Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

Already on GitHub? Sign in to your account

Add instructions for Running a Full Node as a Tor Hidden Service #1712

Open
wbnns opened this Issue Jul 28, 2017 · 1 comment

Comments

Projects
None yet
2 participants
Contributor

wbnns commented Jul 28, 2017 edited

Bounty: 28,000 bits / ~$100 USD

It could benefit users if we had helpful step-by-step instructions describing how to run a full node as a Tor hidden service on the Running a Full Node page. Here are some resources to help get started:

Contributor

theymos commented Jul 28, 2017 edited

Note that I recently discovered that while method 2 on the wiki more-or-less works, Bitcoin Core's behavior was seemingly changed in more recent versions to not send addr messages for the hidden service component when connected to both Tor and the Internet. With the settings described on the wiki, it used to randomly send the hidden service ~75% of the time when doing addr messages, and your IP address ~25% of the time due to various interactions in the discovery/broadcast system. Maybe there's some setting that needs to be changed to fix this; I haven't looked into it much yet.

@wbnns wbnns self-assigned this Jul 28, 2017

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment