Trac issueshttps://gitlab.torproject.org/legacy/trac/-/issues2020-06-13T15:36:38Zhttps://gitlab.torproject.org/legacy/trac/-/issues/29042Error loading private key after 0.3.5.7 upgrade2020-06-13T15:36:38ZTracError loading private key after 0.3.5.7 upgradeHi,
I just upgraded my tor relay from 0.3.4.9 to 0.3.5.7 via the official debian repository. Now my relay is unable to start up:
Jan 10 11:24:48.000 [err] Error loading private key.
Jan 10 11:24:48.000 [err] Error initializing keys; ex...Hi,
I just upgraded my tor relay from 0.3.4.9 to 0.3.5.7 via the official debian repository. Now my relay is unable to start up:
Jan 10 11:24:48.000 [err] Error loading private key.
Jan 10 11:24:48.000 [err] Error initializing keys; exiting
What can I do to fix it?
root@DietPi:/var/lib/tor/keys# ls -lah
total 44K
drwx--S--- 2 tor tor 4.0K Jan 5 18:55 .
drwx--S--- 5 tor tor 4.0K Jan 10 11:24 ..
-rw-r--r-- 1 tor tor 64 Dec 13 2015 ed25519_master_id_public_key
-rw-r--r-- 1 tor tor 96 Dec 13 2015 ed25519_master_id_secret_key
-rw------- 1 tor tor 172 Dec 18 23:00 ed25519_signing_cert
-rw------- 1 tor tor 96 Dec 18 23:00 ed25519_signing_secret_key
-rw-r--r-- 1 tor tor 902 Nov 6 2013 secret_id_key
-rw------- 1 tor tor 887 Jan 5 18:55 secret_onion_key
-rw------- 1 tor tor 96 Jan 5 18:55 secret_onion_key_ntor
-rw------- 1 tor tor 96 Dec 8 18:07 secret_onion_key_ntor.old
-rw------- 1 tor tor 887 Dec 8 18:07 secret_onion_key.old
**Trac**:
**Username**: anongTor: 0.3.5.x-finalNick MathewsonNick Mathewsonhttps://gitlab.torproject.org/legacy/trac/-/issues/28924Our make V=1 logs have become too verbose for travis2020-06-13T15:35:54ZNick MathewsonOur make V=1 logs have become too verbose for travisFor some reason, Travis thinks that it's unreasonable for us to log this kind of thing for with clang command line:
```
clang -DHAVE_CONFIG_H -I. -I./src -I./src/ext -I./src/ext/trunnel
-I./src/trunnel -I./src/ext -Isrc/ext -DSHARE_D...For some reason, Travis thinks that it's unreasonable for us to log this kind of thing for with clang command line:
```
clang -DHAVE_CONFIG_H -I. -I./src -I./src/ext -I./src/ext/trunnel
-I./src/trunnel -I./src/ext -Isrc/ext -DSHARE_DATADIR="\"/usr/local/share\""
-DLOCALSTATEDIR="\"/usr/local/var\"" -DBINDIR="\"/usr/local/bin\""
-DTOR_UNIT_TESTS -DHAVE_MODULE_DIRAUTH=1 -ftrapv -fsanitize=address
-fsanitize=undefined -g -O2 -U_FORTIFY_SOURCE -D_FORTIFY_SOURCE=2
-Qunused-arguments -fstack-protector-all -Wstack-protector --param
ssp-buffer-size=1 -fPIE -fno-omit-frame-pointer -fasynchronous-unwind-tables
-Wall -fno-strict-aliasing -Waddress -Waddress-of-array-temporary
-Waddress-of-temporary -Wambiguous-macro -Wanonymous-pack-parens -Warc
-Warc-bridge-casts-disallowed-in-nonarc -Warc-maybe-repeated-use-of-weak
-Warc-performSelector-leaks -Warc-repeated-use-of-weak -Warray-bounds
-Warray-bounds-pointer-arithmetic -Wasm -Wasm-operand-widths
-Watomic-properties -Watomic-property-with-user-defined-accessor -Wauto-import
-Wauto-storage-class -Wauto-var-id -Wavailability -Wbackslash-newline-escape
-Wbind-to-temporary-copy -Wbitfield-constant-conversion -Wbool-conversion
-Wbool-conversions -Wbuiltin-requires-header -Wchar-align
-Wcompare-distinct-pointer-types -Wcomplex-component-init
-Wconditional-type-mismatch -Wconfig-macros -Wconstant-conversion
-Wconstant-logical-operand -Wconstexpr-not-const -Wcustom-atomic-properties
-Wdangling-field -Wdangling-initializer-list -Wdate-time
-Wdelegating-ctor-cycles -Wdeprecated-implementations -Wdeprecated-register
-Wdirect-ivar-access -Wdiscard-qual -Wdistributed-object-modifiers
-Wdivision-by-zero -Wdollar-in-identifier-extension -Wdouble-promotion
-Wduplicate-decl-specifier -Wduplicate-enum -Wduplicate-method-arg
-Wduplicate-method-match -Wdynamic-class-memaccess -Wembedded-directive
-Wempty-translation-unit -Wenum-conversion -Wexit-time-destructors
-Wexplicit-ownership-type -Wextern-initializer -Wextra -Wextra-semi
-Wextra-tokens -Wflexible-array-extensions -Wfloat-conversion -Wformat-non-iso
-Wfour-char-constants -Wgcc-compat -Wglobal-constructors
-Wgnu-array-member-paren-init -Wgnu-designator -Wgnu-static-float-init
-Wheader-guard -Wheader-hygiene -Widiomatic-parentheses -Wignored-attributes
-Wimplicit-atomic-properties -Wimplicit-conversion-floating-point-to-bool
-Wimplicit-exception-spec-mismatch -Wimplicit-fallthrough
-Wimplicit-fallthrough-per-function -Wimplicit-retain-self
-Wimport-preprocessor-directive-pedantic -Wincompatible-library-redeclaration
-Wincompatible-pointer-types-discards-qualifiers -Wincomplete-implementation
-Wincomplete-module -Wincomplete-umbrella -Winit-self -Wint-conversions
-Wint-to-void-pointer-cast -Winteger-overflow -Winvalid-constexpr
-Winvalid-iboutlet -Winvalid-noreturn -Winvalid-pp-token
-Winvalid-source-encoding -Winvalid-token-paste -Wknr-promoted-parameter
-Wlarge-by-value-copy -Wliteral-conversion -Wliteral-range
-Wlocal-type-template-args -Wloop-analysis -Wmain-return-type
-Wmalformed-warning-check -Wmethod-signatures -Wmicrosoft -Wmicrosoft-exists
-Wmismatched-parameter-types -Wmismatched-return-types
-Wmissing-field-initializers -Wmissing-format-attribute -Wmissing-noreturn
-Wmissing-selector-name -Wmissing-sysroot -Wmissing-variable-declarations
-Wmodule-conflict -Wnested-anon-types -Wnewline-eof
-Wnon-literal-null-conversion -Wnon-pod-varargs -Wnonportable-cfstrings
-Wnull-arithmetic -Wnull-character -Wnull-conversion -Wnull-dereference
-Wout-of-line-declaration -Wover-aligned -Woverlength-strings
-Woverriding-method-mismatch -Wpointer-type-mismatch
-Wpredefined-identifier-outside-function
-Wprotocol-property-synthesis-ambiguity -Wreadonly-iboutlet-property
-Wreceiver-expr -Wreceiver-forward-class -Wreinterpret-base-class
-Wrequires-super-attribute -Wreserved-user-defined-literal
-Wreturn-stack-address -Wsection -Wselector-type-mismatch -Wsentinel
-Wserialized-diagnostics -Wshadow -Wshift-count-negative
-Wshift-count-overflow -Wshift-negative-value -Wshift-sign-overflow
-Wshorten-64-to-32 -Wsizeof-array-argument -Wsource-uses-openmp
-Wstatic-float-init -Wstatic-in-inline -Wstatic-local-in-inline
-Wstrict-overflow=1 -Wstring-compare -Wstring-conversion
-Wstrlcpy-strlcat-size -Wstrncat-size -Wsuper-class-method-mismatch
-Wswitch-bool -Wtautological-constant-out-of-range-compare
-Wtentative-definition-incomplete-type -Wtype-safety -Wtypedef-redefinition
-Wtypename-missing -Wundefined-inline -Wundefined-internal
-Wundefined-reinterpret-cast -Wunicode -Wunicode-whitespace
-Wunknown-warning-option -Wunnamed-type-template-args
-Wunneeded-member-function -Wunsequenced -Wunsupported-visibility
-Wunused-command-line-argument -Wunused-exception-parameter
-Wunused-local-typedefs -Wunused-member-function -Wunused-volatile-lvalue
-Wuser-defined-literals -Wvariadic-macros -Wvector-conversion
-Wvector-conversions -Wvexing-parse -Wvisibility -Wvla-extension
-Wzero-length-array -W -Wfloat-equal -Wundef -Wpointer-arith
-Wstrict-prototypes -Wmissing-prototypes -Wwrite-strings -Wredundant-decls
-Wchar-subscripts -Wcomment -Wformat=2 -Wwrite-strings -Wnested-externs
-Wbad-function-cast -Wswitch-enum -Waggregate-return -Wpacked -Wunused
-Wunused-parameter -Wold-style-definition -Wmissing-declarations -Werror -MT
src/core/or/src_core_libtor_app_testing_a-onion.o -MD -MP -MF
src/core/or/.deps/src_core_libtor_app_testing_a-onion.Tpo -c -o
src/core/or/src_core_libtor_app_testing_a-onion.o `test -f
'src/core/or/onion.c' || echo './'`src/core/or/onion.c
```
With #27167, it has meant that travis is no longer willing to do do a full verbose clang build.Tor: 0.3.5.x-finalNick MathewsonNick Mathewsonhttps://gitlab.torproject.org/legacy/trac/-/issues/28843DROPOWNERSHIP command2020-06-13T15:35:37ZDamian JohnsonDROPOWNERSHIP commandHi Nick! As discussed a DROPOWNERSHIP command would be handy for the following use case...
```
00:04 <+atagar> Sorry, I'm probably not groking what you're suggesting.
OwningControllerFd sounds to be for TAKEOWNERSHIP of a control socke...Hi Nick! As discussed a DROPOWNERSHIP command would be handy for the following use case...
```
00:04 <+atagar> Sorry, I'm probably not groking what you're suggesting.
OwningControllerFd sounds to be for TAKEOWNERSHIP of a control socket
(https://gitweb.torproject.org/torspec.git/tree/control-spec.txt#n3396). Do you
mean 'don't open a control port, but open a control socket instead'?
00:05 <+nickm> It is more special than that.
00:05 <+nickm> you open a socketpair, and pass one end to tor when you start it
00:06 <+nickm> since the os enforces ownership, you don't need to do any other authentication
00:06 <+atagar> Ah. So stem opens a local socket before starting tor, provides
this socket as a torrc argument, listens to the bootstrap messages, then
disconnects?
00:07 <+atagar> That certainly sounds like it would do the trick.
00:08 <+atagar> In this case I don't want tor to terminate when I disconnect
(which is the usual purpose of TAKEOWNERSHIP), but if I can avoid that this
sounds perfect.
00:09 <+nickm> sounds like a DROPOWNERSHIP command would be sufficient for your
needs then
00:09 <+nickm> open a ticket and I'll make one :)
00:10 <+nickm> or remind me next week
00:10 <+atagar> Wonderful! Thanks, will do.
```Tor: 0.4.0.x-finalNick MathewsonNick Mathewsonhttps://gitlab.torproject.org/legacy/trac/-/issues/28668If a Tor unit test causes a BUG log, it should fail2020-06-13T15:34:56ZteorIf a Tor unit test causes a BUG log, it should failIn #28660, a successful unit test logged a BUG warning, but the test still succeeded.
We should make tests fail by default if they log a BUG() or LD_BUG warning, but allow some tests to expect bug warnings.
I thought we made this chang...In #28660, a successful unit test logged a BUG warning, but the test still succeeded.
We should make tests fail by default if they log a BUG() or LD_BUG warning, but allow some tests to expect bug warnings.
I thought we made this change, or had a ticket for this change, but I couldn't find it.Tor: 0.3.5.x-finalNick MathewsonNick Mathewsonhttps://gitlab.torproject.org/legacy/trac/-/issues/28558Crash in memoize_protover_summary() when cache is full2020-06-13T15:34:26ZNick MathewsonCrash in memoize_protover_summary() when cache is fullIn `memoize_protover_summary()`, after we call `protover_summary_cache_free_all()`, we need to re-create `protover_summary_map`. Otherwise we'll hit an assertion.
Found by OSS-Fuzz; not in any released version.In `memoize_protover_summary()`, after we call `protover_summary_cache_free_all()`, we need to re-create `protover_summary_map`. Otherwise we'll hit an assertion.
Found by OSS-Fuzz; not in any released version.Tor: 0.4.0.x-finalNick MathewsonNick Mathewsonhttps://gitlab.torproject.org/legacy/trac/-/issues/28421Move control_per_second_events() into a separate callback.2020-06-13T15:34:04ZNick MathewsonMove control_per_second_events() into a separate callback.Tor: 0.4.0.x-finalNick MathewsonNick Mathewsonhttps://gitlab.torproject.org/legacy/trac/-/issues/28247Use build.rs in place of test_linking_hack2020-06-13T15:33:31ZNick MathewsonUse build.rs in place of test_linking_hackSee Alex Crichton's comments at https://github.com/torproject/tor/commit/a8ac21fbb5f22b68ffa019b575085c142293bc40#commitcomment-30729271See Alex Crichton's comments at https://github.com/torproject/tor/commit/a8ac21fbb5f22b68ffa019b575085c142293bc40#commitcomment-30729271Tor: unspecifiedhttps://gitlab.torproject.org/legacy/trac/-/issues/281150.3.5.3 FTBFS on mips and s3902020-06-13T15:33:04Zweasel (Peter Palfrader)0.3.5.3 FTBFS on mips and s390Tor 0.3.5.3-alpha-1 has failed to build on s390x and mips for Debian experimental. Other mips* platforms have not yet been tried.
For now,
https://buildd.debian.org/status/fetch.php?pkg=tor&arch=s390x&ver=0.3.5.3-alpha-1&stamp=15398446...Tor 0.3.5.3-alpha-1 has failed to build on s390x and mips for Debian experimental. Other mips* platforms have not yet been tried.
For now,
https://buildd.debian.org/status/fetch.php?pkg=tor&arch=s390x&ver=0.3.5.3-alpha-1&stamp=1539844680&raw=0
and
https://buildd.debian.org/status/fetch.php?pkg=tor&arch=mips&ver=0.3.5.3-alpha-1&stamp=1539846878&raw=0
have the full build logs.
```
crypto/ope/vectors:
FAIL ../src/test/test_crypto_ope.c:141: assert(crypto_ope_encrypt(ope, val) OP_EQ res): 3968478454 vs 3971694514
[vectors FAILED]
```
is common to both (same numbers too).
Additionally, on mips this happened:
```
storagedir/empty: [forking] OK
storagedir/basic: [forking] Oct 18 07:14:22.551 [err] tor_assertion_failed_(): Bug: ../src/test/testing_rsakeys.c:540: init_pregenerated_keys: Assertion r == 0 failed; aborting. (on Tor 0.3.5.3-alpha )
Oct 18 07:14:22.553 [err] Bug: Assertion r == 0 failed in init_pregenerated_keys at ../src/test/testing_rsakeys.c:540. Stack trace: (on Tor 0.3.5.3-alpha )
Oct 18 07:14:22.553 [err] Bug: ./src/test/test(log_backtrace_impl+0x84) [0x55cb65f8] (on Tor 0.3.5.3-alpha )
Oct 18 07:14:22.554 [err] Bug: ./src/test/test(tor_assertion_failed_+0xc4) [0x55cb1188] (on Tor 0.3.5.3-alpha )
Oct 18 07:14:22.554 [err] Bug: ./src/test/test(init_pregenerated_keys+0x198) [0x55a9b130] (on Tor 0.3.5.3-alpha )
Oct 18 07:14:22.554 [err] Bug: ./src/test/test(testcase_run_one+0x2d8) [0x55a9b530] (on Tor 0.3.5.3-alpha )
Oct 18 07:14:22.554 [err] Bug: ./src/test/test(tinytest_main+0x188) [0x55a9be64] (on Tor 0.3.5.3-alpha )
Oct 18 07:14:22.555 [err] Bug: ./src/test/test(main+0x3ec) [0x556ec43c] (on Tor 0.3.5.3-alpha )
Oct 18 07:14:22.555 [err] Bug: /lib/mips-linux-gnu/libc.so.6(__libc_start_main+0x108) [0x76f48cf8] (on Tor 0.3.5.3-alpha )
Oct 18 07:14:22.555 [err] Bug: ./src/test/test(+0x5f5b4) [0x556ec5b4] (on Tor 0.3.5.3-alpha )
```Tor: 0.3.5.x-finalNick MathewsonNick Mathewsonhttps://gitlab.torproject.org/legacy/trac/-/issues/27992config DataDirectoryGroupReadable 1 is overridden if you set KeyDir == DataDir2020-06-13T15:32:35ZTracconfig DataDirectoryGroupReadable 1 is overridden if you set KeyDir == DataDirim trying to run zeronet over tor.
