spacepaste

  1.  
  2. Aug 25 17:23:41.000 [notice] Tor 0.3.4.7-rc (git-8465a8d84647c349) opening new log file.
  3. Aug 25 17:23:41.000 [warn] Your log may contain sensitive information - you're logging more than "notice". Don't log unless it serves an important reason. Overwrite the log afterwards.
  4. Aug 25 17:23:41.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 29968, ConnLimit_high_thresh 29904, ConnLimit_low_thresh 22476
  5. Aug 25 17:23:41.000 [info] tor_lockfile_lock(): Locking "/var/lib/tor/data/lock"
  6. Aug 25 17:23:41.000 [info] or_state_load(): Loaded state from "/var/lib/tor/data/state"
  7. Aug 25 17:23:41.000 [info] sampled_guards_update_from_consensus(): Not updating the sample guard set; we have no live consensus.
  8. Aug 25 17:23:41.000 [info] sample_reachable_filtered_entry_guards(): Trying to sample a reachable guard: We know of 0 in the USABLE_FILTERED set.
  9. Aug 25 17:23:41.000 [info] sample_reachable_filtered_entry_guards(): (That isn't enough. Trying to expand the sample.)
  10. Aug 25 17:23:41.000 [info] entry_guards_expand_sample(): Not expanding the sample guard set; we have no live consensus.
  11. Aug 25 17:23:41.000 [info] sample_reachable_filtered_entry_guards(): (After filters [b], we have 0 guards to consider.)
  12. Aug 25 17:23:41.000 [info] circuit_build_times_parse_state(): Adding 123 timeouts.
  13. Aug 25 17:23:41.000 [info] circuit_build_times_parse_state(): Loaded 1000/1000 values from 79 lines in circuit time histogram
  14. Aug 25 17:23:41.000 [info] circuit_build_times_get_xm(): Xm mode #0: 275 123
  15. Aug 25 17:23:41.000 [info] circuit_build_times_get_xm(): Xm mode #1: 325 98
  16. Aug 25 17:23:41.000 [info] circuit_build_times_get_xm(): Xm mode #2: 275 123
  17. Aug 25 17:23:41.000 [info] circuit_build_times_set_timeout(): Based on 1000 circuit times, it looks like we don't need to wait so long for circuits to finish. We will now assume a circuit is too slow to use after waiting 2 seconds.
  18. Aug 25 17:23:41.000 [info] circuit_build_times_set_timeout(): Circuit timeout data: 2410.895753ms, 60000.000000ms, Xm: 289, a: 0.758694, r: 0.163000
  19. Aug 25 17:23:41.000 [info] read_file_to_str(): Could not open "/var/lib/tor/data/router-stability": No such file or directory
  20. Aug 25 17:23:41.000 [info] init_cookie_authentication(): Generated auth cookie file in '"/var/lib/tor/data/control_auth_cookie"'.
  21. Aug 25 17:23:41.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode)
  22. Aug 25 17:23:41.000 [info] cmux_ewma_set_options(): Enabled cell_ewma algorithm because of value in CircuitPriorityHalflifeMsec in consensus; scale factor is 0.793701 per 10 seconds
  23. Aug 25 17:23:41.000 [notice] Parsing GEOIP IPv4 file /usr/share/tor/geoip.
  24. Aug 25 17:23:41.000 [notice] Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
  25. Aug 25 17:23:41.000 [info] add_predicted_port(): New port prediction added. Will continue predictive circ building for 3271 more seconds.
  26. Aug 25 17:23:41.000 [info] crypto_global_init(): NOT using OpenSSL engine support.
  27. Aug 25 17:23:41.000 [info] evaluate_evp_for_aes(): This version of OpenSSL has a known-good EVP counter-mode implementation. Using it.
  28. Aug 25 17:23:41.000 [notice] We were built to run on a 64-bit CPU, with OpenSSL 1.0.1 or later, but with a version of OpenSSL that apparently lacks accelerated support for the NIST P-224 and P-256 groups. Building openssl with such support (using the enable-ec_nistp_64_gcc_128 option when configuring it) would make ECDH much faster.
