes in the network and it is not even then half. I'm considering my self to enable TOR network in mine.
Also, because I think it is better to enabled it to accept incoming connections rather than open the 8333 port on my router.

What are my odds of my privacy and security being compromised if I enable TOR network? I have read is not 100% fail safe.

If my ISP start sharing public my public IP with another clients I wont be able to open the 8333 port.

If anyone can send me links or publish here the pros and cons of enabling TOR network in my nodes you are welcome.

Thanks,

You came to the right place since I know a lot about Tor nodes. There are three types of nodes to choose from. But since you are worried about your ISP. It is better to turn your nodes into Entry node or a Middle node. No fuss. No mess. You don't have to worry about anything. But if want tips exit node is your choice. You will get bitcoin tips. Very rare but if you put your bitcoin address in the settings people will donate because only a few people are setting up exit nodes. But this one is messy because you are the exit node authorities will always target the nodes especially when your node was used to download copyrighted content. Since most authorities are ignorant about nodes. You will always have to explain that you are just a node. Through email. You are not doing anything illegal. That will be your  job if you are going to set up an exit node. Really messy. 

hello, that is such a nice information the one you are giving me. I would take a look deeper to the kind of TOR nodes available.

I don't mind setting an exit node if that would work as a help to others. I don't live in US so I guess I could be in gray territory (fingers crossed).

I follow this walkthrough to install my current TOR node:
https://medium.com/@lopp/how-to-run-bitcoin-as-a-tor-hidden-service-on-ubuntu-cff52d543756

At this moment my TOR node has been some kind of failure, only outgoing connections and sometimes just one incoming connections, no matter how many days the node is up or the netscore.

thanks again
aleksej996
Sr. Member
****
Offline Offline

Activity: 322
Merit: 259


★777Coin.com★ Fun BTC Casino!


View Profile WWW
October 21, 2017, 03:04:40 PM
 #25

I would like to ask your opinion about TOR enabled nodes.
Do you think it is worthy to enabled TOR in every one of our nodes?

I can see in bitnodes21.co the amount of TOR nodes in the network and it is not even then half. I'm considering my self to enable TOR network in mine.
Also, because I think it is better to enabled it to accept incoming connections rather than open the 8333 port on my router.

What are my odds of my privacy and security being compromised if I enable TOR network? I have read is not 100% fail safe.

If my ISP start sharing public my public IP with another clients I wont be able to open the 8333 port.

If anyone can send me links or publish here the pros and cons of enabling TOR network in my nodes you are welcome.

Thanks,

You came to the right place since I know a lot about Tor nodes. There are three types of nodes to choose from. But since you are worried about your ISP. It is better to turn your nodes into Entry node or a Middle node. No fuss. No mess. You don't have to worry about anything. But if want tips exit node is your choice. You will get bitcoin tips. Very rare but if you put your bitcoin address in the settings people will donate because only a few people are setting up exit nodes. But this one is messy because you are the exit node authorities will always target the nodes especially when your node was used to download copyrighted content. Since most authorities are ignorant about nodes. You will always have to explain that you are just a node. Through email. You are not doing anything illegal. That will be your  job if you are going to set up an exit node. Really messy. 

hello, that is such a nice information the one you are giving me. I would take a look deeper to the kind of TOR nodes available.

I don't mind setting an exit node if that would work as a help to others. I don't live in US so I guess I could be in gray territory (fingers crossed).

I follow this walkthrough to install my current TOR node:
https://medium.com/@lopp/how-to-run-bitcoin-as-a-tor-hidden-service-on-ubuntu-cff52d543756

At this moment my TOR node has been some kind of failure, only outgoing connections and sometimes just one incoming connections, no matter how many days the node is up or the netscore.

thanks again

You are talking about two different things. OP is not asking to run a Tor relay and help the Tor network, he is asking about running Bitcoin Core as a hidden service to help the Bitcoin network.

You are not running neither entry, middle nor exit relay. You are not running any kind of relay, you are just using a hidden service.

Your errors from the debug.log have nothing to do with inbound connections, they are all outbound, which you have plenty of.
Also that inbound connection was not yourself, but someone else, they all show 127.0.0.1 as that is only what your Bitcoin Core client can see. Remember that Tor hides IP addresses so it makes sense that you are not going to be able to tell apart the inbound connections to your node.

I suggest two things as someone who gets inbound Tor connections quickly when I start the node.

First, show us your configuration file here, move it somewhere and make a new one like this
Code:
proxy=127.0.0.1:9050
listen=1
bind=127.0.0.1
externalip=zmuzcuoflsycriya.onion

Also move somewhere all your data folder data that doesn't have anything to do with the blockchain or the wallet (blocks,chainstate and wallet.dat is all you need). You can keep the logs tho, they can still be useful.

Secondly, check your Tor configuration and set the hidden service manually if you haven't. Could you please say how you have setup the hidden service and all of that? What OS are you using? In torrc file you need to uncomment (remove the # character) the line where it says
Code:
#HiddenServiceDir /var/lib/tor/hidden_service/

Add the following line under that line

Code:
HiddenServicePort 8333 127.0.0.1:8333

According to bitnodes.21.co your node is unreachable right now, so you probably haven't set it up correctly, but since you had one connection, it seemed to be working. The truth is that you will not get inbound connections that easily. It can take days to get 3-4. But you shouldn't concern yourself with that, only with the reachability of the node. It helps the network just by being a reliable option to connect to if someone needs it.

miguelmorales85
Hero Member
*****
Offline Offline

Activity: 547
Merit: 501


View Profile
October 21, 2017, 03:52:10 PM
 #26

I would like to ask your opinion about TOR enabled nodes.
Do you think it is worthy to enabled TOR in every one of our nodes?

I can see in bitnodes21.co the amount of TOR nodes in the network and it is not even then half. I'm considering my self to enable TOR network in mine.
Also, because I think it is better to enabled it to accept incoming connections rather than open the 8333 port on my router.

What are my odds of my privacy and security being compromised if I enable TOR network? I have read is not 100% fail safe.

If my ISP start sharing public my public IP with another clients I wont be able to open the 8333 port.

If anyone can send me links or publish here the pros and cons of enabling TOR network in my nodes you are welcome.

Thanks,

You came to the right place since I know a lot about Tor nodes. There are three types of nodes to choose from. But since you are worried about your ISP. It is better to turn your nodes into Entry node or a Middle node. No fuss. No mess. You don't have to worry about anything. But if want tips exit node is your choice. You will get bitcoin tips. Very rare but if you put your bitcoin address in the settings people will donate because only a few people are setting up exit nodes. But this one is messy because you are the exit node authorities will always target the nodes especially when your node was used to download copyrighted content. Since most authorities are ignorant about nodes. You will always have to explain that you are just a node. Through email. You are not doing anything illegal. That will be your  job if you are going to set up an exit node. Really messy. 

hello, that is such a nice information the one you are giving me. I would take a look deeper to the kind of TOR nodes available.

I don't mind setting an exit node if that would work as a help to others. I don't live in US so I guess I could be in gray territory (fingers crossed).

I follow this walkthrough to install my current TOR node:
https://medium.com/@lopp/how-to-run-bitcoin-as-a-tor-hidden-service-on-ubuntu-cff52d543756

At this moment my TOR node has been some kind of failure, only outgoing connections and sometimes just one incoming connections, no matter how many days the node is up or the netscore.

thanks again

You are talking about two different things. OP is not asking to run a Tor relay and help the Tor network, he is asking about running Bitcoin Core as a hidden service to help the Bitcoin network.

You are not running neither entry, middle nor exit relay. You are not running any kind of relay, you are just using a hidden service.

Your errors from the debug.log have nothing to do with inbound connections, they are all outbound, which you have plenty of.
Also that inbound connection was not yourself, but someone else, they all show 127.0.0.1 as that is only what your Bitcoin Core client can see. Remember that Tor hides IP addresses so it makes sense that you are not going to be able to tell apart the inbound connections to your node.

I suggest two things as someone who gets inbound Tor connections quickly when I start the node.

First, show us your configuration file here, move it somewhere and make a new one like this
Code:
proxy=127.0.0.1:9050
listen=1
bind=127.0.0.1
externalip=zmuzcuoflsycriya.onion

Also move somewhere all your data folder data that doesn't have anything to do with the blockchain or the wallet (blocks,chainstate and wallet.dat is all you need). You can keep the logs tho, they can still be useful.

Secondly, check your Tor configuration and set the hidden service manually if you haven't. Could you please say how you have setup the hidden service and all of that? What OS are you using? In torrc file you need to uncomment (remove the # character) the line where it says
Code:
#HiddenServiceDir /var/lib/tor/hidden_service/

Add the following line under that line

Code:
HiddenServicePort 8333 127.0.0.1:8333

According to bitnodes.21.co your node is unreachable right now, so you probably haven't set it up correctly, but since you had one connection, it seemed to be working. The truth is that you will not get inbound connections that easily. It can take days to get 3-4. But you shouldn't concern yourself with that, only with the reachability of the node. It helps the network just by being a reliable option to connect to if someone needs it.

Hello , you are right I have no TOR node. Nevertheless, I would like to set one but that is another history..

First of all you cannot see my node on bitnodes21.co because I have changed back to IPv6 (where I can only get just 8 outgoing connections)

I will turn back again to TOR mode.

This is the last part of my current configuration file. The other lines are all commented
Code:
# Enable pruning to reduce storage requirements by deleting old blocks.
# This mode is incompatible with -txindex and -rescan.
# 0 = default (no pruning).
# 1 = allows manual pruning via RPC.
# >=550 = target to stay under in MiB.
prune=1000

# User interface options

# Start Bitcoin minimized
#min=1

# Minimize to the system tray
#minimizetotray=1

proxy=127.0.0.1:9050
listen=1
bind=127.0.0.1
externalip=zmuzcuoflsycriya.onion

and this is what I have in my bitcoin folder. As you can see I am running a pruned node in a Raspberry Pi

Code:
pi@raspberrypi:~ $ ls -la .bitcoin/
total 19836
drwxr-xr-x 4 pi pi     4096 Oct 21 17:35 .
drwxr-xr-x 8 pi pi     4096 Oct 21 17:33 ..
-rw------- 1 pi pi       37 Sep 21 17:55 banlist.dat
-rw-r--r-- 1 pi pi     6131 Oct 21 17:35 bitcoin.conf
-rw------- 1 pi pi        4 Oct 20 08:22 bitcoind.pid
drwx------ 3 pi pi     4096 Oct 21 08:47 blocks
drwx------ 2 pi pi    69632 Oct 21 11:19 chainstate
-rw------- 1 pi pi       75 Oct 20 08:22 .cookie
-rw-r--r-- 1 pi pi        0 Sep 20 17:10 db.log
-rw------- 1 pi pi  2089402 Oct 21 17:35 debug.log
-rw------- 1 pi pi   247985 Oct 20 08:22 fee_estimates.dat
-rw------- 1 pi pi        0 Sep 20 17:10 .lock
-rw------- 1 pi pi 13545876 Oct 20 08:16 mempool.dat
-rw------- 1 pi pi      820 Oct 20 08:20 onion_private_key
-rw------- 1 pi pi  4305024 Oct 21 17:28 peers.dat

so you are suggesting to move everything but folders blocks and chainstate ?

wont that broke my node? I dont want to reindex it.

I have uncommented the lines from /etc/tor/torrc  and now it is like this:
Code:
############### This section is just for location-hidden services ###

## Once you have configured a hidden service, you can look at the
## contents of the file ".../hidden_service/hostname" for the address
## to tell people.
##
## HiddenServicePort x y:z says to redirect requests on port x to the
## address y:z.

HiddenServiceDir /var/lib/tor/hidden_service/
HiddenServicePort 8333 127.0.0.1:8333

#HiddenServiceDir /var/lib/tor/other_hidden_service/
#HiddenServicePort 80 127.0.0.1:80
#HiddenServicePort 22 127.0.0.1:22

At this moment my TOR node is reachable again Cheesy

thanks for your comments

Get the Tor node running on your network - isn't secure solution - it should be running in DMZ.

It is a bitcoin tor node, not a tor node. elaborate the security issue please
aleksej996
Sr. Member
****
Offline Offline

Activity: 322
Merit: 259


★777Coin.com★ Fun BTC Casino!


View Profile WWW
October 22, 2017, 09:47:45 AM
 #27

You created that hidden service with the Bitcoin Core option, I didn't do that. I assume everything is working fine with your node, it is just that it is hard to get inbound connections on the Tor network as there are not many users that use Tor compared to the clearnet, but they are there. Leave it running for few days and you might get few connections, either way, you are helping just by being there and you will be able to connect your light clients to that node over Tor.

With that torrc configuration you have another hidden service now, that points to your node. You could probably move that private key in the folder mentioned in that torrc configuration file and change the host name in that directory, but that could be risky.

So the point is this, I am pretty sure that your node works fine and you can just leave it like that. You can also uncomment that stuff in torrc if you don't want to tor domains. You can also read the hostname file in the /var/lib/tor/hidden_service/ to see the Tor domain you created if you want to use both of them. You are using Bitcoin Core's feature to create a Tor domain for you and if you like that, then you can keep doing that. You can alternatively take care of this yourself, if you wish, and make your own Tor domain and manage it as all other hidden services. You might even be able to keep the same onion address, but what ever you wish to do should be fine. Your hidden service private key is currently readable by the user pi, this is necessary as you run Bitcoin Core as that user and for security reasons you should never run programs as root when you don't have to. However, if you create your own hidden service, it's private key will only be readable by root, so it might be more secure.

As for the DMZ, it is all up for the discussion. If you trust that Bitcoin Core and Tor software are coded safely, which I would say is pretty good guess, then you should be fine. If you are scared that your node will get hacked just by having only it's 8333 port open on the hidden service, which means that either Tor or Bitcoin software has a vulnerability, then DMZ would isolate that node outside of your router's firewall and take away hacker's access to your LAN. However,m this would also put your node at higher risk as it would be outside of the firewall. So it is just focusing your security, not increasing it.

miguelmorales85
Hero Member
*****
Offline Offline

Activity: 547
Merit: 501


View Profile
October 27, 2017, 08:09:47 PM
 #28

Hello, it is me again with an update about my TOR node.
It seems bitnodes21.co detect it as down even when it is up BUT only with outgoing connections. The node has no incoming ones.
I have check my node in bitnodes21.co and it detects it as a node with open ports. I dont know what is happening. I will publish the last part of my debu.log file and the networkinfo result


Quote
2017-10-27 19:51:47 Socks5() connect to by3sufi775l75dch.onion:8333 failed: connection refused
2017-10-27 19:53:07 Socks5() connect to by3sufi775l75dch.onion:8333 failed: connection refused
2017-10-27 19:54:18 Socks5() connect to by3sufi775l75dch.onion:8333 failed: connection refused
2017-10-27 19:55:21 Socks5() connect to by3sufi775l75dch.onion:8333 failed: connection refused
2017-10-27 19:57:44 Socks5() connect to by3sufi775l75dch.onion:8333 failed: connection refused
2017-10-27 19:58:48 Socks5() connect to by3sufi775l75dch.onion:8333 failed: connection refused
2017-10-27 19:59:51 Socks5() connect to by3sufi775l75dch.onion:8333 failed: connection refused
2017-10-27 20:01:11 Socks5() connect to by3sufi775l75dch.onion:8333 failed: connection refused
2017-10-27 20:02:16 Socks5() connect to by3sufi775l75dch.onion:8333 failed: connection refused
2017-10-27 20:03:20 Socks5() connect to by3sufi775l75dch.onion:8333 failed: connection refused
2017-10-27 20:04:25 Socks5() connect to by3sufi775l75dch.onion:8333 failed: connection refused
2017-10-27 20:06:49 Socks5() connect to by3sufi775l75dch.onion:8333 failed: connection refused
2017-10-27 20:07:59 Socks5() connect to by3sufi775l75dch.onion:8333 failed: connection refused
2017-10-27 20:08:35 Socks5() connect to 2a02:2788:836:34b::1:8333 failed: general failure

Quote
{
  "version": 150001,
  "subversion": "/Satoshi:0.15.0.1/",
  "protocolversion": 70015,
  "localservices": "000000000000000c",
  "localrelay": true,
  "timeoffset": -1,
  "networkactive": true,
  "connections": 10,
  "networks": [
    {
      "name": "ipv4",
      "limited": false,
      "reachable": true,
      "proxy": "127.0.0.1:9050",
      "proxy_randomize_credentials": true
    },
    {
      "name": "ipv6",
      "limited": false,
      "reachable": true,
      "proxy": "127.0.0.1:9050",
      "proxy_randomize_credentials": true
    },
    {
      "name": "onion",
      "limited": false,
      "reachable": true,
      "proxy": "127.0.0.1:9050",
      "proxy_randomize_credentials": true
    }
  ],
  "relayfee": 0.00001000,
  "incrementalfee": 0.00001000,
  "localaddresses": [
    {
      "address": "zmuzcuoflsycriya.onion",
      "port": 8333,
      "score": 679
    }
  ],
  "warnings": ""
}

Hope someone can help me
aleksej996
Sr. Member
****
Offline Offline

Activity: 322
Merit: 259


★777Coin.com★ Fun BTC Casino!


View Profile WWW
October 28, 2017, 12:40:46 PM
 #29

Are you getting any outgoing connections through Tor? Would you check if your tor is running first? You simply maybe forgot to turn it on or restart in after changing the configuration files.

miguelmorales85
Hero Member
*****
Offline Offline

Activity: 547
Merit: 501


View Profile
October 28, 2017, 05:05:20 PM
 #30

Are you getting any outgoing connections through Tor? Would you check if your tor is running first? You simply maybe forgot to turn it on or restart in after changing the configuration files.

Hi, yes the node is getting outgoing connections. With time it got a incoming connection so is UP again in bitnodes21.co

this is the result of current getnetworkinfo
Quote
pi@raspberrypi:~ $ bitcoin-cli getnetworkinfo
{
  "version": 150001,
  "subversion": "/Satoshi:0.15.0.1/",
  "protocolversion": 70015,
  "localservices": "000000000000000c",
  "localrelay": true,
  "timeoffset": -1,
  "networkactive": true,
  "connections": 11,
  "networks": [
    {
      "name": "ipv4",
      "limited": false,
      "reachable": true,
      "proxy": "127.0.0.1:9050",
      "proxy_randomize_credentials": true
    },
    {
      "name": "ipv6",
      "limited": false,
      "reachable": true,
      "proxy": "127.0.0.1:9050",
      "proxy_randomize_credentials": true
    },
    {
      "name": "onion",
      "limited": false,
      "reachable": true,
      "proxy": "127.0.0.1:9050",
      "proxy_randomize_credentials": true
    }
  ],
  "relayfee": 0.00001000,
  "incrementalfee": 0.00001000,
  "localaddresses": [
    {
      "address": "zmuzcuoflsycriya.onion",
      "port": 8333,
      "score": 895
    }
  ],
  "warnings": ""
}

It just wont have anymore than 1 incoming connection..
so frustrating.  Cry
N1C39UY
Newbie
*
Offline Offline

Activity: 22
Merit: 0


View Profile
October 28, 2017, 06:42:39 PM
 #31

they should fuse tor and bitcoin/litecoin, so every miner (or even every wallet) is a tor node and all transactions pass trough the node for very good privacy. the government will try everything to compromise the anonimity of bitcoin and litecoin users, so the developers should do everything they can to prevent it and keep transactions private. If for some reason transactions would be able to be tracked by the government this would be kind of a disaster for crypto.
aleksej996
Sr. Member
****
Offline Offline

Activity: 322
Merit: 259


★777Coin.com★ Fun BTC Casino!


View Profile WWW
October 29, 2017, 06:27:18 PM
 #32

OP be patient. It might just be that it takes some time. It should be better in couple of days if it runs 24h a day.

they should fuse tor and bitcoin/litecoin, so every miner (or even every wallet) is a tor node and all transactions pass trough the node for very good privacy. the government will try everything to compromise the anonimity of bitcoin and litecoin users, so the developers should do everything they can to prevent it and keep transactions private. If for some reason transactions would be able to be tracked by the government this would be kind of a disaster for crypto.

