[tor-bugs] #20462 [Core Tor/Tor]: Make test failures/bugs on Raspberry Pi 3

Tor Bug Tracker & Wiki blackhole at torproject.org
Wed Nov 9 14:23:39 UTC 2016


#20462: Make test failures/bugs on Raspberry Pi 3
-------------------------------------------+-------------------------------
 Reporter:  cypherpunks                    |          Owner:
     Type:  defect                         |         Status:  closed
 Priority:  Medium                         |      Milestone:  Tor:
                                           |  0.2.9.x-final
Component:  Core Tor/Tor                   |        Version:
 Severity:  Normal                         |     Resolution:  fixed
 Keywords:  regression, TorCoreTeam201611  |  Actual Points:
Parent ID:                                 |         Points:
 Reviewer:                                 |        Sponsor:
-------------------------------------------+-------------------------------
Changes (by cypherpunks):

 * status:  new => closed
 * resolution:   => fixed


Comment:

 I've tested again with 0.2.9.5 (I disabled the firewall prior to running
 'make test', the box doubles as a wireless access point) and the only
 failing test was:

 control/rend_service_parse_port_config:
   FAIL src/test/test_controller.c:190: assert(!cfg)
   [rend_service_parse_port_config FAILED]

 I dug into it a bit further and it turns out the router used the ISP
 (virgin media) do something weird/evil with dns queries that don't resolve
 (in this case "1.2.3.4.5" from the testcase), the dns query was returning
 the isps safe search page. I hadn't noticed this before as everything
 apart from the router uses a differently evil dns provider - a long way of
 saying its probably fine to close this.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/20462#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list