Trac issues
https://gitlab.torproject.org/legacy/trac/-/issues
2020-06-13T14:01:56Z
https://gitlab.torproject.org/legacy/trac/-/issues/984
Tor using forbidden nodes
2020-06-13T14:01:56Z
Trac
Tor using forbidden nodes
Hello.
I have this in my torcc:
ExcludeNodes {us},{gb},{cn},{au}
but my log is showing this kind of lines:
[Warning] Requested exit node 'thegoddamnpenisblue' is in ExcludeNodes, or ExcludeExitNodes, using anyway.
[Warning] Requested exi...
Hello.
I have this in my torcc:
ExcludeNodes {us},{gb},{cn},{au}
but my log is showing this kind of lines:
[Warning] Requested exit node 'thegoddamnpenisblue' is in ExcludeNodes, or ExcludeExitNodes, using anyway.
[Warning] Requested exit node 'userbw20prfpis' is in ExcludeNodes, or ExcludeExitNodes, using anyway.
I'm also running as a relay, but this happened also when I was running Tor as client-only.
[Automatically added by flyspray2trac: Operating System: Windows 2k/XP]
**Trac**:
**Username**: G-Lo
0.2.1.x-final
https://gitlab.torproject.org/legacy/trac/-/issues/982
Crash in closing tls connection
2020-06-13T14:01:51Z
Trac
Crash in closing tls connection
Happens seemingly at random after a long go of running.
"""
GNU gdb 6.8-debian
Copyright (C) 2008 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you ar...
Happens seemingly at random after a long go of running.
"""
GNU gdb 6.8-debian
Copyright (C) 2008 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law. Type "show copying"
and "show warranty" for details.
This GDB was configured as "x86_64-linux-gnu"...
warning: Can't read pathname for load map: Input/output error.
Reading symbols from /lib/libz.so.1...done.
Loaded symbols for /lib/libz.so.1
Reading symbols from /usr/lib/libevent-1.3e.so.1...done.
Loaded symbols for /usr/lib/libevent-1.3e.so.1
Reading symbols from /lib/libssl.so.0.9.8...done.
Loaded symbols for /lib/libssl.so.0.9.8
Reading symbols from /lib/libcrypto.so.0.9.8...done.
Loaded symbols for /lib/libcrypto.so.0.9.8
Reading symbols from /lib/libpthread.so.0...done.
Loaded symbols for /lib/libpthread.so.0
Reading symbols from /lib/libdl.so.2...done.
Loaded symbols for /lib/libdl.so.2
Reading symbols from /lib/libc.so.6...done.
Loaded symbols for /lib/libc.so.6
Reading symbols from /lib/libnsl.so.1...done.
Loaded symbols for /lib/libnsl.so.1
Reading symbols from /lib/librt.so.1...done.
Loaded symbols for /lib/librt.so.1
Reading symbols from /lib/libresolv.so.2...done.
Loaded symbols for /lib/libresolv.so.2
Reading symbols from /lib/ld-linux-x86-64.so.2...done.
Loaded symbols for /lib64/ld-linux-x86-64.so.2
Reading symbols from /lib/libnss_compat.so.2...done.
Loaded symbols for /lib/libnss_compat.so.2
Reading symbols from /lib/libnss_nis.so.2...done.
Loaded symbols for /lib/libnss_nis.so.2
Reading symbols from /lib/libnss_files.so.2...done.
Loaded symbols for /lib/libnss_files.so.2
Reading symbols from /lib/libnss_mdns4_minimal.so.2...done.
Loaded symbols for /lib/libnss_mdns4_minimal.so.2
Reading symbols from /lib/libnss_dns.so.2...done.
Loaded symbols for /lib/libnss_dns.so.2
Reading symbols from /lib/libgcc_s.so.1...done.
Loaded symbols for /lib/libgcc_s.so.1
Core was generated by `/usr/sbin/tor'.
Program terminated with signal 11, Segmentation fault.
[New process 16346]
[New process 23317]
[New process 23318]
[New process 23320]
[New process 23319]
#0 0x00007f9792a80693 in CRYPTO_add_lock () from /lib/libcrypto.so.0.9.8
(gdb) bt
#0 0x00007f9792a80693 in CRYPTO_add_lock () from /lib/libcrypto.so.0.9.8
#1 0x00007f9792aebc29 in EVP_PKEY_free () from /lib/libcrypto.so.0.9.8
#2 0x00007f9792dd8771 in ssl_cert_free () from /lib/libssl.so.0.9.8
#3 0x00007f9792dd71d8 in SSL_free () from /lib/libssl.so.0.9.8
#4 0x00000000004b6ab3 in tor_tls_free (tls=0x2159fa0) at tortls.c:922
#5 0x00000000004280bf in _connection_free (conn=0x50720d0) at connection.c:388
#6 0x000000000046093c in close_closeable_connections () at main.c:602
#7 0x0000000000461033 in second_elapsed_callback (fd=<value optimized out>, event=<value optimized out>, args=<value optimized out>)
at main.c:1094
#8 0x00007f9792ff867d in event_base_loop () from /usr/lib/libevent-1.3e.so.1
#9 0x00000000004619c6 in do_main_loop () at main.c:1435
#10 0x0000000000461c15 in tor_main (argc=1, argv=<value optimized out>) at main.c:2060
#11 0x00007f97922a65a6 in __libc_start_main () from /lib/libc.so.6
#12 0x0000000000407469 in _start ()
(gdb) info frame 4
Stack frame at 0x7fff9b642140:
rip = 0x4b6ab3 in tor_tls_free (tortls.c:922); saved rip 0x4280bf
called by frame at 0x7fff9b642180, caller of frame at 0x7fff9b642120
source language c.
Arglist at 0x7fff9b642118, args: tls=0x2159fa0
Locals at 0x7fff9b642118, Previous frame's sp is 0x7fff9b642140
Saved registers:
rbx at 0x7fff9b642130, rip at 0x7fff9b642138
(gdb) f 4
#4 0x00000000004b6ab3 in tor_tls_free (tls=0x2159fa0) at tortls.c:922
922 tortls.c: No such file or directory.
in tortls.c
(gdb) p *tls
$1 = {node = {hte_next = 0x0, hte_hash = 31986572}, context = 0x7f97883ce9f0, ssl = 0x7a04e30, socket = 1382, address = 0x7c344f0 "[scrubbed]",
state = TOR_TLS_ST_OPEN, isServer = 1, wasV2Handshake = 1, got_renegotiate = 0, wantwrite_n = 0, last_write_count = 130436,
last_read_count = 9660, negotiated_callback = 0, callback_arg = 0x0}
"""
[Automatically added by flyspray2trac: Operating System: Other Linux]
**Trac**:
**Username**: neoeinstein
Tor: 0.2.2.x-final
https://gitlab.torproject.org/legacy/trac/-/issues/1008
Constant crashes on freebsd
2020-06-13T14:02:10Z
Trac
Constant crashes on freebsd
I was running tor for months on freebsd on 0.2.0.19 with no problems.
Then I updated to 0.2.0.34 and started getting regular sometimes daily crashes,
i also then tried 0.2.1.13-rc and then 14-rc with the same problems.
Tor will randoml...
I was running tor for months on freebsd on 0.2.0.19 with no problems.
Then I updated to 0.2.0.34 and started getting regular sometimes daily crashes,
i also then tried 0.2.1.13-rc and then 14-rc with the same problems.
Tor will randomly crash on signal 11.
If i look at the core file with gdb I see its crashing in the ssl3_write function in libssl.
Complete gdb output:
gdb /usr/local/bin/tor tor.core
GNU gdb 6.1.1 [FreeBSD]
Copyright 2004 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and you are
welcome to change it and/or distribute copies of it under certain conditions.
Type "show copying" to see the conditions.
There is absolutely no warranty for GDB. Type "show warranty" for details.
This GDB was configured as "i386-marcel-freebsd"...(no debugging symbols found)...
Core was generated by `tor'.
Program terminated with signal 11, Segmentation fault.
Reading symbols from /lib/libz.so.4...(no debugging symbols found)...done.
Loaded symbols for /lib/libz.so.4
Reading symbols from /usr/local/lib/libevent-1.4.so.3...(no debugging symbols found)...done.
Loaded symbols for /usr/local/lib/libevent-1.4.so.3
Reading symbols from /usr/local/lib/libssl.so.5...(no debugging symbols found)...done.
Loaded symbols for /usr/local/lib/libssl.so.5
Reading symbols from /usr/local/lib/libcrypto.so.5...(no debugging symbols found)...done.
Loaded symbols for /usr/local/lib/libcrypto.so.5
Reading symbols from /lib/libc.so.7...(no debugging symbols found)...done.
Loaded symbols for /lib/libc.so.7
Reading symbols from /usr/lib/librt.so.1...(no debugging symbols found)...done.
Loaded symbols for /usr/lib/librt.so.1
Reading symbols from /lib/libthr.so.3...(no debugging symbols found)...done.
Loaded symbols for /lib/libthr.so.3
Reading symbols from /libexec/ld-elf.so.1...(no debugging symbols found)...done.
Loaded symbols for /libexec/ld-elf.so.1
#0 0x080b3287 in ?? ()
[New Thread 0x28501100 (LWP 100125)]
[New LWP 100172]
(gdb)
(gdb) bt
#0 0x080b3287 in ?? ()
#1 0x286f4420 in ?? ()
#2 0x2991b000 in ?? ()
#3 0x29900000 in ?? ()
#4 0x281afcfa in ssl3_write () from /usr/local/lib/libssl.so.5
#5 0x287a1a10 in ?? ()
#6 0x28a17c50 in ?? ()
#7 0x2889ec00 in ?? ()
#8 0x2889ec04 in ?? ()
#9 0xbfbfe9f8 in ?? ()
#10 0x080b45e4 in ?? ()
#11 0x28a17c50 in ?? ()
#12 0x00000200 in ?? ()
#13 0x287a1a10 in ?? ()
#14 0x00000000 in ?? ()
#15 0x29900000 in ?? ()
#16 0x0813ddf8 in ?? ()
#17 0xbfbfea08 in ?? ()
#18 0x2889ec3c in ?? ()
#19 0x2889ec48 in ?? ()
#20 0x00000001 in ?? ()
#21 0x00000001 in ?? ()
#22 0x0000002c in ?? ()
#23 0x287a1a10 in ?? ()
#24 0x4a3964e6 in ?? ()
#25 0xbfbfea18 in ?? ()
#26 0x0807b6fb in ?? ()
#27 0x287a1a10 in ?? ()
#28 0x00000001 in ?? ()
#29 0x4a3964e6 in ?? ()
#30 0x287a1a10 in ?? ()
#31 0x00002b90 in ?? ()
#32 0x287a1a10 in ?? ()
#33 0xbfbfea48 in ?? ()
#34 0x0806e394 in ?? ()
#35 0x287a1a10 in ?? ()
#36 0x00000200 in ?? ()
#37 0x4a3964e6 in ?? ()
#38 0x00000d81 in ?? ()
#39 0x00000006 in ?? ()
#40 0x00000000 in ?? ()
#41 0x00002b90 in ?? ()
#42 0x000032d0 in ?? ()
#43 0x00002b90 in ?? ()
#44 0x000032d0 in ?? ()
#45 0xbfbfea98 in ?? ()
#46 0x0807218d in ?? ()
#47 0x00002b90 in ?? ()
#48 0xbfbfea80 in ?? ()
#49 0xbfbfea7c in ?? ()
#50 0x287a1a30 in ?? ()
#51 0x287a1a10 in ?? ()
#52 0x28fd1dd0 in ?? ()
#53 0xbfbfea98 in ?? ()
#54 0x0806d0cd in ?? ()
#55 0x294220a0 in ?? ()
#56 0x00000000 in ?? ()
#57 0x00000000 in ?? ()
#58 0x00002b90 in ?? ()
#59 0x00000000 in ?? ()
#60 0x00000004 in ?? ()
#61 0x4a3964e6 in ?? ()
#62 0x28194170 in __JCR_LIST__ () from /usr/local/lib/libevent-1.4.so.3
#63 0x287a1a10 in ?? ()
#64 0x28fd1dd0 in ?? ()
#65 0xbfbfeac8 in ?? ()
#66 0x080aa1a1 in ?? ()
#67 0x287a1a10 in ?? ()
#68 0x00000000 in ?? ()
#69 0x081228c3 in ?? ()
#70 0x08121336 in ?? ()
#71 0x00000029 in ?? ()
#72 0x00000000 in ?? ()
#73 0x0007434d in ?? ()
#74 0x28194170 in __JCR_LIST__ () from /usr/local/lib/libevent-1.4.so.3
#75 0x28194170 in __JCR_LIST__ () from /usr/local/lib/libevent-1.4.so.3
#76 0x080aa130 in ?? ()
#77 0xbfbfeb38 in ?? ()
#78 0x28184565 in event_base_loop () from /usr/local/lib/libevent-1.4.so.3
Previous frame inner to this frame (corrupt stack?)
(gdb) quit
[Automatically added by flyspray2trac: Operating System: BSD]
**Trac**:
**Username**: tortor
https://gitlab.torproject.org/legacy/trac/-/issues/996
tor-0.2.1.14-rc dies on SIGILL shortly after receiving SIGHUP
2020-06-13T14:02:01Z
Trac
tor-0.2.1.14-rc dies on SIGILL shortly after receiving SIGHUP
This bug report submitted on behalf of Scott.
On two successive tor runs as a relay, tor terminated abnormally on
SIGILL after receiving a SIGHUP. The operating system is FreeBSD
7-STABLE, and tor is 0.2.1.14-rc. A SIGHUP was sent to...
This bug report submitted on behalf of Scott.
On two successive tor runs as a relay, tor terminated abnormally on
SIGILL after receiving a SIGHUP. The operating system is FreeBSD
7-STABLE, and tor is 0.2.1.14-rc. A SIGHUP was sent to tor, which
issued the following messages to /var/log/notices.log in the second
case.
Jun 04 10:36:10.957 [notice] Received reload signal (hup). Reloading config and resetting internal state.
Jun 04 10:36:10.966 [notice] Tor 0.2.1.14-rc (r19307) opening log file.
Jun 04 10:36:10.966 [warn] Can't log to stdout with RunAsDaemon set; skipping stdout
Jun 04 10:36:10.966 [warn] Can't log to stdout with RunAsDaemon set; skipping stdout
It then terminated on a SIGILL, leaving a tor.core file in /var/db/tor,
and the FreeBSD kernel noted the following in /var/log/messages.
Jun 4 10:36:12 hellas kernel: pid 16788 (tor), uid 256: exited on signal 4 (core dumped)
The first case did exactly the same with, of course, different date and
timestamps and a different pid in the messages. In each case, I
appended the date to the name of the tor.core file to prevent it from
being overwritten/replaced by any later occurrence of this crash. The
two tor.core files do have different sizes:
-rw------- 1 _tor _tor 30973952 Jun 3 03:28 tor.core.03jun2009
-rw------- 1 _tor _tor 68128768 Jun 4 10:36 tor.core.04jun2009
gdb backtraces are shown for each tor.core file in the typescript file
below.
Script started on Fri Jun 5 00:40:45 2009
hellas# gdb /usr/local/bin/tor tor.core.03jun2009
GNU gdb 6.1.1 [FreeBSD]
Copyright 2004 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and you are
welcome to change it and/or distribute copies of it under certain conditions.
Type "show copying" to see the conditions.
There is absolutely no warranty for GDB. Type "show warranty" for details.
This GDB was configured as "i386-marcel-freebsd"...
Core was generated by `tor'.
Program terminated with signal 4, Illegal instruction.
Reading symbols from /lib/libz.so.4...done.
Loaded symbols for /lib/libz.so.4
Reading symbols from /usr/local/lib/libevent-1.4.so.3...done.
Loaded symbols for /usr/local/lib/libevent-1.4.so.3
Reading symbols from /usr/lib/libssl.so.5...done.
Loaded symbols for /usr/lib/libssl.so.5
Reading symbols from /lib/libcrypto.so.5...done.
Loaded symbols for /lib/libcrypto.so.5
Reading symbols from /lib/libthr.so.3...done.
Loaded symbols for /lib/libthr.so.3
Reading symbols from /lib/libc.so.7...done.
Loaded symbols for /lib/libc.so.7
Reading symbols from /usr/lib/librt.so.1...done.
Loaded symbols for /usr/lib/librt.so.1
Reading symbols from /libexec/ld-elf.so.1...done.
Loaded symbols for /libexec/ld-elf.so.1
#0 0x080b0f1e in policies_parse_from_options (options=0x3499bc00)
at policies.c:431
431 if (load_policy_from_option(options->DirPolicy, &dir_policy, -1) < 0)
[New Thread 0x34102030 (LWP 100195)]
[New Thread 0x34101f20 (LWP 100194)]
[New Thread 0x34101040 (LWP 100193)]
(gdb) bt
#0 0x080b0f1e in policies_parse_from_options (options=0x3499bc00)
at policies.c:431
#1 0x08068824 in options_act (old_options=0x34123400) at config.c:1298
#2 0x080697b6 in set_options (new_val=0x3499bc00, msg=0xbfbfe4a8)
at config.c:807
#3 0x0806a262 in options_init_from_string (
cf=0x344f1000 "## Configuration file for a typical Tor user\n## Last updated 8 October 2006 for Tor 0.1.2.3-alpha.\n## (May or may not work for older or newer versions of Tor.)\n##\n## Lines that begin with \"## \" try to"...,
command=0, command_arg=0x0, msg=0xbfbfe4a8) at config.c:4087
#4 0x0806a909 in options_init_from_torrc (argc=11, argv=0xbfbfe694)
at config.c:3961
#5 0x080a715c in signal_callback (fd=1, events=8, arg=Variable "arg" is not available.
) at main.c:1306
#6 0x33d81565 in event_base_loop () from /usr/local/lib/libevent-1.4.so.3
#7 0x33d81899 in event_loop () from /usr/local/lib/libevent-1.4.so.3
#8 0x080a936a in do_main_loop () at main.c:1435
#9 0x080a951d in tor_main (argc=11, argv=0xbfbfe694) at main.c:2060
#10 0x080e5422 in main (argc=100193, argv=0x0) at tor_main.c:30
(gdb) quit
hellas# gdb /usr/local/bin/tor tor.core.04jun2009
GNU gdb 6.1.1 [FreeBSD]
Copyright 2004 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and you are
welcome to change it and/or distribute copies of it under certain conditions.
Type "show copying" to see the conditions.
There is absolutely no warranty for GDB. Type "show warranty" for details.
This GDB was configured as "i386-marcel-freebsd"...
Core was generated by `tor'.
Program terminated with signal 4, Illegal instruction.
Reading symbols from /lib/libz.so.4...done.
Loaded symbols for /lib/libz.so.4
Reading symbols from /usr/local/lib/libevent-1.4.so.3...done.
Loaded symbols for /usr/local/lib/libevent-1.4.so.3
Reading symbols from /usr/lib/libssl.so.5...done.
Loaded symbols for /usr/lib/libssl.so.5
Reading symbols from /lib/libcrypto.so.5...done.
Loaded symbols for /lib/libcrypto.so.5
Reading symbols from /lib/libthr.so.3...done.
Loaded symbols for /lib/libthr.so.3
Reading symbols from /lib/libc.so.7...done.
Loaded symbols for /lib/libc.so.7
Reading symbols from /usr/lib/librt.so.1...done.
Loaded symbols for /usr/lib/librt.so.1
Reading symbols from /libexec/ld-elf.so.1...done.
Loaded symbols for /libexec/ld-elf.so.1
#0 0x080b0f1e in policies_parse_from_options (options=0x37df1c00)
at policies.c:431
431 if (load_policy_from_option(options->DirPolicy, &dir_policy, -1) < 0)
[New Thread 0x34102030 (LWP 100195)]
[New Thread 0x34101f20 (LWP 100194)]
[New Thread 0x34101040 (LWP 100240)]
(gdb) bt
#0 0x080b0f1e in policies_parse_from_options (options=0x37df1c00)
at policies.c:431
#1 0x08068824 in options_act (old_options=0x34123400) at config.c:1298
#2 0x080697b6 in set_options (new_val=0x37df1c00, msg=0xbfbfe4b8)
at config.c:807
#3 0x0806a262 in options_init_from_string (
cf=0x37ece000 "## Configuration file for a typical Tor user\n## Last updated 8 October 2006 for Tor 0.1.2.3-alpha.\n## (May or may not work for older or newer versions of Tor.)\n##\n## Lines that begin with \"## \" try to"...,
command=0, command_arg=0x0, msg=0xbfbfe4b8) at config.c:4087
#4 0x0806a909 in options_init_from_torrc (argc=11, argv=0xbfbfe6a0)
at config.c:3961
#5 0x080a715c in signal_callback (fd=1, events=8, arg=Variable "arg" is not available.
) at main.c:1306
#6 0x33d81565 in event_base_loop () from /usr/local/lib/libevent-1.4.so.3
#7 0x33d81899 in event_loop () from /usr/local/lib/libevent-1.4.so.3
#8 0x080a936a in do_main_loop () at main.c:1435
#9 0x080a951d in tor_main (argc=11, argv=0xbfbfe6a0) at main.c:2060
#10 0x080e5422 in main (argc=100240, argv=0x0) at tor_main.c:30
(gdb) quit
hellas# exit
exit
Script done on Fri Jun 5 00:42:13 2009
The torrc file can be made available upon request if needed.
Comments:
I have no recollection of any prior version of tor failing in this
manner in response to a SIGHUP. It is very restricting not to dare to
send SIGHUPs at all with this version in order to avoid causing yet
another crash. I am considering reviving 0.2.1.13-alpha to regain
this functionality. I have built 0.2.1.15-rc, but am reluctant to
install and use it, given that this bug most likely still exists in
0.2.1.15-rc, whereas it didn't seem to happen in the earlier version.
Submitted (via Jon <scream@nonvocalscream.com>) by:
Scott Bennett <bennett@cs.niu.edu>
[Automatically added by flyspray2trac: Operating System: All]
**Trac**:
**Username**: JonCharge
https://gitlab.torproject.org/legacy/trac/-/issues/987
eventdns can't strerror() on windows?
2020-06-13T14:01:57Z
Roger Dingledine
eventdns can't strerror() on windows?
Mai 24 12:59:01.875 [Warnung] eventdns: Error Unknown error (10054) while reading request.
the line in question seems to be:
log(EVDNS_LOG_WARN, "Error %s (%d) while reading request.",
strerror(err), err);
Do we want a Windows-sty...
Mai 24 12:59:01.875 [Warnung] eventdns: Error Unknown error (10054) while reading request.
the line in question seems to be:
log(EVDNS_LOG_WARN, "Error %s (%d) while reading request.",
strerror(err), err);
Do we want a Windows-style tor_socket_strerror() wrapper here?
(and probably a variety of other places in eventdns)
[Automatically added by flyspray2trac: Operating System: Windows 2k/XP]
https://gitlab.torproject.org/legacy/trac/-/issues/985
libevent error - Tor not starting - 0.2.0.26-rc works!
2020-06-13T14:01:56Z
Trac
libevent error - Tor not starting - 0.2.0.26-rc works!
Temporarily, I have to use 0.2.0.26-rc (r14597) until the libevent error is fixed as in:
https://bugs.torproject.org/flyspray/index.php?do=details&id=792
I went back one revision at a time from this ftp server:
ftp://ftp.osmirror.nl/p...
Temporarily, I have to use 0.2.0.26-rc (r14597) until the libevent error is fixed as in:
https://bugs.torproject.org/flyspray/index.php?do=details&id=792
I went back one revision at a time from this ftp server:
ftp://ftp.osmirror.nl/pub/tor/win32/
[Automatically added by flyspray2trac: Operating System: Windows Vista]
**Trac**:
**Username**: 80063r
https://gitlab.torproject.org/legacy/trac/-/issues/983
Abort crash in libcrypto malloc during onion handshake
2020-06-13T14:01:56Z
Trac
Abort crash in libcrypto malloc during onion handshake
Occurred after ~15 hours of uptime on an x86_64 box.
I keep all cores archived, so if you have requests for me
to run against the core, let me know.
"""
GNU gdb 6.8-debian
Copyright (C) 2008 Free Software Foundation, Inc.
License GPLv...
Occurred after ~15 hours of uptime on an x86_64 box.
I keep all cores archived, so if you have requests for me
to run against the core, let me know.
"""
GNU gdb 6.8-debian
Copyright (C) 2008 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law. Type "show copying"
and "show warranty" for details.
This GDB was configured as "x86_64-linux-gnu"...
warning: Can't read pathname for load map: Input/output error.
Reading symbols from /lib/libz.so.1...done.
Loaded symbols for /lib/libz.so.1
Reading symbols from /usr/lib/libevent-1.3e.so.1...done.
Loaded symbols for /usr/lib/libevent-1.3e.so.1
Reading symbols from /lib/libssl.so.0.9.8...done.
Loaded symbols for /lib/libssl.so.0.9.8
Reading symbols from /lib/libcrypto.so.0.9.8...done.
Loaded symbols for /lib/libcrypto.so.0.9.8
Reading symbols from /lib/libpthread.so.0...done.
Loaded symbols for /lib/libpthread.so.0
Reading symbols from /lib/libdl.so.2...done.
Loaded symbols for /lib/libdl.so.2
Reading symbols from /lib/libc.so.6...done.
Loaded symbols for /lib/libc.so.6
Reading symbols from /lib/libnsl.so.1...done.
Loaded symbols for /lib/libnsl.so.1
Reading symbols from /lib/librt.so.1...done.
Loaded symbols for /lib/librt.so.1
Reading symbols from /lib/libresolv.so.2...done.
Loaded symbols for /lib/libresolv.so.2
Reading symbols from /lib/ld-linux-x86-64.so.2...done.
Loaded symbols for /lib64/ld-linux-x86-64.so.2
Reading symbols from /lib/libnss_compat.so.2...done.
Loaded symbols for /lib/libnss_compat.so.2
Reading symbols from /lib/libnss_nis.so.2...done.
Loaded symbols for /lib/libnss_nis.so.2
Reading symbols from /lib/libnss_files.so.2...done.
Loaded symbols for /lib/libnss_files.so.2
Reading symbols from /lib/libnss_mdns4_minimal.so.2...done.
Loaded symbols for /lib/libnss_mdns4_minimal.so.2
Reading symbols from /lib/libnss_dns.so.2...done.
Loaded symbols for /lib/libnss_dns.so.2
Reading symbols from /lib/libgcc_s.so.1...done.
Loaded symbols for /lib/libgcc_s.so.1
Core was generated by `/usr/sbin/tor'.
Program terminated with signal 6, Aborted.
[New process 3611]
[New process 19395]
[New process 3612]
[New process 3614]
[New process 3613]
#0 0x00007fd0ea7cbfb5 in raise () from /lib/libc.so.6
(gdb) bt
#0 0x00007fd0ea7cbfb5 in raise () from /lib/libc.so.6
#1 0x00007fd0ea7cdbc3 in abort () from /lib/libc.so.6
#2 0x00007fd0ea80b228 in ?? () from /lib/libc.so.6
#3 0x00007fd0ea811b2c in ?? () from /lib/libc.so.6
#4 0x00007fd0ea8138f1 in ?? () from /lib/libc.so.6
#5 0x00007fd0ea815828 in malloc () from /lib/libc.so.6
#6 0x00007fd0eaf91f33 in CRYPTO_malloc () from /lib/libcrypto.so.0.9.8
#7 0x00007fd0eafbc18f in BN_mod_exp_mont_consttime () from /lib/libcrypto.so.0.9.8
#8 0x00007fd0eafd8925 in ?? () from /lib/libcrypto.so.0.9.8
#9 0x00007fd0eafd92ab in ?? () from /lib/libcrypto.so.0.9.8
#10 0x00000000004b1786 in crypto_pk_private_decrypt (env=<value optimized out>, to=<value optimized out>, from=0x8 <Address 0x8 out of bounds>,
fromlen=518, padding=<value optimized out>, warnOnFailure=0) at crypto.c:762
#11 0x00000000004b2a7e in crypto_pk_private_hybrid_decrypt (env=0x16207c0, to=0x7fd0e9633c30 "",
from=0x7fd0e9633e70 "s\214\235½aNàÇå¯\030\adlf\233\021\206\\+\035\203{h ëÈâ\203AÉ®?\225Ï¢éôA\232ÙREC¨ÿÚÜí>¨\003\226ÚÔCd0¢1\211û~ÎMÖ\213W\t¿WB\223põ\024Ï3>è:rÆ\036\234.\233Á(2C3É,,\224ìÅ&.\\\237ÝÑ\017I\r/⸺\207\032\225\002\205á_}0\206o\005JÊÆ\216\234Ò]÷ÿ\231Ïß¡¾çWz\223\213\215j®\026ÐY<ç/µ<½\037âón¨\026ôÚfZBc4\031\b\221±ál\217Ùõ8Ç}\032ägæÂ{*", fromlen=186, padding=60002, warnOnFailure=0) at crypto.c:989
#12 0x0000000000466b85 in onion_skin_server_handshake (
onion_skin=0x7fd0e9633e70 "s\214\235½aNàÇå¯\030\adlf\233\021\206\\+\035\203{h ëÈâ\203AÉ®?\225Ï¢éôA\232ÙREC¨ÿÚÜí>¨\003\226ÚÔCd0¢1\211û~ÎMÖ\213W\t¿WB\223põ\024Ï3>è:rÆ\036\234.\233Á(2C3É,,\224ìÅ&.\\\237ÝÑ\017I\r/⸺\207\032\225\002\205á_}0\206o\005JÊÆ\216\234Ò]÷ÿ\231Ïß¡¾çWz\223\213\215j®\026ÐY<ç/µ<½\037âón¨\026ôÚfZBc4\031\b\221±ál\217Ùõ8Ç}\032ägæÂ{*", private_key=0x16207c0, prev_private_key=0x0,
handshake_reply_out=0x7fd0e9633f30 "å\002õ\006(Gf.%1|cÛL? IÜ\204g\031\036Å\016½\217\234µå9\215uEàCʨ¾Íá©xð\201)\f\233Ó\020ÃÎ\037¶\0041Z",
key_out=0x7fd0e9633fd0 "ãJ(v|ÈßBdð-3v\005QÛ\202±\211\022\205J&\0247öI\233\027G¥\034ƶÇ\022,#ÆïDJ*þ®,\vRú\217ûU\005$s>=MtßWßõò²ú\022\217:ÍHú",
key_out_len=72) at onion.c:232
#13 0x000000000044062a in cpuworker_main (data=<value optimized out>) at cpuworker.c:273
#14 0x00000000004a6ab5 in tor_pthread_helper_fn (_data=0x1620220) at compat.c:1694
#15 0x00007fd0ead163ba in start_thread () from /lib/libpthread.so.0
#16 0x00007fd0ea87efcd in clone () from /lib/libc.so.6
#17 0x0000000000000000 in ?? ()
"""
[Automatically added by flyspray2trac: Operating System: Other Linux]
**Trac**:
**Username**: neoeinstein
https://gitlab.torproject.org/legacy/trac/-/issues/978
DirPortFrontPage gives 503 on loaded dirmirror
2020-06-13T14:01:44Z
Sebastian Hahn
DirPortFrontPage gives 503 on loaded dirmirror
When configuring DirPortFrontPage, a loaded mirror will return a 503
consistently when the DirPort is hit. A browser will simply display a
white page and not indicate the error condition at all, so the output
can be surprising to the ave...
When configuring DirPortFrontPage, a loaded mirror will return a 503
consistently when the DirPort is hit. A browser will simply display a
white page and not indicate the error condition at all, so the output
can be surprising to the average user. If we cannot "fix" this, at least
warning the user is probably a sane idea.
