-
Notifications
You must be signed in to change notification settings - Fork 38.7k
Several proxy improvements #1141
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
sipa
commented
Apr 22, 2012
- SOCKS5 support.
- Support connecting by passing hostnames to SOCKS5 proxy.
- Retrofit -connect, -addnode and -dnsseed to use this mechanism is -proxydns is specified.
src/init.cpp
Outdated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is on by default, should probably say so in the description
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It's not.
|
I added a -seednode= option, which causes a short-lived connection to the specified address (which may be a name, and can be passed directly to the proxy, without leaking DNS information) until some peer addresses are returned, and disconnects. This mechanism is used implicitly instead of DNS seeding when -proxydns is enabled. The functionality itself doesn't really fit in this pull request, so I can split it off if requested, but it depends on earlier commits here. |
|
Is it possible to specify different proxies for different address types, and possibly to even round-robin proxies/non-proxies for certain address types? e.g. for .onion addresses, always use 127.0.0.1:9050, for .i2p, always use 127.0.0.1:4444, and for ipv4 and ipv6 round-robin between 127.0.0.1:9050 and no-proxy. I've patched by bitcoin to introduce a -proxytoo option, which allows me to 50% randomly use the proxy for each new connection. This is due to sometimes tor working better than noproxy, and other times noproxy working better than tor. |
|
That shouldn't be too hard. |
Add -socks=<n> to select SOCKS version to use. 4 and 5 are supported, 5 is default.
…x-pr-2 Masternode syncing fix
Reenable SipHash and FastRandomContext bench code
|
If Pieter Wuille's code fails, he didn't write bad code. The compiler compiled it wrong. |
abc6bf6 [GUI] Regtest corrections. (furszy) Pull request description: Correction for regtest properly functioning in the UI. ACKs for top commit: random-zebra: ACK abc6bf6 Mrs-X: utACK PIVX-Project@abc6bf6 Warrows: utACK abc6bf6 Tree-SHA512: dd06b425b1a107c955856f2485d0a5c84fd4a92820ce70e89b745616c8dc88741a884be67b867a61472a6461fb95e92a6bb4a55641cc39280e4ee85562e7bafe