Skip to content

Conversation

Saibato
Copy link
Contributor

@Saibato Saibato commented Oct 6, 2020

This is striped from #19358 to reflect the current behavior and
implications of the Tor implementation in core.

Craft a more elaborate description of what those options in regards to
tor or network traffic do.
Some wording is picked from laanwj review in # 19358.

-onion=ip:port Set the proxy server to use for Tor onion services. You do not
need to set this if it's the same as -proxy. You can use -noonion
need to set this if it's the same as -proxy. You can use -onion=0
to explicitly disable access to onion services.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

why changing from -noonion here?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

hmm, i must check my logs what -noonion did in comparison to -onion=0 its probably a tautology with the same effect.or there was an edge issue i forgot. I will check.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@gmaxwell tyi; the diff was the log line
Command-line arg: onion=false if -nonion
vs Command-line arg: onion="0" if -onion=0 .

So since we compare in code like this

if (onionArg == "0") { // Handle -noonion/-onion=0

I was wary that some compiler might not set onionArg to "0"; if
m_settings.command_line_options == false instead of "0"

I might be over cautious here?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Arguments all uniformly support nofoo and foo=0 as being equivalent.

to explicitly disable access to onion services.
Note: Only the -proxy option will set the proxy used for DNS requests.
With this option these will not route over Tor.
So please use -proxy if you have privacy concerns with this.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This seems out of place. If no proxy is set then all traffic, except traffic going to hidden services, is in the clear. This edit makes it sound otherwise.

Copy link
Contributor Author

@Saibato Saibato Oct 8, 2020

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Its more about Tor options doc than anything else, please hint wording alternatives..

Please note we try to highlight here that -onion in contrast to -proxy sets no name proxy and also up till now the default Tor proxy that would be created in torcontrol is also a leaking ip over DNS ip4/6 calls and will probably leak the onion when seeding at first start.

The internal nameproxy to try to route all allowed traffic over Tor is only used if -proxy is defined.

edit@saibato Most might just want to get as connected as possible and might not care much, but since more and more use there full node to gain privacy, i thought we should highlight those config implications a bit more.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm having a hard time following you. Onion related requests are not leaked when you set -onion.

Onion outbound connections will be enabled when you use the -proxy
or the -onion option.
Please use -noonion or -onion=0 if you want to be sure to have no
outbound onion connections over the default proxy or your defined proxy..

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

"set of general allowed network types" seems wordy and doesn't appear to add anything over the original text.

If onlynet=ipv4 still makes onion connections, that sounds like a bug to me. Is there any discussion about this?

Copy link
Contributor Author

@Saibato Saibato Oct 8, 2020

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

thx!. A bug , yup and the bug has ̶e̶v̶e̶n̶ ̶d̶e̶e̶p̶e̶r̶ onions and layers of head scratching, some fix in #19358 sarcastic hacker style ;-) review more than welcome.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@Saibato your use of double tilde for mdash (I think that's what you mean?) makes it look like you strike out your own words, which I don't think you intended.

Copy link
Contributor Author

@Saibato Saibato Oct 13, 2020

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@ysangkok

I don't think you intended

;-) like it, that u noticed. 👍 was a try to high light without adjectives, while not saying even more harsh words about what happened all those years (was kind of a privacy strike through), since overall slow reaction and some disbelieve, my say it nice clock has almost reached zero

@laanwj
Copy link
Member

laanwj commented Oct 16, 2020

Even when changing documentation, please make targeted changes and motivate clearly why you make every change. Don't just change lines all over the document with a two-line PR message and the only information to "reflect the current status of Tor support". No one can follow you here.

I'm closing this.

@laanwj laanwj closed this Oct 16, 2020
@Saibato
Copy link
Contributor Author

Saibato commented Oct 16, 2020

@laanwj this PR was to highlight this issue itself and to have some discussion, we had that and now its clear where positions on this are and what the next steps will be, thx for review and your insight and engagement, Its not your fault, but i guess u now better prepared for the waves and deeper discussions. we all make mistakes and i guess your effort to fix them is an outstanding example how to do such things, with a wink and smile.

@bitcoin bitcoin locked as resolved and limited conversation to collaborators Feb 15, 2022
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants