Bulwark Update!Have added ten(!) full bulwark TOR nodes. In addition to providing an onion-only network for bulwark, these ten nodes are also ten mode nodes strengthening the TOR network.
bulwarkwonkzwrej.onion:989 | bulwark75xzrzrxi.onion:989 | bulwarkkaoobpxep.onion:989 | bulwarkiuj3zzcsm.onion:989 | bulwark4ikozi2oy.onion:989 | bulwarkigpmgxqem.onion:989 | bulwarkaehtph3bz.onion:989 | [RUSSIA]bulwarkp6cl6bmgn.onion:989 | [RUSSIA]bulwarkinjcdwz7o.onion:989 | [RUSSIA]bulwarkqjzowfyqc.onion:989
Links
--------------------
https://torproject.org/projects/torbrowser.html (TOR Browser bundle)
https://www.torproject.org/docs/faq.html.en (TOR FAQ)
https://www.torproject.org/docs/debian.html.en (TOR Debian/Ubuntu Guide)
bulwark.conf example (TOR only)
--------------------
rpcuser=foo # changeme
rpcpassword=bar # changeme
rpcallowip=127.0.0.1
onion=127.0.0.1:9050 # Assuming your TOR proxy is running on default port
#onlynet=tor # Only connect to .onion nodes and drop IPv4/6 connections. Uncomment if you want this option, but be aware until our onion network is more robust this might lead to sync issues.
listen=0 # We don't open a port locally, unless we're creating an onion full node or onion masternode
discover=0 # 0=Do not run ipv4/ipv6 stack.
# 1=Run full ipv4/ipv6 stack as well as tor stack (exposing your ipv4/ipv6 address to the network)
# Keep in mind with traffic analysis, enabling dual stack will allow someone to discover and link your clearnet IP to your onion address
# If we use 1 here, it's possible that traffic analysis
addnode=bulwarkwonkzwrej.onion:989
addnode=bulwark75xzrzrxi.onion:989
addnode=bulwarkkaoobpxep.onion:989
addnode=bulwarkiuj3zzcsm.onion:989
addnode=bulwark4ikozi2oy.onion:989
addnode=bulwarkigpmgxqem.onion:989
addnode=bulwarkaehtph3bz.onion:989
addnode=bulwarkp6cl6bmgn.onion:989
addnode=bulwarkinjcdwz7o.onion:989
addnode=bulwarkqjzowfyqc.onion:989
Create a hidden service to run full Bulwark/TOR node or to anonymize your IP for your masternode
--------------------
Add to /etc/tor/torrc
ClientOnly 1
SOCKSPort 9050
SOCKSPolicy accept 127.0.0.1/8
Log notice file /var/log/tor/notices.log
ControlPort 9051
HiddenServiceDir /var/lib/tor/bulwark/
HiddenServicePort 52543 127.0.0.1:52543
HiddenServiceStatistics 0
ORPort 9001
LongLivedPorts 52543
ExitPolicy reject *:*
DisableDebuggerAttachment 0
NumEntryGuards 8
tor only bulwark masternode/fullnode - no ipv4/ipv6 stack. (bulwark.conf)
--------------------
rpcuser=foo # changeme
rpcpassword=bar # changeme
rpcallowip=127.0.0.1
onion=127.0.0.1:9050 # Assuming your TOR proxy is running on default port
#onlynet=tor # Only connect to .onion nodes and drop IPv4/6 connections. Uncomment if you want this option, but be aware until our onion network is more robust this might lead to sync issues.
listen=1 # We listen.
bind=127.0.0.1 # Since we're using hidden service, we don't need to be net reachable
discover=0 # 0=Do not run ipv4/ipv6 stack.
# 1=Run full ipv4/ipv6 stack as well as tor stack (exposing your ipv4/ipv6 address to the network)
# Keep in mind with traffic analysis, enabling dual stack will allow someone to discover and link your clearnet IP to your onion address
# If we use 1 here, it's possible that traffic analysis
daemon=1 # Run daemonized
###### Masternode configuration
#masternode=1 # Uncomment if you're running a masternode
#masternodeprivkey=yourkey
#masternodeaddress=
:52543
addnode=bulwarkwonkzwrej.onion:989
addnode=bulwark75xzrzrxi.onion:989
addnode=bulwarkkaoobpxep.onion:989
addnode=bulwarkiuj3zzcsm.onion:989
addnode=bulwark4ikozi2oy.onion:989
addnode=bulwarkigpmgxqem.onion:989
addnode=bulwarkaehtph3bz.onion:989
addnode=bulwarkp6cl6bmgn.onion:989
addnode=bulwarkinjcdwz7o.onion:989
addnode=bulwarkqjzowfyqc.onion:989