Received: from sog-mx-4.v43.ch3.sourceforge.com ([172.29.43.194] helo=mx.sourceforge.net) by sfs-ml-1.v29.ch3.sourceforge.com with esmtp (Exim 4.76) (envelope-from ) id 1SjWUa-0005A5-6H for bitcoin-development@lists.sourceforge.net; Tue, 26 Jun 2012 14:11:44 +0000 X-ACL-Warn: Received: from vps7135.xlshosting.net ([178.18.90.41]) by sog-mx-4.v43.ch3.sourceforge.com with esmtp (Exim 4.76) id 1SjWUU-0002O5-8e for bitcoin-development@lists.sourceforge.net; Tue, 26 Jun 2012 14:11:44 +0000 Received: by vps7135.xlshosting.net (Postfix, from userid 1000) id E2F0C61972; Tue, 26 Jun 2012 16:11:29 +0200 (CEST) Date: Tue, 26 Jun 2012 16:11:29 +0200 From: Pieter Wuille To: Bitcoin Dev Message-ID: <20120626141129.GA30240@vps7135.xlshosting.net> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="yrj/dFKFPuw6o+aM" Content-Disposition: inline User-Agent: Mutt/1.5.20 (2009-06-14) X-Spam-Score: 1.7 (+) X-Spam-Report: Spam Filtering performed by mx.sourceforge.net. See http://spamassassin.org/tag/ for more details. 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider (pieter.wuille[at]gmail.com) 0.0 DKIM_ADSP_CUSTOM_MED No valid author signature, adsp_override is CUSTOM_MED -0.0 T_RP_MATCHES_RCVD Envelope sender domain matches handover relay domain 1.0 HTML_MESSAGE BODY: HTML included in message 1.2 NML_ADSP_CUSTOM_MED ADSP custom_med hit, and not from a mailing list -0.5 AWL AWL: From: address is in the auto white-list X-Headers-End: 1SjWUU-0002O5-8e Subject: [Bitcoin-development] Tor hidden service support X-BeenThere: bitcoin-development@lists.sourceforge.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 26 Jun 2012 14:11:44 -0000 --yrj/dFKFPuw6o+aM Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Hello everyone, a few days ago we merged Tor hidden service support in mainline. This means that it's now possible to run a hidden service bitcoin node, and connect to other bitcoin hidden services (via a Tor proxy) when running git HEAD. See doc/Tor.txt for more information. This is expected to be included in the 0.7 release. Additionally, such addresses are exchanged and relayed via the P2P network. To do so, we reused the fd87:d87e:eb43::/48 IPv6 range. Each address in this 80-bit range is mapped to an onion address, and treated as belonging to a separate network. This network range is the same as used by the OnionCat application (though we do not use OnionCat in any way), and is part of the RFC4193 Unique Local IPv6 range, which is normally not globally routable. Other clients that wish to implement similar functionality, can use this test case: 5wyqrzbvrdsumnok.onion == FD87:D87E:EB43:edb1:8e4:3588:e546:35ca. The conversion is simply decoding the base32 onion address, and storing the resulting 80 bits of data as low-order bits of an IPv6 address, prefixed by fd87:d87e:eb43:. As this range is not routable, there should be no compatibility problems: any unaware IPv6-capable code will immediately fail when trying to connect. -- Pieter --yrj/dFKFPuw6o+aM Content-Type: text/html; charset=UTF-8 Content-Disposition: inline


Hello everyone,

we've just merged tor hidden service support in git master, so it is now possible to have a bitcoin node that is reachable
--
Pieter

--yrj/dFKFPuw6o+aM--