Tonight my relay 855BC2DABE24C861CD887DB9B2E950424B49FC34 restarted with the following in the log file: Nov 20 19:08:07.000 [notice] Heartbeat: Tor's uptime is 20 days 12:00 hours, with 29939 circuits open. I've sent 46193.23 GB and received 45940.92 GB. Nov 20 19:08:07.000 [notice] Circuit handshake stats since last time: 36379/36379 TAP, 591207/591207 NTor. Nov 20 19:08:07.000 [notice] Since startup we initiated 0 and received 655 v1 connections; initiated 0 and received 191219 v2 connections; initiated 1 and received 191367 v3 connections; initiated 75189 and received 1351289 v4 connections; initiated 147903 and received 1783201 v5 connections. Nov 20 19:08:07.000 [notice] DoS mitigation since startup: 11 circuits killed with too many cells. 3810290 circuits rejected, 67 marked addresses. 349630 connections closed. 7988 single hop clients refused. Nov 21 00:18:01.000 [err] tor_assertion_failed_(): Bug: ../src/core/or/circuitmux_ewma.c:165: TO_EWMA_POL_CIRC_DATA: Assertion pol->magic == 0x761e7747U failed; aborting. (on Tor 0.4.1.6 ) Nov 21 00:18:01.000 [err] Bug: Assertion pol->magic == 0x761e7747U failed in TO_EWMA_POL_CIRC_DATA at ../src/core/or/circuitmux_ewma.c:165: . Stack trace: (on Tor 0.4.1.6 ) Nov 21 00:18:01.000 [err] Bug: /usr/bin/tor(log_backtrace_impl+0x47) [0x55d5e9f968e7] (on Tor 0.4.1.6 ) Nov 21 00:18:01.000 [err] Bug: /usr/bin/tor(tor_assertion_failed_+0x147) [0x55d5e9f919c7] (on Tor 0.4.1.6 ) Nov 21 00:18:01.000 [err] Bug: /usr/bin/tor(+0x8fe84) [0x55d5e9e14e84] (on Tor 0.4.1.6 ) Nov 21 00:18:01.000 [err] Bug: /usr/bin/tor(+0xb839f) [0x55d5e9e3d39f] (on Tor 0.4.1.6 ) Nov 21 00:18:01.000 [err] Bug: /usr/bin/tor(circuit_receive_relay_cell+0x29a) [0x55d5e9e419fa] (on Tor 0.4.1.6 ) Nov 21 00:18:01.000 [err] Bug: /usr/bin/tor(command_process_cell+0x2fc) [0x55d5e9e23a1c] (on Tor 0.4.1.6 ) Nov 21 00:18:01.000 [err] Bug: /usr/bin/tor(channel_tls_handle_cell+0x333) [0x55d5e9e030d3] (on Tor 0.4.1.6 ) Nov 21 00:18:01.000 [err] Bug: /usr/bin/tor(+0xa773f) [0x55d5e9e2c73f] (on Tor 0.4.1.6 ) Nov 21 00:18:01.000 [err] Bug: /usr/bin/tor(connection_handle_read+0x990) [0x55d5e9df0500] (on Tor 0.4.1.6 ) Nov 21 00:18:01.000 [err] Bug: /usr/bin/tor(+0x707ee) [0x55d5e9df57ee] (on Tor 0.4.1.6 ) Nov 21 00:18:01.000 [err] Bug: /usr/lib/x86_64-linux-gnu/libevent-2.0.so.5(event_base_loop+0x6a0) [0x7fb82bb5f5a0] (on Tor 0.4.1.6 ) Nov 21 00:18:01.000 [err] Bug: /usr/bin/tor(do_main_loop+0x105) [0x55d5e9df6b25] (on Tor 0.4.1.6 ) Nov 21 00:18:01.000 [err] Bug: /usr/bin/tor(tor_run_main+0x1225) [0x55d5e9de4545] (on Tor 0.4.1.6 ) Nov 21 00:18:01.000 [err] Bug: /usr/bin/tor(tor_main+0x3a) [0x55d5e9de193a] (on Tor 0.4.1.6 ) Nov 21 00:18:01.000 [err] Bug: /usr/bin/tor(main+0x19) [0x55d5e9de14b9] (on Tor 0.4.1.6 ) Nov 21 00:18:01.000 [err] Bug: /lib/x86_64-linux-gnu/libc.so.6(__libc_start_main+0xf1) [0x7fb82a3b32e1] (on Tor 0.4.1.6 ) Nov 21 00:18:01.000 [err] Bug: /usr/bin/tor(_start+0x2a) [0x55d5e9de150a] (on Tor 0.4.1.6 ) Nov 21 00:18:02.000 [notice] Tor 0.4.1.6 opening log file. Nov 21 00:18:02.605 [notice] We compiled with OpenSSL 101000bf: OpenSSL 1.1.0k 28 May 2019 and we are running with OpenSSL 101000cf: OpenSSL 1.1.0l 10 Sep 2019. These two versions should be binary compatible. Nov 21 00:18:02.606 [notice] Tor 0.4.1.6 running on Linux with Libevent 2.0.21-stable, OpenSSL 1.1.0l, Zlib 1.2.8, Liblzma 5.2.2, and Libzstd 1.1.2. <...> Nov 21 00:18:03.000 [notice] Bootstrapped 0% (starting): Starting Nov 21 00:18:07.000 [warn] Incorrect ed25519 signature(s) Nov 21 00:18:10.000 [notice] Starting with guard context "default" <...>
Should I open a ticket?