tor restart loop: "The missing protocols are: LinkAuth=1"
Since the (automatic) apt upgrade to 0.3.5.0-alpha-dev-20180916T182348Z-1~d99.buster+1 tor restarted in a loop: ``` Sep 17 01:05:24.000 [err] {GENERAL} At least one protocol listed as required in the consensus is not supported by this version of Tor. You should upgrade. This version of Tor will not work as a clien t on the Tor network. The missing protocols are: LinkAuth=1 Sep 17 01:05:26.000 [notice] Tor 0.3.5.0-alpha-dev opening log file. Sep 17 01:05:26.531 [notice] Tor 0.3.5.0-alpha-dev running on Linux with Libevent 2.1.8-stable, OpenSSL 1.1.0h, Zlib 1.2.11, Liblzma 5.2.2, and Libzstd 1.3.5. Sep 17 01:05:26.539 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning Sep 17 01:05:26.539 [notice] This version is not a stable Tor release. Expect more bugs than usual. Sep 17 01:05:26.540 [notice] Read configuration file "/usr/share/tor/tor-service-defaults-torrc". Sep 17 01:05:26.540 [notice] Read configuration file "/etc/tor/torrc". Sep 17 01:05:26.590 [notice] Opening Socks listener on 127.0.0.1:9050 Sep 17 01:05:26.591 [notice] Opened Socks listener on 127.0.0.1:9050 Sep 17 01:05:26.591 [notice] Opening HTTP tunnel listener on 127.0.0.1:9099 Sep 17 01:05:26.592 [notice] Opened HTTP tunnel listener on 127.0.0.1:9099 Sep 17 01:05:26.592 [notice] Opening Control listener on 127.0.0.1:9051 Sep 17 01:05:26.592 [notice] Opened Control listener on 127.0.0.1:9051 Sep 17 01:05:26.000 [warn] {GENERAL} Your log may contain sensitive information - you disabled SafeLogging, and you're logging more than "notice". Don't log unless it serves an important reason. Overwrite the log afterwards. Sep 17 01:05:26.000 [info] {GENERAL} options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 65504, ConnLimit_high_thresh 65440, ConnLimit_low_thresh 49128 Sep 17 01:05:26.000 [info] {GENERAL} or_state_load(): Loaded state from "/var/lib/tor/state" Sep 17 01:05:26.000 [info] {GUARD} sampled_guards_update_from_consensus(): Not updating the sample guard set; we have no live consensus. Sep 17 01:05:26.000 [info] {GUARD} sample_reachable_filtered_entry_guards(): Trying to sample a reachable guard: We know of 0 in the USABLE_FILTERED set. Sep 17 01:05:26.000 [info] {GUARD} sample_reachable_filtered_entry_guards(): (That isn't enough. Trying to expand the sample.) Sep 17 01:05:26.000 [info] {GUARD} entry_guards_expand_sample(): Not expanding the sample guard set; we have no live consensus. Sep 17 01:05:26.000 [info] {GUARD} sample_reachable_filtered_entry_guards(): (After filters [b], we have 0 guards to consider.) Sep 17 01:05:26.000 [info] {CIRC} circuit_build_times_parse_state(): Adding 11 timeouts. Sep 17 01:05:26.000 [info] {CIRC} circuit_build_times_parse_state(): Loaded 1000/1000 values from 48 lines in circuit time histogram Sep 17 01:05:26.000 [info] {CIRC} circuit_build_times_get_xm(): Xm mode #0: 575 91 Sep 17 01:05:26.000 [info] {CIRC} circuit_build_times_get_xm(): Xm mode #1: 675 70 Sep 17 01:05:26.000 [info] {CIRC} circuit_build_times_get_xm(): Xm mode #2: 375 85 Sep 17 01:05:26.000 [info] {CIRC} circuit_build_times_set_timeout(): Set buildtimeout to low value 871.512173ms. Setting to 1500ms Sep 17 01:05:26.000 [info] {CIRC} circuit_build_times_set_timeout(): Based on 1000 circuit times, it looks like we don't need to wait so long for circuits to finish. We will now assume a circuit is too slow to use after waiting 2 seconds. Sep 17 01:05:26.000 [info] {CIRC} circuit_build_times_set_timeout(): Circuit timeout data: 1500.000000ms, 60000.000000ms, Xm: 534, a: 3.285680, r: 0.046000 Sep 17 01:05:26.000 [info] {FS} read_file_to_str(): Could not open "/var/lib/tor/router-stability": No such file or directory Sep 17 01:05:26.000 [info] {GENERAL} init_cookie_authentication(): Generated auth cookie file in '"/var/run/tor/control.authcookie"'. Sep 17 01:05:26.000 [info] {SCHED} scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode) Sep 17 01:05:26.000 [info] {OR} cmux_ewma_set_options(): Enabled cell_ewma algorithm because of value in CircuitPriorityHalflifeMsec in consensus; scale factor is 0.793701 per 10 seconds Sep 17 01:05:26.000 [notice] {GENERAL} Parsing GEOIP IPv4 file /usr/share/tor/geoip. Sep 17 01:05:27.000 [notice] {GENERAL} Parsing GEOIP IPv6 file /usr/share/tor/geoip6. Sep 17 01:05:27.000 [info] {CIRC} add_predicted_port(): New port prediction added. Will continue predictive circ building for 2079 more seconds. Sep 17 01:05:27.000 [info] {CRYPTO} crypto_openssl_late_init(): NOT using OpenSSL engine support. Sep 17 01:05:27.000 [info] {CRYPTO} evaluate_evp_for_aes(): This version of OpenSSL has a known-good EVP counter-mode implementation. Using it. Sep 17 01:05:27.000 [notice] {CONTROL} Bootstrapped 0%: Starting Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority maatuska with signing key 10A69F531F8421310537EAC881F7DD354F251D31 Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority dannenberg with signing key CD1FD971855430880D3C31E0331C5C55800C2F79 Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority gabelmoo with signing key E1249D5F87EAD43CD4A48DF9CFCFE810BEEE5287 Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority bastet with signing key 88E1BDDC8E6363355910D086B37B562F81674DC1 Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority longclaw with signing key D632ADF38603F34EAFCB461C4DA5F67EF62BE7EC Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority tor26 with signing key 719A962F8F7DC7F0A34A545E7A45368FF8A23D2A Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority Faravahar with signing key 517095062288D1B5C7BD6517A677C586D996818B Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority dizum with signing key 109A865D7DBE58367C120353CBE9947EE263695A Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string(): Adding cached certificate for directory authority moria1 with signing key 6E44451E3F1CEB435E4D95C1F8B12AA022BB34CF Sep 17 01:05:28.000 [err] {GENERAL} At least one protocol listed as required in the consensus is not supported by this version of Tor. You should upgrade. This version of Tor will not work as a client on the Tor network. The missing protocols are: LinkAuth=1 [restart] Sep 17 01:06:08.000 [info] {GENERAL} options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 65504, ConnLimit_high_thresh 65440, ConnLimit_low_thresh 49128 Sep 17 01:06:08.000 [info] {FS} tor_lockfile_lock(): Locking "/var/lib/tor/lock" ``` Downgrading fixed it. git HEAD is also affected, last working commit in master: 035166e7bf30645f6da9d39374f5e9c9efe867f8 ``` dpkg -i /var/cache/apt/archives/tor_0.3.5.0-alpha-dev-20180915T011035Z-1~d99.buster+1_i386.deb Tor version 0.3.5.0-alpha-dev (git-035166e7bf30645f). ``` First failing: http://jqs44zhtxl2uo6gk.onion/tor.git/commit/?id=991bec67ee41fd7f3c12e9194d96491b51bedd50
issue