The Tor Project issueshttps://gitlab.torproject.org/groups/tpo/-/issues2020-06-27T13:58:42Zhttps://gitlab.torproject.org/tpo/core/tor/-/issues/19488Typo in cert-spec.txt2020-06-27T13:58:42ZtwimTypo in cert-spec.txtThere is no `Length`, it should be `ExtLength`.There is no `Length`, it should be `ExtLength`.https://gitlab.torproject.org/tpo/core/tor/-/issues/19489dir-spec.txt: Clarify identity key2020-06-27T13:58:42Ztwimdir-spec.txt: Clarify identity keySpecify which key we exactly use.Specify which key we exactly use.Tor: 0.2.9.x-finalhttps://gitlab.torproject.org/tpo/core/tor/-/issues/19490dir-spec.txt: Make a "may" be more defined2020-06-27T13:58:42Ztwimdir-spec.txt: Make a "may" be more definedSee the patch below.See the patch below.https://gitlab.torproject.org/tpo/core/tor/-/issues/19492dir-spec.txt: Simplify router-sig-ed25519 description2020-06-27T13:58:42Ztwimdir-spec.txt: Simplify router-sig-ed25519 descriptionThere is new type of remark that simplifies description of the fields. Let's apply it.There is new type of remark that simplifies description of the fields. Let's apply it.Tor: 0.2.9.x-finalhttps://gitlab.torproject.org/tpo/core/tor/-/issues/19493dir-spec.txt: Fix a typo2020-06-27T13:58:42Ztwimdir-spec.txt: Fix a typoTor: 0.2.9.x-finalhttps://gitlab.torproject.org/tpo/core/tor/-/issues/19495dir-spec.txt: Fix a typo2020-06-27T13:58:42Ztwimdir-spec.txt: Fix a typoTor: 0.2.9.x-finalhttps://gitlab.torproject.org/tpo/core/tor/-/issues/19497OpenSSL 1.1.0-pre5 breaks with 0.2.8.4-rc and 0.2.9.0-dev2020-06-27T13:58:42ZcypherpunksOpenSSL 1.1.0-pre5 breaks with 0.2.8.4-rc and 0.2.9.0-devBoth 0.2.8.4-rc and master fails to compile against OpenSSL 1.1.0-pre5, regardless if --enable-static-openssl is enabled or not. The src/common/aes.c translation unit consistently fails due to incorrect/unexposed type declaration for 'e...Both 0.2.8.4-rc and master fails to compile against OpenSSL 1.1.0-pre5, regardless if --enable-static-openssl is enabled or not. The src/common/aes.c translation unit consistently fails due to incorrect/unexposed type declaration for 'evp':
src/common/aes.c: At top level:
src/common/aes.c:141:20: error: field 'evp' has incomplete type
EVP_CIPHER_CTX evp;
^
Makefile:3543: recipe for target 'src/common/aes.o' failed
make[1]: *** [src/common/aes.o] Error 1Tor: 0.2.8.x-finalhttps://gitlab.torproject.org/tpo/core/tor/-/issues/19499Compile time warnings with OpenSSL 1.1.0-pre6-dev (aka master).2020-06-27T13:58:42ZYawning AngelCompile time warnings with OpenSSL 1.1.0-pre6-dev (aka master).They changed a bunch of function prototypes since I wrote the code for legacy/trac#19406 to constify arguments passed to their RSA/DH accessors of doom.
This is trivial to fix, and should probably be done for the 0.2.8.x stable release ...They changed a bunch of function prototypes since I wrote the code for legacy/trac#19406 to constify arguments passed to their RSA/DH accessors of doom.
This is trivial to fix, and should probably be done for the 0.2.8.x stable release assuming we intend to support OpenSSL 1.1.0 if it is declared stable prior to the 0.2.9.x getting out the door.Tor: 0.2.8.x-finalYawning AngelYawning Angelhttps://gitlab.torproject.org/tpo/core/tor/-/issues/19500dir-spec.txt: Fix typos2020-06-27T13:58:41Ztwimdir-spec.txt: Fix typosTor: 0.2.9.x-finalhttps://gitlab.torproject.org/tpo/core/tor/-/issues/19503typo in src/or/routerkeys.c2020-06-27T13:58:41Zweasel (Peter Palfrader)typo in src/or/routerkeys.c```
do_getpass("Enter pasphrase for master key:",
```
could use a second s.```
do_getpass("Enter pasphrase for master key:",
```
could use a second s.Tor: 0.2.9.x-finalhttps://gitlab.torproject.org/tpo/core/tor/-/issues/19504--passphrase-fd is undocumented2020-06-27T13:58:41Zweasel (Peter Palfrader)--passphrase-fd is undocumented--passphrase-fd is undocumented--passphrase-fd is undocumentedTor: 0.2.9.x-finalhttps://gitlab.torproject.org/tpo/core/tor/-/issues/19505tor-gencert --passphrase-fd bad text2020-06-27T13:58:41Zweasel (Peter Palfrader)tor-gencert --passphrase-fd bad texttor-gencert.1 has this text.
"Filedescriptor to read the file descriptor from."tor-gencert.1 has this text.
"Filedescriptor to read the file descriptor from."Tor: 0.2.9.x-finalhttps://gitlab.torproject.org/tpo/core/tor/-/issues/19506Tool to inspect id signing certs2020-06-27T13:58:41Zweasel (Peter Palfrader)Tool to inspect id signing certsThere is no tool to figure out what is inside an ed25519_signing_cert file.
For monitoring purposes it's important we have a way to learn something like expiration date.There is no tool to figure out what is inside an ed25519_signing_cert file.
For monitoring purposes it's important we have a way to learn something like expiration date.Tor: 0.3.5.x-finalrl1987rl1987https://gitlab.torproject.org/tpo/core/tor/-/issues/19526Bug: Squid does not like URLs longer than 4095 bytes, and this one is 4442 by...2020-06-27T13:58:40ZRoger DingledineBug: Squid does not like URLs longer than 4095 bytes, and this one is 4442 bytes longOn moria1, running git master, shortly after startup:
{{{
Jun 28 22:08:46.964 [warn] directory_send_command(): Bug: Squid does not like URLs longer than 4095 bytes, and this one is 4442 bytes long: /tor/extra/d/DC6821404C2E4C1CA55E842C8B...On moria1, running git master, shortly after startup:
{{{
Jun 28 22:08:46.964 [warn] directory_send_command(): Bug: Squid does not like URLs longer than 4095 bytes, and this one is 4442 bytes long: /tor/extra/d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z (on Tor 0.2.9.0-alpha-dev 33ffeab69417d2db)https://gitlab.torproject.org/tpo/core/tor/-/issues/19534Не могу зайти в ТОР2020-06-27T13:58:40ZTracНе могу зайти в ТОРЯ мог раньше заходить в ТОР, но после обновления не могу из-за чего можете сказать
```
30.06.2016 15:52:38.700 [NOTICE] Bootstrapped 10%: Finishing handshake with directory server
30.06.2016 15:54:38.400 [NOTICE] Tried for 120 seconds ...Я мог раньше заходить в ТОР, но после обновления не могу из-за чего можете сказать
```
30.06.2016 15:52:38.700 [NOTICE] Bootstrapped 10%: Finishing handshake with directory server
30.06.2016 15:54:38.400 [NOTICE] Tried for 120 seconds to get a connection to [scrubbed]:443. Giving up. (waiting for circuit)
30.06.2016 17:04:18.000 [WARN] Problem bootstrapping. Stuck at 10%: Finishing handshake with directory server. (DONE; DONE; count 10; recommendation warn; host 847B1F850344D7876491A54892F904934E4EB85D at 86.59.21.38:443)
30.06.2016 17:04:18.000 [WARN] 10 connections have failed:
30.06.2016 17:04:18.000 [WARN] 10 connections died in state handshaking (TLS) with SSL state SSLv2/v3 read server hello A in HANDSHAKE
30.06.2016 17:16:18.000 [NOTICE] Renaming old configuration file to "C:\Users\Acer\Desktop\Tor Browser\TorBrowser\Data\Tor\torrc.orig.1"
30.06.2016 17:17:46.100 [WARN] Problem bootstrapping. Stuck at 10%: Finishing handshake with directory server. (DONE; DONE; count 11; recommendation warn; host F2044413DAC2E02E3D6BCF4735A19BCA1DE97281 at 131.188.40.189:443)
30.06.2016 17:17:46.100 [WARN] 11 connections have failed:
30.06.2016 17:17:46.200 [WARN] 11 connections died in state handshaking (TLS) with SSL state SSLv2/v3 read server hello A in HANDSHAKE
30.06.2016 17:19:05.800 [NOTICE] Delaying directory fetches: No running bridges
30.06.2016 17:19:15.700 [NOTICE] Bootstrapped 15%: Establishing an encrypted directory connection
30.06.2016 17:19:15.900 [NOTICE] Bootstrapped 20%: Asking for networkstatus consensus
30.06.2016 17:19:16.300 [NOTICE] new bridge descriptor 'ndnop0' (fresh): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED~ndnop0 at 109.105.109.163
30.06.2016 17:19:16.300 [NOTICE] I learned some more directory information, but not enough to build a circuit: We have no usable consensus.
30.06.2016 17:19:16.500 [NOTICE] Bootstrapped 25%: Loading networkstatus consensus
30.06.2016 17:19:16.800 [NOTICE] new bridge descriptor 'Unnamed' (fresh): $AF9F66B7B04F8FF6F32D455F05135250A16543C9~Unnamed at 169.229.59.75
30.06.2016 17:19:16.800 [NOTICE] I learned some more directory information, but not enough to build a circuit: We have no usable consensus.
30.06.2016 17:19:34.700 [WARN] Problem bootstrapping. Stuck at 25%: Loading networkstatus consensus. (IOERROR; IOERROR; count 12; recommendation warn; host 4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A at 109.105.109.163:47779)
30.06.2016 17:19:34.700 [WARN] 12 connections have failed:
30.06.2016 17:19:34.700 [WARN] 11 connections died in state handshaking (TLS) with SSL state SSLv2/v3 read server hello A in HANDSHAKE
30.06.2016 17:19:34.700 [WARN] 1 connections died in state handshaking (Tor, v3 handshake) with SSL state SSL negotiation finished successfully in OPEN
30.06.2016 17:19:44.000 [WARN] Proxy Client: unable to connect to 83.212.101.3:80 ("general SOCKS server failure")
30.06.2016 17:21:08.600 [WARN] Controller gave us config lines that didn't validate: Socks4Proxy failed to parse or resolve. Please fix.
30.06.2016 17:21:15.000 [WARN] Controller gave us config lines that didn't validate: HTTPSProxy failed to parse or resolve. Please fix.
30.06.2016 17:21:18.100 [WARN] Controller gave us config lines that didn't validate: Socks5Proxy failed to parse or resolve. Please fix.
30.06.2016 17:21:24.700 [WARN] Controller gave us config lines that didn't validate: Socks5Proxy failed to parse or resolve. Please fix.
