Namecoin Resolution with Tor
Namecoin can be used for name resolution with Tor. This guide covers how to set this up.
Warning: this is beta software, and is not suitable for production use. It is being made available for testing purposes only. It’s using experimental API’s that may be replaced or removed in the future, and it will make your Tor client stand out from everyone else.
Install Tor
Hopefully you’ve already done this. Note that these instructions are not tested in any way with Whonix, Tails, or Subgraph OS; such systems use control port filters that may cause problems.
Install a Namecoin name lookup client
If you’re using the ncdns for Windows installer, you can skip this step.
This could be either Namecoin Core or ConsensusJ-Namecoin. Note that if you’re using Namecoin Core, you may wish to make Namecoin Core route its traffic over Tor (this procedure should be identical as what you’d do for Bitcoin Core). ConsensusJ-Namecoin doesn’t yet support routing its traffic over Tor. If you’re using ConsensusJ-Namecoin, it is strongly recommended that you use leveldbtxcache
mode (this is the default if you’re running the shortcut created by the ncdns for Windows installer; it is not the default if you’re running it from the command line); this is because the other modes will generate network traffic that isn’t subject to stream isolation. Electrum-NMC is not recommended because it will generate network traffic that isn’t subject to stream isolation.
Install ncdns
See ncdns documentation.
You should install ncdns on a machine which has a trusted network path to the machine running Tor. It is not necessary to install Dnssec-Trigger if you’re only planning to use Namecoin resolution with Tor.
Warning: ncdns caches responses by default, which may pose a deanonymization vector.
Install dns-prop279
dns-prop279 can be downloaded at the Beta Downloads page. The build is not yet reproducible.
If you want to build from source:
go get github.com/namecoin/dns-prop279
Warning: all errors encountered by dns-prop279 will be reported as NXDOMAIN, even if that’s not the actual error that occurred.
Install TorNS
TorNS (by meejah) is available on GitHub.
The _service_to_command
configuration in poc.py should look like this (assuming that ncdns is listening on 127.0.0.1 port 5391; fill in the path to where your dns-prop279 binary is located accordingly):
_service_to_command = {
"bit.onion": ['/path/to/dns-prop279', '-port', '5391', '@127.0.0.1'],
"bit": ['/path/to/dns-prop279', '-port', '5391', '@127.0.0.1'],
}
If you’re using Tor Browser Bundle, or are otherwise using a non-default Tor control port, you’ll need to update the control port in poc.py
as per the TorNS documentation.
Running it
Make sure that the name lookup client, ncdns, and Tor are running. Then, run python poc.py
in the TorNS directory. It should automatically configure Tor to use Namecoin for any domain name lookups that end in .bit
or .bit.onion
. Here’s a screenshot of the Tor example rendezvous points page:
Semantically, .bit.onion
means that a domain name will always resolve to a .onion
address (meaning that .bit.onion
names are encrypted and authenticated regardless of whether TLS is used); .bit
means that a domain name will resolve to any of .onion
, IPv6, IPv4, or CNAME, meaning that .bit
names are only encrypted and authenticated if TLS is used. These semantics are open to revision later, as the Tor community evolves its canonical naming semantics.
Namecoin name owners can specify a .onion
domain via the txt
field in the _tor
subdomain of their name. This specification is open to revision later, as the Tor community evolves its canonical naming specifications. (In particular, it is possible that TXT
records might be replaced with SRV
records.)