[tor-relays] Auto-discovered IPv6 address [...] has not been found reachable.

Onion Operator flev at kpnmail.nl
Sat Mar 12 17:06:34 UTC 2022


> Fran wrote:
> Hej,

Hello,

> 
> TLS handshake succeeds for me from my laptop:
> 
> $ curl --insecure https://[2a02:a446:5ef1:1:d072:53ff:fef4:ea59] -v
> *   Trying 2a02:a446:5ef1:1:d072:53ff:fef4:ea59:443...
> * Connected to 2a02:a446:5ef1:1:d072:53ff:fef4:ea59
> (2a02:a446:5ef1:1:d072:53ff:fef4:ea59) port 443 (#0)
> * ALPN, offering h2
> * ALPN, offering http/1.1
> * TLSv1.3 (OUT), TLS handshake, Client hello (1):
> * TLSv1.3 (IN), TLS handshake, Server hello (2):
> * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
> * TLSv1.3 (OUT), TLS handshake, Client hello (1):
> * TLSv1.3 (IN), TLS handshake, Server hello (2):
> * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
> * TLSv1.3 (IN), TLS handshake, Certificate (11):
> * TLSv1.3 (IN), TLS handshake, CERT verify (15):
> * TLSv1.3 (IN), TLS handshake, Finished (20):
> * TLSv1.3 (OUT), TLS handshake, Finished (20):
> * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
> * ALPN, server did not agree to a protocol
> * Server certificate:
> *  subject: CN=www.s5uu2cs3ui4yok4.net
> *  start date: Nov  2 00:00:00 2021 GMT
> *  expire date: Apr 16 00:00:00 2022 GMT
> *  issuer: CN=www.yi5r3anmk2gd3fbqrw4.com
> *  SSL certificate verify result: unable to get local issuer certificate (20),
> continuing anyway.
>> GET / HTTP/1.1
>> Host: [2a02:a446:5ef1:1:d072:53ff:fef4:ea59]
>> User-Agent: curl/7.82.0
>> Accept: */*
>>
> * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
> * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
> * old SSL session ID is stale, removing
> ^C
> 
> What if you configure the IPv6 address by hand in torrc?

for months my torrc had

  ORPort 443 IPv4Only
  ORPort [2a02:a446:5ef1:1:d072:53ff:fef4:ea59]:443 IPv6Only

  Address XXX

and read in the logs:

  Unable to find IPv6 address for ORPort 443. You might want to specify
  IPv4Only to it or set an explicit address or set Address.

(XXX had only the A record)

> 
> Can you please send your torrc and the output of

--- cut here ---
ContactInfo flev @ kpnmail . nl
Nickname RealityLeighWinner

ExitPolicy reject *:*
ExitPolicy reject6 *:*

AvoidDiskWrites 1

DirPort 80
ORPort 443

Address XXX
--- cut here ---

where XXX is a DNS entry with both A and AAAA records.

> 
> ip route show table all

default via 192.168.2.254 dev eth0 
192.168.2.0/24 dev eth0 proto kernel scope link src 192.168.2.102 
broadcast 127.0.0.0 dev lo table local proto kernel scope link src 127.0.0.1 
local 127.0.0.0/8 dev lo table local proto kernel scope host src 127.0.0.1 
local 127.0.0.1 dev lo table local proto kernel scope host src 127.0.0.1 
broadcast 127.255.255.255 dev lo table local proto kernel scope link src 127.0.0.1 
broadcast 192.168.2.0 dev eth0 table local proto kernel scope link src 192.168.2.102 
local 192.168.2.102 dev eth0 table local proto kernel scope host src 192.168.2.102 
broadcast 192.168.2.255 dev eth0 table local proto kernel scope link src 192.168.2.102 
::1 dev lo proto kernel metric 256 pref medium
2a02:a446:5ef1:1::/64 dev eth0 proto kernel metric 256 expires 257593sec pref medium
fe80::/64 dev eth0 proto kernel metric 256 pref medium
default via fe80::7e39:53ff:fef6:d2cc dev eth0 proto ra metric 1024 expires 1464sec hoplimit 64 pref medium
local ::1 dev lo table local proto kernel metric 0 pref medium
local 2a02:a446:5ef1:1:d072:53ff:fef4:ea59 dev eth0 table local proto kernel metric 0 pref medium
local fe80::d072:53ff:fef4:ea59 dev eth0 table local proto kernel metric 0 pref medium
multicast ff00::/8 dev eth0 table local proto kernel metric 256 pref medium

> ip address show

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host 
       valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000
    link/ether d2:72:53:f4:ea:59 brd ff:ff:ff:ff:ff:ff permaddr 00:1e:06:42:f9:14
    inet 192.168.2.102/24 brd 192.168.2.255 scope global eth0
       valid_lft forever preferred_lft forever
    inet6 2a02:a446:5ef1:1:d072:53ff:fef4:ea59/64 scope global dynamic mngtmpaddr 
       valid_lft 257524sec preferred_lft 171124sec
    inet6 fe80::d072:53ff:fef4:ea59/64 scope link 
       valid_lft forever preferred_lft forever

BTW, it's also silly that the DirPort seems not effective. I can reach it from outside but don't
get it in the descriptor.

This the output of ss -plt:

LISTEN 0      4096         0.0.0.0:80        0.0.0.0:*    users:(("tor",pid=992,fd=9))    
LISTEN 0      4096       127.0.0.1:9050      0.0.0.0:*    users:(("tor",pid=992,fd=6))    
LISTEN 0      4096         0.0.0.0:443       0.0.0.0:*    users:(("tor",pid=992,fd=7))    
LISTEN 0      4096            [::]:443          [::]:*    users:(("tor",pid=992,fd=8))    

> 
> tnx & ciao,
> fran

thanks
Oo.


More information about the tor-relays mailing list