[tor-bugs] #30639 [Core Tor/Tor]: Tor tries to connect over IPv6 in IPv4 networks with ClientAutoIPv6ORPort set

Tor Bug Tracker & Wiki blackhole at torproject.org
Tue May 28 19:48:24 UTC 2019


#30639: Tor tries to connect over IPv6 in IPv4 networks with ClientAutoIPv6ORPort
set
-------------------------------------------------+-------------------------
 Reporter:  gk                                   |          Owner:  (none)
     Type:  defect                               |         Status:  new
 Priority:  Medium                               |      Milestone:  Tor:
                                                 |  unspecified
Component:  Core Tor/Tor                         |        Version:
 Severity:  Normal                               |     Resolution:
 Keywords:  tbb-wants, network-team-roadmap-     |  Actual Points:
  maybe                                          |
Parent ID:                                       |         Points:
 Reviewer:                                       |        Sponsor:
-------------------------------------------------+-------------------------

Comment (by mcs):

 Replying to [comment:3 teor]:
 > ...
 > Here's a fix that Tor Browser should implement anyway:
 > * stop setting DisableNetwork on tor's first connection failure, because
 tor's next connection attempt might work

 This is an interesting ticket.

 Tor Launcher does not set `DisableNetwork=1` on tor's first connection
 failure; it is more accurate to say that Tor Launcher displays an error
 message along with a `Reconfigure` button after it receives a bootstrap
 status event that includes `RECOMMENDATION=warn`, and Tor Launcher also
 sets `DisableNetwork=1` at the same time.

 The problem that Kathy and I see with changing Tor Launcher to not set
 `DisableNetwork=1` when a "warn" level bootstrap event occurs is that in
 many situations that will cause user confusion. In fact, if I remember
 correctly, Tor Launcher used to behave that way. Our current assumption is
 that when a "warn" level bootstrap event occurs, the bootstrap process has
 failed and the user needs to intervene to fix it (e.g., they need to
 modify their Tor configuration to use a bridge or fix their system clock).
 In this case, that may not be true.

 We count on tor to help us by adhering to this idea from section 4.1.10 of
 the control spec:
  Currently Tor uses recommendation=ignore for the first nine bootstrap
 problem reports for a given phase, and then uses recommendation=warn for
 subsequent problems at that phase. Hopefully this is a good balance
 between tolerating occasional errors and reporting serious problems
 quickly.

 But maybe the above does not apply to some types of failures inside tor,
 e.g., "no route to host?" We need to figure out how to avoid interrupting
 tor's bootstrap process inside tor and in the Tor Launcher UI; otherwise,
 Tor Launcher will behave as if a "fatal" error occurred even though one
 did not.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/30639#comment:8>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list