Ticket #24367: 04f4f30af76cdedff990601a2e2f6387077290a3_24367.log

File 04f4f30af76cdedff990601a2e2f6387077290a3_24367.log, 152.0 KB (added by gk, 10 months ago)
Line 
1Dec 14 19:48:12.000 [notice] Tor 0.3.2.7-rc (git-04f4f30af76cdedf) opening new log file.
2Dec 14 19:48:12.088 [notice] Tor 0.3.2.7-rc (git-04f4f30af76cdedf) running on Linux with Libevent 2.1.8-stable, OpenSSL 1.1.0g, Zlib 1.2.8, Liblzma 5.2.2, and Libzstd 1.3.2.
3Dec 14 19:48:12.088 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning
4Dec 14 19:48:12.088 [notice] Read configuration file "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/torrc-defaults".
5Dec 14 19:48:12.088 [notice] Read configuration file "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/torrc".
6Dec 14 19:48:12.095 [notice] Scheduler type KIST has been enabled.
7Dec 14 19:48:12.095 [notice] Opening Control listener on 127.0.0.1:9151
8Dec 14 19:48:12.095 [notice] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
9Dec 14 19:48:12.000 [warn] Your log may contain sensitive information - you're logging more than "notice". Don't log unless it serves an important reason. Overwrite the log afterwards.
10Dec 14 19:48:12.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 1048544, ConnLimit_high_thresh 1048480, ConnLimit_low_thresh 786408
11Dec 14 19:48:12.000 [info] tor_lockfile_lock(): Locking "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/lock"
12Dec 14 19:48:12.000 [info] or_state_load(): Initialized state
13Dec 14 19:48:12.000 [info] circuit_build_times_parse_state(): Adding 0 timeouts.
14Dec 14 19:48:12.000 [info] circuit_build_times_parse_state(): Loaded 0/0 values from 0 lines in circuit time histogram
15Dec 14 19:48:12.000 [info] or_state_save(): Saved state to "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/state"
16Dec 14 19:48:12.000 [info] read_file_to_str(): Could not open "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/router-stability": No such file or directory
17Dec 14 19:48:12.000 [info] init_cookie_authentication(): Generated auth cookie file in '"/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/control_auth_cookie"'.
18Dec 14 19:48:12.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode)
19Dec 14 19:48:12.000 [info] cell_ewma_set_scale_factor(): Disabled cell_ewma algorithm because of value in Default value
20Dec 14 19:48:12.000 [notice] Parsing GEOIP IPv4 file /home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/geoip.
21Dec 14 19:48:12.000 [notice] Parsing GEOIP IPv6 file /home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/geoip6.
22Dec 14 19:48:12.000 [info] add_predicted_port(): New port prediction added. Will continue predictive circ building for 3295 more seconds.
23Dec 14 19:48:12.000 [info] crypto_global_init(): NOT using OpenSSL engine support.
24Dec 14 19:48:12.000 [info] evaluate_evp_for_aes(): This version of OpenSSL has a known-good EVP counter-mode implementation. Using it.
25Dec 14 19:48:12.000 [notice] Bootstrapped 0%: Starting
26Dec 14 19:48:12.000 [info] read_file_to_str(): Could not open "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/cached-certs": No such file or directory
27Dec 14 19:48:12.000 [info] read_file_to_str(): Could not open "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/cached-consensus": No such file or directory
28Dec 14 19:48:12.000 [info] read_file_to_str(): Could not open "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/unverified-consensus": No such file or directory
29Dec 14 19:48:12.000 [info] read_file_to_str(): Could not open "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/cached-microdesc-consensus": No such file or directory
30Dec 14 19:48:12.000 [info] read_file_to_str(): Could not open "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/unverified-microdesc-consensus": No such file or directory
31Dec 14 19:48:12.000 [info] tor_mmap_file(): Could not open "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/cached-microdescs" for mmap(): No such file or directory
32Dec 14 19:48:12.000 [info] read_file_to_str(): Could not open "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/cached-microdescs.new": No such file or directory
33Dec 14 19:48:12.000 [info] microdesc_cache_reload(): Reloaded microdescriptor cache. Found 0 descriptors.
34Dec 14 19:48:12.000 [info] tor_mmap_file(): Could not open "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/cached-descriptors" for mmap(): No such file or directory
35Dec 14 19:48:12.000 [info] tor_mmap_file(): Could not open "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/cached-extrainfo" for mmap(): No such file or directory
36Dec 14 19:48:12.000 [notice] Starting with guard context "default"
37Dec 14 19:48:12.000 [info] sampled_guards_update_from_consensus(): Not updating the sample guard set; we have no live consensus.
38Dec 14 19:48:12.000 [info] sample_reachable_filtered_entry_guards(): Trying to sample a reachable guard: We know of 0 in the USABLE_FILTERED set.
39Dec 14 19:48:12.000 [info] sample_reachable_filtered_entry_guards():   (That isn't enough. Trying to expand the sample.)
40Dec 14 19:48:12.000 [info] entry_guards_expand_sample(): Not expanding the sample guard set; we have no live consensus.
41Dec 14 19:48:12.000 [info] sample_reachable_filtered_entry_guards():   (After filters [b], we have 0 guards to consider.)
42Dec 14 19:48:12.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
43Dec 14 19:48:12.000 [notice] Delaying directory fetches: DisableNetwork is set.
44Dec 14 19:48:12.000 [info] I learned some more directory information, but not enough to build a circuit: DisableNetwork is set.
45Dec 14 19:48:12.000 [notice] New control connection opened from 127.0.0.1.
46Dec 14 19:48:12.000 [info] handle_control_authenticate(): Authenticated control connection (15)
47Dec 14 19:48:12.000 [info] handle_control_takeownership(): Control connection 15 has taken ownership of this Tor instance.
48Dec 14 19:48:12.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
49Dec 14 19:48:12.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
50Dec 14 19:48:12.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
51Dec 14 19:48:12.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
52Dec 14 19:48:12.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
53Dec 14 19:48:12.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
54Dec 14 19:48:12.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
55Dec 14 19:48:12.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
56Dec 14 19:48:12.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
57Dec 14 19:48:12.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
58Dec 14 19:48:12.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
59Dec 14 19:48:12.000 [notice] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
60Dec 14 19:48:12.000 [notice] Tor 0.3.2.7-rc (git-04f4f30af76cdedf) opening log file.
61Dec 14 19:48:12.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 1048544, ConnLimit_high_thresh 1048480, ConnLimit_low_thresh 786408
62Dec 14 19:48:12.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode)
63Dec 14 19:48:12.000 [info] cell_ewma_set_scale_factor(): Disabled cell_ewma algorithm because of value in Default value
64Dec 14 19:48:12.000 [info] sampled_guards_update_from_consensus(): Not updating the sample guard set; we have no live consensus.
65Dec 14 19:48:12.000 [info] sample_reachable_filtered_entry_guards(): Trying to sample a reachable guard: We know of 0 in the USABLE_FILTERED set.
66Dec 14 19:48:12.000 [info] sample_reachable_filtered_entry_guards():   (That isn't enough. Trying to expand the sample.)
67Dec 14 19:48:12.000 [info] entry_guards_expand_sample(): Not expanding the sample guard set; we have no live consensus.
68Dec 14 19:48:12.000 [info] sample_reachable_filtered_entry_guards():   (After filters [b], we have 0 guards to consider.)
69Dec 14 19:48:12.000 [notice] New control connection opened from 127.0.0.1.
70Dec 14 19:48:12.000 [info] handle_control_authenticate(): Authenticated control connection (9)
71Dec 14 19:48:13.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
72Dec 14 19:48:13.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
73Dec 14 19:48:13.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
74Dec 14 19:48:14.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
75Dec 14 19:48:14.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
76Dec 14 19:48:14.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
77Dec 14 19:48:15.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
78Dec 14 19:48:15.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
79Dec 14 19:48:15.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
80Dec 14 19:48:16.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
81Dec 14 19:48:16.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
82Dec 14 19:48:16.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
83Dec 14 19:48:17.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
84Dec 14 19:48:17.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
85Dec 14 19:48:17.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
86Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
87Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
88Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
89Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
90Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
91Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
92Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
93Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
94Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
95Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
96Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
97Dec 14 19:48:18.000 [notice] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
98Dec 14 19:48:18.000 [notice] Tor 0.3.2.7-rc (git-04f4f30af76cdedf) opening log file.
99Dec 14 19:48:18.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 1048544, ConnLimit_high_thresh 1048480, ConnLimit_low_thresh 786408
100Dec 14 19:48:18.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode)
101Dec 14 19:48:18.000 [info] cell_ewma_set_scale_factor(): Disabled cell_ewma algorithm because of value in Default value
102Dec 14 19:48:18.000 [info] options_act(): Changed to using entry guards or bridges, or changed preferred or excluded node lists. Abandoning previous circuits.
103Dec 14 19:48:18.000 [notice] Switching to guard context "bridges" (was using "default")
104Dec 14 19:48:18.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
105Dec 14 19:48:18.000 [info] sample_reachable_filtered_entry_guards(): Trying to sample a reachable guard: We know of 0 in the USABLE_FILTERED set.
106Dec 14 19:48:18.000 [info] sample_reachable_filtered_entry_guards():   (That isn't enough. Trying to expand the sample.)
107Dec 14 19:48:18.000 [info] entry_guards_expand_sample(): Expanding the sample guard set. We have 0 guards in the sample, and 5 eligible guards to extend it with.
108Dec 14 19:48:18.000 [info] entry_guards_expand_sample(): Not expanding the guard sample any further; just ran out of eligible guards
109Dec 14 19:48:18.000 [info] sample_reachable_filtered_entry_guards():   (After filters [b], we have 5 guards to consider.)
110Dec 14 19:48:18.000 [info] sample_reachable_filtered_entry_guards():   (Selected [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) at 83.212.101.3:80.)
111Dec 14 19:48:18.000 [info] sample_reachable_filtered_entry_guards(): Trying to sample a reachable guard: We know of 5 in the USABLE_FILTERED set.
112Dec 14 19:48:18.000 [info] sample_reachable_filtered_entry_guards():   (That isn't enough. Trying to expand the sample.)
113Dec 14 19:48:18.000 [info] entry_guards_expand_sample(): Expanding the sample guard set. We have 5 guards in the sample, and 0 eligible guards to extend it with.
114Dec 14 19:48:18.000 [info] entry_guards_expand_sample(): Not expanding the guard sample any further; just ran out of eligible guards
115Dec 14 19:48:18.000 [info] sample_reachable_filtered_entry_guards():   (After filters [b], we have 4 guards to consider.)
116Dec 14 19:48:18.000 [info] sample_reachable_filtered_entry_guards():   (Selected [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980.)
117Dec 14 19:48:18.000 [info] sample_reachable_filtered_entry_guards(): Trying to sample a reachable guard: We know of 5 in the USABLE_FILTERED set.
118Dec 14 19:48:18.000 [info] sample_reachable_filtered_entry_guards():   (That isn't enough. Trying to expand the sample.)
119Dec 14 19:48:18.000 [info] entry_guards_expand_sample(): Expanding the sample guard set. We have 5 guards in the sample, and 0 eligible guards to extend it with.
120Dec 14 19:48:18.000 [info] entry_guards_expand_sample(): Not expanding the guard sample any further; just ran out of eligible guards
121Dec 14 19:48:18.000 [info] sample_reachable_filtered_entry_guards():   (After filters [b], we have 3 guards to consider.)
122Dec 14 19:48:18.000 [info] sample_reachable_filtered_entry_guards():   (Selected [bridge] ($AF9F66B7B04F8FF6F32D455F05135250A16543C9) at 169.229.59.74:31493.)
123Dec 14 19:48:18.000 [info] entry_guards_update_primary(): Primary entry guards have changed. New primary guard list is:
124Dec 14 19:48:18.000 [info] entry_guards_update_primary():   1/3: [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) at 83.212.101.3:80
125Dec 14 19:48:18.000 [info] entry_guards_update_primary():   2/3: [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980
126Dec 14 19:48:18.000 [info] entry_guards_update_primary():   3/3: [bridge] ($AF9F66B7B04F8FF6F32D455F05135250A16543C9) at 169.229.59.74:31493
127Dec 14 19:48:18.000 [info] update_consensus_networkstatus_fetch_time_impl(): No live microdesc consensus; we should fetch one immediately.
128Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
129Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
130Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
131Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
132Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
133Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
134Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
135Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
136Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
137Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
138Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
139Dec 14 19:48:18.000 [notice] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
140Dec 14 19:48:18.000 [notice] Tor 0.3.2.7-rc (git-04f4f30af76cdedf) opening log file.
141Dec 14 19:48:18.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 1048544, ConnLimit_high_thresh 1048480, ConnLimit_low_thresh 786408
142Dec 14 19:48:18.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode)
143Dec 14 19:48:18.000 [info] cell_ewma_set_scale_factor(): Disabled cell_ewma algorithm because of value in Default value
144Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
145Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
146Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
147Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
148Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
149Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
150Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
151Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
152Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
153Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
154Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
155Dec 14 19:48:18.000 [notice] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
156Dec 14 19:48:18.000 [notice] Tor 0.3.2.7-rc (git-04f4f30af76cdedf) opening log file.
157Dec 14 19:48:18.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 1048544, ConnLimit_high_thresh 1048480, ConnLimit_low_thresh 786408
158Dec 14 19:48:18.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode)
159Dec 14 19:48:18.000 [info] cell_ewma_set_scale_factor(): Disabled cell_ewma algorithm because of value in Default value
160Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
161Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
162Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
163Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
164Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
165Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
166Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
167Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
168Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
169Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
170Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
171Dec 14 19:48:18.000 [notice] Opening Socks listener on 127.0.0.1:9150
172Dec 14 19:48:18.000 [notice] Tor 0.3.2.7-rc (git-04f4f30af76cdedf) opening log file.
173Dec 14 19:48:18.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 1048544, ConnLimit_high_thresh 1048480, ConnLimit_low_thresh 786408
174Dec 14 19:48:18.000 [info] parse_transport_line(): Pluggable transport proxy (fte exec ./TorBrowser/Tor/PluggableTransports/fteproxy.bin --managed) does not provide any needed transports and will not be launched.
175Dec 14 19:48:18.000 [info] parse_transport_line(): Pluggable transport proxy (meek exec ./TorBrowser/Tor/PluggableTransports/meek-client-torbrowser -- ./TorBrowser/Tor/PluggableTransports/meek-client) does not provide any needed transports and will not be launched.
176Dec 14 19:48:18.000 [info] parse_transport_line(): Pluggable transport proxy (snowflake exec ./TorBrowser/Tor/PluggableTransports/snowflake-client -url https://snowflake-reg.appspot.com/ -front www.google.com -ice stun:stun.l.google.com:19302) does not provide any needed transports and will not be launched.
177Dec 14 19:48:18.000 [info] launch_managed_proxy(): Managed proxy at './TorBrowser/Tor/PluggableTransports/obfs4proxy' has spawned with PID '14343'.
178Dec 14 19:48:18.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode)
179Dec 14 19:48:18.000 [info] cell_ewma_set_scale_factor(): Disabled cell_ewma algorithm because of value in Default value
180Dec 14 19:48:18.000 [notice] Renaming old configuration file to "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/torrc.orig.1"
181Dec 14 19:48:18.000 [info] should_delay_dir_fetches(): Delaying dir fetches (no running bridges known)
182Dec 14 19:48:18.000 [info] should_delay_dir_fetches(): Delaying dir fetches (no running bridges known)
183Dec 14 19:48:18.000 [info] should_delay_dir_fetches(): Delaying dir fetches (no running bridges known)
184Dec 14 19:48:18.000 [info] handle_proxy_line(): Got a line from managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy': (VERSION 1)
185Dec 14 19:48:18.000 [info] handle_proxy_line(): Got a line from managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy': (CMETHOD obfs2 socks5 127.0.0.1:41179)
186Dec 14 19:48:18.000 [info] parse_cmethod_line(): Transport obfs2 at 127.0.0.1:41179 with SOCKS 3. Attached to managed proxy.
187Dec 14 19:48:18.000 [info] handle_proxy_line(): Got a line from managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy': (CMETHOD obfs3 socks5 127.0.0.1:43563)
188Dec 14 19:48:18.000 [info] parse_cmethod_line(): Transport obfs3 at 127.0.0.1:43563 with SOCKS 3. Attached to managed proxy.
189Dec 14 19:48:18.000 [info] handle_proxy_line(): Got a line from managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy': (CMETHOD obfs4 socks5 127.0.0.1:34913)
190Dec 14 19:48:18.000 [info] parse_cmethod_line(): Transport obfs4 at 127.0.0.1:34913 with SOCKS 3. Attached to managed proxy.
191Dec 14 19:48:18.000 [info] handle_proxy_line(): Got a line from managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy': (CMETHOD scramblesuit socks5 127.0.0.1:43791)
192Dec 14 19:48:18.000 [info] parse_cmethod_line(): Transport scramblesuit at 127.0.0.1:43791 with SOCKS 3. Attached to managed proxy.
193Dec 14 19:48:18.000 [info] handle_proxy_line(): Got a line from managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy': (CMETHODS DONE)
194Dec 14 19:48:18.000 [info] handle_methods_done(): Client managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy' configuration completed!
195Dec 14 19:48:18.000 [info] register_client_proxy(): Successfully registered transport obfs2
196Dec 14 19:48:18.000 [info] register_client_proxy(): Successfully registered transport obfs3
197Dec 14 19:48:18.000 [info] register_client_proxy(): Successfully registered transport obfs4
198Dec 14 19:48:18.000 [info] register_client_proxy(): Successfully registered transport scramblesuit
199Dec 14 19:48:19.000 [info] should_delay_dir_fetches(): Delaying dir fetches (no running bridges known)
200Dec 14 19:48:19.000 [info] should_delay_dir_fetches(): Delaying dir fetches (no running bridges known)
201Dec 14 19:48:19.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:47779 ...
202Dec 14 19:48:19.000 [info] connection_ap_make_link(): ... application connection created and linked.
203Dec 14 19:48:19.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:80 ...
204Dec 14 19:48:19.000 [info] connection_ap_make_link(): ... application connection created and linked.
205Dec 14 19:48:19.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:31493 ...
206Dec 14 19:48:19.000 [info] connection_ap_make_link(): ... application connection created and linked.
207Dec 14 19:48:19.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:46328 ...
208Dec 14 19:48:19.000 [info] connection_ap_make_link(): ... application connection created and linked.
209Dec 14 19:48:19.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:38980 ...
210Dec 14 19:48:19.000 [info] connection_ap_make_link(): ... application connection created and linked.
211Dec 14 19:48:19.000 [info] should_delay_dir_fetches(): Delaying dir fetches (no running bridges known)
212Dec 14 19:48:19.000 [info] onion_pick_cpath_exit(): Using requested exit node '$4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A~4C331FA9B3D1D6D8FB0 at 109.105.109.163'
213Dec 14 19:48:19.000 [info] circuit_handle_first_hop(): Next router is [scrubbed]: Not connected. Connecting.
214Dec 14 19:48:19.000 [notice] Bootstrapped 5%: Connecting to directory server
215Dec 14 19:48:19.000 [info] connection_or_set_canonical(): Channel 0 chose an idle timeout of 182.
216Dec 14 19:48:19.000 [info] connection_or_set_identity_digest(): Set identity digest for 0x613000000ac0 ([scrubbed]): 4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A <unset>.
217Dec 14 19:48:19.000 [info] connection_or_set_identity_digest():    (Previously: 0000000000000000000000000000000000000000 <unset>)
218Dec 14 19:48:19.000 [info] get_transport_by_bridge_addrport(): Looked up transport for 109.105.109.163:47779: found obfs3.
219Dec 14 19:48:19.000 [info] onion_pick_cpath_exit(): Using requested exit node '$A09D536DD1752D542E1FBB3C9CE4449D51298239~A09D536DD1752D542E1 at 83.212.101.3'
220Dec 14 19:48:19.000 [info] circuit_handle_first_hop(): Next router is [scrubbed]: Not connected. Connecting.
221Dec 14 19:48:19.000 [info] connection_or_set_canonical(): Channel 0 chose an idle timeout of 236.
222Dec 14 19:48:19.000 [info] connection_or_set_identity_digest(): Set identity digest for 0x613000000c80 ([scrubbed]): A09D536DD1752D542E1FBB3C9CE4449D51298239 <unset>.
223Dec 14 19:48:19.000 [info] connection_or_set_identity_digest():    (Previously: 0000000000000000000000000000000000000000 <unset>)
224Dec 14 19:48:19.000 [info] get_transport_by_bridge_addrport(): Looked up transport for 83.212.101.3:80: found obfs3.
225Dec 14 19:48:19.000 [info] onion_pick_cpath_exit(): Using requested exit node '$AF9F66B7B04F8FF6F32D455F05135250A16543C9~AF9F66B7B04F8FF6F32 at 169.229.59.74'
226Dec 14 19:48:19.000 [info] circuit_handle_first_hop(): Next router is [scrubbed]: Not connected. Connecting.
227Dec 14 19:48:19.000 [info] connection_or_set_canonical(): Channel 0 chose an idle timeout of 260.
228Dec 14 19:48:19.000 [info] connection_or_set_identity_digest(): Set identity digest for 0x613000000e40 ([scrubbed]): AF9F66B7B04F8FF6F32D455F05135250A16543C9 <unset>.
229Dec 14 19:48:19.000 [info] connection_or_set_identity_digest():    (Previously: 0000000000000000000000000000000000000000 <unset>)
230Dec 14 19:48:19.000 [info] get_transport_by_bridge_addrport(): Looked up transport for 169.229.59.74:31493: found obfs3.
231Dec 14 19:48:19.000 [info] onion_pick_cpath_exit(): Using requested exit node '$1E05F577A0EC0213F971D81BF4D86A9E4E8229ED~1E05F577A0EC0213F97 at 109.105.109.163'
232Dec 14 19:48:19.000 [info] circuit_handle_first_hop(): Next router is [scrubbed]: Not connected. Connecting.
233Dec 14 19:48:19.000 [info] connection_or_set_canonical(): Channel 0 chose an idle timeout of 241.
234Dec 14 19:48:19.000 [info] connection_or_set_identity_digest(): Set identity digest for 0x613000001000 ([scrubbed]): 1E05F577A0EC0213F971D81BF4D86A9E4E8229ED <unset>.
235Dec 14 19:48:19.000 [info] connection_or_set_identity_digest():    (Previously: 0000000000000000000000000000000000000000 <unset>)
236Dec 14 19:48:19.000 [info] get_transport_by_bridge_addrport(): Looked up transport for 109.105.109.163:38980: found obfs3.
237Dec 14 19:48:19.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for circuit' state. Leaving it on buffer.
238Dec 14 19:48:19.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for circuit' state. Leaving it on buffer.
239Dec 14 19:48:19.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for circuit' state. Leaving it on buffer.
240Dec 14 19:48:19.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for circuit' state. Leaving it on buffer.
241Dec 14 19:48:19.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for circuit' state. Leaving it on buffer.
242Dec 14 19:48:19.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for circuit' state. Leaving it on buffer.
243Dec 14 19:48:19.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for circuit' state. Leaving it on buffer.
244Dec 14 19:48:19.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for circuit' state. Leaving it on buffer.
245Dec 14 19:48:19.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for circuit' state. Leaving it on buffer.
246Dec 14 19:48:19.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for circuit' state. Leaving it on buffer.
247Dec 14 19:48:19.000 [notice] Bootstrapped 10%: Finishing handshake with directory server
248Dec 14 19:48:19.000 [info] parse_socks_client(): SOCKS 5 client: continuing without authentication
249Dec 14 19:48:19.000 [info] parse_socks_client(): SOCKS 5 client: continuing without authentication
250Dec 14 19:48:19.000 [info] parse_socks_client(): SOCKS 5 client: continuing without authentication
251Dec 14 19:48:19.000 [info] parse_socks_client(): SOCKS 5 client: continuing without authentication
252Dec 14 19:48:19.000 [info] connection_read_proxy_handshake(): Proxy Client: connection to 109.105.109.163:38980 successful
253Dec 14 19:48:19.000 [info] connection_read_proxy_handshake(): Proxy Client: connection to 109.105.109.163:47779 successful
254Dec 14 19:48:19.000 [info] channel_tls_process_versions_cell(): Negotiated version 5 with [scrubbed]:47779; Waiting for CERTS cell
255Dec 14 19:48:19.000 [info] connection_or_client_learned_peer_id(): learned peer id for 0x613000000ac0 ([scrubbed]): 4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A, MThq6BCnQxjKVDT1dmvJtDGnyQ6qvDIb+7lZd7NSpUk
256Dec 14 19:48:19.000 [info] connection_or_client_learned_peer_id(): (we had no Ed25519 ID in mind when we made this connection.
257Dec 14 19:48:19.000 [info] connection_or_set_identity_digest(): Set identity digest for 0x613000000ac0 ([scrubbed]): 4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A MThq6BCnQxjKVDT1dmvJtDGnyQ6qvDIb+7lZd7NSpUk.
258Dec 14 19:48:19.000 [info] connection_or_set_identity_digest():    (Previously: 4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A <unset>)
259Dec 14 19:48:19.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:47779: Authenticated it with RSA and Ed25519
260Dec 14 19:48:19.000 [info] connection_or_set_canonical(): Channel 1 chose an idle timeout of 224.
261Dec 14 19:48:19.000 [notice] Bootstrapped 15%: Establishing an encrypted directory connection
262Dec 14 19:48:19.000 [info] circuit_send_first_onion_skin(): First hop: finished sending CREATE_FAST cell to '<unnamed>'
263Dec 14 19:48:19.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:47779; OR connection is now open, using protocol version 5. Its ID digest is 4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A. Our address is apparently 151.177.15.217.
264Dec 14 19:48:19.000 [info] channel_tls_process_versions_cell(): Negotiated version 5 with [scrubbed]:38980; Waiting for CERTS cell
265Dec 14 19:48:19.000 [info] connection_or_client_learned_peer_id(): learned peer id for 0x613000001000 ([scrubbed]): 1E05F577A0EC0213F971D81BF4D86A9E4E8229ED, lR1FYvChO8Oh8cjGgo5gGGLayzeiYX3D9oUOuKUcito
266Dec 14 19:48:19.000 [info] connection_or_client_learned_peer_id(): (we had no Ed25519 ID in mind when we made this connection.
267Dec 14 19:48:19.000 [info] connection_or_set_identity_digest(): Set identity digest for 0x613000001000 ([scrubbed]): 1E05F577A0EC0213F971D81BF4D86A9E4E8229ED lR1FYvChO8Oh8cjGgo5gGGLayzeiYX3D9oUOuKUcito.
268Dec 14 19:48:19.000 [info] connection_or_set_identity_digest():    (Previously: 1E05F577A0EC0213F971D81BF4D86A9E4E8229ED <unset>)
269Dec 14 19:48:19.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:38980: Authenticated it with RSA and Ed25519
270Dec 14 19:48:19.000 [info] connection_or_set_canonical(): Channel 4 chose an idle timeout of 233.
271Dec 14 19:48:19.000 [info] circuit_send_first_onion_skin(): First hop: finished sending CREATE_FAST cell to '<unnamed>'
272Dec 14 19:48:19.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:38980; OR connection is now open, using protocol version 5. Its ID digest is 1E05F577A0EC0213F971D81BF4D86A9E4E8229ED. Our address is apparently 151.177.15.217.
273Dec 14 19:48:19.000 [info] circuit_finish_handshake(): Finished building circuit hop:
274Dec 14 19:48:19.000 [info] internal circ (length 1, last hop 4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open)
275Dec 14 19:48:19.000 [info] circuit_build_no_more_hops(): circuit built!
276Dec 14 19:48:19.000 [notice] Bootstrapped 20%: Asking for networkstatus consensus
277Dec 14 19:48:19.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open)
278Dec 14 19:48:19.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
279Dec 14 19:48:19.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 4231647043 to begin stream 28242.
280Dec 14 19:48:19.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 4231647043
281Dec 14 19:48:19.000 [info] connection_ap_handshake_send_begin(): Sending up to 131 + 0 bytes of queued-up data
282Dec 14 19:48:19.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 4231647043 streamid 28242 after 0 seconds.
283Dec 14 19:48:19.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open)
284Dec 14 19:48:19.000 [info] circuit_finish_handshake(): Finished building circuit hop:
285Dec 14 19:48:19.000 [info] internal circ (length 1, last hop 1E05F577A0EC0213F971D81BF4D86A9E4E8229ED): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open)
286Dec 14 19:48:19.000 [info] circuit_build_no_more_hops(): circuit built!
287Dec 14 19:48:19.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open)
288Dec 14 19:48:19.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
289Dec 14 19:48:19.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 3321416422 to begin stream 44333.
290Dec 14 19:48:19.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 3321416422
291Dec 14 19:48:19.000 [info] connection_ap_handshake_send_begin(): Sending up to 131 + 0 bytes of queued-up data
292Dec 14 19:48:19.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 28242. Removing stream.
293Dec 14 19:48:19.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
294Dec 14 19:48:19.000 [info] make_guard_confirmed(): Marking [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779 as a confirmed guard (index 0)
295Dec 14 19:48:19.000 [info] entry_guards_update_primary(): Primary entry guards have changed. New primary guard list is:
296Dec 14 19:48:19.000 [info] entry_guards_update_primary():   1/3: [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779 (confirmed)
297Dec 14 19:48:19.000 [info] entry_guards_update_primary():   2/3: [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) at 83.212.101.3:80
298Dec 14 19:48:19.000 [info] entry_guards_update_primary():   3/3: [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980
299Dec 14 19:48:19.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779
300Dec 14 19:48:19.000 [info] handle_response_fetch_desc(): Received server info (body size 2242) from server '109.105.109.163:47779'
301Dec 14 19:48:19.000 [info] router_load_routers_from_string(): 1 elements to add
302Dec 14 19:48:19.000 [info] rewrite_node_address_for_bridge(): Adjusted bridge routerinfo for 'ndnop2' to match configured address 109.105.109.163:47779.
303Dec 14 19:48:19.000 [notice] new bridge descriptor 'ndnop2' (fresh): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A~ndnop2 at 109.105.109.163
304Dec 14 19:48:19.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
305Dec 14 19:48:19.000 [info] I learned some more directory information, but not enough to build a circuit: We have no usable consensus.
306Dec 14 19:48:19.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
307Dec 14 19:48:19.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 3321416422 streamid 44333 after 0 seconds.
308Dec 14 19:48:19.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open)
309Dec 14 19:48:19.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 44333. Removing stream.
310Dec 14 19:48:19.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
311Dec 14 19:48:19.000 [info] make_guard_confirmed(): Marking [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980 as a confirmed guard (index 1)
312Dec 14 19:48:19.000 [info] entry_guards_update_primary(): Primary entry guards have changed. New primary guard list is:
313Dec 14 19:48:19.000 [info] entry_guards_update_primary():   1/3: [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779 (confirmed)
314Dec 14 19:48:19.000 [info] entry_guards_update_primary():   2/3: [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980 (confirmed)
315Dec 14 19:48:19.000 [info] entry_guards_update_primary():   3/3: [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) at 83.212.101.3:80
316Dec 14 19:48:19.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980
317Dec 14 19:48:19.000 [info] handle_response_fetch_desc(): Received server info (body size 2241) from server '109.105.109.163:38980'
318Dec 14 19:48:19.000 [info] router_load_routers_from_string(): 1 elements to add
319Dec 14 19:48:19.000 [info] rewrite_node_address_for_bridge(): Adjusted bridge routerinfo for 'ndnop0' to match configured address 109.105.109.163:38980.
320Dec 14 19:48:19.000 [notice] new bridge descriptor 'ndnop0' (fresh): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED~ndnop0 at 109.105.109.163
321Dec 14 19:48:19.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
322Dec 14 19:48:19.000 [info] I learned some more directory information, but not enough to build a circuit: We have no usable consensus.
323Dec 14 19:48:19.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
324Dec 14 19:48:19.000 [info] connection_read_proxy_handshake(): Proxy Client: connection to 83.212.101.3:80 successful
325Dec 14 19:48:20.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:80; Waiting for CERTS cell
326Dec 14 19:48:20.000 [info] connection_or_client_learned_peer_id(): learned peer id for 0x613000000c80 ([scrubbed]): A09D536DD1752D542E1FBB3C9CE4449D51298239, qylnnRfv53jY0IFgGsW+1WildRdnw13ytLNqePE2c5w
327Dec 14 19:48:20.000 [info] connection_or_client_learned_peer_id(): (we had no Ed25519 ID in mind when we made this connection.
328Dec 14 19:48:20.000 [info] connection_or_set_identity_digest(): Set identity digest for 0x613000000c80 ([scrubbed]): A09D536DD1752D542E1FBB3C9CE4449D51298239 qylnnRfv53jY0IFgGsW+1WildRdnw13ytLNqePE2c5w.
329Dec 14 19:48:20.000 [info] connection_or_set_identity_digest():    (Previously: A09D536DD1752D542E1FBB3C9CE4449D51298239 <unset>)
330Dec 14 19:48:20.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:80: Authenticated it with RSA and Ed25519
331Dec 14 19:48:20.000 [info] connection_or_set_canonical(): Channel 2 chose an idle timeout of 259.
332Dec 14 19:48:20.000 [info] circuit_send_first_onion_skin(): First hop: finished sending CREATE_FAST cell to '<unnamed>'
333Dec 14 19:48:20.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:80; OR connection is now open, using protocol version 4. Its ID digest is A09D536DD1752D542E1FBB3C9CE4449D51298239. Our address is apparently 151.177.15.217.
334Dec 14 19:48:20.000 [info] circuit_finish_handshake(): Finished building circuit hop:
335Dec 14 19:48:20.000 [info] internal circ (length 1, last hop A09D536DD1752D542E1FBB3C9CE4449D51298239): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open)
336Dec 14 19:48:20.000 [info] circuit_build_no_more_hops(): circuit built!
337Dec 14 19:48:20.000 [info] internal circ (length 1): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open)
338Dec 14 19:48:20.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
339Dec 14 19:48:20.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 3109431386 to begin stream 13598.
340Dec 14 19:48:20.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 3109431386
341Dec 14 19:48:20.000 [info] connection_ap_handshake_send_begin(): Sending up to 122 + 0 bytes of queued-up data
342Dec 14 19:48:20.000 [info] update_consensus_bootstrap_attempt_downloads(): Launching microdesc bootstrap mirror networkstatus consensus download.
343Dec 14 19:48:20.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) at 83.212.101.3:80 for circuit.
344Dec 14 19:48:20.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
345Dec 14 19:48:20.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 3109431386 streamid 13598 after 0 seconds.
346Dec 14 19:48:20.000 [info] internal circ (length 1): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open)
347Dec 14 19:48:20.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 13598. Removing stream.
348Dec 14 19:48:20.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
349Dec 14 19:48:20.000 [info] make_guard_confirmed(): Marking [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) at 83.212.101.3:80 as a confirmed guard (index 2)
350Dec 14 19:48:20.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) at 83.212.101.3:80
351Dec 14 19:48:20.000 [info] handle_response_fetch_desc(): Received server info (body size 2240) from server '83.212.101.3:80'
352Dec 14 19:48:20.000 [info] router_load_routers_from_string(): 1 elements to add
353Dec 14 19:48:20.000 [info] rewrite_node_address_for_bridge(): Adjusted bridge routerinfo for 'LeifEricson' to match configured address 83.212.101.3:80.
354Dec 14 19:48:20.000 [notice] new bridge descriptor 'LeifEricson' (fresh): $A09D536DD1752D542E1FBB3C9CE4449D51298239~LeifEricson at 83.212.101.3
355Dec 14 19:48:20.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
356Dec 14 19:48:20.000 [info] I learned some more directory information, but not enough to build a circuit: We have no usable consensus.
357Dec 14 19:48:20.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
358Dec 14 19:48:21.000 [info] update_consensus_bootstrap_attempt_downloads(): Launching microdesc bootstrap mirror networkstatus consensus download.
359Dec 14 19:48:21.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779 for circuit.
360Dec 14 19:48:21.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:47779 ...
361Dec 14 19:48:21.000 [info] connection_ap_make_link(): ... application connection created and linked.
362Dec 14 19:48:21.000 [info] directory_send_command(): Downloading consensus from 109.105.109.163:47779 using /tor/status-vote/current/consensus-microdesc/0232AF+14C131+23D15D+27102B+49015F+D586D1+E8A9C4+ED03BB+EFCBE7.z
363Dec 14 19:48:21.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open)
364Dec 14 19:48:21.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
365Dec 14 19:48:21.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 4231647043 to begin stream 28243.
366Dec 14 19:48:21.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 4231647043
367Dec 14 19:48:21.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=217
368Dec 14 19:48:21.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=217
369Dec 14 19:48:21.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 4231647043 streamid 28243 after 0 seconds.
370Dec 14 19:48:21.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open)
371Dec 14 19:48:21.000 [notice] Bootstrapped 25%: Loading networkstatus consensus
372Dec 14 19:48:21.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 28243. Removing stream.
373Dec 14 19:48:21.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
374Dec 14 19:48:21.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779
375Dec 14 19:48:21.000 [info] handle_response_fetch_consensus(): Received consensus directory (body size 1981365) from server '109.105.109.163:47779'
376Dec 14 19:48:22.000 [info] Looks like we need to download a new certificate from authority 'dannenberg' at dannenberg.torauth.de:80 (contact Andreas Lehner; identity 0232AF901C31A04EE9848595AF9BB7620D4C5B2E)
377Dec 14 19:48:22.000 [info] Looks like we need to download a new certificate from authority 'longclaw' at 199.58.81.140:80 (contact Riseup Networks <collective at riseup dot net> - 1nNzekuHGGzBYRzyjfjFEfeisNvxkn4RT; identity 23D15D965BC35114467363C165C4F724B64B4F66)
378Dec 14 19:48:22.000 [info] Looks like we need to download a new certificate from authority 'bastet' at 204.13.164.118:80 (contact stefani <nocat at readthefinemanual dot net>; identity 27102BC123E7AF1D4741AE047E160C91ADC76B21)
379Dec 14 19:48:22.000 [info] Looks like we need to download a new certificate from authority 'moria1' at 128.31.0.34:9131 (contact 1024D/28988BF5 arma mit edu; identity D586D18309DED4CD6D57C18FDB97EFA96D330566)
380Dec 14 19:48:22.000 [info] Looks like we need to download a new certificate from authority 'dizum' at 194.109.206.212:80 (contact 1024R/8D56913D Alex de Joode <adejoode@sabotage.org>; identity E8A9C45EDE6D711294FADF8E7951F4DE6CA56B58)
381Dec 14 19:48:22.000 [info] Looks like we need to download a new certificate from authority 'gabelmoo' at 131.188.40.189:80 (contact 4096R/261C5FBE77285F88FB0C343266C8C2D7C5AA446D Sebastian Hahn <tor@sebastianhahn.net> - 12NbRAjAG5U3LLWETSF7fSTcdaz32Mu5CN; identity ED03BB616EB2F60BEC80151114BB25CEF515B226)
382Dec 14 19:48:22.000 [info] Looks like we need to download a new certificate from authority 'Faravahar' at 154.35.175.225:80 (contact 0x0B47D56D Sina Rabbani (inf0) <sina redteam net>; identity EFCBE720AB3A82B99F9E953CD5BF50F7EEFC7B97)
383Dec 14 19:48:22.000 [info] Consensus does not include configured authority 'maatuska' at 171.25.193.9:443 (identity 49015F787433103580E3B66A1707A00E60F2D15B)
384Dec 14 19:48:22.000 [info] A consensus needs 5 good signatures from recognized authorities for us to accept it. This one has 0 (). 1 (tor26) of the authorities we know didn't sign it. We were unable to check 7 of the signatures, because we were missing the keys.
385Dec 14 19:48:22.000 [info] networkstatus_set_current_consensus(): Not enough certificates to check networkstatus consensus
386Dec 14 19:48:22.000 [info] authority_certs_fetch_missing(): We're missing a certificate from authority dannenberg (ID digest 0232AF901C31A04EE9848595AF9BB7620D4C5B2E) with signing key 4F82D69064739702C50C69436997FCB9C29944ED: launching request.
387Dec 14 19:48:22.000 [info] authority_certs_fetch_missing(): We're missing a certificate from authority longclaw (ID digest 23D15D965BC35114467363C165C4F724B64B4F66) with signing key D632ADF38603F34EAFCB461C4DA5F67EF62BE7EC: launching request.
388Dec 14 19:48:22.000 [info] authority_certs_fetch_missing(): We're missing a certificate from authority bastet (ID digest 27102BC123E7AF1D4741AE047E160C91ADC76B21) with signing key 88E1BDDC8E6363355910D086B37B562F81674DC1: launching request.
389Dec 14 19:48:22.000 [info] authority_certs_fetch_missing(): We're missing a certificate from authority moria1 (ID digest D586D18309DED4CD6D57C18FDB97EFA96D330566) with signing key 6E44451E3F1CEB435E4D95C1F8B12AA022BB34CF: launching request.
390Dec 14 19:48:22.000 [info] authority_certs_fetch_missing(): We're missing a certificate from authority dizum (ID digest E8A9C45EDE6D711294FADF8E7951F4DE6CA56B58) with signing key 109A865D7DBE58367C120353CBE9947EE263695A: launching request.
391Dec 14 19:48:22.000 [info] authority_certs_fetch_missing(): We're missing a certificate from authority gabelmoo (ID digest ED03BB616EB2F60BEC80151114BB25CEF515B226) with signing key 28EB6C6635F1DB90BB60AF8B43F1676E892BB30B: launching request.
392Dec 14 19:48:22.000 [info] authority_certs_fetch_missing(): We're missing a certificate from authority Faravahar (ID digest EFCBE720AB3A82B99F9E953CD5BF50F7EEFC7B97) with signing key E861D5367EE5A469892D3FE6B2A25218FBA133FC: launching request.
393Dec 14 19:48:22.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:47779 ...
394Dec 14 19:48:22.000 [info] connection_ap_make_link(): ... application connection created and linked.
395Dec 14 19:48:22.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
396Dec 14 19:48:22.000 [notice] I learned some more directory information, but not enough to build a circuit: We have no usable consensus.
397Dec 14 19:48:22.000 [info] handle_response_fetch_consensus(): Successfully loaded consensus.
398Dec 14 19:48:22.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
399Dec 14 19:48:22.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open)
400Dec 14 19:48:22.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
401Dec 14 19:48:22.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 4231647043 to begin stream 28244.
402Dec 14 19:48:22.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 4231647043
403Dec 14 19:48:22.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=697
404Dec 14 19:48:22.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=199
405Dec 14 19:48:22.000 [info] authority_certs_fetch_missing(): No current certificate known for authority moria1 (ID digest D586D18309DED4CD6D57C18FDB97EFA96D330566); launching request.
406Dec 14 19:48:22.000 [info] authority_certs_fetch_missing(): No current certificate known for authority tor26 (ID digest 14C131DFC5C6F93646BE72FA1401C02A8DF2E8B4); launching request.
407Dec 14 19:48:22.000 [info] authority_certs_fetch_missing(): No current certificate known for authority dizum (ID digest E8A9C45EDE6D711294FADF8E7951F4DE6CA56B58); launching request.
408Dec 14 19:48:22.000 [info] authority_certs_fetch_missing(): No current certificate known for authority gabelmoo (ID digest ED03BB616EB2F60BEC80151114BB25CEF515B226); launching request.
409Dec 14 19:48:22.000 [info] authority_certs_fetch_missing(): No current certificate known for authority dannenberg (ID digest 0232AF901C31A04EE9848595AF9BB7620D4C5B2E); launching request.
410Dec 14 19:48:22.000 [info] authority_certs_fetch_missing(): No current certificate known for authority maatuska (ID digest 49015F787433103580E3B66A1707A00E60F2D15B); launching request.
411Dec 14 19:48:22.000 [info] authority_certs_fetch_missing(): No current certificate known for authority Faravahar (ID digest EFCBE720AB3A82B99F9E953CD5BF50F7EEFC7B97); launching request.
412Dec 14 19:48:22.000 [info] authority_certs_fetch_missing(): No current certificate known for authority longclaw (ID digest 23D15D965BC35114467363C165C4F724B64B4F66); launching request.
413Dec 14 19:48:22.000 [info] authority_certs_fetch_missing(): No current certificate known for authority bastet (ID digest 27102BC123E7AF1D4741AE047E160C91ADC76B21); launching request.
414Dec 14 19:48:22.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779 for circuit.
415Dec 14 19:48:22.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:47779 ...
416Dec 14 19:48:22.000 [info] connection_ap_make_link(): ... application connection created and linked.
417Dec 14 19:48:22.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open)
418Dec 14 19:48:22.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
419Dec 14 19:48:22.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 4231647043 to begin stream 28245.
420Dec 14 19:48:22.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 4231647043
421Dec 14 19:48:22.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=489
422Dec 14 19:48:22.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=489
423Dec 14 19:48:22.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 4231647043 streamid 28244 after 0 seconds.
424Dec 14 19:48:22.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open)
425Dec 14 19:48:22.000 [notice] Bootstrapped 40%: Loading authority key certs
426Dec 14 19:48:22.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 28244. Removing stream.
427Dec 14 19:48:22.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
428Dec 14 19:48:22.000 [info] handle_response_fetch_certificate(): Received authority certificates (body size 15631) from server '109.105.109.163:47779'
429Dec 14 19:48:22.000 [info] trusted_dirs_load_certs_from_string(): Adding downloaded certificate for directory authority dannenberg with signing key 4F82D69064739702C50C69436997FCB9C29944ED
430Dec 14 19:48:22.000 [info] trusted_dirs_load_certs_from_string(): Adding downloaded certificate for directory authority longclaw with signing key D632ADF38603F34EAFCB461C4DA5F67EF62BE7EC
431Dec 14 19:48:22.000 [info] trusted_dirs_load_certs_from_string(): Adding downloaded certificate for directory authority bastet with signing key 88E1BDDC8E6363355910D086B37B562F81674DC1
432Dec 14 19:48:22.000 [info] trusted_dirs_load_certs_from_string(): Adding downloaded certificate for directory authority moria1 with signing key 6E44451E3F1CEB435E4D95C1F8B12AA022BB34CF
433Dec 14 19:48:22.000 [info] trusted_dirs_load_certs_from_string(): Adding downloaded certificate for directory authority dizum with signing key 109A865D7DBE58367C120353CBE9947EE263695A
434Dec 14 19:48:22.000 [info] trusted_dirs_load_certs_from_string(): Adding downloaded certificate for directory authority gabelmoo with signing key 28EB6C6635F1DB90BB60AF8B43F1676E892BB30B
435Dec 14 19:48:22.000 [info] trusted_dirs_load_certs_from_string(): Adding downloaded certificate for directory authority Faravahar with signing key E861D5367EE5A469892D3FE6B2A25218FBA133FC
436Dec 14 19:48:22.000 [info] Consensus does not include configured authority 'maatuska' at 171.25.193.9:443 (identity 49015F787433103580E3B66A1707A00E60F2D15B)
437Dec 14 19:48:22.000 [info] A consensus needs 5 good signatures from recognized authorities for us to accept it. This one has 7 (dannenberg longclaw bastet moria1 dizum gabelmoo Faravahar). 1 (tor26) of the authorities we know didn't sign it.
438Dec 14 19:48:23.000 [info] Consensus does not include configured authority 'maatuska' at 171.25.193.9:443 (identity 49015F787433103580E3B66A1707A00E60F2D15B)
439Dec 14 19:48:23.000 [info] A consensus needs 5 good signatures from recognized authorities for us to accept it. This one has 7 (dannenberg longclaw bastet moria1 dizum gabelmoo Faravahar). 1 (tor26) of the authorities we know didn't sign it.
440Dec 14 19:48:23.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode)
441Dec 14 19:48:23.000 [info] Choosing expected valid-after time as 2017-12-14 19:00:00: consensus_set=1, interval=3600
442Dec 14 19:48:23.000 [info] update_consensus_networkstatus_fetch_time_impl(): Live microdesc consensus will be the most recent until 2017-12-14 20:00:00 and will expire at 2017-12-14 22:00:00; fetching the next one at 2017-12-14 21:56:21.
443Dec 14 19:48:23.000 [info] cell_ewma_set_scale_factor(): Enabled cell_ewma algorithm because of value in CircuitPriorityHalflifeMsec in consensus; scale factor is 0.793701 per 10 seconds
444Dec 14 19:48:23.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
445Dec 14 19:48:23.000 [notice] Bootstrapped 45%: Asking for relay descriptors
446Dec 14 19:48:23.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 0/6486, and can only build 0% of likely paths. (We have 0% of guards bw, 0% of midpoint bw, and 0% of exit bw = 0% of path bw.)
447Dec 14 19:48:23.000 [info] launch_descriptor_downloads(): Launching 14 requests for 6507 microdescs, 500 at a time
448Dec 14 19:48:23.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards.
449Dec 14 19:48:23.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980 for circuit.
450Dec 14 19:48:23.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:38980 ...
451Dec 14 19:48:23.000 [info] connection_ap_make_link(): ... application connection created and linked.
452Dec 14 19:48:23.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards.
453Dec 14 19:48:23.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779 for circuit.
454Dec 14 19:48:23.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:47779 ...
455Dec 14 19:48:23.000 [info] connection_ap_make_link(): ... application connection created and linked.
456Dec 14 19:48:23.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards.
457Dec 14 19:48:23.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980 for circuit.
458Dec 14 19:48:23.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:38980 ...
459Dec 14 19:48:23.000 [info] connection_ap_make_link(): ... application connection created and linked.
460Dec 14 19:48:23.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards.
461Dec 14 19:48:23.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980 for circuit.
462Dec 14 19:48:23.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:38980 ...
463Dec 14 19:48:23.000 [info] connection_ap_make_link(): ... application connection created and linked.
464Dec 14 19:48:23.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards.
465Dec 14 19:48:23.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) at 83.212.101.3:80 for circuit.
466Dec 14 19:48:23.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:80 ...
467Dec 14 19:48:23.000 [info] connection_ap_make_link(): ... application connection created and linked.
468Dec 14 19:48:23.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards.
469Dec 14 19:48:23.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) at 83.212.101.3:80 for circuit.
470Dec 14 19:48:23.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:80 ...
471Dec 14 19:48:23.000 [info] connection_ap_make_link(): ... application connection created and linked.
472Dec 14 19:48:23.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards.
473Dec 14 19:48:23.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779 for circuit.
474Dec 14 19:48:23.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:47779 ...
475Dec 14 19:48:23.000 [info] connection_ap_make_link(): ... application connection created and linked.
476Dec 14 19:48:23.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards.
477Dec 14 19:48:23.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779 for circuit.
478Dec 14 19:48:23.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:47779 ...
479Dec 14 19:48:23.000 [info] connection_ap_make_link(): ... application connection created and linked.
480Dec 14 19:48:23.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards.
481Dec 14 19:48:23.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980 for circuit.
482Dec 14 19:48:23.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:38980 ...
483Dec 14 19:48:23.000 [info] connection_ap_make_link(): ... application connection created and linked.
484Dec 14 19:48:23.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards.
485Dec 14 19:48:23.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779 for circuit.
486Dec 14 19:48:23.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:47779 ...
487Dec 14 19:48:23.000 [info] connection_ap_make_link(): ... application connection created and linked.
488Dec 14 19:48:23.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards.
489Dec 14 19:48:23.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980 for circuit.
490Dec 14 19:48:23.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:38980 ...
491Dec 14 19:48:23.000 [info] connection_ap_make_link(): ... application connection created and linked.
492Dec 14 19:48:23.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards.
493Dec 14 19:48:23.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779 for circuit.
494Dec 14 19:48:23.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:47779 ...
495Dec 14 19:48:23.000 [info] connection_ap_make_link(): ... application connection created and linked.
496Dec 14 19:48:23.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards.
497Dec 14 19:48:23.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) at 83.212.101.3:80 for circuit.
498Dec 14 19:48:23.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:80 ...
499Dec 14 19:48:23.000 [info] connection_ap_make_link(): ... application connection created and linked.
500Dec 14 19:48:23.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards.
501Dec 14 19:48:23.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980 for circuit.
502Dec 14 19:48:23.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:38980 ...
503Dec 14 19:48:23.000 [info] connection_ap_make_link(): ... application connection created and linked.
504Dec 14 19:48:23.000 [info] handle_response_fetch_certificate(): Successfully loaded certificates from fetch.
505Dec 14 19:48:23.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
506Dec 14 19:48:23.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open)
507Dec 14 19:48:23.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
508Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 3321416422 to begin stream 44334.
509Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 3321416422
510Dec 14 19:48:23.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open)
511Dec 14 19:48:23.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
512Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 4231647043 to begin stream 28246.
513Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 4231647043
514Dec 14 19:48:23.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open)
515Dec 14 19:48:23.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
516Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 3321416422 to begin stream 44335.
517Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 3321416422
518Dec 14 19:48:23.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open)
519Dec 14 19:48:23.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
520Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 3321416422 to begin stream 44336.
521Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 3321416422
522Dec 14 19:48:23.000 [info] internal circ (length 1): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open)
523Dec 14 19:48:23.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
524Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 3109431386 to begin stream 13599.
525Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 3109431386
526Dec 14 19:48:23.000 [info] internal circ (length 1): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open)
527Dec 14 19:48:23.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
528Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 3109431386 to begin stream 13600.
529Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 3109431386
530Dec 14 19:48:23.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open)
531Dec 14 19:48:23.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
532Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 4231647043 to begin stream 28247.
533Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 4231647043
534Dec 14 19:48:23.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open)
535Dec 14 19:48:23.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
536Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 4231647043 to begin stream 28248.
537Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 4231647043
538Dec 14 19:48:23.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open)
539Dec 14 19:48:23.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
540Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 3321416422 to begin stream 44337.
541Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 3321416422
542Dec 14 19:48:23.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open)
543Dec 14 19:48:23.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
544Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 4231647043 to begin stream 28249.
545Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 4231647043
546Dec 14 19:48:23.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open)
547Dec 14 19:48:23.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
548Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 3321416422 to begin stream 44338.
549Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 3321416422
550Dec 14 19:48:23.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open)
551Dec 14 19:48:23.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
552Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 4231647043 to begin stream 28250.
553Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 4231647043
554Dec 14 19:48:23.000 [info] internal circ (length 1): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open)
555Dec 14 19:48:23.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
556Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 3109431386 to begin stream 13601.
557Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 3109431386
558Dec 14 19:48:23.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open)
559Dec 14 19:48:23.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed]
560Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 3321416422 to begin stream 44339.
561Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 3321416422
562Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=430
563Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=430
564Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22122
565Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=210
566Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22122
567Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=210
568Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22122
569Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=210
570Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22122
571Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=210
572Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22113
573Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=201
574Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22113
575Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=201
576Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22122
577Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=210
578Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22122
579Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=210
580Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22122
581Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=210
582Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22122
583Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=210
584Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22122
585Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=210
586Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22122
587Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=210
588Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22113
589Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=201
590Dec 14 19:48:23.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 4231647043 streamid 28245 after 1 seconds.
591Dec 14 19:48:23.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open)
592Dec 14 19:48:23.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 28245. Removing stream.
593Dec 14 19:48:23.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
594Dec 14 19:48:23.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779
595Dec 14 19:48:23.000 [info] handle_response_fetch_certificate(): Received authority certificates (body size 20442) from server '109.105.109.163:47779'
596Dec 14 19:48:23.000 [info] trusted_dirs_load_certs_from_string(): Skipping downloaded certificate for dannenberg that we already have.
597Dec 14 19:48:23.000 [info] trusted_dirs_load_certs_from_string(): Got a certificate for dannenberg, but we already have it. Maybe they haven't updated it. Waiting for a while.
598Dec 14 19:48:23.000 [info] trusted_dirs_load_certs_from_string(): Adding downloaded certificate for directory authority tor26 with signing key 6AEC757516B142855BCE29708EBDA965AC3DD06A
599Dec 14 19:48:23.000 [info] trusted_dirs_load_certs_from_string(): Skipping downloaded certificate for longclaw that we already have.
600Dec 14 19:48:23.000 [info] trusted_dirs_load_certs_from_string(): Got a certificate for longclaw, but we already have it. Maybe they haven't updated it. Waiting for a while.
601Dec 14 19:48:23.000 [info] trusted_dirs_load_certs_from_string(): Skipping downloaded certificate for bastet that we already have.
602Dec 14 19:48:23.000 [info] trusted_dirs_load_certs_from_string(): Got a certificate for bastet, but we already have it. Maybe they haven't updated it. Waiting for a while.
603Dec 14 19:48:23.000 [info] trusted_dirs_load_certs_from_string(): Adding downloaded certificate for directory authority maatuska with signing key C9C96501FD35732C45C424B74CC32739991B1F51
604Dec 14 19:48:23.000 [info] trusted_dirs_load_certs_from_string(): Skipping downloaded certificate for moria1 that we already have.
605Dec 14 19:48:23.000 [info] trusted_dirs_load_certs_from_string(): Got a certificate for moria1, but we already have it. Maybe they haven't updated it. Waiting for a while.
606Dec 14 19:48:23.000 [info] trusted_dirs_load_certs_from_string(): Skipping downloaded certificate for dizum that we already have.
607Dec 14 19:48:23.000 [info] trusted_dirs_load_certs_from_string(): Got a certificate for dizum, but we already have it. Maybe they haven't updated it. Waiting for a while.
608Dec 14 19:48:23.000 [info] trusted_dirs_load_certs_from_string(): Skipping downloaded certificate for gabelmoo that we already have.
609Dec 14 19:48:23.000 [info] trusted_dirs_load_certs_from_string(): Got a certificate for gabelmoo, but we already have it. Maybe they haven't updated it. Waiting for a while.
610Dec 14 19:48:23.000 [info] trusted_dirs_load_certs_from_string(): Skipping downloaded certificate for Faravahar that we already have.
611Dec 14 19:48:23.000 [info] trusted_dirs_load_certs_from_string(): Got a certificate for Faravahar, but we already have it. Maybe they haven't updated it. Waiting for a while.
612Dec 14 19:48:23.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
613Dec 14 19:48:23.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 0/6486, and can only build 0% of likely paths. (We have 0% of guards bw, 0% of midpoint bw, and 0% of exit bw = 0% of path bw.)
614Dec 14 19:48:23.000 [info] handle_response_fetch_certificate(): Successfully loaded certificates from fetch.
615Dec 14 19:48:23.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
616Dec 14 19:48:23.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 4231647043 streamid 28246 after 0 seconds.
617Dec 14 19:48:23.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open)
618Dec 14 19:48:23.000 [notice] Bootstrapped 50%: Loading relay descriptors
619Dec 14 19:48:23.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 4231647043 streamid 28247 after 0 seconds.
620Dec 14 19:48:23.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open)
621Dec 14 19:48:23.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 4231647043 streamid 28248 after 0 seconds.
622Dec 14 19:48:23.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open)
623Dec 14 19:48:23.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 4231647043 streamid 28249 after 0 seconds.
624Dec 14 19:48:23.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open)
625Dec 14 19:48:23.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 4231647043 streamid 28250 after 0 seconds.
626Dec 14 19:48:23.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open)
627Dec 14 19:48:23.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 3321416422 streamid 44334 after 0 seconds.
628Dec 14 19:48:23.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open)
629Dec 14 19:48:23.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 3321416422 streamid 44335 after 0 seconds.
630Dec 14 19:48:23.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open)
631Dec 14 19:48:23.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 3321416422 streamid 44336 after 0 seconds.
632Dec 14 19:48:23.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open)
633Dec 14 19:48:23.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 3321416422 streamid 44337 after 0 seconds.
634Dec 14 19:48:23.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open)
635Dec 14 19:48:23.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 3321416422 streamid 44338 after 0 seconds.
636Dec 14 19:48:23.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open)
637Dec 14 19:48:23.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 3321416422 streamid 44339 after 0 seconds.
638Dec 14 19:48:23.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open)
639Dec 14 19:48:23.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 44339. Removing stream.
640Dec 14 19:48:23.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
641Dec 14 19:48:23.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980
642Dec 14 19:48:23.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 7247) from server '109.105.109.163:38980'
643Dec 14 19:48:23.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
644Dec 14 19:48:23.000 [info] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 7/6486, and can only build 0% of likely paths. (We have 0% of guards bw, 0% of midpoint bw, and 0% of exit bw = 0% of path bw.)
645Dec 14 19:48:23.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
646Dec 14 19:48:23.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 28246. Removing stream.
647Dec 14 19:48:23.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
648Dec 14 19:48:23.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779
649Dec 14 19:48:23.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 265930) from server '109.105.109.163:47779'
650Dec 14 19:48:23.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
651Dec 14 19:48:23.000 [info] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 503/6486, and can only build 0% of likely paths. (We have 8% of guards bw, 8% of midpoint bw, and 8% of exit bw = 0% of path bw.)
652Dec 14 19:48:23.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
653Dec 14 19:48:23.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 44334. Removing stream.
654Dec 14 19:48:23.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
655Dec 14 19:48:23.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980
656Dec 14 19:48:23.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 247082) from server '109.105.109.163:38980'
657Dec 14 19:48:24.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
658Dec 14 19:48:24.000 [info] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 1001/6486, and can only build 0% of likely paths. (We have 15% of guards bw, 16% of midpoint bw, and 15% of exit bw = 0% of path bw.)
659Dec 14 19:48:24.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
660Dec 14 19:48:24.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 3109431386 streamid 13599 after 1 seconds.
661Dec 14 19:48:24.000 [info] internal circ (length 1): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open)
662Dec 14 19:48:24.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 3109431386 streamid 13600 after 1 seconds.
663Dec 14 19:48:24.000 [info] internal circ (length 1): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open)
664Dec 14 19:48:24.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 3109431386 streamid 13601 after 1 seconds.
665Dec 14 19:48:24.000 [info] internal circ (length 1): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open)
666Dec 14 19:48:24.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 28247. Removing stream.
667Dec 14 19:48:24.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
668Dec 14 19:48:24.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779
669Dec 14 19:48:24.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 274212) from server '109.105.109.163:47779'
670Dec 14 19:48:24.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
671Dec 14 19:48:24.000 [info] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 1500/6486, and can only build 1% of likely paths. (We have 21% of guards bw, 21% of midpoint bw, and 24% of exit bw = 1% of path bw.)
672Dec 14 19:48:24.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
673Dec 14 19:48:24.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 44335. Removing stream.
674Dec 14 19:48:24.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
675Dec 14 19:48:24.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980
676Dec 14 19:48:24.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 263176) from server '109.105.109.163:38980'
677Dec 14 19:48:24.000 [info] Bootstrapped 51%: Loading relay descriptors
678Dec 14 19:48:24.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
679Dec 14 19:48:24.000 [info] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 2000/6486, and can only build 2% of likely paths. (We have 28% of guards bw, 29% of midpoint bw, and 30% of exit bw = 2% of path bw.)
680Dec 14 19:48:24.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
681Dec 14 19:48:24.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 28248. Removing stream.
682Dec 14 19:48:24.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
683Dec 14 19:48:24.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779
684Dec 14 19:48:24.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 264346) from server '109.105.109.163:47779'
685Dec 14 19:48:24.000 [info] Bootstrapped 52%: Loading relay descriptors
686Dec 14 19:48:24.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
687Dec 14 19:48:24.000 [info] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 2499/6486, and can only build 4% of likely paths. (We have 36% of guards bw, 36% of midpoint bw, and 37% of exit bw = 4% of path bw.)
688Dec 14 19:48:24.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
689Dec 14 19:48:24.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 44336. Removing stream.
690Dec 14 19:48:24.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
691Dec 14 19:48:24.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980
692Dec 14 19:48:24.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 245895) from server '109.105.109.163:38980'
693Dec 14 19:48:24.000 [info] Bootstrapped 54%: Loading relay descriptors
694Dec 14 19:48:24.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
695Dec 14 19:48:24.000 [info] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 2999/6486, and can only build 8% of likely paths. (We have 44% of guards bw, 44% of midpoint bw, and 41% of exit bw = 8% of path bw.)
696Dec 14 19:48:24.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
697Dec 14 19:48:24.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 44337. Removing stream.
698Dec 14 19:48:24.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
699Dec 14 19:48:24.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980
700Dec 14 19:48:24.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 247770) from server '109.105.109.163:38980'
701Dec 14 19:48:24.000 [notice] Bootstrapped 57%: Loading relay descriptors
702Dec 14 19:48:24.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
703Dec 14 19:48:24.000 [info] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 3499/6486, and can only build 14% of likely paths. (We have 52% of guards bw, 53% of midpoint bw, and 51% of exit bw = 14% of path bw.)
704Dec 14 19:48:24.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
705Dec 14 19:48:24.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 28249. Removing stream.
706Dec 14 19:48:24.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
707Dec 14 19:48:24.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779
708Dec 14 19:48:24.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 267248) from server '109.105.109.163:47779'
709Dec 14 19:48:24.000 [info] Bootstrapped 61%: Loading relay descriptors
710Dec 14 19:48:24.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
711Dec 14 19:48:24.000 [info] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 3998/6486, and can only build 23% of likely paths. (We have 61% of guards bw, 62% of midpoint bw, and 61% of exit bw = 23% of path bw.)
712Dec 14 19:48:24.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
713Dec 14 19:48:24.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 28250. Removing stream.
714Dec 14 19:48:24.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
715Dec 14 19:48:24.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779
716Dec 14 19:48:24.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 247291) from server '109.105.109.163:47779'
717Dec 14 19:48:24.000 [notice] Bootstrapped 65%: Loading relay descriptors
718Dec 14 19:48:24.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
719Dec 14 19:48:24.000 [info] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 4495/6486, and can only build 33% of likely paths. (We have 69% of guards bw, 70% of midpoint bw, and 67% of exit bw = 33% of path bw.)
720Dec 14 19:48:24.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
721Dec 14 19:48:24.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 44338. Removing stream.
722Dec 14 19:48:24.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
723Dec 14 19:48:24.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980
724Dec 14 19:48:24.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 246949) from server '109.105.109.163:38980'
725Dec 14 19:48:24.000 [notice] Bootstrapped 71%: Loading relay descriptors
726Dec 14 19:48:24.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
727Dec 14 19:48:24.000 [info] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 4994/6486, and can only build 44% of likely paths. (We have 76% of guards bw, 77% of midpoint bw, and 75% of exit bw = 44% of path bw.)
728Dec 14 19:48:24.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
729Dec 14 19:48:24.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 13599. Removing stream.
730Dec 14 19:48:24.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
731Dec 14 19:48:24.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) at 83.212.101.3:80
732Dec 14 19:48:24.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 259827) from server '83.212.101.3:80'
733Dec 14 19:48:25.000 [info] microdesc_note_outdated_dirserver(): Noted A09D536DD1752D542E1FBB3C9CE4449D51298239 as outdated md dirserver
734Dec 14 19:48:25.000 [info] dir_microdesc_download_failed(): Failed to download md Yaht2i6paGTO1eJwB/Gxtk2H+M7hSnHY4E+NTgYFWns from A09D536DD1752D542E1FBB3C9CE4449D51298239
735Dec 14 19:48:25.000 [info] dir_microdesc_download_failed(): Failed to download md YNKoK9qSMQ8ooHjkZnV9QMXLpysb6x2lF4mRQIAmCK0 from A09D536DD1752D542E1FBB3C9CE4449D51298239
736Dec 14 19:48:25.000 [info] dir_microdesc_download_failed(): Failed to download md VjexZfJOO4exbenvkNj2Uy6xbux8mRmSUE6Saz391i0 from A09D536DD1752D542E1FBB3C9CE4449D51298239
737Dec 14 19:48:25.000 [info] dir_microdesc_download_failed(): Failed to download md U0U94p+QlW6Y6ZR1z5F2YeE+vex+OctUZEaWljbBzUo from A09D536DD1752D542E1FBB3C9CE4449D51298239
738Dec 14 19:48:25.000 [info] dir_microdesc_download_failed(): Failed to download md UkVzrNW4tOMCi95tgwHUX4xNcjZkV2PH0PeDK0ztiCg from A09D536DD1752D542E1FBB3C9CE4449D51298239
739Dec 14 19:48:25.000 [info] dir_microdesc_download_failed(): Failed to download md UG2VPjoln8DgxSeh2yOJ93UVwMfPhmkXMR/u+OdrpEA from A09D536DD1752D542E1FBB3C9CE4449D51298239
740Dec 14 19:48:25.000 [notice] Bootstrapped 78%: Loading relay descriptors
741Dec 14 19:48:25.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
742Dec 14 19:48:25.000 [info] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 5485/6486, and can only build 58% of likely paths. (We have 83% of guards bw, 83% of midpoint bw, and 83% of exit bw = 58% of path bw.)
743Dec 14 19:48:25.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
744Dec 14 19:48:25.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 13600. Removing stream.
745Dec 14 19:48:25.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
746Dec 14 19:48:25.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) at 83.212.101.3:80
747Dec 14 19:48:25.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 233092) from server '83.212.101.3:80'
748Dec 14 19:48:25.000 [info] dir_microdesc_download_failed(): Failed to download md bZ+a+2CbUm/y1SbbC6VT/A1jHWwIUfFJ6wdUExxX7tw from A09D536DD1752D542E1FBB3C9CE4449D51298239
749Dec 14 19:48:25.000 [info] dir_microdesc_download_failed(): Failed to download md bLlWEdJ2JuwhqVqOChnI+lRd996pBeyScUIcBlpN0ag from A09D536DD1752D542E1FBB3C9CE4449D51298239
750Dec 14 19:48:25.000 [info] dir_microdesc_download_failed(): Failed to download md apgye1yBGLF9JLKxEehhYsK97d3ASMOtRFo2DBIrcok from A09D536DD1752D542E1FBB3C9CE4449D51298239
751Dec 14 19:48:25.000 [info] dir_microdesc_download_failed(): Failed to download md aimLHSUOcQdhzHJVxN1gMYGAl92CAADOcTN4LGY7ghg from A09D536DD1752D542E1FBB3C9CE4449D51298239
752Dec 14 19:48:25.000 [info] dir_microdesc_download_failed(): Failed to download md aabRDzXT5HVa/vLytRIq7IzOj6EDVpkYvHjAHdEDfg4 from A09D536DD1752D542E1FBB3C9CE4449D51298239
753Dec 14 19:48:25.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
754Dec 14 19:48:25.000 [notice] Bootstrapped 80%: Connecting to the Tor network
755Dec 14 19:48:25.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
756Dec 14 19:48:25.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 13601. Removing stream.
757Dec 14 19:48:25.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf.
758Dec 14 19:48:25.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) at 83.212.101.3:80
759Dec 14 19:48:25.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 251868) from server '83.212.101.3:80'
760Dec 14 19:48:25.000 [info] dir_microdesc_download_failed(): Failed to download md 9FoNWxEf4O0O/M5KgPk+7eK4Y5UY7H/gIxkIpvuahHE from A09D536DD1752D542E1FBB3C9CE4449D51298239
761Dec 14 19:48:25.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
762Dec 14 19:48:25.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf.
763Dec 14 19:48:25.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
764Dec 14 19:48:25.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
765Dec 14 19:48:25.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
766Dec 14 19:48:25.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
767Dec 14 19:48:25.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
768Dec 14 19:48:25.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
769Dec 14 19:48:25.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
770Dec 14 19:48:25.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
771Dec 14 19:48:25.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
772Dec 14 19:48:25.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
773Dec 14 19:48:25.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
774Dec 14 19:48:25.000 [notice] Closing no-longer-configured Socks listener on 127.0.0.1:9150
775Dec 14 19:48:25.000 [notice] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
776Dec 14 19:48:25.000 [notice] Tor 0.3.2.7-rc (git-04f4f30af76cdedf) opening log file.
777Dec 14 19:48:25.000 [notice] Closing old Socks listener on 127.0.0.1:9150
778Dec 14 19:48:25.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 1048544, ConnLimit_high_thresh 1048480, ConnLimit_low_thresh 786408
779Dec 14 19:48:25.000 [info] tor_process_handle_destroy(): Terminated process with PID '14343'.
780Dec 14 19:48:25.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode)
781Dec 14 19:48:25.000 [info] cell_ewma_set_scale_factor(): Enabled cell_ewma algorithm because of value in CircuitPriorityHalflifeMsec in consensus; scale factor is 0.793701 per 10 seconds
782Dec 14 19:48:25.000 [info] entry_guards_note_guard_failure(): Recorded failure for guard [bridge] ($AF9F66B7B04F8FF6F32D455F05135250A16543C9) at 169.229.59.75:46328
783Dec 14 19:48:25.000 [info] connection_dir_request_failed(): Giving up on serverdesc/extrainfo fetch from directory server at '169.229.59.75'; retrying
784Dec 14 19:48:25.000 [info] connection_free_(): Freeing linked Directory connection [client reading] with 0 bytes on inbuf, 0 on outbuf.
785Dec 14 19:48:25.000 [info] connection_free_(): Freeing linked Socks connection [waiting for circuit] with 129 bytes on inbuf, 0 on outbuf.
786Dec 14 19:48:25.000 [info] entry_guards_note_guard_failure(): Recorded failure for guard [bridge] ($AF9F66B7B04F8FF6F32D455F05135250A16543C9) at 169.229.59.75:46328
787Dec 14 19:48:25.000 [info] connection_dir_request_failed(): Giving up on serverdesc/extrainfo fetch from directory server at '169.229.59.74'; retrying
788Dec 14 19:48:25.000 [info] connection_free_(): Freeing linked Directory connection [client reading] with 0 bytes on inbuf, 0 on outbuf.
789Dec 14 19:48:25.000 [info] connection_free_(): Freeing linked Socks connection [waiting for circuit] with 129 bytes on inbuf, 0 on outbuf.
790Dec 14 19:48:25.000 [info] circuit_mark_for_close_(): Circuit 0 (id: 2) marked for close at ../src/or/circuitlist.c:1477 (orig reason: 520, new reason: 0)
791Dec 14 19:48:25.000 [info] circuit_mark_for_close_(): Circuit 0 (id: 1) marked for close at ../src/or/circuitlist.c:1477 (orig reason: 520, new reason: 0)
792Dec 14 19:48:25.000 [info] circuit_n_chan_done(): Channel failed; closing circ.
793Dec 14 19:48:25.000 [info] circuit_mark_for_close_(): Circuit 0 (id: 3) marked for close at ../src/or/circuitbuild.c:662 (orig reason: 8, new reason: 0)
794Dec 14 19:48:25.000 [info] connection_or_note_state_when_broken(): Connection died in state 'handshaking (proxy) with SSL state (No SSL object)'
795Dec 14 19:48:25.000 [info] circuit_mark_for_close_(): Circuit 0 (id: 4) marked for close at ../src/or/circuitlist.c:1477 (orig reason: 520, new reason: 0)
796Dec 14 19:48:25.000 [info] notify_waitpid_callback_by_pid(): Child process 14343 has exited; no callback was registered
797Dec 14 19:48:25.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
798Dec 14 19:48:25.000 [notice] Delaying directory fetches: DisableNetwork is set.
799Dec 14 19:48:25.000 [info] circuit_free(): Circuit 0 (id: 2) has been freed.
800Dec 14 19:48:25.000 [info] circuit_free(): Circuit 0 (id: 1) has been freed.
801Dec 14 19:48:25.000 [info] circuit_build_failed(): Our circuit 0 (id: 3) died before the first hop with no connection
802Dec 14 19:48:25.000 [info] circuit_free(): Circuit 0 (id: 3) has been freed.
803Dec 14 19:48:25.000 [info] circuit_free(): Circuit 0 (id: 4) has been freed.
804Dec 14 19:48:26.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
805Dec 14 19:48:27.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
806Dec 14 19:48:28.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
807Dec 14 19:48:29.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
808Dec 14 19:48:30.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
809Dec 14 19:48:30.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
810Dec 14 19:48:31.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
811Dec 14 19:48:31.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
812Dec 14 19:48:32.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
813Dec 14 19:48:32.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
814Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
815Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
816Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
817Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
818Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
819Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
820Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
821Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
822Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
823Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
824Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
825Dec 14 19:48:33.000 [notice] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
826Dec 14 19:48:33.000 [notice] Tor 0.3.2.7-rc (git-04f4f30af76cdedf) opening log file.
827Dec 14 19:48:33.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 1048544, ConnLimit_high_thresh 1048480, ConnLimit_low_thresh 786408
828Dec 14 19:48:33.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode)
829Dec 14 19:48:33.000 [info] cell_ewma_set_scale_factor(): Enabled cell_ewma algorithm because of value in CircuitPriorityHalflifeMsec in consensus; scale factor is 0.793701 per 10 seconds
830Dec 14 19:48:33.000 [info] options_act(): Changed to using entry guards or bridges, or changed preferred or excluded node lists. Abandoning previous circuits.
831Dec 14 19:48:33.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus.
832Dec 14 19:48:33.000 [info] sampled_guards_update_from_consensus(): Sampled guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980 is now unlisted.
833Dec 14 19:48:33.000 [info] sampled_guards_update_from_consensus(): Sampled guard [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779 is now unlisted.
834Dec 14 19:48:33.000 [info] sampled_guards_update_from_consensus(): Sampled guard [bridge] ($AF9F66B7B04F8FF6F32D455F05135250A16543C9) at 169.229.59.75:46328 is now unlisted.
835Dec 14 19:48:33.000 [info] sampled_guards_update_from_consensus(): Sampled guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) at 83.212.101.3:80 is now unlisted.
836Dec 14 19:48:33.000 [info] sampled_guards_update_from_consensus(): Sampled guard [bridge] ($AF9F66B7B04F8FF6F32D455F05135250A16543C9) at 169.229.59.74:31493 is now unlisted.
837Dec 14 19:48:33.000 [info] sample_reachable_filtered_entry_guards(): Trying to sample a reachable guard: We know of 0 in the USABLE_FILTERED set.
838Dec 14 19:48:33.000 [info] sample_reachable_filtered_entry_guards():   (That isn't enough. Trying to expand the sample.)
839Dec 14 19:48:33.000 [info] entry_guards_expand_sample(): Expanding the sample guard set. We have 5 guards in the sample, and 26 eligible guards to extend it with.
840Dec 14 19:48:33.000 [info] sample_reachable_filtered_entry_guards():   (After filters [b], we have 20 guards to consider.)
841Dec 14 19:48:33.000 [info] sample_reachable_filtered_entry_guards():   (Selected [bridge] ($BBB28DF0F201E706BE564EFE690FE9577DD8386D) at 109.105.109.147:13764.)
842Dec 14 19:48:33.000 [info] sample_reachable_filtered_entry_guards(): Trying to sample a reachable guard: We know of 20 in the USABLE_FILTERED set.
843Dec 14 19:48:33.000 [info] sample_reachable_filtered_entry_guards():   (After filters [b], we have 19 guards to consider.)
844Dec 14 19:48:33.000 [info] sample_reachable_filtered_entry_guards():   (Selected [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443.)
845Dec 14 19:48:33.000 [info] sample_reachable_filtered_entry_guards(): Trying to sample a reachable guard: We know of 20 in the USABLE_FILTERED set.
846Dec 14 19:48:33.000 [info] sample_reachable_filtered_entry_guards():   (After filters [b], we have 18 guards to consider.)
847Dec 14 19:48:33.000 [info] sample_reachable_filtered_entry_guards():   (Selected [bridge] ($00DC6C4FA49A65BD1472993CF6730D54F11E0DBB) at 154.35.22.12:80.)
848Dec 14 19:48:33.000 [info] entry_guards_update_primary(): Primary entry guards have changed. New primary guard list is:
849Dec 14 19:48:33.000 [info] entry_guards_update_primary():   1/3: [bridge] ($BBB28DF0F201E706BE564EFE690FE9577DD8386D) at 109.105.109.147:13764
850Dec 14 19:48:33.000 [info] entry_guards_update_primary():   2/3: [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443
851Dec 14 19:48:33.000 [info] entry_guards_update_primary():   3/3: [bridge] ($00DC6C4FA49A65BD1472993CF6730D54F11E0DBB) at 154.35.22.12:80
852Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
853Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
854Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
855Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
856Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
857Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
858Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
859Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
860Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
861Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
862Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
863Dec 14 19:48:33.000 [notice] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
864Dec 14 19:48:33.000 [notice] Tor 0.3.2.7-rc (git-04f4f30af76cdedf) opening log file.
865Dec 14 19:48:33.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 1048544, ConnLimit_high_thresh 1048480, ConnLimit_low_thresh 786408
866Dec 14 19:48:33.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode)
867Dec 14 19:48:33.000 [info] cell_ewma_set_scale_factor(): Enabled cell_ewma algorithm because of value in CircuitPriorityHalflifeMsec in consensus; scale factor is 0.793701 per 10 seconds
868Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
869Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
870Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
871Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
872Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
873Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
874Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
875Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
876Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
877Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
878Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
879Dec 14 19:48:33.000 [notice] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
880Dec 14 19:48:33.000 [notice] Tor 0.3.2.7-rc (git-04f4f30af76cdedf) opening log file.
881Dec 14 19:48:33.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 1048544, ConnLimit_high_thresh 1048480, ConnLimit_low_thresh 786408
882Dec 14 19:48:33.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode)
883Dec 14 19:48:33.000 [info] cell_ewma_set_scale_factor(): Enabled cell_ewma algorithm because of value in CircuitPriorityHalflifeMsec in consensus; scale factor is 0.793701 per 10 seconds
884Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
885Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
886Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
887Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
888Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
889Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
890Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
891Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
892Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
893Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
894Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
895Dec 14 19:48:33.000 [notice] Opening Socks listener on 127.0.0.1:9150
896Dec 14 19:48:33.000 [notice] Tor 0.3.2.7-rc (git-04f4f30af76cdedf) opening log file.
897Dec 14 19:48:33.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 1048544, ConnLimit_high_thresh 1048480, ConnLimit_low_thresh 786408
898Dec 14 19:48:33.000 [info] parse_transport_line(): Pluggable transport proxy (fte exec ./TorBrowser/Tor/PluggableTransports/fteproxy.bin --managed) does not provide any needed transports and will not be launched.
899Dec 14 19:48:33.000 [info] parse_transport_line(): Pluggable transport proxy (meek exec ./TorBrowser/Tor/PluggableTransports/meek-client-torbrowser -- ./TorBrowser/Tor/PluggableTransports/meek-client) does not provide any needed transports and will not be launched.
900Dec 14 19:48:33.000 [info] parse_transport_line(): Pluggable transport proxy (snowflake exec ./TorBrowser/Tor/PluggableTransports/snowflake-client -url https://snowflake-reg.appspot.com/ -front www.google.com -ice stun:stun.l.google.com:19302) does not provide any needed transports and will not be launched.
901Dec 14 19:48:33.000 [info] launch_managed_proxy(): Managed proxy at './TorBrowser/Tor/PluggableTransports/obfs4proxy' has spawned with PID '14351'.
902Dec 14 19:48:33.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode)
903Dec 14 19:48:33.000 [info] cell_ewma_set_scale_factor(): Enabled cell_ewma algorithm because of value in CircuitPriorityHalflifeMsec in consensus; scale factor is 0.793701 per 10 seconds
904Dec 14 19:48:33.000 [info] should_delay_dir_fetches(): Delaying dir fetches (pt proxies still configuring)
905Dec 14 19:48:33.000 [info] should_delay_dir_fetches(): Delaying dir fetches (pt proxies still configuring)
906Dec 14 19:48:33.000 [info] handle_proxy_line(): Got a line from managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy': (VERSION 1)
907Dec 14 19:48:33.000 [info] handle_proxy_line(): Got a line from managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy': (CMETHOD obfs2 socks5 127.0.0.1:43323)
908Dec 14 19:48:33.000 [info] parse_cmethod_line(): Transport obfs2 at 127.0.0.1:43323 with SOCKS 3. Attached to managed proxy.
909Dec 14 19:48:33.000 [info] handle_proxy_line(): Got a line from managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy': (CMETHOD obfs3 socks5 127.0.0.1:33479)
910Dec 14 19:48:33.000 [info] parse_cmethod_line(): Transport obfs3 at 127.0.0.1:33479 with SOCKS 3. Attached to managed proxy.
911Dec 14 19:48:33.000 [info] handle_proxy_line(): Got a line from managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy': (CMETHOD obfs4 socks5 127.0.0.1:41819)
912Dec 14 19:48:33.000 [info] parse_cmethod_line(): Transport obfs4 at 127.0.0.1:41819 with SOCKS 3. Attached to managed proxy.
913Dec 14 19:48:33.000 [info] handle_proxy_line(): Got a line from managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy': (CMETHOD scramblesuit socks5 127.0.0.1:40067)
914Dec 14 19:48:33.000 [info] parse_cmethod_line(): Transport scramblesuit at 127.0.0.1:40067 with SOCKS 3. Attached to managed proxy.
915Dec 14 19:48:33.000 [info] handle_proxy_line(): Got a line from managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy': (CMETHODS DONE)
916Dec 14 19:48:33.000 [info] handle_methods_done(): Client managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy' configuration completed!
917Dec 14 19:48:33.000 [info] register_client_proxy(): Successfully registered transport obfs2
918Dec 14 19:48:33.000 [info] register_client_proxy(): Successfully registered transport obfs3
919Dec 14 19:48:33.000 [info] register_client_proxy(): Successfully registered transport obfs4
920Dec 14 19:48:33.000 [info] register_client_proxy(): Successfully registered transport scramblesuit
921Dec 14 19:48:34.000 [notice] Our directory information is no longer up-to-date enough to build circuits: We're missing descriptors for 2/2 of our primary entry guards (total microdescriptors: 6474/6486).
922Dec 14 19:48:34.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
923Dec 14 19:48:34.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($00DC6C4FA49A65BD1472993CF6730D54F11E0DBB) at 154.35.22.12:80 for circuit.
924Dec 14 19:48:34.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
925Dec 14 19:48:44.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
926Dec 14 19:48:44.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit.
927Dec 14 19:48:44.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
928Dec 14 19:48:54.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
929Dec 14 19:48:54.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($00DC6C4FA49A65BD1472993CF6730D54F11E0DBB) at 154.35.22.12:80 for circuit.
930Dec 14 19:48:54.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
931Dec 14 19:49:04.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
932Dec 14 19:49:04.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($BBB28DF0F201E706BE564EFE690FE9577DD8386D) at 109.105.109.147:13764 for circuit.
933Dec 14 19:49:04.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
934Dec 14 19:49:13.000 [info] routerlist_remove_old_routers(): We have 3 live routers and 0 old router descriptors.
935Dec 14 19:49:14.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
936Dec 14 19:49:14.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($00DC6C4FA49A65BD1472993CF6730D54F11E0DBB) at 154.35.22.12:80 for circuit.
937Dec 14 19:49:14.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
938Dec 14 19:49:24.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
939Dec 14 19:49:24.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit.
940Dec 14 19:49:24.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
941Dec 14 19:49:34.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
942Dec 14 19:49:34.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($BBB28DF0F201E706BE564EFE690FE9577DD8386D) at 109.105.109.147:13764 for circuit.
943Dec 14 19:49:34.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
944Dec 14 19:49:44.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
945Dec 14 19:49:44.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit.
946Dec 14 19:49:44.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
947Dec 14 19:49:54.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
948Dec 14 19:49:54.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit.
949Dec 14 19:49:54.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
950Dec 14 19:50:04.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
951Dec 14 19:50:04.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($00DC6C4FA49A65BD1472993CF6730D54F11E0DBB) at 154.35.22.12:80 for circuit.
952Dec 14 19:50:04.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
953Dec 14 19:50:13.000 [info] routerlist_remove_old_routers(): We have 3 live routers and 0 old router descriptors.
954Dec 14 19:50:14.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
955Dec 14 19:50:14.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit.
956Dec 14 19:50:14.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
957Dec 14 19:50:24.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
958Dec 14 19:50:24.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit.
959Dec 14 19:50:24.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
960Dec 14 19:50:34.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
961Dec 14 19:50:34.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit.
962Dec 14 19:50:34.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
963Dec 14 19:50:44.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
964Dec 14 19:50:44.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($BBB28DF0F201E706BE564EFE690FE9577DD8386D) at 109.105.109.147:13764 for circuit.
965Dec 14 19:50:44.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
966Dec 14 19:50:54.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
967Dec 14 19:50:54.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit.
968Dec 14 19:50:54.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
969Dec 14 19:51:04.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
970Dec 14 19:51:04.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($00DC6C4FA49A65BD1472993CF6730D54F11E0DBB) at 154.35.22.12:80 for circuit.
971Dec 14 19:51:04.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
972Dec 14 19:51:13.000 [info] routerlist_remove_old_routers(): We have 3 live routers and 0 old router descriptors.
973Dec 14 19:51:14.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
974Dec 14 19:51:14.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($BBB28DF0F201E706BE564EFE690FE9577DD8386D) at 109.105.109.147:13764 for circuit.
975Dec 14 19:51:14.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
976Dec 14 19:51:24.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
977Dec 14 19:51:24.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($BBB28DF0F201E706BE564EFE690FE9577DD8386D) at 109.105.109.147:13764 for circuit.
978Dec 14 19:51:24.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
979Dec 14 19:51:34.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
980Dec 14 19:51:34.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit.
981Dec 14 19:51:34.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
982Dec 14 19:51:44.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
983Dec 14 19:51:44.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($BBB28DF0F201E706BE564EFE690FE9577DD8386D) at 109.105.109.147:13764 for circuit.
984Dec 14 19:51:44.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
985Dec 14 19:51:54.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
986Dec 14 19:51:54.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($BBB28DF0F201E706BE564EFE690FE9577DD8386D) at 109.105.109.147:13764 for circuit.
987Dec 14 19:51:54.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
988Dec 14 19:52:04.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
989Dec 14 19:52:04.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit.
990Dec 14 19:52:04.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
991Dec 14 19:52:13.000 [info] routerlist_remove_old_routers(): We have 3 live routers and 0 old router descriptors.
992Dec 14 19:52:14.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
993Dec 14 19:52:14.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($BBB28DF0F201E706BE564EFE690FE9577DD8386D) at 109.105.109.147:13764 for circuit.
994Dec 14 19:52:14.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
995Dec 14 19:52:24.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
996Dec 14 19:52:24.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($BBB28DF0F201E706BE564EFE690FE9577DD8386D) at 109.105.109.147:13764 for circuit.
997Dec 14 19:52:24.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
998Dec 14 19:52:34.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
999Dec 14 19:52:34.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit.
1000Dec 14 19:52:34.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
1001Dec 14 19:52:44.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
1002Dec 14 19:52:44.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit.
1003Dec 14 19:52:44.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
1004Dec 14 19:52:54.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
1005Dec 14 19:52:54.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($00DC6C4FA49A65BD1472993CF6730D54F11E0DBB) at 154.35.22.12:80 for circuit.
1006Dec 14 19:52:54.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
1007Dec 14 19:53:04.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
1008Dec 14 19:53:04.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit.
1009Dec 14 19:53:04.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
1010Dec 14 19:53:13.000 [info] routerlist_remove_old_routers(): We have 3 live routers and 0 old router descriptors.
1011Dec 14 19:53:14.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
1012Dec 14 19:53:14.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit.
1013Dec 14 19:53:14.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
1014Dec 14 19:53:24.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
1015Dec 14 19:53:24.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($00DC6C4FA49A65BD1472993CF6730D54F11E0DBB) at 154.35.22.12:80 for circuit.
1016Dec 14 19:53:24.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
1017Dec 14 19:53:34.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
1018Dec 14 19:53:34.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit.
1019Dec 14 19:53:34.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
1020Dec 14 19:53:44.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
1021Dec 14 19:53:44.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit.
1022Dec 14 19:53:44.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
1023Dec 14 19:53:54.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
1024Dec 14 19:53:54.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($BBB28DF0F201E706BE564EFE690FE9577DD8386D) at 109.105.109.147:13764 for circuit.
1025Dec 14 19:53:54.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
1026Dec 14 19:54:04.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
1027Dec 14 19:54:04.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit.
1028Dec 14 19:54:04.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
1029Dec 14 19:54:13.000 [info] routerlist_remove_old_routers(): We have 3 live routers and 0 old router descriptors.
1030Dec 14 19:54:14.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
1031Dec 14 19:54:14.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($00DC6C4FA49A65BD1472993CF6730D54F11E0DBB) at 154.35.22.12:80 for circuit.
1032Dec 14 19:54:14.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
1033Dec 14 19:54:24.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
1034Dec 14 19:54:24.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit.
1035Dec 14 19:54:24.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
1036Dec 14 19:54:34.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
1037Dec 14 19:54:34.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($00DC6C4FA49A65BD1472993CF6730D54F11E0DBB) at 154.35.22.12:80 for circuit.
1038Dec 14 19:54:34.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
1039Dec 14 19:54:44.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
1040Dec 14 19:54:44.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($BBB28DF0F201E706BE564EFE690FE9577DD8386D) at 109.105.109.147:13764 for circuit.
1041Dec 14 19:54:44.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
1042Dec 14 19:54:54.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
1043Dec 14 19:54:54.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($BBB28DF0F201E706BE564EFE690FE9577DD8386D) at 109.105.109.147:13764 for circuit.
1044Dec 14 19:54:54.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
1045Dec 14 19:55:04.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time
1046Dec 14 19:55:04.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit.
1047Dec 14 19:55:04.000 [notice] Ignoring directory request, since no bridge nodes are available yet.
1048Dec 14 19:55:10.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
1049Dec 14 19:55:10.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
1050Dec 14 19:55:10.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
1051Dec 14 19:55:10.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
1052Dec 14 19:55:10.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
1053Dec 14 19:55:10.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
1054Dec 14 19:55:10.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
1055Dec 14 19:55:10.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
1056Dec 14 19:55:10.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
1057Dec 14 19:55:10.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
1058Dec 14 19:55:10.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.)
1059Dec 14 19:55:10.000 [notice] Closing no-longer-configured Socks listener on 127.0.0.1:9150
1060Dec 14 19:55:10.000 [notice] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
1061Dec 14 19:55:10.000 [notice] Tor 0.3.2.7-rc (git-04f4f30af76cdedf) opening log file.
1062Dec 14 19:55:10.000 [notice] Closing old Socks listener on 127.0.0.1:9150
1063Dec 14 19:55:10.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 1048544, ConnLimit_high_thresh 1048480, ConnLimit_low_thresh 786408
1064Dec 14 19:55:10.000 [info] tor_process_handle_destroy(): Terminated process with PID '14351'.
1065Dec 14 19:55:10.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode)
1066Dec 14 19:55:10.000 [info] cell_ewma_set_scale_factor(): Enabled cell_ewma algorithm because of value in CircuitPriorityHalflifeMsec in consensus; scale factor is 0.793701 per 10 seconds
1067Dec 14 19:55:10.000 [info] notify_waitpid_callback_by_pid(): Child process 14351 has exited; no callback was registered
1068Dec 14 19:55:11.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set)
1069Dec 14 19:55:11.000 [notice] Delaying directory fetches: DisableNetwork is set.
1070Dec 14 19:55:11.000 [info] connection_control_reached_eof(): Control connection reached EOF. Closing.
1071Dec 14 19:55:11.000 [notice] Owning controller connection has closed -- exiting now.
1072Dec 14 19:55:11.000 [notice] Catching signal TERM, exiting cleanly.
1073Dec 14 19:55:11.000 [info] or_state_save(): Saved state to "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/state"
1074Dec 14 19:55:12.000 [info] tor_lockfile_unlock(): Unlocking "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/lock"