[Automatically added by flyspray2trac: Operating System: All]
https://gitlab.torproject.org/legacy/trac/-/issues/977
buf_shrink_freelists: Assertion !n_to_free failed
2020-06-13T14:01:44Z
Roger Dingledine
buf_shrink_freelists: Assertion !n_to_free failed
dr|z3d> Nasty Tor crash: "May 05 21:08:52.448 [Error] Bug: buffers.c:281:
buf_shrink_freelists: Assertion !n_to_free failed; aborting."
It was 0.2.1.14-rc on Windows.
"DNSPort and 1 hidden service. Run from Vidalia, so ControlPort was ...
dr|z3d> Nasty Tor crash: "May 05 21:08:52.448 [Error] Bug: buffers.c:281:
buf_shrink_freelists: Assertion !n_to_free failed; aborting."
It was 0.2.1.14-rc on Windows.
"DNSPort and 1 hidden service. Run from Vidalia, so ControlPort was set too.
A few IRC connections, and probably idle other than that.
[Automatically added by flyspray2trac: Operating System: All]
https://gitlab.torproject.org/legacy/trac/-/issues/974
TBB 1.1.13-dev contains invalid preferences
2020-06-13T14:01:42Z
Andrew Lewman
TBB 1.1.13-dev contains invalid preferences
it appears that invalidprefs.js file is being generated, which is overriding some of
the prefs we set
[Automatically added by flyspray2trac: Operating System: Windows 2k/XP]
it appears that invalidprefs.js file is being generated, which is overriding some of
the prefs we set
[Automatically added by flyspray2trac: Operating System: Windows 2k/XP]
Andrew Lewman
Andrew Lewman
https://gitlab.torproject.org/legacy/trac/-/issues/969
Directory authorities have different opinions on MTBF and WFU
2020-06-13T14:01:41Z
Karsten Loesing
Directory authorities have different opinions on MTBF and WFU
It has turned out that directory authorities have very different opinions
on relays' MTBF (mean time between failure) and WFU (weighted fractional
uptime). The result is that they vote differently on Guard and Stable
flags:
http://freeh...
It has turned out that directory authorities have very different opinions
on relays' MTBF (mean time between failure) and WFU (weighted fractional
uptime). The result is that they vote differently on Guard and Stable
flags:
http://freehaven.net/~karsten/metrics/relayflags-2009-04-01.pdf
One reason might be false assumptions about running relays as reflected in
the router-stability files. If a relay is running, the corresponding MTBF
line contains the starting time. The starting time is used to include the
running session in MTBF and WFU calculation. An analysis of three
router-stability files shows that authorities think there are between 6K
and 24K relays currently running, which is wrong:
$ grep "MTBF" ides-2009-04-14 | grep "S=" | wc -l
24082
$ grep "MTBF" gabelmoo-2009-04-15 | grep "S=" | wc -l
9206
$ grep "MTBF" moria1-2009-04-15 | grep "S=" | wc -l
6395
These lines are never removed from router-stability files, so that whenever
these relays come back, they appear to be uber-stable which they of course
are not.
The problem lies in the fact that this starting time is only set to 0 in a
few edge cases using rep_hist_note_router_unreachable() in rephist.c. This
function should be called whenever a relay has gone offline, which is of
course difficult to know.
As a possible solution, Tor could check during maintenance when a relay was
contacted the last time. If this time lies more than twice the reachability
timeout in the past, the relay should be marked as unreachable in
rephist.c, too. A simple patch (with some code duplication from
dirserv_set_router_is_running() in dirserv.c) would look like this:
Index: src/or/rephist.c
===================================================================
--- src/or/rephist.c (revision 19341)
+++ src/or/rephist.c (working copy)
@@ -658,6 +658,22 @@
digestmap_iter_get(orhist_it, &d1, &or_history_p);
or_history = or_history_p;
+#define DOUBLE_REACHABLE_TIMEOUT (2*45*60)
+ /* If we are an authority, check if this router is still running. */
+ if (authority && !or_history->start_of_run) {
+ char time_buf[ISO_TIME_LEN+1];
+ routerinfo_t *router = router_get_by_digest(d1);
+ if (!router || (router_is_me(router) && we_are_hibernating()) ||
+ (!get_options()->AssumeReachable &&
+ before >= router->last_reachable + DOUBLE_REACHABLE_TIMEOUT)) {
+ format_iso_time(time_buf, before);
+ log_info(LD_DIR, "When cleaning the reputation history at %s, "
+ "we found that router %s is not running anymore.",
+ time_buf, hex_str(d1, DIGEST_LEN));
+ rep_hist_note_router_unreachable(d1, before);
+ }
+ }
+ /* Now decide if we want to keep it. */
remove = authority ? (or_history->total_run_weights < STABILITY_EPSILON &&
!or_history->start_of_run)
: (or_history->changed < before);
[Automatically added by flyspray2trac: Operating System: All]
Karsten Loesing
Karsten Loesing