Here is tors log:
Mar 29 17:00:46.000 [notice] Tor 0.4.2.7 opening new log file. Mar 29 17:00:46.899 [notice] Tor 0.4.2.7 running on Linux with Libevent 2.1.8-stable, OpenSSL 1.1.1d, Zlib 1.2.11, Liblzma 5.2.4, and Libzstd 1.3.8. Mar 29 17:00:46.900 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning Mar 29 17:00:46.901 [notice] Read configuration file "/etc/tor/torrc". Mar 29 17:00:46.902 [notice] Your ContactInfo config option is not set. Please consider setting it, so we can contact you if your server is misconfigured or something else goes wrong. Mar 29 17:00:46.902 [notice] Based on detected system memory, MaxMemInQueues is set to 6127 MB. You can override this by setting MaxMemInQueues by hand. Mar 29 17:00:46.905 [notice] Opening Control listener on 127.0.0.1:9050 Mar 29 17:00:46.905 [notice] Opened Control listener on 127.0.0.1:9050 Mar 29 17:00:46.906 [notice] Opening OR listener on 0.0.0.0:80 Mar 29 17:00:46.907 [notice] Opened OR listener on 0.0.0.0:80 Mar 29 17:00:46.908 [notice] Opening Extended OR listener on 127.0.0.1:0 Mar 29 17:00:46.916 [notice] Extended OR listener listening on port 50727. Mar 29 17:00:46.917 [notice] Opened Extended OR listener on 127.0.0.1:50727 Mar 29 17:00:46.000 [notice] Not disabling debugger attaching for unprivileged users. Mar 29 17:00:46.000 [notice] Parsing GEOIP IPv4 file /usr/share/tor/geoip. Mar 29 17:00:47.000 [notice] Parsing GEOIP IPv6 file /usr/share/tor/geoip6. Mar 29 17:00:47.000 [notice] Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now. Mar 29 17:00:47.000 [warn] You are running Tor as root. You don't need to, and you probably shouldn't. Mar 29 17:00:47.000 [notice] You are running a new relay. Thanks for helping the Tor network! If you wish to know what will happen in the upcoming weeks regarding its usage, have a look at https://blog.torproject.org/blog/lifecycle-of-a$Mar 29 17:00:47.000 [notice] It looks like I need to generate and sign a new medium-term signing key, because I don't have one. To do that, I need to load (or create) the permanent master identity key. If the master identity key was not$Mar 29 17:00:47.000 [notice] Your Tor server's identity key fingerprint is 'torland 7DBC1875771B54F4FE40EB376460EF557EE9E884' Mar 29 17:00:47.000 [notice] Your Tor bridge's hashed identity key fingerprint is 'torland 780F4E3ADBC574A63CE8155C0911E0A06BA3331D' Mar 29 17:00:47.000 [notice] Bootstrapped 0% (starting): Starting Mar 29 17:00:48.000 [notice] Starting with guard context "default" Mar 29 17:00:48.000 [notice] Registered server transport 'obfs4' at '[::]:443' Mar 29 17:00:50.000 [notice] Bootstrapped 5% (conn): Connecting to a relay Mar 29 17:00:51.000 [notice] Bootstrapped 10% (conn_done): Connected to a relay
Mar 29 17:00:51.000 [notice] Bootstrapped 14% (handshake): Handshaking with a relay
Mar 29 17:00:51.000 [notice] Bootstrapped 15% (handshake_done): Handshake with a relay done Mar 29 17:00:51.000 [notice] Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits Mar 29 17:00:51.000 [notice] Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits Mar 29 17:00:51.000 [notice] Bootstrapped 95% (circuit_create): Establishing a Tor circuit Mar 29 17:00:52.000 [notice] Guessed our IP address as 24.176.251.66 (source: 107.189.10.156). Mar 29 17:00:53.000 [notice] Bootstrapped 100% (done): Done Mar 29 17:00:53.000 [notice] Now checking whether ORPort 24.176.251.66:80 is reachable... (this may take up to 20 minutes -- look for log messages indicating success) Mar 29 17:00:54.000 [notice] Self-testing indicates your ORPort is reachable from the outside. Excellent. Publishing server descriptor. Mar 29 17:01:00.000 [notice] Performing bandwidth self-test...done. Mar 29 17:01:42.000 [notice] Catching signal TERM, exiting cleanly. Mar 29 17:05:13.000 [notice] Tor 0.4.2.7 opening log file. Mar 29 17:05:13.906 [notice] Tor 0.4.2.7 running on Linux with Libevent 2.1.8-stable, OpenSSL 1.1.1d, Zlib 1.2.11, Liblzma 5.2.4, and Libzstd 1.3.8. Mar 29 17:05:13.907 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning Mar 29 17:05:13.909 [notice] Read configuration file "/etc/tor/torrc". Mar 29 17:05:13.910 [notice] Based on detected system memory, MaxMemInQueues is set to 6127 MB. You can override this by setting MaxMemInQueues by hand. Mar 29 17:05:13.912 [notice] Opening Control listener on 127.0.0.1:9050 Mar 29 17:05:13.912 [notice] Opened Control listener on 127.0.0.1:9050 Mar 29 17:05:13.913 [notice] Opening OR listener on 0.0.0.0:80 Mar 29 17:05:13.913 [notice] Opened OR listener on 0.0.0.0:80 Mar 29 17:05:13.914 [notice] Opening Extended OR listener on 127.0.0.1:0 Mar 29 17:05:13.917 [notice] Extended OR listener listening on port 50756. Mar 29 17:05:13.917 [notice] Opened Extended OR listener on 127.0.0.1:50756 Mar 29 17:05:13.000 [notice] Not disabling debugger attaching for unprivileged users. Mar 29 17:05:13.000 [notice] Parsing GEOIP IPv4 file /usr/share/tor/geoip. Mar 29 17:05:14.000 [notice] Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Mar 29 17:05:15.000 [notice] Starting with guard context "default" Mar 29 17:05:15.000 [notice] Registered server transport 'obfs4' at '[::]:443' Mar 29 17:05:16.000 [notice] Bootstrapped 5% (conn): Connecting to a relay Mar 29 17:05:16.000 [notice] Bootstrapped 10% (conn_done): Connected to a relay Mar 29 17:05:16.000 [notice] Bootstrapped 14% (handshake): Handshaking with a relay Mar 29 17:05:16.000 [notice] Bootstrapped 15% (handshake_done): Handshake with a relay done Mar 29 17:05:16.000 [notice] Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits Mar 29 17:05:17.000 [notice] Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits Mar 29 17:05:17.000 [notice] Bootstrapped 95% (circuit_create): Establishing a Tor circuit Mar 29 17:05:18.000 [notice] Bootstrapped 100% (done): Done Mar 29 17:05:19.000 [notice] Guessed our IP address as 24.176.251.66 (source: 188.165.220.34). Mar 29 17:05:21.000 [notice] Self-testing indicates your ORPort is reachable from the outside. Excellent. Publishing server descriptor. Mar 29 17:05:26.000 [notice] Performing bandwidth self-test...done. Mar 29 17:22:25.000 [notice] Received reload signal (hup). Reloading config and resetting internal state. Mar 29 17:22:25.000 [notice] Read configuration file "/etc/tor/torrc". Mar 29 17:22:25.000 [notice] Tor 0.4.2.7 opening log file. Mar 29 17:22:25.000 [warn] Pluggable Transport process terminated with status code 1 Mar 29 17:45:08.000 [notice] Tor 0.4.2.7 opening log file. Mar 29 17:45:08.947 [notice] Tor 0.4.2.7 running on Linux with Libevent 2.1.8-stable, OpenSSL 1.1.1d, Zlib 1.2.11, Liblzma 5.2.4, and Libzstd 1.3.8. Mar 29 17:45:08.948 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning
Mar 29 17:45:08.949 [notice] Read configuration file "/etc/tor/torrc".
Mar 29 17:45:08.951 [notice] Based on detected system memory, MaxMemInQueues is set to 6127 MB. You can override this by setting MaxMemInQueues by hand. Mar 29 17:45:08.952 [notice] Opening Control listener on 127.0.0.1:9050 Mar 29 17:45:08.952 [notice] Opened Control listener on 127.0.0.1:9050 Mar 29 17:45:08.953 [notice] Opening OR listener on 0.0.0.0:80 Mar 29 17:45:08.954 [notice] Opened OR listener on 0.0.0.0:80 Mar 29 17:45:08.954 [notice] Opening Extended OR listener on 127.0.0.1:0 Mar 29 17:45:08.955 [notice] Extended OR listener listening on port 50889.
Mar 29 17:45:08.956 [notice] Opened Extended OR listener on 127.0.0.1:50889
Mar 29 17:45:08.000 [notice] Not disabling debugger attaching for unprivileged users. Mar 29 17:45:08.000 [warn] It looks like another Tor process is running with the same data directory. Waiting 5 seconds to see if it goes away. Mar 29 17:45:13.000 [err] No, it's still there. Exiting. Mar 29 17:45:13.000 [err] set_options(): Bug: Acting on config options left us in a broken state. Dying. (on Tor 0.4.2.7 ) Mar 29 17:45:13.000 [err] Reading config failed--see warnings above. Mar 29 19:55:41.000 [notice] Catching signal TERM, exiting cleanly. Mar 29 20:05:32.000 [notice] Tor 0.4.2.7 opening log file. Mar 29 20:05:32.499 [notice] Tor 0.4.2.7 running on Linux with Libevent 2.1.8-stable, OpenSSL 1.1.1d, Zlib 1.2.11, Liblzma 5.2.4, and Libzstd 1.3.8. Mar 29 20:05:32.500 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning Mar 29 20:05:32.501 [notice] Read configuration file "/etc/tor/torrc". Mar 29 20:05:32.502 [notice] Based on detected system memory, MaxMemInQueues is set to 6127 MB. You can override this by setting MaxMemInQueues by hand. Mar 29 20:05:32.503 [notice] Opening Control listener on 127.0.0.1:9050 Mar 29 20:05:32.503 [notice] Opened Control listener on 127.0.0.1:9050 Mar 29 20:05:32.504 [notice] Opening OR listener on 0.0.0.0:80 Mar 29 20:05:32.504 [notice] Opened OR listener on 0.0.0.0:80 Mar 29 20:05:32.504 [notice] Opening Extended OR listener on 127.0.0.1:0 Mar 29 20:05:32.505 [notice] Extended OR listener listening on port 51493. Mar 29 20:05:32.507 [notice] Opened Extended OR listener on 127.0.0.1:51493 Mar 29 20:05:32.000 [notice] Not disabling debugger attaching for unprivileged users. Mar 29 20:05:32.000 [notice] Parsing GEOIP IPv4 file /usr/share/tor/geoip. Mar 29 20:05:32.000 [notice] Parsing GEOIP IPv6 file /usr/share/tor/geoip6. Mar 29 20:05:33.000 [notice] Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now. Mar 29 20:05:33.000 [warn] You are running Tor as root. You don't need to, and you probably shouldn't. Mar 29 20:05:33.000 [notice] Your Tor server's identity key fingerprint is 'torland 7DBC1875771B54F4FE40EB376460EF557EE9E884' Mar 29 20:05:33.000 [notice] Your Tor bridge's hashed identity key fingerprint is 'torland 780F4E3ADBC574A63CE8155C0911E0A06BA3331D' Mar 29 20:05:33.000 [notice] Bootstrapped 0% (starting): Starting Mar 29 20:05:37.000 [notice] Starting with guard context "default" Mar 29 20:05:37.000 [notice] Registered server transport 'obfs4' at '[::]:443' Mar 29 20:05:38.000 [notice] Bootstrapped 5% (conn): Connecting to a relay
Mar 29 20:16:42.000 [warn] You are running Tor as root. You don't need to, and you probably shouldn't.
Mar 29 20:16:42.000 [notice] Your Tor server's identity key fingerprint is 'torland 7DBC1875771B54F4FE40EB376460EF557EE9E884'
Mar 29 20:16:42.000 [notice] Your Tor bridge's hashed identity key fingerprint is 'torland 780F4E3ADBC574A63CE8155C0911E0A06BA3331D' Mar 29 20:16:42.000 [notice] Bootstrapped 0% (starting): Starting Mar 29 20:16:46.000 [notice] Starting with guard context "default" Mar 29 20:16:46.000 [notice] Registered server transport 'obfs4' at '[::]:443' Mar 29 20:16:47.000 [notice] Bootstrapped 5% (conn): Connecting to a relay Mar 29 20:16:47.000 [notice] Bootstrapped 10% (conn_done): Connected to a relay Mar 29 20:16:47.000 [notice] Bootstrapped 14% (handshake): Handshaking with a relay Mar 29 20:16:48.000 [notice] Bootstrapped 15% (handshake_done): Handshake with a relay done Mar 29 20:16:48.000 [notice] Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits Mar 29 20:16:48.000 [notice] Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits Mar 29 20:16:48.000 [notice] Bootstrapped 95% (circuit_create): Establishing a Tor circuit Mar 29 20:16:48.000 [notice] Guessed our IP address as 24.176.251.66 (source: 188.165.220.34). Mar 29 20:16:49.000 [notice] Bootstrapped 100% (done): Done Mar 29 20:16:49.000 [notice] Now checking whether ORPort 24.176.251.66:80 is reachable... (this may take up to 20 minutes -- look for log messages indicating success) Mar 29 20:16:51.000 [notice] Self-testing indicates your ORPort is reachable from the outside. Excellent. Publishing server descriptor. Mar 29 20:18:06.000 [notice] Performing bandwidth self-test...done. Mar 29 20:20:27.000 [notice] Tor 0.4.2.7 opening log file. Mar 29 20:20:27.693 [notice] Tor 0.4.2.7 running on Linux with Libevent 2.1.8-stable, OpenSSL 1.1.1d, Zlib 1.2.11, Liblzma 5.2.4, and Libzstd 1.3.8. Mar 29 20:20:27.694 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning Mar 29 20:20:27.696 [notice] Read configuration file "/etc/tor/torrc". Mar 29 20:20:27.697 [notice] Based on detected system memory, MaxMemInQueues is set to 6127 MB. You can override this by setting MaxMemInQueues by hand. Mar 29 20:20:27.698 [notice] Opening Control listener on 127.0.0.1:9050 Mar 29 20:20:27.699 [notice] Opened Control listener on 127.0.0.1:9050 Mar 29 20:20:27.699 [notice] Opening OR listener on 0.0.0.0:80 Mar 29 20:20:27.700 [notice] Opened OR listener on 0.0.0.0:80 Mar 29 20:20:27.701 [notice] Opening Extended OR listener on 127.0.0.1:0 Mar 29 20:20:27.701 [notice] Extended OR listener listening on port 51834. Mar 29 20:20:27.702 [notice] Opened Extended OR listener on 127.0.0.1:51834 Mar 29 20:20:27.000 [notice] Not disabling debugger attaching for unprivileged users. Mar 29 20:20:27.000 [warn] It looks like another Tor process is running with the same data directory. Waiting 5 seconds to see if it goes away. Mar 29 20:20:32.000 [err] No, it's still there. Exiting. Mar 29 20:20:32.000 [err] set_options(): Bug: Acting on config options left us in a broken state. Dying. (on Tor 0.4.2.7 ) Mar 29 20:20:32.000 [err] Reading config failed--see warnings above. Mar 29 22:13:39.000 [notice] Catching signal TERM, exiting cleanly. Mar 29 22:14:55.000 [notice] Tor 0.4.2.7 opening log file. Mar 29 22:14:55.638 [notice] Tor 0.4.2.7 running on Linux with Libevent 2.1.8-stable, OpenSSL 1.1.1d, Zlib 1.2.11, Liblzma 5.2.4, and Libzstd 1.3.8. Mar 29 22:14:55.639 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning Mar 29 22:14:55.639 [notice] Read configuration file "/etc/tor/torrc". Mar 29 22:14:55.641 [notice] Based on detected system memory, MaxMemInQueues is set to 6127 MB. You can override this by setting MaxMemInQueues by hand. Mar 29 22:14:55.641 [notice] Opening Control listener on 127.0.0.1:9050 Mar 29 22:14:55.642 [notice] Opened Control listener on 127.0.0.1:9050 Mar 29 22:14:55.642 [notice] Opening OR listener on 0.0.0.0:80 Mar 29 22:14:55.642 [notice] Opened OR listener on 0.0.0.0:80 Mar 29 22:14:55.643 [notice] Opening Extended OR listener on 127.0.0.1:0 Mar 29 22:14:55.644 [notice] Extended OR listener listening on port 55133. Mar 29 22:14:55.645 [notice] Opened Extended OR listener on 127.0.0.1:55133 Mar 29 22:14:55.000 [notice] Not disabling debugger attaching for unprivileged users. Mar 29 22:14:55.000 [notice] Parsing GEOIP IPv4 file /usr/share/tor/geoip. Mar 29 22:14:55.000 [notice] Parsing GEOIP IPv6 file /usr/share/tor/geoip6. Mar 29 22:14:56.000 [notice] Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now. Mar 29 22:14:56.000 [warn] You are running Tor as root. You don't need to, and you probably shouldn't.
Mar 29 22:14:56.000 [notice] Your Tor server's identity key fingerprint is 'torland 7DBC1875771B54F4FE40EB376460EF557EE9E884' Mar 29 22:14:56.000 [notice] Your Tor bridge's hashed identity key fingerprint is 'torland 780F4E3ADBC574A63CE8155C0911E0A06BA3331D' Mar 29 22:14:56.000 [notice] Bootstrapped 0% (starting): Starting Mar 29 22:15:00.000 [notice] Starting with guard context "default" Mar 29 22:15:00.000 [notice] Registered server transport 'obfs4' at '[::]:443'
^G Get Help ^O Write Out ^W Where Is ^K Cut Text ^J Justify ^C Cur Pos M-U Undo M-A Mark Text M-] To Bracket M-Q Previous ^B Back ^Left Prev Word ^A Home ^X Exit ^R Read File ^\ Replace ^U Uncut Text
Mar 29 22:15:01.000 [notice] Bootstrapped 5% (conn): Connecting to a relay Mar 29 22:15:01.000 [notice] Bootstrapped 10% (conn_done): Connected to a relay
Mar 29 22:15:01.000 [notice] Bootstrapped 14% (handshake): Handshaking with a relay
Mar 29 22:15:01.000 [notice] Bootstrapped 15% (handshake_done): Handshake with a relay done Mar 29 22:15:01.000 [notice] Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits Mar 29 22:15:01.000 [notice] Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits Mar 29 22:15:01.000 [notice] Bootstrapped 95% (circuit_create): Establishing a Tor circuit Mar 29 22:15:02.000 [notice] Guessed our IP address as 24.176.251.66 (source: 188.165.220.34). Mar 29 22:15:03.000 [notice] Bootstrapped 100% (done): Done Mar 29 22:15:03.000 [notice] Now checking whether ORPort 24.176.251.66:80 is reachable... (this may take up to 20 minutes -- look for log messages indicating success) Mar 29 22:15:05.000 [notice] Self-testing indicates your ORPort is reachable from the outside. Excellent. Publishing server descriptor. Mar 29 22:16:13.000 [notice] Performing bandwidth self-test...done.
I might have copied some of the log twice. Sorry about that.
After installing unattended upgrades, here is what is in my 50unatennded-upgrades file, as torproject.org steps for configuring updates for tor recommended. Thank you, I wonder why the upgrades are not working.
--Keifer
https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail&utm_term=icon Virus-free. www.avast.com https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail&utm_term=link <#DAB4FAD8-2DD7-40BB-A1B8-4E2AA1F9FDF2>
On Sun, Mar 29, 2020 at 9:00 PM teor teor@riseup.net wrote:
Hi,
On 30 Mar 2020, at 13:45, Keifer Bly keifer.bly@gmail.com wrote:
So I am switching the OBFS4 bridge I was running via Tor Expert Bundle on Windows 10 over to running it via Debian app for Windows 10.
This app is on the Windows store at https://www.microsoft.com/en-us/p/debian/9msvkqc78pk6?activetab=pivot:overvi...
Essentially, it is an app that lets you run Linux packages on Windows. I made the switch so that I could keep tor and obfs4 up to date using unattended upgrades.
However, for some odd reason, despite the fact I backed up the tor identity keys and pasted them into the keys directory when I moved over, the bridge is still generating new keys on startup. I copied the key files from my expert bundle bridge to
/var/lib/tor/keys directory in the Linu terminal, I copied all of the files. It’s a bridge so no big deal I guess, but wonder why that is happening.
Please show us the tor logs.
https://metrics.torproject.org/rs.html#details/780F4E3ADBC574A63CE8155C0911E...
And, I tested to see of unattended upgrades was working correctly after configuring it with these instructions:
https://trac.torproject.org/projects/tor/wiki/TorRelayGuide/DebianUbuntuUpda...
And got this the attached photo as a result, does this mean it is keeping tor and obfs4 up to date? tor update test.PNG https://drive.google.com/file/d/1c5TinBlApx5YuObiwt8pkl9w_F74O0JL/view?usp=drive_web
Please use a pastebin for logs, or paste the text in your email. https://paste.debian.net is good.
Looks like updates aren't working, do you see the line that says: Sanity check failed
T _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays