summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorPieter Wuille <pieter.wuille@gmail.com>2012-06-26 16:11:29 +0200
committerbitcoindev <bitcoindev@gnusha.org>2012-06-26 14:11:44 +0000
commitb945d34026b6cd7c7ce31fbc6078548e9f898dfa (patch)
treeda37225d08ca79a06d169b3508e9408829887bd8
parent3daeee27e1b2287385ed8cefdca7fd5ed29bcd57 (diff)
downloadpi-bitcoindev-b945d34026b6cd7c7ce31fbc6078548e9f898dfa.tar.gz
pi-bitcoindev-b945d34026b6cd7c7ce31fbc6078548e9f898dfa.zip
[Bitcoin-development] Tor hidden service support
-rw-r--r--7e/cfa720aad328f891228b9160a2782c6f65c25394
1 files changed, 94 insertions, 0 deletions
diff --git a/7e/cfa720aad328f891228b9160a2782c6f65c253 b/7e/cfa720aad328f891228b9160a2782c6f65c253
new file mode 100644
index 000000000..333263c7d
--- /dev/null
+++ b/7e/cfa720aad328f891228b9160a2782c6f65c253
@@ -0,0 +1,94 @@
+Received: from sog-mx-4.v43.ch3.sourceforge.com ([172.29.43.194]
+ helo=mx.sourceforge.net)
+ by sfs-ml-1.v29.ch3.sourceforge.com with esmtp (Exim 4.76)
+ (envelope-from <pw@vps7135.xlshosting.net>) id 1SjWUa-0005A5-6H
+ for bitcoin-development@lists.sourceforge.net;
+ Tue, 26 Jun 2012 14:11:44 +0000
+X-ACL-Warn:
+Received: from vps7135.xlshosting.net ([178.18.90.41])
+ by sog-mx-4.v43.ch3.sourceforge.com with esmtp (Exim 4.76)
+ id 1SjWUU-0002O5-8e for bitcoin-development@lists.sourceforge.net;
+ Tue, 26 Jun 2012 14:11:44 +0000
+Received: by vps7135.xlshosting.net (Postfix, from userid 1000)
+ id E2F0C61972; Tue, 26 Jun 2012 16:11:29 +0200 (CEST)
+Date: Tue, 26 Jun 2012 16:11:29 +0200
+From: Pieter Wuille <pieter.wuille@gmail.com>
+To: Bitcoin Dev <bitcoin-development@lists.sourceforge.net>
+Message-ID: <20120626141129.GA30240@vps7135.xlshosting.net>
+MIME-Version: 1.0
+Content-Type: multipart/mixed; boundary="yrj/dFKFPuw6o+aM"
+Content-Disposition: inline
+User-Agent: Mutt/1.5.20 (2009-06-14)
+X-Spam-Score: 1.7 (+)
+X-Spam-Report: Spam Filtering performed by mx.sourceforge.net.
+ See http://spamassassin.org/tag/ for more details.
+ 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider
+ (pieter.wuille[at]gmail.com)
+ 0.0 DKIM_ADSP_CUSTOM_MED No valid author signature, adsp_override is
+ CUSTOM_MED
+ -0.0 T_RP_MATCHES_RCVD Envelope sender domain matches handover relay
+ domain 1.0 HTML_MESSAGE BODY: HTML included in message
+ 1.2 NML_ADSP_CUSTOM_MED ADSP custom_med hit,
+ and not from a mailing list
+ -0.5 AWL AWL: From: address is in the auto white-list
+X-Headers-End: 1SjWUU-0002O5-8e
+Subject: [Bitcoin-development] Tor hidden service support
+X-BeenThere: bitcoin-development@lists.sourceforge.net
+X-Mailman-Version: 2.1.9
+Precedence: list
+List-Id: <bitcoin-development.lists.sourceforge.net>
+List-Unsubscribe: <https://lists.sourceforge.net/lists/listinfo/bitcoin-development>,
+ <mailto:bitcoin-development-request@lists.sourceforge.net?subject=unsubscribe>
+List-Archive: <http://sourceforge.net/mailarchive/forum.php?forum_name=bitcoin-development>
+List-Post: <mailto:bitcoin-development@lists.sourceforge.net>
+List-Help: <mailto:bitcoin-development-request@lists.sourceforge.net?subject=help>
+List-Subscribe: <https://lists.sourceforge.net/lists/listinfo/bitcoin-development>,
+ <mailto:bitcoin-development-request@lists.sourceforge.net?subject=subscribe>
+X-List-Received-Date: Tue, 26 Jun 2012 14:11:44 -0000
+
+
+--yrj/dFKFPuw6o+aM
+Content-Type: text/plain; charset=us-ascii
+Content-Disposition: inline
+
+Hello everyone,
+
+a few days ago we merged Tor hidden service support in mainline. This means
+that it's now possible to run a hidden service bitcoin node, and connect to
+other bitcoin hidden services (via a Tor proxy) when running git HEAD. See
+doc/Tor.txt for more information. This is expected to be included in the 0.7
+release.
+
+Additionally, such addresses are exchanged and relayed via the P2P network.
+To do so, we reused the fd87:d87e:eb43::/48 IPv6 range. Each address in this
+80-bit range is mapped to an onion address, and treated as belonging to a
+separate network. This network range is the same as used by the OnionCat
+application (though we do not use OnionCat in any way), and is part of the
+RFC4193 Unique Local IPv6 range, which is normally not globally routable.
+
+Other clients that wish to implement similar functionality, can use this
+test case: 5wyqrzbvrdsumnok.onion == FD87:D87E:EB43:edb1:8e4:3588:e546:35ca.
+The conversion is simply decoding the base32 onion address, and storing the
+resulting 80 bits of data as low-order bits of an IPv6 address, prefixed by
+fd87:d87e:eb43:. As this range is not routable, there should be no
+compatibility problems: any unaware IPv6-capable code will immediately fail
+when trying to connect.
+
+--
+Pieter
+
+
+--yrj/dFKFPuw6o+aM
+Content-Type: text/html; charset=UTF-8
+Content-Disposition: inline
+
+<p><br>
+Hello everyone,</p>
+<p>we&#39;ve just merged tor hidden service support in git master, so it is now possible to have a bitcoin node that is reachable<br>
+-- <br>
+Pieter<br>
+</p>
+
+--yrj/dFKFPuw6o+aM--
+
+