[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: onion_skin_client_handshake failed.



Roger Dingledine wrote:
> On Sat, Sep 26, 2009 at 06:16:59PM -0400, Wyllys Ingersoll wrote:
>> Im trying to run a tor relay (v2.1.19) and am seeing the following errors repeatedly:
>>
>> Sep 26 18:16:03 spyglass Tor[851]: [ID 702911 daemon.warning] onion_skin_client_handshake failed.
>> Sep 26 18:16:03 spyglass Tor[851]: [ID 702911 daemon.warning] circuit_finish_handshake failed.
>> Sep 26 18:16:03 spyglass Tor[851]: [ID 702911 daemon.warning] Digest DOES NOT MATCH on onion handshake. Bug or attack.
>>
>> I'm not sure how to fix this - any suggestions?
> 
> How odd. What's happening is your Tor is trying to extend a circuit
> (this is a client-side circuit, that is, a circuit that your Tor could
> use for its own connections), and you send your half of the handshake,
> and get back the other half of the handshake. Then you compute what you
> think the session key should be (based on both halves of the handshake),
> and compare that to what the fellow on the other end thought the session
> key should be. They don't match.
> 
> Has anybody else been seeing these?
> 
> If not, my guess is there's something weird with your hardware or
> your openssl libs. You don't happen to be using some sort of crypto
> accelerator, do you? :) If so, try turning it off and see if the problems
> go away.


Oddly enough, on the one system that I use that DOES have HW support, I 
don't have the problem. I am seeing it on several systems that do not
have any HW support.

-Wyllys
***********************************************************************
To unsubscribe, send an e-mail to majordomo@xxxxxxxxxxxxxx with
unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/