-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Versions 1.2.7-1.3.4 not working with system Tor, unless a torControlPassword is specified #3987
Comments
@agb19 Actually we didn't change anything in the tor setup from v1.2.5 to v1.2.7. The only thing that changed that could be related to this is that we changed how the commandline arguments and config files are parsed. Maybe something went wrong there. |
Just had a look at the |
Hi ripcurlx, thanks for looking. Without the torControlPort argument, both 1.2.5 and 1.2.7 fail (because Tails prohibits Tor inside Tor), but they fail in identical ways so it's no problem on Bisq-side. I only had limited time, but I've made one more test to isolate the issue: I did a little cleanup on the output and pulled the following relevant snippet (note that this is a successful run of 1.2.5, showing the "expected" behaviour"):
There are two connect() calls, and from the context we understand that the first one is an attempt to probe for a Bitcoin node on the local machine port 8333, and the second one is the connection to Tor's control port (supplied via command-line as 9051). The software works correctly. When I repeat the test with version 1.2.7, I see the first connect() call to port 8333, however after the message "Connecting to running tor" This is consistent with my observation from running tcpdump on loopback, and confirms that the issue is located within the Bisq app (not a firewall issue etc). I hope this helps, and provides a portable test to reproduce the bug even on non-Tails Linuxes. |
Nevermind... found the fix at: https://bisq.wiki/Bisq_on_tails |
@agb19 can you confirm this issue is resolved in v1.3.2 or later and close this bug if so? since Bisq now supports Tor v3 it should no longer be an issue |
I have bad news and good news. Per the original issue: So, by specifying a Tor control password even though one was not needed (remember we're using onion-grater which manages access control in a different way), Bisq started attempting to connect to the system Tor as intended. Tested and confirmed for versions 1.2.7 and 1.3.4. On this basis, I think this issue can be changed to lower severity. However, the failure condition still exists, is unexpected and with a non-obvious solution, so I believe some kind of fix is still necessary. Changing title for clarity and leaving open for now. |
Description
There seems to be a regression in version 1.2.7 that breaks the option to use existing Tor instead of builtin.
Version
Bisq 1.2.7 - FAILS
Bisq 1.2.5 - works
OS = Tails 4.3
Steps to reproduce
wget https://gist.githubusercontent.com/agb19/549eb605937ccda4c12ba5f621505299/raw/c59ea445e1de8ec468590a2ce4dd5c4ac4c71e37/bisq-debug.yml
sudo cp -fa bisq-debug.yml /etc/onion-grater.d/
wget https://github.com/bisq-network/bisq/releases/download/v1.2.7/Bisq-64bit-1.2.7.deb https://github.com/bisq-network/bisq/releases/download/v1.2.5/Bisq-64bit-1.2.5.deb
sudo dpkg --install Bisq-64bit-1.2.5.deb
sudo mv -f /opt/Bisq /opt/Bisq-1.2.5
sudo dpkg --install Bisq-64bit-1.2.7.deb
sudo mv -f /opt/Bisq /opt/Bisq-1.2.7
/opt/Bisq-1.2.5/Bisq --logLevel=INFO --torControlPort=9051
, or/opt/Bisq-1.2.7/Bisq --logLevel=INFO --torControlPort=9051
Expected behaviour
Versions 1.2.5 as well as 1.2.7 should start up and operate as intended.
Actual behaviour
Version 1.2.5 starts up and runs OK.
Version 1.2.7 appears to time out connecting to system Tor.
tcpdump
running on the loopback interface doesn't show any connection attempts to port 9051.Logs
Device or machine
Tails 4.3 (Debian 10.3)
The text was updated successfully, but these errors were encountered: