1 | Dec 14 19:48:12.000 [notice] Tor 0.3.2.7-rc (git-04f4f30af76cdedf) opening new log file. |
---|
2 | Dec 14 19:48:12.088 [notice] Tor 0.3.2.7-rc (git-04f4f30af76cdedf) running on Linux with Libevent 2.1.8-stable, OpenSSL 1.1.0g, Zlib 1.2.8, Liblzma 5.2.2, and Libzstd 1.3.2. |
---|
3 | Dec 14 19:48:12.088 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning |
---|
4 | Dec 14 19:48:12.088 [notice] Read configuration file "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/torrc-defaults". |
---|
5 | Dec 14 19:48:12.088 [notice] Read configuration file "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/torrc". |
---|
6 | Dec 14 19:48:12.095 [notice] Scheduler type KIST has been enabled. |
---|
7 | Dec 14 19:48:12.095 [notice] Opening Control listener on 127.0.0.1:9151 |
---|
8 | Dec 14 19:48:12.095 [notice] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections. |
---|
9 | Dec 14 19:48:12.000 [warn] Your log may contain sensitive information - you're logging more than "notice". Don't log unless it serves an important reason. Overwrite the log afterwards. |
---|
10 | Dec 14 19:48:12.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 1048544, ConnLimit_high_thresh 1048480, ConnLimit_low_thresh 786408 |
---|
11 | Dec 14 19:48:12.000 [info] tor_lockfile_lock(): Locking "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/lock" |
---|
12 | Dec 14 19:48:12.000 [info] or_state_load(): Initialized state |
---|
13 | Dec 14 19:48:12.000 [info] circuit_build_times_parse_state(): Adding 0 timeouts. |
---|
14 | Dec 14 19:48:12.000 [info] circuit_build_times_parse_state(): Loaded 0/0 values from 0 lines in circuit time histogram |
---|
15 | Dec 14 19:48:12.000 [info] or_state_save(): Saved state to "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/state" |
---|
16 | Dec 14 19:48:12.000 [info] read_file_to_str(): Could not open "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/router-stability": No such file or directory |
---|
17 | Dec 14 19:48:12.000 [info] init_cookie_authentication(): Generated auth cookie file in '"/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/control_auth_cookie"'. |
---|
18 | Dec 14 19:48:12.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode) |
---|
19 | Dec 14 19:48:12.000 [info] cell_ewma_set_scale_factor(): Disabled cell_ewma algorithm because of value in Default value |
---|
20 | Dec 14 19:48:12.000 [notice] Parsing GEOIP IPv4 file /home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/geoip. |
---|
21 | Dec 14 19:48:12.000 [notice] Parsing GEOIP IPv6 file /home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/geoip6. |
---|
22 | Dec 14 19:48:12.000 [info] add_predicted_port(): New port prediction added. Will continue predictive circ building for 3295 more seconds. |
---|
23 | Dec 14 19:48:12.000 [info] crypto_global_init(): NOT using OpenSSL engine support. |
---|
24 | Dec 14 19:48:12.000 [info] evaluate_evp_for_aes(): This version of OpenSSL has a known-good EVP counter-mode implementation. Using it. |
---|
25 | Dec 14 19:48:12.000 [notice] Bootstrapped 0%: Starting |
---|
26 | Dec 14 19:48:12.000 [info] read_file_to_str(): Could not open "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/cached-certs": No such file or directory |
---|
27 | Dec 14 19:48:12.000 [info] read_file_to_str(): Could not open "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/cached-consensus": No such file or directory |
---|
28 | Dec 14 19:48:12.000 [info] read_file_to_str(): Could not open "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/unverified-consensus": No such file or directory |
---|
29 | Dec 14 19:48:12.000 [info] read_file_to_str(): Could not open "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/cached-microdesc-consensus": No such file or directory |
---|
30 | Dec 14 19:48:12.000 [info] read_file_to_str(): Could not open "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/unverified-microdesc-consensus": No such file or directory |
---|
31 | Dec 14 19:48:12.000 [info] tor_mmap_file(): Could not open "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/cached-microdescs" for mmap(): No such file or directory |
---|
32 | Dec 14 19:48:12.000 [info] read_file_to_str(): Could not open "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/cached-microdescs.new": No such file or directory |
---|
33 | Dec 14 19:48:12.000 [info] microdesc_cache_reload(): Reloaded microdescriptor cache. Found 0 descriptors. |
---|
34 | Dec 14 19:48:12.000 [info] tor_mmap_file(): Could not open "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/cached-descriptors" for mmap(): No such file or directory |
---|
35 | Dec 14 19:48:12.000 [info] tor_mmap_file(): Could not open "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/cached-extrainfo" for mmap(): No such file or directory |
---|
36 | Dec 14 19:48:12.000 [notice] Starting with guard context "default" |
---|
37 | Dec 14 19:48:12.000 [info] sampled_guards_update_from_consensus(): Not updating the sample guard set; we have no live consensus. |
---|
38 | Dec 14 19:48:12.000 [info] sample_reachable_filtered_entry_guards(): Trying to sample a reachable guard: We know of 0 in the USABLE_FILTERED set. |
---|
39 | Dec 14 19:48:12.000 [info] sample_reachable_filtered_entry_guards(): (That isn't enough. Trying to expand the sample.) |
---|
40 | Dec 14 19:48:12.000 [info] entry_guards_expand_sample(): Not expanding the sample guard set; we have no live consensus. |
---|
41 | Dec 14 19:48:12.000 [info] sample_reachable_filtered_entry_guards(): (After filters [b], we have 0 guards to consider.) |
---|
42 | Dec 14 19:48:12.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set) |
---|
43 | Dec 14 19:48:12.000 [notice] Delaying directory fetches: DisableNetwork is set. |
---|
44 | Dec 14 19:48:12.000 [info] I learned some more directory information, but not enough to build a circuit: DisableNetwork is set. |
---|
45 | Dec 14 19:48:12.000 [notice] New control connection opened from 127.0.0.1. |
---|
46 | Dec 14 19:48:12.000 [info] handle_control_authenticate(): Authenticated control connection (15) |
---|
47 | Dec 14 19:48:12.000 [info] handle_control_takeownership(): Control connection 15 has taken ownership of this Tor instance. |
---|
48 | Dec 14 19:48:12.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
49 | Dec 14 19:48:12.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
50 | Dec 14 19:48:12.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
51 | Dec 14 19:48:12.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
52 | Dec 14 19:48:12.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
53 | Dec 14 19:48:12.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
54 | Dec 14 19:48:12.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
55 | Dec 14 19:48:12.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
56 | Dec 14 19:48:12.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
57 | Dec 14 19:48:12.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
58 | Dec 14 19:48:12.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
59 | Dec 14 19:48:12.000 [notice] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections. |
---|
60 | Dec 14 19:48:12.000 [notice] Tor 0.3.2.7-rc (git-04f4f30af76cdedf) opening log file. |
---|
61 | Dec 14 19:48:12.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 1048544, ConnLimit_high_thresh 1048480, ConnLimit_low_thresh 786408 |
---|
62 | Dec 14 19:48:12.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode) |
---|
63 | Dec 14 19:48:12.000 [info] cell_ewma_set_scale_factor(): Disabled cell_ewma algorithm because of value in Default value |
---|
64 | Dec 14 19:48:12.000 [info] sampled_guards_update_from_consensus(): Not updating the sample guard set; we have no live consensus. |
---|
65 | Dec 14 19:48:12.000 [info] sample_reachable_filtered_entry_guards(): Trying to sample a reachable guard: We know of 0 in the USABLE_FILTERED set. |
---|
66 | Dec 14 19:48:12.000 [info] sample_reachable_filtered_entry_guards(): (That isn't enough. Trying to expand the sample.) |
---|
67 | Dec 14 19:48:12.000 [info] entry_guards_expand_sample(): Not expanding the sample guard set; we have no live consensus. |
---|
68 | Dec 14 19:48:12.000 [info] sample_reachable_filtered_entry_guards(): (After filters [b], we have 0 guards to consider.) |
---|
69 | Dec 14 19:48:12.000 [notice] New control connection opened from 127.0.0.1. |
---|
70 | Dec 14 19:48:12.000 [info] handle_control_authenticate(): Authenticated control connection (9) |
---|
71 | Dec 14 19:48:13.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set) |
---|
72 | Dec 14 19:48:13.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set) |
---|
73 | Dec 14 19:48:13.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set) |
---|
74 | Dec 14 19:48:14.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set) |
---|
75 | Dec 14 19:48:14.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set) |
---|
76 | Dec 14 19:48:14.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set) |
---|
77 | Dec 14 19:48:15.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set) |
---|
78 | Dec 14 19:48:15.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set) |
---|
79 | Dec 14 19:48:15.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set) |
---|
80 | Dec 14 19:48:16.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set) |
---|
81 | Dec 14 19:48:16.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set) |
---|
82 | Dec 14 19:48:16.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set) |
---|
83 | Dec 14 19:48:17.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set) |
---|
84 | Dec 14 19:48:17.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set) |
---|
85 | Dec 14 19:48:17.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set) |
---|
86 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
87 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
88 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
89 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
90 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
91 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
92 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
93 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
94 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
95 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
96 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
97 | Dec 14 19:48:18.000 [notice] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections. |
---|
98 | Dec 14 19:48:18.000 [notice] Tor 0.3.2.7-rc (git-04f4f30af76cdedf) opening log file. |
---|
99 | Dec 14 19:48:18.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 1048544, ConnLimit_high_thresh 1048480, ConnLimit_low_thresh 786408 |
---|
100 | Dec 14 19:48:18.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode) |
---|
101 | Dec 14 19:48:18.000 [info] cell_ewma_set_scale_factor(): Disabled cell_ewma algorithm because of value in Default value |
---|
102 | Dec 14 19:48:18.000 [info] options_act(): Changed to using entry guards or bridges, or changed preferred or excluded node lists. Abandoning previous circuits. |
---|
103 | Dec 14 19:48:18.000 [notice] Switching to guard context "bridges" (was using "default") |
---|
104 | Dec 14 19:48:18.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus. |
---|
105 | Dec 14 19:48:18.000 [info] sample_reachable_filtered_entry_guards(): Trying to sample a reachable guard: We know of 0 in the USABLE_FILTERED set. |
---|
106 | Dec 14 19:48:18.000 [info] sample_reachable_filtered_entry_guards(): (That isn't enough. Trying to expand the sample.) |
---|
107 | Dec 14 19:48:18.000 [info] entry_guards_expand_sample(): Expanding the sample guard set. We have 0 guards in the sample, and 5 eligible guards to extend it with. |
---|
108 | Dec 14 19:48:18.000 [info] entry_guards_expand_sample(): Not expanding the guard sample any further; just ran out of eligible guards |
---|
109 | Dec 14 19:48:18.000 [info] sample_reachable_filtered_entry_guards(): (After filters [b], we have 5 guards to consider.) |
---|
110 | Dec 14 19:48:18.000 [info] sample_reachable_filtered_entry_guards(): (Selected [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) at 83.212.101.3:80.) |
---|
111 | Dec 14 19:48:18.000 [info] sample_reachable_filtered_entry_guards(): Trying to sample a reachable guard: We know of 5 in the USABLE_FILTERED set. |
---|
112 | Dec 14 19:48:18.000 [info] sample_reachable_filtered_entry_guards(): (That isn't enough. Trying to expand the sample.) |
---|
113 | Dec 14 19:48:18.000 [info] entry_guards_expand_sample(): Expanding the sample guard set. We have 5 guards in the sample, and 0 eligible guards to extend it with. |
---|
114 | Dec 14 19:48:18.000 [info] entry_guards_expand_sample(): Not expanding the guard sample any further; just ran out of eligible guards |
---|
115 | Dec 14 19:48:18.000 [info] sample_reachable_filtered_entry_guards(): (After filters [b], we have 4 guards to consider.) |
---|
116 | Dec 14 19:48:18.000 [info] sample_reachable_filtered_entry_guards(): (Selected [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980.) |
---|
117 | Dec 14 19:48:18.000 [info] sample_reachable_filtered_entry_guards(): Trying to sample a reachable guard: We know of 5 in the USABLE_FILTERED set. |
---|
118 | Dec 14 19:48:18.000 [info] sample_reachable_filtered_entry_guards(): (That isn't enough. Trying to expand the sample.) |
---|
119 | Dec 14 19:48:18.000 [info] entry_guards_expand_sample(): Expanding the sample guard set. We have 5 guards in the sample, and 0 eligible guards to extend it with. |
---|
120 | Dec 14 19:48:18.000 [info] entry_guards_expand_sample(): Not expanding the guard sample any further; just ran out of eligible guards |
---|
121 | Dec 14 19:48:18.000 [info] sample_reachable_filtered_entry_guards(): (After filters [b], we have 3 guards to consider.) |
---|
122 | Dec 14 19:48:18.000 [info] sample_reachable_filtered_entry_guards(): (Selected [bridge] ($AF9F66B7B04F8FF6F32D455F05135250A16543C9) at 169.229.59.74:31493.) |
---|
123 | Dec 14 19:48:18.000 [info] entry_guards_update_primary(): Primary entry guards have changed. New primary guard list is: |
---|
124 | Dec 14 19:48:18.000 [info] entry_guards_update_primary(): 1/3: [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) at 83.212.101.3:80 |
---|
125 | Dec 14 19:48:18.000 [info] entry_guards_update_primary(): 2/3: [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980 |
---|
126 | Dec 14 19:48:18.000 [info] entry_guards_update_primary(): 3/3: [bridge] ($AF9F66B7B04F8FF6F32D455F05135250A16543C9) at 169.229.59.74:31493 |
---|
127 | Dec 14 19:48:18.000 [info] update_consensus_networkstatus_fetch_time_impl(): No live microdesc consensus; we should fetch one immediately. |
---|
128 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
129 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
130 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
131 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
132 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
133 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
134 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
135 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
136 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
137 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
138 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
139 | Dec 14 19:48:18.000 [notice] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections. |
---|