30.06.2016 17:21:29.100 [WARN] Problem bootstrapping. Stuck at 25%: Loading networkstatus consensus. (IOERROR; IOERROR; count 13; recommendation warn; host 4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A at 109.105.109.163:47779)
30.06.2016 17:21:29.100 [WARN] 14 connections have failed:
30.06.2016 17:21:29.100 [WARN] 11 connections died in state handshaking (TLS) with SSL state SSLv2/v3 read server hello A in HANDSHAKE
30.06.2016 17:21:29.100 [WARN] 2 connections died in state handshaking (Tor, v3 handshake) with SSL state SSL negotiation finished successfully in OPEN
30.06.2016 17:21:29.100 [WARN] 1 connections died in state handshaking (proxy) with SSL state (No SSL object)
30.06.2016 17:21:39.000 [WARN] Proxy Client: unable to connect to 83.212.101.3:80 ("general SOCKS server failure")
30.06.2016 17:21:48.900 [NOTICE] Ignoring directory request, since no bridge nodes are available yet.
30.06.2016 17:21:49.800 [NOTICE] Delaying directory fetches: No running bridges
30.06.2016 17:21:54.600 [WARN] Problem bootstrapping. Stuck at 25%: Loading networkstatus consensus. (IOERROR; IOERROR; count 14; recommendation warn; host 4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A at 109.105.109.163:47779)
30.06.2016 17:21:54.600 [WARN] 16 connections have failed:
30.06.2016 17:21:54.600 [WARN] 11 connections died in state handshaking (TLS) with SSL state SSLv2/v3 read server hello A in HANDSHAKE
30.06.2016 17:21:54.600 [WARN] 3 connections died in state handshaking (Tor, v3 handshake) with SSL state SSL negotiation finished successfully in OPEN
30.06.2016 17:21:54.600 [WARN] 2 connections died in state handshaking (proxy) with SSL state (No SSL object)
30.06.2016 17:21:58.300 [WARN] Problem bootstrapping. Stuck at 25%: Loading networkstatus consensus. (IOERROR; IOERROR; count 15; recommendation warn; host 1E05F577A0EC0213F971D81BF4D86A9E4E8229ED at 109.105.109.163:38980)
30.06.2016 17:21:58.300 [WARN] 17 connections have failed:
30.06.2016 17:21:58.300 [WARN] 11 connections died in state handshaking (TLS) with SSL state SSLv2/v3 read server hello A in HANDSHAKE
30.06.2016 17:21:58.300 [WARN] 4 connections died in state handshaking (Tor, v3 handshake) with SSL state SSL negotiation finished successfully in OPEN
30.06.2016 17:21:58.300 [WARN] 2 connections died in state handshaking (proxy) with SSL state (No SSL object)
30.06.2016 17:27:14.000 [NOTICE] new bridge descriptor 'ndnop2' (fresh): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A~ndnop2 at 109.105.109.163
30.06.2016 17:27:14.000 [NOTICE] I learned some more directory information, but not enough to build a circuit: We have no usable consensus.
30.06.2016 17:27:32.600 [WARN] Problem bootstrapping. Stuck at 25%: Loading networkstatus consensus. (IOERROR; IOERROR; count 16; recommendation warn; host 1E05F577A0EC0213F971D81BF4D86A9E4E8229ED at 109.105.109.163:38980)
30.06.2016 17:27:32.600 [WARN] 18 connections have failed:
30.06.2016 17:27:32.600 [WARN] 11 connections died in state handshaking (TLS) with SSL state SSLv2/v3 read server hello A in HANDSHAKE
30.06.2016 17:27:32.600 [WARN] 5 connections died in state handshaking (Tor, v3 handshake) with SSL state SSL negotiation finished successfully in OPEN
30.06.2016 17:27:32.600 [WARN] 2 connections died in state handshaking (proxy) with SSL state (No SSL object)
30.06.2016 17:27:42.000 [WARN] Proxy Client: unable to connect to 83.212.101.3:80 ("general SOCKS server failure")
30.06.2016 17:28:59.700 [WARN] Problem bootstrapping. Stuck at 25%: Loading networkstatus consensus. (IOERROR; IOERROR; count 17; recommendation warn; host 1E05F577A0EC0213F971D81BF4D86A9E4E8229ED at 109.105.109.163:38980)
30.06.2016 17:28:59.700 [WARN] 20 connections have failed:
30.06.2016 17:28:59.700 [WARN] 11 connections died in state handshaking (TLS) with SSL state SSLv2/v3 read server hello A in HANDSHAKE
30.06.2016 17:28:59.700 [WARN] 6 connections died in state handshaking (Tor, v3 handshake) with SSL state SSL negotiation finished successfully in OPEN
30.06.2016 17:28:59.700 [WARN] 3 connections died in state handshaking (proxy) with SSL state (No SSL object)
30.06.2016 17:29:19.900 [WARN] Problem bootstrapping. Stuck at 25%: Loading networkstatus consensus. (DONE; DONE; count 18; recommendation warn; host A09D536DD1752D542E1FBB3C9CE4449D51298239 at 83.212.101.3:80)
30.06.2016 17:29:19.900 [WARN] 21 connections have failed:
30.06.2016 17:29:19.900 [WARN] 12 connections died in state handshaking (TLS) with SSL state SSLv2/v3 read server hello A in HANDSHAKE
30.06.2016 17:29:19.900 [WARN] 6 connections died in state handshaking (Tor, v3 handshake) with SSL state SSL negotiation finished successfully in OPEN
30.06.2016 17:29:19.900 [WARN] 3 connections died in state handshaking (proxy) with SSL state (No SSL object)
30.06.2016 17:30:06.800 [NOTICE] Delaying directory fetches: No running bridges
30.06.2016 17:30:27.800 [WARN] Proxy Client: unable to connect to 104.131.108.182:56880 ("general SOCKS server failure")
30.06.2016 17:30:27.800 [WARN] Proxy Client: unable to connect to 178.209.52.110:443 ("general SOCKS server failure")
30.06.2016 17:30:27.900 [WARN] Proxy Client: unable to connect to 83.212.101.3:41213 ("general SOCKS server failure")
30.06.2016 17:33:59.800 [NOTICE] Ignoring directory request, since no bridge nodes are available yet.
30.06.2016 17:36:36.200 [NOTICE] Closing no-longer-configured Socks listener on 127.0.0.1:9150
30.06.2016 17:36:36.200 [NOTICE] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
30.06.2016 17:36:36.200 [NOTICE] Closing old Socks listener on 127.0.0.1:9150
30.06.2016 17:36:38.100 [NOTICE] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
30.06.2016 17:36:38.100 [NOTICE] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
30.06.2016 17:36:38.100 [NOTICE] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
30.06.2016 17:36:38.100 [NOTICE] Opening Socks listener on 127.0.0.1:9150
30.06.2016 17:37:05.900 [WARN] Proxy Client: unable to connect to 104.131.108.182:56880 ("general SOCKS server failure")
30.06.2016 17:37:05.900 [WARN] Proxy Client: unable to connect to 83.212.101.3:41213 ("general SOCKS server failure")
30.06.2016 17:37:06.000 [WARN] Proxy Client: unable to connect to 178.209.52.110:443 ("general SOCKS server failure")
30.06.2016 17:39:49.900 [NOTICE] Closing no-longer-configured Socks listener on 127.0.0.1:9150
30.06.2016 17:39:49.900 [NOTICE] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
30.06.2016 17:39:49.900 [NOTICE] Closing old Socks listener on 127.0.0.1:9150
30.06.2016 17:39:54.200 [NOTICE] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
30.06.2016 17:39:54.200 [NOTICE] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
30.06.2016 17:39:54.200 [NOTICE] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
30.06.2016 17:39:54.200 [NOTICE] Opening Socks listener on 127.0.0.1:9150
30.06.2016 17:40:16.400 [WARN] Problem bootstrapping. Stuck at 25%: Loading networkstatus consensus. (DONE; DONE; count 19; recommendation warn; host BD6A829255CB08E66FBE7D3748363586E46B3810 at 171.25.193.9:80)
30.06.2016 17:40:16.500 [WARN] 28 connections have failed:
30.06.2016 17:40:16.500 [WARN] 13 connections died in state handshaking (TLS) with SSL state SSLv2/v3 read server hello A in HANDSHAKE
30.06.2016 17:40:16.500 [WARN] 9 connections died in state handshaking (proxy) with SSL state (No SSL object)
30.06.2016 17:40:16.500 [WARN] 6 connections died in state handshaking (Tor, v3 handshake) with SSL state SSL negotiation finished successfully in OPEN
30.06.2016 17:40:52.800 [WARN] Proxy Client: unable to connect to 169.229.59.75:46328 ("general SOCKS server failure")
30.06.2016 17:40:52.800 [NOTICE] Delaying directory fetches: No running bridges
30.06.2016 17:41:12.700 [WARN] Problem bootstrapping. Stuck at 25%: Loading networkstatus consensus. (IOERROR; IOERROR; count 20; recommendation warn; host 4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A at 109.105.109.163:47779)
30.06.2016 17:41:12.700 [WARN] 30 connections have failed:
30.06.2016 17:41:12.700 [WARN] 13 connections died in state handshaking (TLS) with SSL state SSLv2/v3 read server hello A in HANDSHAKE
30.06.2016 17:41:12.700 [WARN] 10 connections died in state handshaking (proxy) with SSL state (No SSL object)
30.06.2016 17:41:12.700 [WARN] 7 connections died in state handshaking (Tor, v3 handshake) with SSL state SSL negotiation finished successfully in OPEN
30.06.2016 17:41:16.700 [WARN] Problem bootstrapping. Stuck at 25%: Loading networkstatus consensus. (IOERROR; IOERROR; count 21; recommendation warn; host 1E05F577A0EC0213F971D81BF4D86A9E4E8229ED at 109.105.109.163:38980)
30.06.2016 17:41:16.700 [WARN] 31 connections have failed:
30.06.2016 17:41:16.700 [WARN] 13 connections died in state handshaking (TLS) with SSL state SSLv2/v3 read server hello A in HANDSHAKE
30.06.2016 17:41:16.700 [WARN] 10 connections died in state handshaking (proxy) with SSL state (No SSL object)
30.06.2016 17:41:16.700 [WARN] 8 connections died in state handshaking (Tor, v3 handshake) with SSL state SSL negotiation finished successfully in OPEN
30.06.2016 17:41:22.200 [WARN] Proxy Client: unable to connect to 83.212.101.3:80 ("general SOCKS server failure")
30.06.2016 17:42:08.900 [NOTICE] Closing no-longer-configured Socks listener on 127.0.0.1:9150
30.06.2016 17:42:08.900 [NOTICE] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
30.06.2016 17:42:08.900 [NOTICE] Closing old Socks listener on 127.0.0.1:9150
30.06.2016 17:42:08.900 [WARN] Problem bootstrapping. Stuck at 25%: Loading networkstatus consensus. (DONE; DONE; count 22; recommendation warn; host 4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A at 109.105.109.163:47779)
30.06.2016 17:42:08.900 [WARN] 34 connections have failed:
30.06.2016 17:42:08.900 [WARN] 13 connections died in state handshaking (TLS) with SSL state SSLv2/v3 read server hello A in HANDSHAKE
30.06.2016 17:42:08.900 [WARN] 12 connections died in state handshaking (proxy) with SSL state (No SSL object)
30.06.2016 17:42:08.900 [WARN] 9 connections died in state handshaking (Tor, v3 handshake) with SSL state SSL negotiation finished successfully in OPEN
30.06.2016 17:42:11.500 [NOTICE] Delaying directory fetches: DisableNetwork is set.
30.06.2016 17:43:34.300 [NOTICE] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
30.06.2016 17:43:34.300 [NOTICE] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
30.06.2016 17:43:34.300 [NOTICE] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
30.06.2016 17:43:34.300 [NOTICE] Opening Socks listener on 127.0.0.1:9150
30.06.2016 17:44:02.900 [WARN] Problem bootstrapping. Stuck at 25%: Loading networkstatus consensus. (DONE; DONE; count 23; recommendation warn; host DF150A5102E6CF125979D3FB1C4281B3857F5629 at 82.217.205.98:449)
30.06.2016 17:44:02.900 [WARN] 35 connections have failed:
30.06.2016 17:44:02.900 [WARN] 14 connections died in state handshaking (TLS) with SSL state SSLv2/v3 read server hello A in HANDSHAKE
30.06.2016 17:44:02.900 [WARN] 12 connections died in state handshaking (proxy) with SSL state (No SSL object)
30.06.2016 17:44:02.900 [WARN] 9 connections died in state handshaking (Tor, v3 handshake) with SSL state SSL negotiation finished successfully in OPEN
30.06.2016 17:44:06.100 [WARN] Problem bootstrapping. Stuck at 25%: Loading networkstatus consensus. (DONE; DONE; count 24; recommendation warn; host E972C657DAF6640E21DD4BF2CA18AC3612F45913 at 185.24.233.123:43996)
30.06.2016 17:44:06.100 [WARN] 36 connections have failed:
30.06.2016 17:44:06.100 [WARN] 15 connections died in state handshaking (TLS) with SSL state SSLv2/v3 read server hello A in HANDSHAKE
30.06.2016 17:44:06.100 [WARN] 12 connections died in state handshaking (proxy) with SSL state (No SSL object)
30.06.2016 17:44:06.100 [WARN] 9 connections died in state handshaking (Tor, v3 handshake) with SSL state SSL negotiation finished successfully in OPEN
```
**Trac**:
**Username**: LollypoperIsis LovecruftIsis Lovecrufthttps://gitlab.torproject.org/tpo/core/tor/-/issues/19543GETINFO exit-policy/reject-private/relay and ExitPolicyRejectLocalInterfaces2020-06-27T13:58:39ZteorGETINFO exit-policy/reject-private/relay and ExitPolicyRejectLocalInterfacesPlease merge my torspec branch bug18456 on https://github.com/teor2345/torspec.git when legacy/trac#18456 is merged to tor master.Please merge my torspec branch bug18456 on https://github.com/teor2345/torspec.git when legacy/trac#18456 is merged to tor master.Tor: 0.2.9.x-finalteorteorhttps://gitlab.torproject.org/tpo/core/tor/-/issues/19551Edge case test fail in shared random code2020-06-27T13:58:39ZGeorge KadianakisEdge case test fail in shared random codeThe test_state_update() test would fail if you run it between 23:30 and
00:00UTC in the following way:
```
FAIL src/test/test_shared_random.c:1230: assert(state->n_protocol_runs == 1): 2 vs 1
[state_update FAILED]
1/1 TESTS FAILED. ...The test_state_update() test would fail if you run it between 23:30 and
00:00UTC in the following way:
```
FAIL src/test/test_shared_random.c:1230: assert(state->n_protocol_runs == 1): 2 vs 1
[state_update FAILED]
1/1 TESTS FAILED. (0 skipped)
```
The problem is that when you launch the test at 23:30UTC (reveal phase),
sr_state_update() gets called from sr_state_init() and it will prepare
the state for the voting round at 00:00UTC (commit phase). Since we
transition from reveal to commit phase, this would trigger an unwanted phase
transition and increment the n_protocol_runs counter even before the actual test starts.
The solution is to initialize the n_protocol_runs to 0 explicitly in the
beginning of the test, as we do for n_reveal_rounds, n_commit_rounds etc.Tor: 0.2.9.x-finalhttps://gitlab.torproject.org/tpo/core/tor/-/issues/19554Require libevent >= 22020-06-27T13:58:39ZSebastian HahnRequire libevent >= 2The supported Debian and Ubuntu versions all provide libevent 2 now, for OSX and WIndows it isn't an issue either, so we can drop support for libevent 1.4The supported Debian and Ubuntu versions all provide libevent 2 now, for OSX and WIndows it isn't an issue either, so we can drop support for libevent 1.4Tor: 0.2.9.x-finalhttps://gitlab.torproject.org/tpo/core/tor/-/issues/19555Memleaks in shared rand code2020-06-27T13:58:39ZGeorge KadianakisMemleaks in shared rand codeTwo memleaks:
----
There is a memleak in `disk_state_reset()`:
```
/* Reset disk state that is free allocated memory and zeroed the object. */
static void
disk_state_reset(void)
{
config_free_lines(sr_disk_state->Commit);
config_f...Two memleaks:
----
There is a memleak in `disk_state_reset()`:
```
/* Reset disk state that is free allocated memory and zeroed the object. */
static void
disk_state_reset(void)
{
config_free_lines(sr_disk_state->Commit);
config_free_lines(sr_disk_state->SharedRandValues);
config_free_lines(sr_disk_state->ExtraLines);
memset(sr_disk_state, 0, sizeof(*sr_disk_state));
sr_disk_state->magic_ = SR_DISK_STATE_MAGIC;
sr_disk_state->TorVersion = tor_strdup(get_version());
}
```
See how the `TorVersion` ptr is never freed before being overwritten with a new alloced ptr.
This function is called everytime we save the state to disk (which should happen a few times every hour).
I think the fix might be as simple as freeing `sr_disk_state->TorVersion` before overwriting the pointer. But we should make sure we don't double free.
----
A second memleak in `sr_act_post_consensus()`:
```
/* Update our internal state with the next voting interval starting time. */
interval_starts = get_voting_schedule(options, time(NULL),
LOG_NOTICE)->interval_starts;
sr_state_update(interval_starts);
}
```
`voting_schedule_t` returned from `get_voting_schedule()` is never freed.
Code quality wise, we would have probably noticed this bug if we did the operation in two steps (first get struct, then access element), instead of trying to do two things at once. Something like this:
```
/* Update our internal state with the next voting interval starting time. */
{
voting_schedule_t voting_schedule = get_voting_schedule(options, time(NULL), LOG_NOTICE);
time_t interval_starts = voting_schedule->interval_starts;
sr_state_update(interval_starts);
tor_free(voting_schedule);
}
```Tor: 0.2.9.x-finalhttps://gitlab.torproject.org/tpo/core/tor/-/issues/19556Directory /var/lib/tor/stats cannot be read2020-06-27T13:58:39Zweasel (Peter Palfrader)Directory /var/lib/tor/stats cannot be read```
Jul 03 14:23:10.000 [warn] Directory /var/lib/tor/stats cannot be read: Permission denied
Jul 03 14:23:10.000 [warn] Unable to create stats/ directory!
```
I get these once a second on tor26.
I have sandboxing enabled, and systemd'...```
Jul 03 14:23:10.000 [warn] Directory /var/lib/tor/stats cannot be read: Permission denied
Jul 03 14:23:10.000 [warn] Unable to create stats/ directory!
```
I get these once a second on tor26.
I have sandboxing enabled, and systemd's limiting. No apparmor, though.
There is nothing obviously wrong with the file permissions.
AFAICT, tor does not try anything before printing this error:
```
epoll_wait(3, {{EPOLLIN, {u32=2977, u64=2977}}}, 4096, 8) = 1
read(2977, "", 5) = 0
close(2977) = 0
epoll_ctl(3, EPOLL_CTL_DEL, 2977, 7ffe878b2cd0) = -1 EBADF (Bad file descriptor)
epoll_wait(3, {}, 4096, 7) = 0
write(42, "Jul 03 14:20:33.000 [warn] Directory /var/lib/tor/stats cannot be read: Permission denied\n", 90) = 90
write(42, "Jul 03 14:20:33.000 [warn] Unable to create stats/ directory!\n", 62) = 62
```Tor: 0.2.8.x-final