[tor-bugs] #3769 [Tor Relay]: Bufferevent-based server sometimes succeeds, sometimes fails.

Tor Bug Tracker & Wiki torproject-admin at torproject.org
Fri Aug 19 22:34:40 UTC 2011


#3769: Bufferevent-based server sometimes succeeds, sometimes fails.
-----------------------+----------------------------------------------------
 Reporter:  nickm      |          Owner:                    
     Type:  defect     |         Status:  new               
 Priority:  major      |      Milestone:  Tor: 0.2.3.x-final
Component:  Tor Relay  |        Version:                    
 Keywords:             |         Parent:  #3561             
   Points:             |   Actualpoints:                    
-----------------------+----------------------------------------------------
 Sebastian reports that his server (debian, tor master, libevent
 patches-2.0) gets lots of "TLS error while handshaking (with bufferevent)
 with [scrubbed]: ssl handshake failure (in SSL
 routines:SSL3_READ_BYTES:SSL3_ST_SR_CERT_A)" warnings.  Those imply that
 (some? all?) connections aren't making it in.

 Additionally, his circuit timeouts seem to increase and increase. Perhaps
 some outgoing connections aren't working.

 So tentatively, I'm going to guess that the situation is: sometimes
 outgoing connections succeed, and sometimes they fail. Sometimes incoming
 connections succeed, and sometimes they fail.

 The first thing to ask is, is that right?  Or was I mistaken when I
 thought that incoming connections work sometimes?

 Second thing to ask is, is there any pattern to which hosts work and which
 don't?  Are hosts in "mostly working" and "mostly not working" classes, or
 does each conn fail more or less at random?  Are the ones that work with
 incoming conns the same as the ones that work with outgoing conns?

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/3769>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list