[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #19926 [Core Tor/Tor]: BUG warning in connection_ap_attach_pending: waiting for rendezvous desc :*
#19926: BUG warning in connection_ap_attach_pending: waiting for rendezvous desc :*
-------------------------------------------------+-------------------------
Reporter: cypherpunks | Owner: dgoulet
Type: defect | Status:
| accepted
Priority: Low | Milestone: Tor:
| unspecified
Component: Core Tor/Tor | Version: Tor:
| 0.2.9.1-alpha
Severity: Normal | Resolution:
Keywords: bug, regression, tor-hs, | Actual Points:
refactoring, easy |
Parent ID: | Points:
Reviewer: | Sponsor:
-------------------------------------------------+-------------------------
Comment (by cypherpunks):
> I'm a bit doubtful that iptables can break the SOCKS requests here
unless it is applied on localhost and the SocksPort... would be a bit
surprising?
I use `iptables` everywhere, but in this particular issue it was tor
browser inside VM (guest OS) connected to system tor running on host
system (host OS). Thus, tor's `SocksPort` is listening on some bridge
interface, which is seen also inside VM (transparent tor proxy is not
used). Connections on this bridge are filtered with `iptables`.
> To hunt down this, it is mostly refactoring at this point to try to hunt
it down.
Well, let us see whether it can be caught after refactoring of tor code...
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/19926#comment:30>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs