[tor-bugs] #27731 [Core Tor/Tor]: tor restart loop: "The missing protocols are: LinkAuth=1"

Tor Bug Tracker & Wiki blackhole at torproject.org
Mon Sep 17 00:31:51 UTC 2018


#27731: tor restart loop: "The missing protocols are: LinkAuth=1"
--------------------------+----------------------------------
 Reporter:  traumschule   |          Owner:  (none)
     Type:  defect        |         Status:  new
 Priority:  Medium        |      Milestone:
Component:  Core Tor/Tor  |        Version:  Tor: unspecified
 Severity:  Normal        |     Resolution:
 Keywords:                |  Actual Points:
Parent ID:  #27288        |         Points:
 Reviewer:                |        Sponsor:
--------------------------+----------------------------------

Old description:

> Since the (automatic) apt upgrade to 0.3.5.0-alpha-dev-
> 20180916T182348Z-1~d99.buster+1 tor restarted in a loop:
>
> {{{
> Sep 17 01:05:26.000 [notice] {GENERAL} Parsing GEOIP IPv4 file
> /usr/share/tor/geoip.
> Sep 17 01:05:27.000 [notice] {GENERAL} Parsing GEOIP IPv6 file
> /usr/share/tor/geoip6.
> Sep 17 01:05:27.000 [info] {CIRC} add_predicted_port(): New port
> prediction added. Will continue predictive circ building for 2079 more
> seconds.
> Sep 17 01:05:27.000 [info] {CRYPTO} crypto_openssl_late_init(): NOT using
> OpenSSL engine support.
> Sep 17 01:05:27.000 [info] {CRYPTO} evaluate_evp_for_aes(): This version
> of OpenSSL has a known-good EVP counter-mode implementation. Using it.
> Sep 17 01:05:27.000 [notice] {CONTROL} Bootstrapped 0%: Starting
> Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string():
> Adding cached certificate for directory authority maatuska with signing
> key 10A69F531F8421310537EAC881F7DD354F251D31
> Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string():
> Adding cached certificate for directory authority dannenberg with signing
> key CD1FD971855430880D3C31E0331C5C55800C2F79
> Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string():
> Adding cached certificate for directory authority gabelmoo with signing
> key E1249D5F87EAD43CD4A48DF9CFCFE810BEEE5287
> Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string():
> Adding cached certificate for directory authority bastet with signing key
> 88E1BDDC8E6363355910D086B37B562F81674DC1
> Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string():
> Adding cached certificate for directory authority longclaw with signing
> key D632ADF38603F34EAFCB461C4DA5F67EF62BE7EC
> Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string():
> Adding cached certificate for directory authority tor26 with signing key
> 719A962F8F7DC7F0A34A545E7A45368FF8A23D2A
> Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string():
> Adding cached certificate for directory authority Faravahar with signing
> key 517095062288D1B5C7BD6517A677C586D996818B
> Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string():
> Adding cached certificate for directory authority dizum with signing key
> 109A865D7DBE58367C120353CBE9947EE263695A
> Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string():
> Adding cached certificate for directory authority moria1 with signing key
> 6E44451E3F1CEB435E4D95C1F8B12AA022BB34CF
> Sep 17 01:05:28.000 [err] {GENERAL} At least one protocol listed as
> required in the consensus is not supported by this version of Tor. You
> should upgrade. This version of Tor will not work as a client on the Tor
> network. The missing protocols are: LinkAuth=1
> [restart]
> Sep 17 01:06:08.000 [info] {GENERAL} options_act_reversible(): Recomputed
> OOS thresholds: ConnLimit 1000, ConnLimit_ 65504, ConnLimit_high_thresh
> 65440, ConnLimit_low_thresh 49128
> Sep 17 01:06:08.000 [info] {FS} tor_lockfile_lock(): Locking
> "/var/lib/tor/lock"
> }}}
>
> Downgrading fixed it. git HEAD is also affected, last working commit in
> master: 035166e7bf30645f6da9d39374f5e9c9efe867f8
> {{{
> dpkg -i  /var/cache/apt/archives/tor_0.3.5.0-alpha-dev-
> 20180915T011035Z-1~d99.buster+1_i386.deb
>
> Tor version 0.3.5.0-alpha-dev (git-035166e7bf30645f).
> }}}
>
> First failing:
> http://jqs44zhtxl2uo6gk.onion/tor.git/commit/?id=991bec67ee41fd7f3c12e9194d96491b51bedd50

New description:

 Since the (automatic) apt upgrade to 0.3.5.0-alpha-dev-
 20180916T182348Z-1~d99.buster+1 tor restarted in a loop:

 {{{
 Sep 17 01:05:24.000 [err] {GENERAL} At least one protocol listed as
 required in the consensus is not supported by this version of Tor. You
 should upgrade. This version of Tor will not work as a clien
 t on the Tor network. The missing protocols are: LinkAuth=1
 Sep 17 01:05:26.000 [notice] Tor 0.3.5.0-alpha-dev opening log file.
 Sep 17 01:05:26.531 [notice] Tor 0.3.5.0-alpha-dev running on Linux with
 Libevent 2.1.8-stable, OpenSSL 1.1.0h, Zlib 1.2.11, Liblzma 5.2.2, and
 Libzstd 1.3.5.
 Sep 17 01:05:26.539 [notice] Tor can't help you if you use it wrong! Learn
 how to be safe at https://www.torproject.org/download/download#warning
 Sep 17 01:05:26.539 [notice] This version is not a stable Tor release.
 Expect more bugs than usual.
 Sep 17 01:05:26.540 [notice] Read configuration file "/usr/share/tor/tor-
 service-defaults-torrc".
 Sep 17 01:05:26.540 [notice] Read configuration file "/etc/tor/torrc".
 Sep 17 01:05:26.590 [notice] Opening Socks listener on 127.0.0.1:9050
 Sep 17 01:05:26.591 [notice] Opened Socks listener on 127.0.0.1:9050
 Sep 17 01:05:26.591 [notice] Opening HTTP tunnel listener on
 127.0.0.1:9099
 Sep 17 01:05:26.592 [notice] Opened HTTP tunnel listener on 127.0.0.1:9099
 Sep 17 01:05:26.592 [notice] Opening Control listener on 127.0.0.1:9051
 Sep 17 01:05:26.592 [notice] Opened Control listener on 127.0.0.1:9051
 Sep 17 01:05:26.000 [warn] {GENERAL} Your log may contain sensitive
 information - you disabled SafeLogging, and you're logging more than
 "notice". Don't log unless it serves an important reason. Overwrite the
 log afterwards.
 Sep 17 01:05:26.000 [info] {GENERAL} options_act_reversible(): Recomputed
 OOS thresholds: ConnLimit 1000, ConnLimit_ 65504, ConnLimit_high_thresh
 65440, ConnLimit_low_thresh 49128
 Sep 17 01:05:26.000 [info] {GENERAL} or_state_load(): Loaded state from
 "/var/lib/tor/state"
 Sep 17 01:05:26.000 [info] {GUARD} sampled_guards_update_from_consensus():
 Not updating the sample guard set; we have no live consensus.
 Sep 17 01:05:26.000 [info] {GUARD}
 sample_reachable_filtered_entry_guards(): Trying to sample a reachable
 guard: We know of 0 in the USABLE_FILTERED set.
 Sep 17 01:05:26.000 [info] {GUARD}
 sample_reachable_filtered_entry_guards():   (That isn't enough. Trying to
 expand the sample.)
 Sep 17 01:05:26.000 [info] {GUARD} entry_guards_expand_sample(): Not
 expanding the sample guard set; we have no live consensus.
 Sep 17 01:05:26.000 [info] {GUARD}
 sample_reachable_filtered_entry_guards():   (After filters [b], we have 0
 guards to consider.)
 Sep 17 01:05:26.000 [info] {CIRC} circuit_build_times_parse_state():
 Adding 11 timeouts.
 Sep 17 01:05:26.000 [info] {CIRC} circuit_build_times_parse_state():
 Loaded 1000/1000 values from 48 lines in circuit time histogram
 Sep 17 01:05:26.000 [info] {CIRC} circuit_build_times_get_xm(): Xm mode
 #0: 575 91
 Sep 17 01:05:26.000 [info] {CIRC} circuit_build_times_get_xm(): Xm mode
 #1: 675 70
 Sep 17 01:05:26.000 [info] {CIRC} circuit_build_times_get_xm(): Xm mode
 #2: 375 85
 Sep 17 01:05:26.000 [info] {CIRC} circuit_build_times_set_timeout(): Set
 buildtimeout to low value 871.512173ms. Setting to 1500ms
 Sep 17 01:05:26.000 [info] {CIRC} circuit_build_times_set_timeout(): Based
 on 1000 circuit times, it looks like we don't need to wait so long for
 circuits to finish. We will now assume a circuit is too slow to use after
 waiting 2 seconds.
 Sep 17 01:05:26.000 [info] {CIRC} circuit_build_times_set_timeout():
 Circuit timeout data: 1500.000000ms, 60000.000000ms, Xm: 534, a: 3.285680,
 r: 0.046000
 Sep 17 01:05:26.000 [info] {FS} read_file_to_str(): Could not open
 "/var/lib/tor/router-stability": No such file or directory
