Aug 25 17:23:41.000 [notice] Tor 0.3.4.7-rc (git-8465a8d84647c349) opening new log file. Aug 25 17:23:41.000 [warn] Your log may contain sensitive information - you're logging more than "notice". Don't log unless it serves an important reason. Overwrite the log afterwards. Aug 25 17:23:41.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 29968, ConnLimit_high_thresh 29904, ConnLimit_low_thresh 22476 Aug 25 17:23:41.000 [info] tor_lockfile_lock(): Locking "/var/lib/tor/data/lock" Aug 25 17:23:41.000 [info] or_state_load(): Loaded state from "/var/lib/tor/data/state" Aug 25 17:23:41.000 [info] sampled_guards_update_from_consensus(): Not updating the sample guard set; we have no live consensus. Aug 25 17:23:41.000 [info] sample_reachable_filtered_entry_guards(): Trying to sample a reachable guard: We know of 0 in the USABLE_FILTERED set. Aug 25 17:23:41.000 [info] sample_reachable_filtered_entry_guards(): (That isn't enough. Trying to expand the sample.) Aug 25 17:23:41.000 [info] entry_guards_expand_sample(): Not expanding the sample guard set; we have no live consensus. Aug 25 17:23:41.000 [info] sample_reachable_filtered_entry_guards(): (After filters [b], we have 0 guards to consider.) Aug 25 17:23:41.000 [info] circuit_build_times_parse_state(): Adding 123 timeouts. Aug 25 17:23:41.000 [info] circuit_build_times_parse_state(): Loaded 1000/1000 values from 79 lines in circuit time histogram Aug 25 17:23:41.000 [info] circuit_build_times_get_xm(): Xm mode #0: 275 123 Aug 25 17:23:41.000 [info] circuit_build_times_get_xm(): Xm mode #1: 325 98 Aug 25 17:23:41.000 [info] circuit_build_times_get_xm(): Xm mode #2: 275 123 Aug 25 17:23:41.000 [info] circuit_build_times_set_timeout(): Based on 1000 circuit times, it looks like we don't need to wait so long for circuits to finish. We will now assume a circuit is too slow to use after waiting 2 seconds. Aug 25 17:23:41.000 [info] circuit_build_times_set_timeout(): Circuit timeout data: 2410.895753ms, 60000.000000ms, Xm: 289, a: 0.758694, r: 0.163000 Aug 25 17:23:41.000 [info] read_file_to_str(): Could not open "/var/lib/tor/data/router-stability": No such file or directory Aug 25 17:23:41.000 [info] init_cookie_authentication(): Generated auth cookie file in '"/var/lib/tor/data/control_auth_cookie"'. Aug 25 17:23:41.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode) Aug 25 17:23:41.000 [info] cmux_ewma_set_options(): Enabled cell_ewma algorithm because of value in CircuitPriorityHalflifeMsec in consensus; scale factor is 0.793701 per 10 seconds Aug 25 17:23:41.000 [notice] Parsing GEOIP IPv4 file /usr/share/tor/geoip. Aug 25 17:23:41.000 [notice] Parsing GEOIP IPv6 file /usr/share/tor/geoip6. Aug 25 17:23:41.000 [info] add_predicted_port(): New port prediction added. Will continue predictive circ building for 3271 more seconds. Aug 25 17:23:41.000 [info] crypto_global_init(): NOT using OpenSSL engine support. Aug 25 17:23:41.000 [info] evaluate_evp_for_aes(): This version of OpenSSL has a known-good EVP counter-mode implementation. Using it. Aug 25 17:23:41.000 [notice] We were built to run on a 64-bit CPU, with OpenSSL 1.0.1 or later, but with a version of OpenSSL that apparently lacks accelerated support for the NIST P-224 and P-256 groups. Building openssl with such support (using the enable-ec_nistp_64_gcc_128 option when configuring it) would make ECDH much faster. Aug 25 17:23:41.000 [notice] Bootstrapped 0%: Starting Aug 25 17:23:41.000 [warn] Could not open "/var/lib/tor/data/cached-certs": Permission denied Aug 25 17:23:41.000 [warn] Could not open "/var/lib/tor/data/cached-consensus": Permission denied Aug 25 17:23:41.000 [warn] Could not open "/var/lib/tor/data/unverified-consensus": Permission denied Aug 25 17:23:41.000 [warn] Could not open "/var/lib/tor/data/cached-microdesc-consensus": Permission denied