Previous wording suggested that no additional setup was required for a tor hidden service to be created.
Discussed here: #8145
Previous wording suggested that no additional setup was required for a tor hidden service to be created.
Discussed here: #8145
111 | +Connecting to Tor's control socket API requires one of two authentication methods to be 112 | +configured. The most straightforward is the use of the `-torpassword` flag and a `hash-password` 113 | +which can be enabled in Tor configuration. Alternatively the user running bitcoind must have 114 | +write access to the `CookieAuthFile` specified in Tor configuration. This can be achieved 115 | +by adding both the user running tor, and the user running bitcoind to the same group and setting 116 | +permissions appropriately.
Note that most distributions already have something along those lines, e.g. on Debian-based there is a debian-tor group, and you make cookie auth work by adding users who need it to the debian-tor group. I'd reword this to just say that you need to make sure the bitcoind user is part of the Tor group.
Anyone know how non-Debian distros do this?
Yes, giving an example for Debian may help here.
Added the example for Debian. Are we worried that the debian-tor group includes too many permissions outside of this one cookie permission we are interested in?
106 | This new feature is enabled by default if Bitcoin Core is listening, and 107 | a connection to Tor can be made. It can be configured with the `-listenonion`, 108 | `-torcontrol` and `-torpassword` settings. To show verbose debugging 109 | information, pass `-debug=tor`. 110 | + 111 | +Connecting to Tor's control socket API requires one of two authentication methods to be
I'd reword this a bit - cookie authentication is by far the most straightforward (even automatic) if bitcoin core has access to tor's cookie file. This is the case on Windows with Tor Browser Bundle, for example. If not, then extra work is needed to set it up.
Removed the opinion on simplicity.
113 | +to the `CookieAuthFile` specified in Tor configuration. In some cases this is 114 | +preconfigured and the creation of a hidden service is automatic. If permission problems 115 | +are seen with `-debug=tor` they can be resolved by adding both the user running tor, and 116 | +the user running bitcoind to the same group and setting permissions appropriately. On 117 | +debian based systems Tor automatically creates the debian-tor group and the user running 118 | +bitcoind can be added there to receive appropriate permissions. An alternative
Rather than saying "Tor automatically creates" how about we just say "On Debian-based systems the user running bitcoind can be added to the debian-tor group, which has the appropriate permissions." - Debian's package management is what's automatically creating debian-tor, not Tor itself.
Much better wording.
Previous wording suggested that no additional setup was required for a
tor hidden service to be created.
112 | +configured. For cookie authentication the user running bitcoind must have write access 113 | +to the `CookieAuthFile` specified in Tor configuration. In some cases this is 114 | +preconfigured and the creation of a hidden service is automatic. If permission problems 115 | +are seen with `-debug=tor` they can be resolved by adding both the user running tor and 116 | +the user running bitcoind to the same group and setting permissions appropriately. On 117 | +Debian-based systems the user running bitcoind can be added to the debian-tor group,
No double spaces please :) We're not Satoshi.