[tor-bugs] #14918 [Tor]: Tor 0.2.6.2-alpha complaining about "no exits in consensus" but consensus actually seems fine

Tor Bug Tracker & Wiki blackhole at torproject.org
Tue Feb 17 17:17:52 UTC 2015


#14918: Tor 0.2.6.2-alpha complaining about "no exits in consensus" but consensus
actually seems fine
------------------------+----------------------------------
     Reporter:  fk      |      Owner:
         Type:  defect  |     Status:  needs_review
     Priority:  normal  |  Milestone:  Tor: 0.2.6.x-final
    Component:  Tor     |    Version:  Tor: 0.2.6.2-alpha
   Resolution:          |   Keywords:  tor-relay regression
Actual Points:          |  Parent ID:
       Points:          |
------------------------+----------------------------------

Comment (by fk):

 Log excerpt with the changes requested in comment 4:

 {{{
 Feb 17 17:02:10.000 [notice] Tor 0.2.6.2-alpha (git-6cb1daf062df5252)
 opening log file.
 Feb 17 17:02:10.559 [notice] Tor v0.2.6.2-alpha (git-6cb1daf062df5252)
 running on ElectroBSD with Libevent 2.0.21-stable, OpenSSL 1.0.1j-freebsd
 and Zlib 1.2.8.
 Feb 17 17:02:10.559 [notice] Tor can't help you if you use it wrong! Learn
 how to be safe at https://www.torproject.org/download/download#warning
 Feb 17 17:02:10.559 [notice] This version is not a stable Tor release.
 Expect more bugs than usual.
 Feb 17 17:02:10.559 [notice] Read configuration file
 "/usr/local/etc/tor/torrc".
 Feb 17 17:02:10.565 [notice] Based on detected system memory,
 MaxMemInQueues is set to 1163 MB. You can override this by setting
 MaxMemInQueues by hand.
 Feb 17 17:02:10.566 [notice] Opening Control listener on 127.0.0.1:9051
 Feb 17 17:02:10.566 [notice] Opening OR listener on 0.0.0.0:9001
 Feb 17 17:02:10.567 [warn] Fixing permissions on directory /var/db/tor
 Feb 17 17:02:10.000 [notice] {GENERAL} Parsing GEOIP IPv4 file
 /usr/local/share/tor/geoip.
 Feb 17 17:02:10.000 [notice] {GENERAL} Parsing GEOIP IPv6 file
 /usr/local/share/tor/geoip6.
 Feb 17 17:02:10.000 [notice] {CONFIG} Configured to measure statistics.
 Look for the *-stats files that will first be written to the data
 directory in 24 hours from now.
 Feb 17 17:02:10.000 [notice] {GENERAL} We were built to run on a 64-bit
 CPU, with OpenSSL 1.0.1 or later, but with a version of OpenSSL that
 apparently lacks accelerated support for the NIST P-224 and P-256 gro
 ups. Building openssl with such support (using the enable-
 ec_nistp_64_gcc_128 option when configuring it) would make ECDH much
 faster.
 Feb 17 17:02:10.000 [notice] {GENERAL} Your Tor server's identity key
 fingerprint is 'polizeierziehung 5CE3AD8AD04ADE66C0037A3CF5F7F7A40D48A20B'
 Feb 17 17:02:10.000 [notice] {CONTROL} Bootstrapped 0%: Starting
 Feb 17 17:02:10.000 [notice] {DIR} 7027 usable, 0 present (descs).
 Feb 17 17:02:10.000 [notice] {DIR} 1149 usable, 0 present (desc exits).
 Feb 17 17:02:10.000 [notice] {NET} exits: 0 present, 1149 usable
 Feb 17 17:02:10.000 [notice] {NET} The current consensus has no exit
 nodes. Tor can only build internal paths, such as paths to hidden
 services.
 Feb 17 17:02:10.000 [notice] {DIR} 1149 usable, 0 present (desc exits).
 Feb 17 17:02:10.000 [notice] {NET} myexits: 0 present, 1149 usable
 Feb 17 17:02:10.000 [notice] {DIR} 7027 usable, 0 present (descs).
 Feb 17 17:02:10.000 [notice] {NET} myexits_unflagged (initial): 0 present,
 7027 usable
 Feb 17 17:02:10.000 [notice] {NET} myexits_unflagged (final): 0 present,
 7027 usable
 Feb 17 17:02:10.000 [notice] {NET} f_exit: 0.00, f_myexit: 0.00,
 f_myexit_unflagged: 0.00
 Feb 17 17:02:10.000 [warn] {NET} We need more descriptors: we have 0/7027,
 and can only build 0% of likely paths. (We have 0% of guards bw, 0% of
 midpoint bw, and 100% of exit bw (no exits in consensus) = 0% of path bw.)
 Feb 17 17:02:10.000 [notice] {CONTROL} Bootstrapped 45%: Asking for relay
 descriptors for internal paths
 Feb 17 17:02:10.000 [notice] {GENERAL} Guessed our IP address as
 95.211.241.83 (source: 194.109.206.212).
 [...]
 Feb 17 17:02:16.000 [notice] {CONTROL} Bootstrapped 90%: Establishing a
 Tor circuit
 Feb 17 17:02:16.000 [notice] {GENERAL} Tor has successfully opened a
 circuit. Looks like client functionality is working.
 Feb 17 17:02:16.000 [notice] {CONTROL} Bootstrapped 100%: Done
 Feb 17 17:02:20.000 [notice] {DIR} 7027 usable, 6643 present (descs).
 Feb 17 17:02:20.000 [notice] {DIR} 1149 usable, 1092 present (desc exits).
 Feb 17 17:02:20.000 [notice] {NET} exits: 1092 present, 1149 usable
 Feb 17 17:02:20.000 [notice] {DIR} 1149 usable, 1092 present (desc exits).
 Feb 17 17:02:20.000 [notice] {NET} myexits: 1092 present, 1149 usable
 Feb 17 17:02:20.000 [notice] {DIR} 7027 usable, 6643 present (descs).
 Feb 17 17:02:20.000 [notice] {NET} myexits_unflagged (initial): 6643
 present, 7027 usable
 Feb 17 17:02:20.000 [notice] {NET} myexits_unflagged (final): 1352
 present, 1736 usable
 Feb 17 17:02:20.000 [notice] {NET} f_exit: 0.96, f_myexit: 0.96,
 f_myexit_unflagged: 0.87
 Feb 17 17:02:20.000 [notice] {DIR} 7027 usable, 6739 present (descs).
 Feb 17 17:02:20.000 [notice] {DIR} 1149 usable, 1114 present (desc exits).
 Feb 17 17:02:20.000 [notice] {NET} exits: 1114 present, 1149 usable
 Feb 17 17:02:20.000 [notice] {DIR} 1149 usable, 1114 present (desc exits).
 Feb 17 17:02:20.000 [notice] {NET} myexits: 1114 present, 1149 usable
 Feb 17 17:02:20.000 [notice] {DIR} 7027 usable, 6739 present (descs).
 Feb 17 17:02:20.000 [notice] {NET} myexits_unflagged (initial): 6739
 present, 7027 usable
 Feb 17 17:02:20.000 [notice] {NET} myexits_unflagged (final): 1376
 present, 1664 usable
 Feb 17 17:02:20.000 [notice] {NET} f_exit: 0.97, f_myexit: 0.97,
 f_myexit_unflagged: 0.91
 Feb 17 17:02:20.000 [notice] {DIR} 7027 usable, 6739 present (descs).
 Feb 17 17:02:20.000 [notice] {DIR} 1149 usable, 1114 present (desc exits).
 Feb 17 17:02:20.000 [notice] {NET} exits: 1114 present, 1149 usable
 Feb 17 17:02:20.000 [notice] {DIR} 1149 usable, 1114 present (desc exits).
 Feb 17 17:02:20.000 [notice] {NET} myexits: 1114 present, 1149 usable
 Feb 17 17:02:20.000 [notice] {DIR} 7027 usable, 6739 present (descs).
 Feb 17 17:02:20.000 [notice] {NET} myexits_unflagged (initial): 6739
 present, 7027 usable
 Feb 17 17:02:20.000 [notice] {NET} myexits_unflagged (final): 1376
 present, 1664 usable
 Feb 17 17:02:20.000 [notice] {NET} f_exit: 0.97, f_myexit: 0.97,
 f_myexit_unflagged: 0.91
 Feb 17 17:02:23.000 [notice] {OR} Performing bandwidth self-test...done.
 }}}

 The torrc is pretty boring:
 {{{
 SocksPort 0

 ORPort 9001

 ControlPort 9051
 HashedControlPassword [...]

 Nickname polizeierziehung

 RelayBandwidthRate  15000 KBytes
 RelayBandwidthBurst 21000 KBytes

 ContactInfo [...]

 MyFamily [...]

 LogMessageDomains 1
 #Log [net]debug file /var/log/tor/debug.log

 ExitPolicy reject *:*
 }}}

 I'm not seeing the issue with the same binary acting as an hidden service
 in a different jail on the same system. It also happens to cache micro
 descriptors:

 {{{
 _tor at onion2-hs:~ % ls -l /var/db/tor/
 total 10664
 -rw-------  1 _tor  _tor    20441 Feb 17 12:32 cached-certs
 -rw-------  1 _tor  _tor  1380751 Feb 17 16:55 cached-microdesc-consensus
 -rw-------  1 _tor  _tor  8467363 Feb 12 01:07 cached-microdescs
 -rw-------  1 _tor  _tor  3515238 Feb 17 16:55 cached-microdescs.new
 -rw-------  1 _tor  _tor        0 Feb 17 12:32 lock
 -rw-------  1 _tor  _tor     2040 Feb 17 16:54 state
 }}}

 I just received comment 7 and will test the bug14918 branch in a couple of
 minutes.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/14918#comment:8>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list