140 | Dec 14 19:48:18.000 [notice] Tor 0.3.2.7-rc (git-04f4f30af76cdedf) opening log file. |
---|
141 | Dec 14 19:48:18.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 1048544, ConnLimit_high_thresh 1048480, ConnLimit_low_thresh 786408 |
---|
142 | Dec 14 19:48:18.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode) |
---|
143 | Dec 14 19:48:18.000 [info] cell_ewma_set_scale_factor(): Disabled cell_ewma algorithm because of value in Default value |
---|
144 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
145 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
146 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
147 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
148 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
149 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
150 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
151 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
152 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
153 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
154 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
155 | Dec 14 19:48:18.000 [notice] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections. |
---|
156 | Dec 14 19:48:18.000 [notice] Tor 0.3.2.7-rc (git-04f4f30af76cdedf) opening log file. |
---|
157 | Dec 14 19:48:18.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 1048544, ConnLimit_high_thresh 1048480, ConnLimit_low_thresh 786408 |
---|
158 | Dec 14 19:48:18.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode) |
---|
159 | Dec 14 19:48:18.000 [info] cell_ewma_set_scale_factor(): Disabled cell_ewma algorithm because of value in Default value |
---|
160 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
161 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
162 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
163 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
164 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
165 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
166 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
167 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
168 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
169 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
170 | Dec 14 19:48:18.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
171 | Dec 14 19:48:18.000 [notice] Opening Socks listener on 127.0.0.1:9150 |
---|
172 | Dec 14 19:48:18.000 [notice] Tor 0.3.2.7-rc (git-04f4f30af76cdedf) opening log file. |
---|
173 | Dec 14 19:48:18.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 1048544, ConnLimit_high_thresh 1048480, ConnLimit_low_thresh 786408 |
---|
174 | Dec 14 19:48:18.000 [info] parse_transport_line(): Pluggable transport proxy (fte exec ./TorBrowser/Tor/PluggableTransports/fteproxy.bin --managed) does not provide any needed transports and will not be launched. |
---|
175 | Dec 14 19:48:18.000 [info] parse_transport_line(): Pluggable transport proxy (meek exec ./TorBrowser/Tor/PluggableTransports/meek-client-torbrowser -- ./TorBrowser/Tor/PluggableTransports/meek-client) does not provide any needed transports and will not be launched. |
---|
176 | Dec 14 19:48:18.000 [info] parse_transport_line(): Pluggable transport proxy (snowflake exec ./TorBrowser/Tor/PluggableTransports/snowflake-client -url https://snowflake-reg.appspot.com/ -front www.google.com -ice stun:stun.l.google.com:19302) does not provide any needed transports and will not be launched. |
---|
177 | Dec 14 19:48:18.000 [info] launch_managed_proxy(): Managed proxy at './TorBrowser/Tor/PluggableTransports/obfs4proxy' has spawned with PID '14343'. |
---|
178 | Dec 14 19:48:18.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode) |
---|
179 | Dec 14 19:48:18.000 [info] cell_ewma_set_scale_factor(): Disabled cell_ewma algorithm because of value in Default value |
---|
180 | Dec 14 19:48:18.000 [notice] Renaming old configuration file to "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/torrc.orig.1" |
---|
181 | Dec 14 19:48:18.000 [info] should_delay_dir_fetches(): Delaying dir fetches (no running bridges known) |
---|
182 | Dec 14 19:48:18.000 [info] should_delay_dir_fetches(): Delaying dir fetches (no running bridges known) |
---|
183 | Dec 14 19:48:18.000 [info] should_delay_dir_fetches(): Delaying dir fetches (no running bridges known) |
---|
184 | Dec 14 19:48:18.000 [info] handle_proxy_line(): Got a line from managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy': (VERSION 1) |
---|
185 | Dec 14 19:48:18.000 [info] handle_proxy_line(): Got a line from managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy': (CMETHOD obfs2 socks5 127.0.0.1:41179) |
---|
186 | Dec 14 19:48:18.000 [info] parse_cmethod_line(): Transport obfs2 at 127.0.0.1:41179 with SOCKS 3. Attached to managed proxy. |
---|
187 | Dec 14 19:48:18.000 [info] handle_proxy_line(): Got a line from managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy': (CMETHOD obfs3 socks5 127.0.0.1:43563) |
---|
188 | Dec 14 19:48:18.000 [info] parse_cmethod_line(): Transport obfs3 at 127.0.0.1:43563 with SOCKS 3. Attached to managed proxy. |
---|
189 | Dec 14 19:48:18.000 [info] handle_proxy_line(): Got a line from managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy': (CMETHOD obfs4 socks5 127.0.0.1:34913) |
---|
190 | Dec 14 19:48:18.000 [info] parse_cmethod_line(): Transport obfs4 at 127.0.0.1:34913 with SOCKS 3. Attached to managed proxy. |
---|
191 | Dec 14 19:48:18.000 [info] handle_proxy_line(): Got a line from managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy': (CMETHOD scramblesuit socks5 127.0.0.1:43791) |
---|
192 | Dec 14 19:48:18.000 [info] parse_cmethod_line(): Transport scramblesuit at 127.0.0.1:43791 with SOCKS 3. Attached to managed proxy. |
---|
193 | Dec 14 19:48:18.000 [info] handle_proxy_line(): Got a line from managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy': (CMETHODS DONE) |
---|
194 | Dec 14 19:48:18.000 [info] handle_methods_done(): Client managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy' configuration completed! |
---|
195 | Dec 14 19:48:18.000 [info] register_client_proxy(): Successfully registered transport obfs2 |
---|
196 | Dec 14 19:48:18.000 [info] register_client_proxy(): Successfully registered transport obfs3 |
---|
197 | Dec 14 19:48:18.000 [info] register_client_proxy(): Successfully registered transport obfs4 |
---|
198 | Dec 14 19:48:18.000 [info] register_client_proxy(): Successfully registered transport scramblesuit |
---|
199 | Dec 14 19:48:19.000 [info] should_delay_dir_fetches(): Delaying dir fetches (no running bridges known) |
---|
200 | Dec 14 19:48:19.000 [info] should_delay_dir_fetches(): Delaying dir fetches (no running bridges known) |
---|
201 | Dec 14 19:48:19.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:47779 ... |
---|
202 | Dec 14 19:48:19.000 [info] connection_ap_make_link(): ... application connection created and linked. |
---|
203 | Dec 14 19:48:19.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:80 ... |
---|
204 | Dec 14 19:48:19.000 [info] connection_ap_make_link(): ... application connection created and linked. |
---|
205 | Dec 14 19:48:19.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:31493 ... |
---|
206 | Dec 14 19:48:19.000 [info] connection_ap_make_link(): ... application connection created and linked. |
---|
207 | Dec 14 19:48:19.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:46328 ... |
---|
208 | Dec 14 19:48:19.000 [info] connection_ap_make_link(): ... application connection created and linked. |
---|
209 | Dec 14 19:48:19.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:38980 ... |
---|
210 | Dec 14 19:48:19.000 [info] connection_ap_make_link(): ... application connection created and linked. |
---|
211 | Dec 14 19:48:19.000 [info] should_delay_dir_fetches(): Delaying dir fetches (no running bridges known) |
---|
212 | Dec 14 19:48:19.000 [info] onion_pick_cpath_exit(): Using requested exit node '$4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A~4C331FA9B3D1D6D8FB0 at 109.105.109.163' |
---|
213 | Dec 14 19:48:19.000 [info] circuit_handle_first_hop(): Next router is [scrubbed]: Not connected. Connecting. |
---|
214 | Dec 14 19:48:19.000 [notice] Bootstrapped 5%: Connecting to directory server |
---|
215 | Dec 14 19:48:19.000 [info] connection_or_set_canonical(): Channel 0 chose an idle timeout of 182. |
---|
216 | Dec 14 19:48:19.000 [info] connection_or_set_identity_digest(): Set identity digest for 0x613000000ac0 ([scrubbed]): 4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A <unset>. |
---|
217 | Dec 14 19:48:19.000 [info] connection_or_set_identity_digest(): (Previously: 0000000000000000000000000000000000000000 <unset>) |
---|
218 | Dec 14 19:48:19.000 [info] get_transport_by_bridge_addrport(): Looked up transport for 109.105.109.163:47779: found obfs3. |
---|
219 | Dec 14 19:48:19.000 [info] onion_pick_cpath_exit(): Using requested exit node '$A09D536DD1752D542E1FBB3C9CE4449D51298239~A09D536DD1752D542E1 at 83.212.101.3' |
---|
220 | Dec 14 19:48:19.000 [info] circuit_handle_first_hop(): Next router is [scrubbed]: Not connected. Connecting. |
---|
221 | Dec 14 19:48:19.000 [info] connection_or_set_canonical(): Channel 0 chose an idle timeout of 236. |
---|
222 | Dec 14 19:48:19.000 [info] connection_or_set_identity_digest(): Set identity digest for 0x613000000c80 ([scrubbed]): A09D536DD1752D542E1FBB3C9CE4449D51298239 <unset>. |
---|
223 | Dec 14 19:48:19.000 [info] connection_or_set_identity_digest(): (Previously: 0000000000000000000000000000000000000000 <unset>) |
---|
224 | Dec 14 19:48:19.000 [info] get_transport_by_bridge_addrport(): Looked up transport for 83.212.101.3:80: found obfs3. |
---|
225 | Dec 14 19:48:19.000 [info] onion_pick_cpath_exit(): Using requested exit node '$AF9F66B7B04F8FF6F32D455F05135250A16543C9~AF9F66B7B04F8FF6F32 at 169.229.59.74' |
---|
226 | Dec 14 19:48:19.000 [info] circuit_handle_first_hop(): Next router is [scrubbed]: Not connected. Connecting. |
---|
227 | Dec 14 19:48:19.000 [info] connection_or_set_canonical(): Channel 0 chose an idle timeout of 260. |
---|
228 | Dec 14 19:48:19.000 [info] connection_or_set_identity_digest(): Set identity digest for 0x613000000e40 ([scrubbed]): AF9F66B7B04F8FF6F32D455F05135250A16543C9 <unset>. |
---|
229 | Dec 14 19:48:19.000 [info] connection_or_set_identity_digest(): (Previously: 0000000000000000000000000000000000000000 <unset>) |
---|
230 | Dec 14 19:48:19.000 [info] get_transport_by_bridge_addrport(): Looked up transport for 169.229.59.74:31493: found obfs3. |
---|
231 | Dec 14 19:48:19.000 [info] onion_pick_cpath_exit(): Using requested exit node '$1E05F577A0EC0213F971D81BF4D86A9E4E8229ED~1E05F577A0EC0213F97 at 109.105.109.163' |
---|
232 | Dec 14 19:48:19.000 [info] circuit_handle_first_hop(): Next router is [scrubbed]: Not connected. Connecting. |
---|
233 | Dec 14 19:48:19.000 [info] connection_or_set_canonical(): Channel 0 chose an idle timeout of 241. |
---|
234 | Dec 14 19:48:19.000 [info] connection_or_set_identity_digest(): Set identity digest for 0x613000001000 ([scrubbed]): 1E05F577A0EC0213F971D81BF4D86A9E4E8229ED <unset>. |
---|
235 | Dec 14 19:48:19.000 [info] connection_or_set_identity_digest(): (Previously: 0000000000000000000000000000000000000000 <unset>) |
---|
236 | Dec 14 19:48:19.000 [info] get_transport_by_bridge_addrport(): Looked up transport for 109.105.109.163:38980: found obfs3. |
---|
237 | Dec 14 19:48:19.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for circuit' state. Leaving it on buffer. |
---|
238 | Dec 14 19:48:19.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for circuit' state. Leaving it on buffer. |
---|
239 | Dec 14 19:48:19.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for circuit' state. Leaving it on buffer. |
---|
240 | Dec 14 19:48:19.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for circuit' state. Leaving it on buffer. |
---|
241 | Dec 14 19:48:19.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for circuit' state. Leaving it on buffer. |
---|
242 | Dec 14 19:48:19.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for circuit' state. Leaving it on buffer. |
---|
243 | Dec 14 19:48:19.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for circuit' state. Leaving it on buffer. |
---|
244 | Dec 14 19:48:19.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for circuit' state. Leaving it on buffer. |
---|
245 | Dec 14 19:48:19.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for circuit' state. Leaving it on buffer. |
---|
246 | Dec 14 19:48:19.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for circuit' state. Leaving it on buffer. |
---|
247 | Dec 14 19:48:19.000 [notice] Bootstrapped 10%: Finishing handshake with directory server |
---|
248 | Dec 14 19:48:19.000 [info] parse_socks_client(): SOCKS 5 client: continuing without authentication |
---|
249 | Dec 14 19:48:19.000 [info] parse_socks_client(): SOCKS 5 client: continuing without authentication |
---|
250 | Dec 14 19:48:19.000 [info] parse_socks_client(): SOCKS 5 client: continuing without authentication |
---|
251 | Dec 14 19:48:19.000 [info] parse_socks_client(): SOCKS 5 client: continuing without authentication |
---|
252 | Dec 14 19:48:19.000 [info] connection_read_proxy_handshake(): Proxy Client: connection to 109.105.109.163:38980 successful |
---|
253 | Dec 14 19:48:19.000 [info] connection_read_proxy_handshake(): Proxy Client: connection to 109.105.109.163:47779 successful |
---|
254 | Dec 14 19:48:19.000 [info] channel_tls_process_versions_cell(): Negotiated version 5 with [scrubbed]:47779; Waiting for CERTS cell |
---|
255 | Dec 14 19:48:19.000 [info] connection_or_client_learned_peer_id(): learned peer id for 0x613000000ac0 ([scrubbed]): 4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A, MThq6BCnQxjKVDT1dmvJtDGnyQ6qvDIb+7lZd7NSpUk |
---|
256 | Dec 14 19:48:19.000 [info] connection_or_client_learned_peer_id(): (we had no Ed25519 ID in mind when we made this connection. |
---|
257 | Dec 14 19:48:19.000 [info] connection_or_set_identity_digest(): Set identity digest for 0x613000000ac0 ([scrubbed]): 4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A MThq6BCnQxjKVDT1dmvJtDGnyQ6qvDIb+7lZd7NSpUk. |
---|
258 | Dec 14 19:48:19.000 [info] connection_or_set_identity_digest(): (Previously: 4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A <unset>) |
---|
259 | Dec 14 19:48:19.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:47779: Authenticated it with RSA and Ed25519 |
---|
260 | Dec 14 19:48:19.000 [info] connection_or_set_canonical(): Channel 1 chose an idle timeout of 224. |
---|
261 | Dec 14 19:48:19.000 [notice] Bootstrapped 15%: Establishing an encrypted directory connection |
---|
262 | Dec 14 19:48:19.000 [info] circuit_send_first_onion_skin(): First hop: finished sending CREATE_FAST cell to '<unnamed>' |
---|
263 | Dec 14 19:48:19.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:47779; OR connection is now open, using protocol version 5. Its ID digest is 4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A. Our address is apparently 151.177.15.217. |
---|
264 | Dec 14 19:48:19.000 [info] channel_tls_process_versions_cell(): Negotiated version 5 with [scrubbed]:38980; Waiting for CERTS cell |
---|
265 | Dec 14 19:48:19.000 [info] connection_or_client_learned_peer_id(): learned peer id for 0x613000001000 ([scrubbed]): 1E05F577A0EC0213F971D81BF4D86A9E4E8229ED, lR1FYvChO8Oh8cjGgo5gGGLayzeiYX3D9oUOuKUcito |
---|
266 | Dec 14 19:48:19.000 [info] connection_or_client_learned_peer_id(): (we had no Ed25519 ID in mind when we made this connection. |
---|
267 | Dec 14 19:48:19.000 [info] connection_or_set_identity_digest(): Set identity digest for 0x613000001000 ([scrubbed]): 1E05F577A0EC0213F971D81BF4D86A9E4E8229ED lR1FYvChO8Oh8cjGgo5gGGLayzeiYX3D9oUOuKUcito. |
---|
268 | Dec 14 19:48:19.000 [info] connection_or_set_identity_digest(): (Previously: 1E05F577A0EC0213F971D81BF4D86A9E4E8229ED <unset>) |
---|
269 | Dec 14 19:48:19.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:38980: Authenticated it with RSA and Ed25519 |
---|
270 | Dec 14 19:48:19.000 [info] connection_or_set_canonical(): Channel 4 chose an idle timeout of 233. |
---|
271 | Dec 14 19:48:19.000 [info] circuit_send_first_onion_skin(): First hop: finished sending CREATE_FAST cell to '<unnamed>' |
---|
272 | Dec 14 19:48:19.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:38980; OR connection is now open, using protocol version 5. Its ID digest is 1E05F577A0EC0213F971D81BF4D86A9E4E8229ED. Our address is apparently 151.177.15.217. |
---|
273 | Dec 14 19:48:19.000 [info] circuit_finish_handshake(): Finished building circuit hop: |
---|
274 | Dec 14 19:48:19.000 [info] internal circ (length 1, last hop 4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open) |
---|
275 | Dec 14 19:48:19.000 [info] circuit_build_no_more_hops(): circuit built! |
---|
276 | Dec 14 19:48:19.000 [notice] Bootstrapped 20%: Asking for networkstatus consensus |
---|
277 | Dec 14 19:48:19.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open) |
---|
278 | Dec 14 19:48:19.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed] |
---|
279 | Dec 14 19:48:19.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 4231647043 to begin stream 28242. |
---|
280 | Dec 14 19:48:19.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 4231647043 |
---|
281 | Dec 14 19:48:19.000 [info] connection_ap_handshake_send_begin(): Sending up to 131 + 0 bytes of queued-up data |
---|
282 | Dec 14 19:48:19.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 4231647043 streamid 28242 after 0 seconds. |
---|
283 | Dec 14 19:48:19.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open) |
---|
284 | Dec 14 19:48:19.000 [info] circuit_finish_handshake(): Finished building circuit hop: |
---|
285 | Dec 14 19:48:19.000 [info] internal circ (length 1, last hop 1E05F577A0EC0213F971D81BF4D86A9E4E8229ED): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open) |
---|
286 | Dec 14 19:48:19.000 [info] circuit_build_no_more_hops(): circuit built! |
---|
287 | Dec 14 19:48:19.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open) |
---|
288 | Dec 14 19:48:19.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed] |
---|
289 | Dec 14 19:48:19.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 3321416422 to begin stream 44333. |
---|
290 | Dec 14 19:48:19.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 3321416422 |
---|
291 | Dec 14 19:48:19.000 [info] connection_ap_handshake_send_begin(): Sending up to 131 + 0 bytes of queued-up data |
---|
292 | Dec 14 19:48:19.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 28242. Removing stream. |
---|
293 | Dec 14 19:48:19.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf. |
---|
294 | Dec 14 19:48:19.000 [info] make_guard_confirmed(): Marking [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779 as a confirmed guard (index 0) |
---|
295 | Dec 14 19:48:19.000 [info] entry_guards_update_primary(): Primary entry guards have changed. New primary guard list is: |
---|
296 | Dec 14 19:48:19.000 [info] entry_guards_update_primary(): 1/3: [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779 (confirmed) |
---|
297 | Dec 14 19:48:19.000 [info] entry_guards_update_primary(): 2/3: [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) at 83.212.101.3:80 |
---|
298 | Dec 14 19:48:19.000 [info] entry_guards_update_primary(): 3/3: [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980 |
---|
299 | Dec 14 19:48:19.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779 |
---|
300 | Dec 14 19:48:19.000 [info] handle_response_fetch_desc(): Received server info (body size 2242) from server '109.105.109.163:47779' |
---|
301 | Dec 14 19:48:19.000 [info] router_load_routers_from_string(): 1 elements to add |
---|
302 | Dec 14 19:48:19.000 [info] rewrite_node_address_for_bridge(): Adjusted bridge routerinfo for 'ndnop2' to match configured address 109.105.109.163:47779. |
---|
303 | Dec 14 19:48:19.000 [notice] new bridge descriptor 'ndnop2' (fresh): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A~ndnop2 at 109.105.109.163 |
---|
304 | Dec 14 19:48:19.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus. |
---|
305 | Dec 14 19:48:19.000 [info] I learned some more directory information, but not enough to build a circuit: We have no usable consensus. |
---|
306 | Dec 14 19:48:19.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf. |
---|
307 | Dec 14 19:48:19.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 3321416422 streamid 44333 after 0 seconds. |
---|
308 | Dec 14 19:48:19.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open) |
---|
309 | Dec 14 19:48:19.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 44333. Removing stream. |
---|
310 | Dec 14 19:48:19.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf. |
---|
311 | Dec 14 19:48:19.000 [info] make_guard_confirmed(): Marking [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980 as a confirmed guard (index 1) |
---|
312 | Dec 14 19:48:19.000 [info] entry_guards_update_primary(): Primary entry guards have changed. New primary guard list is: |
---|
313 | Dec 14 19:48:19.000 [info] entry_guards_update_primary(): 1/3: [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779 (confirmed) |
---|
314 | Dec 14 19:48:19.000 [info] entry_guards_update_primary(): 2/3: [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980 (confirmed) |
---|
315 | Dec 14 19:48:19.000 [info] entry_guards_update_primary(): 3/3: [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) at 83.212.101.3:80 |
---|
316 | Dec 14 19:48:19.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980 |
---|
317 | Dec 14 19:48:19.000 [info] handle_response_fetch_desc(): Received server info (body size 2241) from server '109.105.109.163:38980' |
---|
318 | Dec 14 19:48:19.000 [info] router_load_routers_from_string(): 1 elements to add |
---|
319 | Dec 14 19:48:19.000 [info] rewrite_node_address_for_bridge(): Adjusted bridge routerinfo for 'ndnop0' to match configured address 109.105.109.163:38980. |
---|
320 | Dec 14 19:48:19.000 [notice] new bridge descriptor 'ndnop0' (fresh): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED~ndnop0 at 109.105.109.163 |
---|
321 | Dec 14 19:48:19.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus. |
---|
322 | Dec 14 19:48:19.000 [info] I learned some more directory information, but not enough to build a circuit: We have no usable consensus. |
---|
323 | Dec 14 19:48:19.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf. |
---|
324 | Dec 14 19:48:19.000 [info] connection_read_proxy_handshake(): Proxy Client: connection to 83.212.101.3:80 successful |
---|
325 | Dec 14 19:48:20.000 [info] channel_tls_process_versions_cell(): Negotiated version 4 with [scrubbed]:80; Waiting for CERTS cell |
---|
326 | Dec 14 19:48:20.000 [info] connection_or_client_learned_peer_id(): learned peer id for 0x613000000c80 ([scrubbed]): A09D536DD1752D542E1FBB3C9CE4449D51298239, qylnnRfv53jY0IFgGsW+1WildRdnw13ytLNqePE2c5w |
---|
327 | Dec 14 19:48:20.000 [info] connection_or_client_learned_peer_id(): (we had no Ed25519 ID in mind when we made this connection. |
---|
328 | Dec 14 19:48:20.000 [info] connection_or_set_identity_digest(): Set identity digest for 0x613000000c80 ([scrubbed]): A09D536DD1752D542E1FBB3C9CE4449D51298239 qylnnRfv53jY0IFgGsW+1WildRdnw13ytLNqePE2c5w. |
---|
329 | Dec 14 19:48:20.000 [info] connection_or_set_identity_digest(): (Previously: A09D536DD1752D542E1FBB3C9CE4449D51298239 <unset>) |
---|
330 | Dec 14 19:48:20.000 [info] channel_tls_process_certs_cell(): Got some good certificates from [scrubbed]:80: Authenticated it with RSA and Ed25519 |
---|
331 | Dec 14 19:48:20.000 [info] connection_or_set_canonical(): Channel 2 chose an idle timeout of 259. |
---|
332 | Dec 14 19:48:20.000 [info] circuit_send_first_onion_skin(): First hop: finished sending CREATE_FAST cell to '<unnamed>' |
---|
333 | Dec 14 19:48:20.000 [info] channel_tls_process_netinfo_cell(): Got good NETINFO cell from [scrubbed]:80; OR connection is now open, using protocol version 4. Its ID digest is A09D536DD1752D542E1FBB3C9CE4449D51298239. Our address is apparently 151.177.15.217. |
---|
334 | Dec 14 19:48:20.000 [info] circuit_finish_handshake(): Finished building circuit hop: |
---|
335 | Dec 14 19:48:20.000 [info] internal circ (length 1, last hop A09D536DD1752D542E1FBB3C9CE4449D51298239): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open) |
---|
336 | Dec 14 19:48:20.000 [info] circuit_build_no_more_hops(): circuit built! |
---|
337 | Dec 14 19:48:20.000 [info] internal circ (length 1): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open) |
---|
338 | Dec 14 19:48:20.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed] |
---|
339 | Dec 14 19:48:20.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 3109431386 to begin stream 13598. |
---|
340 | Dec 14 19:48:20.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 3109431386 |
---|
341 | Dec 14 19:48:20.000 [info] connection_ap_handshake_send_begin(): Sending up to 122 + 0 bytes of queued-up data |
---|
342 | Dec 14 19:48:20.000 [info] update_consensus_bootstrap_attempt_downloads(): Launching microdesc bootstrap mirror networkstatus consensus download. |
---|
343 | Dec 14 19:48:20.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) at 83.212.101.3:80 for circuit. |
---|
344 | Dec 14 19:48:20.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
345 | Dec 14 19:48:20.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 3109431386 streamid 13598 after 0 seconds. |
---|
346 | Dec 14 19:48:20.000 [info] internal circ (length 1): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open) |
---|
347 | Dec 14 19:48:20.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 13598. Removing stream. |
---|
348 | Dec 14 19:48:20.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf. |
---|
349 | Dec 14 19:48:20.000 [info] make_guard_confirmed(): Marking [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) at 83.212.101.3:80 as a confirmed guard (index 2) |
---|
350 | Dec 14 19:48:20.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) at 83.212.101.3:80 |
---|
351 | Dec 14 19:48:20.000 [info] handle_response_fetch_desc(): Received server info (body size 2240) from server '83.212.101.3:80' |
---|
352 | Dec 14 19:48:20.000 [info] router_load_routers_from_string(): 1 elements to add |
---|
353 | Dec 14 19:48:20.000 [info] rewrite_node_address_for_bridge(): Adjusted bridge routerinfo for 'LeifEricson' to match configured address 83.212.101.3:80. |
---|
354 | Dec 14 19:48:20.000 [notice] new bridge descriptor 'LeifEricson' (fresh): $A09D536DD1752D542E1FBB3C9CE4449D51298239~LeifEricson at 83.212.101.3 |
---|
355 | Dec 14 19:48:20.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus. |
---|
356 | Dec 14 19:48:20.000 [info] I learned some more directory information, but not enough to build a circuit: We have no usable consensus. |
---|
357 | Dec 14 19:48:20.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf. |
---|
358 | Dec 14 19:48:21.000 [info] update_consensus_bootstrap_attempt_downloads(): Launching microdesc bootstrap mirror networkstatus consensus download. |
---|
359 | Dec 14 19:48:21.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779 for circuit. |
---|
360 | Dec 14 19:48:21.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:47779 ... |
---|
361 | Dec 14 19:48:21.000 [info] connection_ap_make_link(): ... application connection created and linked. |
---|
362 | Dec 14 19:48:21.000 [info] directory_send_command(): Downloading consensus from 109.105.109.163:47779 using /tor/status-vote/current/consensus-microdesc/0232AF+14C131+23D15D+27102B+49015F+D586D1+E8A9C4+ED03BB+EFCBE7.z |
---|
363 | Dec 14 19:48:21.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open) |
---|
364 | Dec 14 19:48:21.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed] |
---|
365 | Dec 14 19:48:21.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 4231647043 to begin stream 28243. |
---|
366 | Dec 14 19:48:21.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 4231647043 |
---|
367 | Dec 14 19:48:21.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=217 |
---|
368 | Dec 14 19:48:21.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=217 |
---|
369 | Dec 14 19:48:21.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 4231647043 streamid 28243 after 0 seconds. |
---|
370 | Dec 14 19:48:21.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open) |
---|
371 | Dec 14 19:48:21.000 [notice] Bootstrapped 25%: Loading networkstatus consensus |
---|
372 | Dec 14 19:48:21.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 28243. Removing stream. |
---|
373 | Dec 14 19:48:21.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf. |
---|
374 | Dec 14 19:48:21.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779 |
---|
375 | Dec 14 19:48:21.000 [info] handle_response_fetch_consensus(): Received consensus directory (body size 1981365) from server '109.105.109.163:47779' |
---|
376 | Dec 14 19:48:22.000 [info] Looks like we need to download a new certificate from authority 'dannenberg' at dannenberg.torauth.de:80 (contact Andreas Lehner; identity 0232AF901C31A04EE9848595AF9BB7620D4C5B2E) |
---|
377 | Dec 14 19:48:22.000 [info] Looks like we need to download a new certificate from authority 'longclaw' at 199.58.81.140:80 (contact Riseup Networks <collective at riseup dot net> - 1nNzekuHGGzBYRzyjfjFEfeisNvxkn4RT; identity 23D15D965BC35114467363C165C4F724B64B4F66) |
---|
378 | Dec 14 19:48:22.000 [info] Looks like we need to download a new certificate from authority 'bastet' at 204.13.164.118:80 (contact stefani <nocat at readthefinemanual dot net>; identity 27102BC123E7AF1D4741AE047E160C91ADC76B21) |
---|
379 | Dec 14 19:48:22.000 [info] Looks like we need to download a new certificate from authority 'moria1' at 128.31.0.34:9131 (contact 1024D/28988BF5 arma mit edu; identity D586D18309DED4CD6D57C18FDB97EFA96D330566) |
---|
380 | Dec 14 19:48:22.000 [info] Looks like we need to download a new certificate from authority 'dizum' at 194.109.206.212:80 (contact 1024R/8D56913D Alex de Joode <adejoode@sabotage.org>; identity E8A9C45EDE6D711294FADF8E7951F4DE6CA56B58) |
---|
381 | Dec 14 19:48:22.000 [info] Looks like we need to download a new certificate from authority 'gabelmoo' at 131.188.40.189:80 (contact 4096R/261C5FBE77285F88FB0C343266C8C2D7C5AA446D Sebastian Hahn <tor@sebastianhahn.net> - 12NbRAjAG5U3LLWETSF7fSTcdaz32Mu5CN; identity ED03BB616EB2F60BEC80151114BB25CEF515B226) |
---|
382 | Dec 14 19:48:22.000 [info] Looks like we need to download a new certificate from authority 'Faravahar' at 154.35.175.225:80 (contact 0x0B47D56D Sina Rabbani (inf0) <sina redteam net>; identity EFCBE720AB3A82B99F9E953CD5BF50F7EEFC7B97) |
---|
383 | Dec 14 19:48:22.000 [info] Consensus does not include configured authority 'maatuska' at 171.25.193.9:443 (identity 49015F787433103580E3B66A1707A00E60F2D15B) |
---|
384 | Dec 14 19:48:22.000 [info] A consensus needs 5 good signatures from recognized authorities for us to accept it. This one has 0 (). 1 (tor26) of the authorities we know didn't sign it. We were unable to check 7 of the signatures, because we were missing the keys. |
---|
385 | Dec 14 19:48:22.000 [info] networkstatus_set_current_consensus(): Not enough certificates to check networkstatus consensus |
---|
386 | Dec 14 19:48:22.000 [info] authority_certs_fetch_missing(): We're missing a certificate from authority dannenberg (ID digest 0232AF901C31A04EE9848595AF9BB7620D4C5B2E) with signing key 4F82D69064739702C50C69436997FCB9C29944ED: launching request. |
---|
387 | Dec 14 19:48:22.000 [info] authority_certs_fetch_missing(): We're missing a certificate from authority longclaw (ID digest 23D15D965BC35114467363C165C4F724B64B4F66) with signing key D632ADF38603F34EAFCB461C4DA5F67EF62BE7EC: launching request. |
---|
388 | Dec 14 19:48:22.000 [info] authority_certs_fetch_missing(): We're missing a certificate from authority bastet (ID digest 27102BC123E7AF1D4741AE047E160C91ADC76B21) with signing key 88E1BDDC8E6363355910D086B37B562F81674DC1: launching request. |
---|
389 | Dec 14 19:48:22.000 [info] authority_certs_fetch_missing(): We're missing a certificate from authority moria1 (ID digest D586D18309DED4CD6D57C18FDB97EFA96D330566) with signing key 6E44451E3F1CEB435E4D95C1F8B12AA022BB34CF: launching request. |
---|
390 | Dec 14 19:48:22.000 [info] authority_certs_fetch_missing(): We're missing a certificate from authority dizum (ID digest E8A9C45EDE6D711294FADF8E7951F4DE6CA56B58) with signing key 109A865D7DBE58367C120353CBE9947EE263695A: launching request. |
---|
391 | Dec 14 19:48:22.000 [info] authority_certs_fetch_missing(): We're missing a certificate from authority gabelmoo (ID digest ED03BB616EB2F60BEC80151114BB25CEF515B226) with signing key 28EB6C6635F1DB90BB60AF8B43F1676E892BB30B: launching request. |
---|
392 | Dec 14 19:48:22.000 [info] authority_certs_fetch_missing(): We're missing a certificate from authority Faravahar (ID digest EFCBE720AB3A82B99F9E953CD5BF50F7EEFC7B97) with signing key E861D5367EE5A469892D3FE6B2A25218FBA133FC: launching request. |
---|
393 | Dec 14 19:48:22.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:47779 ... |
---|
394 | Dec 14 19:48:22.000 [info] connection_ap_make_link(): ... application connection created and linked. |
---|
395 | Dec 14 19:48:22.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus. |
---|
396 | Dec 14 19:48:22.000 [notice] I learned some more directory information, but not enough to build a circuit: We have no usable consensus. |
---|
397 | Dec 14 19:48:22.000 [info] handle_response_fetch_consensus(): Successfully loaded consensus. |
---|
398 | Dec 14 19:48:22.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf. |
---|
399 | Dec 14 19:48:22.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open) |
---|
400 | Dec 14 19:48:22.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed] |
---|
401 | Dec 14 19:48:22.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 4231647043 to begin stream 28244. |
---|
402 | Dec 14 19:48:22.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 4231647043 |
---|
403 | Dec 14 19:48:22.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=697 |
---|
404 | Dec 14 19:48:22.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=199 |
---|
405 | Dec 14 19:48:22.000 [info] authority_certs_fetch_missing(): No current certificate known for authority moria1 (ID digest D586D18309DED4CD6D57C18FDB97EFA96D330566); launching request. |
---|
406 | Dec 14 19:48:22.000 [info] authority_certs_fetch_missing(): No current certificate known for authority tor26 (ID digest 14C131DFC5C6F93646BE72FA1401C02A8DF2E8B4); launching request. |
---|
407 | Dec 14 19:48:22.000 [info] authority_certs_fetch_missing(): No current certificate known for authority dizum (ID digest E8A9C45EDE6D711294FADF8E7951F4DE6CA56B58); launching request. |
---|
408 | Dec 14 19:48:22.000 [info] authority_certs_fetch_missing(): No current certificate known for authority gabelmoo (ID digest ED03BB616EB2F60BEC80151114BB25CEF515B226); launching request. |
---|
409 | Dec 14 19:48:22.000 [info] authority_certs_fetch_missing(): No current certificate known for authority dannenberg (ID digest 0232AF901C31A04EE9848595AF9BB7620D4C5B2E); launching request. |
---|
410 | Dec 14 19:48:22.000 [info] authority_certs_fetch_missing(): No current certificate known for authority maatuska (ID digest 49015F787433103580E3B66A1707A00E60F2D15B); launching request. |
---|
411 | Dec 14 19:48:22.000 [info] authority_certs_fetch_missing(): No current certificate known for authority Faravahar (ID digest EFCBE720AB3A82B99F9E953CD5BF50F7EEFC7B97); launching request. |
---|
412 | Dec 14 19:48:22.000 [info] authority_certs_fetch_missing(): No current certificate known for authority longclaw (ID digest 23D15D965BC35114467363C165C4F724B64B4F66); launching request. |
---|
413 | Dec 14 19:48:22.000 [info] authority_certs_fetch_missing(): No current certificate known for authority bastet (ID digest 27102BC123E7AF1D4741AE047E160C91ADC76B21); launching request. |
---|
414 | Dec 14 19:48:22.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779 for circuit. |
---|
415 | Dec 14 19:48:22.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:47779 ... |
---|
416 | Dec 14 19:48:22.000 [info] connection_ap_make_link(): ... application connection created and linked. |
---|
417 | Dec 14 19:48:22.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open) |
---|
418 | Dec 14 19:48:22.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed] |
---|
419 | Dec 14 19:48:22.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 4231647043 to begin stream 28245. |
---|
420 | Dec 14 19:48:22.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 4231647043 |
---|
421 | Dec 14 19:48:22.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=489 |
---|
422 | Dec 14 19:48:22.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=489 |
---|
423 | Dec 14 19:48:22.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 4231647043 streamid 28244 after 0 seconds. |
---|
424 | Dec 14 19:48:22.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open) |
---|
425 | Dec 14 19:48:22.000 [notice] Bootstrapped 40%: Loading authority key certs |
---|
426 | Dec 14 19:48:22.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 28244. Removing stream. |
---|
427 | Dec 14 19:48:22.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf. |
---|
428 | Dec 14 19:48:22.000 [info] handle_response_fetch_certificate(): Received authority certificates (body size 15631) from server '109.105.109.163:47779' |
---|
429 | Dec 14 19:48:22.000 [info] trusted_dirs_load_certs_from_string(): Adding downloaded certificate for directory authority dannenberg with signing key 4F82D69064739702C50C69436997FCB9C29944ED |
---|
430 | Dec 14 19:48:22.000 [info] trusted_dirs_load_certs_from_string(): Adding downloaded certificate for directory authority longclaw with signing key D632ADF38603F34EAFCB461C4DA5F67EF62BE7EC |
---|
431 | Dec 14 19:48:22.000 [info] trusted_dirs_load_certs_from_string(): Adding downloaded certificate for directory authority bastet with signing key 88E1BDDC8E6363355910D086B37B562F81674DC1 |
---|
432 | Dec 14 19:48:22.000 [info] trusted_dirs_load_certs_from_string(): Adding downloaded certificate for directory authority moria1 with signing key 6E44451E3F1CEB435E4D95C1F8B12AA022BB34CF |
---|
433 | Dec 14 19:48:22.000 [info] trusted_dirs_load_certs_from_string(): Adding downloaded certificate for directory authority dizum with signing key 109A865D7DBE58367C120353CBE9947EE263695A |
---|
434 | Dec 14 19:48:22.000 [info] trusted_dirs_load_certs_from_string(): Adding downloaded certificate for directory authority gabelmoo with signing key 28EB6C6635F1DB90BB60AF8B43F1676E892BB30B |
---|
435 | Dec 14 19:48:22.000 [info] trusted_dirs_load_certs_from_string(): Adding downloaded certificate for directory authority Faravahar with signing key E861D5367EE5A469892D3FE6B2A25218FBA133FC |
---|
436 | Dec 14 19:48:22.000 [info] Consensus does not include configured authority 'maatuska' at 171.25.193.9:443 (identity 49015F787433103580E3B66A1707A00E60F2D15B) |
---|
437 | Dec 14 19:48:22.000 [info] A consensus needs 5 good signatures from recognized authorities for us to accept it. This one has 7 (dannenberg longclaw bastet moria1 dizum gabelmoo Faravahar). 1 (tor26) of the authorities we know didn't sign it. |
---|
438 | Dec 14 19:48:23.000 [info] Consensus does not include configured authority 'maatuska' at 171.25.193.9:443 (identity 49015F787433103580E3B66A1707A00E60F2D15B) |
---|
439 | Dec 14 19:48:23.000 [info] A consensus needs 5 good signatures from recognized authorities for us to accept it. This one has 7 (dannenberg longclaw bastet moria1 dizum gabelmoo Faravahar). 1 (tor26) of the authorities we know didn't sign it. |
---|
440 | Dec 14 19:48:23.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode) |
---|
441 | Dec 14 19:48:23.000 [info] Choosing expected valid-after time as 2017-12-14 19:00:00: consensus_set=1, interval=3600 |
---|
442 | Dec 14 19:48:23.000 [info] update_consensus_networkstatus_fetch_time_impl(): Live microdesc consensus will be the most recent until 2017-12-14 20:00:00 and will expire at 2017-12-14 22:00:00; fetching the next one at 2017-12-14 21:56:21. |
---|
443 | Dec 14 19:48:23.000 [info] cell_ewma_set_scale_factor(): Enabled cell_ewma algorithm because of value in CircuitPriorityHalflifeMsec in consensus; scale factor is 0.793701 per 10 seconds |
---|
444 | Dec 14 19:48:23.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus. |
---|
445 | Dec 14 19:48:23.000 [notice] Bootstrapped 45%: Asking for relay descriptors |
---|
446 | Dec 14 19:48:23.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 0/6486, and can only build 0% of likely paths. (We have 0% of guards bw, 0% of midpoint bw, and 0% of exit bw = 0% of path bw.) |
---|
447 | Dec 14 19:48:23.000 [info] launch_descriptor_downloads(): Launching 14 requests for 6507 microdescs, 500 at a time |
---|
448 | Dec 14 19:48:23.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards. |
---|
449 | Dec 14 19:48:23.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980 for circuit. |
---|
450 | Dec 14 19:48:23.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:38980 ... |
---|
451 | Dec 14 19:48:23.000 [info] connection_ap_make_link(): ... application connection created and linked. |
---|
452 | Dec 14 19:48:23.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards. |
---|
453 | Dec 14 19:48:23.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779 for circuit. |
---|
454 | Dec 14 19:48:23.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:47779 ... |
---|
455 | Dec 14 19:48:23.000 [info] connection_ap_make_link(): ... application connection created and linked. |
---|
456 | Dec 14 19:48:23.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards. |
---|
457 | Dec 14 19:48:23.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980 for circuit. |
---|
458 | Dec 14 19:48:23.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:38980 ... |
---|
459 | Dec 14 19:48:23.000 [info] connection_ap_make_link(): ... application connection created and linked. |
---|
460 | Dec 14 19:48:23.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards. |
---|
461 | Dec 14 19:48:23.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980 for circuit. |
---|
462 | Dec 14 19:48:23.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:38980 ... |
---|
463 | Dec 14 19:48:23.000 [info] connection_ap_make_link(): ... application connection created and linked. |
---|
464 | Dec 14 19:48:23.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards. |
---|
465 | Dec 14 19:48:23.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) at 83.212.101.3:80 for circuit. |
---|
466 | Dec 14 19:48:23.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:80 ... |
---|
467 | Dec 14 19:48:23.000 [info] connection_ap_make_link(): ... application connection created and linked. |
---|
468 | Dec 14 19:48:23.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards. |
---|
469 | Dec 14 19:48:23.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) at 83.212.101.3:80 for circuit. |
---|
470 | Dec 14 19:48:23.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:80 ... |
---|
471 | Dec 14 19:48:23.000 [info] connection_ap_make_link(): ... application connection created and linked. |
---|
472 | Dec 14 19:48:23.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards. |
---|
473 | Dec 14 19:48:23.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779 for circuit. |
---|
474 | Dec 14 19:48:23.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:47779 ... |
---|
475 | Dec 14 19:48:23.000 [info] connection_ap_make_link(): ... application connection created and linked. |
---|
476 | Dec 14 19:48:23.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards. |
---|
477 | Dec 14 19:48:23.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779 for circuit. |
---|
478 | Dec 14 19:48:23.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:47779 ... |
---|
479 | Dec 14 19:48:23.000 [info] connection_ap_make_link(): ... application connection created and linked. |
---|
480 | Dec 14 19:48:23.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards. |
---|
481 | Dec 14 19:48:23.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980 for circuit. |
---|
482 | Dec 14 19:48:23.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:38980 ... |
---|
483 | Dec 14 19:48:23.000 [info] connection_ap_make_link(): ... application connection created and linked. |
---|
484 | Dec 14 19:48:23.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards. |
---|
485 | Dec 14 19:48:23.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779 for circuit. |
---|
486 | Dec 14 19:48:23.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:47779 ... |
---|
487 | Dec 14 19:48:23.000 [info] connection_ap_make_link(): ... application connection created and linked. |
---|
488 | Dec 14 19:48:23.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards. |
---|
489 | Dec 14 19:48:23.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980 for circuit. |
---|
490 | Dec 14 19:48:23.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:38980 ... |
---|
491 | Dec 14 19:48:23.000 [info] connection_ap_make_link(): ... application connection created and linked. |
---|
492 | Dec 14 19:48:23.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards. |
---|
493 | Dec 14 19:48:23.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779 for circuit. |
---|
494 | Dec 14 19:48:23.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:47779 ... |
---|
495 | Dec 14 19:48:23.000 [info] connection_ap_make_link(): ... application connection created and linked. |
---|
496 | Dec 14 19:48:23.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards. |
---|
497 | Dec 14 19:48:23.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) at 83.212.101.3:80 for circuit. |
---|
498 | Dec 14 19:48:23.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:80 ... |
---|
499 | Dec 14 19:48:23.000 [info] connection_ap_make_link(): ... application connection created and linked. |
---|
500 | Dec 14 19:48:23.000 [info] should_set_md_dirserver_restriction(): Not setting md restriction: only 5 usable guards. |
---|
501 | Dec 14 19:48:23.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980 for circuit. |
---|
502 | Dec 14 19:48:23.000 [info] connection_ap_make_link(): Making internal direct tunnel to [scrubbed]:38980 ... |
---|
503 | Dec 14 19:48:23.000 [info] connection_ap_make_link(): ... application connection created and linked. |
---|
504 | Dec 14 19:48:23.000 [info] handle_response_fetch_certificate(): Successfully loaded certificates from fetch. |
---|
505 | Dec 14 19:48:23.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf. |
---|
506 | Dec 14 19:48:23.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open) |
---|
507 | Dec 14 19:48:23.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed] |
---|
508 | Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 3321416422 to begin stream 44334. |
---|
509 | Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 3321416422 |
---|
510 | Dec 14 19:48:23.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open) |
---|
511 | Dec 14 19:48:23.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed] |
---|
512 | Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 4231647043 to begin stream 28246. |
---|
513 | Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 4231647043 |
---|
514 | Dec 14 19:48:23.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open) |
---|
515 | Dec 14 19:48:23.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed] |
---|
516 | Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 3321416422 to begin stream 44335. |
---|
517 | Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 3321416422 |
---|
518 | Dec 14 19:48:23.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open) |
---|
519 | Dec 14 19:48:23.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed] |
---|
520 | Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 3321416422 to begin stream 44336. |
---|
521 | Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 3321416422 |
---|
522 | Dec 14 19:48:23.000 [info] internal circ (length 1): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open) |
---|
523 | Dec 14 19:48:23.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed] |
---|
524 | Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 3109431386 to begin stream 13599. |
---|
525 | Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 3109431386 |
---|
526 | Dec 14 19:48:23.000 [info] internal circ (length 1): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open) |
---|
527 | Dec 14 19:48:23.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed] |
---|
528 | Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 3109431386 to begin stream 13600. |
---|
529 | Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 3109431386 |
---|
530 | Dec 14 19:48:23.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open) |
---|
531 | Dec 14 19:48:23.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed] |
---|
532 | Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 4231647043 to begin stream 28247. |
---|
533 | Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 4231647043 |
---|
534 | Dec 14 19:48:23.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open) |
---|
535 | Dec 14 19:48:23.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed] |
---|
536 | Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 4231647043 to begin stream 28248. |
---|
537 | Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 4231647043 |
---|
538 | Dec 14 19:48:23.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open) |
---|
539 | Dec 14 19:48:23.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed] |
---|
540 | Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 3321416422 to begin stream 44337. |
---|
541 | Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 3321416422 |
---|
542 | Dec 14 19:48:23.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open) |
---|
543 | Dec 14 19:48:23.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed] |
---|
544 | Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 4231647043 to begin stream 28249. |
---|
545 | Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 4231647043 |
---|
546 | Dec 14 19:48:23.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open) |
---|
547 | Dec 14 19:48:23.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed] |
---|
548 | Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 3321416422 to begin stream 44338. |
---|
549 | Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 3321416422 |
---|
550 | Dec 14 19:48:23.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open) |
---|
551 | Dec 14 19:48:23.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed] |
---|
552 | Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 4231647043 to begin stream 28250. |
---|
553 | Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 4231647043 |
---|
554 | Dec 14 19:48:23.000 [info] internal circ (length 1): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open) |
---|
555 | Dec 14 19:48:23.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed] |
---|
556 | Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 3109431386 to begin stream 13601. |
---|
557 | Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 3109431386 |
---|
558 | Dec 14 19:48:23.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open) |
---|
559 | Dec 14 19:48:23.000 [info] link_apconn_to_circ(): Looks like completed circuit to [scrubbed] does allow optimistic data for connection to [scrubbed] |
---|
560 | Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Sending relay cell 1 on circ 3321416422 to begin stream 44339. |
---|
561 | Dec 14 19:48:23.000 [info] connection_ap_handshake_send_begin(): Address/port sent, ap socket -1, n_circ_id 3321416422 |
---|
562 | Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=430 |
---|
563 | Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=430 |
---|
564 | Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22122 |
---|
565 | Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=210 |
---|
566 | Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22122 |
---|
567 | Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=210 |
---|
568 | Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22122 |
---|
569 | Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=210 |
---|
570 | Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22122 |
---|
571 | Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=210 |
---|
572 | Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22113 |
---|
573 | Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=201 |
---|
574 | Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22113 |
---|
575 | Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=201 |
---|
576 | Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22122 |
---|
577 | Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=210 |
---|
578 | Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22122 |
---|
579 | Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=210 |
---|
580 | Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22122 |
---|
581 | Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=210 |
---|
582 | Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22122 |
---|
583 | Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=210 |
---|
584 | Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22122 |
---|
585 | Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=210 |
---|
586 | Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22122 |
---|
587 | Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=210 |
---|
588 | Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=0, buflen=22113 |
---|
589 | Dec 14 19:48:23.000 [info] connection_edge_process_inbuf(): data from edge while in 'waiting for connect response' state. Sending it anyway. package_partial=1, buflen=201 |
---|
590 | Dec 14 19:48:23.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 4231647043 streamid 28245 after 1 seconds. |
---|
591 | Dec 14 19:48:23.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open) |
---|
592 | Dec 14 19:48:23.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 28245. Removing stream. |
---|
593 | Dec 14 19:48:23.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf. |
---|
594 | Dec 14 19:48:23.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779 |
---|
595 | Dec 14 19:48:23.000 [info] handle_response_fetch_certificate(): Received authority certificates (body size 20442) from server '109.105.109.163:47779' |
---|
596 | Dec 14 19:48:23.000 [info] trusted_dirs_load_certs_from_string(): Skipping downloaded certificate for dannenberg that we already have. |
---|
597 | Dec 14 19:48:23.000 [info] trusted_dirs_load_certs_from_string(): Got a certificate for dannenberg, but we already have it. Maybe they haven't updated it. Waiting for a while. |
---|
598 | Dec 14 19:48:23.000 [info] trusted_dirs_load_certs_from_string(): Adding downloaded certificate for directory authority tor26 with signing key 6AEC757516B142855BCE29708EBDA965AC3DD06A |
---|
599 | Dec 14 19:48:23.000 [info] trusted_dirs_load_certs_from_string(): Skipping downloaded certificate for longclaw that we already have. |
---|
600 | Dec 14 19:48:23.000 [info] trusted_dirs_load_certs_from_string(): Got a certificate for longclaw, but we already have it. Maybe they haven't updated it. Waiting for a while. |
---|
601 | Dec 14 19:48:23.000 [info] trusted_dirs_load_certs_from_string(): Skipping downloaded certificate for bastet that we already have. |
---|
602 | Dec 14 19:48:23.000 [info] trusted_dirs_load_certs_from_string(): Got a certificate for bastet, but we already have it. Maybe they haven't updated it. Waiting for a while. |
---|
603 | Dec 14 19:48:23.000 [info] trusted_dirs_load_certs_from_string(): Adding downloaded certificate for directory authority maatuska with signing key C9C96501FD35732C45C424B74CC32739991B1F51 |
---|
604 | Dec 14 19:48:23.000 [info] trusted_dirs_load_certs_from_string(): Skipping downloaded certificate for moria1 that we already have. |
---|
605 | Dec 14 19:48:23.000 [info] trusted_dirs_load_certs_from_string(): Got a certificate for moria1, but we already have it. Maybe they haven't updated it. Waiting for a while. |
---|
606 | Dec 14 19:48:23.000 [info] trusted_dirs_load_certs_from_string(): Skipping downloaded certificate for dizum that we already have. |
---|
607 | Dec 14 19:48:23.000 [info] trusted_dirs_load_certs_from_string(): Got a certificate for dizum, but we already have it. Maybe they haven't updated it. Waiting for a while. |
---|
608 | Dec 14 19:48:23.000 [info] trusted_dirs_load_certs_from_string(): Skipping downloaded certificate for gabelmoo that we already have. |
---|
609 | Dec 14 19:48:23.000 [info] trusted_dirs_load_certs_from_string(): Got a certificate for gabelmoo, but we already have it. Maybe they haven't updated it. Waiting for a while. |
---|
610 | Dec 14 19:48:23.000 [info] trusted_dirs_load_certs_from_string(): Skipping downloaded certificate for Faravahar that we already have. |
---|
611 | Dec 14 19:48:23.000 [info] trusted_dirs_load_certs_from_string(): Got a certificate for Faravahar, but we already have it. Maybe they haven't updated it. Waiting for a while. |
---|
612 | Dec 14 19:48:23.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus. |
---|
613 | Dec 14 19:48:23.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 0/6486, and can only build 0% of likely paths. (We have 0% of guards bw, 0% of midpoint bw, and 0% of exit bw = 0% of path bw.) |
---|
614 | Dec 14 19:48:23.000 [info] handle_response_fetch_certificate(): Successfully loaded certificates from fetch. |
---|
615 | Dec 14 19:48:23.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf. |
---|
616 | Dec 14 19:48:23.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 4231647043 streamid 28246 after 0 seconds. |
---|
617 | Dec 14 19:48:23.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open) |
---|
618 | Dec 14 19:48:23.000 [notice] Bootstrapped 50%: Loading relay descriptors |
---|
619 | Dec 14 19:48:23.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 4231647043 streamid 28247 after 0 seconds. |
---|
620 | Dec 14 19:48:23.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open) |
---|
621 | Dec 14 19:48:23.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 4231647043 streamid 28248 after 0 seconds. |
---|
622 | Dec 14 19:48:23.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open) |
---|
623 | Dec 14 19:48:23.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 4231647043 streamid 28249 after 0 seconds. |
---|
624 | Dec 14 19:48:23.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open) |
---|
625 | Dec 14 19:48:23.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 4231647043 streamid 28250 after 0 seconds. |
---|
626 | Dec 14 19:48:23.000 [info] internal circ (length 1): $4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A(open) |
---|
627 | Dec 14 19:48:23.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 3321416422 streamid 44334 after 0 seconds. |
---|
628 | Dec 14 19:48:23.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open) |
---|
629 | Dec 14 19:48:23.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 3321416422 streamid 44335 after 0 seconds. |
---|
630 | Dec 14 19:48:23.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open) |
---|
631 | Dec 14 19:48:23.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 3321416422 streamid 44336 after 0 seconds. |
---|
632 | Dec 14 19:48:23.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open) |
---|
633 | Dec 14 19:48:23.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 3321416422 streamid 44337 after 0 seconds. |
---|
634 | Dec 14 19:48:23.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open) |
---|
635 | Dec 14 19:48:23.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 3321416422 streamid 44338 after 0 seconds. |
---|
636 | Dec 14 19:48:23.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open) |
---|
637 | Dec 14 19:48:23.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 3321416422 streamid 44339 after 0 seconds. |
---|
638 | Dec 14 19:48:23.000 [info] internal circ (length 1): $1E05F577A0EC0213F971D81BF4D86A9E4E8229ED(open) |
---|
639 | Dec 14 19:48:23.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 44339. Removing stream. |
---|
640 | Dec 14 19:48:23.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf. |
---|
641 | Dec 14 19:48:23.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980 |
---|
642 | Dec 14 19:48:23.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 7247) from server '109.105.109.163:38980' |
---|
643 | Dec 14 19:48:23.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus. |
---|
644 | Dec 14 19:48:23.000 [info] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 7/6486, and can only build 0% of likely paths. (We have 0% of guards bw, 0% of midpoint bw, and 0% of exit bw = 0% of path bw.) |
---|
645 | Dec 14 19:48:23.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf. |
---|
646 | Dec 14 19:48:23.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 28246. Removing stream. |
---|
647 | Dec 14 19:48:23.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf. |
---|
648 | Dec 14 19:48:23.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779 |
---|
649 | Dec 14 19:48:23.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 265930) from server '109.105.109.163:47779' |
---|
650 | Dec 14 19:48:23.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus. |
---|
651 | Dec 14 19:48:23.000 [info] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 503/6486, and can only build 0% of likely paths. (We have 8% of guards bw, 8% of midpoint bw, and 8% of exit bw = 0% of path bw.) |
---|
652 | Dec 14 19:48:23.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf. |
---|
653 | Dec 14 19:48:23.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 44334. Removing stream. |
---|
654 | Dec 14 19:48:23.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf. |
---|
655 | Dec 14 19:48:23.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980 |
---|
656 | Dec 14 19:48:23.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 247082) from server '109.105.109.163:38980' |
---|
657 | Dec 14 19:48:24.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus. |
---|
658 | Dec 14 19:48:24.000 [info] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 1001/6486, and can only build 0% of likely paths. (We have 15% of guards bw, 16% of midpoint bw, and 15% of exit bw = 0% of path bw.) |
---|
659 | Dec 14 19:48:24.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf. |
---|
660 | Dec 14 19:48:24.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 3109431386 streamid 13599 after 1 seconds. |
---|
661 | Dec 14 19:48:24.000 [info] internal circ (length 1): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open) |
---|
662 | Dec 14 19:48:24.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 3109431386 streamid 13600 after 1 seconds. |
---|
663 | Dec 14 19:48:24.000 [info] internal circ (length 1): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open) |
---|
664 | Dec 14 19:48:24.000 [info] connection_edge_process_relay_cell_not_open(): 'connected' received for circid 3109431386 streamid 13601 after 1 seconds. |
---|
665 | Dec 14 19:48:24.000 [info] internal circ (length 1): $A09D536DD1752D542E1FBB3C9CE4449D51298239(open) |
---|
666 | Dec 14 19:48:24.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 28247. Removing stream. |
---|
667 | Dec 14 19:48:24.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf. |
---|
668 | Dec 14 19:48:24.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779 |
---|
669 | Dec 14 19:48:24.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 274212) from server '109.105.109.163:47779' |
---|
670 | Dec 14 19:48:24.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus. |
---|
671 | Dec 14 19:48:24.000 [info] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 1500/6486, and can only build 1% of likely paths. (We have 21% of guards bw, 21% of midpoint bw, and 24% of exit bw = 1% of path bw.) |
---|
672 | Dec 14 19:48:24.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf. |
---|
673 | Dec 14 19:48:24.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 44335. Removing stream. |
---|
674 | Dec 14 19:48:24.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf. |
---|
675 | Dec 14 19:48:24.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980 |
---|
676 | Dec 14 19:48:24.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 263176) from server '109.105.109.163:38980' |
---|
677 | Dec 14 19:48:24.000 [info] Bootstrapped 51%: Loading relay descriptors |
---|
678 | Dec 14 19:48:24.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus. |
---|
679 | Dec 14 19:48:24.000 [info] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 2000/6486, and can only build 2% of likely paths. (We have 28% of guards bw, 29% of midpoint bw, and 30% of exit bw = 2% of path bw.) |
---|
680 | Dec 14 19:48:24.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf. |
---|
681 | Dec 14 19:48:24.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 28248. Removing stream. |
---|
682 | Dec 14 19:48:24.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf. |
---|
683 | Dec 14 19:48:24.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779 |
---|
684 | Dec 14 19:48:24.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 264346) from server '109.105.109.163:47779' |
---|
685 | Dec 14 19:48:24.000 [info] Bootstrapped 52%: Loading relay descriptors |
---|
686 | Dec 14 19:48:24.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus. |
---|
687 | Dec 14 19:48:24.000 [info] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 2499/6486, and can only build 4% of likely paths. (We have 36% of guards bw, 36% of midpoint bw, and 37% of exit bw = 4% of path bw.) |
---|
688 | Dec 14 19:48:24.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf. |
---|
689 | Dec 14 19:48:24.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 44336. Removing stream. |
---|
690 | Dec 14 19:48:24.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf. |
---|
691 | Dec 14 19:48:24.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980 |
---|
692 | Dec 14 19:48:24.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 245895) from server '109.105.109.163:38980' |
---|
693 | Dec 14 19:48:24.000 [info] Bootstrapped 54%: Loading relay descriptors |
---|
694 | Dec 14 19:48:24.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus. |
---|
695 | Dec 14 19:48:24.000 [info] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 2999/6486, and can only build 8% of likely paths. (We have 44% of guards bw, 44% of midpoint bw, and 41% of exit bw = 8% of path bw.) |
---|
696 | Dec 14 19:48:24.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf. |
---|
697 | Dec 14 19:48:24.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 44337. Removing stream. |
---|
698 | Dec 14 19:48:24.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf. |
---|
699 | Dec 14 19:48:24.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980 |
---|
700 | Dec 14 19:48:24.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 247770) from server '109.105.109.163:38980' |
---|
701 | Dec 14 19:48:24.000 [notice] Bootstrapped 57%: Loading relay descriptors |
---|
702 | Dec 14 19:48:24.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus. |
---|
703 | Dec 14 19:48:24.000 [info] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 3499/6486, and can only build 14% of likely paths. (We have 52% of guards bw, 53% of midpoint bw, and 51% of exit bw = 14% of path bw.) |
---|
704 | Dec 14 19:48:24.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf. |
---|
705 | Dec 14 19:48:24.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 28249. Removing stream. |
---|
706 | Dec 14 19:48:24.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf. |
---|
707 | Dec 14 19:48:24.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779 |
---|
708 | Dec 14 19:48:24.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 267248) from server '109.105.109.163:47779' |
---|
709 | Dec 14 19:48:24.000 [info] Bootstrapped 61%: Loading relay descriptors |
---|
710 | Dec 14 19:48:24.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus. |
---|
711 | Dec 14 19:48:24.000 [info] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 3998/6486, and can only build 23% of likely paths. (We have 61% of guards bw, 62% of midpoint bw, and 61% of exit bw = 23% of path bw.) |
---|
712 | Dec 14 19:48:24.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf. |
---|
713 | Dec 14 19:48:24.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 28250. Removing stream. |
---|
714 | Dec 14 19:48:24.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf. |
---|
715 | Dec 14 19:48:24.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779 |
---|
716 | Dec 14 19:48:24.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 247291) from server '109.105.109.163:47779' |
---|
717 | Dec 14 19:48:24.000 [notice] Bootstrapped 65%: Loading relay descriptors |
---|
718 | Dec 14 19:48:24.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus. |
---|
719 | Dec 14 19:48:24.000 [info] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 4495/6486, and can only build 33% of likely paths. (We have 69% of guards bw, 70% of midpoint bw, and 67% of exit bw = 33% of path bw.) |
---|
720 | Dec 14 19:48:24.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf. |
---|
721 | Dec 14 19:48:24.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 44338. Removing stream. |
---|
722 | Dec 14 19:48:24.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf. |
---|
723 | Dec 14 19:48:24.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980 |
---|
724 | Dec 14 19:48:24.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 246949) from server '109.105.109.163:38980' |
---|
725 | Dec 14 19:48:24.000 [notice] Bootstrapped 71%: Loading relay descriptors |
---|
726 | Dec 14 19:48:24.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus. |
---|
727 | Dec 14 19:48:24.000 [info] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 4994/6486, and can only build 44% of likely paths. (We have 76% of guards bw, 77% of midpoint bw, and 75% of exit bw = 44% of path bw.) |
---|
728 | Dec 14 19:48:24.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf. |
---|
729 | Dec 14 19:48:24.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 13599. Removing stream. |
---|
730 | Dec 14 19:48:24.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf. |
---|
731 | Dec 14 19:48:24.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) at 83.212.101.3:80 |
---|
732 | Dec 14 19:48:24.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 259827) from server '83.212.101.3:80' |
---|
733 | Dec 14 19:48:25.000 [info] microdesc_note_outdated_dirserver(): Noted A09D536DD1752D542E1FBB3C9CE4449D51298239 as outdated md dirserver |
---|
734 | Dec 14 19:48:25.000 [info] dir_microdesc_download_failed(): Failed to download md Yaht2i6paGTO1eJwB/Gxtk2H+M7hSnHY4E+NTgYFWns from A09D536DD1752D542E1FBB3C9CE4449D51298239 |
---|
735 | Dec 14 19:48:25.000 [info] dir_microdesc_download_failed(): Failed to download md YNKoK9qSMQ8ooHjkZnV9QMXLpysb6x2lF4mRQIAmCK0 from A09D536DD1752D542E1FBB3C9CE4449D51298239 |
---|
736 | Dec 14 19:48:25.000 [info] dir_microdesc_download_failed(): Failed to download md VjexZfJOO4exbenvkNj2Uy6xbux8mRmSUE6Saz391i0 from A09D536DD1752D542E1FBB3C9CE4449D51298239 |
---|
737 | Dec 14 19:48:25.000 [info] dir_microdesc_download_failed(): Failed to download md U0U94p+QlW6Y6ZR1z5F2YeE+vex+OctUZEaWljbBzUo from A09D536DD1752D542E1FBB3C9CE4449D51298239 |
---|
738 | Dec 14 19:48:25.000 [info] dir_microdesc_download_failed(): Failed to download md UkVzrNW4tOMCi95tgwHUX4xNcjZkV2PH0PeDK0ztiCg from A09D536DD1752D542E1FBB3C9CE4449D51298239 |
---|
739 | Dec 14 19:48:25.000 [info] dir_microdesc_download_failed(): Failed to download md UG2VPjoln8DgxSeh2yOJ93UVwMfPhmkXMR/u+OdrpEA from A09D536DD1752D542E1FBB3C9CE4449D51298239 |
---|
740 | Dec 14 19:48:25.000 [notice] Bootstrapped 78%: Loading relay descriptors |
---|
741 | Dec 14 19:48:25.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus. |
---|
742 | Dec 14 19:48:25.000 [info] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 5485/6486, and can only build 58% of likely paths. (We have 83% of guards bw, 83% of midpoint bw, and 83% of exit bw = 58% of path bw.) |
---|
743 | Dec 14 19:48:25.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf. |
---|
744 | Dec 14 19:48:25.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 13600. Removing stream. |
---|
745 | Dec 14 19:48:25.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf. |
---|
746 | Dec 14 19:48:25.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) at 83.212.101.3:80 |
---|
747 | Dec 14 19:48:25.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 233092) from server '83.212.101.3:80' |
---|
748 | Dec 14 19:48:25.000 [info] dir_microdesc_download_failed(): Failed to download md bZ+a+2CbUm/y1SbbC6VT/A1jHWwIUfFJ6wdUExxX7tw from A09D536DD1752D542E1FBB3C9CE4449D51298239 |
---|
749 | Dec 14 19:48:25.000 [info] dir_microdesc_download_failed(): Failed to download md bLlWEdJ2JuwhqVqOChnI+lRd996pBeyScUIcBlpN0ag from A09D536DD1752D542E1FBB3C9CE4449D51298239 |
---|
750 | Dec 14 19:48:25.000 [info] dir_microdesc_download_failed(): Failed to download md apgye1yBGLF9JLKxEehhYsK97d3ASMOtRFo2DBIrcok from A09D536DD1752D542E1FBB3C9CE4449D51298239 |
---|
751 | Dec 14 19:48:25.000 [info] dir_microdesc_download_failed(): Failed to download md aimLHSUOcQdhzHJVxN1gMYGAl92CAADOcTN4LGY7ghg from A09D536DD1752D542E1FBB3C9CE4449D51298239 |
---|
752 | Dec 14 19:48:25.000 [info] dir_microdesc_download_failed(): Failed to download md aabRDzXT5HVa/vLytRIq7IzOj6EDVpkYvHjAHdEDfg4 from A09D536DD1752D542E1FBB3C9CE4449D51298239 |
---|
753 | Dec 14 19:48:25.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus. |
---|
754 | Dec 14 19:48:25.000 [notice] Bootstrapped 80%: Connecting to the Tor network |
---|
755 | Dec 14 19:48:25.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf. |
---|
756 | Dec 14 19:48:25.000 [info] connection_edge_process_relay_cell(): -1: end cell (closed normally) for stream 13601. Removing stream. |
---|
757 | Dec 14 19:48:25.000 [info] connection_free_(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf. |
---|
758 | Dec 14 19:48:25.000 [info] entry_guards_note_guard_success(): Recorded success for primary confirmed guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) at 83.212.101.3:80 |
---|
759 | Dec 14 19:48:25.000 [info] handle_response_fetch_microdesc(): Received answer to microdescriptor request (status 200, body size 251868) from server '83.212.101.3:80' |
---|
760 | Dec 14 19:48:25.000 [info] dir_microdesc_download_failed(): Failed to download md 9FoNWxEf4O0O/M5KgPk+7eK4Y5UY7H/gIxkIpvuahHE from A09D536DD1752D542E1FBB3C9CE4449D51298239 |
---|
761 | Dec 14 19:48:25.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus. |
---|
762 | Dec 14 19:48:25.000 [info] connection_free_(): Freeing linked Directory connection [client finished] with 0 bytes on inbuf, 0 on outbuf. |
---|
763 | Dec 14 19:48:25.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
764 | Dec 14 19:48:25.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
765 | Dec 14 19:48:25.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
766 | Dec 14 19:48:25.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
767 | Dec 14 19:48:25.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
768 | Dec 14 19:48:25.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
769 | Dec 14 19:48:25.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
770 | Dec 14 19:48:25.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
771 | Dec 14 19:48:25.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
772 | Dec 14 19:48:25.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
773 | Dec 14 19:48:25.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
774 | Dec 14 19:48:25.000 [notice] Closing no-longer-configured Socks listener on 127.0.0.1:9150 |
---|
775 | Dec 14 19:48:25.000 [notice] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections. |
---|
776 | Dec 14 19:48:25.000 [notice] Tor 0.3.2.7-rc (git-04f4f30af76cdedf) opening log file. |
---|
777 | Dec 14 19:48:25.000 [notice] Closing old Socks listener on 127.0.0.1:9150 |
---|
778 | Dec 14 19:48:25.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 1048544, ConnLimit_high_thresh 1048480, ConnLimit_low_thresh 786408 |
---|
779 | Dec 14 19:48:25.000 [info] tor_process_handle_destroy(): Terminated process with PID '14343'. |
---|
780 | Dec 14 19:48:25.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode) |
---|
781 | Dec 14 19:48:25.000 [info] cell_ewma_set_scale_factor(): Enabled cell_ewma algorithm because of value in CircuitPriorityHalflifeMsec in consensus; scale factor is 0.793701 per 10 seconds |
---|
782 | Dec 14 19:48:25.000 [info] entry_guards_note_guard_failure(): Recorded failure for guard [bridge] ($AF9F66B7B04F8FF6F32D455F05135250A16543C9) at 169.229.59.75:46328 |
---|
783 | Dec 14 19:48:25.000 [info] connection_dir_request_failed(): Giving up on serverdesc/extrainfo fetch from directory server at '169.229.59.75'; retrying |
---|
784 | Dec 14 19:48:25.000 [info] connection_free_(): Freeing linked Directory connection [client reading] with 0 bytes on inbuf, 0 on outbuf. |
---|
785 | Dec 14 19:48:25.000 [info] connection_free_(): Freeing linked Socks connection [waiting for circuit] with 129 bytes on inbuf, 0 on outbuf. |
---|
786 | Dec 14 19:48:25.000 [info] entry_guards_note_guard_failure(): Recorded failure for guard [bridge] ($AF9F66B7B04F8FF6F32D455F05135250A16543C9) at 169.229.59.75:46328 |
---|
787 | Dec 14 19:48:25.000 [info] connection_dir_request_failed(): Giving up on serverdesc/extrainfo fetch from directory server at '169.229.59.74'; retrying |
---|
788 | Dec 14 19:48:25.000 [info] connection_free_(): Freeing linked Directory connection [client reading] with 0 bytes on inbuf, 0 on outbuf. |
---|
789 | Dec 14 19:48:25.000 [info] connection_free_(): Freeing linked Socks connection [waiting for circuit] with 129 bytes on inbuf, 0 on outbuf. |
---|
790 | Dec 14 19:48:25.000 [info] circuit_mark_for_close_(): Circuit 0 (id: 2) marked for close at ../src/or/circuitlist.c:1477 (orig reason: 520, new reason: 0) |
---|
791 | Dec 14 19:48:25.000 [info] circuit_mark_for_close_(): Circuit 0 (id: 1) marked for close at ../src/or/circuitlist.c:1477 (orig reason: 520, new reason: 0) |
---|
792 | Dec 14 19:48:25.000 [info] circuit_n_chan_done(): Channel failed; closing circ. |
---|
793 | Dec 14 19:48:25.000 [info] circuit_mark_for_close_(): Circuit 0 (id: 3) marked for close at ../src/or/circuitbuild.c:662 (orig reason: 8, new reason: 0) |
---|
794 | Dec 14 19:48:25.000 [info] connection_or_note_state_when_broken(): Connection died in state 'handshaking (proxy) with SSL state (No SSL object)' |
---|
795 | Dec 14 19:48:25.000 [info] circuit_mark_for_close_(): Circuit 0 (id: 4) marked for close at ../src/or/circuitlist.c:1477 (orig reason: 520, new reason: 0) |
---|
796 | Dec 14 19:48:25.000 [info] notify_waitpid_callback_by_pid(): Child process 14343 has exited; no callback was registered |
---|
797 | Dec 14 19:48:25.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set) |
---|
798 | Dec 14 19:48:25.000 [notice] Delaying directory fetches: DisableNetwork is set. |
---|
799 | Dec 14 19:48:25.000 [info] circuit_free(): Circuit 0 (id: 2) has been freed. |
---|
800 | Dec 14 19:48:25.000 [info] circuit_free(): Circuit 0 (id: 1) has been freed. |
---|
801 | Dec 14 19:48:25.000 [info] circuit_build_failed(): Our circuit 0 (id: 3) died before the first hop with no connection |
---|
802 | Dec 14 19:48:25.000 [info] circuit_free(): Circuit 0 (id: 3) has been freed. |
---|
803 | Dec 14 19:48:25.000 [info] circuit_free(): Circuit 0 (id: 4) has been freed. |
---|
804 | Dec 14 19:48:26.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set) |
---|
805 | Dec 14 19:48:27.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set) |
---|
806 | Dec 14 19:48:28.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set) |
---|
807 | Dec 14 19:48:29.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set) |
---|
808 | Dec 14 19:48:30.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set) |
---|
809 | Dec 14 19:48:30.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set) |
---|
810 | Dec 14 19:48:31.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set) |
---|
811 | Dec 14 19:48:31.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set) |
---|
812 | Dec 14 19:48:32.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set) |
---|
813 | Dec 14 19:48:32.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set) |
---|
814 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
815 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
816 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
817 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
818 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
819 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
820 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
821 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
822 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
823 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
824 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
825 | Dec 14 19:48:33.000 [notice] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections. |
---|
826 | Dec 14 19:48:33.000 [notice] Tor 0.3.2.7-rc (git-04f4f30af76cdedf) opening log file. |
---|
827 | Dec 14 19:48:33.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 1048544, ConnLimit_high_thresh 1048480, ConnLimit_low_thresh 786408 |
---|
828 | Dec 14 19:48:33.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode) |
---|
829 | Dec 14 19:48:33.000 [info] cell_ewma_set_scale_factor(): Enabled cell_ewma algorithm because of value in CircuitPriorityHalflifeMsec in consensus; scale factor is 0.793701 per 10 seconds |
---|
830 | Dec 14 19:48:33.000 [info] options_act(): Changed to using entry guards or bridges, or changed preferred or excluded node lists. Abandoning previous circuits. |
---|
831 | Dec 14 19:48:33.000 [info] sampled_guards_update_from_consensus(): Updating sampled guard status based on received consensus. |
---|
832 | Dec 14 19:48:33.000 [info] sampled_guards_update_from_consensus(): Sampled guard [bridge] ($1E05F577A0EC0213F971D81BF4D86A9E4E8229ED) at 109.105.109.163:38980 is now unlisted. |
---|
833 | Dec 14 19:48:33.000 [info] sampled_guards_update_from_consensus(): Sampled guard [bridge] ($4C331FA9B3D1D6D8FB0D8FBBF0C259C360D97E6A) at 109.105.109.163:47779 is now unlisted. |
---|
834 | Dec 14 19:48:33.000 [info] sampled_guards_update_from_consensus(): Sampled guard [bridge] ($AF9F66B7B04F8FF6F32D455F05135250A16543C9) at 169.229.59.75:46328 is now unlisted. |
---|
835 | Dec 14 19:48:33.000 [info] sampled_guards_update_from_consensus(): Sampled guard [bridge] ($A09D536DD1752D542E1FBB3C9CE4449D51298239) at 83.212.101.3:80 is now unlisted. |
---|
836 | Dec 14 19:48:33.000 [info] sampled_guards_update_from_consensus(): Sampled guard [bridge] ($AF9F66B7B04F8FF6F32D455F05135250A16543C9) at 169.229.59.74:31493 is now unlisted. |
---|
837 | Dec 14 19:48:33.000 [info] sample_reachable_filtered_entry_guards(): Trying to sample a reachable guard: We know of 0 in the USABLE_FILTERED set. |
---|
838 | Dec 14 19:48:33.000 [info] sample_reachable_filtered_entry_guards(): (That isn't enough. Trying to expand the sample.) |
---|
839 | Dec 14 19:48:33.000 [info] entry_guards_expand_sample(): Expanding the sample guard set. We have 5 guards in the sample, and 26 eligible guards to extend it with. |
---|
840 | Dec 14 19:48:33.000 [info] sample_reachable_filtered_entry_guards(): (After filters [b], we have 20 guards to consider.) |
---|
841 | Dec 14 19:48:33.000 [info] sample_reachable_filtered_entry_guards(): (Selected [bridge] ($BBB28DF0F201E706BE564EFE690FE9577DD8386D) at 109.105.109.147:13764.) |
---|
842 | Dec 14 19:48:33.000 [info] sample_reachable_filtered_entry_guards(): Trying to sample a reachable guard: We know of 20 in the USABLE_FILTERED set. |
---|
843 | Dec 14 19:48:33.000 [info] sample_reachable_filtered_entry_guards(): (After filters [b], we have 19 guards to consider.) |
---|
844 | Dec 14 19:48:33.000 [info] sample_reachable_filtered_entry_guards(): (Selected [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443.) |
---|
845 | Dec 14 19:48:33.000 [info] sample_reachable_filtered_entry_guards(): Trying to sample a reachable guard: We know of 20 in the USABLE_FILTERED set. |
---|
846 | Dec 14 19:48:33.000 [info] sample_reachable_filtered_entry_guards(): (After filters [b], we have 18 guards to consider.) |
---|
847 | Dec 14 19:48:33.000 [info] sample_reachable_filtered_entry_guards(): (Selected [bridge] ($00DC6C4FA49A65BD1472993CF6730D54F11E0DBB) at 154.35.22.12:80.) |
---|
848 | Dec 14 19:48:33.000 [info] entry_guards_update_primary(): Primary entry guards have changed. New primary guard list is: |
---|
849 | Dec 14 19:48:33.000 [info] entry_guards_update_primary(): 1/3: [bridge] ($BBB28DF0F201E706BE564EFE690FE9577DD8386D) at 109.105.109.147:13764 |
---|
850 | Dec 14 19:48:33.000 [info] entry_guards_update_primary(): 2/3: [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 |
---|
851 | Dec 14 19:48:33.000 [info] entry_guards_update_primary(): 3/3: [bridge] ($00DC6C4FA49A65BD1472993CF6730D54F11E0DBB) at 154.35.22.12:80 |
---|
852 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
853 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
854 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
855 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
856 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
857 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
858 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
859 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
860 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
861 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
862 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
863 | Dec 14 19:48:33.000 [notice] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections. |
---|
864 | Dec 14 19:48:33.000 [notice] Tor 0.3.2.7-rc (git-04f4f30af76cdedf) opening log file. |
---|
865 | Dec 14 19:48:33.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 1048544, ConnLimit_high_thresh 1048480, ConnLimit_low_thresh 786408 |
---|
866 | Dec 14 19:48:33.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode) |
---|
867 | Dec 14 19:48:33.000 [info] cell_ewma_set_scale_factor(): Enabled cell_ewma algorithm because of value in CircuitPriorityHalflifeMsec in consensus; scale factor is 0.793701 per 10 seconds |
---|
868 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
869 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
870 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
871 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
872 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
873 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
874 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
875 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
876 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
877 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
878 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
879 | Dec 14 19:48:33.000 [notice] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections. |
---|
880 | Dec 14 19:48:33.000 [notice] Tor 0.3.2.7-rc (git-04f4f30af76cdedf) opening log file. |
---|
881 | Dec 14 19:48:33.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 1048544, ConnLimit_high_thresh 1048480, ConnLimit_low_thresh 786408 |
---|
882 | Dec 14 19:48:33.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode) |
---|
883 | Dec 14 19:48:33.000 [info] cell_ewma_set_scale_factor(): Enabled cell_ewma algorithm because of value in CircuitPriorityHalflifeMsec in consensus; scale factor is 0.793701 per 10 seconds |
---|
884 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
885 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
886 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
887 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
888 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
889 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
890 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
891 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
892 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
893 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
894 | Dec 14 19:48:33.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
895 | Dec 14 19:48:33.000 [notice] Opening Socks listener on 127.0.0.1:9150 |
---|
896 | Dec 14 19:48:33.000 [notice] Tor 0.3.2.7-rc (git-04f4f30af76cdedf) opening log file. |
---|
897 | Dec 14 19:48:33.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 1048544, ConnLimit_high_thresh 1048480, ConnLimit_low_thresh 786408 |
---|
898 | Dec 14 19:48:33.000 [info] parse_transport_line(): Pluggable transport proxy (fte exec ./TorBrowser/Tor/PluggableTransports/fteproxy.bin --managed) does not provide any needed transports and will not be launched. |
---|
899 | Dec 14 19:48:33.000 [info] parse_transport_line(): Pluggable transport proxy (meek exec ./TorBrowser/Tor/PluggableTransports/meek-client-torbrowser -- ./TorBrowser/Tor/PluggableTransports/meek-client) does not provide any needed transports and will not be launched. |
---|
900 | Dec 14 19:48:33.000 [info] parse_transport_line(): Pluggable transport proxy (snowflake exec ./TorBrowser/Tor/PluggableTransports/snowflake-client -url https://snowflake-reg.appspot.com/ -front www.google.com -ice stun:stun.l.google.com:19302) does not provide any needed transports and will not be launched. |
---|
901 | Dec 14 19:48:33.000 [info] launch_managed_proxy(): Managed proxy at './TorBrowser/Tor/PluggableTransports/obfs4proxy' has spawned with PID '14351'. |
---|
902 | Dec 14 19:48:33.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode) |
---|
903 | Dec 14 19:48:33.000 [info] cell_ewma_set_scale_factor(): Enabled cell_ewma algorithm because of value in CircuitPriorityHalflifeMsec in consensus; scale factor is 0.793701 per 10 seconds |
---|
904 | Dec 14 19:48:33.000 [info] should_delay_dir_fetches(): Delaying dir fetches (pt proxies still configuring) |
---|
905 | Dec 14 19:48:33.000 [info] should_delay_dir_fetches(): Delaying dir fetches (pt proxies still configuring) |
---|
906 | Dec 14 19:48:33.000 [info] handle_proxy_line(): Got a line from managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy': (VERSION 1) |
---|
907 | Dec 14 19:48:33.000 [info] handle_proxy_line(): Got a line from managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy': (CMETHOD obfs2 socks5 127.0.0.1:43323) |
---|
908 | Dec 14 19:48:33.000 [info] parse_cmethod_line(): Transport obfs2 at 127.0.0.1:43323 with SOCKS 3. Attached to managed proxy. |
---|
909 | Dec 14 19:48:33.000 [info] handle_proxy_line(): Got a line from managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy': (CMETHOD obfs3 socks5 127.0.0.1:33479) |
---|
910 | Dec 14 19:48:33.000 [info] parse_cmethod_line(): Transport obfs3 at 127.0.0.1:33479 with SOCKS 3. Attached to managed proxy. |
---|
911 | Dec 14 19:48:33.000 [info] handle_proxy_line(): Got a line from managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy': (CMETHOD obfs4 socks5 127.0.0.1:41819) |
---|
912 | Dec 14 19:48:33.000 [info] parse_cmethod_line(): Transport obfs4 at 127.0.0.1:41819 with SOCKS 3. Attached to managed proxy. |
---|
913 | Dec 14 19:48:33.000 [info] handle_proxy_line(): Got a line from managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy': (CMETHOD scramblesuit socks5 127.0.0.1:40067) |
---|
914 | Dec 14 19:48:33.000 [info] parse_cmethod_line(): Transport scramblesuit at 127.0.0.1:40067 with SOCKS 3. Attached to managed proxy. |
---|
915 | Dec 14 19:48:33.000 [info] handle_proxy_line(): Got a line from managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy': (CMETHODS DONE) |
---|
916 | Dec 14 19:48:33.000 [info] handle_methods_done(): Client managed proxy './TorBrowser/Tor/PluggableTransports/obfs4proxy' configuration completed! |
---|
917 | Dec 14 19:48:33.000 [info] register_client_proxy(): Successfully registered transport obfs2 |
---|
918 | Dec 14 19:48:33.000 [info] register_client_proxy(): Successfully registered transport obfs3 |
---|
919 | Dec 14 19:48:33.000 [info] register_client_proxy(): Successfully registered transport obfs4 |
---|
920 | Dec 14 19:48:33.000 [info] register_client_proxy(): Successfully registered transport scramblesuit |
---|
921 | Dec 14 19:48:34.000 [notice] Our directory information is no longer up-to-date enough to build circuits: We're missing descriptors for 2/2 of our primary entry guards (total microdescriptors: 6474/6486). |
---|
922 | Dec 14 19:48:34.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
923 | Dec 14 19:48:34.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($00DC6C4FA49A65BD1472993CF6730D54F11E0DBB) at 154.35.22.12:80 for circuit. |
---|
924 | Dec 14 19:48:34.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
925 | Dec 14 19:48:44.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
926 | Dec 14 19:48:44.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit. |
---|
927 | Dec 14 19:48:44.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
928 | Dec 14 19:48:54.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
929 | Dec 14 19:48:54.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($00DC6C4FA49A65BD1472993CF6730D54F11E0DBB) at 154.35.22.12:80 for circuit. |
---|
930 | Dec 14 19:48:54.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
931 | Dec 14 19:49:04.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
932 | Dec 14 19:49:04.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($BBB28DF0F201E706BE564EFE690FE9577DD8386D) at 109.105.109.147:13764 for circuit. |
---|
933 | Dec 14 19:49:04.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
934 | Dec 14 19:49:13.000 [info] routerlist_remove_old_routers(): We have 3 live routers and 0 old router descriptors. |
---|
935 | Dec 14 19:49:14.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
936 | Dec 14 19:49:14.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($00DC6C4FA49A65BD1472993CF6730D54F11E0DBB) at 154.35.22.12:80 for circuit. |
---|
937 | Dec 14 19:49:14.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
938 | Dec 14 19:49:24.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
939 | Dec 14 19:49:24.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit. |
---|
940 | Dec 14 19:49:24.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
941 | Dec 14 19:49:34.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
942 | Dec 14 19:49:34.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($BBB28DF0F201E706BE564EFE690FE9577DD8386D) at 109.105.109.147:13764 for circuit. |
---|
943 | Dec 14 19:49:34.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
944 | Dec 14 19:49:44.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
945 | Dec 14 19:49:44.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit. |
---|
946 | Dec 14 19:49:44.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
947 | Dec 14 19:49:54.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
948 | Dec 14 19:49:54.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit. |
---|
949 | Dec 14 19:49:54.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
950 | Dec 14 19:50:04.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
951 | Dec 14 19:50:04.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($00DC6C4FA49A65BD1472993CF6730D54F11E0DBB) at 154.35.22.12:80 for circuit. |
---|
952 | Dec 14 19:50:04.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
953 | Dec 14 19:50:13.000 [info] routerlist_remove_old_routers(): We have 3 live routers and 0 old router descriptors. |
---|
954 | Dec 14 19:50:14.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
955 | Dec 14 19:50:14.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit. |
---|
956 | Dec 14 19:50:14.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
957 | Dec 14 19:50:24.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
958 | Dec 14 19:50:24.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit. |
---|
959 | Dec 14 19:50:24.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
960 | Dec 14 19:50:34.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
961 | Dec 14 19:50:34.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit. |
---|
962 | Dec 14 19:50:34.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
963 | Dec 14 19:50:44.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
964 | Dec 14 19:50:44.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($BBB28DF0F201E706BE564EFE690FE9577DD8386D) at 109.105.109.147:13764 for circuit. |
---|
965 | Dec 14 19:50:44.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
966 | Dec 14 19:50:54.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
967 | Dec 14 19:50:54.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit. |
---|
968 | Dec 14 19:50:54.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
969 | Dec 14 19:51:04.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
970 | Dec 14 19:51:04.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($00DC6C4FA49A65BD1472993CF6730D54F11E0DBB) at 154.35.22.12:80 for circuit. |
---|
971 | Dec 14 19:51:04.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
972 | Dec 14 19:51:13.000 [info] routerlist_remove_old_routers(): We have 3 live routers and 0 old router descriptors. |
---|
973 | Dec 14 19:51:14.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
974 | Dec 14 19:51:14.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($BBB28DF0F201E706BE564EFE690FE9577DD8386D) at 109.105.109.147:13764 for circuit. |
---|
975 | Dec 14 19:51:14.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
976 | Dec 14 19:51:24.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
977 | Dec 14 19:51:24.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($BBB28DF0F201E706BE564EFE690FE9577DD8386D) at 109.105.109.147:13764 for circuit. |
---|
978 | Dec 14 19:51:24.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
979 | Dec 14 19:51:34.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
980 | Dec 14 19:51:34.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit. |
---|
981 | Dec 14 19:51:34.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
982 | Dec 14 19:51:44.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
983 | Dec 14 19:51:44.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($BBB28DF0F201E706BE564EFE690FE9577DD8386D) at 109.105.109.147:13764 for circuit. |
---|
984 | Dec 14 19:51:44.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
985 | Dec 14 19:51:54.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
986 | Dec 14 19:51:54.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($BBB28DF0F201E706BE564EFE690FE9577DD8386D) at 109.105.109.147:13764 for circuit. |
---|
987 | Dec 14 19:51:54.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
988 | Dec 14 19:52:04.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
989 | Dec 14 19:52:04.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit. |
---|
990 | Dec 14 19:52:04.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
991 | Dec 14 19:52:13.000 [info] routerlist_remove_old_routers(): We have 3 live routers and 0 old router descriptors. |
---|
992 | Dec 14 19:52:14.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
993 | Dec 14 19:52:14.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($BBB28DF0F201E706BE564EFE690FE9577DD8386D) at 109.105.109.147:13764 for circuit. |
---|
994 | Dec 14 19:52:14.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
995 | Dec 14 19:52:24.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
996 | Dec 14 19:52:24.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($BBB28DF0F201E706BE564EFE690FE9577DD8386D) at 109.105.109.147:13764 for circuit. |
---|
997 | Dec 14 19:52:24.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
998 | Dec 14 19:52:34.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
999 | Dec 14 19:52:34.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit. |
---|
1000 | Dec 14 19:52:34.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
1001 | Dec 14 19:52:44.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
1002 | Dec 14 19:52:44.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit. |
---|
1003 | Dec 14 19:52:44.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
1004 | Dec 14 19:52:54.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
1005 | Dec 14 19:52:54.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($00DC6C4FA49A65BD1472993CF6730D54F11E0DBB) at 154.35.22.12:80 for circuit. |
---|
1006 | Dec 14 19:52:54.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
1007 | Dec 14 19:53:04.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
1008 | Dec 14 19:53:04.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit. |
---|
1009 | Dec 14 19:53:04.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
1010 | Dec 14 19:53:13.000 [info] routerlist_remove_old_routers(): We have 3 live routers and 0 old router descriptors. |
---|
1011 | Dec 14 19:53:14.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
1012 | Dec 14 19:53:14.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit. |
---|
1013 | Dec 14 19:53:14.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
1014 | Dec 14 19:53:24.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
1015 | Dec 14 19:53:24.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($00DC6C4FA49A65BD1472993CF6730D54F11E0DBB) at 154.35.22.12:80 for circuit. |
---|
1016 | Dec 14 19:53:24.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
1017 | Dec 14 19:53:34.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
1018 | Dec 14 19:53:34.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit. |
---|
1019 | Dec 14 19:53:34.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
1020 | Dec 14 19:53:44.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
1021 | Dec 14 19:53:44.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit. |
---|
1022 | Dec 14 19:53:44.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
1023 | Dec 14 19:53:54.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
1024 | Dec 14 19:53:54.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($BBB28DF0F201E706BE564EFE690FE9577DD8386D) at 109.105.109.147:13764 for circuit. |
---|
1025 | Dec 14 19:53:54.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
1026 | Dec 14 19:54:04.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
1027 | Dec 14 19:54:04.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit. |
---|
1028 | Dec 14 19:54:04.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
1029 | Dec 14 19:54:13.000 [info] routerlist_remove_old_routers(): We have 3 live routers and 0 old router descriptors. |
---|
1030 | Dec 14 19:54:14.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
1031 | Dec 14 19:54:14.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($00DC6C4FA49A65BD1472993CF6730D54F11E0DBB) at 154.35.22.12:80 for circuit. |
---|
1032 | Dec 14 19:54:14.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
1033 | Dec 14 19:54:24.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
1034 | Dec 14 19:54:24.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit. |
---|
1035 | Dec 14 19:54:24.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
1036 | Dec 14 19:54:34.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
1037 | Dec 14 19:54:34.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($00DC6C4FA49A65BD1472993CF6730D54F11E0DBB) at 154.35.22.12:80 for circuit. |
---|
1038 | Dec 14 19:54:34.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
1039 | Dec 14 19:54:44.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
1040 | Dec 14 19:54:44.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($BBB28DF0F201E706BE564EFE690FE9577DD8386D) at 109.105.109.147:13764 for circuit. |
---|
1041 | Dec 14 19:54:44.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
1042 | Dec 14 19:54:54.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
1043 | Dec 14 19:54:54.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($BBB28DF0F201E706BE564EFE690FE9577DD8386D) at 109.105.109.147:13764 for circuit. |
---|
1044 | Dec 14 19:54:54.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
1045 | Dec 14 19:55:04.000 [info] launch_descriptor_downloads(): Launching 1 request for 12 microdescs, 12 at a time |
---|
1046 | Dec 14 19:55:04.000 [info] select_entry_guard_for_circuit(): Selected primary guard [bridge] ($FC259A04A328A07FED1413E9FC6526530D9FD87A) at 85.17.30.79:443 for circuit. |
---|
1047 | Dec 14 19:55:04.000 [notice] Ignoring directory request, since no bridge nodes are available yet. |
---|
1048 | Dec 14 19:55:10.000 [info] tor_addr_parse_mask_ports(): '*:25' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
1049 | Dec 14 19:55:10.000 [info] tor_addr_parse_mask_ports(): '*:119' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
1050 | Dec 14 19:55:10.000 [info] tor_addr_parse_mask_ports(): '*:135-139' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
1051 | Dec 14 19:55:10.000 [info] tor_addr_parse_mask_ports(): '*:445' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
1052 | Dec 14 19:55:10.000 [info] tor_addr_parse_mask_ports(): '*:563' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
1053 | Dec 14 19:55:10.000 [info] tor_addr_parse_mask_ports(): '*:1214' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
1054 | Dec 14 19:55:10.000 [info] tor_addr_parse_mask_ports(): '*:4661-4666' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
1055 | Dec 14 19:55:10.000 [info] tor_addr_parse_mask_ports(): '*:6346-6429' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
1056 | Dec 14 19:55:10.000 [info] tor_addr_parse_mask_ports(): '*:6699' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
1057 | Dec 14 19:55:10.000 [info] tor_addr_parse_mask_ports(): '*:6881-6999' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
1058 | Dec 14 19:55:10.000 [info] tor_addr_parse_mask_ports(): '*:*' expands into rules which apply to all IPv4 and IPv6 addresses. (Use accept/reject *4:* for IPv4 or accept[6]/reject[6] *6:* for IPv6.) |
---|
1059 | Dec 14 19:55:10.000 [notice] Closing no-longer-configured Socks listener on 127.0.0.1:9150 |
---|
1060 | Dec 14 19:55:10.000 [notice] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections. |
---|
1061 | Dec 14 19:55:10.000 [notice] Tor 0.3.2.7-rc (git-04f4f30af76cdedf) opening log file. |
---|
1062 | Dec 14 19:55:10.000 [notice] Closing old Socks listener on 127.0.0.1:9150 |
---|
1063 | Dec 14 19:55:10.000 [info] options_act_reversible(): Recomputed OOS thresholds: ConnLimit 1000, ConnLimit_ 1048544, ConnLimit_high_thresh 1048480, ConnLimit_low_thresh 786408 |
---|
1064 | Dec 14 19:55:10.000 [info] tor_process_handle_destroy(): Terminated process with PID '14351'. |
---|
1065 | Dec 14 19:55:10.000 [info] scheduler_kist_set_full_mode(): Setting KIST scheduler with kernel support (KIST mode) |
---|
1066 | Dec 14 19:55:10.000 [info] cell_ewma_set_scale_factor(): Enabled cell_ewma algorithm because of value in CircuitPriorityHalflifeMsec in consensus; scale factor is 0.793701 per 10 seconds |
---|
1067 | Dec 14 19:55:10.000 [info] notify_waitpid_callback_by_pid(): Child process 14351 has exited; no callback was registered |
---|
1068 | Dec 14 19:55:11.000 [info] should_delay_dir_fetches(): Delaying dir fetches (DisableNetwork is set) |
---|
1069 | Dec 14 19:55:11.000 [notice] Delaying directory fetches: DisableNetwork is set. |
---|
1070 | Dec 14 19:55:11.000 [info] connection_control_reached_eof(): Control connection reached EOF. Closing. |
---|
1071 | Dec 14 19:55:11.000 [notice] Owning controller connection has closed -- exiting now. |
---|
1072 | Dec 14 19:55:11.000 [notice] Catching signal TERM, exiting cleanly. |
---|
1073 | Dec 14 19:55:11.000 [info] or_state_save(): Saved state to "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/state" |
---|
1074 | Dec 14 19:55:12.000 [info] tor_lockfile_unlock(): Unlocking "/home/thomas/Arbeit/Tor/tor-browser-bundle/tor-browser_en-US/Browser/TorBrowser/Data/Tor/lock" |
---|