Trac issueshttps://gitlab.torproject.org/legacy/trac/-/issues2020-06-13T13:59:52Zhttps://gitlab.torproject.org/legacy/trac/-/issues/674Functions not scrubbing IP addresses from log entries.2020-06-13T13:59:52ZTracFunctions not scrubbing IP addresses from log entries.A couple of functions aren't scrubbing IP addresses from log entries:
Apr 26 18:58:49.052 [Debug] circuit_handle_first_hop(): Looking for firsthop '194.109.206.212:443'
Apr 26 18:58:49.132 [Debug] connection_connect(): Connecting to [s...A couple of functions aren't scrubbing IP addresses from log entries:
Apr 26 18:58:49.052 [Debug] circuit_handle_first_hop(): Looking for firsthop '194.109.206.212:443'
Apr 26 18:58:49.132 [Debug] connection_connect(): Connecting to [scrubbed]:443.
[...]
Apr 26 18:58:54.345 [Debug] connection_or_finished_connecting(): OR connect() to router at 194.109.206.212:443 finished.
[Automatically added by flyspray2trac: Operating System: OSX 10.5 Leopard]
**Trac**:
**Username**: jasemandudehttps://gitlab.torproject.org/legacy/trac/-/issues/675update_consensus_networkstatus_downloads() & router_pick_directory_server() r...2020-06-13T14:06:09ZTracupdate_consensus_networkstatus_downloads() & router_pick_directory_server() rarely calledPossible solution to #648
Machine was left on for several hours with TOR running but no dial up network, then dial up network was brought
back up. TOR spends half an hour in a loop where it can't find nodes. Throughout this time, using ...Possible solution to #648
Machine was left on for several hours with TOR running but no dial up network, then dial up network was brought
back up. TOR spends half an hour in a loop where it can't find nodes. Throughout this time, using TORbutton to
switch off proxies in Firefox allowed me to browse the web with no problems, so I know the network is working fine.
After waiting 30 minutes, killing and relaunching TOR seemed to fix the problem, though from the logs below it looks
like TOR had finally made some circuits just before I killed it.
Taking a closer look at the logs, I can see it wasn't able to make circuits for a whole 30 minutes until it called
update_consensus_networkstatus_downloads() and router_pick_directory_server() - then all of a sudden everything
started to work.
Are these functions rarely called because of bandwidth issues? Could some logic be added so that if we get
"[Warning] No available nodes when trying to choose node. Failing." then these functions get called?
Here are the log messages:
Apr 26 18:28:46.820 [Info] circuit_get_open_circ_or_launch(): No safe circuit (purpose 5) ready for edge connection; delaying.
Apr 26 18:28:46.822 [Info] circuit_get_open_circ_or_launch(): No safe circuit (purpose 5) ready for edge connection; delaying.
Apr 26 18:28:46.824 [Info] circuit_predict_and_launch_new(): Have 0 clean circs (0 internal), need another exit circ.
Apr 26 18:28:46.825 [Info] choose_good_exit_server_general(): Found 74 servers that might support 11/12 pending connections.
Apr 26 18:28:46.828 [Info] choose_good_exit_server_general(): Chose exit server 'oemloi'
Apr 26 18:28:46.830 [Info] router_choose_random_node(): We couldn't find any live, guard routers; falling back to list of all routers.
Apr 26 18:28:46.832 [Warning] No available nodes when trying to choose node. Failing.
Apr 26 18:28:46.834 [Warning] No available nodes when trying to choose node. Failing.
Apr 26 18:28:46.837 [Info] router_choose_random_node(): We couldn't find any live, guard routers; falling back to list of all routers.
Apr 26 18:28:46.839 [Warning] No available nodes when trying to choose node. Failing.
Apr 26 18:28:46.842 [Warning] No available nodes when trying to choose node. Failing.
Apr 26 18:28:46.844 [Info] router_choose_random_node(): We couldn't find any live, guard routers; falling back to list of all routers.
Apr 26 18:28:46.847 [Warning] No available nodes when trying to choose node. Failing.
Apr 26 18:28:46.850 [Warning] No available nodes when trying to choose node. Failing.
Apr 26 18:28:46.853 [Warning] Failed to find node for hop 0 of our path. Discarding this circuit.
Apr 26 18:28:46.856 [Info] onion_populate_cpath(): Generating cpath hop failed.
Apr 26 18:28:47.860 [Info] choose_good_exit_server_general(): Found 74 servers that might support 11/12 pending connections.
Apr 26 18:28:47.864 [Info] choose_good_exit_server_general(): Chose exit server 'gashmish'
Apr 26 18:28:47.899 [Info] router_choose_random_node(): We couldn't find any live, guard routers; falling back to list of all routers.
Apr 26 18:28:47.903 [Warning] No available nodes when trying to choose node. Failing.
[... and so on for 30 minutes, still no nodes ...]
Apr 26 18:58:16.130 [Warning] No available nodes when trying to choose node. Failing.
Apr 26 18:58:16.177 [Warning] Failed to find node for hop 0 of our path. Discarding this circuit.
Apr 26 18:58:16.219 [Info] onion_populate_cpath(): Generating cpath hop failed.
Apr 26 18:58:16.266 [Info] circuit_get_open_circ_or_launch(): No safe circuit (purpose 5) ready for edge connection; delaying.
[... but suddenly ...]
Apr 26 18:58:43.588 [Info] circuit_get_open_circ_or_launch(): No safe circuit (purpose 5) ready for edge connection; delaying.
Apr 26 18:58:43.994 [Info] circuit_predict_and_launch_new(): Have 0 clean circs (0 internal), need another exit circ.Apr 26 18:58:44.258 [Info] update_consensus_router_descriptor_downloads(): 0 router descriptors downloadable. 0 delayed; 1782 present (0 of those were in old_routers); 0 would_reject; 391 wouldnt_use; 0 in progress.
Apr 26 18:58:44.329 [Info] routerlist_remove_old_routers(): We have 2211 live routers and 0 old router descriptors. At most 2173 must be retained because of networkstatuses.
Apr 26 18:58:44.398 [Info] update_consensus_networkstatus_downloads(): Launching networkstatus consensus download.
Apr 26 18:58:44.467 [Info] router_pick_directory_server(): No reachable router entries for dirservers. Trying them all again.
Apr 26 18:58:44.567 [Debug] directory_initiate_command(): anonymized 0, use_begindir 1.
Apr 26 18:58:44.640 [Debug] directory_initiate_command(): Initiating consensus network-status fetch
Apr 26 18:58:44.709 [Info] connection_ap_make_link(): Making internal anonymized tunnel to [scrubbed]:443 ...
Apr 26 18:58:44.778 [Debug] connection_add(): new conn type Socks, socket -1, n_conns 11.
Apr 26 18:58:44.847 [Info] circuit_get_open_circ_or_launch(): No safe circuit (purpose 5) ready for edge connection; delaying.
Apr 26 18:58:44.916 [Info] connection_ap_make_link(): ... application connection created and linked.
Apr 26 18:58:44.985 [Debug] connection_add(): new conn type Directory, socket -1, n_conns 12.
Apr 26 18:58:45.054 [Info] circuit_get_open_circ_or_launch(): No safe circuit (purpose 5) ready for edge connection; delaying.
Apr 26 18:58:45.124 [Info] circuit_get_open_circ_or_launch(): No safe circuit (purpose 5) ready for edge connection; delaying.
Apr 26 18:58:45.893 [Info] circuit_predict_and_launch_new(): Have 0 clean circs (0 internal), need another exit circ.
Apr 26 18:58:45.964 [Debug] new_route_len(): Chosen route length 3 (2211 routers available).
Apr 26 18:58:46.034 [Info] choose_good_exit_server_general(): Found 119 servers that might support 6/7 pending connections.
Apr 26 18:58:46.105 [Debug] smartlist_choose_by_bandwidth(): Total weighted bw = 17053612, exit bw = 23966189, nonexit bw = 1614269, exit
weight = 1.000000 (for exit == 1), guard bw = 19886442, nonguard bw = 5694016, guard weight = 0.571224 (for guard == 0)Apr 26 18:58:46.176 [Info] choose_good_exit_server_general(): Chose exit server 'dotplex1'
Apr 26 18:58:46.247 [Debug] onion_extend_cpath(): Path is 0 long; we want 3
Apr 26 18:58:46.320 [Info] router_choose_random_node(): We couldn't find any live, guard routers; falling back to list of all routers.Apr 26 18:58:46.391 [Info] add_an_entry_guard(): Chose 'dannenberg' as new entry guard.
Apr 26 18:58:46.462 [Info] log_entry_guards(): BrainwashEducation (up made-contact),GuyMontag (up made-contact) [...]
Apr 26 18:58:46.540 [Debug] onion_extend_cpath(): Chose router dannenberg for hop 1 (exit is dotplex1)
Apr 26 18:58:46.621 [Debug] onion_extend_cpath(): Path is 1 long; we want 3
Apr 26 18:58:46.698 [Debug] choose_good_middle_server(): Contemplating intermediate hop: random choice.
Apr 26 18:58:46.774 [Debug] smartlist_choose_by_bandwidth(): Total weighted bw = 70934573, exit bw = 23971981, nonexit bw = 107505582, ex
it weight = 0.000000 (for exit == 0), guard bw = 114082699, nonguard bw = 17394864, guard weight = 0.615841 (for guard == 0)
Apr 26 18:58:46.851 [Debug] onion_extend_cpath(): Chose router RentalSponge for hop 2 (exit is dotplex1)
Apr 26 18:58:46.928 [Debug] onion_extend_cpath(): Path is 2 long; we want 3
Apr 26 18:58:47.006 [Debug] onion_extend_cpath(): Chose router dotplex1 for hop 3 (exit is dotplex1)
Apr 26 18:58:47.084 [Debug] onion_extend_cpath(): Path is complete: 3 steps long
[Automatically added by flyspray2trac: Operating System: OSX 10.5 Leopard]
**Trac**:
**Username**: jasemandudeTor: unspecifiedhttps://gitlab.torproject.org/legacy/trac/-/issues/678man page entries for RejectPlaintextPorts and WarnPlaintextPorts2020-06-13T13:59:54ZRoger Dingledineman page entries for RejectPlaintextPorts and WarnPlaintextPortswe're missing man page entries for those two config options.
[Automatically added by flyspray2trac: Operating System: All]we're missing man page entries for those two config options.
[Automatically added by flyspray2trac: Operating System: All]0.2.0.x-finalhttps://gitlab.torproject.org/legacy/trac/-/issues/680tor won't run - can't find config file2008-05-04T07:45:46ZTractor won't run - can't find config fileEven though no config file was ever specified, somehow, and even after installing and re-installing, there is a path with no file name for where the config file is located.
With the path removed, tor will start. With the default strin...Even though no config file was ever specified, somehow, and even after installing and re-installing, there is a path with no file name for where the config file is located.
With the path removed, tor will start. With the default string, containing the path to the install directory, tor will not start.
Also - intial installation will get abort, retry message if vidalia is running - it won't shut down the previously running app to install the upgrade.
On win2k.
[Automatically added by flyspray2trac: Operating System: Windows 2k/XP]
**Trac**:
**Username**: zbonskiAndrew LewmanAndrew Lewmanhttps://gitlab.torproject.org/legacy/trac/-/issues/681encrypted dir conns confuse LeaveStreamsUnattached2020-06-13T13:59:55ZRoger Dingledineencrypted dir conns confuse LeaveStreamsUnattached(This is Mikeperry's bug)
When we launch an encrypted dir conn in directory.c via
connection_ap_make_link(), it'll put the stream in state
AP_CONN_STATE_CIRCUIT_WAIT. This means that even controllers
that set LeaveStreamsUnattached won'...(This is Mikeperry's bug)
When we launch an encrypted dir conn in directory.c via
connection_ap_make_link(), it'll put the stream in state
AP_CONN_STATE_CIRCUIT_WAIT. This means that even controllers
that set LeaveStreamsUnattached won't need to handle it,
since it's already being handled.
Bug #1: controllers don't know this, and can't distinguish
streams that are already being handled. Mike had a patch to
put an extra flag on the stream status line.
Bug #2: then if the stream causes a circuit to get created, and gets
attached to that circuit, but the circuit times out or otherwise
fails to fulfill the request, the stream will be handled by
connection_ap_detach_retriable() which will set it to state
AP_CONN_STATE_CONTROLLER_WAIT. And the controller doesn't realize
that this time it's supposed to handle it (and it probably shouldn't
need to handle it)
[Automatically added by flyspray2trac: Operating System: All]0.2.0.x-finalNick MathewsonNick Mathewsonhttps://gitlab.torproject.org/legacy/trac/-/issues/684Recover from Config Parse Errors on HUP2020-06-13T13:59:56ZTracRecover from Config Parse Errors on HUPCurrently, if there's an error in the config, sending HUP to tor will cause it to exit. It should, instead, revert back to its previous configuration.
[Automatically added by flyspray2trac: Operating System: Other Linux]
**Trac**:
*...Currently, if there's an error in the config, sending HUP to tor will cause it to exit. It should, instead, revert back to its previous configuration.
[Automatically added by flyspray2trac: Operating System: Other Linux]
**Trac**:
**Username**: BarkerJrhttps://gitlab.torproject.org/legacy/trac/-/issues/685Vidalia crashes every time it startet Tor 0.2.0.26rc2020-06-13T13:59:56ZTracVidalia crashes every time it startet Tor 0.2.0.26rcThe new version abort within the first minute of the starting process. I use the new vidalia bundle with the version 1.2
(the version 1.1 also chrashes when I start Tor).
[Automatically added by flyspray2trac: Operating System: Window...The new version abort within the first minute of the starting process. I use the new vidalia bundle with the version 1.2
(the version 1.1 also chrashes when I start Tor).
[Automatically added by flyspray2trac: Operating System: Windows 2k/XP]
**Trac**:
**Username**: Tokrahttps://gitlab.torproject.org/legacy/trac/-/issues/687Application Crash When BitTorrent Client Launched2020-06-13T13:59:56ZTracApplication Crash When BitTorrent Client LaunchedPlease Note: This is in regards to 0.2.0.26-rc.
Immediately after launching a BitTorrent Client configured to forward tracker information (ONLY!) through Tor
(file transfer connections were not forwarded through Tor; only tracker inform...Please Note: This is in regards to 0.2.0.26-rc.
Immediately after launching a BitTorrent Client configured to forward tracker information (ONLY!) through Tor
(file transfer connections were not forwarded through Tor; only tracker information), Tor crashed as follows:
szAppName: tor.exe
szModName: tor.exe
offset: 000be2c1
Tor was configured to run as a Service, and was running as a relay. The computer was Windows XP Home Edition.
I'll attempt to attach the crash dump. Note that this isn't always reproducible.
[Automatically added by flyspray2trac: Operating System: Windows 2k/XP]
**Trac**:
**Username**: HANtwisterAndrew LewmanAndrew Lewmanhttps://gitlab.torproject.org/legacy/trac/-/issues/691Tor relay fails on startup if network not up yet2020-06-13T13:59:58ZTracTor relay fails on startup if network not up yetThis applies to 0.2.0.26.
On Windows XP Home Edition, if the Tor Service is started while no network adapters are physically connected,
Tor will immediately crash.
szAppName: tor.exe
szModName: unknown
offset: 0022e7d0
Crash Dump Atta...This applies to 0.2.0.26.
On Windows XP Home Edition, if the Tor Service is started while no network adapters are physically connected,
Tor will immediately crash.
szAppName: tor.exe
szModName: unknown
offset: 0022e7d0
Crash Dump Attached.
[Automatically added by flyspray2trac: Operating System: All]
**Trac**:
**Username**: HANtwister0.2.1.x-finalNick MathewsonNick Mathewsonhttps://gitlab.torproject.org/legacy/trac/-/issues/692Our tarballs keep failing unit tests2008-06-04T03:30:18ZRoger DingledineOur tarballs keep failing unit testsWe should change it so 'make dist' requires 'make check' to pass.
That way we won't keep putting out new tarballs that are busted.
[Automatically added by flyspray2trac: Operating System: All]We should change it so 'make dist' requires 'make check' to pass.
That way we won't keep putting out new tarballs that are busted.
[Automatically added by flyspray2trac: Operating System: All]post 0.2.0.xhttps://gitlab.torproject.org/legacy/trac/-/issues/697Wrong DNS configuration could break navigation2020-06-13T14:00:00ZTracWrong DNS configuration could break navigationOn 0.2.0.26rc (add new version on reported version please),
Hello,
i've received one email who alert me.
One user have received OpenDNS pages when he is using tor.
OpenDNS is a company who resolve DNS for the others giving them filt...On 0.2.0.26rc (add new version on reported version please),
Hello,
i've received one email who alert me.
One user have received OpenDNS pages when he is using tor.
OpenDNS is a company who resolve DNS for the others giving them filtering, security, ads, but no privacy.
It appears that some nodes resolving DNS seems to have wrong DNS configured, blocking navigation.
If one router making dns resolution is misconfigured it could break navigation of others.
I think a DNS control need probably to be added making theses routers down.
Perhaps using a downloadable list for phishing.
---------- Forwarded message ----------
From: d
Date: 2008/6/10 04:22
Subject: Tor exit node policy
Hello,
I was browsing a phishing site using Tor recently and instead of the phish I saw an OpenDNS warning page (and apparently no way to bypass it). Yours was one of the exit nodes that was part of my Tor connection at the time.
I wasn't able to identify exactly which exit node it was.
Do you have Phish Filtering set up on your exit node, and if so is this a deliberate policy? I work in antiphishing and use Tor for some phish sites.
Thank you,
d
----------------------
[Automatically added by flyspray2trac: Operating System: All]
**Trac**:
**Username**: amisTor: unspecifiedhttps://gitlab.torproject.org/legacy/trac/-/issues/706Tor Crash Dump on Windows (Unknown Cause)2020-06-13T14:00:02ZTracTor Crash Dump on Windows (Unknown Cause)This applies to 0.2.0.27-rc.
I wasn't at the computer when this crash dump was generated, so I honestly couldn't say what caused it.
The only outbound Tor traffic this computer would be generating would be occasional SSL connections to...This applies to 0.2.0.27-rc.
I wasn't at the computer when this crash dump was generated, so I honestly couldn't say what caused it.
The only outbound Tor traffic this computer would be generating would be occasional SSL connections to
specific web servers, along with whatever traffic it's relaying.
.mdmp is attached; .hdmp is at http://home.comcast.net/~hantwister/hdmp1.7z
[Automatically added by flyspray2trac: Operating System: Windows 2k/XP]
**Trac**:
**Username**: HANtwisterAndrew LewmanAndrew Lewmanhttps://gitlab.torproject.org/legacy/trac/-/issues/707Patch: Build failures on 0.2.0.28rc BSD2020-06-13T14:00:02ZgrarpampPatch: Build failures on 0.2.0.28rc BSDHi.
This patch fixes some build failures on:
FreeBSD RELENG_4, gcc version 2.95.4 20020320 [FreeBSD]
warning: preprocessing directive not recognized within macro arg
Please modify patch as needed and apply if appropriate.
Also, 'make...Hi.
This patch fixes some build failures on:
FreeBSD RELENG_4, gcc version 2.95.4 20020320 [FreeBSD]
warning: preprocessing directive not recognized within macro arg
Please modify patch as needed and apply if appropriate.
Also, 'make install' rebuilds tor_main.Po, tor_main.o and tor. This
should not happen when called as: 'make ; make install' because
'make' already made them. 'make install' should just pick up and
install all the previously built bits from the build hierarchy.
Lastly, when registering on this bugtracker, the registration link
sent in the registration mail is not https. As with the rest of the
site, it should be as well.
Thanks [for Tor too].
========================================================
--- ./src/or/config.c.orig Wed Jun 11 07:09:55 2008
+++ ./src/or/config.c Sun Jun 15 18:54:54 2008
@@ -198,13 +198,12 @@
V(FetchServerDescriptors, BOOL, "1"),
V(FetchHidServDescriptors, BOOL, "1"),
V(FetchUselessDescriptors, BOOL, "0"),
- V(GeoIPFile, STRING,
#ifdef WIN32
- "<default>"
+ V(GeoIPFile, STRING, "<default>"),
#else
- SHARE_DATADIR PATH_SEPARATOR "tor" PATH_SEPARATOR "geoip"
+ V(GeoIPFile, STRING,
+ SHARE_DATADIR PATH_SEPARATOR "tor" PATH_SEPARATOR "geoip"),
#endif
-),
V(Group, STRING, NULL),
V(HardwareAccel, BOOL, "0"),
V(HashedControlPassword, LINELIST, NULL),
--- ./src/or/routerlist.c.orig Fri Jun 13 00:18:28 2008
+++ ./src/or/routerlist.c Sun Jun 15 18:57:30 2008
@@ -4391,8 +4391,8 @@
r->cache_info.signed_descriptor_digest);
tor_assert(&(r->cache_info) == sd2);
tor_assert(r->cache_info.routerlist_index == r_sl_idx);
-#if 0
/* XXXX021.
+#if 0
*
* Hoo boy. We need to fix this one, and the fix is a bit tricky, so
* commenting this out is just a band-aid.
@@ -4409,13 +4409,13 @@
* reset our retry count for an extrainfo, but that's not the end
* of the world. Changing the representation in 0.2.0.x would just
* destabilize the codebase.
- */
if (!tor_digest_is_zero(r->cache_info.extra_info_digest)) {
signed_descriptor_t *sd3 =
sdmap_get(rl->desc_by_eid_map, r->cache_info.extra_info_digest);
tor_assert(sd3 == &(r->cache_info));
}
#endif
+ */
});
SMARTLIST_FOREACH(rl->old_routers, signed_descriptor_t *, sd,
{
@@ -4424,14 +4424,15 @@
sd2 = sdmap_get(rl->desc_digest_map, sd->signed_descriptor_digest);
tor_assert(sd == sd2);
tor_assert(sd->routerlist_index == sd_sl_idx);
+ /* XXXX021 see above.
#if 0
- /* XXXX021 see above. */
if (!tor_digest_is_zero(sd->extra_info_digest)) {
signed_descriptor_t *sd3 =
sdmap_get(rl->desc_by_eid_map, sd->extra_info_digest);
tor_assert(sd3 == sd);
}
#endif
+*/
});
RIMAP_FOREACH(rl->identity_map, d, r) {
========================================================
[Automatically added by flyspray2trac: Operating System: BSD]Nick MathewsonNick Mathewson