[tor-bugs] #9635 [Tor]: Tor clients warn when they use the wrong ntor onion key

Tor Bug Tracker & Wiki blackhole at torproject.org
Thu Jan 29 05:16:19 UTC 2015


#9635: Tor clients warn when they use the wrong ntor onion key
-------------------------+-------------------------------------------------
     Reporter:  bastik   |      Owner:
         Type:  defect   |     Status:  needs_revision
     Priority:  normal   |  Milestone:  Tor: 0.2.6.x-final
    Component:  Tor      |    Version:  Tor: unspecified
   Resolution:           |   Keywords:  spammy-warnings, tor-bridge
Actual Points:           |  026-triaged-1 025-backport nickm-patch
       Points:           |  Parent ID:
-------------------------+-------------------------------------------------

Comment (by engrish):

 I compiled openssl and Tor with following command on CentOS 6.6
 2.6.32-431.el6.x86_64
 {{{
 cd ./openssl-1.0.2
 ./Configure shared enable-ec_nistp_64_gcc_128 linux-x86_64

 cd ./tor-0.2.6.2-alpha
 ./configure --with-openssl-dir=/usr/local/ssl --with-zlib-dir=/lib --with-
 libevent-dir=/usr/local/lib
 }}}
 after a while, I got a warn log when runninng relay
 {{{
 Jan 29 12:09:51.828 [notice] Tor v0.2.6.2-alpha running on Linux with
 Libevent 2.0.22-stable, OpenSSL 1.0.2 and Zlib 1.2
 .8.
 ...
 Jan 29 12:11:02.000 [warn] Invalid result from curve25519 handshake: 4
 Jan 29 12:11:02.000 [warn] onion_skin_client_handshake failed.
 Jan 29 12:11:02.000 [warn] circuit_finish_handshake failed.
 Jan 29 12:11:02.000 [warn] connection_edge_process_relay_cell (at origin)
 failed.
 }}}
 In my case, this problem solved with zlib.
 {{{
 cd ./openssl-1.0.2
 ./Configure shared zlib enable-ec_nistp_64_gcc_128 linux-x86_64
 }}}

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/9635#comment:26>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list