From 1b8d9ecc6bb498246cf3a271bc4c873001164746 Mon Sep 17 00:00:00 2001 From: UdjinM6 Date: Mon, 6 Nov 2023 18:23:20 +0300 Subject: [PATCH] docs: update tor and i2p docs (#5673) ## Issue being fixed or feature implemented Fix Dash Core version in i2p.md and update list of nodes in tor.md (we do not support v2 tor anymore). ## What was done? ran a node with `-onlynet=oinion` and picked 8 nodes ## How Has This Been Tested? n/a ## Breaking Changes n/a ## Checklist: - [x] I have performed a self-review of my own code - [ ] I have commented my code, particularly in hard-to-understand areas - [ ] I have added or updated relevant unit/integration/functional/e2e tests - [ ] I have made corresponding changes to the documentation - [x] I have assigned this pull request to a milestone _(for repository code-owners and collaborators only)_ --- doc/i2p.md | 2 +- doc/tor.md | 20 ++++++++------------ 2 files changed, 9 insertions(+), 13 deletions(-) diff --git a/doc/i2p.md b/doc/i2p.md index 2e94577787..052dfbba23 100644 --- a/doc/i2p.md +++ b/doc/i2p.md @@ -47,7 +47,7 @@ information in the debug log about your I2P configuration and connections. Run `dash-cli help logging` for more information. It is possible to restrict outgoing connections in the usual way with -`onlynet=i2p`. I2P support was added to Dash Core in version 22.0 (mid 2021) +`onlynet=i2p`. I2P support was added to Dash Core in version 20.0 (fall 2023) and there may be fewer I2P peers than Tor or IP ones. Therefore, using `onlynet=i2p` alone (without other `onlynet=`) may make a node more susceptible to [Sybil attacks](https://en.dash.it/wiki/Weaknesses#Sybil_attack). Use diff --git a/doc/tor.md b/doc/tor.md index 5ca1843c1a..c667257675 100644 --- a/doc/tor.md +++ b/doc/tor.md @@ -203,18 +203,14 @@ for normal IPv4/IPv6 communication, use: ## 3.1. List of known Dash Core Tor relays -Note: All these nodes are hosted by masternodehosting.com - -* l7oq3v7ujau5tfrw.onion -* vsmegqxisccimsir.onion -* 4rbha5nrjso54l75.onion -* 3473226fvgoenztx.onion -* onn5v3aby2dioicx.onion -* w5n7s2p3mdq5yf2d.onion -* ec4qdvujskzasvrb.onion -* g5e4hvsecwri3inf.onion -* ys5upbdeotplam3y.onion -* fijy6aikzxfea54i.onion +- 3dnj6le7i2dgzqtj7tth5zoiscmoddovzswdl5pjy5pnyllevxhb3uyd.onion +- cmhr5r3lqhy7ic2ebeil66ftcz5u62zq5qhbfdz53l6sqxljh7zxntyd.onion +- k532fqvgzqotj6epfw3rfc377elrj3td47ztad2tkn6vwnw6nhxacrqd.onion +- nqvpq3urtggxybor6wlf5odzanfqcitg5m7xjo2w25bj7tl2g54te6yd.onion +- oabd4mxviavh2xhlv4xidbqswsrqvmcnkpfwfwhjgy4w2dmlaoulxwad.onion +- qpcfsys2rqguha4vahdq6lbx7flc2fivrdicwxqtvh5okujrh6ami3ad.onion +- v7ttoiov7rc5aut64nfomyfwxt424ihufwvr5ilf7moeg3fwibjpjcqd.onion +- yjos5hcumgpgggm37xjmgjfzzhbjo6a7phyavutfzkh6qrlnozvajuad.onion ## 4. Privacy recommendations