[tor-dev] DirAuth usage and 503 try again later

2021-01-15 Thread James
Sebastian, Thank you for comments. First of all, sorry if torpy hurt in some way Tor Network. It was unintentionally. In any case, it seems to me that if there was some high-level description of logic for official tor client, it would be very useful. >First, I found this string in the code:

[tor-dev] DirAuth usage and 503 try again later

2021-01-11 Thread James
Good day. Is there any chance that torpy (https://github.com/torpyorg/torpy) was triggered this issue https://gitlab.torproject.org/tpo/core/tor/-/issues/33018 ? Some wary facts: - Torpy using old fashion consensus (not mircodesc) - When consensus not present in cache (first time usage) it do

Re: [tor-dev] New python Tor client implementation

2019-10-21 Thread James
Hi Damian, Sorry for the late reply. There are two things why I didn't use Stem. 1. A number of python implementations I've found on the internet had broken dependencies or didn't work at all. So, I decided to create a fully functional Tor client with the bare minimum of dependencies. 2. Up un

[tor-dev] New python Tor client implementation

2019-10-17 Thread James Brown
Hello all, Recently I finished a pure python implementation of the Tor client. It's called torpy (https://github.com/torpyorg/torpy). It offers handy API, supports v2 hidden services with "basic" and "stealth" authorization protocol. Works with python 3.6+.It has no dependencies on the original C T

[tor-dev] Adding Single Onion Service support to Bitcoin Core

2017-04-08 Thread James Evans
Core is preparing to support this new tor feature. Any helpful suggestions would be appreciated. :) https://github.com/bitcoin/bitcoin/issues/9836 https://github.com/bitcoin/bitcoin/pull/10161 Thanks for all the great onion work! James ___ tor-dev