--- title: Running Monero Open Node with Tor Onion Support --- # Running Monero Open Node + Tor Onion !!! success "Powerful setup" This is great contribution to Monero network and also a pretty sophisticated personal setup. If you are a beginner, you don't need this. !!! info "The end goal" You will publicly offer the following services, where xxx.yyy.zzz.vvv is your server IP address. * xxx.yyy.zzz.vvv:18080 - clearnet P2P service (for other nodes) * xxx.yyy.zzz.vvv:18081 - clearnet RPC service (for wallets) * yourlongv3onionaddress.onion:18083 - onion P2P service (for other onion nodes) * yourlongv3onionaddress.onion:18081 - onion RPC service (for wallets connecting over Tor) Why different P2P ports for clearnet and onion? This is a `monerod` requirement. !!! warning "Broadcasting bad transactions from your IP" As with any public data broadcast or relay service, "bad traffic" or in this case "bad transactions" may appear to originate from your server IP address from an outside observer perspective - even though they really originate from a remote wallet user. This is a potential risk you need to keep in mind. ## Why run this specific setup? You will be able to connect your desktop and mobile Monero wallets to your own trusted Monero node, in a secure and private way over Tor. Your node will be always ready w/o delays (always synced up, contrary to intermittently running node on a laptop). **Serving blocks and transactions** in Monero P2P network helps new users to bootstrap and sync up their nodes. It also strenghtens Monero P2P network against DDoS attacks and network partitioning. **Open wallet inteface** (the "RPC") allows anyone to connect their wallets to Monero network through your node. This is useful for beginner users who don't run their own nodes yet. **Tor onion for wallet interface** is useful for wallet users connecting over Tor because it mitigates Tor exit nodes MiTM risks (which are very real). By connecting wallet to an onion service, no MiTM attack is realistic because within the Tor network connections are end-to-end TLS-ed. **Tor onion for P2P network** is useful for other full node users as it allows them to broadcast transactions over Tor (using `--tx-proxy` option). ## Assumptions You understand basic Linux administration. You seek Monero specific guidance. You have root access to a Linux server with 2GB+ RAM and 120GB+ SSD (or 50GB+ for the pruned node version). This is current for Jan 2021. Some commands assume Ubuntu but you will easily translate them to your distribution. ## Install Tor [Install Tor](https://2019.www.torproject.org/docs/debian.html.en#ubuntu). Modify `/etc/tor/torrc` as shown below. Enable tor service with `systemctl enable tor` and restart it via `systemctl restart tor` Verify the Tor is up `systemctl status tor@default` A fresh onion address and corresponding key pair got created for you by the `tor` daemon in `/var/lib/tor/monero/`. You may want to backup these to secure control over your onion address. This happens on restart whenever you add new `HiddenServiceDir` to `torrc` config. Monero daemon itself is not necessary at this point. The onion services (AKA hidden services) will just wait until localhost `monerod` shows up at specified ports 18081 and 18083. ### /etc/tor/torrc ``` ApacheConf HiddenServiceDir /var/lib/tor/monero HiddenServicePort 18081 127.0.0.1:18081 # interface for wallet ("RPC") HiddenServicePort 18083 127.0.0.1:18083 # interface for P2P network ``` ??? info "How Tor onion services work?" The `tor` daemon will simply pass over the traffic from virtual onion port to actual localhost port, where some service is listening (in our case, this will be `monerod`). A single onion address can offer multiple services at various virtual ports. We will use this to expose both P2P and RPC `monerod` services on a single onion. You could host any number of onion addresses at single server or IP address but we won't need that here. ## Install Monero Create `monero` user and group `useradd --system monero` Create monero **binaries** directory (empty for now) `mkdir -p /opt/monero` and `chown -R monero:monero /opt/monero` Create monero **data** directory `mkdir -p /srv/monero` and `chown -R monero:monero /srv/monero` Create monero **log** directory `mkdir -p /var/log/monero` and `chown -R monero:monero /var/log/monero` Feel free to adjust above to your preferred conventions, just remember to adjust the paths accordingly. [Download](/interacting/download-monero-binaries/) and [verify](/interacting/verify-monero-binaries/) the file. Extract `tar -xf monero-linux-x64-v0.17.1.9.tar.bz2` (adjust filename). Move binaries to `/opt/monero/` with `mv monero-x86_64-linux-gnu-v0.17.1.9/* /opt/monero/` then `chown -R monero:monero /opt/monero` Create `/etc/monero.conf` as shown below and **paste your values in placeholders**. Create `/etc/systemd/system/monero.service` as shown below. Enable monero service with `systemctl enable monero` and restart it with `systemctl restart monero` Verify it is up `systemctl status monero` Verify it is working as intended `tail -n100 /var/log/monero/monero.log` ### /etc/monero.conf This is just an example configuration and it is by no means authoritative. Feel free to modify, see [monerod reference](/interacting/monerod-reference). Modify paths if you changed them. Print your onion address with `cat /var/lib/tor/monero/hostname` and paste it to `anonymous-inbound` option. ``` YAML # /etc/monero.conf # # Configuration file for monerod. For all available options see the MoneroDocs: # https://monerodocs.org/interacting/monerod-reference/ # Data directory (blockchain db and indices) data-dir=/srv/monero # Optional prunning # prune-blockchain=1 # Pruning saves 2/3 of disk space w/o degrading functionality but contributes less to the network # sync-pruned-blocks=1 # Allow downloading pruned blocks instead of prunning them yourself check-updates=disabled # Do not check DNS TXT records for a new version # Log file log-file=/var/log/monero/monero.log log-level=0 # Minimal logs, WILL NOT log peers or wallets connecting max-log-file-size=2147483648 # Set to 2GB to mitigate log trimming by monerod; configure logrotate instead # P2P full node p2p-bind-ip=0.0.0.0 # Bind to all interfaces (the default) p2p-bind-port=18080 # Bind to default port # RPC open node public-node=1 # Advertise to other users they can use this node as a remote one for connecting their wallets confirm-external-bind=1 # Open Node (confirm) rpc-bind-ip=0.0.0.0 # Bind to all interfaces (the Open Node) rpc-bind-port=18081 # Bind to default port (the Open Node) restricted-rpc=1 # Obligatory for Open Node interface no-igd=1 # Disable UPnP port mapping no-zmq=1 # Disable ZMQ RPC server to decrease attack surface (it's not used) # RPC TLS rpc-ssl=autodetect # Use TLS if client wallet supports it (the default behavior); the certificate will be generated on the fly on every restart # Mempool size max-txpool-weight=268435456 # Maximum unconfirmed transactions pool size in bytes (here 256MB, default ~618MB) # Slow but reliable db writes db-sync-mode=safe out-peers=64 # This will enable much faster sync and tx awareness; the default 8 is suboptimal nowadays in-peers=64 # The default is unlimited; we prefer to put a cap on this limit-rate-up=1048576 # 1048576 kB/s == 1GB/s; a raise from default 2048 kB/s; contribute more to p2p network limit-rate-down=1048576 # 1048576 kB/s == 1GB/s; a raise from default 8192 kB/s; allow for faster initial sync # Tor: broadcast transactions originating from connected wallets over Tor (does not concern relayed transactions) tx-proxy=tor,127.0.0.1:9050,16 # Tor: add P2P seed nodes for the Tor network add-peer=moneroxmrxw44lku6qniyarpwgznpcwml4drq7vb24ppatlcg4kmxpqd.onion:18080 add-peer=monerozf6koypqrt.onion:18080 add-peer=zbjkbsxc5munw3qusl7j2hpcmikhqocdf4pqhnhtpzw5nt5jrmofptid.onion:18083 # https://github.com/monero-project/monero/blob/master/src/p2p/net_node.inl add-peer=rno75kjcw3ein6i446sqby2xkyqjarb75oq36ah6c2mribyklzhurpyd.onion:28083 # it's mainnet despite the weird port, according to reddit add-peer=sqzrokz36lgkng2i2nlzgzns2ugcxqosflygsxbkybb4xn6gq3ouugqd.onion:18083 # very flaky, works 1 in 3 times # Tor: tell monerod your onion address so it can be advertised on P2P network anonymous-inbound=PASTE_YOUR_ONION_HOSTNAME:18083,127.0.0.1:18083,64 # Tor: be forgiving to connecting wallets; suggested by http://xmrguide42y34onq.onion/remote_nodes disable-rpc-ban=1 ``` ### /etc/.../monero.service ``` INI # /etc/systemd/system/monero.service [Unit] Description=Monero Daemon After=network.target Wants=network.target [Service] ExecStart=/opt/monero/monerod --detach --config-file /etc/monero.conf --pidfile /run/monero/monerod.pid ExecStartPost=/bin/sleep 0.1 Type=forking PIDFile=/run/monero/monerod.pid Restart=always RestartSec=16 User=monero Group=monero RuntimeDirectory=monero StandardOutput=journal StandardError=journal [Install] WantedBy=multi-user.target ``` ## Open firewall ports If you use a firewall (and you should), open `18080` and `18081` ports for incoming TCP connections. These are for the incoming **clearnet** connections, P2P and RPC respectively. You **do not** need to open any ports for Tor. The onion services work with virtual ports. The `tor` daemon does not directly accept incoming connections and so it needs no open ports. For example, for popular ufw firewall, that would be: ``` Bash ufw allow 18080/tcp ufw allow 18081/tcp ``` To verify, use `ufw status`. The output should be similar to the following (the `22` being default SSH port, unrelated to Monero): ``` To Action From -- ------ ---- 22/tcp LIMIT Anywhere 18080/tcp ALLOW Anywhere 18081/tcp ALLOW Anywhere 22/tcp (v6) LIMIT Anywhere (v6) 18080/tcp (v6) ALLOW Anywhere (v6) 18081/tcp (v6) ALLOW Anywhere (v6) ``` ## Testing ### On server List all services listening on ports and make sure it is what you expect: `sudo netstat -lntpu` The output should include these (in any order); obviously the PID values will differ. ``` Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name ... tcp 0 0 0.0.0.0:18080 0.0.0.0:* LISTEN 259255/monerod tcp 0 0 0.0.0.0:18081 0.0.0.0:* LISTEN 259255/monerod tcp 0 0 127.0.0.1:18083 0.0.0.0:* LISTEN 259255/monerod tcp 0 0 127.0.0.1:9050 0.0.0.0:* LISTEN 258786/tor ``` ### On client machine Finally, we want to test connections from your client machine. Install `tor` and `torsocks` on your laptop, you will want them anyway for Monero wallet. Just for testing, you will also need `nmap` and `proxychains`. Test **clearnet P2P** connection: `nmap -Pn -p 18080 YOUR_IP_ADDRESS_HERE` Test **clearnet RPC** connection: `curl --digest -X POST http://YOUR_IP_ADDRESS_HERE:18081/json_rpc -d '{"jsonrpc":"2.0","id":"0","method":"get_info"}' -H 'Content-Type: application/json'` Test **onion P2P** connection (skip if you don't have proxychains): `proxychains nmap -Pn -p 18083 YOUR_ONION_ADDRESS_HERE.onion` Test **onion RPC** connection: `torsocks curl --digest -X POST http://YOUR_ONION_ADDRESS_HERE.onion:18081/json_rpc -d '{"jsonrpc":"2.0","id":"0","method":"get_info"}' -H 'Content-Type: application/json'` ## Debugging Tor: * Status: `systemctl status tor@default` * Logs: `journalctl -xe --unit tor@default` Monero: * Status: `systemctl status monero` * Logs: `tail -n100 /var/log/monero/monero.log` * Logs more info: change `log-level=0` to `log-level=1` in `monero.conf` (remember to revert once solved) ## Further improvements ### Periodic restarts It's likely worthwhile to add peridic auto-restarting to both `tor` and `monerod` every couple hours. Neither daemon is perfect; they can get stuck or leak memory in edge case situations, like the recent attacks on Tor v3 or DDoS attacks on the Monero network. One possible way would be to use systemd timers.