[tor-bugs] #19191 [Core Tor/Tor]: {BUG} directory_send_command: Bug: Squid does not like URLs longer than 4095 bytes, and this one is 20515 bytes long

Tor Bug Tracker & Wiki blackhole at torproject.org
Fri May 27 14:45:35 UTC 2016


#19191: {BUG} directory_send_command: Bug: Squid does not like URLs longer than
4095 bytes, and this one is 20515 bytes long
------------------------------+--------------------------------
     Reporter:  fk            |      Owner:
         Type:  defect        |     Status:  new
     Priority:  Medium        |  Milestone:
    Component:  Core Tor/Tor  |    Version:  Tor: 0.2.8.3-alpha
     Severity:  Normal        |   Keywords:
Actual Points:                |  Parent ID:
       Points:                |   Reviewer:
      Sponsor:                |
------------------------------+--------------------------------
 After upgrading the relay 40A60D1F1E8AFBED22FCB30B3FBE2E275A14CF99 to Tor
 v0.2.8.3-alpha I got the following warning after starting:

 {{{
 May 27 14:02:26.111 [warn] {BUG} directory_send_command: Bug: Squid does
 not like URLs longer than 4095 bytes, and this one is 20515 bytes long:
 /tor/server/d/0E2ED00342161B68622BDF90623068BD9FF56890+0E3A7F3C5F[...]
 }}}

 It was repeated a couple of times with slightly different paths.

 This relay was previously running 0.2.7.6, but I'm also using
 0.2.8.2-alpha on
 other systems and haven't seen the warnings there.

 I'm not sure if there's a connection, but bootstrapping did not make it
 beyond 80%.

 Enabling debug logging resulted in lots of messages like:

 {{{
 May 27 14:27:16.604 [info] {NET}
 get_interface_address6_via_udp_socket_hack: Address that we determined via
 UDP socket magic is unsuitable for public comms.
 May 27 14:27:16.605 [info] {NET}
 get_interface_address6_via_udp_socket_hack: Address that we determined via
 UDP socket magic is unsuitable for public comms.
 May 27 14:27:16.605 [info] {NET}
 get_interface_address6_via_udp_socket_hack: Address that we determined via
 UDP socket magic is unsuitable for public comms.
 May 27 14:27:16.606 [info] {NET}
 get_interface_address6_via_udp_socket_hack: Address that we determined via
 UDP socket magic is unsuitable for public comms.
 May 27 14:27:16.606 [info] {NET}
 get_interface_address6_via_udp_socket_hack: Address that we determined via
 UDP socket magic is unsuitable for public comms.
 May 27 14:27:16.607 [info] {NET}
 get_interface_address6_via_udp_socket_hack: Address that we determined via
 UDP socket magic is unsuitable for public comms.
 May 27 14:27:16.607 [info] {NET}
 get_interface_address6_via_udp_socket_hack: Address that we determined via
 UDP socket magic is unsuitable for public comms.
 May 27 14:27:16.608 [info] {NET}
 get_interface_address6_via_udp_socket_hack: Address that we determined via
 UDP socket magic is unsuitable for public comms.
 May 27 14:27:27.346 [info] {NET}
 get_interface_address6_via_udp_socket_hack: Address that we determined via
 UDP socket magic is unsuitable for public comms.
 May 27 14:27:30.560 [info] {NET}
 get_interface_address6_via_udp_socket_hack: Address that we determined via
 UDP socket magic is unsuitable for public comms.
 May 27 14:27:33.302 [info] {NET}
 get_interface_address6_via_udp_socket_hack: Address that we determined via
 UDP socket magic is unsuitable for public comms.
 May 27 14:27:33.717 [info] {NET}
 get_interface_address6_via_udp_socket_hack: Address that we determined via
 UDP socket magic is unsuitable for public comms.
 }}}

 Tor is running in an ElectroBSD jail without raw socket access (which is
 probably required for the UDP socket magic to work).

 After adding the Address directive bootstrapping worked and the relay is
 currently serving traffic.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/19191>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list