The Tor Project issueshttps://gitlab.torproject.org/groups/tpo/-/issues2020-06-27T14:10:27Zhttps://gitlab.torproject.org/tpo/core/tor/-/issues/588Tor & MS Explorer2020-06-27T14:10:27ZTracTor & MS ExplorerHi,
have installed Tor, the full pagage.
All seems to be rumming.
How I use the Tor surfing with MS Explorer etc?
Is there a setup like done with JAP, changeing the setup within MS Explorer etc?
Somehow Tor seems not to realize the use...Hi,
have installed Tor, the full pagage.
All seems to be rumming.
How I use the Tor surfing with MS Explorer etc?
Is there a setup like done with JAP, changeing the setup within MS Explorer etc?
Somehow Tor seems not to realize the use of a browser like JAP does.
Thank
you
Werner
[Automatically added by flyspray2trac: Operating System: All]
**Trac**:
**Username**: Yougyhttps://gitlab.torproject.org/tpo/core/tor/-/issues/589memory leak in tor_tls_handshake2020-06-27T14:10:27ZRoger Dingledinememory leak in tor_tls_handshakeRunning r13176, first as a client, then (when Vidalia connects and
setconfs it) as a server.
Looks like it's happening inside openssl. Is this openssl's fault, or
our fault for messing with openssl wrong?
==12945== 15,648 (644 direct, ...Running r13176, first as a client, then (when Vidalia connects and
setconfs it) as a server.
Looks like it's happening inside openssl. Is this openssl's fault, or
our fault for messing with openssl wrong?
==12945== 15,648 (644 direct, 15,004 indirect) bytes in 7 blocks are definitely
lost in loss record 14 of 18
==12945== at 0x401D38B: malloc (vg_replace_malloc.c:149)
==12945== by 0x40CC56D: (within /usr/lib/i686/cmov/libcrypto.so.0.9.8)
==12945== by 0x40CCBD8: CRYPTO_malloc (in /usr/lib/i686/cmov/libcrypto.so.0.9
.8)
==12945== by 0x4154E25: (within /usr/lib/i686/cmov/libcrypto.so.0.9.8)
==12945== by 0x41579EA: ASN1_item_ex_d2i (in /usr/lib/i686/cmov/libcrypto.so.0.9.8)
==12945== by 0x41580F1: ASN1_item_d2i (in /usr/lib/i686/cmov/libcrypto.so.0.9.8)
==12945== by 0x414EC94: d2i_X509 (in /usr/lib/i686/cmov/libcrypto.so.0.9.8)
==12945== by 0x406CF7A: ssl3_get_server_certificate (in /usr/lib/i686/cmov/libssl.so.0.9.8)
==12945== by 0x406E420: ssl3_connect (in /usr/lib/i686/cmov/libssl.so.0.9.8)
==12945== by 0x407F3A9: SSL_connect (in /usr/lib/i686/cmov/libssl.so.0.9.8)
==12945== by 0x4074B73: ssl23_connect (in /usr/lib/i686/cmov/libssl.so.0.9.8)
==12945== by 0x407F3A9: SSL_connect (in /usr/lib/i686/cmov/libssl.so.0.9.8)
==12945== by 0x80F1951: tor_tls_handshake (tortls.c:859)
==12945== by 0x807AF49: connection_tls_continue_handshake (connection_or.c:616)
==12945== by 0x8071879: connection_handle_read (connection.c:1904)
==12945== by 0x80A70B7: conn_read_callback (main.c:456)
==12945== by 0x4050C78: (within /usr/lib/libevent-1.1a.so.1.0.2)
==12945== by 0x4050F64: event_base_loop (in /usr/lib/libevent-1.1a.so.1.0.2)
==12945== by 0x4050DCA: event_loop (in /usr/lib/libevent-1.1a.so.1.0.2)
==12945== by 0x80A6C0E: do_main_loop (main.c:1424)
[Automatically added by flyspray2trac: Operating System: All]https://gitlab.torproject.org/tpo/core/tor/-/issues/590false positives for v2 handshake?2020-06-27T14:10:27ZRoger Dingledinefalse positives for v2 handshake?moria1 (running r13177) got this in its logs, even though nick said that
we're not supposed to be playing the v2 game yet:
Jan 19 13:30:27.637 [notice] I think I got a v2 handshake!
Jan 19 13:30:27.638 [warn] TLS error while renegotiati...moria1 (running r13177) got this in its logs, even though nick said that
we're not supposed to be playing the v2 game yet:
Jan 19 13:30:27.637 [notice] I think I got a v2 handshake!
Jan 19 13:30:27.638 [warn] TLS error while renegotiating handshake: unexpected r
ecord (in SSL routines:SSL3_READ_BYTES)
Jan 19 13:30:27.638 [info] connection_tls_continue_handshake(): tls error [misc
error]. breaking connection.
Jan 19 13:30:27.680 [info] TLS error while handshaking: unknown protocol (in SSL
routines:SSL23_GET_SERVER_HELLO)
Jan 19 13:30:27.680 [info] connection_tls_continue_handshake(): tls error [misc
error]. breaking connection.
I also get several
Jan 19 13:49:20.899 [notice] I think I got a v2 handshake!
Jan 19 13:49:20.912 [info] dirserv_orconn_tls_done(): Found router peacetime to
be reachable. Yay.
which makes me think we *are* playing the v2 game.
[Automatically added by flyspray2trac: Operating System: All]Nick MathewsonNick Mathewsonhttps://gitlab.torproject.org/tpo/core/tor/-/issues/591What is the control password in the last Alpha version ?2020-06-27T14:10:27ZTracWhat is the control password in the last Alpha version ?Hello,
First of all, I'm experiencing a lot of problems to register for the TOR newsletter (lots of confirmation e-mails to send...).
But my problem is that since the installation of the Alpha 0.2.0.17 (installed 10 minutes ago), each ...Hello,
First of all, I'm experiencing a lot of problems to register for the TOR newsletter (lots of confirmation e-mails to send...).
But my problem is that since the installation of the Alpha 0.2.0.17 (installed 10 minutes ago), each time I launch TOR, it asks a control password to launch...
What is the password please, whereas I don't have assigned one...
Thanks for your help...
Regards...
Alex
[Automatically added by flyspray2trac: Operating System: Windows 2k/XP]
**Trac**:
**Username**: King_Alexiushttps://gitlab.torproject.org/tpo/core/tor/-/issues/592Neuer Task, tor & Firefox2020-06-27T14:10:27ZTracNeuer Task, tor & FirefoxHi,
schade das der task schon geschlossen war, bevor ein Test der Infos erfolgen konnte.
Habe die neuste Version Tor etc. installiert & mit Arcor.de probiert.
Bekomme nun wenigstens ein Error 404 nach einiger Zeit.
Ein Screenshot habe i...Hi,
schade das der task schon geschlossen war, bevor ein Test der Infos erfolgen konnte.
Habe die neuste Version Tor etc. installiert & mit Arcor.de probiert.
Bekomme nun wenigstens ein Error 404 nach einiger Zeit.
Ein Screenshot habe ich, aber ich kann scheinbar diesen nicht anfügen.
Die Infos auf den entsprechenden Seiten entsprechen nicht ganz den
wirklichen Einstellungen/Positionen.
Hat da jemand ein Tip, damit ich alle Einträge IPs etc. wirklich richtig mache?
Danke
Werner
[Automatically added by flyspray2trac: Operating System: All]
**Trac**:
**Username**: Yougyhttps://gitlab.torproject.org/tpo/core/tor/-/issues/593signature download for consensuses fail.2020-06-27T14:10:26Zweasel (Peter Palfrader)signature download for consensuses fail.In order to ensure that each directory authority has all the signatures
from other authorities before they publish a consensus an authority X
goes out and fetches the list of all detached sigs from every other
authority if X is missing s...In order to ensure that each directory authority has all the signatures
from other authorities before they publish a consensus an authority X
goes out and fetches the list of all detached sigs from every other
authority if X is missing sigs from at least one.
However, this doesn't work.
With some additional/louder logging I can see this at tor26:
Jan 24 15:57:31.143 [notice] Time to fetch any signatures that we're missing.
Jan 24 15:57:31.143 [notice] Fetching missing votes/signatures from all authorities (purpose 13)
Jan 24 15:57:31.143 [notice] Sending command to fetch detached sigs. base.state is 1
Jan 24 15:57:31.143 [notice] Asking 128.31.0.34:9031 for /tor/status-vote/next/consensus-signatures.z
Jan 24 15:57:31.143 [notice] Sending command to fetch detached sigs. base.state is 1
Jan 24 15:57:31.143 [notice] Asking 140.247.60.64 for /tor/status-vote/next/consensus-signatures.z
Jan 24 15:57:31.143 [notice] Sending command to fetch detached sigs. base.state is 1
Jan 24 15:57:31.143 [notice] Asking 216.224.124.114:9030 for /tor/status-vote/next/consensus-signatures.z
Jan 24 15:57:31.143 [notice] Sending command to fetch detached sigs. base.state is 1
Jan 24 15:57:31.143 [notice] Asking 88.198.7.215 for /tor/status-vote/next/consensus-signatures.z
Jan 24 15:57:31.143 [notice] Sending command to fetch detached sigs. base.state is 1
Jan 24 15:57:31.143 [notice] Asking 213.73.91.31 for /tor/status-vote/next/consensus-signatures.z
Jan 24 15:57:31.165 [notice] Dir connection to router 88.198.7.215:80 established.
Jan 24 15:57:31.165 [notice] client finished sending command (88.198.7.215).
Jan 24 15:57:31.174 [notice] Dir connection to router 213.73.91.31:80 established.
Jan 24 15:57:31.174 [notice] client finished sending command (213.73.91.31).
Jan 24 15:57:31.187 [notice] 'fetch' response not all here, but we're at eof. Closing.
Jan 24 15:57:31.187 [notice] conn to 88.198.7.215 reached eof, retval is -1
Jan 24 15:57:31.187 [notice] Giving up downloading detached signatures from '88.198.7.215'
Jan 24 15:57:31.206 [notice] 'fetch' response not all here, but we're at eof. Closing.
Jan 24 15:57:31.206 [notice] conn to 213.73.91.31 reached eof, retval is -1
Jan 24 15:57:31.206 [notice] Giving up downloading detached signatures from '213.73.91.31'
Jan 24 15:57:31.247 [notice] Dir connection to router 128.31.0.34:9031 established.
Jan 24 15:57:31.247 [notice] client finished sending command (128.31.0.34).
Jan 24 15:57:31.322 [notice] Dir connection to router 216.224.124.114:9030 established.
Jan 24 15:57:31.322 [notice] client finished sending command (216.224.124.114).
Jan 24 15:57:31.352 [notice] 'fetch' response not all here, but we're at eof. Closing.
Jan 24 15:57:31.352 [notice] conn to 128.31.0.34 reached eof, retval is -1
Jan 24 15:57:31.352 [notice] Giving up downloading detached signatures from '128.31.0.34'
Jan 24 15:57:31.521 [notice] 'fetch' response not all here, but we're at eof. Closing.
Jan 24 15:57:31.521 [notice] conn to 216.224.124.114 reached eof, retval is -1
Jan 24 15:57:31.521 [notice] Giving up downloading detached signatures from '216.224.124.114'
Jan 24 16:00:01.895 [notice] Time to publish the consensus and discard old votes
Note the "'fetch' response not all here, but we're at eof. Closing." log entry.
The problem appears to be that
a) we send bogus Content-Length headers for compressed stuff like
next/conensus.z and next/consensus-signatures.z, and
b) we declare a download failed when we don't have as many bytes as the
Content-Length says there should be.
Point (a) also confuses the hell out of wget.
[Automatically added by flyspray2trac: Operating System: All]Roger DingledineRoger Dingledinehttps://gitlab.torproject.org/tpo/core/tor/-/issues/597Tor tells admins to send their nickname to tor-ops2020-06-27T14:10:26ZAndrew LewmanTor tells admins to send their nickname to tor-opsAs I was reading through the log the other day:
[info] routers_update_all_from_networkstatus(): The directory authorities do not recognize your nickname.
Please consider sending your nickname and identity fingerprint to the tor-ops.
Sh...As I was reading through the log the other day:
[info] routers_update_all_from_networkstatus(): The directory authorities do not recognize your nickname.
Please consider sending your nickname and identity fingerprint to the tor-ops.
Should we be encouraging this, since we don't need to do this anymore?
[Automatically added by flyspray2trac: Operating System: All]https://gitlab.torproject.org/tpo/core/tor/-/issues/5990.2.0.18-alpha can't create a server behind NAT automatically2020-06-27T14:10:26ZAndrew Lewman0.2.0.18-alpha can't create a server behind NAT automaticallyIt appears 0.2.0.18-alpha can't detect my external IP address while behind NAT. Exact same torrc works in 0.2.0.16-alpha.
Feb 04 22:05:17.479 [Info] resolve_my_address(): Guessed local hostname 'mini.local' resolves to a private IP add...It appears 0.2.0.18-alpha can't detect my external IP address while behind NAT. Exact same torrc works in 0.2.0.16-alpha.
Feb 04 22:05:17.479 [Info] resolve_my_address(): Guessed local hostname 'mini.local' resolves to a private IP address (172.16.31.3). Trying something else.
Feb 04 22:05:17.483 [Info] get_interface_address6(): connect() failed: Invalid argument
Feb 04 22:05:17.486 [Info] resolve_my_address(): Could not get local interface IP address. Too bad.
Feb 04 22:05:17.490 [Info] resolve_my_address(): Address 'mini.local' resolves to private IP address '172.16.31.3'. Tor servers that use the default DirServers must have public IP addresses.
Feb 04 22:05:17.494 [Info] router_pick_published_address(): Could not determine our address locally. Checking if directory headers provide any hints.
Feb 04 22:05:17.500 [Info] router_pick_published_address(): No hints from directory headers either. Will try again later.
Feb 04 22:05:29.379 [Notice] Opening OR listener on 0.0.0.0:8443
Feb 04 22:05:29.383 [Notice] Opening Directory listener on 0.0.0.0:8080
I configured everything via Vidalia only. I know I can put in the external IP, but as the external IP is on DHCP, it changes every few days.
[Automatically added by flyspray2trac: Operating System: OSX 10.4 Tiger]0.2.0.x-rchttps://gitlab.torproject.org/tpo/core/tor/-/issues/600circuitlist.c:1165 crashing bug2020-06-27T14:10:26Zshamrockcircuitlist.c:1165 crashing bugThe Tonga tor server crashed with:
Feb 04 10:20:36.880 [err] Bug: circuitlist.c:1165: assert_circuit_ok: Assertion !c->onionskin failed; aborting.
OS:
Debian Etch
2.6.18-5-amd64
[Automatically added by flyspray2trac: Operating System: ...The Tonga tor server crashed with:
Feb 04 10:20:36.880 [err] Bug: circuitlist.c:1165: assert_circuit_ok: Assertion !c->onionskin failed; aborting.
OS:
Debian Etch
2.6.18-5-amd64
[Automatically added by flyspray2trac: Operating System: Other]0.2.0.x-finalhttps://gitlab.torproject.org/tpo/core/tor/-/issues/601tor ignores ExitNodes even when StrictExitNodes is set2020-06-27T14:10:26ZTractor ignores ExitNodes even when StrictExitNodes is setwin xp sp2, vidalia bundle 0.0.16, tor v0.1.2.19
log shows chosen exits not from the ExitNodes list
[Automatically added by flyspray2trac: Operating System: Windows 2k/XP]
**Trac**:
**Username**: iarwin xp sp2, vidalia bundle 0.0.16, tor v0.1.2.19
log shows chosen exits not from the ExitNodes list
[Automatically added by flyspray2trac: Operating System: Windows 2k/XP]
**Trac**:
**Username**: iar0.2.0.x-finalhttps://gitlab.torproject.org/tpo/core/tor/-/issues/602Add ability to ExcludeNodes by IP.2020-06-27T14:10:26ZNick MathewsonAdd ability to ExcludeNodes by IP.Some people would like to be able to reject Tor nodes by IP or subnet rather than by fingerprint or nickname.
[Automatically added by flyspray2trac: Operating System: All]Some people would like to be able to reject Tor nodes by IP or subnet rather than by fingerprint or nickname.
[Automatically added by flyspray2trac: Operating System: All]post 0.2.0.xhttps://gitlab.torproject.org/tpo/core/tor/-/issues/603option to specify minimal eligible speed for nodes used2020-06-27T14:10:26ZTracoption to specify minimal eligible speed for nodes usedI think it would be nice if I could set a bandwidth limit and/or average ping limit for my tor client.
For example I could ensure that all nodes to be used has 1Mbit or greater bandwidth. Its really slow to
have a 50Kbit node in the midd...I think it would be nice if I could set a bandwidth limit and/or average ping limit for my tor client.
For example I could ensure that all nodes to be used has 1Mbit or greater bandwidth. Its really slow to
have a 50Kbit node in the middle of two 4Mbit nodes...
Thanks,
András
[Automatically added by flyspray2trac: Operating System: All]
**Trac**:
**Username**: iarpost 0.2.0.xhttps://gitlab.torproject.org/tpo/core/tor/-/issues/604Tor 0.1.2.19 server crash on Solaris Sparc2020-06-27T14:10:25ZTracTor 0.1.2.19 server crash on Solaris SparcDear Developpers,
I have successfully compiled and run openssl 0.9.8g, libevent 1.3e and tor 0.1.2.19 with gcc-4.2.2 in a Solaris 10 Sparc Zone as a Tor client.
As soon as I uncomment ORPort in torrc to enable the server it starts initi...Dear Developpers,
I have successfully compiled and run openssl 0.9.8g, libevent 1.3e and tor 0.1.2.19 with gcc-4.2.2 in a Solaris 10 Sparc Zone as a Tor client.
As soon as I uncomment ORPort in torrc to enable the server it starts initializing and crashes with a "Bus Error" while checking reachability and bandwidth.
When I block port 9001 on the firewall it does not crash, but obviously not work also. :)
Trace of the startup included below, with level info and level debug at the final stage.
I do not get a core dumped.
#ulimit -a
core file size (blocks, -c) unlimited
data seg size (kbytes, -d) unlimited
file size (blocks, -f) unlimited
open files (-n) 256
pipe size (512 bytes, -p) 10
stack size (kbytes, -s) 8192
cpu time (seconds, -t) unlimited
max user processes (-u) 14117
virtual memory (kbytes, -v) unlimited
Tried to increase open files to 1024 with no difference.
Any help is greatly appreciated.
Thanks,
Jan
Feb 09 11:24:46.399 [notice] Tor v0.1.2.19. This is experimental software. Do not rely on it for strong anonymity.
Feb 09 11:24:46.404 [warn] You specified a public address '0.0.0.0' for a SOCKS proxy. Other people on the Internet might find your computer and use it as an open SOCKS proxy. Please don't allow this unless you have a good reason.
Feb 09 11:24:46.405 [notice] Choosing default nickname 'tor'
Feb 09 11:24:46.406 [notice] Your ContactInfo config option is not set. Please consider setting it, so we can contact you if your server is misconfigured or something else goes wrong.
Feb 09 11:24:46.410 [notice] Initialized libevent version 1.3e using method event ports. Good.
Feb 09 11:24:46.412 [notice] Opening OR listener on 0.0.0.0:9001
Feb 09 11:24:46.413 [notice] Opening Socks listener on 0.0.0.0:9050
Feb 09 11:24:46.413 [notice] Opening Control listener on 0.0.0.0:9051
Feb 09 11:24:46.418 [info] or_state_load(): Loaded state from "/usr/local/tor/var/state"
Feb 09 11:24:46.437 [info] crypto_seed_rng(): Seeding RNG from "/dev/urandom"
Feb 09 11:24:46.439 [info] configure_nameservers(): Parsing resolver configuration in '/etc/resolv.conf'
Feb 09 11:24:46.439 [info] eventdns: Parsing resolv.conf file /etc/resolv.conf
Feb 09 11:24:46.441 [info] eventdns: Added nameserver xxxxxxx
Feb 09 11:24:46.442 [info] eventdns: Added nameserver xxxxxxx
Feb 09 11:24:46.442 [info] eventdns: Setting maximum allowed timeouts to 3
Feb 09 11:24:46.443 [info] eventdns: Setting timeout to 5
Feb 09 11:24:46.444 [info] init_keys(): Reading/making identity key "/usr/local/tor/var/keys/secret_id_key"...
Feb 09 11:24:46.620 [info] init_keys(): Reading/making onion key "/usr/local/tor/var/keys/secret_onion_key"...
platform Tor 0.1.2.19 on SunOS sun4u
published 2008-02-09 10:24:50
opt fingerprint xxxx xxxx xxxx xxxx
uptime 0
bandwidth 3145728 6291456 0
onion-key
-----BEGIN RSA PUBLIC KEY-----
[...]
-----END RSA PUBLIC KEY-----
signing-key
-----BEGIN RSA PUBLIC KEY-----
[...]
-----END RSA PUBLIC KEY-----
opt write-history 2008-02-09 10:24:46 (900 s)
opt read-history 2008-02-09 10:24:46 (900 s)
[...]
Feb 09 11:24:50.620 [info] init_keys(): Dumping fingerprint to "/usr/local/tor/var/fingerprint"...
Feb 09 11:24:50.622 [notice] Your Tor server's identity key fingerprint is 'xxxx xxxx xxxx'
Feb 09 11:24:55.294 [info] router_load_routers_from_string(): 1690 elements to add
Feb 09 11:24:56.435 [info] router_load_routers_from_string(): 365 elements to add
[...]
Feb 09 11:24:56.806 [info] router_set_networkstatus(): Setting networkstatus cached from directory server "moria1" at 128.31.0.34:9031 (published 2008-02-08 16:14:02)
Feb 09 11:24:56.806 [info] networkstatus_list_update_recent(): Networkstatus from directory server "moria1" at 128.31.0.34:9031 (published 2008-02-08 16:14:02) is now "recent"
Feb 09 11:24:57.017 [debug] check_directory_signature(): Signed directory hash starts 4529A66E
Feb 09 11:24:57.021 [info] router_set_networkstatus(): Setting networkstatus cached from directory server "tor26" at 86.59.21.38:80 (published 2008-02-08 21:44:01)
Feb 09 11:24:57.021 [info] networkstatus_list_update_recent(): Networkstatus from directory server "tor26" at 86.59.21.38:80 (published 2008-02-08 21:44:01) is now "recent"
Feb 09 11:24:57.244 [debug] check_directory_signature(): Signed directory hash starts DE69E0AF
Feb 09 11:24:57.247 [info] router_set_networkstatus(): Setting networkstatus cached from directory server "dizum" at 194.109.206.212:80 (published 2008-02-08 22:35:27)
Feb 09 11:24:57.248 [info] networkstatus_list_update_recent(): Networkstatus from directory server "dizum" at 194.109.206.212:80 (published 2008-02-08 22:35:27) is now "recent"
Feb 09 11:24:57.458 [debug] check_directory_signature(): Signed directory hash starts FFF46957
Feb 09 11:24:57.462 [info] router_set_networkstatus(): Setting networkstatus cached from directory server "moria2" at 128.31.0.34:9032 (published 2008-02-08 16:34:41)
Feb 09 11:24:57.462 [info] networkstatus_list_update_recent(): Networkstatus from directory server "moria2" at 128.31.0.34:9032 (published 2008-02-08 16:34:41) is now "recent"
Feb 09 11:24:57.463 [info] networkstatus_list_update_recent(): Networkstatus from directory server "moria1" at 128.31.0.34:9031 (published 2008-02-08 16:14:02) is no longer "recent"
Feb 09 11:24:57.669 [debug] check_directory_signature(): Signed directory hash starts BB7A2DAC
Feb 09 11:24:57.672 [info] router_set_networkstatus(): Setting networkstatus cached from directory server "lefkada" at 140.247.60.64:80 (published 2008-02-08 22:09:03)
Feb 09 11:24:57.673 [info] networkstatus_list_update_recent(): Networkstatus from directory server "lefkada" at 140.247.60.64:80 (published 2008-02-08 22:09:03) is now "recent"
Feb 09 11:24:57.673 [info] networkstatus_list_update_recent(): Networkstatus from directory server "moria2" at 128.31.0.34:9032 (published 2008-02-08 16:34:41) is no longer "recent"
Feb 09 11:24:57.674 [info] routerstatus_list_update_from_networkstatus(): Rebuilding router status list.
Feb 09 11:24:57.692 [info] routerstatus_list_update_from_networkstatus(): Naming authorities disagree about which key goes with joestorserver. ($86D83F4F853EDFEEAD1EF3B17CE2034F8397A8F6 vs $0731DD94CD90068DAFE31DBC449F1BA36C6DF277)
[...]
Feb 09 11:24:58.637 [debug] routerstatus_list_update_from_networkstatus(): Router 'FightFascism' is listed by 5/5 directories, named by 2/3, validated by 5/5, and 3/3 recent directories think it's running.
Feb 09 11:24:58.638 [warn] Naming authorities disagree about nicknames for $C1D04F2F5E9A0FF9240638BE9805563C03A3D8CB ("PoderosoTorII" vs "PoderosoTorIII")
[...]
Feb 09 11:24:59.353 [info] circuit_predict_and_launch_new(): Have 0 clean circs (0 internal), need another exit circ.
Feb 09 11:24:59.358 [info] choose_good_exit_server_general(): Found 628 servers that might support 0/0 pending connections.
Feb 09 11:24:59.363 [info] choose_good_exit_server_general(): Chose exit server 'superbad'
[...]
Feb 09 11:24:59.670 [info] connection_dir_client_reached_eof(): Received server info (size 3265) from server '87.106.188.238:80'
Feb 09 11:24:59.674 [info] router_load_routers_from_string(): 1 elements to add
Feb 09 11:24:59.736 [info] connection_dir_client_reached_eof(): Received 1/1 routers requested from 87.106.188.238:80
[...]
Feb 09 11:24:59.846 [info] connection_dir_client_reached_eof(): Received networkstatus objects (size 382650) from server '91.121.7.211:80'
Feb 09 11:25:00.063 [info] router_set_networkstatus(): Setting networkstatus downloaded from directory server "moria1" at 128.31.0.34:9031 (published 2008-02-09 09:58:14)
Feb 09 11:25:00.079 [info] networkstatus_list_update_recent(): Networkstatus from directory server "moria1" at 128.31.0.34:9031 (published 2008-02-09 09:58:14) is now "recent"
Feb 09 11:25:00.080 [info] networkstatus_list_update_recent(): Networkstatus from directory server "tor26" at 86.59.21.38:80 (published 2008-02-08 21:44:01) is no longer "recent"
Feb 09 11:25:00.081 [info] routerstatus_list_update_from_networkstatus(): Rebuilding router status list.
Feb 09 11:25:00.108 [info] routerstatus_list_update_from_networkstatus(): Naming authorities disagree about which key goes with JoesTorServer. ($0731DD94CD90068DAFE31DBC449F1BA36C6DF277 vs $86D83F4F853EDFEEAD1EF3B17CE2034F8397A8F6)
[...]
Feb 09 11:25:01.589 [info] entry_guards_compute_status(): Summary: Entry 'rfc1149' is reachable, usable and live.
Feb 09 11:25:01.589 [info] entry_guards_compute_status(): Summary: Entry 'Bellum' is reachable, unusable and not live.
Feb 09 11:25:01.590 [info] entry_guards_compute_status(): Summary: Entry 'SuperDuperLative' is reachable, usable and live.
Feb 09 11:25:01.590 [info] entry_guards_compute_status(): Summary: Entry 'lolnode' is reachable, usable and live.
Feb 09 11:25:01.590 [debug] tor_version_is_obsolete(): Checking whether version '0.1.2.19' is in '0.1.2.19,0.2.0.11-alpha,0.2.0.12-alpha,0.2.0.15-alpha,0.2.0.18-alpha'
Feb 09 11:25:01.590 [debug] tor_version_is_obsolete(): Checking whether version '0.1.2.19' is in '0.1.2.17,0.1.2.18,0.1.2.19,0.2.0.6-alpha,0.2.0.7-alpha,0.2.0.8-alpha,0.2.0.9-alpha,0.2.0.10-alpha,0.2.0.11-alpha,0.2.0.12-alpha,0.2.0.13-alpha,0.2.0.14-alpha,0.2.0.15-alpha,0.2.0.16-alpha,0.2.0.17-alpha,0.2.0.18-alpha'
Feb 09 11:25:01.590 [debug] tor_version_is_obsolete(): Checking whether version '0.1.2.19' is in '0.1.2.19,0.2.0.11-alpha,0.2.0.12-alpha,0.2.0.15-alpha,0.2.0.18-alpha'
Feb 09 11:25:01.591 [info] routers_update_all_from_networkstatus(): 3/3 statements from version-listing directory authorities say my version is ok.
Feb 09 11:25:01.643 [debug] conn_close_if_marked(): Cleaning up connection (fd 14).
Feb 09 11:25:01.643 [debug] connection_remove(): removing socket 14 (type Directory), n_conns now 5
Feb 09 11:25:01.644 [debug] _connection_free(): closing fd 14.
Feb 09 11:25:01.644 [debug] conn_read_callback(): socket 16 wants to read.
Feb 09 11:25:01.891 [debug] connection_tls_continue_handshake(): wanted read
Feb 09 11:25:01.892 [debug] global_read_bucket now 6291456.
Feb 09 11:25:01.892 [debug] global_write_bucket now 6291456.
Feb 09 11:25:01.893 [debug] circuit_remove_handled_ports(): Port 80 is not handled.
Feb 09 11:25:01.893 [info] circuit_predict_and_launch_new(): Have 1 clean circs (0 internal), need another exit circ.
Feb 09 11:25:01.894 [debug] new_route_len(): Chosen route length 3 (1813 routers available).
Feb 09 11:25:01.898 [info] choose_good_exit_server_general(): Found 616 servers that might support 0/0 pending connections.
Feb 09 11:25:01.899 [debug] circuit_remove_handled_ports(): Port 80 is not handled.
Feb 09 11:25:01.902 [info] choose_good_exit_server_general(): Chose exit server 'almostunknown'
Feb 09 11:25:02.319 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to 'SuperDuperLative'
Feb 09 11:25:02.362 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to 'rfc1149'
Feb 09 11:25:02.473 [info] circuit_finish_handshake(): Finished building circuit hop:
Feb 09 11:25:02.473 [info] exit circ (length 3, exit almostunknown): rfc1149(open) keinezensurde(closed) almostunknown(closed)
Feb 09 11:25:02.474 [debug] command_process_created_cell(): Moving to next skin.
Feb 09 11:25:02.474 [debug] circuit_send_next_onion_skin(): starting to send subsequent skin.
Feb 09 11:25:02.509 [debug] circuit_send_next_onion_skin(): Sending extend relay cell.
Feb 09 11:25:02.510 [debug] relay_send_command_from_edge(): delivering 6 cell forward.
Feb 09 11:25:02.510 [debug] circuit_package_relay_cell(): crypting a layer of the relay cell.
Feb 09 11:25:02.511 [debug] write_to_buf(): added 512 bytes to buf (now 512 total).
Feb 09 11:25:02.511 [debug] connection_or_process_cells_from_inbuf(): 11: starting, inbuf_datalen 0 (0 pending in tls object).
Feb 09 11:25:02.512 [debug] conn_write_callback(): socket 11 wants to write.
Feb 09 11:25:02.513 [debug] flush_buf_tls_impl(): flushed 512 bytes, 0 ready to flush, 0 remain.
Feb 09 11:25:02.513 [debug] connection_handle_write(): After TLS write of 512: 0 read, 586 written
Feb 09 11:25:02.596 [debug] conn_read_callback(): socket 11 wants to read.
Feb 09 11:25:02.597 [debug] connection_read_to_buf(): 11: starting, inbuf_datalen 0 (0 pending in tls object). at_most 4096.
Feb 09 11:25:02.597 [debug] read_to_buf_tls(): start: 0 on buf, 0 pending, at_most 4096.
Feb 09 11:25:02.597 [debug] read_to_buf_tls_impl(): before: 0 on buf, 0 pending, at_most 4096.
Feb 09 11:25:02.598 [debug] read_to_buf_tls_impl(): Read 512 bytes. 512 on inbuf; 0 pending
Feb 09 11:25:02.599 [debug] connection_read_to_buf(): After TLS read of 512: 586 read, 0 written
Feb 09 11:25:02.599 [debug] connection_or_process_cells_from_inbuf(): 11: starting, inbuf_datalen 512 (0 pending in tls object).
Feb 09 11:25:02.600 [debug] circuit_receive_relay_cell(): Sending to origin.
Feb 09 11:25:02.600 [debug] connection_edge_process_relay_cell(): Now seen 1 relay cells here.
Feb 09 11:25:02.601 [debug] connection_edge_process_relay_cell(): Got an extended cell! Yay.
Feb 09 11:25:02.633 [info] circuit_finish_handshake(): Finished building circuit hop:
Feb 09 11:25:02.634 [info] exit circ (length 3, exit almostunknown): rfc1149(open) keinezensurde(open) almostunknown(closed)
Feb 09 11:25:02.634 [debug] circuit_send_next_onion_skin(): starting to send subsequent skin.
Feb 09 11:25:02.669 [debug] circuit_send_next_onion_skin(): Sending extend relay cell.
Feb 09 11:25:02.670 [debug] relay_send_command_from_edge(): delivering 6 cell forward.
Feb 09 11:25:02.670 [debug] circuit_package_relay_cell(): crypting a layer of the relay cell.
Feb 09 11:25:02.671 [debug] circuit_package_relay_cell(): crypting a layer of the relay cell.
Feb 09 11:25:02.671 [debug] write_to_buf(): added 512 bytes to buf (now 512 total).
Feb 09 11:25:02.672 [debug] connection_or_process_cells_from_inbuf(): 11: starting, inbuf_datalen 0 (0 pending in tls object).
Feb 09 11:25:02.672 [debug] conn_write_callback(): socket 11 wants to write.
Feb 09 11:25:02.673 [debug] flush_buf_tls_impl(): flushed 512 bytes, 0 ready to flush, 0 remain.
Feb 09 11:25:02.673 [debug] connection_handle_write(): After TLS write of 512: 0 read, 586 written
Feb 09 11:25:02.920 [debug] global_read_bucket now 6291456.
Feb 09 11:25:02.920 [debug] global_write_bucket now 6291456.
Feb 09 11:25:02.971 [info] circuit_predict_and_launch_new(): Have 2 clean circs (0 uptime-internal, 0 internal), need another hidserv circ.
Feb 09 11:25:02.972 [debug] new_route_len(): Chosen route length 3 (1813 routers available).
Feb 09 11:25:02.974 [debug] onion_extend_cpath(): Path is 0 long; we want 3
Feb 09 11:25:02.975 [debug] onion_extend_cpath(): Chose router rfc1149 for hop 1 (exit is aim1loxal1net)
Feb 09 11:25:02.975 [debug] onion_extend_cpath(): Path is 1 long; we want 3
Feb 09 11:25:02.976 [debug] choose_good_middle_server(): Contemplating intermediate hop: random choice.
Feb 09 11:25:02.979 [debug] onion_extend_cpath(): Chose router petspaper for hop 2 (exit is aim1loxal1net)
Feb 09 11:25:02.979 [debug] onion_extend_cpath(): Path is 2 long; we want 3
Feb 09 11:25:02.980 [debug] onion_extend_cpath(): Chose router aim1loxal1net for hop 3 (exit is aim1loxal1net)
Feb 09 11:25:02.980 [debug] onion_extend_cpath(): Path is complete: 3 steps long
Feb 09 11:25:02.981 [debug] circuit_handle_first_hop(): Looking for firsthop '88.191.14.223:9001'
Feb 09 11:25:02.981 [debug] circuit_handle_first_hop(): Conn open. Delivering first onion skin.
Feb 09 11:25:02.982 [debug] circuit_send_next_onion_skin(): First skin; sending create cell.
Feb 09 11:25:03.018 [debug] circuit_deliver_create_cell(): Chosen circID 23586.
Feb 09 11:25:03.019 [debug] write_to_buf(): added 512 bytes to buf (now 512 total).
Feb 09 11:25:03.019 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to 'rfc1149'
Feb 09 11:25:03.020 [debug] conn_write_callback(): socket 11 wants to write.
Feb 09 11:25:03.022 [debug] flush_buf_tls_impl(): flushed 512 bytes, 0 ready to flush, 0 remain.
Feb 09 11:25:03.022 [debug] connection_handle_write(): After TLS write of 512: 0 read, 586 written
Feb 09 11:25:03.086 [debug] conn_read_callback(): socket 11 wants to read.
Feb 09 11:25:03.086 [debug] connection_read_to_buf(): 11: starting, inbuf_datalen 0 (0 pending in tls object). at_most 4096.
Feb 09 11:25:03.087 [debug] read_to_buf_tls(): start: 0 on buf, 0 pending, at_most 4096.
Feb 09 11:25:03.087 [debug] read_to_buf_tls_impl(): before: 0 on buf, 0 pending, at_most 4096.
Feb 09 11:25:03.088 [debug] read_to_buf_tls_impl(): Read 512 bytes. 512 on inbuf; 0 pending
Feb 09 11:25:03.088 [debug] connection_read_to_buf(): After TLS read of 512: 586 read, 0 written
Feb 09 11:25:03.089 [debug] connection_or_process_cells_from_inbuf(): 11: starting, inbuf_datalen 512 (0 pending in tls object).
Feb 09 11:25:03.089 [debug] command_process_created_cell(): at OP. Finishing handshake.
Feb 09 11:25:03.122 [info] circuit_finish_handshake(): Finished building circuit hop:
Feb 09 11:25:03.122 [info] internal (high-uptime) circ (length 3, exit aim1loxal1net): rfc1149(open) petspaper(closed) aim1loxal1net(closed)
Feb 09 11:25:03.123 [debug] command_process_created_cell(): Moving to next skin.
Feb 09 11:25:03.123 [debug] circuit_send_next_onion_skin(): starting to send subsequent skin.
Feb 09 11:25:03.158 [debug] circuit_send_next_onion_skin(): Sending extend relay cell.
Feb 09 11:25:03.159 [debug] relay_send_command_from_edge(): delivering 6 cell forward.
Feb 09 11:25:03.159 [debug] circuit_package_relay_cell(): crypting a layer of the relay cell.
Feb 09 11:25:03.160 [debug] write_to_buf(): added 512 bytes to buf (now 512 total).
Feb 09 11:25:03.160 [debug] connection_or_process_cells_from_inbuf(): 11: starting, inbuf_datalen 0 (0 pending in tls object).
Feb 09 11:25:03.161 [debug] conn_write_callback(): socket 11 wants to write.
Feb 09 11:25:03.161 [debug] flush_buf_tls_impl(): flushed 512 bytes, 0 ready to flush, 0 remain.
Feb 09 11:25:03.162 [debug] connection_handle_write(): After TLS write of 512: 0 read, 586 written
Feb 09 11:25:03.346 [debug] conn_read_callback(): socket 11 wants to read.
Feb 09 11:25:03.346 [debug] connection_read_to_buf(): 11: starting, inbuf_datalen 0 (0 pending in tls object). at_most 4096.
Feb 09 11:25:03.347 [debug] read_to_buf_tls(): start: 0 on buf, 0 pending, at_most 4096.
Feb 09 11:25:03.347 [debug] read_to_buf_tls_impl(): before: 0 on buf, 0 pending, at_most 4096.
Feb 09 11:25:03.348 [debug] read_to_buf_tls_impl(): Read 512 bytes. 512 on inbuf; 0 pending
Feb 09 11:25:03.348 [debug] connection_read_to_buf(): After TLS read of 512: 586 read, 0 written
Feb 09 11:25:03.349 [debug] connection_or_process_cells_from_inbuf(): 11: starting, inbuf_datalen 512 (0 pending in tls object).
Feb 09 11:25:03.349 [debug] circuit_receive_relay_cell(): Sending to origin.
Feb 09 11:25:03.350 [debug] connection_edge_process_relay_cell(): Now seen 2 relay cells here.
Feb 09 11:25:03.350 [debug] connection_edge_process_relay_cell(): Got an extended cell! Yay.
Feb 09 11:25:03.383 [info] circuit_finish_handshake(): Finished building circuit hop:
Feb 09 11:25:03.384 [info] internal (high-uptime) circ (length 3, exit aim1loxal1net): rfc1149(open) petspaper(open) aim1loxal1net(closed)
Feb 09 11:25:03.384 [debug] circuit_send_next_onion_skin(): starting to send subsequent skin.
Feb 09 11:25:03.419 [debug] circuit_send_next_onion_skin(): Sending extend relay cell.
Feb 09 11:25:03.419 [debug] relay_send_command_from_edge(): delivering 6 cell forward.
Feb 09 11:25:03.420 [debug] circuit_package_relay_cell(): crypting a layer of the relay cell.
Feb 09 11:25:03.421 [debug] circuit_package_relay_cell(): crypting a layer of the relay cell.
Feb 09 11:25:03.421 [debug] write_to_buf(): added 512 bytes to buf (now 512 total).
Feb 09 11:25:03.421 [debug] connection_or_process_cells_from_inbuf(): 11: starting, inbuf_datalen 0 (0 pending in tls object).
Feb 09 11:25:03.422 [debug] conn_write_callback(): socket 11 wants to write.
Feb 09 11:25:03.423 [debug] flush_buf_tls_impl(): flushed 512 bytes, 0 ready to flush, 0 remain.
Feb 09 11:25:03.423 [debug] connection_handle_write(): After TLS write of 512: 0 read, 586 written
Feb 09 11:25:04.020 [debug] global_read_bucket now 6291456.
Feb 09 11:25:04.021 [debug] global_write_bucket now 6291456.
Feb 09 11:25:04.021 [info] circuit_predict_and_launch_new(): Have 3 clean circs (1 uptime-internal, 1 internal), need another hidserv circ.
Feb 09 11:25:04.022 [debug] new_route_len(): Chosen route length 3 (1813 routers available).
Feb 09 11:25:04.023 [debug] onion_extend_cpath(): Path is 0 long; we want 3
Feb 09 11:25:04.024 [debug] onion_extend_cpath(): Chose router rfc1149 for hop 1 (exit is ArnoldBros1905)
Feb 09 11:25:04.025 [debug] onion_extend_cpath(): Path is 1 long; we want 3
Feb 09 11:25:04.025 [debug] choose_good_middle_server(): Contemplating intermediate hop: random choice.
Feb 09 11:25:04.028 [debug] onion_extend_cpath(): Chose router wiredwings for hop 2 (exit is ArnoldBros1905)
Feb 09 11:25:04.029 [debug] onion_extend_cpath(): Path is 2 long; we want 3
Feb 09 11:25:04.029 [debug] onion_extend_cpath(): Chose router ArnoldBros1905 for hop 3 (exit is ArnoldBros1905)
Feb 09 11:25:04.030 [debug] onion_extend_cpath(): Path is complete: 3 steps long
Feb 09 11:25:04.030 [debug] circuit_handle_first_hop(): Looking for firsthop '88.191.14.223:9001'
Feb 09 11:25:04.031 [debug] circuit_handle_first_hop(): Conn open. Delivering first onion skin.
Feb 09 11:25:04.031 [debug] circuit_send_next_onion_skin(): First skin; sending create cell.
Feb 09 11:25:04.066 [debug] circuit_deliver_create_cell(): Chosen circID 23587.
Feb 09 11:25:04.066 [debug] write_to_buf(): added 512 bytes to buf (now 512 total).
Feb 09 11:25:04.067 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to 'rfc1149'
Feb 09 11:25:04.067 [debug] conn_write_callback(): socket 11 wants to write.
Feb 09 11:25:04.068 [debug] flush_buf_tls_impl(): flushed 512 bytes, 0 ready to flush, 0 remain.
Feb 09 11:25:04.069 [debug] connection_handle_write(): After TLS write of 512: 0 read, 586 written
Feb 09 11:25:04.146 [debug] conn_read_callback(): socket 11 wants to read.
Feb 09 11:25:04.147 [debug] connection_read_to_buf(): 11: starting, inbuf_datalen 0 (0 pending in tls object). at_most 4096.
Feb 09 11:25:04.147 [debug] read_to_buf_tls(): start: 0 on buf, 0 pending, at_most 4096.
Feb 09 11:25:04.147 [debug] read_to_buf_tls_impl(): before: 0 on buf, 0 pending, at_most 4096.
Feb 09 11:25:04.148 [debug] read_to_buf_tls_impl(): Read 512 bytes. 512 on inbuf; 0 pending
Feb 09 11:25:04.149 [debug] connection_read_to_buf(): After TLS read of 512: 586 read, 0 written
Feb 09 11:25:04.149 [debug] connection_or_process_cells_from_inbuf(): 11: starting, inbuf_datalen 512 (0 pending in tls object).
Feb 09 11:25:04.149 [debug] command_process_created_cell(): at OP. Finishing handshake.
Feb 09 11:25:04.183 [info] circuit_finish_handshake(): Finished building circuit hop:
Feb 09 11:25:04.184 [info] internal (high-uptime) circ (length 3, exit ArnoldBros1905): rfc1149(open) wiredwings(closed) ArnoldBros1905(closed)
Feb 09 11:25:04.184 [debug] command_process_created_cell(): Moving to next skin.
Feb 09 11:25:04.184 [debug] circuit_send_next_onion_skin(): starting to send subsequent skin.
Feb 09 11:25:04.219 [debug] circuit_send_next_onion_skin(): Sending extend relay cell.
Feb 09 11:25:04.220 [debug] relay_send_command_from_edge(): delivering 6 cell forward.
Feb 09 11:25:04.220 [debug] circuit_package_relay_cell(): crypting a layer of the relay cell.
Feb 09 11:25:04.224 [debug] write_to_buf(): added 512 bytes to buf (now 512 total).
Feb 09 11:25:04.225 [debug] connection_or_process_cells_from_inbuf(): 11: starting, inbuf_datalen 0 (0 pending in tls object).
Feb 09 11:25:04.225 [debug] conn_write_callback(): socket 11 wants to write.
Feb 09 11:25:04.226 [debug] flush_buf_tls_impl(): flushed 512 bytes, 0 ready to flush, 0 remain.
Feb 09 11:25:04.227 [debug] connection_handle_write(): After TLS write of 512: 0 read, 586 written
Feb 09 11:25:04.301 [debug] conn_read_callback(): socket 11 wants to read.
Feb 09 11:25:04.302 [debug] connection_read_to_buf(): 11: starting, inbuf_datalen 0 (0 pending in tls object). at_most 4096.
Feb 09 11:25:04.302 [debug] read_to_buf_tls(): start: 0 on buf, 0 pending, at_most 4096.
Feb 09 11:25:04.302 [debug] read_to_buf_tls_impl(): before: 0 on buf, 0 pending, at_most 4096.
Feb 09 11:25:04.303 [debug] read_to_buf_tls_impl(): Read 512 bytes. 512 on inbuf; 0 pending
Feb 09 11:25:04.304 [debug] connection_read_to_buf(): After TLS read of 512: 586 read, 0 written
Feb 09 11:25:04.304 [debug] connection_or_process_cells_from_inbuf(): 11: starting, inbuf_datalen 512 (0 pending in tls object).
Feb 09 11:25:04.304 [debug] circuit_receive_relay_cell(): Sending to origin.
Feb 09 11:25:04.305 [debug] connection_edge_process_relay_cell(): Now seen 3 relay cells here.
Feb 09 11:25:04.305 [debug] connection_edge_process_relay_cell(): Got an extended cell! Yay.
Feb 09 11:25:04.340 [info] circuit_finish_handshake(): Finished building circuit hop:
Feb 09 11:25:04.341 [info] internal (high-uptime) circ (length 3, exit ArnoldBros1905): rfc1149(open) wiredwings(open) ArnoldBros1905(closed)
Feb 09 11:25:04.341 [debug] circuit_send_next_onion_skin(): starting to send subsequent skin.
Feb 09 11:25:04.376 [debug] circuit_send_next_onion_skin(): Sending extend relay cell.
Feb 09 11:25:04.377 [debug] relay_send_command_from_edge(): delivering 6 cell forward.
Feb 09 11:25:04.377 [debug] circuit_package_relay_cell(): crypting a layer of the relay cell.
Feb 09 11:25:04.378 [debug] circuit_package_relay_cell(): crypting a layer of the relay cell.
Feb 09 11:25:04.378 [debug] write_to_buf(): added 512 bytes to buf (now 512 total).
Feb 09 11:25:04.380 [debug] connection_or_process_cells_from_inbuf(): 11: starting, inbuf_datalen 0 (0 pending in tls object).
Feb 09 11:25:04.381 [debug] conn_write_callback(): socket 11 wants to write.
Feb 09 11:25:04.382 [debug] flush_buf_tls_impl(): flushed 512 bytes, 0 ready to flush, 0 remain.
Feb 09 11:25:04.382 [debug] connection_handle_write(): After TLS write of 512: 0 read, 586 written
Feb 09 11:25:04.544 [debug] conn_read_callback(): socket 16 wants to read.
Feb 09 11:25:04.545 [debug] connection_read_to_buf(): 16: starting, inbuf_datalen 0 (0 pending in tls object). at_most 4096.
Feb 09 11:25:04.545 [debug] read_to_buf_tls(): start: 0 on buf, 0 pending, at_most 4096.
Feb 09 11:25:04.546 [debug] read_to_buf_tls_impl(): before: 0 on buf, 0 pending, at_most 4096.
Feb 09 11:25:04.546 [debug] read_to_buf_tls_impl(): Read 512 bytes. 512 on inbuf; 0 pending
Feb 09 11:25:04.547 [debug] connection_read_to_buf(): After TLS read of 512: 586 read, 0 written
Feb 09 11:25:04.547 [debug] connection_or_process_cells_from_inbuf(): 16: starting, inbuf_datalen 512 (0 pending in tls object).
Feb 09 11:25:04.548 [debug] command_process_created_cell(): at OP. Finishing handshake.
Feb 09 11:25:04.580 [info] circuit_finish_handshake(): Finished building circuit hop:
Feb 09 11:25:04.581 [info] exit circ (length 3, exit superbad): SuperDuperLative(open) DrazziBTorNode(closed) superbad(closed)
Feb 09 11:25:04.582 [debug] command_process_created_cell(): Moving to next skin.
Feb 09 11:25:04.582 [debug] circuit_send_next_onion_skin(): starting to send subsequent skin.
Feb 09 11:25:04.617 [debug] circuit_send_next_onion_skin(): Sending extend relay cell.
Feb 09 11:25:04.617 [debug] relay_send_command_from_edge(): delivering 6 cell forward.
Feb 09 11:25:04.618 [debug] circuit_package_relay_cell(): crypting a layer of the relay cell.
Feb 09 11:25:04.618 [debug] write_to_buf(): added 512 bytes to buf (now 512 total).
Feb 09 11:25:04.619 [debug] connection_or_process_cells_from_inbuf(): 16: starting, inbuf_datalen 0 (0 pending in tls object).
Feb 09 11:25:04.619 [debug] conn_read_callback(): socket 11 wants to read.
Feb 09 11:25:04.620 [debug] connection_read_to_buf(): 11: starting, inbuf_datalen 0 (0 pending in tls object). at_most 4096.
Feb 09 11:25:04.620 [debug] read_to_buf_tls(): start: 0 on buf, 0 pending, at_most 4096.
Feb 09 11:25:04.621 [debug] read_to_buf_tls_impl(): before: 0 on buf, 0 pending, at_most 4096.
Feb 09 11:25:04.621 [debug] read_to_buf_tls_impl(): Read 512 bytes. 512 on inbuf; 0 pending
Feb 09 11:25:04.622 [debug] connection_read_to_buf(): After TLS read of 512: 586 read, 0 written
Feb 09 11:25:04.622 [debug] connection_or_process_cells_from_inbuf(): 11: starting, inbuf_datalen 512 (0 pending in tls object).
Feb 09 11:25:04.623 [debug] circuit_receive_relay_cell(): Sending to origin.
Feb 09 11:25:04.623 [debug] connection_edge_process_relay_cell(): Now seen 4 relay cells here.
Feb 09 11:25:04.624 [debug] connection_edge_process_relay_cell(): Got an extended cell! Yay.
Feb 09 11:25:04.656 [info] circuit_finish_handshake(): Finished building circuit hop:
Feb 09 11:25:04.657 [info] internal (high-uptime) circ (length 3, exit ArnoldBros1905): rfc1149(open) wiredwings(open) ArnoldBros1905(open)
Feb 09 11:25:04.657 [debug] circuit_send_next_onion_skin(): starting to send subsequent skin.
Feb 09 11:25:04.657 [info] circuit_send_next_onion_skin(): circuit built!
Feb 09 11:25:04.658 [notice] Tor has successfully opened a circuit. Looks like client functionality is working.
Feb 09 11:25:04.659 [notice] Now checking whether ORPort x.x.x.x:9001 is reachable... (this may take up to 20 minutes -- look for log messages indicating success)
Feb 09 11:25:04.661 [info] consider_testing_reachability(): Testing reachability of my ORPort: x.x.x.x:9001.
Feb 09 11:25:04.661 [debug] new_route_len(): Chosen route length 3 (1813 routers available).
Feb 09 11:25:04.662 [info] onion_pick_cpath_exit(): Using requested exit node 'tor'
Feb 09 11:25:04.663 [debug] onion_extend_cpath(): Path is 0 long; we want 3
Feb 09 11:25:04.664 [debug] onion_extend_cpath(): Chose router rfc1149 for hop 1 (exit is tor)
Feb 09 11:25:04.664 [debug] onion_extend_cpath(): Path is 1 long; we want 3
Feb 09 11:25:04.664 [debug] choose_good_middle_server(): Contemplating intermediate hop: random choice.
Feb 09 11:25:04.683 [info] compute_preferred_testing_list(): Looking for middle server that doesn't have the reachability bug, and chose 'Gollum'. Great.
Feb 09 11:25:04.684 [debug] onion_extend_cpath(): Chose router Gollum for hop 2 (exit is tor)
Feb 09 11:25:04.685 [debug] onion_extend_cpath(): Path is 2 long; we want 3
Feb 09 11:25:04.685 [debug] onion_extend_cpath(): Chose router tor for hop 3 (exit is tor)
Feb 09 11:25:04.685 [debug] onion_extend_cpath(): Path is complete: 3 steps long
Feb 09 11:25:04.686 [debug] circuit_handle_first_hop(): Looking for firsthop '88.191.14.223:9001'
Feb 09 11:25:04.686 [debug] circuit_handle_first_hop(): Conn open. Delivering first onion skin.
Feb 09 11:25:04.687 [debug] circuit_send_next_onion_skin(): First skin; sending create cell.
Feb 09 11:25:04.722 [debug] circuit_deliver_create_cell(): Chosen circID 23588.
Feb 09 11:25:04.722 [debug] write_to_buf(): added 512 bytes to buf (now 512 total).
Feb 09 11:25:04.723 [info] circuit_send_next_onion_skin(): First hop: finished sending CREATE cell to 'rfc1149'
Feb 09 11:25:04.723 [debug] connection_or_process_cells_from_inbuf(): 11: starting, inbuf_datalen 0 (0 pending in tls object).
Feb 09 11:25:04.724 [debug] conn_write_callback(): socket 16 wants to write.
Feb 09 11:25:04.725 [debug] flush_buf_tls_impl(): flushed 512 bytes, 0 ready to flush, 0 remain.
Feb 09 11:25:04.725 [debug] connection_handle_write(): After TLS write of 512: 0 read, 586 written
Feb 09 11:25:04.726 [debug] conn_write_callback(): socket 11 wants to write.
Feb 09 11:25:04.726 [debug] flush_buf_tls_impl(): flushed 512 bytes, 0 ready to flush, 0 remain.
Feb 09 11:25:04.727 [debug] connection_handle_write(): After TLS write of 512: 0 read, 586 written
Feb 09 11:25:04.795 [debug] conn_read_callback(): socket 11 wants to read.
Feb 09 11:25:04.796 [debug] connection_read_to_buf(): 11: starting, inbuf_datalen 0 (0 pending in tls object). at_most 4096.
Feb 09 11:25:04.796 [debug] read_to_buf_tls(): start: 0 on buf, 0 pending, at_most 4096.
Feb 09 11:25:04.797 [debug] read_to_buf_tls_impl(): before: 0 on buf, 0 pending, at_most 4096.
Feb 09 11:25:04.797 [debug] read_to_buf_tls_impl(): Read 512 bytes. 512 on inbuf; 0 pending
Feb 09 11:25:04.798 [debug] connection_read_to_buf(): After TLS read of 512: 586 read, 0 written
Feb 09 11:25:04.798 [debug] connection_or_process_cells_from_inbuf(): 11: starting, inbuf_datalen 512 (0 pending in tls object).
Feb 09 11:25:04.799 [debug] command_process_created_cell(): at OP. Finishing handshake.
Feb 09 11:25:04.831 [info] circuit_finish_handshake(): Finished building circuit hop:
Feb 09 11:25:04.832 [info] internal circ (length 3, exit tor): rfc1149(open) $BF39AFADE1ECAB0373459236D31C6A0E3B59CB82(closed) $795EC4D74109C3B4CD7ECB2B652AEF51F99CA5FB(closed)
Feb 09 11:25:04.833 [debug] command_process_created_cell(): Moving to next skin.
Feb 09 11:25:04.833 [debug] circuit_send_next_onion_skin(): starting to send subsequent skin.
Feb 09 11:25:04.868 [debug] circuit_send_next_onion_skin(): Sending extend relay cell.
Feb 09 11:25:04.868 [debug] relay_send_command_from_edge(): delivering 6 cell forward.
Feb 09 11:25:04.869 [debug] circuit_package_relay_cell(): crypting a layer of the relay cell.
Feb 09 11:25:04.869 [debug] write_to_buf(): added 512 bytes to buf (now 512 total).
Feb 09 11:25:04.870 [debug] connection_or_process_cells_from_inbuf(): 11: starting, inbuf_datalen 0 (0 pending in tls object).
Feb 09 11:25:04.870 [debug] conn_write_callback(): socket 11 wants to write.
Feb 09 11:25:04.871 [debug] flush_buf_tls_impl(): flushed 512 bytes, 0 ready to flush, 0 remain.
Feb 09 11:25:04.872 [debug] connection_handle_write(): After TLS write of 512: 0 read, 586 written
Feb 09 11:25:05.070 [debug] global_read_bucket now 6291456.
Feb 09 11:25:05.071 [debug] global_write_bucket now 6291456.
Feb 09 11:25:05.738 [debug] conn_read_callback(): socket 11 wants to read.
Feb 09 11:25:05.738 [debug] connection_read_to_buf(): 11: starting, inbuf_datalen 0 (0 pending in tls object). at_most 4096.
Feb 09 11:25:05.739 [debug] read_to_buf_tls(): start: 0 on buf, 0 pending, at_most 4096.
Feb 09 11:25:05.739 [debug] read_to_buf_tls_impl(): before: 0 on buf, 0 pending, at_most 4096.
Feb 09 11:25:05.740 [debug] read_to_buf_tls_impl(): Read 512 bytes. 512 on inbuf; 0 pending
Feb 09 11:25:05.740 [debug] connection_read_to_buf(): After TLS read of 512: 586 read, 0 written
Feb 09 11:25:05.741 [debug] connection_or_process_cells_from_inbuf(): 11: starting, inbuf_datalen 512 (0 pending in tls object).
Feb 09 11:25:05.741 [debug] circuit_receive_relay_cell(): Sending to origin.
Feb 09 11:25:05.742 [debug] connection_edge_process_relay_cell(): Now seen 5 relay cells here.
Feb 09 11:25:05.742 [debug] connection_edge_process_relay_cell(): Got an extended cell! Yay.
Feb 09 11:25:05.775 [info] circuit_finish_handshake(): Finished building circuit hop:
Feb 09 11:25:05.775 [info] exit circ (length 3, exit almostunknown): rfc1149(open) keinezensurde(open) almostunknown(open)
Feb 09 11:25:05.776 [debug] circuit_send_next_onion_skin(): starting to send subsequent skin.
Feb 09 11:25:05.776 [info] circuit_send_next_onion_skin(): circuit built!
Feb 09 11:25:05.776 [debug] connection_or_process_cells_from_inbuf(): 11: starting, inbuf_datalen 0 (0 pending in tls object).
Feb 09 11:25:06.080 [debug] global_read_bucket now 6291456.
Feb 09 11:25:06.452 [debug] conn_read_callback(): socket 11 wants to read.
Feb 09 11:25:06.452 [debug] connection_read_to_buf(): 11: starting, inbuf_datalen 0 (0 pending in tls object). at_most 4096.
Feb 09 11:25:06.452 [debug] read_to_buf_tls(): start: 0 on buf, 0 pending, at_most 4096.
Feb 09 11:25:06.452 [debug] read_to_buf_tls_impl(): before: 0 on buf, 0 pending, at_most 4096.
Feb 09 11:25:06.453 [debug] read_to_buf_tls_impl(): Read 512 bytes. 512 on inbuf; 0 pending
Feb 09 11:25:06.453 [debug] connection_read_to_buf(): After TLS read of 512: 586 read, 0 written
Feb 09 11:25:06.453 [debug] connection_or_process_cells_from_inbuf(): 11: starting, inbuf_datalen 512 (0 pending in tls object).
Feb 09 11:25:06.453 [debug] circuit_receive_relay_cell(): Sending to origin.
Feb 09 11:25:06.453 [debug] connection_edge_process_relay_cell(): Now seen 6 relay cells here.
Feb 09 11:25:06.453 [debug] connection_edge_process_relay_cell(): Got an extended cell! Yay.
Feb 09 11:25:06.486 [info] circuit_finish_handshake(): Finished building circuit hop:
Feb 09 11:25:06.487 [info] internal (high-uptime) circ (length 3, exit aim1loxal1net): rfc1149(open) petspaper(open) aim1loxal1net(open)
Feb 09 11:25:06.487 [debug] circuit_send_next_onion_skin(): starting to send subsequent skin.
Feb 09 11:25:06.488 [info] circuit_send_next_onion_skin(): circuit built!
Feb 09 11:25:06.488 [debug] connection_or_process_cells_from_inbuf(): 11: starting, inbuf_datalen 0 (0 pending in tls object).
Feb 09 11:25:06.553 [debug] conn_read_callback(): socket 16 wants to read.
Feb 09 11:25:06.554 [debug] connection_read_to_buf(): 16: starting, inbuf_datalen 0 (0 pending in tls object). at_most 4096.
Feb 09 11:25:06.554 [debug] read_to_buf_tls(): start: 0 on buf, 0 pending, at_most 4096.
Feb 09 11:25:06.554 [debug] read_to_buf_tls_impl(): before: 0 on buf, 0 pending, at_most 4096.
Feb 09 11:25:06.555 [debug] read_to_buf_tls_impl(): Read 512 bytes. 512 on inbuf; 0 pending
Feb 09 11:25:06.556 [debug] connection_read_to_buf(): After TLS read of 512: 586 read, 0 written
Feb 09 11:25:06.556 [debug] connection_or_process_cells_from_inbuf(): 16: starting, inbuf_datalen 512 (0 pending in tls object).
Feb 09 11:25:06.557 [debug] circuit_receive_relay_cell(): Sending to origin.
Feb 09 11:25:06.557 [debug] connection_edge_process_relay_cell(): Now seen 7 relay cells here.
Feb 09 11:25:06.557 [debug] connection_edge_process_relay_cell(): Got an extended cell! Yay.
Feb 09 11:25:06.590 [info] circuit_finish_handshake(): Finished building circuit hop:
Feb 09 11:25:06.590 [info] exit circ (length 3, exit superbad): SuperDuperLative(open) DrazziBTorNode(open) superbad(closed)
Feb 09 11:25:06.591 [debug] circuit_send_next_onion_skin(): starting to send subsequent skin.
Feb 09 11:25:06.628 [debug] circuit_send_next_onion_skin(): Sending extend relay cell.
Feb 09 11:25:06.629 [debug] relay_send_command_from_edge(): delivering 6 cell forward.
Feb 09 11:25:06.629 [debug] circuit_package_relay_cell(): crypting a layer of the relay cell.
Feb 09 11:25:06.630 [debug] circuit_package_relay_cell(): crypting a layer of the relay cell.
Feb 09 11:25:06.630 [debug] write_to_buf(): added 512 bytes to buf (now 512 total).
Feb 09 11:25:06.631 [debug] connection_or_process_cells_from_inbuf(): 16: starting, inbuf_datalen 0 (0 pending in tls object).
Feb 09 11:25:06.631 [debug] conn_write_callback(): socket 16 wants to write.
Feb 09 11:25:06.632 [debug] flush_buf_tls_impl(): flushed 512 bytes, 0 ready to flush, 0 remain.
Feb 09 11:25:06.632 [debug] connection_handle_write(): After TLS write of 512: 0 read, 586 written
Feb 09 11:25:06.685 [debug] conn_read_callback(): socket 11 wants to read.
Feb 09 11:25:06.686 [debug] connection_read_to_buf(): 11: starting, inbuf_datalen 0 (0 pending in tls object). at_most 4096.
Feb 09 11:25:06.686 [debug] read_to_buf_tls(): start: 0 on buf, 0 pending, at_most 4096.
Feb 09 11:25:06.687 [debug] read_to_buf_tls_impl(): before: 0 on buf, 0 pending, at_most 4096.
Feb 09 11:25:06.688 [debug] read_to_buf_tls_impl(): Read 512 bytes. 512 on inbuf; 0 pending
Feb 09 11:25:06.688 [debug] connection_read_to_buf(): After TLS read of 512: 586 read, 0 written
Feb 09 11:25:06.688 [debug] connection_or_process_cells_from_inbuf(): 11: starting, inbuf_datalen 512 (0 pending in tls object).
Feb 09 11:25:06.689 [debug] circuit_receive_relay_cell(): Sending to origin.
Feb 09 11:25:06.689 [debug] connection_edge_process_relay_cell(): Now seen 8 relay cells here.
Feb 09 11:25:06.690 [debug] connection_edge_process_relay_cell(): Got an extended cell! Yay.
Feb 09 11:25:06.723 [info] circuit_finish_handshake(): Finished building circuit hop:
Feb 09 11:25:06.723 [info] internal circ (length 3, exit tor): rfc1149(open) $BF39AFADE1ECAB0373459236D31C6A0E3B59CB82(open) $795EC4D74109C3B4CD7ECB2B652AEF51F99CA5FB(closed)
Feb 09 11:25:06.724 [debug] circuit_send_next_onion_skin(): starting to send subsequent skin.
Feb 09 11:25:06.759 [debug] circuit_send_next_onion_skin(): Sending extend relay cell.
Feb 09 11:25:06.759 [debug] relay_send_command_from_edge(): delivering 6 cell forward.
Feb 09 11:25:06.760 [debug] circuit_package_relay_cell(): crypting a layer of the relay cell.
Feb 09 11:25:06.760 [debug] circuit_package_relay_cell(): crypting a layer of the relay cell.
Feb 09 11:25:06.761 [debug] write_to_buf(): added 512 bytes to buf (now 512 total).
Feb 09 11:25:06.761 [debug] connection_or_process_cells_from_inbuf(): 11: starting, inbuf_datalen 0 (0 pending in tls object).
Feb 09 11:25:06.762 [debug] conn_write_callback(): socket 11 wants to write.
Feb 09 11:25:06.763 [debug] flush_buf_tls_impl(): flushed 512 bytes, 0 ready to flush, 0 remain.
Feb 09 11:25:06.763 [debug] connection_handle_write(): After TLS write of 512: 0 read, 586 written
Feb 09 11:25:07.091 [debug] global_read_bucket now 6291456.
Feb 09 11:25:07.092 [debug] global_write_bucket now 6291456.
Feb 09 11:25:07.719 [debug] conn_read_callback(): socket 5 wants to read.
Feb 09 11:25:07.720 [debug] connection_handle_listener_read(): Connection accepted on socket 14 (child of fd 5).
Feb 09 11:25:07.721 [debug] connection_add(): new conn type OR, socket 14, n_conns 7.
Feb 09 11:25:07.721 [debug] connection_tls_start_handshake(): starting TLS handshake on fd 14
Feb 09 11:25:07.722 [debug] connection_tls_continue_handshake(): wanted read
Feb 09 11:25:07.732 [debug] conn_read_callback(): socket 14 wants to read.
Feb 09 11:25:07.798 [debug] connection_tls_continue_handshake(): wanted read
Feb 09 11:25:08.033 [debug] conn_read_callback(): socket 14 wants to read.
Feb 09 11:25:08.076 [debug] connection_tls_finish_handshake(): tls handshake done. verifying.
Feb 09 11:25:08.078 [debug] connection_or_check_valid_handshake(): The certificate seems to be valid on incoming connection with [scrubbed]:6169
Feb 09 11:25:08.079 [debug] circuit_n_conn_done(): or_conn to Gollum, status=1
Feb 09 11:25:08.080 [debug] connection_or_process_cells_from_inbuf(): 14: starting, inbuf_datalen 0 (0 pending in tls object).
Feb 09 11:25:08.541 [debug] conn_read_callback(): socket 14 wants to read.
Feb 09 11:25:08.542 [debug] connection_read_to_buf(): 14: starting, inbuf_datalen 0 (0 pending in tls object). at_most 4096.
Feb 09 11:25:08.543 [debug] read_to_buf_tls(): start: 0 on buf, 0 pending, at_most 4096.
Feb 09 11:25:08.543 [debug] read_to_buf_tls_impl(): before: 0 on buf, 0 pending, at_most 4096.
Feb 09 11:25:08.544 [debug] read_to_buf_tls_impl(): Read 512 bytes. 512 on inbuf; 0 pending
Feb 09 11:25:08.544 [debug] connection_read_to_buf(): After TLS read of 512: 1908 read, 1450 written
Feb 09 11:25:08.544 [debug] connection_or_process_cells_from_inbuf(): 14: starting, inbuf_datalen 512 (0 pending in tls object).
Feb 09 11:25:08.545 [debug] write_to_buf(): added 1 bytes to buf (now 1 total).
Feb 09 11:25:08.545 [debug] write_to_buf(): added 8 bytes to buf (now 9 total).
Feb 09 11:25:08.546 [debug] write_to_buf(): added 186 bytes to buf (now 195 total).
Feb 09 11:25:08.546 [debug] command_process_create_cell(): success: handed off onionskin.
Feb 09 11:25:08.546 [debug] connection_or_process_cells_from_inbuf(): 14: starting, inbuf_datalen 0 (0 pending in tls object).
Feb 09 11:25:08.547 [debug] conn_write_callback(): socket 15 wants to write.
Feb 09 11:25:08.570 [debug] flush_buf(): 15: flushed 195 bytes, 0 ready to flush, 0 remain.
Feb 09 11:25:08.571 [debug] conn_read_callback(): socket 16 wants to read.
Feb 09 11:25:08.572 [debug] connection_read_to_buf(): 16: starting, inbuf_datalen 0 (0 pending in tls object). at_most 4096.
Feb 09 11:25:08.572 [debug] read_to_buf_tls(): start: 0 on buf, 0 pending, at_most 4096.
Feb 09 11:25:08.572 [debug] read_to_buf_tls_impl(): before: 0 on buf, 0 pending, at_most 4096.
Feb 09 11:25:08.573 [debug] read_to_buf_tls_impl(): Read 512 bytes. 512 on inbuf; 0 pending
Feb 09 11:25:08.573 [debug] connection_read_to_buf(): After TLS read of 512: 586 read, 0 written
Feb 09 11:25:08.574 [debug] connection_or_process_cells_from_inbuf(): 16: starting, inbuf_datalen 512 (0 pending in tls object).
Feb 09 11:25:08.574 [debug] circuit_receive_relay_cell(): Sending to origin.
Feb 09 11:25:08.575 [debug] connection_edge_process_relay_cell(): Now seen 9 relay cells here.
Feb 09 11:25:08.575 [debug] connection_edge_process_relay_cell(): Got an extended cell! Yay.
Feb 09 11:25:08.648 [info] circuit_finish_handshake(): Finished building circuit hop:
Feb 09 11:25:08.648 [info] exit circ (length 3, exit superbad): SuperDuperLative(open) DrazziBTorNode(open) superbad(open)
Feb 09 11:25:08.649 [debug] circuit_send_next_onion_skin(): starting to send subsequent skin.
Feb 09 11:25:08.649 [info] circuit_send_next_onion_skin(): circuit built!
Feb 09 11:25:08.650 [debug] connection_or_process_cells_from_inbuf(): 16: starting, inbuf_datalen 0 (0 pending in tls object).
Feb 09 11:25:08.692 [debug] cpuworker_main(): onion_skin_server_handshake succeeded.
Feb 09 11:25:08.693 [debug] cpuworker_main(): finished writing response.
Feb 09 11:25:08.694 [debug] conn_read_callback(): socket 15 wants to read.
Feb 09 11:25:08.694 [debug] read_to_buf_impl(): Read 229 bytes. 229 on inbuf.
Bus Error
# Feb 09 11:25:08.712 [info] cpuworker_main(): CPU worker exiting because Tor process closed connection (either rotated keys or died).
[Automatically added by flyspray2trac: Operating System: Solaris]
**Trac**:
**Username**: jabahttps://gitlab.torproject.org/tpo/core/tor/-/issues/605unit tests problem on open/net bsd2020-06-27T14:10:25ZRoger Dingledineunit tests problem on open/net bsdRunning Tor unit tests on OpenBSD i386
============================== buffers
.................................................................................................................................................................Running Tor unit tests on OpenBSD i386
============================== buffers
..................................................................................................................................................................................................................................................................................................................................................................................................................................
============================== crypto
.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
============================== util
.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
============================== onion_handshake
.....
============================== dir_format
.....................................test: (0xcf7f7c2c)
test in free(): error: ifree: junk pointer, too high to make sense
Abort trap (core dumped)
(gdb) bt
#0 0x0ca54a25 in kill () from /usr/lib/libc.so.39.3
#1 0x0ca8d353 in abort () at /usr/src/lib/libc/stdlib/abort.c:65
legacy/trac#2 0x0ca746d9 in wrterror (p=0x2ca23400 "ifree: junk pointer, too high to make sense")
at /usr/src/lib/libc/stdlib/malloc.c:434
legacy/trac#3 0x0ca7479b in wrtwarning (p=0x2ca23400 "ifree: junk pointer, too high to make sense")
at /usr/src/lib/libc/stdlib/malloc.c:444
legacy/trac#4 0x0ca7572e in ifree (ptr=0xcf7f7c2c) at /usr/src/lib/libc/stdlib/malloc.c:1750
legacy/trac#5 0x0ca75961 in free (ptr=0xcf7f7c2c) at /usr/src/lib/libc/stdlib/malloc.c:1838
legacy/trac#6 0x1c055781 in addr_policy_free (p=0xcf7f7c2c) at policies.c:899
legacy/trac#7 0x1c0556be in addr_policy_list_free (lst=0x83c385f0) at policies.c:881
legacy/trac#8 0x1c06b0d7 in routerinfo_free (router=0x80cfd300) at routerlist.c:2145
legacy/trac#9 0x1c08f85b in test_dir_format () at test.c:2358
legacy/trac#10 0x1c097ed7 in main (c=1006961088, v=0xcf7fbe7c) at test.c:3599
This is why r13450 is there. We should fix it better, sometime, too.
[Automatically added by flyspray2trac: Operating System: All]post 0.2.0.xhttps://gitlab.torproject.org/tpo/core/tor/-/issues/606v3 authorities forgetting certs at restart2020-06-27T14:10:25ZRoger Dingledinev3 authorities forgetting certs at restartmoria1 (running r13476) forgets all its certs every time it restarts.
-rw------- 1 tord tord 9804 2008-02-11 23:45 cached-certs
...
Feb 12 15:27:55.253 [info] init_keys(): adding my own v3 cert
Feb 12 15:27:55.253 [info] trusted_di...moria1 (running r13476) forgets all its certs every time it restarts.
-rw------- 1 tord tord 9804 2008-02-11 23:45 cached-certs
...
Feb 12 15:27:55.253 [info] init_keys(): adding my own v3 cert
Feb 12 15:27:55.253 [info] trusted_dirs_load_certs_from_string(): Adding downloa
ded certificate for directory authority moria1 with signing key CCB7170F6B270B44
301712DD7BC04BF9515AF374
Feb 12 15:27:55.254 [debug] mp_pool_new(): Capacity is 992, item size is 528, al
loc size is 523776
Feb 12 15:27:55.254 [debug] authority_cert_parse_from_string(): We already check
ed the signature on this certificate; no need to do so again.
Feb 12 15:27:55.254 [info] trusted_dirs_load_certs_from_string(): Skipping cache
d certificate for moria1 that we already have.
Feb 12 15:27:55.288 [info] router_set_networkstatus_v2(): Setting networkstatus
cached from directory server "moria1" at 128.31.0.34:9031 (published 2008-02-12
20:26:30)
Feb 12 15:27:55.398 [info] router_set_networkstatus_v2(): Setting networkstatus
cached from directory server "tor26" at 86.59.21.38:80 (published 2008-02-12 20:
20:21)
Feb 12 15:27:55.482 [info] router_set_networkstatus_v2(): Setting networkstatus
cached from directory server "moria2" at 128.31.0.34:9032 (published 2008-02-12
20:20:08)
Feb 12 15:27:55.568 [info] router_set_networkstatus_v2(): Setting networkstatus
cached from directory server "dizum" at 194.109.206.212:80 (published 2008-02-12
20:20:01)
Feb 12 15:27:55.653 [info] router_set_networkstatus_v2(): Setting networkstatus
cached from directory server "lefkada" at 140.247.60.64:80 (published 2008-02-12
20:22:06)
Feb 12 15:27:55.741 [info] networkstatus_check_consensus_signature(): Looks like
we need to download a new certificate from authority 'lefkada' at 140.247.60.64
:80 (contact 1024D/0E606699 Geoff Goodell <goodell@eecs.harvard.edu>; identity 0
D95B91896E6089AB9A3C6CB56E724CAF898C43F)
Feb 12 15:27:55.741 [info] networkstatus_check_consensus_signature(): Looks like
we need to download a new certificate from authority 'ides' at 216.224.124.114:
9030 (contact Mike Perry <mikeperryTAfsckedTODorg>; identity 27B6B5996C426270A5C
95488AA5BCEB6BCC86956)
Feb 12 15:27:55.741 [info] networkstatus_check_consensus_signature(): Looks like
we need to download a new certificate from authority 'dannenberg' at dannenberg
.ccc.de:80 (contact J. Random Hacker <anonymizer@ccc.de>; identity 585769C78764D
58426B8B52B6651A5A71137189A)
Feb 12 15:27:55.741 [info] networkstatus_check_consensus_signature(): Looks like
we need to download a new certificate from authority 'tor26' at 86.59.21.38:80
(contact Peter Palfrader <peter@palfrader.org> (PGP Key: 0x94C09C7F; Key fingerp
rint: 5B00 C96D 5D54 AEE1 206B AF84 DE7A AF6E 94C0 9C7F); identity A9AC67E64B20
0BBF2FA26DF194AC0469E2A948C6)
Feb 12 15:27:55.741 [info] networkstatus_check_consensus_signature(): Looks like
we need to download a new certificate from authority 'gabelmoo' at 88.198.7.215
:80 (contact 1024D/F7C11265 Karsten Loesing <karsten dot loesing AT gmx dot net>
; identity EAA879B5C75032E462CB018630D2D0DF46EBA606)
Feb 12 15:27:55.742 [warn] 0 unknown, 5 missing key, 1 good, 0 bad, 0 no signatu
re, 4 required
Feb 12 15:27:55.742 [notice] Not enough certificates to check networkstatus cons
ensus
Feb 12 15:27:55.742 [info] read_file_to_str(): Could not open "moria1/unverified
-consensus": No such file or directory
Feb 12 15:27:55.743 [info] read_file_to_str(): Could not open "/usr/local/share/
tor/fallback-consensus": No such file or directory
Feb 12 15:27:55.743 [notice] We're missing a certificate from authority with sig
ning key 783A368067E26CDD64205EFCF1C5066B5F55EDCB: launching request.
Feb 12 15:27:55.743 [notice] We're missing a certificate from authority with sig
ning key 250A21E163A25851BB574E80DC4E41AE86F60C89: launching request.
Feb 12 15:27:55.743 [notice] We're missing a certificate from authority with sig
ning key F0A23AD304A0CFF4C27B3D0AE23468FBDD4E88F0: launching request.
Feb 12 15:27:55.743 [notice] We're missing a certificate from authority with sig
ning key DAB9DC29E8CFEEEAF8F47F1DE144E2A2F89C4128: launching request.
Feb 12 15:27:55.743 [notice] We're missing a certificate from authority with sig
ning key 2A9EABF158D0D4BFFA6C4A8EDC84A4F6487FCE9B: launching request.
Feb 12 15:27:55.743 [info] router_pick_directory_server(): No reachable router e
ntries for dirservers. Trying them all again.
...
[Automatically added by flyspray2trac: Operating System: All]0.2.0.x-rcNick MathewsonNick Mathewsonhttps://gitlab.torproject.org/tpo/core/tor/-/issues/607INFO logging is a bit noisy.2020-06-27T14:10:25ZNick MathewsonINFO logging is a bit noisy.Tor logs certain messages a lot more than others. Here are the top ten offenders on peacetime:
1099 info] update_consensus_router_descriptor_downloads(): %d router descriptors downloadable. %d delayed; %d present (%d of those were i...Tor logs certain messages a lot more than others. Here are the top ten offenders on peacetime:
1099 info] update_consensus_router_descriptor_downloads(): %d router descriptors downloadable. %d delayed; %d present (%d of those were in old_routers); %d would_reject; %d wouldnt_use, %d in progress.
1102 info] routerlist_remove_old_routers(): We have %d live routers and %d old router descriptors. At most %d must be retained because of networkstatuses.
1318 info] update_extrainfo_downloads(): Extrainfo download status: %d router with no ei, %d with present ei, %d delaying, %d pending, %d downloadable.
1691 info] connection_close_immediate(): fd %d, type %s, state %s, %d bytes on outbuf.
1787 info] run_connection_housekeeping(): Expiring non-used OR connection to fd %d (%s:%d) [Not in clique mode].
2103 info] directory_handle_command_get(): Client asked for network status lists, but we've been writing too many bytes lately. Sending 503 Dir busy.
5037 info] entry_guards_compute_status(): Summary: Entry '%s' is %s, %s%s, and %s.
10352 info] directory_handle_command_get(): Client asked for server descriptors, but we've been writing too many bytes lately. Sending 503 Dir busy.
12993 info] circuit_extend(): Next router (%s:%d) not connected. Connecting.
15849 info] connection_read_to_buf(): tls error [%s]. breaking (nickname %s, address %s).
This is out of around 60k messages of severity INFO or higher; the top 4 account for 3/4 of all log messages.
[Automatically added by flyspray2trac: Operating System: All]0.2.0.x-finalhttps://gitlab.torproject.org/tpo/core/tor/-/issues/608Clients flip out when two routers use the same identity key2020-06-27T14:10:25ZNick MathewsonClients flip out when two routers use the same identity keyIf two routers are set up to use the same identity key, the authorities will sometimes list both. This confuses
clients. Instead, authorities should only allow one server per key.
[Automatically added by flyspray2trac: Operating Syste...If two routers are set up to use the same identity key, the authorities will sometimes list both. This confuses
clients. Instead, authorities should only allow one server per key.
[Automatically added by flyspray2trac: Operating System: All]Tor: unspecifiedhttps://gitlab.torproject.org/tpo/core/tor/-/issues/609Servers no longer learn IP from authorities2020-06-27T14:10:25ZNick MathewsonServers no longer learn IP from authoritiesAccording to arma, the new code that keeps non-cache serves from using the authorities to download directory information
means that many hosts won't talk to the authorities, and therefore won't learn their IP addresses from the
X-Your-IP...According to arma, the new code that keeps non-cache serves from using the authorities to download directory information
means that many hosts won't talk to the authorities, and therefore won't learn their IP addresses from the
X-Your-IP-Is header.
[Automatically added by flyspray2trac: Operating System: All]0.2.0.x-rchttps://gitlab.torproject.org/tpo/core/tor/-/issues/610automake complains on debian etch2020-06-27T14:10:24ZRoger Dingledineautomake complains on debian etcharma@last-request:~/torsvn/trunk$ automake --add-missing --copy
src/common/Makefile.am:6: libor_a_SOURCES was already defined in condition TRUE, which implies condition USE_OPENBSD_MALLOC_TRUE
#CFLAGS = -Wall -Wpointer-arith -...arma@last-request:~/torsvn/trunk$ automake --add-missing --copy
src/common/Makefile.am:6: libor_a_SOURCES was already defined in condition TRUE, which implies condition USE_OPENBSD_MALLOC_TRUE
#CFLAGS = -Wall -Wpointer-arith -O2
libor_a_SOURCES (User, where = src/common/Makefile.am:6) +=
{
TRUE => log.c util.c compat.c container.c mempool.c
}
src/common/Makefile.am:6: warning: automake does not support conditional definition of libor_a_SOURCES in libor_a_SOURCES
Use of uninitialized value in concatenation (.) or string at /usr/bin/automake line 8450.
: am_libor_a_OBJECTS was already defined in condition TRUE, which implies condition USE_OPENBSD_MALLOC_TRUE
am_libor_a_OBJECTS (Automake, where = undefined) =
{
TRUE => log.$(OBJEXT) util.$(OBJEXT) compat.$(OBJEXT) container.$(OBJEXT) mempool.$(OBJEXT)
}
It looks like it worked anyway -- I can still build. But this is probably
something we should fix.
$ automake --version
automake (GNU automake) 1.6.3
[Automatically added by flyspray2trac: Operating System: All]0.2.0.x-rcNick MathewsonNick Mathewsonhttps://gitlab.torproject.org/tpo/core/tor/-/issues/611Apparently, we can use more than 15000 connections2020-06-27T14:10:24ZNick MathewsonApparently, we can use more than 15000 connectionsOn or-talk, Olaf Selke reports:
debugging the "[warn] Error creating network socket: Too
many open files" messages I just found the max number of
file descriptors apparently being ha...On or-talk, Olaf Selke reports:
debugging the "[warn] Error creating network socket: Too
many open files" messages I just found the max number of
file descriptors apparently being hard coded in or.h to a
value of 15.000. Raising the number using ulimit -n thus
shows no effect.
The 15000 cap once made sense when we had a static array of connections, but now that the list is unlimited, there
is no need to have it be an upper bound. Let's change it from an upper bound into a default.
[Automatically added by flyspray2trac: Operating System: All]0.2.0.x-rc