 Sep 17 01:05:26.000 [info] {GENERAL} init_cookie_authentication():
 Generated auth cookie file in '"/var/run/tor/control.authcookie"'.
 Sep 17 01:05:26.000 [info] {SCHED} scheduler_kist_set_full_mode(): Setting
 KIST scheduler with kernel support (KIST mode)
 Sep 17 01:05:26.000 [info] {OR} cmux_ewma_set_options(): Enabled cell_ewma
 algorithm because of value in CircuitPriorityHalflifeMsec in consensus;
 scale factor is 0.793701 per 10 seconds
 Sep 17 01:05:26.000 [notice] {GENERAL} Parsing GEOIP IPv4 file
 /usr/share/tor/geoip.
 Sep 17 01:05:27.000 [notice] {GENERAL} Parsing GEOIP IPv6 file
 /usr/share/tor/geoip6.
 Sep 17 01:05:27.000 [info] {CIRC} add_predicted_port(): New port
 prediction added. Will continue predictive circ building for 2079 more
 seconds.
 Sep 17 01:05:27.000 [info] {CRYPTO} crypto_openssl_late_init(): NOT using
 OpenSSL engine support.
 Sep 17 01:05:27.000 [info] {CRYPTO} evaluate_evp_for_aes(): This version
 of OpenSSL has a known-good EVP counter-mode implementation. Using it.
 Sep 17 01:05:27.000 [notice] {CONTROL} Bootstrapped 0%: Starting
 Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string():
 Adding cached certificate for directory authority maatuska with signing
 key 10A69F531F8421310537EAC881F7DD354F251D31
 Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string():
 Adding cached certificate for directory authority dannenberg with signing
 key CD1FD971855430880D3C31E0331C5C55800C2F79
 Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string():
 Adding cached certificate for directory authority gabelmoo with signing
 key E1249D5F87EAD43CD4A48DF9CFCFE810BEEE5287
 Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string():
 Adding cached certificate for directory authority bastet with signing key
 88E1BDDC8E6363355910D086B37B562F81674DC1
 Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string():
 Adding cached certificate for directory authority longclaw with signing
 key D632ADF38603F34EAFCB461C4DA5F67EF62BE7EC
 Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string():
 Adding cached certificate for directory authority tor26 with signing key
 719A962F8F7DC7F0A34A545E7A45368FF8A23D2A
 Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string():
 Adding cached certificate for directory authority Faravahar with signing
 key 517095062288D1B5C7BD6517A677C586D996818B
 Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string():
 Adding cached certificate for directory authority dizum with signing key
 109A865D7DBE58367C120353CBE9947EE263695A
 Sep 17 01:05:27.000 [info] {DIR} trusted_dirs_load_certs_from_string():
 Adding cached certificate for directory authority moria1 with signing key
 6E44451E3F1CEB435E4D95C1F8B12AA022BB34CF
 Sep 17 01:05:28.000 [err] {GENERAL} At least one protocol listed as
 required in the consensus is not supported by this version of Tor. You
 should upgrade. This version of Tor will not work as a client on the Tor
 network. The missing protocols are: LinkAuth=1
 [restart]
 Sep 17 01:06:08.000 [info] {GENERAL} options_act_reversible(): Recomputed
 OOS thresholds: ConnLimit 1000, ConnLimit_ 65504, ConnLimit_high_thresh
 65440, ConnLimit_low_thresh 49128
 Sep 17 01:06:08.000 [info] {FS} tor_lockfile_lock(): Locking
 "/var/lib/tor/lock"
 }}}

 Downgrading fixed it. git HEAD is also affected, last working commit in
 master: 035166e7bf30645f6da9d39374f5e9c9efe867f8
 {{{
 dpkg -i  /var/cache/apt/archives/tor_0.3.5.0-alpha-dev-
 20180915T011035Z-1~d99.buster+1_i386.deb

 Tor version 0.3.5.0-alpha-dev (git-035166e7bf30645f).
 }}}

 First failing:
 http://jqs44zhtxl2uo6gk.onion/tor.git/commit/?id=991bec67ee41fd7f3c12e9194d96491b51bedd50

--

Comment (by traumschule):

 add missing log lines

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/27731#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list