  29. Aug 25 17:23:41.000 [notice] Bootstrapped 0%: Starting
  30. Aug 25 17:23:41.000 [warn] Could not open "/var/lib/tor/data/cached-certs": Permission denied
  31. Aug 25 17:23:41.000 [warn] Could not open "/var/lib/tor/data/cached-consensus": Permission denied
  32. Aug 25 17:23:41.000 [warn] Could not open "/var/lib/tor/data/unverified-consensus": Permission denied
  33. Aug 25 17:23:41.000 [warn] Could not open "/var/lib/tor/data/cached-microdesc-consensus": Permission denied
  34. Aug 25 17:23:41.000 [warn] Could not open "/var/lib/tor/data/unverified-microdesc-consensus": Permission denied
  35. Aug 25 17:23:41.000 [warn] Could not open "/var/lib/tor/data/cached-microdescs" for mmap(): Permission denied
  36. Aug 25 17:23:41.000 [warn] Could not open "/var/lib/tor/data/cached-microdescs.new": Permission denied
  37. Aug 25 17:23:41.000 [info] microdesc_cache_reload(): Reloaded microdescriptor cache. Found 0 descriptors.
  38. Aug 25 17:23:41.000 [warn] Could not open "/var/lib/tor/data/cached-descriptors" for mmap(): Permission denied
  39. Aug 25 17:23:41.000 [warn] Could not open "/var/lib/tor/data/cached-extrainfo" for mmap(): Permission denied
  40. Aug 25 17:23:41.000 [notice] Starting with guard context "default"
  41. Aug 25 17:23:41.000 [info] sampled_guards_update_from_consensus(): Not updating the sample guard set; we have no live consensus.
  42. Aug 25 17:23:41.000 [info] sample_reachable_filtered_entry_guards(): Trying to sample a reachable guard: We know of 0 in the USABLE_FILTERED set.
  43. Aug 25 17:23:41.000 [info] sample_reachable_filtered_entry_guards(): (That isn't enough. Trying to expand the sample.)
  44. Aug 25 17:23:41.000 [info] entry_guards_expand_sample(): Not expanding the sample guard set; we have no live consensus.
  45. Aug 25 17:23:41.000 [info] sample_reachable_filtered_entry_guards(): (After filters [b], we have 0 guards to consider.)
  46. Aug 25 17:23:41.000 [info] I learned some more directory information, but not enough to build a circuit: We have no usable consensus.
  47. Aug 25 17:23:42.000 [info] update_consensus_bootstrap_attempt_downloads(): Launching microdesc bootstrap mirror networkstatus consensus download.
  48. Aug 25 17:23:42.000 [info] sample_reachable_filtered_entry_guards(): Trying to sample a reachable guard: We know of 0 in the USABLE_FILTERED set.
  49. Aug 25 17:23:42.000 [info] sample_reachable_filtered_entry_guards(): (That isn't enough. Trying to expand the sample.)
  50. Aug 25 17:23:42.000 [info] entry_guards_expand_sample(): Not expanding the sample guard set; we have no live consensus.
  51. Aug 25 17:23:42.000 [info] sample_reachable_filtered_entry_guards(): (After filters [7], we have 0 guards to consider.)
  52. Aug 25 17:23:42.000 [info] select_entry_guard_for_circuit(): Absolutely no sampled guards were available. Marking all guards for retry and starting from top again.
  53. Aug 25 17:23:42.000 [info] directory_pick_generic_dirserver(): No router found for consensus network-status fetch; falling back to dirserver list.
  54. Aug 25 17:23:42.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:9001 ...
  55. Aug 25 17:23:42.000 [info] connection_ap_make_link(): ... application connection created and linked.
  56. Aug 25 17:23:42.000 [info] directory_send_command(): Downloading consensus from 151.80.42.103:9001 using /tor/status-vote/current/consensus-microdesc/0232AF+14C131+23D15D+27102B+49015F+D586D1+E8A9C4+ED03BB+EFCBE7.z
  57. ============================================================ T= 1535210622
  58. (Sandbox) Caught a bad syscall attempt (syscall openat)
  59. /usr/bin/tor(+0x191dfa)[0x556a5f3f6dfa]
  60. /lib64/libpthread.so.0(open64+0x5d)[0x7f1240aca3ad]
  61. /lib64/libpthread.so.0(open64+0x5d)[0x7f1240aca3ad]
  62. /usr/bin/tor(tor_open_cloexec+0x40)[0x556a5f3dd660]
  63. /usr/bin/tor(start_writing_to_file+0x16a)[0x556a5f3f11ca]
  64. /usr/bin/tor(+0x18c2ab)[0x556a5f3f12ab]
  65. /usr/bin/tor(+0x18c3f8)[0x556a5f3f13f8]
  66. /usr/bin/tor(or_state_save+0x151)[0x556a5f31d3c1]
  67. /usr/bin/tor(+0x503dd)[0x556a5f2b53dd]
  68. /usr/bin/tor(+0x6bc71)[0x556a5f2d0c71]
  69. /usr/lib64/libevent-2.1.so.6(+0x226bd)[0x7f12419946bd]
  70. /usr/lib64/libevent-2.1.so.6(event_base_loop+0x4e7)[0x7f1241995377]
  71. /usr/bin/tor(do_main_loop+0x17a)[0x556a5f2b933a]
  72. /usr/bin/tor(tor_run_main+0x11a5)[0x556a5f2bb8b5]
  73. /usr/bin/tor(tor_main+0x3a)[0x556a5f2b3bba]
  74. /usr/bin/tor(main+0x19)[0x556a5f2b3949]
  75. /lib64/libc.so.6(__libc_start_main+0xfd)[0x7f124070805d]
  76. /usr/bin/tor(_start+0x2a)[0x556a5f2b399a]
  77.