-
Notifications
You must be signed in to change notification settings - Fork 37.7k
doc: tor.md and -onlynet help updates #20757
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
The following sections might be updated with supplementary metadata relevant to reviewers and maintainers. ConflictsReviewers, this pull request conflicts with the following ones:
If you consider this pull request important, please also help to review the conflicting pull requests. Ideally, start with the one that should be merged first. |
Seem ok to me |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Some edits to last commit
8d6197d
to
316ecd0
Compare
Thank you @Rspigler and @Saibato for the excellent feedback. Updated to hopefully address your suggestions. Would you please have another look? Here are all of the changes (last commit only):
|
I definitely like the direction we're heading in. But I have some questions from further testing I did: We use Also, I tried running |
🕵️ @harding has been requested to review this pull request as specified in the REVIEWERS file. |
Couple of things that I wanted to discuss and I don't think there will be a better place because its related to Bitcoin Core and Tor:
I tried asking on Twitter but there was no response: https://twitter.com/prayankgahlot/status/1305919047398162434 |
A couple of suggestions @prayank23.
However, the above is not helping this doc PR get merged. Core is not going to maintain a fork of Tor. That would be horrendous scope creep. We all have a motivation to improve documentation (Tor or otherwise). Feel free to open specific PRs to improve documentation. Some changes may not get review interest and some changes won't get merged. Again something you are going to have to get used to on open source projects. |
I have tried both IRC and Stackexchange. They work better for few things and sometimes the worst place to look for any help or discuss something. Your opinion on other things are irrelevant for discussion related to this PR.
Yes I have done that for several things and sometimes even tried tagging people here on important issues/PR. Sometimes it works or maybe works for some people who are more open to contribution and humble.
Point 1 is about improving docs and few suggestions. Point 2 is about getting opinion on a blog which highlights issues with Tor This PR is about Tor docs
Okay
Cool. I understand the things but we can always do better to improve things and go out of the box. |
@prayank23 It's difficult to successfully propose changes to |
@jonatack ACK on changes proposed in this PR I have suggested two additions in "Privacy" section: 1. Use Tor and Tor bridges according to user environment 2. Renewal of onion address I think I will open a new PR for it and discussion on other topics will only happen if people think they are important (irrespective of platform used for discussion) for improving privacy in Bitcoin Core. Thanks for sharing the tweet link. |
316ecd0
to
2bfc81b
Compare
Thanks for the feedback. I dropped the confusing parts at the end; updated the last commit per @Rspigler, @Saibato, @michaelfolkson, @prayank23, @RiccardoMasutti -- would you please have a look and comment, or ACK if the changes look good to you? |
Improve the description of what these options do with regards to tor or network traffic. Some of the wording is from a laanwj review in PR 19358.
Linter error seems unrelated:
|
ACK 2bfc81b |
ACK 2bfc81b I haven't tested but read through and looks good. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
crACK 2bfc81b
than onion you *cannot* disable onion connections; outgoing onion | ||
connections will be enabled when you use -proxy or -onion. Use | ||
-noonion or -onion=0 if you want to be sure there are no outbound | ||
onion connections over the default proxy or your defined -proxy. | ||
|
||
In a typical situation, this suffices to run behind a Tor proxy: | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think section 2 can be removed? There should be no package manager out there that ships tor 0.2.7. Even xenial has it: https://packages.ubuntu.com/xenial/tor
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Good point. The manual config section still seems useful (if I understand correctly) but updated it and moved it after the automatic config section in 193f9a9.
2bfc81b
to
193f9a9
Compare
Suggest viewing the last commit with |
ACK 193f9a9 |
ACK 193f9a9 Tested with below bitcoin.conf to automatically create bitcoin core onion service: testnet=1 listen=1 onlynet=onion torcontrol=127.0.0.1:9151 debug=tor Result for "localaddresses": [ { "address": "d2hsogah4kb5tswzy234xe6vnfw2qtj3ho26mf7yrmytp5vcryltreqd.onion", "port": 18333, "score": 4 } ] DNS requests thing mentioned in dfc4ce1 looks interesting although I couldn't find a way to test it and see the requests in Wireshark. Maybe the only thing which can make DNS requests while using Bitcoin Core is during IBD? |
Believe me, you have no idea what you're suggesting here. A lot of resources go into development of Tor, and the Tor project has its own struggle to fight differently from the one bitcoin is, I think it would be an extremely bad idea to combine those. For example they have people dedicated to finding ways to circumvent internet censorship of regimes like China's, playing cat and mouse games. Of course you are welcome to get involved in Tor's development, it being an open source project. A much more realistic strategy that we have been pursuing with BIP155 addrv2 is to diversify potential overlay (and mesh) networks that can be used. For example #20685 adds working I2P support. |
I was not sure and was thinking of solutions to decrease the dependency on Tor for privacy in Bitcoin. Looking for opinions from people who know better than me.
I will try.
Sounds good :) |
Summary: This is a backport of [[bitcoin/bitcoin#20757 | core#20757]] [1/2] bitcoin/bitcoin@784a278 Test Plan: `ninja && src/bitcoind -help` Reviewers: #bitcoin_abc, Fabien Reviewed By: #bitcoin_abc, Fabien Differential Revision: https://reviews.bitcoinabc.org/D11030
Summary: core#20757: > doc: update -proxy, -onion and -onlynet info in tor.md > > Improve the description of what these options do with regards to > tor or network traffic. > doc: update/improve automatic tor section of tor.md > doc: update tor.md manual config, move after automatic config core#20587: > [doc] Tidy up Tor doc (more stringent) This is a backport of [[bitcoin/bitcoin#20757 | core#20757]] [2/2] (all the tor.md changes from that PR) and [[bitcoin/bitcoin#20587 | core#20587]] Depends on D11031 Test Plan: proofreading Reviewers: #bitcoin_abc, Fabien Reviewed By: #bitcoin_abc, Fabien Subscribers: Fabien Differential Revision: https://reviews.bitcoinabc.org/D11032
This continues the tor documentation and help improvements of #19961 and clarifies issues that contributors have been mentioning and noticing, like in #20555 (comment).
More info: