-
Notifications
You must be signed in to change notification settings - Fork 2.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support 'ed25519v1-secret' format onion v3 keys #5750
Comments
Would be nice to support this.
Haven't tested this on a real key, but should work more or less. |
That creates a file with Also, TOR will create two files; |
Good timing as I was just playful around with this too. Oli’s command didn’t work for me either. I’ve tried a bunch of different ways with no luck. I either get a failure trying to read the key or a strange error about Missing Port in Argument |
Looking at the Tor spec, it seems like it expects base64 and not base32 for the key. Nonetheless, it still doesn't work when I use Oli's command with base64. I booted up Tor and I'm trying to use the
I wonder if there's more parsing that needs to be done with the |
To convert back and forth, you can
and
You can drop the hs_ed25519_secret_key in the hidden service directory, and tor will create the hostname and hs_ed25519_public_key files automatically. |
You can also set up the service in torrc and remove the tor.v3 line on lnd.conf, leaving
change the externalip to your own onion address. This is our current setup and only advertises one onion. We converted the original v3_onion_private_key to a hs_ed25519_secret_key to keep our old address connectable for while until everyone's graph syncs. |
Thanks for the help, @lnd-routing . That worked! I went with the conversion as it's easier for automation. I also figured out what my |
Note #5757 is why we use torrc instead of letting lnd manage the address. |
I had a problem with a \n at the end of the key and somewhere near to the middle when using the proposed echo " ... " command. This small modification seems to solve both issues for me:
|
FYI, on MacOS the Cupertino ships the BSD version of Alternatively, you can use the GNU version ( |
The last echo command apparently seems to generate the v3_onion_private_key, but when lnd starts it fails:
What is the current way of not letting lnd generate on onion and use an external onion generate from hs_ed25519_secret_key ? |
Background
The TOR service will generate keys that start with
== ed25519v1-secret: type0 ==
followed by code that isn't representable in ascii. LND generates a keyfile that starts withED25519-V3
followed by base64. I wish for LND to support TOR's native v3 onion key format or offer a flag to remove the auto-generated onion address advertisement. It doesn't matter to me if the TOR service hosts the keys or not, I just don't want two onion URIs in LND.Your environment
lnd 13.1
debian 10
bitcoind 0.21.1
tor 0.4.5.10
Expected behavior
I need LND to have
tor.active=true
and only advertise one URI which is derived from TOR style v3 keys.Actual behavior
I end up with two onion addresses in
lncli getinfo
; one from LND and another from the tor service.Notes
I'm really sorry to be so persistent about this. Thank you for your help.
The text was updated successfully, but these errors were encountered: