[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #27731 [Core Tor/Tor]: tor restart loop: "The missing protocols are: LinkAuth=1"
#27731: tor restart loop: "The missing protocols are: LinkAuth=1"
--------------------------+----------------------------------
Reporter: traumschule | Owner: (none)
Type: defect | Status: new
Priority: Medium | Milestone:
Component: Core Tor/Tor | Version: Tor: unspecified
Severity: Normal | Resolution:
Keywords: | Actual Points:
Parent ID: #27288 | Points:
Reviewer: | Sponsor:
--------------------------+----------------------------------
Old description:
> Since the (automatic) apt upgrade to 0.3.5.0-alpha-dev-
> 20180916T182348Z-1~d99.buster+1 tor restarted in a loop:
>
> {{{
> Sep 17 01:05:26.000 [notice] {GENERAL} Parsing GEOIP IPv4 file
> /usr/share/tor/geoip.
> Sep 17 01:05:27.000 [notice] {GENERAL} Parsing GEOIP IPv6 file
> /usr/share/tor/geoip6.
> Sep 17 01:05:27.000 [info] {CIRC} add_predicted_port(): New port
> prediction added. Will continue predictive circ building for 2079 more
> seconds.
> Sep 17 01:05:27.000 [info] {CRYPTO} crypto_openssl_late_init(): NOT using
> OpenSSL engine support.
> Sep 17 01:05:27.000 [info] {CRYPTO} evaluate_evp_for_aes(): This version
> of OpenSSL has a known-good EVP counter-mode implementation. Using it.
> Sep 17 01:05:27.000 [notice] {CONTROL} Bootstrapped 0%: Starting
> Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string():
> Adding cached certificate for directory authority maatuska with signing
> key 10A69F531F8421310537EAC881F7DD354F251D31
> Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string():
> Adding cached certificate for directory authority dannenberg with signing
> key CD1FD971855430880D3C31E0331C5C55800C2F79
> Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string():
> Adding cached certificate for directory authority gabelmoo with signing
> key E1249D5F87EAD43CD4A48DF9CFCFE810BEEE5287
> Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string():
> Adding cached certificate for directory authority bastet with signing key
> 88E1BDDC8E6363355910D086B37B562F81674DC1
> Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string():
> Adding cached certificate for directory authority longclaw with signing
> key D632ADF38603F34EAFCB461C4DA5F67EF62BE7EC
> Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string():
> Adding cached certificate for directory authority tor26 with signing key
> 719A962F8F7DC7F0A34A545E7A45368FF8A23D2A
> Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string():
> Adding cached certificate for directory authority Faravahar with signing
> key 517095062288D1B5C7BD6517A677C586D996818B
> Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string():
> Adding cached certificate for directory authority dizum with signing key
> 109A865D7DBE58367C120353CBE9947EE263695A
> Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string():
> Adding cached certificate for directory authority moria1 with signing key
> 6E44451E3F1CEB435E4D95C1F8B12AA022BB34CF
> Sep 17 01:05:28.000 [err] {GENERAL} At least one protocol listed as
> required in the consensus is not supported by this version of Tor. You
> should upgrade. This version of Tor will not work as a client on the Tor
> network. The missing protocols are: LinkAuth=1
> [restart]
> Sep 17 01:06:08.000 [info] {GENERAL} options_act_reversible(): Recomputed
> OOS thresholds: ConnLimit 1000, ConnLimit_ 65504, ConnLimit_high_thresh
> 65440, ConnLimit_low_thresh 49128
> Sep 17 01:06:08.000 [info] {FS} tor_lockfile_lock(): Locking
> "/var/lib/tor/lock"
> }}}
>
> Downgrading fixed it. git HEAD is also affected, last working commit in
> master: 035166e7bf30645f6da9d39374f5e9c9efe867f8
> {{{
> dpkg -i /var/cache/apt/archives/tor_0.3.5.0-alpha-dev-
> 20180915T011035Z-1~d99.buster+1_i386.deb
>
> Tor version 0.3.5.0-alpha-dev (git-035166e7bf30645f).
> }}}
>
> First failing:
> http://jqs44zhtxl2uo6gk.onion/tor.git/commit/?id=991bec67ee41fd7f3c12e9194d96491b51bedd50
New description:
Since the (automatic) apt upgrade to 0.3.5.0-alpha-dev-
20180916T182348Z-1~d99.buster+1 tor restarted in a loop:
{{{
Sep 17 01:05:24.000 [err] {GENERAL} At least one protocol listed as
required in the consensus is not supported by this version of Tor. You
should upgrade. This version of Tor will not work as a clien
t on the Tor network. The missing protocols are: LinkAuth=1
Sep 17 01:05:26.000 [notice] Tor 0.3.5.0-alpha-dev opening log file.
Sep 17 01:05:26.531 [notice] Tor 0.3.5.0-alpha-dev running on Linux with
Libevent 2.1.8-stable, OpenSSL 1.1.0h, Zlib 1.2.11, Liblzma 5.2.2, and
Libzstd 1.3.5.
Sep 17 01:05:26.539 [notice] Tor can't help you if you use it wrong! Learn
how to be safe at https://www.torproject.org/download/download#warning
Sep 17 01:05:26.539 [notice] This version is not a stable Tor release.
Expect more bugs than usual.
Sep 17 01:05:26.540 [notice] Read configuration file "/usr/share/tor/tor-
service-defaults-torrc".
Sep 17 01:05:26.540 [notice] Read configuration file "/etc/tor/torrc".
Sep 17 01:05:26.590 [notice] Opening Socks listener on 127.0.0.1:9050
Sep 17 01:05:26.591 [notice] Opened Socks listener on 127.0.0.1:9050
Sep 17 01:05:26.591 [notice] Opening HTTP tunnel listener on
127.0.0.1:9099
Sep 17 01:05:26.592 [notice] Opened HTTP tunnel listener on 127.0.0.1:9099
Sep 17 01:05:26.592 [notice] Opening Control listener on 127.0.0.1:9051
Sep 17 01:05:26.592 [notice] Opened Control listener on 127.0.0.1:9051
Sep 17 01:05:26.000 [warn] {GENERAL} Your log may contain sensitive
information - you disabled SafeLogging, and you're logging more than
"notice". Don't log unless it serves an important reason. Overwrite the
log afterwards.
Sep 17 01:05:26.000 [info] {GENERAL} options_act_reversible(): Recomputed
OOS thresholds: ConnLimit 1000, ConnLimit_ 65504, ConnLimit_high_thresh
65440, ConnLimit_low_thresh 49128
Sep 17 01:05:26.000 [info] {GENERAL} or_state_load(): Loaded state from
"/var/lib/tor/state"
Sep 17 01:05:26.000 [info] {GUARD} sampled_guards_update_from_consensus():
Not updating the sample guard set; we have no live consensus.
Sep 17 01:05:26.000 [info] {GUARD}
sample_reachable_filtered_entry_guards(): Trying to sample a reachable
guard: We know of 0 in the USABLE_FILTERED set.
Sep 17 01:05:26.000 [info] {GUARD}
sample_reachable_filtered_entry_guards(): (That isn't enough. Trying to
expand the sample.)
Sep 17 01:05:26.000 [info] {GUARD} entry_guards_expand_sample(): Not
expanding the sample guard set; we have no live consensus.
Sep 17 01:05:26.000 [info] {GUARD}
sample_reachable_filtered_entry_guards(): (After filters [b], we have 0
guards to consider.)
Sep 17 01:05:26.000 [info] {CIRC} circuit_build_times_parse_state():
Adding 11 timeouts.
Sep 17 01:05:26.000 [info] {CIRC} circuit_build_times_parse_state():
Loaded 1000/1000 values from 48 lines in circuit time histogram
Sep 17 01:05:26.000 [info] {CIRC} circuit_build_times_get_xm(): Xm mode
#0: 575 91
Sep 17 01:05:26.000 [info] {CIRC} circuit_build_times_get_xm(): Xm mode
#1: 675 70
Sep 17 01:05:26.000 [info] {CIRC} circuit_build_times_get_xm(): Xm mode
#2: 375 85
Sep 17 01:05:26.000 [info] {CIRC} circuit_build_times_set_timeout(): Set
buildtimeout to low value 871.512173ms. Setting to 1500ms
Sep 17 01:05:26.000 [info] {CIRC} circuit_build_times_set_timeout(): Based
on 1000 circuit times, it looks like we don't need to wait so long for
circuits to finish. We will now assume a circuit is too slow to use after
waiting 2 seconds.
Sep 17 01:05:26.000 [info] {CIRC} circuit_build_times_set_timeout():
Circuit timeout data: 1500.000000ms, 60000.000000ms, Xm: 534, a: 3.285680,
r: 0.046000
Sep 17 01:05:26.000 [info] {FS} read_file_to_str(): Could not open
"/var/lib/tor/router-stability": No such file or directory
Sep 17 01:05:26.000 [info] {GENERAL} init_cookie_authentication():
Generated auth cookie file in '"/var/run/tor/control.authcookie"'.
Sep 17 01:05:26.000 [info] {SCHED} scheduler_kist_set_full_mode(): Setting
KIST scheduler with kernel support (KIST mode)
Sep 17 01:05:26.000 [info] {OR} cmux_ewma_set_options(): Enabled cell_ewma
algorithm because of value in CircuitPriorityHalflifeMsec in consensus;
scale factor is 0.793701 per 10 seconds
Sep 17 01:05:26.000 [notice] {GENERAL} Parsing GEOIP IPv4 file
/usr/share/tor/geoip.
Sep 17 01:05:27.000 [notice] {GENERAL} Parsing GEOIP IPv6 file
/usr/share/tor/geoip6.
Sep 17 01:05:27.000 [info] {CIRC} add_predicted_port(): New port
prediction added. Will continue predictive circ building for 2079 more
seconds.
Sep 17 01:05:27.000 [info] {CRYPTO} crypto_openssl_late_init(): NOT using
OpenSSL engine support.
Sep 17 01:05:27.000 [info] {CRYPTO} evaluate_evp_for_aes(): This version
of OpenSSL has a known-good EVP counter-mode implementation. Using it.
Sep 17 01:05:27.000 [notice] {CONTROL} Bootstrapped 0%: Starting
Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string():
Adding cached certificate for directory authority maatuska with signing
key 10A69F531F8421310537EAC881F7DD354F251D31
Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string():
Adding cached certificate for directory authority dannenberg with signing
key CD1FD971855430880D3C31E0331C5C55800C2F79
Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string():
Adding cached certificate for directory authority gabelmoo with signing
key E1249D5F87EAD43CD4A48DF9CFCFE810BEEE5287
Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string():
Adding cached certificate for directory authority bastet with signing key
88E1BDDC8E6363355910D086B37B562F81674DC1
Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string():
Adding cached certificate for directory authority longclaw with signing
key D632ADF38603F34EAFCB461C4DA5F67EF62BE7EC
Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string():
Adding cached certificate for directory authority tor26 with signing key
719A962F8F7DC7F0A34A545E7A45368FF8A23D2A
Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string():
Adding cached certificate for directory authority Faravahar with signing
key 517095062288D1B5C7BD6517A677C586D996818B
Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string():
Adding cached certificate for directory authority dizum with signing key
109A865D7DBE58367C120353CBE9947EE263695A
Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string():
Adding cached certificate for directory authority moria1 with signing key
6E44451E3F1CEB435E4D95C1F8B12AA022BB34CF
Sep 17 01:05:28.000 [err] {GENERAL} At least one protocol listed as
required in the consensus is not supported by this version of Tor. You
should upgrade. This version of Tor will not work as a client on the Tor
network. The missing protocols are: LinkAuth=1
[restart]
Sep 17 01:06:08.000 [info] {GENERAL} options_act_reversible(): Recomputed
OOS thresholds: ConnLimit 1000, ConnLimit_ 65504, ConnLimit_high_thresh
65440, ConnLimit_low_thresh 49128
Sep 17 01:06:08.000 [info] {FS} tor_lockfile_lock(): Locking
"/var/lib/tor/lock"
}}}
Downgrading fixed it. git HEAD is also affected, last working commit in
master: 035166e7bf30645f6da9d39374f5e9c9efe867f8
{{{
dpkg -i /var/cache/apt/archives/tor_0.3.5.0-alpha-dev-
20180915T011035Z-1~d99.buster+1_i386.deb
Tor version 0.3.5.0-alpha-dev (git-035166e7bf30645f).
}}}
First failing:
http://jqs44zhtxl2uo6gk.onion/tor.git/commit/?id=991bec67ee41fd7f3c12e9194d96491b51bedd50
--
Comment (by traumschule):
add missing log lines
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/27731#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs