Pages:
Author

Topic: TOR Nodes - page 2. (Read 2729 times)

hero member
Activity: 544
Merit: 507
October 13, 2017, 03:58:27 PM
#15
Hello all, thank for your comments. Just a quick update: I dont know if it is because I have a IPv6 or a TOR enabled service but my node just got 1 incoming connection. it gets stuck at 9 connections.
I wonder If there is something I could do.
If having a TOR node is the right path to have a incoming connection enabled node but only permit ONE connection then I think I would rather have a regular node.
The log keeps showing this:

Quote
2017-10-13 19:38:59 connect() to 79.10.132.141:8333 failed after select(): Connection refused (111)
2017-10-13 19:41:16 connect() to 72.48.98.106:8333 failed after select(): Connection refused (111)
2017-10-13 19:41:58 connect() to 217.33.94.163:8333 failed after select(): Connection refused (111)

Don't worry, that is all normal. It is hard to get incoming connections, but eventually they do increase. If you got one, and it is not from some local app and is indeed from Tor, then you should get more then one as well, as time goes by. Look at that incoming connection and if it says "via .onion", and you didn't do it yourself, then there is no reason that others won't connect as well. Just make sure to setup "externalip .onion" in bitcoin.conf so you can advertise your onion to the network.

Those failed connections in the log might be outgoing connections (to my understanding your node isn't reachable through IPv4 and only with the hidden service, so it must be, since it wouldn't report IP addresses otherwise). Some nodes just might not like Tor nodes or are more likely just failing due to Tor being a bit slower and less reliable then a direct connection, but you still offer bigger anonymity to the network and as you can see you still get 8 outgoing connections, so it is worth it.

I checked using getpeerinfo and the only incoming connection is though IPv6. I guess I will wait for more. Thank you for your comment.
I wonder if the incoming connections would be more if I create a whitelist with the most stable nodes from bitcoin21.co

Have anyone tried that?
sr. member
Activity: 490
Merit: 389
Do not trust the government
October 13, 2017, 03:41:10 PM
#14
Hello all, thank for your comments. Just a quick update: I dont know if it is because I have a IPv6 or a TOR enabled service but my node just got 1 incoming connection. it gets stuck at 9 connections.
I wonder If there is something I could do.
If having a TOR node is the right path to have a incoming connection enabled node but only permit ONE connection then I think I would rather have a regular node.
The log keeps showing this:

Quote
2017-10-13 19:38:59 connect() to 79.10.132.141:8333 failed after select(): Connection refused (111)
2017-10-13 19:41:16 connect() to 72.48.98.106:8333 failed after select(): Connection refused (111)
2017-10-13 19:41:58 connect() to 217.33.94.163:8333 failed after select(): Connection refused (111)

Don't worry, that is all normal. It is hard to get incoming connections, but eventually they do increase. If you got one, and it is not from some local app and is indeed from Tor, then you should get more then one as well, as time goes by. Look at that incoming connection and if it says "via .onion", and you didn't do it yourself, then there is no reason that others won't connect as well. Just make sure to setup "externalip .onion" in bitcoin.conf so you can advertise your onion to the network.

Those failed connections in the log might be outgoing connections (to my understanding your node isn't reachable through IPv4 and only with the hidden service, so it must be, since it wouldn't report IP addresses otherwise). Some nodes just might not like Tor nodes or are more likely just failing due to Tor being a bit slower and less reliable then a direct connection, but you still offer bigger anonymity to the network and as you can see you still get 8 outgoing connections, so it is worth it.
hero member
Activity: 544
Merit: 507
October 13, 2017, 02:50:24 PM
#13
Hello all, thank for your comments. Just a quick update: I dont know if it is because I have a IPv6 or a TOR enabled service but my node just got 1 incoming connection. it gets stuck at 9 connections.
I wonder If there is something I could do.
If having a TOR node is the right path to have a incoming connection enabled node but only permit ONE connection then I think I would rather have a regular node.
The log keeps showing this:

Quote
2017-10-13 19:38:59 connect() to 79.10.132.141:8333 failed after select(): Connection refused (111)
2017-10-13 19:41:16 connect() to 72.48.98.106:8333 failed after select(): Connection refused (111)
2017-10-13 19:41:58 connect() to 217.33.94.163:8333 failed after select(): Connection refused (111)
sr. member
Activity: 572
Merit: 250
October 13, 2017, 12:56:45 AM
#12
Perhaps embedded into a client, but there is not that much benefit to it. The governments have dropped trying to do things like ban the cryptos, but that is not really giving up on their part. It appears that they give up and in reality they would rather watch the network and the chains.

A node is not something that needs to be hidden unless there is something that node is doing that differs from the common node. That would be something for a new coin and that is something that they will have to consider.
hero member
Activity: 544
Merit: 507
October 05, 2017, 04:03:11 PM
#11
Tor enabled nodes are not 100% fool proof. A lot of the Tor exit nodes are run by the NSA and snooping is done on all of

them. I think 100% anonymity is a myth and even private VPN's can be honey traps. You have a better chance when you

enable Tor, but you should never feel satisfied that your traffic are not being tracked by these agencies. If you do nothing

illegal, they will most probably leave you alone. {running a Bitcoin node is not illegal in most countries}  Grin

You are right about it not being 100% fool proof, but when you run a hidden service neither you nor the other party ever uses an exit node, Tor is very very good when the traffic doesn't leave the Tor network, it is just harder to make a connection to the clear net securely, since there are bigger costs in running an exit node, so most legit users don't run them. But this still doesn't mean that they monitor ALL the exit nodes, you have to remember that these are nodes all across the world, in Russia, Switzerland,...There is no clear evidence that they can really monitor these ones in the other countries.

Even if the NSA is monitoring ALL nodes in the United States, they can also monitor nodes in "ALLIED" contries, or in countries when they infiltrate the companies (ISP) to install their malware or modified hardware. I agree with you that there must be few countries that are not infected by that cancer.. what a shame in this modern times..  Angry
sr. member
Activity: 490
Merit: 389
Do not trust the government
October 05, 2017, 03:35:59 PM
#10
Tor enabled nodes are not 100% fool proof. A lot of the Tor exit nodes are run by the NSA and snooping is done on all of

them. I think 100% anonymity is a myth and even private VPN's can be honey traps. You have a better chance when you

enable Tor, but you should never feel satisfied that your traffic are not being tracked by these agencies. If you do nothing

illegal, they will most probably leave you alone. {running a Bitcoin node is not illegal in most countries}  Grin

You are right about it not being 100% fool proof, but when you run a hidden service neither you nor the other party ever uses an exit node, Tor is very very good when the traffic doesn't leave the Tor network, it is just harder to make a connection to the clear net securely, since there are bigger costs in running an exit node, so most legit users don't run them. But this still doesn't mean that they monitor ALL the exit nodes, you have to remember that these are nodes all across the world, in Russia, Switzerland,...There is no clear evidence that they can really monitor these ones in the other countries.
legendary
Activity: 1904
Merit: 1074
October 05, 2017, 10:36:43 AM
#9
Tor enabled nodes are not 100% fool proof. A lot of the Tor exit nodes are run by the NSA and snooping is done on all of

them. I think 100% anonymity is a myth and even private VPN's can be honey traps. You have a better chance when you

enable Tor, but you should never feel satisfied that your traffic are not being tracked by these agencies. If you do nothing

illegal, they will most probably leave you alone. {running a Bitcoin node is not illegal in most countries}  Grin
hero member
Activity: 544
Merit: 507
October 04, 2017, 03:06:23 PM
#8
Do you have reason to turn them on? There is no way that anyone is going to steal from you that way, but there is no reason to turn them on if not needed either. Just because the new car comes with a few toys does not mean you have to use them all in one day. There are aspects that you will never touch in there. And the only way that people get stolen from is out right wrong actions.

Do you recommend to turn the TOR nodes on only if I'm going to need them?
I think the only purpose of a node is not to self use but to contribute to the network and let others use them too, also another few things about the blockchain that have been previously discussed in other posts.

I just want to help with TOR nodes, I dont fear police knocking on my door. I am not in north America (HELLO NSA)
sr. member
Activity: 322
Merit: 253
Property1of1OU
October 04, 2017, 02:55:42 PM
#7
hero member
Activity: 798
Merit: 500
October 04, 2017, 12:21:32 PM
#6
Do you have reason to turn them on? There is no way that anyone is going to steal from you that way, but there is no reason to turn them on if not needed either. Just because the new car comes with a few toys does not mean you have to use them all in one day. There are aspects that you will never touch in there. And the only way that people get stolen from is out right wrong actions.
sr. member
Activity: 490
Merit: 389
Do not trust the government
September 29, 2017, 05:14:10 PM
#5
Nothing is 100%, but Tor is the best way to anonymously run a node. The other benefit is, as you said, that you don't need to forward posts. Anonymity also brings a bit of security as well, since no one will know your IP.

The only real downside of using Tor is bandwith speeds, that are maybe a half or a third of the direct connection on average, but since Bitcoin really doesn't require much bandwith, unless it is doing an initial sync, then it isn't even noticeable.

I would suggest you enable Tor, you don't really lose anything and you gain more nodes.


It's very noticeable when you run a node under Tor and try to sync the network, it becomes too slow to download sometimes, but it's not the end of world, it's still reasonable to download the entire chain with Tor.

But if it's really a problem, I guess a solution is to download the entire chain under your normal connection at high speeds. Once you have your node synced, close it, then open the Tor Browser, then open your node again and now you can do transactions under Tor. I think that would do.

Hi Hilly, have you turn the node to TOR network after syncing from the regular network? I looking for people with some experience in this. I dont want to mess my node. It is a pruned rPi and at this moment has been behaving good so far.

Would I need more processing power to run a TOR node or the issue is the amount of bandwidth/speed?

peace

I have been running a node over Tor for years now. It will not mess up your node, it is a recommend to use Tor and Tor configuration is very well integrated in to the Bitcoin Core wallet, it even has a command line argument to automatically create Tor hidden service for you.

Tor uses a negligible amount of processing power and bandwith. I even agree with Billy that it is completely ok to even sync up using Tor, since most of the syncing process is limited in speed due to the processing power and not bandwith, and Tor takes almost no processing power, but does take some bandwith that is, as I mentioned, negligible for all purposes of the Bitcoin Core node.
hero member
Activity: 544
Merit: 507
September 29, 2017, 08:00:04 AM
#4
Nothing is 100%, but Tor is the best way to anonymously run a node. The other benefit is, as you said, that you don't need to forward posts. Anonymity also brings a bit of security as well, since no one will know your IP.

The only real downside of using Tor is bandwith speeds, that are maybe a half or a third of the direct connection on average, but since Bitcoin really doesn't require much bandwith, unless it is doing an initial sync, then it isn't even noticeable.

I would suggest you enable Tor, you don't really lose anything and you gain more nodes.


It's very noticeable when you run a node under Tor and try to sync the network, it becomes too slow to download sometimes, but it's not the end of world, it's still reasonable to download the entire chain with Tor.

But if it's really a problem, I guess a solution is to download the entire chain under your normal connection at high speeds. Once you have your node synced, close it, then open the Tor Browser, then open your node again and now you can do transactions under Tor. I think that would do.

Hi Hilly, have you turn the node to TOR network after syncing from the regular network? I looking for people with some experience in this. I dont want to mess my node. It is a pruned rPi and at this moment has been behaving good so far.

Would I need more processing power to run a TOR node or the issue is the amount of bandwidth/speed?

peace
legendary
Activity: 1204
Merit: 1028
September 28, 2017, 09:36:45 AM
#3
Nothing is 100%, but Tor is the best way to anonymously run a node. The other benefit is, as you said, that you don't need to forward posts. Anonymity also brings a bit of security as well, since no one will know your IP.

The only real downside of using Tor is bandwith speeds, that are maybe a half or a third of the direct connection on average, but since Bitcoin really doesn't require much bandwith, unless it is doing an initial sync, then it isn't even noticeable.

I would suggest you enable Tor, you don't really lose anything and you gain more nodes.


It's very noticeable when you run a node under Tor and try to sync the network, it becomes too slow to download sometimes, but it's not the end of world, it's still reasonable to download the entire chain with Tor.

But if it's really a problem, I guess a solution is to download the entire chain under your normal connection at high speeds. Once you have your node synced, close it, then open the Tor Browser, then open your node again and now you can do transactions under Tor. I think that would do.
sr. member
Activity: 490
Merit: 389
Do not trust the government
September 28, 2017, 12:54:31 AM
#2
Nothing is 100%, but Tor is the best way to anonymously run a node. The other benefit is, as you said, that you don't need to forward posts. Anonymity also brings a bit of security as well, since no one will know your IP.

The only real downside of using Tor is bandwith speeds, that are maybe a half or a third of the direct connection on average, but since Bitcoin really doesn't require much bandwith, unless it is doing an initial sync, then it isn't even noticeable.

I would suggest you enable Tor, you don't really lose anything and you gain more nodes.
hero member
Activity: 544
Merit: 507
September 27, 2017, 04:19:02 PM
#1
I would like to ask your opinion about TOR enabled nodes.
Do you think it is worthy to enabled TOR in every one of our nodes?

I can see in bitnodes21.co the amount of TOR nodes in the network and it is not even then half. I'm considering my self to enable TOR network in mine.
Also, because I think it is better to enabled it to accept incoming connections rather than open the 8333 port on my router.

What are my odds of my privacy and security being compromised if I enable TOR network? I have read is not 100% fail safe.

If my ISP start sharing public my public IP with another clients I wont be able to open the 8333 port.

If anyone can send me links or publish here the pros and cons of enabling TOR network in my nodes you are welcome.

Thanks,
Pages:
Jump to: