torcontrol: Add comment explaining Proxy credential randomization for Tor privacy

Signed-off-by: Eval EXEC <execvy@gmail.com>
This commit is contained in:
Eval EXEC 2025-03-03 23:26:04 +08:00
parent ec5c0b26ce
commit 8e4a0ddd50
No known key found for this signature in database
GPG key ID: 0F0272C0D3AC91F7

View file

@ -403,7 +403,11 @@ void TorController::get_socks_cb(TorControlConnection& _conn, const TorControlRe
Assume(resolved.IsValid()); Assume(resolved.IsValid());
LogDebug(BCLog::TOR, "Configuring onion proxy for %s\n", resolved.ToStringAddrPort()); LogDebug(BCLog::TOR, "Configuring onion proxy for %s\n", resolved.ToStringAddrPort());
Proxy addrOnion = Proxy(resolved, true);
// With m_randomize_credentials = true, generates unique SOCKS credentials per proxy connection (e.g., Tor).
// Prevents connection correlation and enhances privacy by forcing different Tor circuits.
// Requires Tor's IsolateSOCKSAuth (default enabled) for effective isolation (see IsolateSOCKSAuth section in https://2019.www.torproject.org/docs/tor-manual.html.en).
Proxy addrOnion = Proxy(resolved, /*_randomize_credentials=*/ true);
SetProxy(NET_ONION, addrOnion); SetProxy(NET_ONION, addrOnion);
const auto onlynets = gArgs.GetArgs("-onlynet"); const auto onlynets = gArgs.GetArgs("-onlynet");