i need group access to the DataDirectory for cookie auth
so /var/lib/tor should have file mode 0750
spoiler: see below for workarounds + bugfix
when i run
# d=$(date +"%F %T"); \
chmod 0750 /var/lib/...im trying to run zeronet over tor.
i need group access to the DataDirectory for cookie auth
so /var/lib/tor should have file mode 0750
spoiler: see below for workarounds + bugfix
when i run
# d=$(date +"%F %T"); \
chmod 0750 /var/lib/tor; \
systemctl restart tor; sleep 2; \
journalctl -u tor --since="$d" \
| grep -i permissions; \
stat -c%a /var/lib/tor
i always get
Fixing permissions on directory /var/lib/tor
700
and datadir ends up with filemode 0700
so it is not accessible for other users in the tor group
... though in my torrc i set
DataDirectoryGroupReadable 1
# usermod -a -G tor zeronet
# sudo -u zeronet cat /var/lib/tor/control_auth_cookie
cat: /var/lib/tor/control_auth_cookie: Permission denied
the authcookie filemode is set correctly to 0640
with the config
CookieAuthFileGroupReadable 1
--
workaround 1
run
# chmod 0750 /var/lib/tor
after starting tor
workaround 2
add
CacheDirectoryGroupReadable 1
to your torrc file
workaround 3
add
CacheDirectory = /var/lib/tor/cache
to your torrc file
if your cache dir should not be group readable
why workaround 2 and 3?
cos the error only happens
if CacheDirectory == DataDirectory
which is the default config
--
bugfix
in
src/app/config/config.c
add
if (strcmp(options->KeyDirectory, options->DataDirectory) != 0) {
and
if (strcmp(options->CacheDirectory, options->DataDirectory) != 0) {
around line 1570 and 1590
before calling
check_and_create_data_directory
... and close the parentheses
--
# cat /etc/tor/torrc
Log notice syslog
DataDirectory /var/lib/tor
DataDirectoryGroupReadable 1
ControlPort 9051
CookieAuthentication 1
CookieAuthFileGroupReadable 1
CookieAuthFile /var/lib/tor/control_auth_cookie
**Trac**:
**Username**: needle8420Tor: 0.4.3.x-finalNick MathewsonNick Mathewsonhttps://gitlab.torproject.org/legacy/trac/-/issues/27530Configure: Use AC_TRY_RUN() to check that --enable-gcc-hardening works2020-06-13T15:30:57ZteorConfigure: Use AC_TRY_RUN() to check that --enable-gcc-hardening worksSplit off [comment:3:ticket:27460 #27460 Comment 3]:
> maybe in 0.3.5 we should change the implementation of gcc-hardening so that it does an AC_TRY_RUN() to see whether it can use these compiler flags safely. That could be another tick...Split off [comment:3:ticket:27460 #27460 Comment 3]:
> maybe in 0.3.5 we should change the implementation of gcc-hardening so that it does an AC_TRY_RUN() to see whether it can use these compiler flags safely. That could be another ticket, though.
When we merge to 0.3.5, we should also revert #27460.Tor: 0.4.1.x-finalNick MathewsonNick Mathewsonhttps://gitlab.torproject.org/legacy/trac/-/issues/26947Add function for reporting the tor version in tor_api.h2020-06-13T15:28:45ZArturo FilastòAdd function for reporting the tor version in tor_api.hAs a user of libtor_api it would be useful for me to be able to obtain the version of tor without having to call it's main function.
