[tor-bugs] #24972 [Core Tor/Tor]: Bug: src/or/hs_descriptor.c:2357: hs_desc_encode_descriptor: Non-fatal assertion !(ret < 0) failed.

Tor Bug Tracker & Wiki blackhole at torproject.org
Tue Jan 23 08:20:19 UTC 2018


#24972: Bug: src/or/hs_descriptor.c:2357: hs_desc_encode_descriptor: Non-fatal
assertion !(ret < 0) failed.
------------------------------+--------------------------------
     Reporter:  asn           |      Owner:  (none)
         Type:  defect        |     Status:  new
     Priority:  Medium        |  Milestone:  Tor: 0.3.3.x-final
    Component:  Core Tor/Tor  |    Version:
     Severity:  Normal        |   Keywords:  tor-hs prop224
Actual Points:                |  Parent ID:
       Points:  2             |   Reviewer:
      Sponsor:                |
------------------------------+--------------------------------
 My HSv3 is unable to encode its own descriptor with the following fail:
 {{{
 Jan 21 08:00:49.000 [info] connection_free_minimal(): Freeing linked Socks
 connection [open] with 0 bytes on inbuf, 0 on outbuf.
 Jan 21 08:00:49.000 [info] handle_response_upload_hsdesc(): Uploaded
 hidden service descriptor (status 200 ("HS descriptor stored
 successfully."))
 Jan 21 08:00:49.000 [info] handle_response_upload_hsdesc(): Uploading
 hidden service descriptor: finished with status 200 ("HS descriptor stored
 successfully.")
 Jan 21 08:00:49.000 [info] connection_free_minimal(): Freeing linked
 Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
 Jan 21 08:00:49.000 [info] circuit_finish_handshake(): Finished building
 circuit hop:
 Jan 21 08:00:49.000 [info] internal (high-uptime) circ (length 4, last hop
 damita): $E2920D7419B7601CF82D43400D042DA70E0675B2(open)
 $CA58EB617C6CA2F351AEFD56C84B8A7AF7704B22(open)
 $0E3D3FCE26F6969B7AE80E4CA6C4CFA97988F31E(open)
 $A9F7185499C5784E35B5C25744ED4AB75437CE5D(open)
 Jan 21 08:00:49.000 [info] entry_guards_note_guard_success(): Recorded
 success for primary confirmed guard papadouka
 ($E2920D7419B7601CF82D43400D042DA70E0675B2)
 Jan 21 08:00:49.000 [info] circuit_build_no_more_hops(): circuit built!
 Jan 21 08:00:49.000 [info] pathbias_count_build_success(): Got success
 count 224.332749/291.637758 for guard papadouka
 ($E2920D7419B7601CF82D43400D042DA70E0675B2)
 Jan 21 08:01:06.000 [info]
 channelpadding_send_padding_cell_for_callback(): Sending netflow keepalive
 on 58 to 86.106.137.6:443 (E2920D7419B7601CF82D43400D042DA70E0675B2) after
 5296 ms. Delta -4ms
 Jan 21 08:01:12.000 [info] routerlist_remove_old_routers(): We have 0 live
 routers and 0 old router descriptors.
 Jan 21 08:01:19.000 [info] or_state_save(): Saved state to
 "/home/f/.tor/state"
 Jan 21 08:01:25.000 [info]
 channelpadding_send_padding_cell_for_callback(): Sending netflow keepalive
 on 58 to 86.106.137.6:443 (E2920D7419B7601CF82D43400D042DA70E0675B2) after
 5996 ms. Delta 2ms
 Jan 21 08:01:32.000 [info]
 channelpadding_send_padding_cell_for_callback(): Sending netflow keepalive
 on 58 to 86.106.137.6:443 (E2920D7419B7601CF82D43400D042DA70E0675B2) after
 6840 ms. Delta -2ms
 Jan 21 08:01:43.000 [info]
 channelpadding_send_padding_cell_for_callback(): Sending netflow keepalive
 on 58 to 86.106.137.6:443 (E2920D7419B7601CF82D43400D042DA70E0675B2) after
 2096 ms. Delta 0ms
 Jan 21 08:01:51.000 [info]
 channelpadding_send_padding_cell_for_callback(): Sending netflow keepalive
 on 58 to 86.106.137.6:443 (E2920D7419B7601CF82D43400D042DA70E0675B2) after
 7912 ms. Delta 0ms
 Jan 21 08:01:57.000 [info]
 channelpadding_send_padding_cell_for_callback(): Sending netflow keepalive
 on 58 to 86.106.137.6:443 (E2920D7419B7601CF82D43400D042DA70E0675B2) after
 6456 ms. Delta 0ms
 Jan 21 08:02:05.000 [info]
 channelpadding_send_padding_cell_for_callback(): Sending netflow keepalive
 on 58 to 86.106.137.6:443 (E2920D7419B7601CF82D43400D042DA70E0675B2) after
 7952 ms. Delta 3ms
 Jan 21 08:02:07.000 [info]
 channelpadding_send_padding_cell_for_callback(): Sending netflow keepalive
 on 58 to 86.106.137.6:443 (E2920D7419B7601CF82D43400D042DA70E0675B2) after
 2280 ms. Delta 1ms
 Jan 21 08:02:12.000 [info] routerlist_remove_old_routers(): We have 0 live
 routers and 0 old router descriptors.
 Jan 21 08:02:20.000 [info]
 channelpadding_send_padding_cell_for_callback(): Sending netflow keepalive
 on 58 to 86.106.137.6:443 (E2920D7419B7601CF82D43400D042DA70E0675B2) after
 3756 ms. Delta 2ms
 Jan 21 08:02:33.000 [info]
 channelpadding_send_padding_cell_for_callback(): Sending netflow keepalive
 on 58 to 86.106.137.6:443 (E2920D7419B7601CF82D43400D042DA70E0675B2) after
 8344 ms. Delta 0ms
 Jan 21 08:03:00.000 [info]
 channelpadding_send_padding_cell_for_callback(): Sending netflow keepalive
 on 58 to 86.106.137.6:443 (E2920D7419B7601CF82D43400D042DA70E0675B2) after
 4508 ms. Delta 2ms
 Jan 21 08:03:04.000 [info] run_upload_descriptor_event(): Initiating
 upload for hidden service current descriptor for service
 j2eiu2izwjpazjevu4xs3muaif3jzex3nnvnu677vz2fypmzccvhhiid with 3/3
 introduction points.
 Jan 21 08:03:04.000 [info] close_directory_connections(): Closed 0 active
 service directory connections for descriptor
 9btQxrMpxWDJwnf1TU6U+5vcPmPdD2OPBVAKKmRLr7I of service
 j2eiu2izwjpazjevu4xs3muaif3jzex3nnvnu677vz2fypmzccvhhiid
 Jan 21 08:03:04.000 [info] crypto_strongest_rand_fallback(): Reading
 entropy from "/dev/urandom"
 Jan 21 08:03:04.000 [info] crypto_strongest_rand_fallback(): Reading
 entropy from "/dev/urandom"
 Jan 21 08:03:04.000 [warn] Invalid signature for service descriptor
 signing key.
 Jan 21 08:03:04.000 [warn] tor_bug_occurred_(): Bug:
 src/or/hs_descriptor.c:2357: hs_desc_encode_descriptor: Non-fatal
 assertion !(ret < 0) failed. (on Tor 0.3.3.0-alpha-dev d69c8f7117a5975a)
 Jan 21 08:03:04.000 [warn] Bug: Non-fatal assertion !(ret < 0) failed in
 hs_desc_encode_descriptor at src/or/hs_descriptor.c:2357. Stack trace: (on
 Tor 0.3.3.0-alpha-dev d69c8f7117a5975a)
 Jan 21 08:03:04.000 [warn] Bug:     ./tor/src/or/tor(log_backtrace+0x42)
 [0x7ffa9cd66ac2] (on Tor 0.3.3.0-alpha-dev d69c8f7117a5975a)
 Jan 21 08:03:04.000 [warn] Bug:
 ./tor/src/or/tor(tor_bug_occurred_+0xb7) [0x7ffa9cd81cd7] (on Tor 0.3.3.0
 -alpha-dev d69c8f7117a5975a)
 Jan 21 08:03:04.000 [warn] Bug:
 ./tor/src/or/tor(hs_desc_encode_descriptor+0xb2) [0x7ffa9cd4d782] (on Tor
 0.3.3.0-alpha-dev d69c8f7117a5975a)
 Jan 21 08:03:04.000 [warn] Bug:
 ./tor/src/or/tor(hs_service_run_scheduled_events+0x21f3) [0x7ffa9cd570d3]
 (on Tor 0.3.3.0-alpha-dev d69c8f7117a5975a)
 Jan 21 08:03:04.000 [warn] Bug:     ./tor/src/or/tor(+0x4ca31)
 [0x7ffa9cc30a31] (on Tor 0.3.3.0-alpha-dev d69c8f7117a5975a)
 }}}

 That started happening 4 days after I started up Tor and it persists up to
 today: my HS is still unable to create its own desc...

 FWIW, the only difference from the past is that I've been using vanguards
 but that should not influence the signing of the desc....

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/24972>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list