Bitcoin Core is already built with Tor in mind and is very easy to run it over Tor, as you can see in OP's network status Bitcoin Core knows about hidden services and all that. The thing about forcing all the connections through Tor is that it takes more effort to make sure that you can bypass Tor blockades imposed by some countries in the world (China and Turkey are some examples).

N1C39UY
Newbie
*
Offline Offline

Activity: 22
Merit: 0


View Profile
October 30, 2017, 01:14:17 PM
 #33

Hmm well you've got a point there, i'm really curious what will end up happening to crypto's :p we've got a bright future ahead.
amishmanish
Sr. Member
****
Offline Offline

Activity: 294
Merit: 264


Take Responsibility, Build Things, Be Kind & Share


View Profile
October 30, 2017, 04:02:26 PM
 #34

Nothing is 100%, but Tor is the best way to anonymously run a node. The other benefit is, as you said, that you don't need to forward posts. Anonymity also brings a bit of security as well, since no one will know your IP.

The only real downside of using Tor is bandwith speeds, that are maybe a half or a third of the direct connection on average, but since Bitcoin really doesn't require much bandwith, unless it is doing an initial sync, then it isn't even noticeable.

I would suggest you enable Tor, you don't really lose anything and you gain more nodes.


It's very noticeable when you run a node under Tor and try to sync the network, it becomes too slow to download sometimes, but it's not the end of world, it's still reasonable to download the entire chain with Tor.

But if it's really a problem, I guess a solution is to download the entire chain under your normal connection at high speeds. Once you have your node synced, close it, then open the Tor Browser, then open your node again and now you can do transactions under Tor. I think that would do.

Is using TOR to anonymize yourself as simple as opening the TOR browser and then opening the node??!! Why then do we have these TOR-integrated coins??!! Like Novacoin used to be, now DeepOnion.
Though DeepOnion has come up with a lot of other tweaks and additions too.

██████
██
██
██
██
██
██
██
██

██
██

██
██████
.
///Augment Your Portfolio
██████
██
██
██
██
██
██
██
██

██
██

██
██████
████  ████
████  ████
████  ████
████  ████
████  ████
████  ████
████  ████
████  ████
████  ████
████  ████
████  ████
████  ████
████  ████
       ▄▄█████████▄▄
     ▄█▀▀▀       ▀▀▀█▄
   ▄▀                 ▀▄
  █       ▄▄▄▄▄▄▄       █
 █    ▄▀▀▀▄▄▄▄▄▄▄▀▀▀▄    █
▐▌  ▄▀▄▀▀▀       ▀▀▀▄▀▄  ▐▌
█  ▐▌█ ▐█▌       ▐█▌ █▐▌  █
▐▌ █▐▌ ███  ▄▄▄  ███ ▐▌█ ▐▌
▐█ ▐▌█  ▀    ▀    ▀  █▐▌ █▌
███ ▀▄▀▄▄▄       ▄▄▄▀▄▀ ███
██▀█▄ ▀▄▄▄▀▀▀▀▀▀▀▄▄▄▀ ▄█▀██
▀    ▀█▄▄▄▀▀▀▀▀▀▀▄▄▄█▀    ▀
       ▀▀█████████▀▀
Vivid

████  ████
████  ████
████  ████
████  ████
████  ████
████  ████
████  ████
████  ████
████  ████
████  ████
████  ████
████  ████
████  ████
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬   WHITEPAPER  ● ● ●
FACEBOOK  TWITTER  DISCORD  REDDIT  TELEGRAM  BOUNTY
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬   ANN THREAD  ● ● ●
miguelmorales85
Hero Member
*****
Offline Offline

Activity: 547
Merit: 501


View Profile
November 04, 2017, 11:32:20 AM
 #35

Hi all, I am sorry to say this but I will take down my TOR Raspnode. I dont see any incoming connection so that bothers me. It has always error connecting Socks5()
So I decided to disable TOR network compatibility and move to a regular pruned node.

peace
Pages: 1 2 [All]
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!