The function could look something like:
```
const char * tor_version()
{
return tor_version_string...As a user of libtor_api it would be useful for me to be able to obtain the version of tor without having to call it's main function.
The function could look something like:
```
const char * tor_version()
{
return tor_version_string;
}
```
This would be very useful for a user of the library that wishes to check if they have linked to the right tor version (or implement some sanity checks) without having to start tor and then speak to it on the control port (therefore paying some significant overhead).Tor: 0.3.5.x-finalNick MathewsonNick Mathewsonhttps://gitlab.torproject.org/legacy/trac/-/issues/26943Privcount blinding and encryption: Safety fixes2020-06-13T15:28:43ZteorPrivcount blinding and encryption: Safety fixesSafety fixes from https://trac.torproject.org/projects/tor/ticket/25669#comment:15Safety fixes from https://trac.torproject.org/projects/tor/ticket/25669#comment:15Tor: 0.4.0.x-finalNick MathewsonNick Mathewsonhttps://gitlab.torproject.org/legacy/trac/-/issues/26940Privcount blinding and encryption: doc fixes2020-06-13T15:28:41ZteorPrivcount blinding and encryption: doc fixesDoc fixes from https://trac.torproject.org/projects/tor/ticket/25669#comment:15Doc fixes from https://trac.torproject.org/projects/tor/ticket/25669#comment:15Tor: 0.4.0.x-finalNick MathewsonNick Mathewsonhttps://gitlab.torproject.org/legacy/trac/-/issues/26770Implement proposal 293: "Other ways for relays to know when to publish"2020-06-13T15:27:56ZNick MathewsonImplement proposal 293: "Other ways for relays to know when to publish"Tor: 0.4.0.x-finalNick MathewsonNick Mathewsonhttps://gitlab.torproject.org/legacy/trac/-/issues/23598Bump pyOpenSSL in BridgeDB to 16.2.02020-06-13T18:28:57ZGeorg KoppenBump pyOpenSSL in BridgeDB to 16.2.0When doing e.g. `pip install -r .test.requirements.txt` (with OpenSSL 1.1.0f) one gets
```
Traceback (most recent call last):
File "/home/thomas/.virtualenvs/bridgedb/bin/pip", line 7, in <module>
from pip import main
File "/home...When doing e.g. `pip install -r .test.requirements.txt` (with OpenSSL 1.1.0f) one gets
```
Traceback (most recent call last):
File "/home/thomas/.virtualenvs/bridgedb/bin/pip", line 7, in <module>
from pip import main
File "/home/thomas/.virtualenvs/bridgedb/lib/python2.7/site-packages/pip/__init__.py", line 21, in <module>
from pip._vendor.requests.packages.urllib3.exceptions import DependencyWarning
File "/home/thomas/.virtualenvs/bridgedb/lib/python2.7/site-packages/pip/_vendor/__init__.py", line 64, in <module>
vendored("cachecontrol")
File "/home/thomas/.virtualenvs/bridgedb/lib/python2.7/site-packages/pip/_vendor/__init__.py", line 36, in vendored
__import__(modulename, globals(), locals(), level=0)
File "/home/thomas/.virtualenvs/bridgedb/share/python-wheels/CacheControl-0.11.7-py2.py3-none-any.whl/cachecontrol/__init__.py", line 9, in <module>
File "/home/thomas/.virtualenvs/bridgedb/share/python-wheels/CacheControl-0.11.7-py2.py3-none-any.whl/cachecontrol/wrapper.py", line 1, in <module>
File "/home/thomas/.virtualenvs/bridgedb/share/python-wheels/CacheControl-0.11.7-py2.py3-none-any.whl/cachecontrol/adapter.py", line 4, in <module>
File "/home/thomas/.virtualenvs/bridgedb/share/python-wheels/requests-2.12.4-py2.py3-none-any.whl/requests/__init__.py", line 52, in <module>
File "/home/thomas/.virtualenvs/bridgedb/share/python-wheels/requests-2.12.4-py2.py3-none-any.whl/requests/packages/__init__.py", line 59, in <module>
File "/home/thomas/.virtualenvs/bridgedb/share/python-wheels/requests-2.12.4-py2.py3-none-any.whl/requests/packages/__init__.py", line 32, in vendored
File "/home/thomas/.virtualenvs/bridgedb/share/python-wheels/urllib3-1.19.1-py2.py3-none-any.whl/urllib3/contrib/pyopenssl.py", line 47, in <module>
File "/home/thomas/.virtualenvs/bridgedb/lib/python2.7/site-packages/OpenSSL/__init__.py", line 8, in <module>
from OpenSSL import rand, crypto, SSL
File "/home/thomas/.virtualenvs/bridgedb/lib/python2.7/site-packages/OpenSSL/SSL.py", line 105, in <module>
SSL_ST_INIT = _lib.SSL_ST_INIT
AttributeError: 'module' object has no attribute 'SSL_ST_INIT'
```
This is essentially https://github.com/pyca/pyopenssl/issues/525.Isis LovecruftIsis Lovecrufthttps://gitlab.torproject.org/legacy/trac/-/issues/23275Consensus diffs are generated even if DirCache and DirPort are 02020-06-13T15:12:49ZteorConsensus diffs are generated even if DirCache and DirPort are 0I'm running tor master 257f50b22 with DirCache 0 and DirPort 0.
Every hour or so, it uses all the CPUs on my machine to create consensus diffs.
This is a waste of CPU and disk space.I'm running tor master 257f50b22 with DirCache 0 and DirPort 0.
Every hour or so, it uses all the CPUs on my machine to create consensus diffs.
This is a waste of CPU and disk space.Tor: 0.3.1.x-finalNick MathewsonNick Mathewsonhttps://gitlab.torproject.org/legacy/trac/-/issues/23237Add 'GETINFO ip-to-country/available'2020-06-13T15:12:43ZDamian JohnsonAdd 'GETINFO ip-to-country/available'Hi Nick. Very minor ask but if we had a 'GETINFO ip-to-country/available' option to determine if tor has a geoip database available that would simplify Stem a bit. Stem tracks 'is the geoip database available' so it can avoid 'GETINFO ip...Hi Nick. Very minor ask but if we had a 'GETINFO ip-to-country/available' option to determine if tor has a geoip database available that would simplify Stem a bit. Stem tracks 'is the geoip database available' so it can avoid 'GETINFO ip-to-country/*' requests that are doomed to fail anyway.
Thanks!Tor: 0.3.2.x-finalNick MathewsonNick Mathewsonhttps://gitlab.torproject.org/legacy/trac/-/issues/23155Double free on error in config_process_include2020-06-13T15:12:35ZNick MathewsonDouble free on error in config_process_includeTor: 0.3.1.x-finalNick MathewsonNick Mathewsonhttps://gitlab.torproject.org/legacy/trac/-/issues/23071test_hs_ntor.sh fails with recent pysha32020-06-13T15:12:11ZNick Mathewsontest_hs_ntor.sh fails with recent pysha3Right now the recommended sha3 in python is pysha3, which emulates the same sha3 API as is added in python 3.6. But hs_ntor_ref.py doesn't work there.Right now the recommended sha3 in python is pysha3, which emulates the same sha3 API as is added in python 3.6. But hs_ntor_ref.py doesn't work there.Tor: 0.3.1.x-finalNick MathewsonNick Mathewsonhttps://gitlab.torproject.org/legacy/trac/-/issues/23030Review coverity build warnings2020-06-13T15:12:04ZNick MathewsonReview coverity build warningsCoverity emits a big pile of build warnings because of our BUG macro. Let's see if we can fix that. They look like this:
```
"/home/torcoverity/src/tor/cov-int/emit/totoro.wangafu.net/config/fc74ea42bbd56
ee35d2b17ca574b8e9b/...Coverity emits a big pile of build warnings because of our BUG macro. Let's see if we can fix that. They look like this:
```
"/home/torcoverity/src/tor/cov-int/emit/totoro.wangafu.net/config/fc74ea42bbd56
ee35d2b17ca574b8e9b/gcc-config-0/coverity-compiler-compat.h", line
1627: warning #41: expression must have arithmetic or pointer type
#nodef BUG() __coverity_panic__()
```
Also, there are quite a few of these:
```
"src/common/util.c", line 1169: warning #1563: function "tor_parse_long" not
emitted, consider modeling it or review parse diagnostics to improve
fidelity
tor_parse_long(const char *s, int base, long min, long max,
```Tor: 0.2.9.x-finalNick MathewsonNick Mathewson