[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #5619 [Obfsproxy]: obfsproxy: test suite failure (EOF)
#5619: obfsproxy: test suite failure (EOF)
-----------------------+----------------------------------------------------
Reporter: asn | Owner: asn
Type: defect | Status: new
Priority: normal | Milestone:
Component: Obfsproxy | Version:
Keywords: | Parent:
Points: | Actualpoints:
-----------------------+----------------------------------------------------
Comment(by asn):
weasel reproduced this with `obfsproxy-0.1.1` too:
{{{
PASS: unittests
...............F.
======================================================================
FAIL: test_socks4_transfer (__main__.SocksObfs2)
----------------------------------------------------------------------
Traceback (most recent call last):
File "./tester.py", line 297, in test_socks4_transfer
( (0, 90, SERVER_PORT, 127, 0, 0, 1), "!BBH4B" ) ])
File "./tester.py", line 288, in socksTest
self.fail("\n" + report)
AssertionError:
errors in transfer:
--- expected
+++ received
@@ -1,39 +1 @@
-THIS IS A TEST FILE. IT\'S USED BY THE INTEGRATION TESTS.
-THIS IS A TEST FILE. IT\'S USED BY THE INTEGRATION TESTS.
-THIS IS A TEST FILE. IT\'S USED BY THE INTEGRATION TESTS.
-THIS IS A TEST FILE. IT\'S USED BY THE INTEGRATION TESTS.
-"Can entropy ever be reversed?"
-"THERE IS AS YET INSUFFICIENT DATA FOR A MEANINGFUL ANSWER."
-"Can entropy ever be reversed?"
-"THERE IS AS YET INSUFFICIENT DATA FOR A MEANINGFUL ANSWER."
-"Can entropy ever be reversed?"
-"THERE IS AS YET INSUFFICIENT DATA FOR A MEANINGFUL ANSWER."
-"Can entropy ever be reversed?"
-"THERE IS AS YET INSUFFICIENT DATA FOR A MEANINGFUL ANSWER."
-"Can entropy ever be reversed?"
-"THERE IS AS YET INSUFFICIENT DATA FOR A MEANINGFUL ANSWER."
-"Can entropy ever be reversed?"
-"THERE IS AS YET INSUFFICIENT DATA FOR A MEANINGFUL ANSWER."
-"Can entropy ever be reversed?"
-"THERE IS AS YET INSUFFICIENT DATA FOR A MEANINGFUL ANSWER."
-"Can entropy ever be reversed?"
-"THERE IS AS YET INSUFFICIENT DATA FOR A MEANINGFUL ANSWER."
-
- In obfuscatory age geeky warfare did I wage
- For hiding bits from nasty censors\' sight
- I was hacker to my set in that dim dark age of net
- And I hacked from noon till three or four at night
-
- Then a rival from Helsinki said my protocol was dinky
- So I flamed him with a condescending laugh,
- Saying his designs for stego might as well be made of lego
- And that my bikeshed was prettier by half.
-
- But Claude Shannon saw my shame. From his noiseless channel came
- A message sent with not a wasted byte
- "There are nine and sixty ways to disguise communiques
- And RATHER MORE THAN ONE OF THEM IS RIGHT"
-
-\t\t (apologies to Rudyard Kipling.)
-
obfsproxy server stderr:
| 2012-04-13 15:25:38 [notice] Starting.
| 2012-04-13 15:25:38 [debug] Configuration 1: obfs2 --dest=127.0.0.1:5001
server 127.0.0.1:5000
| 2012-04-13 15:25:38 [debug] obfs2: Parsed options nicely!
| 2012-04-13 15:25:38 [debug] Now listening on 127.0.0.1:5000 for protocol
obfs2.
| 2012-04-13 15:25:38 [debug] [scrubbed]: new connection from [scrubbed]
(1 total)
| 2012-04-13 15:25:38 [debug] [scrubbed]: server connection
| 2012-04-13 15:25:38 [info] [scrubbed] (obfs2): Successful outbound
connection to '[scrubbed]'.
| 2012-04-13 15:25:38 [debug] [scrubbed]: setup complete
| 2012-04-13 15:25:38 [debug] [scrubbed]: pending_conn_cb
| 2012-04-13 15:25:38 [debug] [scrubbed]: Successful connection
| 2012-04-13 15:25:38 [debug] obfs2_handshake: responder queued 1193 bytes
| 2012-04-13 15:25:38 [debug] [scrubbed]: downstream_read_cb, 1726 bytes
available
| 2012-04-13 15:25:38 [debug] obfs2_recv: received key, expecting 1702
bytes of padding
| 2012-04-13 15:25:38 [debug] obfs2_recv: consumed 1702 bytes padding, 0
still to come
| 2012-04-13 15:25:38 [debug] obfs2_recv: Processing 0 bytes application
data
| 2012-04-13 15:25:38 [debug] [scrubbed]: forwarded 0 bytes
| 2012-04-13 15:25:38 [debug] [scrubbed]: downstream_read_cb, 1666 bytes
available
| 2012-04-13 15:25:38 [debug] obfs2_recv: Processing 1666 bytes
application data
| 2012-04-13 15:25:38 [debug] obfs2_crypt_and_transmit: Processed 1024
bytes.
| 2012-04-13 15:25:38 [debug] obfs2_crypt_and_transmit: Processed 642
bytes.
| 2012-04-13 15:25:38 [debug] [scrubbed]: forwarded 1666 bytes
| 2012-04-13 15:25:39 [debug] error_cb for [scrubbed]: what=0x0011
| 2012-04-13 15:25:39 [info] EOF from [scrubbed]
| 2012-04-13 15:25:39 [debug] error_or_eof for [scrubbed]
| 2012-04-13 15:25:39 [debug] Closing connection with [scrubbed]; 1
remaining
| 2012-04-13 15:25:39 [debug] Closing connection with [scrubbed]; 0
remaining
| 2012-04-13 15:25:39 [info] Closing all listeners.
| 2012-04-13 15:25:39 [notice] Got SIGINT. Preparing shutdown.
| 2012-04-13 15:25:39 [debug] Beginning normal shutdown.
| 2012-04-13 15:25:39 [debug] Finishing shutdown.
| 2012-04-13 15:25:39 [notice] Exiting.
obfsproxy client stderr:
| 2012-04-13 15:25:38 [notice] Starting.
| 2012-04-13 15:25:38 [debug] Configuration 1: obfs2 socks 127.0.0.1:4999
| 2012-04-13 15:25:38 [debug] obfs2: Parsed options nicely!
| 2012-04-13 15:25:38 [debug] Now listening on 127.0.0.1:4999 for protocol
obfs2.
| 2012-04-13 15:25:38 [debug] [scrubbed]: new connection from [scrubbed]
(1 total)
| 2012-04-13 15:25:38 [debug] [scrubbed]: socks client connection
| 2012-04-13 15:25:38 [debug] [scrubbed]: setup complete
| 2012-04-13 15:25:38 [debug] [scrubbed]: socks_read_cb
| 2012-04-13 15:25:38 [debug] Got version 4
| 2012-04-13 15:25:38 [info] [scrubbed]: socks: trying to connect to
[scrubbed]:5000
| 2012-04-13 15:25:38 [debug] [scrubbed]: pending_socks_cb
| 2012-04-13 15:25:38 [debug] We connected to our SOCKS destination!
Replacing peername '[scrubbed]' with '[scrubbed]'
| 2012-04-13 15:25:38 [debug] [scrubbed]: Successful outbound connection
to [scrubbed]
| 2012-04-13 15:25:38 [debug] obfs2_handshake: initiator queued 1726 bytes
| 2012-04-13 15:25:38 [debug] [scrubbed]: downstream_read_cb, 1193 bytes
available
| 2012-04-13 15:25:38 [debug] obfs2_recv: received key, expecting 1169
bytes of padding
| 2012-04-13 15:25:38 [debug] obfs2_recv: consumed 1169 bytes padding, 0
still to come
| 2012-04-13 15:25:38 [debug] obfs2_recv: Processing 0 bytes application
data
| 2012-04-13 15:25:38 [debug] [scrubbed]: forwarded 8 bytes
| 2012-04-13 15:25:38 [debug] [scrubbed]: upstream_read_cb, 1666 bytes
available
| 2012-04-13 15:25:38 [debug] obfs2_send: transmitting 1666 bytes.
| 2012-04-13 15:25:38 [debug] obfs2_crypt_and_transmit: Processed 1024
bytes.
| 2012-04-13 15:25:38 [debug] obfs2_crypt_and_transmit: Processed 642
bytes.
| 2012-04-13 15:25:38 [debug] [scrubbed]: transmitted 1666 bytes
| 2012-04-13 15:25:39 [debug] error_cb for [scrubbed]: what=0x0011
| 2012-04-13 15:25:39 [info] EOF from [scrubbed]
| 2012-04-13 15:25:39 [debug] error_or_eof for [scrubbed]
| 2012-04-13 15:25:39 [debug] Closing connection with [scrubbed]; 1
remaining
| 2012-04-13 15:25:39 [debug] Closing connection with [scrubbed]; 0
remaining
| 2012-04-13 15:25:39 [info] Closing all listeners.
| 2012-04-13 15:25:39 [notice] Got SIGINT. Preparing shutdown.
| 2012-04-13 15:25:39 [debug] Beginning normal shutdown.
| 2012-04-13 15:25:39 [debug] Finishing shutdown.
| 2012-04-13 15:25:39 [notice] Exiting.
----------------------------------------------------------------------
Ran 17 tests in 7.213s
FAILED (failures=1)
FAIL: tester.py
}}}
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5619#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs