Summary
When -bind is specified without a dedicated onion socket (-bind=<addr>=onion) but -listenonion is enabled, the auto-created Tor hidden service routes incoming connections to the regular bind address. This makes it impossible to distinguish incoming Tor connections from regular IPv4 connections, causing -netinfo to report 0 onion connections even when they exist.
This adds a startup warning to alert users so they can add -bind=127.0.0.1:8334=onion for accurate connection tracking.
Fixes #33458
Test plan
Start bitcoind with -bind but without a dedicated onion bind:
0./build/bin/bitcoind -bind=0.0.0.0:8333 -listenonion=1
Before this change: No warning is emitted. Users have no indication that incoming Tor connections will be misidentified.
After this change: A warning is printed at startup:
0Warning: The Tor onion service is being directed to a -bind address without a dedicated onion socket (-bind=<addr>=onion). Incoming Tor connections will not be identified as onion connections.
The warning does not appear when a dedicated onion bind is provided:
0./build/bin/bitcoind -bind=0.0.0.0:8333 -bind=127.0.0.1:8334=onion -listenonion=1
Functional test feature_proxy.py updated to expect the new warning.