Running Monero Open Node + Tor Onion¶
Powerful setup
This is great contribution to Monero network and also a pretty sophisticated personal setup. If you are a beginner, you don't need this.
The end goal
You will publicly offer the following services, where xxx.yyy.zzz.vvv is your server IP address.
- xxx.yyy.zzz.vvv:18080 - clearnet P2P service (for other nodes)
- xxx.yyy.zzz.vvv:18081 - clearnet RPC service (for wallets)
- yourlongv3onionaddress.onion:18083 - onion P2P service (for other onion nodes)
- yourlongv3onionaddress.onion:18081 - onion RPC service (for wallets connecting over Tor)
Why different P2P ports for clearnet and onion? This is a monerod
requirement.
Broadcasting bad transactions from your IP
As with any public data broadcast or relay service, "bad traffic" or in this case "bad transactions" may appear to originate from your server IP address from an outside observer perspective - even though they really originate from a remote wallet user. This is a potential risk you need to keep in mind.
Why run this specific setup?¶
You will be able to connect your desktop and mobile Monero wallets to your own trusted Monero node, in a secure and private way over Tor. Your node will be always ready w/o delays (always synced up, contrary to intermittently running node on a laptop).
Serving blocks and transactions in Monero P2P network helps new users to bootstrap and sync up their nodes. It also strenghtens Monero P2P network against DDoS attacks and network partitioning.
Open wallet inteface (the "RPC") allows anyone to connect their wallets to Monero network through your node. This is useful for beginner users who don't run their own nodes yet.
Tor onion for wallet interface is useful for wallet users connecting over Tor because it mitigates Tor exit nodes MiTM risks (which are very real). By connecting wallet to an onion service, no MiTM attack is realistic because within the Tor network connections are end-to-end TLS-ed.
Tor onion for P2P network is useful for other full node users as it allows them to broadcast transactions over Tor (using --tx-proxy
option).
Assumptions¶
You understand basic Linux administration. You seek Monero specific guidance.
You have root access to a Linux server with 2GB+ RAM and 120GB+ SSD (or 50GB+ for the pruned node version). This is current for Jan 2021.
Some commands assume Ubuntu but you will easily translate them to your distribution.
Install Tor¶
Modify /etc/tor/torrc
as shown below.
Enable tor service with systemctl enable tor
and restart it via systemctl restart tor
Verify the Tor is up systemctl status tor@default
A fresh onion address and corresponding key pair got created for you by the tor
daemon in /var/lib/tor/monero/
. You may want to backup these to secure control over your onion address. This happens on restart whenever you add new HiddenServiceDir
to torrc
config.
Monero daemon itself is not necessary at this point. The onion services (AKA hidden services) will just wait until localhost monerod
shows up at specified ports 18081 and 18083.
/etc/tor/torrc¶
HiddenServiceDir /var/lib/tor/monero
HiddenServicePort 18081 127.0.0.1:18081 # interface for wallet ("RPC")
HiddenServicePort 18083 127.0.0.1:18083 # interface for P2P network
How Tor onion services work?
The tor
daemon will simply pass over the traffic from virtual onion port to actual localhost port, where some service is listening (in our case, this will be monerod
). A single onion address can offer multiple services at various virtual ports. We will use this to expose both P2P and RPC monerod
services on a single onion. You could host any number of onion addresses at single server or IP address but we won't need that here.
Install Monero¶
Create monero
user and group useradd --system monero
Create monero binaries directory (empty for now) mkdir -p /opt/monero
and chown -R monero:monero /opt/monero
Create monero data directory mkdir -p /srv/monero
and chown -R monero:monero /srv/monero
Create monero log directory mkdir -p /var/log/monero
and chown -R monero:monero /var/log/monero
Feel free to adjust above to your preferred conventions, just remember to adjust the paths accordingly.
Extract tar -xf monero-linux-x64-v0.17.1.9.tar.bz2
(adjust filename).
Move binaries to /opt/monero/
with mv monero-x86_64-linux-gnu-v0.17.1.9/* /opt/monero/
then chown -R monero:monero /opt/monero
Create /etc/monero.conf
as shown below and paste your values in placeholders.
Create /etc/systemd/system/monero.service
as shown below.
Enable monero service with systemctl enable monero
and restart it with systemctl restart monero
Verify it is up systemctl status monero
Verify it is working as intended tail -n100 /var/log/monero/monero.log
/etc/monero.conf¶
This is just an example configuration and it is by no means authoritative. Feel free to modify, see monerod reference.
Modify paths if you changed them.
Print your onion address with cat /var/lib/tor/monero/hostname
and paste it to anonymous-inbound
option.
# /etc/monero.conf
#
# Configuration file for monerod. For all available options see the MoneroDocs:
# https://monerodocs.org/interacting/monerod-reference/
# Data directory (blockchain db and indices)
data-dir=/srv/monero
# Optional prunning
# prune-blockchain=1 # Pruning saves 2/3 of disk space w/o degrading functionality but contributes less to the network
# sync-pruned-blocks=1 # Allow downloading pruned blocks instead of prunning them yourself
check-updates=disabled # Do not check DNS TXT records for a new version
# Log file
log-file=/var/log/monero/monero.log
log-level=0 # Minimal logs, WILL NOT log peers or wallets connecting
max-log-file-size=2147483648 # Set to 2GB to mitigate log trimming by monerod; configure logrotate instead
# P2P full node
p2p-bind-ip=0.0.0.0 # Bind to all interfaces (the default)
p2p-bind-port=18080 # Bind to default port
# RPC open node
public-node=1 # Advertise to other users they can use this node as a remote one for connecting their wallets
confirm-external-bind=1 # Open Node (confirm)
rpc-bind-ip=0.0.0.0 # Bind to all interfaces (the Open Node)
rpc-bind-port=18081 # Bind to default port (the Open Node)
restricted-rpc=1 # Obligatory for Open Node interface
no-igd=1 # Disable UPnP port mapping
no-zmq=1 # Disable ZMQ RPC server to decrease attack surface (it's not used)
# RPC TLS
rpc-ssl=autodetect # Use TLS if client wallet supports it (the default behavior); the certificate will be generated on the fly on every restart
# Mempool size
max-txpool-weight=268435456 # Maximum unconfirmed transactions pool size in bytes (here 256MB, default ~618MB)
# Slow but reliable db writes
db-sync-mode=safe
out-peers=64 # This will enable much faster sync and tx awareness; the default 8 is suboptimal nowadays
in-peers=64 # The default is unlimited; we prefer to put a cap on this
limit-rate-up=1048576 # 1048576 kB/s == 1GB/s; a raise from default 2048 kB/s; contribute more to p2p network
limit-rate-down=1048576 # 1048576 kB/s == 1GB/s; a raise from default 8192 kB/s; allow for faster initial sync
# Tor: broadcast transactions originating from connected wallets over Tor (does not concern relayed transactions)
tx-proxy=tor,127.0.0.1:9050,16
# Tor: add P2P seed nodes for the Tor network
add-peer=moneroxmrxw44lku6qniyarpwgznpcwml4drq7vb24ppatlcg4kmxpqd.onion:18080
add-peer=monerozf6koypqrt.onion:18080
add-peer=zbjkbsxc5munw3qusl7j2hpcmikhqocdf4pqhnhtpzw5nt5jrmofptid.onion:18083 # https://github.com/monero-project/monero/blob/master/src/p2p/net_node.inl
add-peer=rno75kjcw3ein6i446sqby2xkyqjarb75oq36ah6c2mribyklzhurpyd.onion:28083 # it's mainnet despite the weird port, according to reddit
add-peer=sqzrokz36lgkng2i2nlzgzns2ugcxqosflygsxbkybb4xn6gq3ouugqd.onion:18083 # very flaky, works 1 in 3 times
# Tor: tell monerod your onion address so it can be advertised on P2P network
anonymous-inbound=PASTE_YOUR_ONION_HOSTNAME:18083,127.0.0.1:18083,64
# Tor: be forgiving to connecting wallets; suggested by http://xmrguide42y34onq.onion/remote_nodes
disable-rpc-ban=1
/etc/.../monero.service¶
# /etc/systemd/system/monero.service
[Unit]
Description=Monero Daemon
After=network.target
Wants=network.target
[Service]
ExecStart=/opt/monero/monerod --detach --config-file /etc/monero.conf --pidfile /run/monero/monerod.pid
ExecStartPost=/bin/sleep 0.1
Type=forking
PIDFile=/run/monero/monerod.pid
Restart=always
RestartSec=16
User=monero
Group=monero
RuntimeDirectory=monero
StandardOutput=journal
StandardError=journal
[Install]
WantedBy=multi-user.target
Open firewall ports¶
If you use a firewall (and you should), open 18080
and 18081
ports for incoming TCP connections. These are for the incoming clearnet connections, P2P and RPC respectively.
You do not need to open any ports for Tor. The onion services work with virtual ports. The tor
daemon does not directly accept incoming connections and so it needs no open ports.
For example, for popular ufw firewall, that would be:
ufw allow 18080/tcp
ufw allow 18081/tcp
To verify, use ufw status
. The output should be similar to the following (the 22
being default SSH port, unrelated to Monero):
To Action From
-- ------ ----
22/tcp LIMIT Anywhere
18080/tcp ALLOW Anywhere
18081/tcp ALLOW Anywhere
22/tcp (v6) LIMIT Anywhere (v6)
18080/tcp (v6) ALLOW Anywhere (v6)
18081/tcp (v6) ALLOW Anywhere (v6)
Testing¶
On server¶
List all services listening on ports and make sure it is what you expect:
sudo netstat -lntpu
The output should include these (in any order); obviously the PID values will differ.
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
...
tcp 0 0 0.0.0.0:18080 0.0.0.0:* LISTEN 259255/monerod
tcp 0 0 0.0.0.0:18081 0.0.0.0:* LISTEN 259255/monerod
tcp 0 0 127.0.0.1:18083 0.0.0.0:* LISTEN 259255/monerod
tcp 0 0 127.0.0.1:9050 0.0.0.0:* LISTEN 258786/tor
On client machine¶
Finally, we want to test connections from your client machine.
Install tor
and torsocks
on your laptop, you will want them anyway for Monero wallet.
Just for testing, you will also need nmap
and proxychains
.
Test clearnet P2P connection:
nmap -Pn -p 18080 YOUR_IP_ADDRESS_HERE
Test clearnet RPC connection:
curl --digest -X POST http://YOUR_IP_ADDRESS_HERE:18081/json_rpc -d '{"jsonrpc":"2.0","id":"0","method":"get_info"}' -H 'Content-Type: application/json'
Test onion P2P connection (skip if you don't have proxychains):
proxychains nmap -Pn -p 18083 YOUR_ONION_ADDRESS_HERE.onion
Test onion RPC connection:
torsocks curl --digest -X POST http://YOUR_ONION_ADDRESS_HERE.onion:18081/json_rpc -d '{"jsonrpc":"2.0","id":"0","method":"get_info"}' -H 'Content-Type: application/json'
Debugging¶
Tor:
- Status:
systemctl status tor@default
- Logs:
journalctl -xe --unit tor@default
Monero:
- Status:
systemctl status monero
- Logs:
tail -n100 /var/log/monero/monero.log
- Logs more info: change
log-level=0
tolog-level=1
inmonero.conf
(remember to revert once solved)
Further improvements¶
Periodic restarts¶
It's likely worthwhile to add peridic auto-restarting to both tor
and monerod
every couple hours. Neither daemon is perfect; they can get stuck or leak memory in edge case situations, like the recent attacks on Tor v3 or DDoS attacks on the Monero network. One possible way would be to use systemd timers.