[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #9635 [Tor]: Tor clients warn when they use the wrong ntor onion key
#9635: Tor clients warn when they use the wrong ntor onion key
-------------------------+-------------------------------------------------
Reporter: bastik | Owner:
Type: defect | Status: needs_revision
Priority: normal | Milestone: Tor: 0.2.6.x-final
Component: Tor | Version: Tor: unspecified
Resolution: | Keywords: spammy-warnings, tor-bridge
Actual Points: | 026-triaged-1 025-backport nickm-patch
Points: | Parent ID:
-------------------------+-------------------------------------------------
Comment (by engrish):
I compiled openssl and Tor with following command on CentOS 6.6
2.6.32-431.el6.x86_64
{{{
cd ./openssl-1.0.2
./Configure shared enable-ec_nistp_64_gcc_128 linux-x86_64
cd ./tor-0.2.6.2-alpha
./configure --with-openssl-dir=/usr/local/ssl --with-zlib-dir=/lib --with-
libevent-dir=/usr/local/lib
}}}
after a while, I got a warn log when runninng relay
{{{
Jan 29 12:09:51.828 [notice] Tor v0.2.6.2-alpha running on Linux with
Libevent 2.0.22-stable, OpenSSL 1.0.2 and Zlib 1.2
.8.
...
Jan 29 12:11:02.000 [warn] Invalid result from curve25519 handshake: 4
Jan 29 12:11:02.000 [warn] onion_skin_client_handshake failed.
Jan 29 12:11:02.000 [warn] circuit_finish_handshake failed.
Jan 29 12:11:02.000 [warn] connection_edge_process_relay_cell (at origin)
failed.
}}}
In my case, this problem solved with zlib.
{{{
cd ./openssl-1.0.2
./Configure shared zlib enable-ec_nistp_64_gcc_128 linux-x86_64
}}}
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/9635#comment:26>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs