One of my nodes using onlynet=tor
nodes is completely broken with current master as of 97a35f3ae5bff7f4a25d37d8961191fdbc8c5b67.
Tor is manually configured. Relevant bitcoin.conf
:
0onlynet=onion
1proxy=127.0.0.1:9050
2onion=127.0.0.1:9050
It does not manage to make any outgoing connections. The log has an endless stream of:
02021-03-03T13:42:13Z Socks5() connect to […].onion:8333 failed: general failure
12021-03-03T13:42:13Z Socks5() connect to […].onion:8333 failed: general failure
22021-03-03T13:42:14Z Socks5() connect to […].onion:8333 failed: general failure
32021-03-03T13:42:14Z Socks5() connect to […].onion:8333 failed: general failure
42021-03-03T13:42:15Z Socks5() connect to […].onion:8333 failed: general failure
52021-03-03T13:42:15Z Socks5() connect to […].onion:8333 failed: general failure
62021-03-03T13:42:16Z Socks5() connect to […].onion:8333 failed: general failure
72021-03-03T13:42:16Z Socks5() connect to […].onion:8333 failed: general failure
82021-03-03T13:42:17Z Socks5() connect to […].onion:8333 failed: general failure
92021-03-03T13:42:17Z Socks5() connect to […].onion:8333 failed: general failure
102021-03-03T13:42:18Z Socks5() connect to […].onion:8333 failed: general failure
112021-03-03T13:42:18Z Socks5() connect to […].onion:8333 failed: general failure
122021-03-03T13:42:19Z Socks5() connect to […].onion:8333 failed: general failure
132021-03-03T13:42:19Z Socks5() connect to […].onion:8333 failed: general failure
142021-03-03T13:42:20Z Socks5() connect to […].onion:8333 failed: general failure
152021-03-03T13:42:20Z Socks5() connect to […].onion:8333 failed: general failure
16…
(multiple messages per second, all […]
are short v2 onion addresses)
0$ systemctl status tor
1● tor.service - Anonymizing overlay network for TCP
2 Loaded: loaded (/etc/systemd/system/tor.service; enabled; vendor preset: enabled)
3 Active: active (running) since Wed 2021-03-03 14:45:24 CET; 3min 0s ago
4 Process: 158931 ExecStartPre=/opt/tor/bin/tor -f /opt/tor/etc/tor/torrc --verify-config (code=exited, status=0/SUCCESS)
5 Main PID: 158962 (tor)
6 Tasks: 1 (limit: 9367)
7 Memory: 38.4M
8 CGroup: /system.slice/tor.service
9 └─158962 /opt/tor/bin/tor -f /opt/tor/etc/tor/torrc
10
11Mar 03 14:48:20 tor[158962]: Mar 03 14:48:20.000 [warn] Invalid hostname [scrubbed]; rejecting
12Mar 03 14:48:20 tor[158962]: Mar 03 14:48:20.000 [warn] Invalid hostname [scrubbed]; rejecting
13Mar 03 14:48:21 tor[158962]: Mar 03 14:48:21.000 [warn] Invalid hostname [scrubbed]; rejecting
14Mar 03 14:48:21 tor[158962]: Mar 03 14:48:21.000 [warn] Invalid hostname [scrubbed]; rejecting
15Mar 03 14:48:22 tor[158962]: Mar 03 14:48:22.000 [warn] Invalid hostname [scrubbed]; rejecting
16Mar 03 14:48:22 tor[158962]: Mar 03 14:48:22.000 [warn] Invalid hostname [scrubbed]; rejecting
17Mar 03 14:48:23 tor[158962]: Mar 03 14:48:23.000 [warn] Invalid hostname [scrubbed]; rejecting
18Mar 03 14:48:23 tor[158962]: Mar 03 14:48:23.000 [warn] Invalid hostname [scrubbed]; rejecting
19Mar 03 14:48:24 tor[158962]: Mar 03 14:48:24.000 [warn] Invalid hostname [scrubbed]; rejecting
20Mar 03 14:48:24 tor[158962]: Mar 03 14:48:24.000 [warn] Invalid hostname [scrubbed]; rejecting
I’ll try to see if I can figure out what it’s sending. Tor (current master) is otherwise successfully able to connect to hidden services, at least v3 ones.
Did Tor completely remove v2 support?
0$ /opt/tor/bin/tor --version
1Tor version 0.4.6.0-alpha-dev (git-8020ae02abb105db).
2Tor is running on Linux with Libevent 2.1.11-stable, OpenSSL 1.1.1f, Zlib 1.2.11, Liblzma 5.2.4, Libzstd N/A and Glibc 2.31 as libc.
3Tor compiled with GCC version 9.3.0