Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Docs: tor onion address confusion about port #1144

Open
johndoe9459272 opened this issue Jan 20, 2025 · 0 comments
Open

Docs: tor onion address confusion about port #1144

johndoe9459272 opened this issue Jan 20, 2025 · 0 comments

Comments

@johndoe9459272
Copy link

When using raspiblitz, I noticed that the terminal instructions, found at ELECTRS > CONNECT How to Connect suggest to connect to the onion address with port 50002:

...
To connect through TOR open the Tor Browser and start with the options:
electrum --oneserver --server <your-onion-address>.onion:50002:s --proxy socks5:127.0.0.1:9150
...

In the documentation page Manual configuration: Tor hidden service it says the following: (it is using port 50001 instead)

$ electrum --oneserver --server <your-onion-address>.onion:50001:t --proxy socks5:127.0.0.1:9050

I'm not familiar with the TOR protocol, but I've read some discussions stating that one don't need TLS, when connecting to an onion service.

I've found out, that the bitbox app for example allows the connection to the onion address with port 50002, checks the certificate and displays it would be using TLS. The connection to the onion address with port 50001 was working too, needed no certificate check and displayed TCP.

I'm confused which one is the more secure way of connecting to electrs.
In case that port 50001 should be used, wouldn't it be good to also display that port in the cli interface?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant