silent crashes with ofbs4
Trying to run obfs4 bridge on Debian Trixie on 1GB Raspberry Pi, it regularly seems to crash silently after a few minutes to dozen hours. E.g.
14:07:09 [NYX_NOTICE] Tor control port closed
14:07:07 [NOTICE] Removed 528 bytes by killing 45 circuits; 0 circuits remain alive. Also killed 0 non-linked directory connections. Killed 0 edge connections
14:07:07 [NOTICE] We're low on memory (cell queues total alloc: 528 buffer total alloc: 0, tor compress total alloc: 293257561 (zlib: 395520, zstd: 0, lzma: 292861977), rendezvous cache
total alloc: 0). Killing circuits withover-long queues. (This behavior is controlled by MaxMemInQueues.)
14:06:47 [WARN] Possible compression bomb; abandoning stream. [494 duplicates hidden]
14:06:47 [WARN] Detected possible compression bomb with input size = 33341 and output size = 890274 [55 duplicates hidden]
14:06:47 [WARN] Detected possible compression bomb with input size = 28865 and output size = 817344 [38 duplicates hidden]
14:06:47 [WARN] Detected possible compression bomb with input size = 31845 and output size = 905279 [40 duplicates hidden]
14:05:47 [WARN] Detected possible compression bomb with input size = 33313 and output size = 890274 [34 duplicates hidden]
14:04:47 [WARN] Detected possible compression bomb with input size = 31859 and output size = 905279 [48 duplicates hidden]
14:04:47 [WARN] Detected possible compression bomb with input size = 28885 and output size = 817344 [51 duplicates hidden]
13:27:47 [WARN] Unable to decompress HTTP body (tried Zstandard compressed, on Directory connection (client reading) with 57.128.169.164:443). [178 similar message(s) suppressed in last 3660
seconds]
12:34:53 [WARN] Detected possible compression bomb with input size = 29256 and output size = 871523 [30 duplicates hidden]
12:34:46 [WARN] Detected possible compression bomb with input size = 31480 and output size = 902775 [36 duplicates hidden]
12:34:46 [WARN] Detected possible compression bomb with input size = 27762 and output size = 827924 [38 duplicates hidden]
12:33:46 [WARN] Detected possible compression bomb with input size = 27526 and output size = 827924 [29 duplicates hidden]
12:33:46 [WARN] Detected possible compression bomb with input size = 22323 and output size = 596032 [37 duplicates hidden]
12:33:46 [WARN] Detected possible compression bomb with input size = 31518 and output size = 902775 [31 duplicates hidden]
12:27:46 [WARN] Unable to decompress HTTP body (tried Zstandard compressed, on Directory connection (client reading) with 212.227.85.103:443). [179 similar message(s) suppressed in last 3600
seconds]
12:26:44 [NOTICE] Heartbeat: Since last heartbeat message, I have seen 5 unique clients.
12:26:44 [NOTICE] While not bootstrapping, fetched this many bytes: 7581018 (server descriptor fetch); 367 (server descriptor upload); 306322 (consensus network-status fetch); 45770599
(microdescriptor fetch)
12:26:44 [NOTICE] While bootstrapping, fetched this many bytes: 23281 (consensus network-status fetch)
12:26:44 [NOTICE] Heartbeat: Tor's uptime is 6:00 hours, with 2 circuits open. I've sent 10.11 MB and received 57.99 MB. I've received 5 connections on IPv4 and 0 on IPv6. I've made 14
connections with IPv4 and 0 with IPv6.
11:27:46 [WARN] Unable to decompress HTTP body (tried Zstandard compressed, on Directory connection (client reading) with 212.227.85.103:443). [178 similar message(s) suppressed in last 3600
seconds]
11:25:47 [WARN] Detected possible compression bomb with input size = 26425 and output size = 764288
11:25:47 [WARN] Detected possible compression bomb with input size = 22776 and output size = 617392
11:24:54 [WARN] Detected possible compression bomb with input size = 28925 and output size = 801152
11:24:53 [WARN] Detected possible compression bomb with input size = 23684 and output size = 715680 [2 duplicates hidden]
11:24:46 [WARN] Detected possible compression bomb with input size = 47580 and output size = 1375110 [2 duplicates hidden]
11:23:46 [WARN] Detected possible compression bomb with input size = 47567 and output size = 1375110 [1 duplicate hidden]
11:23:46 [WARN] Detected possible compression bomb with input size = 28934 and output size = 799664 [3 duplicates hidden]
11:21:46 [WARN] Detected possible compression bomb with input size = 23680 and output size = 714240
ii obfs4proxy 0.0.14-2+b5 arm64 pluggable transport proxy for Tor, implementing obfs4
ii tor 0.4.8.16-1 arm64 anonymizing overlay network for TCP
there are no messages in dmesg(8) either (so no kernel OOM).