Aug 25 17:23:41.000 [warn] Could not open "/var/lib/tor/data/unverified-microdesc-consensus": Permission denied Aug 25 17:23:41.000 [warn] Could not open "/var/lib/tor/data/cached-microdescs" for mmap(): Permission denied Aug 25 17:23:41.000 [warn] Could not open "/var/lib/tor/data/cached-microdescs.new": Permission denied Aug 25 17:23:41.000 [info] microdesc_cache_reload(): Reloaded microdescriptor cache. Found 0 descriptors. Aug 25 17:23:41.000 [warn] Could not open "/var/lib/tor/data/cached-descriptors" for mmap(): Permission denied Aug 25 17:23:41.000 [warn] Could not open "/var/lib/tor/data/cached-extrainfo" for mmap(): Permission denied Aug 25 17:23:41.000 [notice] Starting with guard context "default" Aug 25 17:23:41.000 [info] sampled_guards_update_from_consensus(): Not updating the sample guard set; we have no live consensus. Aug 25 17:23:41.000 [info] sample_reachable_filtered_entry_guards(): Trying to sample a reachable guard: We know of 0 in the USABLE_FILTERED set. Aug 25 17:23:41.000 [info] sample_reachable_filtered_entry_guards(): (That isn't enough. Trying to expand the sample.) Aug 25 17:23:41.000 [info] entry_guards_expand_sample(): Not expanding the sample guard set; we have no live consensus. Aug 25 17:23:41.000 [info] sample_reachable_filtered_entry_guards(): (After filters [b], we have 0 guards to consider.) Aug 25 17:23:41.000 [info] I learned some more directory information, but not enough to build a circuit: We have no usable consensus. Aug 25 17:23:42.000 [info] update_consensus_bootstrap_attempt_downloads(): Launching microdesc bootstrap mirror networkstatus consensus download. Aug 25 17:23:42.000 [info] sample_reachable_filtered_entry_guards(): Trying to sample a reachable guard: We know of 0 in the USABLE_FILTERED set. Aug 25 17:23:42.000 [info] sample_reachable_filtered_entry_guards(): (That isn't enough. Trying to expand the sample.) Aug 25 17:23:42.000 [info] entry_guards_expand_sample(): Not expanding the sample guard set; we have no live consensus. Aug 25 17:23:42.000 [info] sample_reachable_filtered_entry_guards(): (After filters [7], we have 0 guards to consider.) Aug 25 17:23:42.000 [info] select_entry_guard_for_circuit(): Absolutely no sampled guards were available. Marking all guards for retry and starting from top again. Aug 25 17:23:42.000 [info] directory_pick_generic_dirserver(): No router found for consensus network-status fetch; falling back to dirserver list. Aug 25 17:23:42.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:9001 ... Aug 25 17:23:42.000 [info] connection_ap_make_link(): ... application connection created and linked. Aug 25 17:23:42.000 [info] directory_send_command(): Downloading consensus from 151.80.42.103:9001 using /tor/status-vote/current/consensus-microdesc/0232AF+14C131+23D15D+27102B+49015F+D586D1+E8A9C4+ED03BB+EFCBE7.z ============================================================ T= 1535210622 (Sandbox) Caught a bad syscall attempt (syscall openat) /usr/bin/tor(+0x191dfa)[0x556a5f3f6dfa] /lib64/libpthread.so.0(open64+0x5d)[0x7f1240aca3ad] /lib64/libpthread.so.0(open64+0x5d)[0x7f1240aca3ad] /usr/bin/tor(tor_open_cloexec+0x40)[0x556a5f3dd660] /usr/bin/tor(start_writing_to_file+0x16a)[0x556a5f3f11ca] /usr/bin/tor(+0x18c2ab)[0x556a5f3f12ab] /usr/bin/tor(+0x18c3f8)[0x556a5f3f13f8] /usr/bin/tor(or_state_save+0x151)[0x556a5f31d3c1] /usr/bin/tor(+0x503dd)[0x556a5f2b53dd] /usr/bin/tor(+0x6bc71)[0x556a5f2d0c71] /usr/lib64/libevent-2.1.so.6(+0x226bd)[0x7f12419946bd] /usr/lib64/libevent-2.1.so.6(event_base_loop+0x4e7)[0x7f1241995377] /usr/bin/tor(do_main_loop+0x17a)[0x556a5f2b933a] /usr/bin/tor(tor_run_main+0x11a5)[0x556a5f2bb8b5] /usr/bin/tor(tor_main+0x3a)[0x556a5f2b3bba] /usr/bin/tor(main+0x19)[0x556a5f2b3949] /lib64/libc.so.6(__libc_start_main+0xfd)[0x7f124070805d] /usr/bin/tor(_start+0x2a)[0x556a5f2b399a]