Bridge relay don't work on IPv6
tor will listen on the port, but no self test will happens. The self test will only done for the IPv4 port.
Here the log: Jul 09 10:56:54 foo.foo.foo systemd[1]: Starting Anonymizing overlay network for TCP... Jul 09 10:56:54 foo.foo.foo tor[23178]: Jul 09 10:56:54.893 [notice] Tor 0.3.0.9 (git-22b3bf094e327093) running on Linux with Libevent 2.0.21-stable, OpenSS Jul 09 10:56:54 foo.foo.foo tor[23178]: Jul 09 10:56:54.893 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject. Jul 09 10:56:54 foo.foo.foo tor[23178]: Jul 09 10:56:54.945 [notice] Read configuration file "/usr/share/tor/defaults-torrc". Jul 09 10:56:54 foo.foo.foo tor[23178]: Jul 09 10:56:54.946 [notice] Read configuration file "/etc/tor/torrc". Jul 09 10:56:54 foo.foo.foo tor[23178]: Jul 09 10:56:54.951 [notice] Based on detected system memory, MaxMemInQueues is set to 2964 MB. You can override thi Jul 09 10:56:54 foo.foo.foo tor[23178]: Configuration was valid Jul 09 10:56:54 foo.foo.foo systemd[1]: Started Anonymizing overlay network for TCP. Jul 09 10:56:55 foo.foo.foo Tor[23179]: OpenSSL version from headers does not match the version we're running with. If you get weird crashes, that might be Jul 09 10:56:55 foo.foo.foo tor[23179]: Jul 09 10:56:55.111 [notice] Tor 0.3.0.9 (git-22b3bf094e327093) running on Linux with Libevent 2.0.21-stable, OpenSS Jul 09 10:56:55 foo.foo.foo tor[23179]: Jul 09 10:56:55.112 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject. Jul 09 10:56:55 foo.foo.foo tor[23179]: Jul 09 10:56:55.112 [notice] Read configuration file "/usr/share/tor/defaults-torrc". Jul 09 10:56:55 foo.foo.foo tor[23179]: Jul 09 10:56:55.112 [notice] Read configuration file "/etc/tor/torrc". Jul 09 10:56:55 foo.foo.foo tor[23179]: Jul 09 10:56:55.117 [notice] Based on detected system memory, MaxMemInQueues is set to 2964 MB. You can override thi Jul 09 10:56:55 foo.foo.foo tor[23179]: Jul 09 10:56:55.118 [notice] Opening OR listener on [IPv6Address]:Port Jul 09 10:56:55 foo.foo.foo tor[23179]: Jul 09 10:56:55.118 [notice] Opening OR listener on IPv4Address:Port Jul 09 10:56:55 foo.foo.foo Tor[23179]: Tor 0.3.0.9 (git-22b3bf094e327093) running on Linux with Libevent 2.0.21-stable, OpenSSL 1.0.1e-fips and Zlib 1.2.7. Jul 09 10:56:55 foo.foo.foo Tor[23179]: Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning Jul 09 10:56:55 foo.foo.foo Tor[23179]: Read configuration file "/usr/share/tor/defaults-torrc". Jul 09 10:56:55 foo.foo.foo Tor[23179]: Read configuration file "/etc/tor/torrc". Jul 09 10:56:55 foo.foo.foo Tor[23179]: Based on detected system memory, MaxMemInQueues is set to 2964 MB. You can override this by setting MaxMemInQueues b Jul 09 10:56:55 foo.foo.foo Tor[23179]: Opening OR listener on [IPv6Address]:Port Jul 09 10:56:55 foo.foo.foo Tor[23179]: Opening OR listener on IPv4Address:Port Jul 09 10:56:55 foo.foo.foo Tor[23179]: Parsing GEOIP IPv4 file /usr/share/tor/geoip. Jul 09 10:56:55 foo.foo.foo Tor[23179]: Parsing GEOIP IPv6 file /usr/share/tor/geoip6. Jul 09 10:56:55 foo.foo.foo Tor[23179]: Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 Jul 09 10:56:55 foo.foo.foo Tor[23179]: We were built to run on a 64-bit CPU, with OpenSSL 1.0.1 or later, but with a version of OpenSSL that apparently lac Jul 09 10:56:56 foo.foo.foo Tor[23179]: Your Tor server's identity key fingerprint is 'XXXXXX' Jul 09 10:56:56 foo.foo.foo Tor[23179]: Your Tor bridge's hashed identity key fingerprint is 'XXXXXXXX' Jul 09 10:56:56 foo.foo.foo Tor[23179]: Bootstrapped 0%: Starting Jul 09 10:57:10 foo.foo.foo Tor[23179]: Starting with guard context "default" Jul 09 10:57:10 foo.foo.foo Tor[23179]: Bootstrapped 80%: Connecting to the Tor network Jul 09 10:57:10 foo.foo.foo Tor[23179]: Opening Control listener on /run/tor/control Jul 09 10:57:10 foo.foo.foo Tor[23179]: Bootstrapped 85%: Finishing handshake with first hop Jul 09 10:57:11 foo.foo.foo Tor[23179]: Bootstrapped 90%: Establishing a Tor circuit Jul 09 10:57:11 foo.foo.foo Tor[23179]: Tor has successfully opened a circuit. Looks like client functionality is working. Jul 09 10:57:11 foo.foo.foo Tor[23179]: Bootstrapped 100%: Done Jul 09 10:57:11 foo.foo.foo Tor[23179]: Now checking whether ORPort IPv4Address:Port is reachable... (this may take up to 20 minutes -- look for log mess Jul 09 10:57:11 foo.foo.foo Tor[23179]: Self-testing indicates your ORPort is reachable from the outside. Excellent. Publishing server descriptor. Jul 09 10:57:12 foo.foo.foo Tor[23179]: Performing bandwidth self-test...done. Jul 09 16:57:10 foo.foo.foo Tor[23179]: Heartbeat: Tor's uptime is 5:59 hours, with 2 circuits open. I've sent 1.31 MB and received 8.09 MB. Jul 09 16:57:10 foo.foo.foo Tor[23179]: Heartbeat: In the last 6 hours, I have seen 0 unique clients.
Trac:
Username: mr-burns