aboutsummaryrefslogtreecommitdiff
path: root/src/torcontrol.cpp
Commit message (Collapse)AuthorAgeFilesLines
* Fix for Boost 1.74John-Gee2021-02-021-11/+25
|
* [trivial] Fix typos in commentspracticalswift2017-01-271-1/+1
|
* Increment MIT Licence copyright header year on files modified in 2016isle29832016-12-311-1/+1
| | | | | | Edited via: $ contrib/devtools/copyright_header.py update .
* Refactor: Removed begin/end_ptr functions.Karl-Johan Alm2016-12-091-4/+4
|
* torcontrol: Explicitly request RSA1024 private keyWladimir J. van der Laan2016-11-281-1/+1
| | | | | | | | | | When generating a new service key, explicitly request a RSA1024 one. The bitcoin P2P protocol has no support for the longer hidden service names that will come with ed25519 keys, until it does, we depend on the old hidden service type so make this explicit. See #9214.
* Do not shadow variablesPavel Janík2016-09-271-23/+23
|
* net: Have LookupNumeric return a CService directlyCory Fields2016-08-041-3/+2
| | | | | | Also fix up a few small issues: - Lookup with "badip:port" now sets the port to 0 - Don't allow assert to have side-effects
* net: narrow include scope after moving to netaddressCory Fields2016-07-311-0/+1
| | | | | Net functionality is no longer needed for CAddress/CAddrman/etc. now that CNetAddr/CService/CSubNet are dumb storage classes.
* net: Split resolving out of CServiceCory Fields2016-07-311-3/+4
|
* Merge #7703: tor: Change auth order to only use password auth if -torpasswordWladimir J. van der Laan2016-06-081-8/+10
|\ | | | | | | 2e49448 tor: Change auth order to only use HASHEDPASSWORD if -torpassword (Wladimir J. van der Laan)
| * tor: Change auth order to only use HASHEDPASSWORD if -torpasswordWladimir J. van der Laan2016-06-061-8/+10
| | | | | | | | | | | | | | | | | | | | | | | | | | Change authentication order to make it more clear (see #7700). - If the `-torpassword` option is provided, force use of `HASHEDPASSWORD` auth. - Give error message if `-torpassword` provided, but `HASHEDPASSWORD` auth is not available. - Give error message if only `HASHEDPASSWORD` available, but `-torpassword` not given.
* | net: disable resolving from storage structuresCory Fields2016-04-201-1/+1
|/ | | | CNetAddr/CService/CSubnet can no longer resolve DNS.
* Fix torcontrol.cpp unused private field warningJonas Schnelli2016-03-141-2/+2
|
* Merge #7553: Remove vfReachable and modify IsReachable to only use vfLimited.Wladimir J. van der Laan2016-03-111-1/+1
|\ | | | | | | 110b62f Remove vfReachable and modify IsReachable to only use vfLimited. (Patrick Strateman)
| * Remove vfReachable and modify IsReachable to only use vfLimited.Patrick Strateman2016-02-171-1/+1
| | | | | | | | We do not know that a class of Network is reachable, only that it is not.
* | Fix memleak in TorController [rework]Wladimir J. van der Laan2016-03-031-4/+9
|/ | | | | | | | | | | It looks like, TorController::disconnected_cb(TorControlConnection& conn) gets called multiple times which results in multiple event_new(). Avoid this by creating the event only once in the constructore, and deleting it only once in the destructor (thanks to Cory Fields for the idea). Replaces the fix by Jonas Schnelli in #7610, see discussion there.
* fix spelling of advertise in src and docjloughry2016-02-121-2/+2
|
* Merge #7300: [trivial] Add missing copyright headersWladimir J. van der Laan2016-01-271-0/+4
|\ | | | | | | | | | | fabcee1 Remove copyright header from autogenerated chainparamsseeds.h (MarcoFalke) fa60d05 Add missing copyright headers (MarcoFalke) fa7e4c0 Bump copyright headers to 2014 (MarcoFalke)
| * Add missing copyright headersMarcoFalke2016-01-051-0/+4
| |
* | Merge pull request #7313Wladimir J. van der Laan2016-01-181-6/+6
|\ \ | | | | | | | | | 0331aa3 Fixing typos on security-check.py and torcontrol.cpp (calebogden)
| * | Fixing typos on security-check.py and torcontrol.cppcalebogden2016-01-081-6/+6
| |/
* / Typo fixes in commentsChris Wheeler2016-01-171-1/+1
|/
* torcontrol debug: Change to a blanket message that covers both casesMarcoFalke2015-12-161-1/+1
|
* torcontrol: only output disconnect if -debug=torDaniel Cousens2015-11-301-1/+3
|
* Connect to Tor hidden services by defaultPeter Todd2015-11-261-0/+9
| | | | | | | Adds 127.0.0.1:9050 for the .onion proxy if we can succesfully connect to the control port. Natural followup to creating hidden services automatically.
* torcontrol improvements and fixesWladimir J. van der Laan2015-11-121-84/+194
| | | | | | | | | | | | | | - Force AUTHCOOKIE size to be 32 bytes: This provides protection against an attack where a process pretends to be Tor and uses the cookie authentication method to nab arbitrary files such as the wallet - torcontrol logging - fix cookie auth - add HASHEDPASSWORD auth, fix fd leak when fwrite() fails - better error reporting when cookie file is not ok - better init/shutdown flow - stop advertizing service when disconnected from tor control port - COOKIE->SAFECOOKIE auth
* Better error message if Tor version too oldPeter Todd2015-11-101-1/+3
|
* net: Automatically create hidden service, listen on TorWladimir J. van der Laan2015-11-101-0/+573
Starting with Tor version 0.2.7.1 it is possible, through Tor's control socket API, to create and destroy 'ephemeral' hidden services programmatically. https://stem.torproject.org/api/control.html#stem.control.Controller.create_ephemeral_hidden_service This means that if Tor is running (and proper authorization is available), bitcoin automatically creates a hidden service to listen on, without user manual configuration. This will positively affect the number of available .onion nodes. - When the node is started, connect to Tor through control socket - Send `ADD_ONION` command - First time: - Make it create a hidden service key - Save the key in the data directory for later usage - Make it redirect port 8333 to the local port 8333 (or whatever port we're listening on). - Keep control socket connection open for as long node is running. The hidden service will (by default) automatically go away when the connection is closed.