|
|
@ -87,3 +87,20 @@ If you only want to use Tor to reach onion addresses, but not use it as a proxy |
|
|
|
for normal IPv4/IPv6 communication, use: |
|
|
|
for normal IPv4/IPv6 communication, use: |
|
|
|
|
|
|
|
|
|
|
|
./bitcoin -onion=127.0.0.1:9050 -externalip=57qr3yd1nyntf5k.onion -discover |
|
|
|
./bitcoin -onion=127.0.0.1:9050 -externalip=57qr3yd1nyntf5k.onion -discover |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3. Automatically listen on Tor |
|
|
|
|
|
|
|
-------------------------------- |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Starting with Tor version 0.2.7.1 it is possible, through Tor's control socket |
|
|
|
|
|
|
|
API, to create and destroy 'ephemeral' hidden services programmatically. |
|
|
|
|
|
|
|
Bitcoin Core has been updated to make use of this. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
This means that if Tor is running (and proper authorization is available), |
|
|
|
|
|
|
|
Bitcoin Core automatically creates a hidden service to listen on, without |
|
|
|
|
|
|
|
manual configuration. This will positively affect the number of available |
|
|
|
|
|
|
|
.onion nodes. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
This new feature is enabled by default if Bitcoin Core is listening, and |
|
|
|
|
|
|
|
a connection to Tor can be made. It can be configured with the `-listenonion`, |
|
|
|
|
|
|
|
`-torcontrol` and `-torpassword` settings. To show verbose debugging |
|
|
|
|
|
|
|
information, pass `-debug=tor`. |
|
|
|