[tor-bugs] #5619 [Obfsproxy]: obfsproxy: test suite failure (EOF)

Tor Bug Tracker & Wiki torproject-admin at torproject.org
Fri Apr 13 15:51:27 UTC 2012


#5619: obfsproxy: test suite failure (EOF)
-----------------------+----------------------------------------------------
 Reporter:  asn        |          Owner:  asn
     Type:  defect     |         Status:  new
 Priority:  normal     |      Milestone:     
Component:  Obfsproxy  |        Version:     
 Keywords:             |         Parent:     
   Points:             |   Actualpoints:     
-----------------------+----------------------------------------------------

Comment(by asn):

 weasel reproduced this with `obfsproxy-0.1.1` too:

 {{{
 PASS: unittests
 ...............F.
 ======================================================================
 FAIL: test_socks4_transfer (__main__.SocksObfs2)
 ----------------------------------------------------------------------
 Traceback (most recent call last):
   File "./tester.py", line 297, in test_socks4_transfer
     ( (0, 90, SERVER_PORT, 127, 0, 0, 1), "!BBH4B" ) ])
   File "./tester.py", line 288, in socksTest
     self.fail("\n" + report)
 AssertionError:
 errors in transfer:
 --- expected
 +++ received
 @@ -1,39 +1 @@
 -THIS IS A TEST FILE. IT\'S USED BY THE INTEGRATION TESTS.
 -THIS IS A TEST FILE. IT\'S USED BY THE INTEGRATION TESTS.
 -THIS IS A TEST FILE. IT\'S USED BY THE INTEGRATION TESTS.
 -THIS IS A TEST FILE. IT\'S USED BY THE INTEGRATION TESTS.

 -"Can entropy ever be reversed?"
 -"THERE IS AS YET INSUFFICIENT DATA FOR A MEANINGFUL ANSWER."
 -"Can entropy ever be reversed?"
 -"THERE IS AS YET INSUFFICIENT DATA FOR A MEANINGFUL ANSWER."
 -"Can entropy ever be reversed?"
 -"THERE IS AS YET INSUFFICIENT DATA FOR A MEANINGFUL ANSWER."
 -"Can entropy ever be reversed?"
 -"THERE IS AS YET INSUFFICIENT DATA FOR A MEANINGFUL ANSWER."
 -"Can entropy ever be reversed?"
 -"THERE IS AS YET INSUFFICIENT DATA FOR A MEANINGFUL ANSWER."
 -"Can entropy ever be reversed?"
 -"THERE IS AS YET INSUFFICIENT DATA FOR A MEANINGFUL ANSWER."
 -"Can entropy ever be reversed?"
 -"THERE IS AS YET INSUFFICIENT DATA FOR A MEANINGFUL ANSWER."
 -"Can entropy ever be reversed?"
 -"THERE IS AS YET INSUFFICIENT DATA FOR A MEANINGFUL ANSWER."
 -
 -    In obfuscatory age geeky warfare did I wage
 -      For hiding bits from nasty censors\' sight
 -    I was hacker to my set in that dim dark age of net
 -      And I hacked from noon till three or four at night
 -
 -    Then a rival from Helsinki said my protocol was dinky
 -      So I flamed him with a condescending laugh,
 -    Saying his designs for stego might as well be made of lego
 -      And that my bikeshed was prettier by half.
 -
 -    But Claude Shannon saw my shame. From his noiseless channel came
 -       A message sent with not a wasted byte
 -    "There are nine and sixty ways to disguise communiques
 -       And RATHER MORE THAN ONE OF THEM IS RIGHT"
 -
 -\t\t    (apologies to Rudyard Kipling.)
 -
 obfsproxy server stderr:
 | 2012-04-13 15:25:38 [notice] Starting.
 | 2012-04-13 15:25:38 [debug] Configuration 1: obfs2 --dest=127.0.0.1:5001
 server 127.0.0.1:5000
 | 2012-04-13 15:25:38 [debug] obfs2: Parsed options nicely!
 | 2012-04-13 15:25:38 [debug] Now listening on 127.0.0.1:5000 for protocol
 obfs2.
 | 2012-04-13 15:25:38 [debug] [scrubbed]: new connection from [scrubbed]
 (1 total)
 | 2012-04-13 15:25:38 [debug] [scrubbed]: server connection
 | 2012-04-13 15:25:38 [info] [scrubbed] (obfs2): Successful outbound
 connection to '[scrubbed]'.
 | 2012-04-13 15:25:38 [debug] [scrubbed]: setup complete
 | 2012-04-13 15:25:38 [debug] [scrubbed]: pending_conn_cb
 | 2012-04-13 15:25:38 [debug] [scrubbed]: Successful connection
 | 2012-04-13 15:25:38 [debug] obfs2_handshake: responder queued 1193 bytes
 | 2012-04-13 15:25:38 [debug] [scrubbed]: downstream_read_cb, 1726 bytes
 available
 | 2012-04-13 15:25:38 [debug] obfs2_recv: received key, expecting 1702
 bytes of padding
 | 2012-04-13 15:25:38 [debug] obfs2_recv: consumed 1702 bytes padding, 0
 still to come
 | 2012-04-13 15:25:38 [debug] obfs2_recv: Processing 0 bytes application
 data
 | 2012-04-13 15:25:38 [debug] [scrubbed]: forwarded 0 bytes
 | 2012-04-13 15:25:38 [debug] [scrubbed]: downstream_read_cb, 1666 bytes
 available
 | 2012-04-13 15:25:38 [debug] obfs2_recv: Processing 1666 bytes
 application data
 | 2012-04-13 15:25:38 [debug] obfs2_crypt_and_transmit: Processed 1024
 bytes.
 | 2012-04-13 15:25:38 [debug] obfs2_crypt_and_transmit: Processed 642
 bytes.
 | 2012-04-13 15:25:38 [debug] [scrubbed]: forwarded 1666 bytes
 | 2012-04-13 15:25:39 [debug] error_cb for [scrubbed]: what=0x0011
 | 2012-04-13 15:25:39 [info] EOF from [scrubbed]
 | 2012-04-13 15:25:39 [debug] error_or_eof for [scrubbed]
 | 2012-04-13 15:25:39 [debug] Closing connection with [scrubbed]; 1
 remaining
 | 2012-04-13 15:25:39 [debug] Closing connection with [scrubbed]; 0
 remaining
 | 2012-04-13 15:25:39 [info] Closing all listeners.
 | 2012-04-13 15:25:39 [notice] Got SIGINT. Preparing shutdown.
 | 2012-04-13 15:25:39 [debug] Beginning normal shutdown.
 | 2012-04-13 15:25:39 [debug] Finishing shutdown.
 | 2012-04-13 15:25:39 [notice] Exiting.
 obfsproxy client stderr:
 | 2012-04-13 15:25:38 [notice] Starting.
 | 2012-04-13 15:25:38 [debug] Configuration 1: obfs2 socks 127.0.0.1:4999
 | 2012-04-13 15:25:38 [debug] obfs2: Parsed options nicely!
 | 2012-04-13 15:25:38 [debug] Now listening on 127.0.0.1:4999 for protocol
 obfs2.
 | 2012-04-13 15:25:38 [debug] [scrubbed]: new connection from [scrubbed]
 (1 total)
 | 2012-04-13 15:25:38 [debug] [scrubbed]: socks client connection
 | 2012-04-13 15:25:38 [debug] [scrubbed]: setup complete
 | 2012-04-13 15:25:38 [debug] [scrubbed]: socks_read_cb
 | 2012-04-13 15:25:38 [debug] Got version 4
 | 2012-04-13 15:25:38 [info] [scrubbed]: socks: trying to connect to
 [scrubbed]:5000
 | 2012-04-13 15:25:38 [debug] [scrubbed]: pending_socks_cb
 | 2012-04-13 15:25:38 [debug] We connected to our SOCKS destination!
 Replacing peername '[scrubbed]' with '[scrubbed]'
 | 2012-04-13 15:25:38 [debug] [scrubbed]: Successful outbound connection
 to [scrubbed]
 | 2012-04-13 15:25:38 [debug] obfs2_handshake: initiator queued 1726 bytes
 | 2012-04-13 15:25:38 [debug] [scrubbed]: downstream_read_cb, 1193 bytes
 available
 | 2012-04-13 15:25:38 [debug] obfs2_recv: received key, expecting 1169
 bytes of padding
 | 2012-04-13 15:25:38 [debug] obfs2_recv: consumed 1169 bytes padding, 0
 still to come
 | 2012-04-13 15:25:38 [debug] obfs2_recv: Processing 0 bytes application
 data
 | 2012-04-13 15:25:38 [debug] [scrubbed]: forwarded 8 bytes
 | 2012-04-13 15:25:38 [debug] [scrubbed]: upstream_read_cb, 1666 bytes
 available
 | 2012-04-13 15:25:38 [debug] obfs2_send: transmitting 1666 bytes.
 | 2012-04-13 15:25:38 [debug] obfs2_crypt_and_transmit: Processed 1024
 bytes.
 | 2012-04-13 15:25:38 [debug] obfs2_crypt_and_transmit: Processed 642
 bytes.
 | 2012-04-13 15:25:38 [debug] [scrubbed]: transmitted 1666 bytes
 | 2012-04-13 15:25:39 [debug] error_cb for [scrubbed]: what=0x0011
 | 2012-04-13 15:25:39 [info] EOF from [scrubbed]
 | 2012-04-13 15:25:39 [debug] error_or_eof for [scrubbed]
 | 2012-04-13 15:25:39 [debug] Closing connection with [scrubbed]; 1
 remaining
 | 2012-04-13 15:25:39 [debug] Closing connection with [scrubbed]; 0
 remaining
 | 2012-04-13 15:25:39 [info] Closing all listeners.
 | 2012-04-13 15:25:39 [notice] Got SIGINT. Preparing shutdown.
 | 2012-04-13 15:25:39 [debug] Beginning normal shutdown.
 | 2012-04-13 15:25:39 [debug] Finishing shutdown.
 | 2012-04-13 15:25:39 [notice] Exiting.


 ----------------------------------------------------------------------
 Ran 17 tests in 7.213s

 FAILED (failures=1)
 FAIL: tester.py
 }}}

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5619#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list