diff options
author | Pieter Wuille <pieter.wuille@gmail.com> | 2012-06-26 16:11:29 +0200 |
---|---|---|
committer | bitcoindev <bitcoindev@gnusha.org> | 2012-06-26 14:11:44 +0000 |
commit | b945d34026b6cd7c7ce31fbc6078548e9f898dfa (patch) | |
tree | da37225d08ca79a06d169b3508e9408829887bd8 | |
parent | 3daeee27e1b2287385ed8cefdca7fd5ed29bcd57 (diff) | |
download | pi-bitcoindev-b945d34026b6cd7c7ce31fbc6078548e9f898dfa.tar.gz pi-bitcoindev-b945d34026b6cd7c7ce31fbc6078548e9f898dfa.zip |
[Bitcoin-development] Tor hidden service support
-rw-r--r-- | 7e/cfa720aad328f891228b9160a2782c6f65c253 | 94 |
1 files changed, 94 insertions, 0 deletions
diff --git a/7e/cfa720aad328f891228b9160a2782c6f65c253 b/7e/cfa720aad328f891228b9160a2782c6f65c253 new file mode 100644 index 000000000..333263c7d --- /dev/null +++ b/7e/cfa720aad328f891228b9160a2782c6f65c253 @@ -0,0 +1,94 @@ +Received: from sog-mx-4.v43.ch3.sourceforge.com ([172.29.43.194] + helo=mx.sourceforge.net) + by sfs-ml-1.v29.ch3.sourceforge.com with esmtp (Exim 4.76) + (envelope-from <pw@vps7135.xlshosting.net>) id 1SjWUa-0005A5-6H + for bitcoin-development@lists.sourceforge.net; + Tue, 26 Jun 2012 14:11:44 +0000 +X-ACL-Warn: +Received: from vps7135.xlshosting.net ([178.18.90.41]) + by sog-mx-4.v43.ch3.sourceforge.com with esmtp (Exim 4.76) + id 1SjWUU-0002O5-8e for bitcoin-development@lists.sourceforge.net; + Tue, 26 Jun 2012 14:11:44 +0000 +Received: by vps7135.xlshosting.net (Postfix, from userid 1000) + id E2F0C61972; Tue, 26 Jun 2012 16:11:29 +0200 (CEST) +Date: Tue, 26 Jun 2012 16:11:29 +0200 +From: Pieter Wuille <pieter.wuille@gmail.com> +To: Bitcoin Dev <bitcoin-development@lists.sourceforge.net> +Message-ID: <20120626141129.GA30240@vps7135.xlshosting.net> +MIME-Version: 1.0 +Content-Type: multipart/mixed; boundary="yrj/dFKFPuw6o+aM" +Content-Disposition: inline +User-Agent: Mutt/1.5.20 (2009-06-14) +X-Spam-Score: 1.7 (+) +X-Spam-Report: Spam Filtering performed by mx.sourceforge.net. + See http://spamassassin.org/tag/ for more details. + 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider + (pieter.wuille[at]gmail.com) + 0.0 DKIM_ADSP_CUSTOM_MED No valid author signature, adsp_override is + CUSTOM_MED + -0.0 T_RP_MATCHES_RCVD Envelope sender domain matches handover relay + domain 1.0 HTML_MESSAGE BODY: HTML included in message + 1.2 NML_ADSP_CUSTOM_MED ADSP custom_med hit, + and not from a mailing list + -0.5 AWL AWL: From: address is in the auto white-list +X-Headers-End: 1SjWUU-0002O5-8e +Subject: [Bitcoin-development] Tor hidden service support +X-BeenThere: bitcoin-development@lists.sourceforge.net +X-Mailman-Version: 2.1.9 +Precedence: list +List-Id: <bitcoin-development.lists.sourceforge.net> +List-Unsubscribe: <https://lists.sourceforge.net/lists/listinfo/bitcoin-development>, + <mailto:bitcoin-development-request@lists.sourceforge.net?subject=unsubscribe> +List-Archive: <http://sourceforge.net/mailarchive/forum.php?forum_name=bitcoin-development> +List-Post: <mailto:bitcoin-development@lists.sourceforge.net> +List-Help: <mailto:bitcoin-development-request@lists.sourceforge.net?subject=help> +List-Subscribe: <https://lists.sourceforge.net/lists/listinfo/bitcoin-development>, + <mailto:bitcoin-development-request@lists.sourceforge.net?subject=subscribe> +X-List-Received-Date: Tue, 26 Jun 2012 14:11:44 -0000 + + +--yrj/dFKFPuw6o+aM +Content-Type: text/plain; charset=us-ascii +Content-Disposition: inline + +Hello everyone, + +a few days ago we merged Tor hidden service support in mainline. This means +that it's now possible to run a hidden service bitcoin node, and connect to +other bitcoin hidden services (via a Tor proxy) when running git HEAD. See +doc/Tor.txt for more information. This is expected to be included in the 0.7 +release. + +Additionally, such addresses are exchanged and relayed via the P2P network. +To do so, we reused the fd87:d87e:eb43::/48 IPv6 range. Each address in this +80-bit range is mapped to an onion address, and treated as belonging to a +separate network. This network range is the same as used by the OnionCat +application (though we do not use OnionCat in any way), and is part of the +RFC4193 Unique Local IPv6 range, which is normally not globally routable. + +Other clients that wish to implement similar functionality, can use this +test case: 5wyqrzbvrdsumnok.onion == FD87:D87E:EB43:edb1:8e4:3588:e546:35ca. +The conversion is simply decoding the base32 onion address, and storing the +resulting 80 bits of data as low-order bits of an IPv6 address, prefixed by +fd87:d87e:eb43:. As this range is not routable, there should be no +compatibility problems: any unaware IPv6-capable code will immediately fail +when trying to connect. + +-- +Pieter + + +--yrj/dFKFPuw6o+aM +Content-Type: text/html; charset=UTF-8 +Content-Disposition: inline + +<p><br> +Hello everyone,</p> +<p>we've just merged tor hidden service support in git master, so it is now possible to have a bitcoin node that is reachable<br> +-- <br> +Pieter<br> +</p> + +--yrj/dFKFPuw6o+aM-- + + |