[tor-bugs] #22863 [- Select a component]: Bridge relay don't work on IPv6

Tor Bug Tracker & Wiki blackhole at torproject.org
Sun Jul 9 16:25:57 UTC 2017


#22863: Bridge relay don't work on IPv6
--------------------------------------+--------------------------
     Reporter:  mr-burns              |      Owner:
         Type:  defect                |     Status:  new
     Priority:  Medium                |  Milestone:
    Component:  - Select a component  |    Version:  Tor: 0.3.0.9
     Severity:  Normal                |   Keywords:
Actual Points:                        |  Parent ID:
       Points:                        |   Reviewer:
      Sponsor:                        |
--------------------------------------+--------------------------
 tor will listen on the port, but no self test will happens.
 The self test will only done for the IPv4 port.

 Here the log:
 Jul 09 10:56:54 foo.foo.foo systemd[1]: Starting Anonymizing overlay
 network for TCP...
 Jul 09 10:56:54 foo.foo.foo tor[23178]: Jul 09 10:56:54.893 [notice] Tor
 0.3.0.9 (git-22b3bf094e327093) running on Linux with Libevent
 2.0.21-stable, OpenSS
 Jul 09 10:56:54 foo.foo.foo tor[23178]: Jul 09 10:56:54.893 [notice] Tor
 can't help you if you use it wrong! Learn how to be safe at
 https://www.torproject.
 Jul 09 10:56:54 foo.foo.foo tor[23178]: Jul 09 10:56:54.945 [notice] Read
 configuration file "/usr/share/tor/defaults-torrc".
 Jul 09 10:56:54 foo.foo.foo tor[23178]: Jul 09 10:56:54.946 [notice] Read
 configuration file "/etc/tor/torrc".
 Jul 09 10:56:54 foo.foo.foo tor[23178]: Jul 09 10:56:54.951 [notice] Based
 on detected system memory, MaxMemInQueues is set to 2964 MB. You can
 override thi
 Jul 09 10:56:54 foo.foo.foo tor[23178]: Configuration was valid
 Jul 09 10:56:54 foo.foo.foo systemd[1]: Started Anonymizing overlay
 network for TCP.
 Jul 09 10:56:55 foo.foo.foo Tor[23179]: OpenSSL version from headers does
 not match the version we're running with. If you get weird crashes, that
 might be
 Jul 09 10:56:55 foo.foo.foo tor[23179]: Jul 09 10:56:55.111 [notice] Tor
 0.3.0.9 (git-22b3bf094e327093) running on Linux with Libevent
 2.0.21-stable, OpenSS
 Jul 09 10:56:55 foo.foo.foo tor[23179]: Jul 09 10:56:55.112 [notice] Tor
 can't help you if you use it wrong! Learn how to be safe at
 https://www.torproject.
 Jul 09 10:56:55 foo.foo.foo tor[23179]: Jul 09 10:56:55.112 [notice] Read
 configuration file "/usr/share/tor/defaults-torrc".
 Jul 09 10:56:55 foo.foo.foo tor[23179]: Jul 09 10:56:55.112 [notice] Read
 configuration file "/etc/tor/torrc".
 Jul 09 10:56:55 foo.foo.foo tor[23179]: Jul 09 10:56:55.117 [notice] Based
 on detected system memory, MaxMemInQueues is set to 2964 MB. You can
 override thi
 Jul 09 10:56:55 foo.foo.foo tor[23179]: Jul 09 10:56:55.118 [notice]
 Opening OR listener on [IPv6Address]:Port
 Jul 09 10:56:55 foo.foo.foo tor[23179]: Jul 09 10:56:55.118 [notice]
 Opening OR listener on IPv4Address:Port
 Jul 09 10:56:55 foo.foo.foo Tor[23179]: Tor 0.3.0.9 (git-22b3bf094e327093)
 running on Linux with Libevent 2.0.21-stable, OpenSSL 1.0.1e-fips and Zlib
 1.2.7.
 Jul 09 10:56:55 foo.foo.foo Tor[23179]: Tor can't help you if you use it
 wrong! Learn how to be safe at
 https://www.torproject.org/download/download#warning
 Jul 09 10:56:55 foo.foo.foo Tor[23179]: Read configuration file
 "/usr/share/tor/defaults-torrc".
 Jul 09 10:56:55 foo.foo.foo Tor[23179]: Read configuration file
 "/etc/tor/torrc".
 Jul 09 10:56:55 foo.foo.foo Tor[23179]: Based on detected system memory,
 MaxMemInQueues is set to 2964 MB. You can override this by setting
 MaxMemInQueues b
 Jul 09 10:56:55 foo.foo.foo Tor[23179]: Opening OR listener on
 [IPv6Address]:Port
 Jul 09 10:56:55 foo.foo.foo Tor[23179]: Opening OR listener on
 IPv4Address:Port
 Jul 09 10:56:55 foo.foo.foo Tor[23179]: Parsing GEOIP IPv4 file
 /usr/share/tor/geoip.
 Jul 09 10:56:55 foo.foo.foo Tor[23179]: Parsing GEOIP IPv6 file
 /usr/share/tor/geoip6.
 Jul 09 10:56:55 foo.foo.foo Tor[23179]: Configured to measure statistics.
 Look for the *-stats files that will first be written to the data
 directory in 24
 Jul 09 10:56:55 foo.foo.foo Tor[23179]: We were built to run on a 64-bit
 CPU, with OpenSSL 1.0.1 or later, but with a version of OpenSSL that
 apparently lac
 Jul 09 10:56:56 foo.foo.foo Tor[23179]: Your Tor server's identity key
 fingerprint is 'XXXXXX'
 Jul 09 10:56:56 foo.foo.foo Tor[23179]: Your Tor bridge's hashed identity
 key fingerprint is 'XXXXXXXX'
 Jul 09 10:56:56 foo.foo.foo Tor[23179]: Bootstrapped 0%: Starting
 Jul 09 10:57:10 foo.foo.foo Tor[23179]: Starting with guard context
 "default"
 Jul 09 10:57:10 foo.foo.foo Tor[23179]: Bootstrapped 80%: Connecting to
 the Tor network
 Jul 09 10:57:10 foo.foo.foo Tor[23179]: Opening Control listener on
 /run/tor/control
 Jul 09 10:57:10 foo.foo.foo Tor[23179]: Bootstrapped 85%: Finishing
 handshake with first hop
 Jul 09 10:57:11 foo.foo.foo Tor[23179]: Bootstrapped 90%: Establishing a
 Tor circuit
 Jul 09 10:57:11 foo.foo.foo Tor[23179]: Tor has successfully opened a
 circuit. Looks like client functionality is working.
 Jul 09 10:57:11 foo.foo.foo Tor[23179]: Bootstrapped 100%: Done
 Jul 09 10:57:11 foo.foo.foo Tor[23179]: Now checking whether ORPort
 IPv4Address:Port is reachable... (this may take up to 20 minutes -- look
 for log mess
 Jul 09 10:57:11 foo.foo.foo Tor[23179]: Self-testing indicates your ORPort
 is reachable from the outside. Excellent. Publishing server descriptor.
 Jul 09 10:57:12 foo.foo.foo Tor[23179]: Performing bandwidth self-
 test...done.
 Jul 09 16:57:10 foo.foo.foo Tor[23179]: Heartbeat: Tor's uptime is 5:59
 hours, with 2 circuits open. I've sent 1.31 MB and received 8.09 MB.
 Jul 09 16:57:10 foo.foo.foo Tor[23179]: Heartbeat: In the last 6 hours, I
 have seen 0 unique clients.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/22863>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list