[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #22863 [- Select a component]: Bridge relay don't work on IPv6
#22863: Bridge relay don't work on IPv6
--------------------------------------+--------------------------
Reporter: mr-burns | Owner:
Type: defect | Status: new
Priority: Medium | Milestone:
Component: - Select a component | Version: Tor: 0.3.0.9
Severity: Normal | Keywords:
Actual Points: | Parent ID:
Points: | Reviewer:
Sponsor: |
--------------------------------------+--------------------------
tor will listen on the port, but no self test will happens.
The self test will only done for the IPv4 port.
Here the log:
Jul 09 10:56:54 foo.foo.foo systemd[1]: Starting Anonymizing overlay
network for TCP...
Jul 09 10:56:54 foo.foo.foo tor[23178]: Jul 09 10:56:54.893 [notice] Tor
0.3.0.9 (git-22b3bf094e327093) running on Linux with Libevent
2.0.21-stable, OpenSS
Jul 09 10:56:54 foo.foo.foo tor[23178]: Jul 09 10:56:54.893 [notice] Tor
can't help you if you use it wrong! Learn how to be safe at
https://www.torproject.
Jul 09 10:56:54 foo.foo.foo tor[23178]: Jul 09 10:56:54.945 [notice] Read
configuration file "/usr/share/tor/defaults-torrc".
Jul 09 10:56:54 foo.foo.foo tor[23178]: Jul 09 10:56:54.946 [notice] Read
configuration file "/etc/tor/torrc".
Jul 09 10:56:54 foo.foo.foo tor[23178]: Jul 09 10:56:54.951 [notice] Based
on detected system memory, MaxMemInQueues is set to 2964 MB. You can
override thi
Jul 09 10:56:54 foo.foo.foo tor[23178]: Configuration was valid
Jul 09 10:56:54 foo.foo.foo systemd[1]: Started Anonymizing overlay
network for TCP.
Jul 09 10:56:55 foo.foo.foo Tor[23179]: OpenSSL version from headers does
not match the version we're running with. If you get weird crashes, that
might be
Jul 09 10:56:55 foo.foo.foo tor[23179]: Jul 09 10:56:55.111 [notice] Tor
0.3.0.9 (git-22b3bf094e327093) running on Linux with Libevent
2.0.21-stable, OpenSS
Jul 09 10:56:55 foo.foo.foo tor[23179]: Jul 09 10:56:55.112 [notice] Tor
can't help you if you use it wrong! Learn how to be safe at
https://www.torproject.
Jul 09 10:56:55 foo.foo.foo tor[23179]: Jul 09 10:56:55.112 [notice] Read
configuration file "/usr/share/tor/defaults-torrc".
Jul 09 10:56:55 foo.foo.foo tor[23179]: Jul 09 10:56:55.112 [notice] Read
configuration file "/etc/tor/torrc".
Jul 09 10:56:55 foo.foo.foo tor[23179]: Jul 09 10:56:55.117 [notice] Based
on detected system memory, MaxMemInQueues is set to 2964 MB. You can
override thi
Jul 09 10:56:55 foo.foo.foo tor[23179]: Jul 09 10:56:55.118 [notice]
Opening OR listener on [IPv6Address]:Port
Jul 09 10:56:55 foo.foo.foo tor[23179]: Jul 09 10:56:55.118 [notice]
Opening OR listener on IPv4Address:Port
Jul 09 10:56:55 foo.foo.foo Tor[23179]: Tor 0.3.0.9 (git-22b3bf094e327093)
running on Linux with Libevent 2.0.21-stable, OpenSSL 1.0.1e-fips and Zlib
1.2.7.
Jul 09 10:56:55 foo.foo.foo Tor[23179]: Tor can't help you if you use it
wrong! Learn how to be safe at
https://www.torproject.org/download/download#warning
Jul 09 10:56:55 foo.foo.foo Tor[23179]: Read configuration file
"/usr/share/tor/defaults-torrc".
Jul 09 10:56:55 foo.foo.foo Tor[23179]: Read configuration file
"/etc/tor/torrc".
Jul 09 10:56:55 foo.foo.foo Tor[23179]: Based on detected system memory,
MaxMemInQueues is set to 2964 MB. You can override this by setting
MaxMemInQueues b
Jul 09 10:56:55 foo.foo.foo Tor[23179]: Opening OR listener on
[IPv6Address]:Port
Jul 09 10:56:55 foo.foo.foo Tor[23179]: Opening OR listener on
IPv4Address:Port
Jul 09 10:56:55 foo.foo.foo Tor[23179]: Parsing GEOIP IPv4 file
/usr/share/tor/geoip.
Jul 09 10:56:55 foo.foo.foo Tor[23179]: Parsing GEOIP IPv6 file
/usr/share/tor/geoip6.
Jul 09 10:56:55 foo.foo.foo Tor[23179]: Configured to measure statistics.
Look for the *-stats files that will first be written to the data
directory in 24
Jul 09 10:56:55 foo.foo.foo Tor[23179]: We were built to run on a 64-bit
CPU, with OpenSSL 1.0.1 or later, but with a version of OpenSSL that
apparently lac
Jul 09 10:56:56 foo.foo.foo Tor[23179]: Your Tor server's identity key
fingerprint is 'XXXXXX'
Jul 09 10:56:56 foo.foo.foo Tor[23179]: Your Tor bridge's hashed identity
key fingerprint is 'XXXXXXXX'
Jul 09 10:56:56 foo.foo.foo Tor[23179]: Bootstrapped 0%: Starting
Jul 09 10:57:10 foo.foo.foo Tor[23179]: Starting with guard context
"default"
Jul 09 10:57:10 foo.foo.foo Tor[23179]: Bootstrapped 80%: Connecting to
the Tor network
Jul 09 10:57:10 foo.foo.foo Tor[23179]: Opening Control listener on
/run/tor/control
Jul 09 10:57:10 foo.foo.foo Tor[23179]: Bootstrapped 85%: Finishing
handshake with first hop
Jul 09 10:57:11 foo.foo.foo Tor[23179]: Bootstrapped 90%: Establishing a
Tor circuit
Jul 09 10:57:11 foo.foo.foo Tor[23179]: Tor has successfully opened a
circuit. Looks like client functionality is working.
Jul 09 10:57:11 foo.foo.foo Tor[23179]: Bootstrapped 100%: Done
Jul 09 10:57:11 foo.foo.foo Tor[23179]: Now checking whether ORPort
IPv4Address:Port is reachable... (this may take up to 20 minutes -- look
for log mess
Jul 09 10:57:11 foo.foo.foo Tor[23179]: Self-testing indicates your ORPort
is reachable from the outside. Excellent. Publishing server descriptor.
Jul 09 10:57:12 foo.foo.foo Tor[23179]: Performing bandwidth self-
test...done.
Jul 09 16:57:10 foo.foo.foo Tor[23179]: Heartbeat: Tor's uptime is 5:59
hours, with 2 circuits open. I've sent 1.31 MB and received 8.09 MB.
Jul 09 16:57:10 foo.foo.foo Tor[23179]: Heartbeat: In the last 6 hours, I
have seen 0 unique clients.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/22863>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs