Bitcoin Forum
February 29, 2020, 08:01:19 AM *
News: Latest Bitcoin Core release: 0.19.0.1 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Tor Node issues  (Read 74 times)
calkob
Hero Member
*****
Offline Offline

Activity: 924
Merit: 507


View Profile
February 07, 2020, 07:24:41 AM
Merited by hugeblack (2), ETFbitcoin (1)
 #1

Hi

quick question, obviously a Tor node can have incoming connections,  so how does an inbound node find my node? (ie: ip address)

1582963279
Hero Member
*
Offline Offline

Posts: 1582963279

View Profile Personal Message (Offline)

Ignore
1582963279
Reply with quote  #2

1582963279
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
DaveF
Legendary
*
Offline Offline

Activity: 1946
Merit: 1067


DAVID CHAUM's xx coin SALE IS NOW LIVE!


View Profile WWW
February 07, 2020, 04:06:00 PM
 #2

Here you go:
https://en.bitcoin.it/wiki/Setting_up_a_Tor_hidden_service

There are a few people on the forum who have done it, you can probably ping out to them for help too.
How much experience do you have with Tor in general?

-Dave



███████                   
                      ██████████                        ██       
                       ████████████                  ███       
                                ██████████           █████       
                                        ███████      ██████         
██████                  ███████     ████
████████                ██████     ██   
██████████        ████████           
███████████    █████████           
████████    ████████
   
      ███████    ████████       
              ██████    █████████████ 
          █████████      ███████████ 
      ███████████          █████████ 
██████████████                       
████████████████                       
███████      ████████████           
██████        ████████████           
████                ██████████           

xx-coin.io

█▀▀▀











█▄▄▄

▀▀▀█











▄▄▄█

█▀▀▀











█▄▄▄
 
████
██████
█████████
█████████████
████████████████
████████████████████
████████████████████████
███████████████████████
████████████g█████████
██████████g███████
████████g██████
██████g██████
██████████
██████
███


                 ████
                ████
                ▀▀
     ,▄▄▄▄▄▄      ▄▄▄▄▄▄
   o████████▄██▄████████
  ████████████████████
 d███████████████████
,███████████████████
`███████████████████
 ████████████████████
 █████████████████████
  ████████████████████████
   ██████████████████████
    ████████████████████
     `████▀▀  ▀▀██████

▀▀▀█











▄▄▄█
ETFbitcoin
Legendary
*
Offline Offline

Activity: 1932
Merit: 2212

Use SegWit and enjoy lower fees.


View Profile WWW
February 07, 2020, 06:28:47 PM
 #3

DNS Seed is the answer. AFAIK all nodes store and share list of peers (even if they're not DNS Seed), so eventually your .onion (hidden service) domain eventually will be known to more nodes, CMIIW.

jackg
Copper Member
Legendary
*
Offline Offline

Activity: 1666
Merit: 1570


https://bit.ly/387FXHi ← lightning theory


View Profile
February 08, 2020, 01:06:55 AM
Merited by hugeblack (2), Heisenberg_Hunter (1)
 #4

The essentials on any node finding (clearnet or tor):
1. When you start your node for the first time, it comes with a list of trusted nodes that are expected to be run (there are also separate services to set this yourself if it doesn't happen).
2. You send this node your IP and tell it you are a node on the network
3. I think it generally starts trying to send you blocks but will also give you a tip of 'peers' which is a list of addresses you can use in order to access the network. It can send anywhere from 1 to 1000 peers for you to try to connect to (under normal rules).



For the tor stuff (Tor is The Onion Route, it's onion routing).

What occurs in onion routing is you get the same names as before but instead of IPs, you're getting the dot onion names.
With onion routing, you send encrypted packets. If you want to communicate with someone, you have the first node tell you it can get a connection through to the second node (and the rest of the nodes do the same after that) and you then send an encrypted packet with all of their keys.
If you're using TOR and tor hidden service as a website, your packet takes 6 hops (or it used to).

Your original data is encrypted ~6 times between you and the final destination, no one along the route can read what you're sending unless you own half of the hops and then you can work out who you're communicating with still.

Pages: [1]
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!