[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #19191 [Core Tor/Tor]: {BUG} directory_send_command: Bug: Squid does not like URLs longer than 4095 bytes, and this one is 20515 bytes long
#19191: {BUG} directory_send_command: Bug: Squid does not like URLs longer than
4095 bytes, and this one is 20515 bytes long
------------------------------+--------------------------------
Reporter: fk | Owner:
Type: defect | Status: new
Priority: Medium | Milestone:
Component: Core Tor/Tor | Version: Tor: 0.2.8.3-alpha
Severity: Normal | Keywords:
Actual Points: | Parent ID:
Points: | Reviewer:
Sponsor: |
------------------------------+--------------------------------
After upgrading the relay 40A60D1F1E8AFBED22FCB30B3FBE2E275A14CF99 to Tor
v0.2.8.3-alpha I got the following warning after starting:
{{{
May 27 14:02:26.111 [warn] {BUG} directory_send_command: Bug: Squid does
not like URLs longer than 4095 bytes, and this one is 20515 bytes long:
/tor/server/d/0E2ED00342161B68622BDF90623068BD9FF56890+0E3A7F3C5F[...]
}}}
It was repeated a couple of times with slightly different paths.
This relay was previously running 0.2.7.6, but I'm also using
0.2.8.2-alpha on
other systems and haven't seen the warnings there.
I'm not sure if there's a connection, but bootstrapping did not make it
beyond 80%.
Enabling debug logging resulted in lots of messages like:
{{{
May 27 14:27:16.604 [info] {NET}
get_interface_address6_via_udp_socket_hack: Address that we determined via
UDP socket magic is unsuitable for public comms.
May 27 14:27:16.605 [info] {NET}
get_interface_address6_via_udp_socket_hack: Address that we determined via
UDP socket magic is unsuitable for public comms.
May 27 14:27:16.605 [info] {NET}
get_interface_address6_via_udp_socket_hack: Address that we determined via
UDP socket magic is unsuitable for public comms.
May 27 14:27:16.606 [info] {NET}
get_interface_address6_via_udp_socket_hack: Address that we determined via
UDP socket magic is unsuitable for public comms.
May 27 14:27:16.606 [info] {NET}
get_interface_address6_via_udp_socket_hack: Address that we determined via
UDP socket magic is unsuitable for public comms.
May 27 14:27:16.607 [info] {NET}
get_interface_address6_via_udp_socket_hack: Address that we determined via
UDP socket magic is unsuitable for public comms.
May 27 14:27:16.607 [info] {NET}
get_interface_address6_via_udp_socket_hack: Address that we determined via
UDP socket magic is unsuitable for public comms.
May 27 14:27:16.608 [info] {NET}
get_interface_address6_via_udp_socket_hack: Address that we determined via
UDP socket magic is unsuitable for public comms.
May 27 14:27:27.346 [info] {NET}
get_interface_address6_via_udp_socket_hack: Address that we determined via
UDP socket magic is unsuitable for public comms.
May 27 14:27:30.560 [info] {NET}
get_interface_address6_via_udp_socket_hack: Address that we determined via
UDP socket magic is unsuitable for public comms.
May 27 14:27:33.302 [info] {NET}
get_interface_address6_via_udp_socket_hack: Address that we determined via
UDP socket magic is unsuitable for public comms.
May 27 14:27:33.717 [info] {NET}
get_interface_address6_via_udp_socket_hack: Address that we determined via
UDP socket magic is unsuitable for public comms.
}}}
Tor is running in an ElectroBSD jail without raw socket access (which is
probably required for the UDP socket magic to work).
After adding the Address directive bootstrapping worked and the relay is
currently serving traffic.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/19191>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs