Sorry, I must update this: The authorities bootstrap to 100%, relays and client are stuck with 80% (sometimes reach 85%). Right now there are even less available nodes and bandwidth showing up in the logs. This changes between runs but never to more promising numbers. There should be 8 nodes in total so it's kind of strange that only 2 seem to be available in this relay. I use a bash script that manages all the VMs. It kills Tor on all machines, then waits for 5 seconds just to be sure (ShutdownWaitLength 0), then removes all cached, old logs, the state file, ... and some more stuff on the authorities (see below). ssh auth01 rm /var/lib/tor/cached* ssh auth01 rm /var/lib/tor/*.log ssh auth01 rm /var/lib/tor/state
ssh auth01 rm -r /var/lib/tor/router-stability ssh auth01 rm -r /var/lib/tor/sr-state ssh auth01 rm -r /var/lib/tor/v3-status-votes ssh auth01 rm -r /var/lib/tor/diff-cache wget http://authip:7000/tor/server/all which should be the cached-descriptors.new file on the authority (which also means it gets deleted on each new startup and must be fresh). In this file I see all the fingerprints that are supposed to be there. It's also possible to connect to the client's control port and manually build circuits to all relays that should be there. This is an indicator that the client knows the relays (using a fingerprint that is not in the consensus would not work). Again, guards also show up in the state files of the relays Guard in=default rsa_id=C122CBB79DC660621E352D401AD7F781F8F6D62D nickname=relay03 sampled_on=2019-02-07T16:24:21 sampled_by=0.3.5.7 listed=1 Guard in=default rsa_id=2B74825BE33752B21D17713F88D101F3BADC79BC nickname=relay06 sampled_on=2019-02-03T22:16:29 sampled_by=0.3.5.7 listed=1 Guard in=default rsa_id=E4B1152CDF0E5FE697A3E916716FC363A2A0ACF3 nickname=relay07 sampled_on=2019-02-12T18:51:00 sampled_by=0.3.5.7 listed=1 Guard in=default rsa_id=911EDA6CB639AAE955517F02AA4D651E0F7F6EFD nickname=relay02 sampled_on=2019-02-11T22:58:28 sampled_by=0.3.5.7 listed=1 Guard in=default rsa_id=8E574F0C428D235782061F44B2D20A66E4336993 nickname=relay05 sampled_on=2019-02-01T17:46:05 sampled_by=0.3.5.7 listed=1 The dates are still old, but I delete all states in the big cleanup procedure. Are there some more old caches I need to remove, where does the date information come from? I think it's a bug somewhere in the setup but I just can't find it :( Questions are: Why does the client know all the relays' fingerprints but the network still has problems finishing the bootstrapping and building a complete circuit? Are there any other things I should look into and check to understand the problem?
|
Attachment:
pEpkey.asc
Description: application/pgp-keys
_______________________________________________ tor-dev mailing list tor-dev@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev