[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #8093 [Tor]: Jan 29 23:32:20.066 [Warning] Bug/attack: unexpected sendme cell from client. Closing circ.
#8093: Jan 29 23:32:20.066 [Warning] Bug/attack: unexpected sendme cell from
client. Closing circ.
----------------------+-----------------------------------------------------
Reporter: Gravitas | Owner:
Type: defect | Status: new
Priority: normal | Milestone: Tor: 0.2.4.x-final
Component: Tor | Version: Tor: 0.2.4.9-alpha
Keywords: | Parent:
Points: | Actualpoints:
----------------------+-----------------------------------------------------
Comment(by Gravitas):
Interesting: I am now running PeerBlock v1.1 on my Windows server, and the
frequency of these errors has dramatically dropped. This is the complete
log after running Tor for 3.5 hours (normally, I would expect a warning
every minute or so):
---start log---
Jan 30 12:12:29.789 [Notice] Tor v0.2.4.9-alpha (git-23dd7c901287d7d8)
running on Windows Vista [server] with Libevent 2.0.21-stable and OpenSSL
1.0.1c.
Jan 30 12:12:29.789 [Notice] Tor can't help you if you use it wrong! Learn
how to be safe at https://www.torproject.org/download/download#warning
Jan 30 12:12:29.789 [Notice] This version is not a stable Tor release.
Expect more bugs than usual.
Jan 30 12:12:30.008 [Notice] Read configuration file
"C:\Users\Administrator\AppData\Local\Vidalia\torrc".
Jan 30 12:12:30.226 [Notice] Opening Socks listener on 127.0.0.1:9050
Jan 30 12:12:30.226 [Notice] Opening Control listener on 127.0.0.1:9051
Jan 30 12:12:30.226 [Notice] Opening OR listener on 0.0.0.0:443
Jan 30 12:12:30.226 [Notice] Opening Directory listener on 0.0.0.0:9030
Jan 30 12:12:55.701 [Notice] Parsing GEOIP IPv4 file
C:\Users\Administrator\AppData\Roaming\tor\geoip.
Jan 30 12:12:55.701 [Notice] Your Tor server's identity key fingerprint is
'programmercpp C3627DBECAF75618817C27DFB65DBF0C4CA52FA7'
Jan 30 12:12:55.701 [Notice] We now have enough directory information to
build circuits.
Jan 30 12:12:55.701 [Notice] Bootstrapped 80%: Connecting to the Tor
network.
Jan 30 12:12:55.701 [Notice] New control connection opened.
Jan 30 12:12:57.074 [Notice] Bootstrapped 85%: Finishing handshake with
first hop.
Jan 30 12:12:57.604 [Notice] Bootstrapped 90%: Establishing a Tor circuit.
Jan 30 12:12:57.713 [Warning] Your Guard
OnionSoup=08D22679377C9EF701193C1F199D9B0B3F1AEE3C is failing a very large
amount of circuits. Most likely this means the Tor network is overloaded,
but it could also mean an attack against you or the potentially the guard
itself. Success counts are 71/154. 71 circuits completed, 0 were unusable,
0 collapsed, and 0 timed out. For reference, your timeout cutoff is 60
seconds.
Jan 30 12:13:00.194 [Notice] Tor has successfully opened a circuit. Looks
like client functionality is working.
Jan 30 12:13:00.194 [Notice] Bootstrapped 100%: Done.
Jan 30 12:13:00.194 [Notice] Now checking whether ORPort
213.171.220.40:443 and DirPort 213.171.220.40:9030 are reachable... (this
may take up to 20 minutes -- look for log messages indicating success)
Jan 30 12:13:08.571 [Notice] Self-testing indicates your ORPort is
reachable from the outside. Excellent. Publishing server descriptor.
Jan 30 12:13:09.382 [Notice] Self-testing indicates your DirPort is
reachable from the outside. Excellent.
Jan 30 12:17:07.033 [Notice] Performing bandwidth self-test...done.
Jan 30 13:34:24.725 [Warning] Bug/attack: unexpected sendme cell from
client. Closing circ.
Jan 30 13:41:00.841 [Warning] Bug/attack: unexpected sendme cell from
client. Closing circ.
---end log as of Jan 30 15:55:00.00--
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/8093#comment:5>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs