[tor-bugs] #9576 [Tor]: Tor can't connect to Hidden Services (.onion)

Tor Bug Tracker & Wiki blackhole at torproject.org
Sat Aug 24 08:05:49 UTC 2013


#9576: Tor can't connect to Hidden Services (.onion)
-----------------------------------------------------+----------------------
 Reporter:  randomtoruser                            |          Owner:               
     Type:  defect                                   |         Status:  new          
 Priority:  normal                                   |      Milestone:               
Component:  Tor                                      |        Version:  Tor: 0.2.3.25
 Keywords:  tor,vidalia,backtrack,5r3,error,connect  |         Parent:               
   Points:                                           |   Actualpoints:               
-----------------------------------------------------+----------------------
 Hello, I've been trying to get Tor to work when connecting to Hidden
 services.

 Tor can connect to normal (HTTP/HTTPS) sites perfectly fine, and
 "check.torproject.org" says that my tor is upto date and that I'm using
 Tor, but I can't connect to .onion sites.

 Here's the message log.
 Aug 24 17:43:58.626 [Notice] Tor v0.2.3.25 (git-17c24b3118224d65) running
 on Linux.
 Aug 24 17:43:58.627 [Notice] Tor can't help you if you use it wrong! Learn
 how to be safe at https://www.torproject.org/download/download#warning
 Aug 24 17:43:58.628 [Notice] Read configuration file "/programs/tor-
 browser_en-US/App/../Data/Tor/torrc".
 Aug 24 17:44:02.262 [Notice] Initialized libevent version 2.0.21-stable
 using method epoll (with changelist). Good.
 Aug 24 17:44:02.263 [Notice] Opening Socks listener on 127.0.0.1:9150
 Aug 24 17:44:02.263 [Notice] Opening Control listener on 127.0.0.1:9151
 Aug 24 17:44:02.263 [Notice] Parsing GEOIP file ./Data/Tor/geoip.
 Aug 24 17:44:02.264 [Warning] You are running Tor as root. You don't need
 to, and you probably shouldn't.
 Aug 24 17:44:02.264 [Notice] No AES engine found; using AES_* functions.
 Aug 24 17:44:02.264 [Notice] This OpenSSL has a good implementation of
 counter mode; using it.
 Aug 24 17:44:02.265 [Notice] OpenSSL OpenSSL 1.0.0k 5 Feb 2013 looks like
 version 0.9.8m or later; I will try SSL_OP to enable renegotiation
 Aug 24 17:44:02.265 [Notice] Reloaded microdescriptor cache.  Found 4205
 descriptors.
 Aug 24 17:44:02.266 [Notice] We now have enough directory information to
 build circuits.
 Aug 24 17:44:02.266 [Notice] Bootstrapped 80%: Connecting to the Tor
 network.
 Aug 24 17:44:02.266 [Notice] New control connection opened.
 Aug 24 17:44:02.267 [Notice] Heartbeat: Tor's uptime is 0:00 hours, with 1
 circuits open. I've sent 0 kB and received 0 kB.
 Aug 24 17:44:02.443 [Notice] Bootstrapped 85%: Finishing handshake with
 first hop.
 Aug 24 17:44:04.481 [Notice] Bootstrapped 90%: Establishing a Tor circuit.
 Aug 24 17:44:11.464 [Notice] Tor has successfully opened a circuit. Looks
 like client functionality is working.
 Aug 24 17:44:11.464 [Notice] Bootstrapped 100%: Done.
 Aug 24 17:49:36.420 [Notice] Closing stream for '[scrubbed].onion': hidden
 service is unavailable (try again later).
 Aug 24 17:50:41.310 [Notice] Closing stream for '[scrubbed].onion': hidden
 service is unavailable (try again later).


 I am running Backtrack5R3, "tor-browser-gnu-linux-i686-2.3.25-12-dev-en-
 US" is the .tar.gz filename, latest version for GNU/linux.
 I haven't created another account for normal usage (non-root), so I've
 just commented out the anti-root part in the "start-tor-browser"

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/9576>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list